Hay
Date
Nov. 20, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   35.359921] ==================================================================
[   35.361524] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   35.363675] Write of size 1 at addr fff00000c1bea573 by task kunit_try_catch/125
[   35.364499] 
[   35.366419] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241120 #1
[   35.367784] Tainted: [N]=TEST
[   35.368255] Hardware name: linux,dummy-virt (DT)
[   35.369497] Call trace:
[   35.370295]  show_stack+0x20/0x38 (C)
[   35.371148]  dump_stack_lvl+0x8c/0xd0
[   35.371705]  print_report+0x118/0x5e0
[   35.372339]  kasan_report+0xc8/0x118
[   35.372950]  __asan_report_store1_noabort+0x20/0x30
[   35.373888]  kmalloc_oob_right+0x5a4/0x660
[   35.374424]  kunit_try_run_case+0x14c/0x3d0
[   35.375068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.375816]  kthread+0x24c/0x2d0
[   35.376371]  ret_from_fork+0x10/0x20
[   35.377462] 
[   35.377892] Allocated by task 125:
[   35.378748]  kasan_save_stack+0x3c/0x68
[   35.379460]  kasan_save_track+0x20/0x40
[   35.379896]  kasan_save_alloc_info+0x40/0x58
[   35.380326]  __kasan_kmalloc+0xd4/0xd8
[   35.380775]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.381452]  kmalloc_oob_right+0xb0/0x660
[   35.382144]  kunit_try_run_case+0x14c/0x3d0
[   35.382771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.383494]  kthread+0x24c/0x2d0
[   35.384023]  ret_from_fork+0x10/0x20
[   35.384805] 
[   35.385389] The buggy address belongs to the object at fff00000c1bea500
[   35.385389]  which belongs to the cache kmalloc-128 of size 128
[   35.387195] The buggy address is located 0 bytes to the right of
[   35.387195]  allocated 115-byte region [fff00000c1bea500, fff00000c1bea573)
[   35.388531] 
[   35.389173] The buggy address belongs to the physical page:
[   35.390656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bea
[   35.391841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.393079] page_type: f5(slab)
[   35.394575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.395321] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.396311] page dumped because: kasan: bad access detected
[   35.396967] 
[   35.397325] Memory state around the buggy address:
[   35.398430]  fff00000c1bea400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   35.399312]  fff00000c1bea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.401657] >fff00000c1bea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.402507]                                                              ^
[   35.403385]  fff00000c1bea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.404112]  fff00000c1bea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.404943] ==================================================================
[   35.409275] ==================================================================
[   35.410088] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   35.410862] Write of size 1 at addr fff00000c1bea578 by task kunit_try_catch/125
[   35.412724] 
[   35.412979] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.414304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.414750] Hardware name: linux,dummy-virt (DT)
[   35.415328] Call trace:
[   35.415766]  show_stack+0x20/0x38 (C)
[   35.416383]  dump_stack_lvl+0x8c/0xd0
[   35.416917]  print_report+0x118/0x5e0
[   35.417841]  kasan_report+0xc8/0x118
[   35.418338]  __asan_report_store1_noabort+0x20/0x30
[   35.418974]  kmalloc_oob_right+0x538/0x660
[   35.419461]  kunit_try_run_case+0x14c/0x3d0
[   35.420064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.420794]  kthread+0x24c/0x2d0
[   35.421287]  ret_from_fork+0x10/0x20
[   35.421805] 
[   35.422118] Allocated by task 125:
[   35.422576]  kasan_save_stack+0x3c/0x68
[   35.423096]  kasan_save_track+0x20/0x40
[   35.424059]  kasan_save_alloc_info+0x40/0x58
[   35.424697]  __kasan_kmalloc+0xd4/0xd8
[   35.425135]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.426177]  kmalloc_oob_right+0xb0/0x660
[   35.426700]  kunit_try_run_case+0x14c/0x3d0
[   35.427261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.427901]  kthread+0x24c/0x2d0
[   35.428426]  ret_from_fork+0x10/0x20
[   35.428929] 
[   35.429648] The buggy address belongs to the object at fff00000c1bea500
[   35.429648]  which belongs to the cache kmalloc-128 of size 128
[   35.430847] The buggy address is located 5 bytes to the right of
[   35.430847]  allocated 115-byte region [fff00000c1bea500, fff00000c1bea573)
[   35.432748] 
[   35.433086] The buggy address belongs to the physical page:
[   35.433813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bea
[   35.434701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.435598] page_type: f5(slab)
[   35.435967] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.436894] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.437604] page dumped because: kasan: bad access detected
[   35.438276] 
[   35.438644] Memory state around the buggy address:
[   35.439217]  fff00000c1bea400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   35.440097]  fff00000c1bea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.440818] >fff00000c1bea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.442000]                                                                 ^
[   35.442714]  fff00000c1bea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.443554]  fff00000c1bea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.444223] ==================================================================
[   35.447224] ==================================================================
[   35.447932] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   35.448648] Read of size 1 at addr fff00000c1bea580 by task kunit_try_catch/125
[   35.449852] 
[   35.450237] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   35.451480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.452106] Hardware name: linux,dummy-virt (DT)
[   35.452817] Call trace:
[   35.453295]  show_stack+0x20/0x38 (C)
[   35.454048]  dump_stack_lvl+0x8c/0xd0
[   35.454622]  print_report+0x118/0x5e0
[   35.455341]  kasan_report+0xc8/0x118
[   35.455978]  __asan_report_load1_noabort+0x20/0x30
[   35.456641]  kmalloc_oob_right+0x5d0/0x660
[   35.457181]  kunit_try_run_case+0x14c/0x3d0
[   35.458149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.458806]  kthread+0x24c/0x2d0
[   35.459321]  ret_from_fork+0x10/0x20
[   35.459951] 
[   35.460268] Allocated by task 125:
[   35.460928]  kasan_save_stack+0x3c/0x68
[   35.461813]  kasan_save_track+0x20/0x40
[   35.462411]  kasan_save_alloc_info+0x40/0x58
[   35.463077]  __kasan_kmalloc+0xd4/0xd8
[   35.463590]  __kmalloc_cache_noprof+0x15c/0x3c8
[   35.464209]  kmalloc_oob_right+0xb0/0x660
[   35.464605]  kunit_try_run_case+0x14c/0x3d0
[   35.465196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.466122]  kthread+0x24c/0x2d0
[   35.466604]  ret_from_fork+0x10/0x20
[   35.467152] 
[   35.467511] The buggy address belongs to the object at fff00000c1bea500
[   35.467511]  which belongs to the cache kmalloc-128 of size 128
[   35.468655] The buggy address is located 13 bytes to the right of
[   35.468655]  allocated 115-byte region [fff00000c1bea500, fff00000c1bea573)
[   35.469980] 
[   35.470629] The buggy address belongs to the physical page:
[   35.471311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bea
[   35.471930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.472528] page_type: f5(slab)
[   35.473822] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   35.474600] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   35.475354] page dumped because: kasan: bad access detected
[   35.476037] 
[   35.476371] Memory state around the buggy address:
[   35.476917]  fff00000c1bea480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.478200]  fff00000c1bea500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.479085] >fff00000c1bea580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.479714]                    ^
[   35.480204]  fff00000c1bea600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.481025]  fff00000c1bea680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.482174] ==================================================================

[   26.569274] ==================================================================
[   26.570367] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   26.571561] Write of size 1 at addr ffff888101abf673 by task kunit_try_catch/143
[   26.572293] 
[   26.573852] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241120 #1
[   26.574845] Tainted: [N]=TEST
[   26.575190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.576397] Call Trace:
[   26.576780]  <TASK>
[   26.577224]  dump_stack_lvl+0x73/0xb0
[   26.577834]  print_report+0xd1/0x640
[   26.578176]  ? __virt_addr_valid+0x1db/0x2d0
[   26.578647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.579064]  kasan_report+0x102/0x140
[   26.579498]  ? kmalloc_oob_right+0x6f2/0x7f0
[   26.579992]  ? kmalloc_oob_right+0x6f2/0x7f0
[   26.580421]  __asan_report_store1_noabort+0x1b/0x30
[   26.580783]  kmalloc_oob_right+0x6f2/0x7f0
[   26.581274]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   26.581807]  ? __schedule+0xc3e/0x2790
[   26.582183]  ? __pfx_read_tsc+0x10/0x10
[   26.582464]  ? ktime_get_ts64+0x84/0x230
[   26.582975]  kunit_try_run_case+0x1b3/0x490
[   26.583604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.583960]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.584484]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.585014]  ? __kthread_parkme+0x82/0x160
[   26.585310]  ? preempt_count_sub+0x50/0x80
[   26.585737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.586263]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.586892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.587347]  kthread+0x257/0x310
[   26.587780]  ? __pfx_kthread+0x10/0x10
[   26.588065]  ret_from_fork+0x41/0x80
[   26.588463]  ? __pfx_kthread+0x10/0x10
[   26.588943]  ret_from_fork_asm+0x1a/0x30
[   26.589325]  </TASK>
[   26.589869] 
[   26.590198] Allocated by task 143:
[   26.590775]  kasan_save_stack+0x3d/0x60
[   26.591300]  kasan_save_track+0x18/0x40
[   26.591836]  kasan_save_alloc_info+0x3b/0x50
[   26.592214]  __kasan_kmalloc+0xb7/0xc0
[   26.592503]  __kmalloc_cache_noprof+0x184/0x410
[   26.592831]  kmalloc_oob_right+0xaa/0x7f0
[   26.593491]  kunit_try_run_case+0x1b3/0x490
[   26.594098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.594467]  kthread+0x257/0x310
[   26.594809]  ret_from_fork+0x41/0x80
[   26.595312]  ret_from_fork_asm+0x1a/0x30
[   26.595818] 
[   26.596175] The buggy address belongs to the object at ffff888101abf600
[   26.596175]  which belongs to the cache kmalloc-128 of size 128
[   26.597186] The buggy address is located 0 bytes to the right of
[   26.597186]  allocated 115-byte region [ffff888101abf600, ffff888101abf673)
[   26.598281] 
[   26.598716] The buggy address belongs to the physical page:
[   26.599633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abf
[   26.602029] flags: 0x200000000000000(node=0|zone=2)
[   26.603267] page_type: f5(slab)
[   26.604528] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.605965] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.607557] page dumped because: kasan: bad access detected
[   26.608111] 
[   26.608347] Memory state around the buggy address:
[   26.610261]  ffff888101abf500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.611332]  ffff888101abf580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.612268] >ffff888101abf600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.613007]                                                              ^
[   26.614292]  ffff888101abf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.615169]  ffff888101abf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.616011] ==================================================================
[   26.618593] ==================================================================
[   26.620921] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   26.621479] Write of size 1 at addr ffff888101abf678 by task kunit_try_catch/143
[   26.623213] 
[   26.623494] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   26.624491] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.625048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.625823] Call Trace:
[   26.626148]  <TASK>
[   26.626445]  dump_stack_lvl+0x73/0xb0
[   26.626845]  print_report+0xd1/0x640
[   26.627177]  ? __virt_addr_valid+0x1db/0x2d0
[   26.627778]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.628153]  kasan_report+0x102/0x140
[   26.628660]  ? kmalloc_oob_right+0x6bf/0x7f0
[   26.629043]  ? kmalloc_oob_right+0x6bf/0x7f0
[   26.629571]  __asan_report_store1_noabort+0x1b/0x30
[   26.630080]  kmalloc_oob_right+0x6bf/0x7f0
[   26.630656]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   26.631068]  ? __schedule+0xc3e/0x2790
[   26.631576]  ? __pfx_read_tsc+0x10/0x10
[   26.632013]  ? ktime_get_ts64+0x84/0x230
[   26.632544]  kunit_try_run_case+0x1b3/0x490
[   26.633003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.633389]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.634025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.634657]  ? __kthread_parkme+0x82/0x160
[   26.635132]  ? preempt_count_sub+0x50/0x80
[   26.635750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.636199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.636869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.637424]  kthread+0x257/0x310
[   26.637887]  ? __pfx_kthread+0x10/0x10
[   26.638384]  ret_from_fork+0x41/0x80
[   26.638895]  ? __pfx_kthread+0x10/0x10
[   26.639354]  ret_from_fork_asm+0x1a/0x30
[   26.639948]  </TASK>
[   26.640276] 
[   26.640531] Allocated by task 143:
[   26.641001]  kasan_save_stack+0x3d/0x60
[   26.641469]  kasan_save_track+0x18/0x40
[   26.641925]  kasan_save_alloc_info+0x3b/0x50
[   26.642285]  __kasan_kmalloc+0xb7/0xc0
[   26.642820]  __kmalloc_cache_noprof+0x184/0x410
[   26.643278]  kmalloc_oob_right+0xaa/0x7f0
[   26.643862]  kunit_try_run_case+0x1b3/0x490
[   26.644240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.644901]  kthread+0x257/0x310
[   26.645311]  ret_from_fork+0x41/0x80
[   26.645722]  ret_from_fork_asm+0x1a/0x30
[   26.646228] 
[   26.646493] The buggy address belongs to the object at ffff888101abf600
[   26.646493]  which belongs to the cache kmalloc-128 of size 128
[   26.647656] The buggy address is located 5 bytes to the right of
[   26.647656]  allocated 115-byte region [ffff888101abf600, ffff888101abf673)
[   26.648855] 
[   26.649098] The buggy address belongs to the physical page:
[   26.649708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abf
[   26.650389] flags: 0x200000000000000(node=0|zone=2)
[   26.650946] page_type: f5(slab)
[   26.651373] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.652111] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.652905] page dumped because: kasan: bad access detected
[   26.653337] 
[   26.653652] Memory state around the buggy address:
[   26.654120]  ffff888101abf500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.654746]  ffff888101abf580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.655382] >ffff888101abf600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.656081]                                                                 ^
[   26.656767]  ffff888101abf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.657408]  ffff888101abf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.658079] ==================================================================
[   26.659345] ==================================================================
[   26.659794] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   26.660484] Read of size 1 at addr ffff888101abf680 by task kunit_try_catch/143
[   26.661301] 
[   26.661548] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241120 #1
[   26.662649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.662996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.664352] Call Trace:
[   26.664722]  <TASK>
[   26.664912]  dump_stack_lvl+0x73/0xb0
[   26.665410]  print_report+0xd1/0x640
[   26.665880]  ? __virt_addr_valid+0x1db/0x2d0
[   26.666203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.666930]  kasan_report+0x102/0x140
[   26.667465]  ? kmalloc_oob_right+0x68c/0x7f0
[   26.668084]  ? kmalloc_oob_right+0x68c/0x7f0
[   26.668486]  __asan_report_load1_noabort+0x18/0x20
[   26.669076]  kmalloc_oob_right+0x68c/0x7f0
[   26.669402]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   26.670083]  ? __schedule+0xc3e/0x2790
[   26.670493]  ? __pfx_read_tsc+0x10/0x10
[   26.670988]  ? ktime_get_ts64+0x84/0x230
[   26.671478]  kunit_try_run_case+0x1b3/0x490
[   26.671874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.672484]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.672992]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.673642]  ? __kthread_parkme+0x82/0x160
[   26.673973]  ? preempt_count_sub+0x50/0x80
[   26.674508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.675100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.675761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.676398]  kthread+0x257/0x310
[   26.676839]  ? __pfx_kthread+0x10/0x10
[   26.677280]  ret_from_fork+0x41/0x80
[   26.677800]  ? __pfx_kthread+0x10/0x10
[   26.678114]  ret_from_fork_asm+0x1a/0x30
[   26.678766]  </TASK>
[   26.679005] 
[   26.679156] Allocated by task 143:
[   26.679721]  kasan_save_stack+0x3d/0x60
[   26.680096]  kasan_save_track+0x18/0x40
[   26.680561]  kasan_save_alloc_info+0x3b/0x50
[   26.681094]  __kasan_kmalloc+0xb7/0xc0
[   26.681506]  __kmalloc_cache_noprof+0x184/0x410
[   26.681974]  kmalloc_oob_right+0xaa/0x7f0
[   26.682579]  kunit_try_run_case+0x1b3/0x490
[   26.683199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.683778]  kthread+0x257/0x310
[   26.684095]  ret_from_fork+0x41/0x80
[   26.684511]  ret_from_fork_asm+0x1a/0x30
[   26.685027] 
[   26.685280] The buggy address belongs to the object at ffff888101abf600
[   26.685280]  which belongs to the cache kmalloc-128 of size 128
[   26.686273] The buggy address is located 13 bytes to the right of
[   26.686273]  allocated 115-byte region [ffff888101abf600, ffff888101abf673)
[   26.687458] 
[   26.687797] The buggy address belongs to the physical page:
[   26.688172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abf
[   26.689030] flags: 0x200000000000000(node=0|zone=2)
[   26.689385] page_type: f5(slab)
[   26.689916] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.690634] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   26.691404] page dumped because: kasan: bad access detected
[   26.691937] 
[   26.692233] Memory state around the buggy address:
[   26.692805]  ffff888101abf580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.693816]  ffff888101abf600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.694443] >ffff888101abf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.695182]                    ^
[   26.695430]  ffff888101abf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.696261]  ffff888101abf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.696846] ==================================================================