Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   20.518108] ==================================================================
[   20.527779] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   20.535846] Write of size 1 at addr ffff000801939078 by task kunit_try_catch/186
[   20.543224] 
[   20.544711] CPU: 3 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   20.544769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.544784] Hardware name: WinLink E850-96 board (DT)
[   20.544802] Call trace:
[   20.544816]  show_stack+0x20/0x38 (C)
[   20.544850]  dump_stack_lvl+0x8c/0xd0
[   20.544888]  print_report+0x118/0x608
[   20.544925]  kasan_report+0xdc/0x128
[   20.544956]  __asan_report_store1_noabort+0x20/0x30
[   20.544987]  kmalloc_track_caller_oob_right+0x40c/0x488
[   20.545020]  kunit_try_run_case+0x170/0x3f0
[   20.545057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.545096]  kthread+0x328/0x630
[   20.545124]  ret_from_fork+0x10/0x20
[   20.545159] 
[   20.609542] Allocated by task 186:
[   20.612931]  kasan_save_stack+0x3c/0x68
[   20.616748]  kasan_save_track+0x20/0x40
[   20.620567]  kasan_save_alloc_info+0x40/0x58
[   20.624820]  __kasan_kmalloc+0xd4/0xd8
[   20.628553]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   20.634108]  kmalloc_track_caller_oob_right+0xa8/0x488
[   20.639229]  kunit_try_run_case+0x170/0x3f0
[   20.643396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.648866]  kthread+0x328/0x630
[   20.652076]  ret_from_fork+0x10/0x20
[   20.655635] 
[   20.657113] The buggy address belongs to the object at ffff000801939000
[   20.657113]  which belongs to the cache kmalloc-128 of size 128
[   20.669614] The buggy address is located 0 bytes to the right of
[   20.669614]  allocated 120-byte region [ffff000801939000, ffff000801939078)
[   20.682545] 
[   20.684023] The buggy address belongs to the physical page:
[   20.689581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881938
[   20.697565] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.705204] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.712146] page_type: f5(slab)
[   20.715282] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.723002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.730729] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   20.738539] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.746353] head: 0bfffe0000000001 fffffdffe0064e01 00000000ffffffff 00000000ffffffff
[   20.754165] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   20.761970] page dumped because: kasan: bad access detected
[   20.767527] 
[   20.769001] Memory state around the buggy address:
[   20.773783]  ffff000801938f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.780984]  ffff000801938f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.788191] >ffff000801939000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.795390]                                                                 ^
[   20.802511]  ffff000801939080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.809716]  ffff000801939100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.816918] ==================================================================

[   24.140091] ==================================================================
[   24.140253] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   24.140499] Write of size 1 at addr fff00000c5eeec78 by task kunit_try_catch/143
[   24.140623] 
[   24.140709] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.140900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.140963] Hardware name: linux,dummy-virt (DT)
[   24.141031] Call trace:
[   24.141078]  show_stack+0x20/0x38 (C)
[   24.141200]  dump_stack_lvl+0x8c/0xd0
[   24.141334]  print_report+0x118/0x608
[   24.141445]  kasan_report+0xdc/0x128
[   24.141553]  __asan_report_store1_noabort+0x20/0x30
[   24.141671]  kmalloc_track_caller_oob_right+0x418/0x488
[   24.141817]  kunit_try_run_case+0x170/0x3f0
[   24.141936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.142061]  kthread+0x328/0x630
[   24.142169]  ret_from_fork+0x10/0x20
[   24.142286] 
[   24.142328] Allocated by task 143:
[   24.142388]  kasan_save_stack+0x3c/0x68
[   24.142497]  kasan_save_track+0x20/0x40
[   24.142611]  kasan_save_alloc_info+0x40/0x58
[   24.142775]  __kasan_kmalloc+0xd4/0xd8
[   24.142884]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   24.143040]  kmalloc_track_caller_oob_right+0x184/0x488
[   24.143194]  kunit_try_run_case+0x170/0x3f0
[   24.143389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.143594]  kthread+0x328/0x630
[   24.143706]  ret_from_fork+0x10/0x20
[   24.143802] 
[   24.143932] The buggy address belongs to the object at fff00000c5eeec00
[   24.143932]  which belongs to the cache kmalloc-128 of size 128
[   24.144064] The buggy address is located 0 bytes to the right of
[   24.144064]  allocated 120-byte region [fff00000c5eeec00, fff00000c5eeec78)
[   24.144239] 
[   24.144368] The buggy address belongs to the physical page:
[   24.144463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.145175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.145328] page_type: f5(slab)
[   24.145435] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.145709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.145849] page dumped because: kasan: bad access detected
[   24.145992] 
[   24.146038] Memory state around the buggy address:
[   24.146153]  fff00000c5eeeb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.146426]  fff00000c5eeeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.146527] >fff00000c5eeec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.146613]                                                                 ^
[   24.146726]  fff00000c5eeec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.146837]  fff00000c5eeed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.146975] ==================================================================
[   24.130572] ==================================================================
[   24.130758] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   24.130924] Write of size 1 at addr fff00000c5eeeb78 by task kunit_try_catch/143
[   24.131050] 
[   24.131138] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   24.131335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.131403] Hardware name: linux,dummy-virt (DT)
[   24.131501] Call trace:
[   24.131568]  show_stack+0x20/0x38 (C)
[   24.131781]  dump_stack_lvl+0x8c/0xd0
[   24.131995]  print_report+0x118/0x608
[   24.132230]  kasan_report+0xdc/0x128
[   24.132401]  __asan_report_store1_noabort+0x20/0x30
[   24.132646]  kmalloc_track_caller_oob_right+0x40c/0x488
[   24.132881]  kunit_try_run_case+0x170/0x3f0
[   24.133047]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.133174]  kthread+0x328/0x630
[   24.133303]  ret_from_fork+0x10/0x20
[   24.133422] 
[   24.133466] Allocated by task 143:
[   24.133535]  kasan_save_stack+0x3c/0x68
[   24.133632]  kasan_save_track+0x20/0x40
[   24.133750]  kasan_save_alloc_info+0x40/0x58
[   24.133900]  __kasan_kmalloc+0xd4/0xd8
[   24.134041]  __kmalloc_node_track_caller_noprof+0x18c/0x4c0
[   24.134172]  kmalloc_track_caller_oob_right+0xa8/0x488
[   24.134294]  kunit_try_run_case+0x170/0x3f0
[   24.134459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.134613]  kthread+0x328/0x630
[   24.134740]  ret_from_fork+0x10/0x20
[   24.134837] 
[   24.134916] The buggy address belongs to the object at fff00000c5eeeb00
[   24.134916]  which belongs to the cache kmalloc-128 of size 128
[   24.135054] The buggy address is located 0 bytes to the right of
[   24.135054]  allocated 120-byte region [fff00000c5eeeb00, fff00000c5eeeb78)
[   24.135231] 
[   24.135293] The buggy address belongs to the physical page:
[   24.135406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105eee
[   24.135546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.135698] page_type: f5(slab)
[   24.135882] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   24.136031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.136285] page dumped because: kasan: bad access detected
[   24.136517] 
[   24.136621] Memory state around the buggy address:
[   24.136719]  fff00000c5eeea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.136884]  fff00000c5eeea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.137182] >fff00000c5eeeb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   24.137317]                                                                 ^
[   24.137577]  fff00000c5eeeb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.137730]  fff00000c5eeec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.137840] ==================================================================

[   16.818827] ==================================================================
[   16.819627] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x520
[   16.821156] Write of size 1 at addr ffff8881022c3578 by task kunit_try_catch/159
[   16.822462] 
[   16.822655] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   16.822723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.822740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.822770] Call Trace:
[   16.822798]  <TASK>
[   16.822838]  dump_stack_lvl+0x73/0xb0
[   16.822879]  print_report+0xd1/0x650
[   16.822913]  ? __virt_addr_valid+0x1db/0x2d0
[   16.822946]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   16.822981]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.823012]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   16.823048]  kasan_report+0x141/0x180
[   16.823132]  ? kmalloc_track_caller_oob_right+0x4c8/0x520
[   16.823226]  __asan_report_store1_noabort+0x1b/0x30
[   16.823486]  kmalloc_track_caller_oob_right+0x4c8/0x520
[   16.823578]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   16.823716]  ? __schedule+0x10cc/0x2b60
[   16.823756]  ? __pfx_read_tsc+0x10/0x10
[   16.823800]  ? ktime_get_ts64+0x86/0x230
[   16.823855]  kunit_try_run_case+0x1a5/0x480
[   16.823891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.823920]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.823956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.823990]  ? __kthread_parkme+0x82/0x180
[   16.824020]  ? preempt_count_sub+0x50/0x80
[   16.824051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.824105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.824142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.824270]  kthread+0x337/0x6f0
[   16.824307]  ? trace_preempt_on+0x20/0xc0
[   16.824343]  ? __pfx_kthread+0x10/0x10
[   16.824372]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.824404]  ? calculate_sigpending+0x7b/0xa0
[   16.824439]  ? __pfx_kthread+0x10/0x10
[   16.824468]  ret_from_fork+0x116/0x1d0
[   16.824493]  ? __pfx_kthread+0x10/0x10
[   16.824520]  ret_from_fork_asm+0x1a/0x30
[   16.824562]  </TASK>
[   16.824577] 
[   16.844962] Allocated by task 159:
[   16.845361]  kasan_save_stack+0x45/0x70
[   16.845689]  kasan_save_track+0x18/0x40
[   16.846979]  kasan_save_alloc_info+0x3b/0x50
[   16.847456]  __kasan_kmalloc+0xb7/0xc0
[   16.848118]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   16.849125]  kmalloc_track_caller_oob_right+0x99/0x520
[   16.849937]  kunit_try_run_case+0x1a5/0x480
[   16.850253]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.850897]  kthread+0x337/0x6f0
[   16.851377]  ret_from_fork+0x116/0x1d0
[   16.851748]  ret_from_fork_asm+0x1a/0x30
[   16.852392] 
[   16.852769] The buggy address belongs to the object at ffff8881022c3500
[   16.852769]  which belongs to the cache kmalloc-128 of size 128
[   16.854496] The buggy address is located 0 bytes to the right of
[   16.854496]  allocated 120-byte region [ffff8881022c3500, ffff8881022c3578)
[   16.855770] 
[   16.856046] The buggy address belongs to the physical page:
[   16.856569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c3
[   16.857933] flags: 0x200000000000000(node=0|zone=2)
[   16.858403] page_type: f5(slab)
[   16.858681] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.859768] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.860918] page dumped because: kasan: bad access detected
[   16.861585] 
[   16.861781] Memory state around the buggy address:
[   16.862571]  ffff8881022c3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.864131]  ffff8881022c3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.864883] >ffff8881022c3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.865655]                                                                 ^
[   16.866807]  ffff8881022c3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.867557]  ffff8881022c3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.868237] ==================================================================
[   16.871028] ==================================================================
[   16.872013] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4b1/0x520
[   16.872758] Write of size 1 at addr ffff8881022c3678 by task kunit_try_catch/159
[   16.874047] 
[   16.874691] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   16.874859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.874900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.874958] Call Trace:
[   16.874977]  <TASK>
[   16.874997]  dump_stack_lvl+0x73/0xb0
[   16.875034]  print_report+0xd1/0x650
[   16.875099]  ? __virt_addr_valid+0x1db/0x2d0
[   16.875153]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   16.875218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.875254]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   16.875290]  kasan_report+0x141/0x180
[   16.875321]  ? kmalloc_track_caller_oob_right+0x4b1/0x520
[   16.875363]  __asan_report_store1_noabort+0x1b/0x30
[   16.875392]  kmalloc_track_caller_oob_right+0x4b1/0x520
[   16.875428]  ? __pfx_kmalloc_track_caller_oob_right+0x10/0x10
[   16.875466]  ? __schedule+0x10cc/0x2b60
[   16.875498]  ? __pfx_read_tsc+0x10/0x10
[   16.875528]  ? ktime_get_ts64+0x86/0x230
[   16.875561]  kunit_try_run_case+0x1a5/0x480
[   16.875589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.875615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.875650]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.875684]  ? __kthread_parkme+0x82/0x180
[   16.875711]  ? preempt_count_sub+0x50/0x80
[   16.875743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.875770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.875832]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.875868]  kthread+0x337/0x6f0
[   16.875895]  ? trace_preempt_on+0x20/0xc0
[   16.875925]  ? __pfx_kthread+0x10/0x10
[   16.875953]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.875985]  ? calculate_sigpending+0x7b/0xa0
[   16.876019]  ? __pfx_kthread+0x10/0x10
[   16.876049]  ret_from_fork+0x116/0x1d0
[   16.876099]  ? __pfx_kthread+0x10/0x10
[   16.876128]  ret_from_fork_asm+0x1a/0x30
[   16.876169]  </TASK>
[   16.876182] 
[   16.896153] Allocated by task 159:
[   16.896746]  kasan_save_stack+0x45/0x70
[   16.897264]  kasan_save_track+0x18/0x40
[   16.897827]  kasan_save_alloc_info+0x3b/0x50
[   16.898348]  __kasan_kmalloc+0xb7/0xc0
[   16.898695]  __kmalloc_node_track_caller_noprof+0x1cb/0x500
[   16.899669]  kmalloc_track_caller_oob_right+0x19a/0x520
[   16.900378]  kunit_try_run_case+0x1a5/0x480
[   16.900901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.901583]  kthread+0x337/0x6f0
[   16.902037]  ret_from_fork+0x116/0x1d0
[   16.902603]  ret_from_fork_asm+0x1a/0x30
[   16.903130] 
[   16.903705] The buggy address belongs to the object at ffff8881022c3600
[   16.903705]  which belongs to the cache kmalloc-128 of size 128
[   16.904855] The buggy address is located 0 bytes to the right of
[   16.904855]  allocated 120-byte region [ffff8881022c3600, ffff8881022c3678)
[   16.906283] 
[   16.906516] The buggy address belongs to the physical page:
[   16.907022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c3
[   16.908043] flags: 0x200000000000000(node=0|zone=2)
[   16.908698] page_type: f5(slab)
[   16.909108] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.909690] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.910573] page dumped because: kasan: bad access detected
[   16.911136] 
[   16.911646] Memory state around the buggy address:
[   16.912092]  ffff8881022c3500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.912771]  ffff8881022c3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.913399] >ffff8881022c3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.913914]                                                                 ^
[   16.914537]  ffff8881022c3680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.915545]  ffff8881022c3700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.916330] ==================================================================

[   47.061279] ==================================================================
[   47.068572] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c8/0x548
[   47.076721] Write of size 1 at addr cc78e878 by task kunit_try_catch/194
[   47.083465] 
[   47.084960] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   47.084991] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   47.084991] Hardware name: Generic DRA74X (Flattened Device Tree)
[   47.085021] Call trace: 
[   47.085021]  unwind_backtrace from show_stack+0x18/0x1c
[   47.085052]  show_stack from dump_stack_lvl+0x70/0x90
[   47.085052]  dump_stack_lvl from print_report+0x158/0x528
[   47.085083]  print_report from kasan_report+0xdc/0x118
[   47.085113]  kasan_report from kmalloc_track_caller_oob_right+0x4c8/0x548
[   47.085144]  kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8
[   47.085174]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.085205]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   47.085205]  kthread from ret_from_fork+0x14/0x20
[   47.085235] Exception stack(0xf21bbfb0 to 0xf21bbff8)
[   47.085235] bfa0:                                     00000000 00000000 00000000 00000000
[   47.085266] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   47.085266] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   47.085296] 
[   47.193298] Allocated by task 194:
[   47.196716]  kasan_save_track+0x30/0x5c
[   47.200592]  __kasan_kmalloc+0x8c/0x94
[   47.204376]  __kmalloc_node_track_caller_noprof+0x210/0x470
[   47.209991]  kmalloc_track_caller_oob_right+0x1c4/0x548
[   47.215240]  kunit_try_run_case+0x22c/0x5a8
[   47.219482]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   47.225006]  kthread+0x464/0x810
[   47.228271]  ret_from_fork+0x14/0x20
[   47.231872] 
[   47.233367] The buggy address belongs to the object at cc78e800
[   47.233367]  which belongs to the cache kmalloc-128 of size 128
[   47.245269] The buggy address is located 0 bytes to the right of
[   47.245269]  allocated 120-byte region [cc78e800, cc78e878)
[   47.256896] 
[   47.258392] The buggy address belongs to the physical page:
[   47.264007] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   47.271270] flags: 0x0(zone=0)
[   47.274353] page_type: f5(slab)
[   47.277526] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   47.285675] raw: 00000000
[   47.288299] page dumped because: kasan: bad access detected
[   47.293914] 
[   47.295410] Memory state around the buggy address:
[   47.300231]  cc78e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   47.306793]  cc78e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.313385] >cc78e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.319946]                                                         ^
[   47.326416]  cc78e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.332977]  cc78e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.339569] ==================================================================
[   46.771270] ==================================================================
[   46.782745] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x4c0/0x548
[   46.790924] Write of size 1 at addr cc78e778 by task kunit_try_catch/194
[   46.797668] 
[   46.799163] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   46.799194] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   46.799194] Hardware name: Generic DRA74X (Flattened Device Tree)
[   46.799224] Call trace: 
[   46.799224]  unwind_backtrace from show_stack+0x18/0x1c
[   46.799255]  show_stack from dump_stack_lvl+0x70/0x90
[   46.799255]  dump_stack_lvl from print_report+0x158/0x528
[   46.799285]  print_report from kasan_report+0xdc/0x118
[   46.799316]  kasan_report from kmalloc_track_caller_oob_right+0x4c0/0x548
[   46.799346]  kmalloc_track_caller_oob_right from kunit_try_run_case+0x22c/0x5a8
[   46.799377]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.799407]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   46.799407]  kthread from ret_from_fork+0x14/0x20
[   46.799438] Exception stack(0xf21bbfb0 to 0xf21bbff8)
[   46.799438] bfa0:                                     00000000 00000000 00000000 00000000
[   46.799468] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   46.799468] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   46.799499] 
[   46.907501] Allocated by task 194:
[   46.910949]  kasan_save_track+0x30/0x5c
[   46.914794]  __kasan_kmalloc+0x8c/0x94
[   46.918579]  __kmalloc_node_track_caller_noprof+0x210/0x470
[   46.924194]  kmalloc_track_caller_oob_right+0x98/0x548
[   46.929382]  kunit_try_run_case+0x22c/0x5a8
[   46.933593]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   46.939117]  kthread+0x464/0x810
[   46.942382]  ret_from_fork+0x14/0x20
[   46.945983] 
[   46.947479] The buggy address belongs to the object at cc78e700
[   46.947479]  which belongs to the cache kmalloc-128 of size 128
[   46.959381] The buggy address is located 0 bytes to the right of
[   46.959381]  allocated 120-byte region [cc78e700, cc78e778)
[   46.971008] 
[   46.972503] The buggy address belongs to the physical page:
[   46.978118] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c78e
[   46.985382] flags: 0x0(zone=0)
[   46.988464] page_type: f5(slab)
[   46.991638] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   46.999786] raw: 00000000
[   47.002410] page dumped because: kasan: bad access detected
[   47.008026] 
[   47.009521] Memory state around the buggy address:
[   47.014343]  cc78e600: 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc fc
[   47.020904]  cc78e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.027496] >cc78e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   47.034057]                                                         ^
[   47.040527]  cc78e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.047119]  cc78e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.053680] ==================================================================