Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.993473] ================================================================== [ 31.994381] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 31.995847] Read of size 1 at addr fff00000c6112f80 by task kunit_try_catch/125 [ 31.997962] [ 31.999205] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 32.000069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.000787] Hardware name: linux,dummy-virt (DT) [ 32.003291] Call trace: [ 32.003676] show_stack+0x20/0x38 (C) [ 32.004124] dump_stack_lvl+0x8c/0xd0 [ 32.004555] print_report+0x118/0x5e0 [ 32.004959] kasan_report+0xc8/0x118 [ 32.005360] __asan_report_load1_noabort+0x20/0x30 [ 32.007137] kmalloc_oob_right+0x5d0/0x660 [ 32.008945] kunit_try_run_case+0x14c/0x3d0 [ 32.009593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.011551] kthread+0x24c/0x2d0 [ 32.012190] ret_from_fork+0x10/0x20 [ 32.013664] [ 32.014173] Allocated by task 125: [ 32.014914] kasan_save_stack+0x3c/0x68 [ 32.015659] kasan_save_track+0x20/0x40 [ 32.016288] kasan_save_alloc_info+0x40/0x58 [ 32.017071] __kasan_kmalloc+0xd4/0xd8 [ 32.017777] __kmalloc_cache_noprof+0x15c/0x3c8 [ 32.018549] kmalloc_oob_right+0xb0/0x660 [ 32.019177] kunit_try_run_case+0x14c/0x3d0 [ 32.019866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.020614] kthread+0x24c/0x2d0 [ 32.021292] ret_from_fork+0x10/0x20 [ 32.022019] [ 32.022485] The buggy address belongs to the object at fff00000c6112f00 [ 32.022485] which belongs to the cache kmalloc-128 of size 128 [ 32.024133] The buggy address is located 13 bytes to the right of [ 32.024133] allocated 115-byte region [fff00000c6112f00, fff00000c6112f73) [ 32.025699] [ 32.026028] The buggy address belongs to the physical page: [ 32.026961] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106112 [ 32.027923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.028914] page_type: f5(slab) [ 32.029336] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.030339] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.031271] page dumped because: kasan: bad access detected [ 32.031977] [ 32.032308] Memory state around the buggy address: [ 32.032899] fff00000c6112e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.033858] fff00000c6112f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.034702] >fff00000c6112f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.035596] ^ [ 32.036177] fff00000c6113000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 32.037041] fff00000c6113080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.037877] ================================================================== [ 31.886718] ================================================================== [ 31.888464] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 31.890863] Write of size 1 at addr fff00000c6112f73 by task kunit_try_catch/125 [ 31.892096] [ 31.894252] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241122 #1 [ 31.895840] Tainted: [N]=TEST [ 31.896569] Hardware name: linux,dummy-virt (DT) [ 31.897608] Call trace: [ 31.898899] show_stack+0x20/0x38 (C) [ 31.899915] dump_stack_lvl+0x8c/0xd0 [ 31.900921] print_report+0x118/0x5e0 [ 31.901469] kasan_report+0xc8/0x118 [ 31.902733] __asan_report_store1_noabort+0x20/0x30 [ 31.903955] kmalloc_oob_right+0x5a4/0x660 [ 31.905023] kunit_try_run_case+0x14c/0x3d0 [ 31.906226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.907064] kthread+0x24c/0x2d0 [ 31.907721] ret_from_fork+0x10/0x20 [ 31.908765] [ 31.909245] Allocated by task 125: [ 31.910177] kasan_save_stack+0x3c/0x68 [ 31.910846] kasan_save_track+0x20/0x40 [ 31.911722] kasan_save_alloc_info+0x40/0x58 [ 31.913160] __kasan_kmalloc+0xd4/0xd8 [ 31.913616] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.914101] kmalloc_oob_right+0xb0/0x660 [ 31.914659] kunit_try_run_case+0x14c/0x3d0 [ 31.915248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.916478] kthread+0x24c/0x2d0 [ 31.917579] ret_from_fork+0x10/0x20 [ 31.918419] [ 31.918991] The buggy address belongs to the object at fff00000c6112f00 [ 31.918991] which belongs to the cache kmalloc-128 of size 128 [ 31.921216] The buggy address is located 0 bytes to the right of [ 31.921216] allocated 115-byte region [fff00000c6112f00, fff00000c6112f73) [ 31.923966] [ 31.925017] The buggy address belongs to the physical page: [ 31.926267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106112 [ 31.927613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.929640] page_type: f5(slab) [ 31.930691] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.931668] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.933781] page dumped because: kasan: bad access detected [ 31.934896] [ 31.935104] Memory state around the buggy address: [ 31.935907] fff00000c6112e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.936710] fff00000c6112e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.937891] >fff00000c6112f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.939491] ^ [ 31.941131] fff00000c6112f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.941934] fff00000c6113000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 31.943384] ================================================================== [ 31.948075] ================================================================== [ 31.949270] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 31.949962] Write of size 1 at addr fff00000c6112f78 by task kunit_try_catch/125 [ 31.950911] [ 31.951289] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.953471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.954130] Hardware name: linux,dummy-virt (DT) [ 31.954733] Call trace: [ 31.955153] show_stack+0x20/0x38 (C) [ 31.955668] dump_stack_lvl+0x8c/0xd0 [ 31.956327] print_report+0x118/0x5e0 [ 31.956944] kasan_report+0xc8/0x118 [ 31.957950] __asan_report_store1_noabort+0x20/0x30 [ 31.958663] kmalloc_oob_right+0x538/0x660 [ 31.959299] kunit_try_run_case+0x14c/0x3d0 [ 31.960101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.961196] kthread+0x24c/0x2d0 [ 31.961951] ret_from_fork+0x10/0x20 [ 31.962512] [ 31.962797] Allocated by task 125: [ 31.963274] kasan_save_stack+0x3c/0x68 [ 31.964312] kasan_save_track+0x20/0x40 [ 31.965485] kasan_save_alloc_info+0x40/0x58 [ 31.966188] __kasan_kmalloc+0xd4/0xd8 [ 31.966794] __kmalloc_cache_noprof+0x15c/0x3c8 [ 31.967382] kmalloc_oob_right+0xb0/0x660 [ 31.968218] kunit_try_run_case+0x14c/0x3d0 [ 31.968698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.970605] kthread+0x24c/0x2d0 [ 31.971281] ret_from_fork+0x10/0x20 [ 31.972062] [ 31.972349] The buggy address belongs to the object at fff00000c6112f00 [ 31.972349] which belongs to the cache kmalloc-128 of size 128 [ 31.973718] The buggy address is located 5 bytes to the right of [ 31.973718] allocated 115-byte region [fff00000c6112f00, fff00000c6112f73) [ 31.975882] [ 31.976365] The buggy address belongs to the physical page: [ 31.977371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106112 [ 31.978419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.979356] page_type: f5(slab) [ 31.980051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.981375] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 31.982295] page dumped because: kasan: bad access detected [ 31.982981] [ 31.983298] Memory state around the buggy address: [ 31.984077] fff00000c6112e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.985337] fff00000c6112e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.986183] >fff00000c6112f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.987335] ^ [ 31.988252] fff00000c6112f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.989320] fff00000c6113000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 31.990366] ==================================================================
[ 23.700549] ================================================================== [ 23.702640] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 23.705725] Read of size 1 at addr ffff8881029fdf80 by task kunit_try_catch/144 [ 23.707587] [ 23.707771] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 23.708737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.709217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.710457] Call Trace: [ 23.711034] <TASK> [ 23.711219] dump_stack_lvl+0x73/0xb0 [ 23.712001] print_report+0xd1/0x640 [ 23.712672] ? __virt_addr_valid+0x1db/0x2d0 [ 23.713096] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.714076] kasan_report+0x102/0x140 [ 23.714667] ? kmalloc_oob_right+0x68c/0x7f0 [ 23.715292] ? kmalloc_oob_right+0x68c/0x7f0 [ 23.715941] __asan_report_load1_noabort+0x18/0x20 [ 23.716682] kmalloc_oob_right+0x68c/0x7f0 [ 23.717156] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 23.717552] ? __schedule+0xc3e/0x2790 [ 23.718428] ? __pfx_read_tsc+0x10/0x10 [ 23.718683] ? ktime_get_ts64+0x84/0x230 [ 23.719480] kunit_try_run_case+0x1b3/0x490 [ 23.720058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.720979] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.721428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.721886] ? __kthread_parkme+0x82/0x160 [ 23.723187] ? preempt_count_sub+0x50/0x80 [ 23.723599] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.724039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.724527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.725089] kthread+0x257/0x310 [ 23.725656] ? __pfx_kthread+0x10/0x10 [ 23.726027] ret_from_fork+0x41/0x80 [ 23.726515] ? __pfx_kthread+0x10/0x10 [ 23.726953] ret_from_fork_asm+0x1a/0x30 [ 23.727510] </TASK> [ 23.727748] [ 23.728035] Allocated by task 144: [ 23.728328] kasan_save_stack+0x3d/0x60 [ 23.728740] kasan_save_track+0x18/0x40 [ 23.729158] kasan_save_alloc_info+0x3b/0x50 [ 23.729725] __kasan_kmalloc+0xb7/0xc0 [ 23.730238] __kmalloc_cache_noprof+0x184/0x410 [ 23.730637] kmalloc_oob_right+0xaa/0x7f0 [ 23.731169] kunit_try_run_case+0x1b3/0x490 [ 23.731492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.732993] kthread+0x257/0x310 [ 23.733215] ret_from_fork+0x41/0x80 [ 23.733707] ret_from_fork_asm+0x1a/0x30 [ 23.734189] [ 23.734451] The buggy address belongs to the object at ffff8881029fdf00 [ 23.734451] which belongs to the cache kmalloc-128 of size 128 [ 23.735517] The buggy address is located 13 bytes to the right of [ 23.735517] allocated 115-byte region [ffff8881029fdf00, ffff8881029fdf73) [ 23.736490] [ 23.736647] The buggy address belongs to the physical page: [ 23.737096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fd [ 23.737853] flags: 0x200000000000000(node=0|zone=2) [ 23.738410] page_type: f5(slab) [ 23.738847] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.739667] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.740620] page dumped because: kasan: bad access detected [ 23.741294] [ 23.741523] Memory state around the buggy address: [ 23.742026] ffff8881029fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.742761] ffff8881029fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.743475] >ffff8881029fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.744167] ^ [ 23.744599] ffff8881029fe000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.745374] ffff8881029fe080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.745797] ================================================================== [ 23.666292] ================================================================== [ 23.666927] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 23.667639] Write of size 1 at addr ffff8881029fdf78 by task kunit_try_catch/144 [ 23.668192] [ 23.668449] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 23.669140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.669699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.670348] Call Trace: [ 23.670661] <TASK> [ 23.670929] dump_stack_lvl+0x73/0xb0 [ 23.671350] print_report+0xd1/0x640 [ 23.671806] ? __virt_addr_valid+0x1db/0x2d0 [ 23.672192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.672712] kasan_report+0x102/0x140 [ 23.673097] ? kmalloc_oob_right+0x6bf/0x7f0 [ 23.673592] ? kmalloc_oob_right+0x6bf/0x7f0 [ 23.674109] __asan_report_store1_noabort+0x1b/0x30 [ 23.674777] kmalloc_oob_right+0x6bf/0x7f0 [ 23.675250] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 23.675702] ? __schedule+0xc3e/0x2790 [ 23.676104] ? __pfx_read_tsc+0x10/0x10 [ 23.676681] ? ktime_get_ts64+0x84/0x230 [ 23.677077] kunit_try_run_case+0x1b3/0x490 [ 23.677656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.677995] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.678366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.678890] ? __kthread_parkme+0x82/0x160 [ 23.679380] ? preempt_count_sub+0x50/0x80 [ 23.679897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.680384] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.680797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.681404] kthread+0x257/0x310 [ 23.681768] ? __pfx_kthread+0x10/0x10 [ 23.682066] ret_from_fork+0x41/0x80 [ 23.682366] ? __pfx_kthread+0x10/0x10 [ 23.682843] ret_from_fork_asm+0x1a/0x30 [ 23.683343] </TASK> [ 23.683656] [ 23.683887] Allocated by task 144: [ 23.684274] kasan_save_stack+0x3d/0x60 [ 23.684693] kasan_save_track+0x18/0x40 [ 23.685023] kasan_save_alloc_info+0x3b/0x50 [ 23.685306] __kasan_kmalloc+0xb7/0xc0 [ 23.685731] __kmalloc_cache_noprof+0x184/0x410 [ 23.686261] kmalloc_oob_right+0xaa/0x7f0 [ 23.686705] kunit_try_run_case+0x1b3/0x490 [ 23.687091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.687613] kthread+0x257/0x310 [ 23.688113] ret_from_fork+0x41/0x80 [ 23.688603] ret_from_fork_asm+0x1a/0x30 [ 23.688992] [ 23.689191] The buggy address belongs to the object at ffff8881029fdf00 [ 23.689191] which belongs to the cache kmalloc-128 of size 128 [ 23.689927] The buggy address is located 5 bytes to the right of [ 23.689927] allocated 115-byte region [ffff8881029fdf00, ffff8881029fdf73) [ 23.690992] [ 23.691241] The buggy address belongs to the physical page: [ 23.691952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fd [ 23.692688] flags: 0x200000000000000(node=0|zone=2) [ 23.693219] page_type: f5(slab) [ 23.693606] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.694217] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.694689] page dumped because: kasan: bad access detected [ 23.695252] [ 23.695492] Memory state around the buggy address: [ 23.695975] ffff8881029fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.696752] ffff8881029fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.697390] >ffff8881029fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.697811] ^ [ 23.698579] ffff8881029fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.699076] ffff8881029fe000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.699521] ================================================================== [ 23.617193] ================================================================== [ 23.618651] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 23.619910] Write of size 1 at addr ffff8881029fdf73 by task kunit_try_catch/144 [ 23.620930] [ 23.622687] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241122 #1 [ 23.623661] Tainted: [N]=TEST [ 23.624022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.625302] Call Trace: [ 23.625751] <TASK> [ 23.626443] dump_stack_lvl+0x73/0xb0 [ 23.627081] print_report+0xd1/0x640 [ 23.627498] ? __virt_addr_valid+0x1db/0x2d0 [ 23.627944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.628503] kasan_report+0x102/0x140 [ 23.628788] ? kmalloc_oob_right+0x6f2/0x7f0 [ 23.629215] ? kmalloc_oob_right+0x6f2/0x7f0 [ 23.629567] __asan_report_store1_noabort+0x1b/0x30 [ 23.630149] kmalloc_oob_right+0x6f2/0x7f0 [ 23.630645] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 23.631034] ? __schedule+0xc3e/0x2790 [ 23.631401] ? __pfx_read_tsc+0x10/0x10 [ 23.631734] ? ktime_get_ts64+0x84/0x230 [ 23.632074] kunit_try_run_case+0x1b3/0x490 [ 23.632562] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.633058] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.633364] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.633673] ? __kthread_parkme+0x82/0x160 [ 23.634209] ? preempt_count_sub+0x50/0x80 [ 23.634780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.635286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.635844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.636227] kthread+0x257/0x310 [ 23.636611] ? __pfx_kthread+0x10/0x10 [ 23.637019] ret_from_fork+0x41/0x80 [ 23.637493] ? __pfx_kthread+0x10/0x10 [ 23.637780] ret_from_fork_asm+0x1a/0x30 [ 23.638343] </TASK> [ 23.638799] [ 23.640135] Allocated by task 144: [ 23.640942] kasan_save_stack+0x3d/0x60 [ 23.641319] kasan_save_track+0x18/0x40 [ 23.641678] kasan_save_alloc_info+0x3b/0x50 [ 23.642361] __kasan_kmalloc+0xb7/0xc0 [ 23.642637] __kmalloc_cache_noprof+0x184/0x410 [ 23.643487] kmalloc_oob_right+0xaa/0x7f0 [ 23.643903] kunit_try_run_case+0x1b3/0x490 [ 23.645106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.645848] kthread+0x257/0x310 [ 23.646143] ret_from_fork+0x41/0x80 [ 23.646623] ret_from_fork_asm+0x1a/0x30 [ 23.647458] [ 23.647977] The buggy address belongs to the object at ffff8881029fdf00 [ 23.647977] which belongs to the cache kmalloc-128 of size 128 [ 23.648767] The buggy address is located 0 bytes to the right of [ 23.648767] allocated 115-byte region [ffff8881029fdf00, ffff8881029fdf73) [ 23.650497] [ 23.651006] The buggy address belongs to the physical page: [ 23.651975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fd [ 23.653211] flags: 0x200000000000000(node=0|zone=2) [ 23.654812] page_type: f5(slab) [ 23.656105] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.656851] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 23.657605] page dumped because: kasan: bad access detected [ 23.658126] [ 23.658407] Memory state around the buggy address: [ 23.659686] ffff8881029fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.660324] ffff8881029fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.660899] >ffff8881029fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.661753] ^ [ 23.662346] ffff8881029fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.662911] ffff8881029fe000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.663739] ==================================================================