Date
Nov. 28, 2024, 2:36 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.224178] ================================================================== [ 29.225632] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.227641] Write of size 1 at addr fff00000c402f973 by task kunit_try_catch/124 [ 29.228612] [ 29.230546] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241128 #1 [ 29.231806] Tainted: [N]=TEST [ 29.232226] Hardware name: linux,dummy-virt (DT) [ 29.233586] Call trace: [ 29.234431] show_stack+0x20/0x38 (C) [ 29.235306] dump_stack_lvl+0x8c/0xd0 [ 29.235822] print_report+0x118/0x5e0 [ 29.236523] kasan_report+0xc8/0x118 [ 29.237409] __asan_report_store1_noabort+0x20/0x30 [ 29.238217] kmalloc_oob_right+0x5a4/0x660 [ 29.238931] kunit_try_run_case+0x14c/0x3d0 [ 29.239686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.240365] kthread+0x24c/0x2d0 [ 29.240841] ret_from_fork+0x10/0x20 [ 29.242257] [ 29.242686] Allocated by task 124: [ 29.243373] kasan_save_stack+0x3c/0x68 [ 29.243939] kasan_save_track+0x20/0x40 [ 29.244802] kasan_save_alloc_info+0x40/0x58 [ 29.245600] __kasan_kmalloc+0xd4/0xd8 [ 29.246307] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.247041] kmalloc_oob_right+0xb0/0x660 [ 29.247776] kunit_try_run_case+0x14c/0x3d0 [ 29.248510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.249372] kthread+0x24c/0x2d0 [ 29.249818] ret_from_fork+0x10/0x20 [ 29.250366] [ 29.250757] The buggy address belongs to the object at fff00000c402f900 [ 29.250757] which belongs to the cache kmalloc-128 of size 128 [ 29.252652] The buggy address is located 0 bytes to the right of [ 29.252652] allocated 115-byte region [fff00000c402f900, fff00000c402f973) [ 29.253993] [ 29.254556] The buggy address belongs to the physical page: [ 29.255587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f [ 29.256675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.258126] page_type: f5(slab) [ 29.259245] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.260028] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.261069] page dumped because: kasan: bad access detected [ 29.261927] [ 29.262282] Memory state around the buggy address: [ 29.263354] fff00000c402f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 29.264158] fff00000c402f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.265012] >fff00000c402f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.265767] ^ [ 29.266777] fff00000c402f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.267628] fff00000c402fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.268498] ================================================================== [ 29.309859] ================================================================== [ 29.311523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.312479] Read of size 1 at addr fff00000c402f980 by task kunit_try_catch/124 [ 29.313925] [ 29.314204] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.315162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.315769] Hardware name: linux,dummy-virt (DT) [ 29.316350] Call trace: [ 29.316631] show_stack+0x20/0x38 (C) [ 29.317748] dump_stack_lvl+0x8c/0xd0 [ 29.318420] print_report+0x118/0x5e0 [ 29.319136] kasan_report+0xc8/0x118 [ 29.319734] __asan_report_load1_noabort+0x20/0x30 [ 29.320316] kmalloc_oob_right+0x5d0/0x660 [ 29.320927] kunit_try_run_case+0x14c/0x3d0 [ 29.321845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.322457] kthread+0x24c/0x2d0 [ 29.323004] ret_from_fork+0x10/0x20 [ 29.323556] [ 29.323875] Allocated by task 124: [ 29.324342] kasan_save_stack+0x3c/0x68 [ 29.324914] kasan_save_track+0x20/0x40 [ 29.325467] kasan_save_alloc_info+0x40/0x58 [ 29.326381] __kasan_kmalloc+0xd4/0xd8 [ 29.326995] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.327571] kmalloc_oob_right+0xb0/0x660 [ 29.328063] kunit_try_run_case+0x14c/0x3d0 [ 29.328697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.330381] kthread+0x24c/0x2d0 [ 29.330869] ret_from_fork+0x10/0x20 [ 29.331609] [ 29.332133] The buggy address belongs to the object at fff00000c402f900 [ 29.332133] which belongs to the cache kmalloc-128 of size 128 [ 29.334035] The buggy address is located 13 bytes to the right of [ 29.334035] allocated 115-byte region [fff00000c402f900, fff00000c402f973) [ 29.335366] [ 29.335845] The buggy address belongs to the physical page: [ 29.336509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f [ 29.337607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.337982] page_type: f5(slab) [ 29.338307] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.339565] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.340535] page dumped because: kasan: bad access detected [ 29.341467] [ 29.341948] Memory state around the buggy address: [ 29.342709] fff00000c402f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.343671] fff00000c402f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.344637] >fff00000c402f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.345737] ^ [ 29.346203] fff00000c402fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.346933] fff00000c402fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.348074] ================================================================== [ 29.273570] ================================================================== [ 29.274192] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.274854] Write of size 1 at addr fff00000c402f978 by task kunit_try_catch/124 [ 29.275547] [ 29.275790] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 29.277755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.278298] Hardware name: linux,dummy-virt (DT) [ 29.278885] Call trace: [ 29.279391] show_stack+0x20/0x38 (C) [ 29.280049] dump_stack_lvl+0x8c/0xd0 [ 29.280762] print_report+0x118/0x5e0 [ 29.281391] kasan_report+0xc8/0x118 [ 29.282020] __asan_report_store1_noabort+0x20/0x30 [ 29.282688] kmalloc_oob_right+0x538/0x660 [ 29.283278] kunit_try_run_case+0x14c/0x3d0 [ 29.283876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.284608] kthread+0x24c/0x2d0 [ 29.285396] ret_from_fork+0x10/0x20 [ 29.285926] [ 29.286317] Allocated by task 124: [ 29.286856] kasan_save_stack+0x3c/0x68 [ 29.287441] kasan_save_track+0x20/0x40 [ 29.288028] kasan_save_alloc_info+0x40/0x58 [ 29.288637] __kasan_kmalloc+0xd4/0xd8 [ 29.289431] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.289989] kmalloc_oob_right+0xb0/0x660 [ 29.290563] kunit_try_run_case+0x14c/0x3d0 [ 29.291176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.291715] kthread+0x24c/0x2d0 [ 29.292252] ret_from_fork+0x10/0x20 [ 29.292804] [ 29.293398] The buggy address belongs to the object at fff00000c402f900 [ 29.293398] which belongs to the cache kmalloc-128 of size 128 [ 29.294536] The buggy address is located 5 bytes to the right of [ 29.294536] allocated 115-byte region [fff00000c402f900, fff00000c402f973) [ 29.295654] [ 29.295983] The buggy address belongs to the physical page: [ 29.296676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10402f [ 29.298196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.298938] page_type: f5(slab) [ 29.299470] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.300374] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 29.301178] page dumped because: kasan: bad access detected [ 29.302097] [ 29.302455] Memory state around the buggy address: [ 29.302968] fff00000c402f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 29.303738] fff00000c402f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.304532] >fff00000c402f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.305614] ^ [ 29.306412] fff00000c402f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.307582] fff00000c402fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.308264] ==================================================================
[ 19.986799] ================================================================== [ 19.987480] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 19.988075] Write of size 1 at addr ffff888101b4ef78 by task kunit_try_catch/144 [ 19.988938] [ 19.989146] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 19.989883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.990272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.991225] Call Trace: [ 19.991493] <TASK> [ 19.991689] dump_stack_lvl+0x73/0xb0 [ 19.992166] print_report+0xd1/0x640 [ 19.993239] ? __virt_addr_valid+0x1db/0x2d0 [ 19.993666] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.994376] kasan_report+0x102/0x140 [ 19.994766] ? kmalloc_oob_right+0x6bf/0x7f0 [ 19.995199] ? kmalloc_oob_right+0x6bf/0x7f0 [ 19.995727] __asan_report_store1_noabort+0x1b/0x30 [ 19.996323] kmalloc_oob_right+0x6bf/0x7f0 [ 19.996803] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 19.997373] ? __schedule+0xc3e/0x2790 [ 19.997701] ? __pfx_read_tsc+0x10/0x10 [ 19.998125] ? ktime_get_ts64+0x84/0x230 [ 19.998657] kunit_try_run_case+0x1b3/0x490 [ 19.999309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.999779] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.000388] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.000907] ? __kthread_parkme+0x82/0x160 [ 20.001488] ? preempt_count_sub+0x50/0x80 [ 20.001953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.002532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.003594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.004274] kthread+0x257/0x310 [ 20.004716] ? __pfx_kthread+0x10/0x10 [ 20.005149] ret_from_fork+0x41/0x80 [ 20.005626] ? __pfx_kthread+0x10/0x10 [ 20.005986] ret_from_fork_asm+0x1a/0x30 [ 20.006559] </TASK> [ 20.006871] [ 20.007021] Allocated by task 144: [ 20.007527] kasan_save_stack+0x3d/0x60 [ 20.007961] kasan_save_track+0x18/0x40 [ 20.008475] kasan_save_alloc_info+0x3b/0x50 [ 20.008924] __kasan_kmalloc+0xb7/0xc0 [ 20.009495] __kmalloc_cache_noprof+0x184/0x410 [ 20.009910] kmalloc_oob_right+0xaa/0x7f0 [ 20.010489] kunit_try_run_case+0x1b3/0x490 [ 20.010870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.011500] kthread+0x257/0x310 [ 20.011782] ret_from_fork+0x41/0x80 [ 20.012359] ret_from_fork_asm+0x1a/0x30 [ 20.012798] [ 20.012993] The buggy address belongs to the object at ffff888101b4ef00 [ 20.012993] which belongs to the cache kmalloc-128 of size 128 [ 20.014193] The buggy address is located 5 bytes to the right of [ 20.014193] allocated 115-byte region [ffff888101b4ef00, ffff888101b4ef73) [ 20.015224] [ 20.015398] The buggy address belongs to the physical page: [ 20.016239] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b4e [ 20.017035] flags: 0x200000000000000(node=0|zone=2) [ 20.017384] page_type: f5(slab) [ 20.017653] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.018524] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.019320] page dumped because: kasan: bad access detected [ 20.019753] [ 20.019947] Memory state around the buggy address: [ 20.020511] ffff888101b4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 20.021134] ffff888101b4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.021708] >ffff888101b4ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.022541] ^ [ 20.023126] ffff888101b4ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.023703] ffff888101b4f000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.024358] ================================================================== [ 20.025798] ================================================================== [ 20.026570] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 20.027014] Read of size 1 at addr ffff888101b4ef80 by task kunit_try_catch/144 [ 20.027817] [ 20.028051] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 20.028838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.029262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.030153] Call Trace: [ 20.030427] <TASK> [ 20.030621] dump_stack_lvl+0x73/0xb0 [ 20.031134] print_report+0xd1/0x640 [ 20.031603] ? __virt_addr_valid+0x1db/0x2d0 [ 20.032001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.032714] kasan_report+0x102/0x140 [ 20.033063] ? kmalloc_oob_right+0x68c/0x7f0 [ 20.033570] ? kmalloc_oob_right+0x68c/0x7f0 [ 20.033961] __asan_report_load1_noabort+0x18/0x20 [ 20.034521] kmalloc_oob_right+0x68c/0x7f0 [ 20.034820] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 20.035224] ? __schedule+0xc3e/0x2790 [ 20.035701] ? __pfx_read_tsc+0x10/0x10 [ 20.036630] ? ktime_get_ts64+0x84/0x230 [ 20.036944] kunit_try_run_case+0x1b3/0x490 [ 20.037844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.038248] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.038779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.039287] ? __kthread_parkme+0x82/0x160 [ 20.039724] ? preempt_count_sub+0x50/0x80 [ 20.040220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.040613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.041305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.041767] kthread+0x257/0x310 [ 20.042221] ? __pfx_kthread+0x10/0x10 [ 20.042687] ret_from_fork+0x41/0x80 [ 20.042993] ? __pfx_kthread+0x10/0x10 [ 20.043488] ret_from_fork_asm+0x1a/0x30 [ 20.043926] </TASK> [ 20.044200] [ 20.044436] Allocated by task 144: [ 20.044834] kasan_save_stack+0x3d/0x60 [ 20.045277] kasan_save_track+0x18/0x40 [ 20.045676] kasan_save_alloc_info+0x3b/0x50 [ 20.046149] __kasan_kmalloc+0xb7/0xc0 [ 20.046489] __kmalloc_cache_noprof+0x184/0x410 [ 20.047050] kmalloc_oob_right+0xaa/0x7f0 [ 20.047564] kunit_try_run_case+0x1b3/0x490 [ 20.047930] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.048412] kthread+0x257/0x310 [ 20.048657] ret_from_fork+0x41/0x80 [ 20.049163] ret_from_fork_asm+0x1a/0x30 [ 20.049584] [ 20.049739] The buggy address belongs to the object at ffff888101b4ef00 [ 20.049739] which belongs to the cache kmalloc-128 of size 128 [ 20.050751] The buggy address is located 13 bytes to the right of [ 20.050751] allocated 115-byte region [ffff888101b4ef00, ffff888101b4ef73) [ 20.052037] [ 20.052259] The buggy address belongs to the physical page: [ 20.052754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b4e [ 20.053482] flags: 0x200000000000000(node=0|zone=2) [ 20.053920] page_type: f5(slab) [ 20.054270] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 20.054910] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 20.055482] page dumped because: kasan: bad access detected [ 20.056013] [ 20.056223] Memory state around the buggy address: [ 20.056711] ffff888101b4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.057356] ffff888101b4ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 20.058002] >ffff888101b4ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.058694] ^ [ 20.058973] ffff888101b4f000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.059544] ffff888101b4f080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 20.060154] ================================================================== [ 19.933689] ================================================================== [ 19.934831] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 19.936368] Write of size 1 at addr ffff888101b4ef73 by task kunit_try_catch/144 [ 19.937445] [ 19.939202] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G N 6.12.0-next-20241128 #1 [ 19.940205] Tainted: [N]=TEST [ 19.940552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.942169] Call Trace: [ 19.942603] <TASK> [ 19.943135] dump_stack_lvl+0x73/0xb0 [ 19.943725] print_report+0xd1/0x640 [ 19.944118] ? __virt_addr_valid+0x1db/0x2d0 [ 19.944557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.945224] kasan_report+0x102/0x140 [ 19.945713] ? kmalloc_oob_right+0x6f2/0x7f0 [ 19.946067] ? kmalloc_oob_right+0x6f2/0x7f0 [ 19.946897] __asan_report_store1_noabort+0x1b/0x30 [ 19.947564] kmalloc_oob_right+0x6f2/0x7f0 [ 19.948049] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 19.948553] ? __schedule+0xc3e/0x2790 [ 19.948953] ? __pfx_read_tsc+0x10/0x10 [ 19.949993] ? ktime_get_ts64+0x84/0x230 [ 19.950522] kunit_try_run_case+0x1b3/0x490 [ 19.951094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.951688] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 19.952117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.952624] ? __kthread_parkme+0x82/0x160 [ 19.953188] ? preempt_count_sub+0x50/0x80 [ 19.953746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.954367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.955012] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.955543] kthread+0x257/0x310 [ 19.955953] ? __pfx_kthread+0x10/0x10 [ 19.956531] ret_from_fork+0x41/0x80 [ 19.956808] ? __pfx_kthread+0x10/0x10 [ 19.957555] ret_from_fork_asm+0x1a/0x30 [ 19.958127] </TASK> [ 19.958532] [ 19.959047] Allocated by task 144: [ 19.960097] kasan_save_stack+0x3d/0x60 [ 19.960755] kasan_save_track+0x18/0x40 [ 19.961580] kasan_save_alloc_info+0x3b/0x50 [ 19.961973] __kasan_kmalloc+0xb7/0xc0 [ 19.962736] __kmalloc_cache_noprof+0x184/0x410 [ 19.963444] kmalloc_oob_right+0xaa/0x7f0 [ 19.963966] kunit_try_run_case+0x1b3/0x490 [ 19.964744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.965551] kthread+0x257/0x310 [ 19.965950] ret_from_fork+0x41/0x80 [ 19.966324] ret_from_fork_asm+0x1a/0x30 [ 19.967046] [ 19.967496] The buggy address belongs to the object at ffff888101b4ef00 [ 19.967496] which belongs to the cache kmalloc-128 of size 128 [ 19.969134] The buggy address is located 0 bytes to the right of [ 19.969134] allocated 115-byte region [ffff888101b4ef00, ffff888101b4ef73) [ 19.970266] [ 19.970707] The buggy address belongs to the physical page: [ 19.971803] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b4e [ 19.972931] flags: 0x200000000000000(node=0|zone=2) [ 19.974147] page_type: f5(slab) [ 19.975096] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 19.975967] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 19.976729] page dumped because: kasan: bad access detected [ 19.977220] [ 19.977455] Memory state around the buggy address: [ 19.978505] ffff888101b4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 19.979425] ffff888101b4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.979992] >ffff888101b4ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.980583] ^ [ 19.981282] ffff888101b4ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.982255] ffff888101b4f000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 19.982892] ==================================================================