Hay
Date
Nov. 22, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.993473] ==================================================================
[   31.994381] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   31.995847] Read of size 1 at addr fff00000c6112f80 by task kunit_try_catch/125
[   31.997962] 
[   31.999205] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   32.000069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.000787] Hardware name: linux,dummy-virt (DT)
[   32.003291] Call trace:
[   32.003676]  show_stack+0x20/0x38 (C)
[   32.004124]  dump_stack_lvl+0x8c/0xd0
[   32.004555]  print_report+0x118/0x5e0
[   32.004959]  kasan_report+0xc8/0x118
[   32.005360]  __asan_report_load1_noabort+0x20/0x30
[   32.007137]  kmalloc_oob_right+0x5d0/0x660
[   32.008945]  kunit_try_run_case+0x14c/0x3d0
[   32.009593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.011551]  kthread+0x24c/0x2d0
[   32.012190]  ret_from_fork+0x10/0x20
[   32.013664] 
[   32.014173] Allocated by task 125:
[   32.014914]  kasan_save_stack+0x3c/0x68
[   32.015659]  kasan_save_track+0x20/0x40
[   32.016288]  kasan_save_alloc_info+0x40/0x58
[   32.017071]  __kasan_kmalloc+0xd4/0xd8
[   32.017777]  __kmalloc_cache_noprof+0x15c/0x3c8
[   32.018549]  kmalloc_oob_right+0xb0/0x660
[   32.019177]  kunit_try_run_case+0x14c/0x3d0
[   32.019866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.020614]  kthread+0x24c/0x2d0
[   32.021292]  ret_from_fork+0x10/0x20
[   32.022019] 
[   32.022485] The buggy address belongs to the object at fff00000c6112f00
[   32.022485]  which belongs to the cache kmalloc-128 of size 128
[   32.024133] The buggy address is located 13 bytes to the right of
[   32.024133]  allocated 115-byte region [fff00000c6112f00, fff00000c6112f73)
[   32.025699] 
[   32.026028] The buggy address belongs to the physical page:
[   32.026961] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106112
[   32.027923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.028914] page_type: f5(slab)
[   32.029336] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.030339] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   32.031271] page dumped because: kasan: bad access detected
[   32.031977] 
[   32.032308] Memory state around the buggy address:
[   32.032899]  fff00000c6112e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.033858]  fff00000c6112f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   32.034702] >fff00000c6112f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.035596]                    ^
[   32.036177]  fff00000c6113000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   32.037041]  fff00000c6113080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   32.037877] ==================================================================
[   31.886718] ==================================================================
[   31.888464] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   31.890863] Write of size 1 at addr fff00000c6112f73 by task kunit_try_catch/125
[   31.892096] 
[   31.894252] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241122 #1
[   31.895840] Tainted: [N]=TEST
[   31.896569] Hardware name: linux,dummy-virt (DT)
[   31.897608] Call trace:
[   31.898899]  show_stack+0x20/0x38 (C)
[   31.899915]  dump_stack_lvl+0x8c/0xd0
[   31.900921]  print_report+0x118/0x5e0
[   31.901469]  kasan_report+0xc8/0x118
[   31.902733]  __asan_report_store1_noabort+0x20/0x30
[   31.903955]  kmalloc_oob_right+0x5a4/0x660
[   31.905023]  kunit_try_run_case+0x14c/0x3d0
[   31.906226]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.907064]  kthread+0x24c/0x2d0
[   31.907721]  ret_from_fork+0x10/0x20
[   31.908765] 
[   31.909245] Allocated by task 125:
[   31.910177]  kasan_save_stack+0x3c/0x68
[   31.910846]  kasan_save_track+0x20/0x40
[   31.911722]  kasan_save_alloc_info+0x40/0x58
[   31.913160]  __kasan_kmalloc+0xd4/0xd8
[   31.913616]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.914101]  kmalloc_oob_right+0xb0/0x660
[   31.914659]  kunit_try_run_case+0x14c/0x3d0
[   31.915248]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.916478]  kthread+0x24c/0x2d0
[   31.917579]  ret_from_fork+0x10/0x20
[   31.918419] 
[   31.918991] The buggy address belongs to the object at fff00000c6112f00
[   31.918991]  which belongs to the cache kmalloc-128 of size 128
[   31.921216] The buggy address is located 0 bytes to the right of
[   31.921216]  allocated 115-byte region [fff00000c6112f00, fff00000c6112f73)
[   31.923966] 
[   31.925017] The buggy address belongs to the physical page:
[   31.926267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106112
[   31.927613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.929640] page_type: f5(slab)
[   31.930691] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.931668] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.933781] page dumped because: kasan: bad access detected
[   31.934896] 
[   31.935104] Memory state around the buggy address:
[   31.935907]  fff00000c6112e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.936710]  fff00000c6112e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.937891] >fff00000c6112f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.939491]                                                              ^
[   31.941131]  fff00000c6112f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.941934]  fff00000c6113000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   31.943384] ==================================================================
[   31.948075] ==================================================================
[   31.949270] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   31.949962] Write of size 1 at addr fff00000c6112f78 by task kunit_try_catch/125
[   31.950911] 
[   31.951289] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   31.953471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.954130] Hardware name: linux,dummy-virt (DT)
[   31.954733] Call trace:
[   31.955153]  show_stack+0x20/0x38 (C)
[   31.955668]  dump_stack_lvl+0x8c/0xd0
[   31.956327]  print_report+0x118/0x5e0
[   31.956944]  kasan_report+0xc8/0x118
[   31.957950]  __asan_report_store1_noabort+0x20/0x30
[   31.958663]  kmalloc_oob_right+0x538/0x660
[   31.959299]  kunit_try_run_case+0x14c/0x3d0
[   31.960101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.961196]  kthread+0x24c/0x2d0
[   31.961951]  ret_from_fork+0x10/0x20
[   31.962512] 
[   31.962797] Allocated by task 125:
[   31.963274]  kasan_save_stack+0x3c/0x68
[   31.964312]  kasan_save_track+0x20/0x40
[   31.965485]  kasan_save_alloc_info+0x40/0x58
[   31.966188]  __kasan_kmalloc+0xd4/0xd8
[   31.966794]  __kmalloc_cache_noprof+0x15c/0x3c8
[   31.967382]  kmalloc_oob_right+0xb0/0x660
[   31.968218]  kunit_try_run_case+0x14c/0x3d0
[   31.968698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.970605]  kthread+0x24c/0x2d0
[   31.971281]  ret_from_fork+0x10/0x20
[   31.972062] 
[   31.972349] The buggy address belongs to the object at fff00000c6112f00
[   31.972349]  which belongs to the cache kmalloc-128 of size 128
[   31.973718] The buggy address is located 5 bytes to the right of
[   31.973718]  allocated 115-byte region [fff00000c6112f00, fff00000c6112f73)
[   31.975882] 
[   31.976365] The buggy address belongs to the physical page:
[   31.977371] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106112
[   31.978419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.979356] page_type: f5(slab)
[   31.980051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.981375] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   31.982295] page dumped because: kasan: bad access detected
[   31.982981] 
[   31.983298] Memory state around the buggy address:
[   31.984077]  fff00000c6112e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.985337]  fff00000c6112e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.986183] >fff00000c6112f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   31.987335]                                                                 ^
[   31.988252]  fff00000c6112f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.989320]  fff00000c6113000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc
[   31.990366] ==================================================================

[   23.700549] ==================================================================
[   23.702640] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   23.705725] Read of size 1 at addr ffff8881029fdf80 by task kunit_try_catch/144
[   23.707587] 
[   23.707771] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   23.708737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.709217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.710457] Call Trace:
[   23.711034]  <TASK>
[   23.711219]  dump_stack_lvl+0x73/0xb0
[   23.712001]  print_report+0xd1/0x640
[   23.712672]  ? __virt_addr_valid+0x1db/0x2d0
[   23.713096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.714076]  kasan_report+0x102/0x140
[   23.714667]  ? kmalloc_oob_right+0x68c/0x7f0
[   23.715292]  ? kmalloc_oob_right+0x68c/0x7f0
[   23.715941]  __asan_report_load1_noabort+0x18/0x20
[   23.716682]  kmalloc_oob_right+0x68c/0x7f0
[   23.717156]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.717552]  ? __schedule+0xc3e/0x2790
[   23.718428]  ? __pfx_read_tsc+0x10/0x10
[   23.718683]  ? ktime_get_ts64+0x84/0x230
[   23.719480]  kunit_try_run_case+0x1b3/0x490
[   23.720058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.720979]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.721428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.721886]  ? __kthread_parkme+0x82/0x160
[   23.723187]  ? preempt_count_sub+0x50/0x80
[   23.723599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.724039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.724527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.725089]  kthread+0x257/0x310
[   23.725656]  ? __pfx_kthread+0x10/0x10
[   23.726027]  ret_from_fork+0x41/0x80
[   23.726515]  ? __pfx_kthread+0x10/0x10
[   23.726953]  ret_from_fork_asm+0x1a/0x30
[   23.727510]  </TASK>
[   23.727748] 
[   23.728035] Allocated by task 144:
[   23.728328]  kasan_save_stack+0x3d/0x60
[   23.728740]  kasan_save_track+0x18/0x40
[   23.729158]  kasan_save_alloc_info+0x3b/0x50
[   23.729725]  __kasan_kmalloc+0xb7/0xc0
[   23.730238]  __kmalloc_cache_noprof+0x184/0x410
[   23.730637]  kmalloc_oob_right+0xaa/0x7f0
[   23.731169]  kunit_try_run_case+0x1b3/0x490
[   23.731492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.732993]  kthread+0x257/0x310
[   23.733215]  ret_from_fork+0x41/0x80
[   23.733707]  ret_from_fork_asm+0x1a/0x30
[   23.734189] 
[   23.734451] The buggy address belongs to the object at ffff8881029fdf00
[   23.734451]  which belongs to the cache kmalloc-128 of size 128
[   23.735517] The buggy address is located 13 bytes to the right of
[   23.735517]  allocated 115-byte region [ffff8881029fdf00, ffff8881029fdf73)
[   23.736490] 
[   23.736647] The buggy address belongs to the physical page:
[   23.737096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fd
[   23.737853] flags: 0x200000000000000(node=0|zone=2)
[   23.738410] page_type: f5(slab)
[   23.738847] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.739667] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.740620] page dumped because: kasan: bad access detected
[   23.741294] 
[   23.741523] Memory state around the buggy address:
[   23.742026]  ffff8881029fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.742761]  ffff8881029fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.743475] >ffff8881029fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.744167]                    ^
[   23.744599]  ffff8881029fe000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.745374]  ffff8881029fe080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.745797] ==================================================================
[   23.666292] ==================================================================
[   23.666927] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   23.667639] Write of size 1 at addr ffff8881029fdf78 by task kunit_try_catch/144
[   23.668192] 
[   23.668449] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.12.0-next-20241122 #1
[   23.669140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.669699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.670348] Call Trace:
[   23.670661]  <TASK>
[   23.670929]  dump_stack_lvl+0x73/0xb0
[   23.671350]  print_report+0xd1/0x640
[   23.671806]  ? __virt_addr_valid+0x1db/0x2d0
[   23.672192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.672712]  kasan_report+0x102/0x140
[   23.673097]  ? kmalloc_oob_right+0x6bf/0x7f0
[   23.673592]  ? kmalloc_oob_right+0x6bf/0x7f0
[   23.674109]  __asan_report_store1_noabort+0x1b/0x30
[   23.674777]  kmalloc_oob_right+0x6bf/0x7f0
[   23.675250]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.675702]  ? __schedule+0xc3e/0x2790
[   23.676104]  ? __pfx_read_tsc+0x10/0x10
[   23.676681]  ? ktime_get_ts64+0x84/0x230
[   23.677077]  kunit_try_run_case+0x1b3/0x490
[   23.677656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.677995]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.678366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.678890]  ? __kthread_parkme+0x82/0x160
[   23.679380]  ? preempt_count_sub+0x50/0x80
[   23.679897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.680384]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.680797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.681404]  kthread+0x257/0x310
[   23.681768]  ? __pfx_kthread+0x10/0x10
[   23.682066]  ret_from_fork+0x41/0x80
[   23.682366]  ? __pfx_kthread+0x10/0x10
[   23.682843]  ret_from_fork_asm+0x1a/0x30
[   23.683343]  </TASK>
[   23.683656] 
[   23.683887] Allocated by task 144:
[   23.684274]  kasan_save_stack+0x3d/0x60
[   23.684693]  kasan_save_track+0x18/0x40
[   23.685023]  kasan_save_alloc_info+0x3b/0x50
[   23.685306]  __kasan_kmalloc+0xb7/0xc0
[   23.685731]  __kmalloc_cache_noprof+0x184/0x410
[   23.686261]  kmalloc_oob_right+0xaa/0x7f0
[   23.686705]  kunit_try_run_case+0x1b3/0x490
[   23.687091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.687613]  kthread+0x257/0x310
[   23.688113]  ret_from_fork+0x41/0x80
[   23.688603]  ret_from_fork_asm+0x1a/0x30
[   23.688992] 
[   23.689191] The buggy address belongs to the object at ffff8881029fdf00
[   23.689191]  which belongs to the cache kmalloc-128 of size 128
[   23.689927] The buggy address is located 5 bytes to the right of
[   23.689927]  allocated 115-byte region [ffff8881029fdf00, ffff8881029fdf73)
[   23.690992] 
[   23.691241] The buggy address belongs to the physical page:
[   23.691952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fd
[   23.692688] flags: 0x200000000000000(node=0|zone=2)
[   23.693219] page_type: f5(slab)
[   23.693606] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.694217] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.694689] page dumped because: kasan: bad access detected
[   23.695252] 
[   23.695492] Memory state around the buggy address:
[   23.695975]  ffff8881029fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.696752]  ffff8881029fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.697390] >ffff8881029fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.697811]                                                                 ^
[   23.698579]  ffff8881029fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.699076]  ffff8881029fe000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.699521] ==================================================================
[   23.617193] ==================================================================
[   23.618651] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   23.619910] Write of size 1 at addr ffff8881029fdf73 by task kunit_try_catch/144
[   23.620930] 
[   23.622687] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G                 N 6.12.0-next-20241122 #1
[   23.623661] Tainted: [N]=TEST
[   23.624022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.625302] Call Trace:
[   23.625751]  <TASK>
[   23.626443]  dump_stack_lvl+0x73/0xb0
[   23.627081]  print_report+0xd1/0x640
[   23.627498]  ? __virt_addr_valid+0x1db/0x2d0
[   23.627944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.628503]  kasan_report+0x102/0x140
[   23.628788]  ? kmalloc_oob_right+0x6f2/0x7f0
[   23.629215]  ? kmalloc_oob_right+0x6f2/0x7f0
[   23.629567]  __asan_report_store1_noabort+0x1b/0x30
[   23.630149]  kmalloc_oob_right+0x6f2/0x7f0
[   23.630645]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   23.631034]  ? __schedule+0xc3e/0x2790
[   23.631401]  ? __pfx_read_tsc+0x10/0x10
[   23.631734]  ? ktime_get_ts64+0x84/0x230
[   23.632074]  kunit_try_run_case+0x1b3/0x490
[   23.632562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.633058]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.633364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.633673]  ? __kthread_parkme+0x82/0x160
[   23.634209]  ? preempt_count_sub+0x50/0x80
[   23.634780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.635286]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.635844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.636227]  kthread+0x257/0x310
[   23.636611]  ? __pfx_kthread+0x10/0x10
[   23.637019]  ret_from_fork+0x41/0x80
[   23.637493]  ? __pfx_kthread+0x10/0x10
[   23.637780]  ret_from_fork_asm+0x1a/0x30
[   23.638343]  </TASK>
[   23.638799] 
[   23.640135] Allocated by task 144:
[   23.640942]  kasan_save_stack+0x3d/0x60
[   23.641319]  kasan_save_track+0x18/0x40
[   23.641678]  kasan_save_alloc_info+0x3b/0x50
[   23.642361]  __kasan_kmalloc+0xb7/0xc0
[   23.642637]  __kmalloc_cache_noprof+0x184/0x410
[   23.643487]  kmalloc_oob_right+0xaa/0x7f0
[   23.643903]  kunit_try_run_case+0x1b3/0x490
[   23.645106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.645848]  kthread+0x257/0x310
[   23.646143]  ret_from_fork+0x41/0x80
[   23.646623]  ret_from_fork_asm+0x1a/0x30
[   23.647458] 
[   23.647977] The buggy address belongs to the object at ffff8881029fdf00
[   23.647977]  which belongs to the cache kmalloc-128 of size 128
[   23.648767] The buggy address is located 0 bytes to the right of
[   23.648767]  allocated 115-byte region [ffff8881029fdf00, ffff8881029fdf73)
[   23.650497] 
[   23.651006] The buggy address belongs to the physical page:
[   23.651975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029fd
[   23.653211] flags: 0x200000000000000(node=0|zone=2)
[   23.654812] page_type: f5(slab)
[   23.656105] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.656851] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   23.657605] page dumped because: kasan: bad access detected
[   23.658126] 
[   23.658407] Memory state around the buggy address:
[   23.659686]  ffff8881029fde00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.660324]  ffff8881029fde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.660899] >ffff8881029fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.661753]                                                              ^
[   23.662346]  ffff8881029fdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.662911]  ffff8881029fe000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.663739] ==================================================================