Hay
Date
Dec. 3, 2024, 11:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   29.006930] ==================================================================
[   29.007679] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.008569] Write of size 1 at addr fff00000c58bb178 by task kunit_try_catch/125
[   29.009509] 
[   29.010043] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.011206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.012135] Hardware name: linux,dummy-virt (DT)
[   29.012922] Call trace:
[   29.013433]  show_stack+0x20/0x38 (C)
[   29.014072]  dump_stack_lvl+0x8c/0xd0
[   29.014735]  print_report+0x118/0x5e0
[   29.015413]  kasan_report+0xc8/0x118
[   29.016258]  __asan_report_store1_noabort+0x20/0x30
[   29.016980]  kmalloc_oob_right+0x538/0x660
[   29.017665]  kunit_try_run_case+0x14c/0x3d0
[   29.018262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.019452]  kthread+0x24c/0x2d0
[   29.020249]  ret_from_fork+0x10/0x20
[   29.020796] 
[   29.021145] Allocated by task 125:
[   29.021630]  kasan_save_stack+0x3c/0x68
[   29.022274]  kasan_save_track+0x20/0x40
[   29.023204]  kasan_save_alloc_info+0x40/0x58
[   29.024120]  __kasan_kmalloc+0xd4/0xd8
[   29.024858]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.025431]  kmalloc_oob_right+0xb0/0x660
[   29.026088]  kunit_try_run_case+0x14c/0x3d0
[   29.026689]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.028120]  kthread+0x24c/0x2d0
[   29.028748]  ret_from_fork+0x10/0x20
[   29.029612] 
[   29.029877] The buggy address belongs to the object at fff00000c58bb100
[   29.029877]  which belongs to the cache kmalloc-128 of size 128
[   29.032145] The buggy address is located 5 bytes to the right of
[   29.032145]  allocated 115-byte region [fff00000c58bb100, fff00000c58bb173)
[   29.033649] 
[   29.033998] The buggy address belongs to the physical page:
[   29.035260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058bb
[   29.036784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.037612] page_type: f5(slab)
[   29.038102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.039517] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.040707] page dumped because: kasan: bad access detected
[   29.041413] 
[   29.041698] Memory state around the buggy address:
[   29.042321]  fff00000c58bb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.043823]  fff00000c58bb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.044861] >fff00000c58bb100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.045869]                                                                 ^
[   29.046690]  fff00000c58bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.049099]  fff00000c58bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.050091] ==================================================================
[   29.053928] ==================================================================
[   29.055390] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.056252] Read of size 1 at addr fff00000c58bb180 by task kunit_try_catch/125
[   29.057191] 
[   29.057660] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   29.058967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.059803] Hardware name: linux,dummy-virt (DT)
[   29.060468] Call trace:
[   29.061003]  show_stack+0x20/0x38 (C)
[   29.061628]  dump_stack_lvl+0x8c/0xd0
[   29.062185]  print_report+0x118/0x5e0
[   29.062909]  kasan_report+0xc8/0x118
[   29.063627]  __asan_report_load1_noabort+0x20/0x30
[   29.064589]  kmalloc_oob_right+0x5d0/0x660
[   29.065199]  kunit_try_run_case+0x14c/0x3d0
[   29.065877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.066692]  kthread+0x24c/0x2d0
[   29.067377]  ret_from_fork+0x10/0x20
[   29.068143] 
[   29.068319] Allocated by task 125:
[   29.068896]  kasan_save_stack+0x3c/0x68
[   29.069633]  kasan_save_track+0x20/0x40
[   29.070244]  kasan_save_alloc_info+0x40/0x58
[   29.070866]  __kasan_kmalloc+0xd4/0xd8
[   29.071560]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.072502]  kmalloc_oob_right+0xb0/0x660
[   29.073093]  kunit_try_run_case+0x14c/0x3d0
[   29.073884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.074488]  kthread+0x24c/0x2d0
[   29.074967]  ret_from_fork+0x10/0x20
[   29.076099] 
[   29.076368] The buggy address belongs to the object at fff00000c58bb100
[   29.076368]  which belongs to the cache kmalloc-128 of size 128
[   29.077460] The buggy address is located 13 bytes to the right of
[   29.077460]  allocated 115-byte region [fff00000c58bb100, fff00000c58bb173)
[   29.079291] 
[   29.079746] The buggy address belongs to the physical page:
[   29.080452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058bb
[   29.081441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.082201] page_type: f5(slab)
[   29.082755] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.084132] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.085076] page dumped because: kasan: bad access detected
[   29.085586] 
[   29.085842] Memory state around the buggy address:
[   29.086286]  fff00000c58bb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.086902]  fff00000c58bb100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.087561] >fff00000c58bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.088610]                    ^
[   29.089043]  fff00000c58bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.090229]  fff00000c58bb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.091753] ==================================================================
[   28.954119] ==================================================================
[   28.955773] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   28.957919] Write of size 1 at addr fff00000c58bb173 by task kunit_try_catch/125
[   28.958851] 
[   28.960651] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241203 #1
[   28.962137] Tainted: [N]=TEST
[   28.962668] Hardware name: linux,dummy-virt (DT)
[   28.963806] Call trace:
[   28.964676]  show_stack+0x20/0x38 (C)
[   28.965612]  dump_stack_lvl+0x8c/0xd0
[   28.966242]  print_report+0x118/0x5e0
[   28.966849]  kasan_report+0xc8/0x118
[   28.967669]  __asan_report_store1_noabort+0x20/0x30
[   28.968423]  kmalloc_oob_right+0x5a4/0x660
[   28.969185]  kunit_try_run_case+0x14c/0x3d0
[   28.969816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.970657]  kthread+0x24c/0x2d0
[   28.971244]  ret_from_fork+0x10/0x20
[   28.972066] 
[   28.972555] Allocated by task 125:
[   28.973212]  kasan_save_stack+0x3c/0x68
[   28.973959]  kasan_save_track+0x20/0x40
[   28.974560]  kasan_save_alloc_info+0x40/0x58
[   28.975432]  __kasan_kmalloc+0xd4/0xd8
[   28.976344]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.977435]  kmalloc_oob_right+0xb0/0x660
[   28.978401]  kunit_try_run_case+0x14c/0x3d0
[   28.978974]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.980048]  kthread+0x24c/0x2d0
[   28.980453]  ret_from_fork+0x10/0x20
[   28.981314] 
[   28.981871] The buggy address belongs to the object at fff00000c58bb100
[   28.981871]  which belongs to the cache kmalloc-128 of size 128
[   28.982866] The buggy address is located 0 bytes to the right of
[   28.982866]  allocated 115-byte region [fff00000c58bb100, fff00000c58bb173)
[   28.985648] 
[   28.986224] The buggy address belongs to the physical page:
[   28.987630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058bb
[   28.988957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.990207] page_type: f5(slab)
[   28.991395] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.992340] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.993369] page dumped because: kasan: bad access detected
[   28.994242] 
[   28.994610] Memory state around the buggy address:
[   28.996065]  fff00000c58bb000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.997650]  fff00000c58bb080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.998726] >fff00000c58bb100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.999893]                                                              ^
[   29.001079]  fff00000c58bb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.001951]  fff00000c58bb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.003515] ==================================================================

[   24.630209] ==================================================================
[   24.631348] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   24.631988] Write of size 1 at addr ffff888102715f78 by task kunit_try_catch/145
[   24.632375] 
[   24.632562] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   24.632880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.633017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.634048] Call Trace:
[   24.634409]  <TASK>
[   24.634716]  dump_stack_lvl+0x73/0xb0
[   24.635243]  print_report+0xd1/0x640
[   24.635519]  ? __virt_addr_valid+0x1db/0x2d0
[   24.636312]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.636835]  kasan_report+0x102/0x140
[   24.637352]  ? kmalloc_oob_right+0x6bf/0x7f0
[   24.637784]  ? kmalloc_oob_right+0x6bf/0x7f0
[   24.638314]  __asan_report_store1_noabort+0x1b/0x30
[   24.638833]  kmalloc_oob_right+0x6bf/0x7f0
[   24.639348]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.639937]  ? __schedule+0xc3e/0x2790
[   24.640320]  ? __pfx_read_tsc+0x10/0x10
[   24.640804]  ? ktime_get_ts64+0x86/0x230
[   24.641136]  kunit_try_run_case+0x1b3/0x490
[   24.641424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.641737]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.642361]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.643253]  ? __kthread_parkme+0x82/0x160
[   24.644178]  ? preempt_count_sub+0x50/0x80
[   24.644570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.645152]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.645843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.646623]  kthread+0x257/0x310
[   24.646971]  ? __pfx_kthread+0x10/0x10
[   24.647295]  ret_from_fork+0x41/0x80
[   24.648141]  ? __pfx_kthread+0x10/0x10
[   24.648537]  ret_from_fork_asm+0x1a/0x30
[   24.648947]  </TASK>
[   24.649159] 
[   24.649332] Allocated by task 145:
[   24.650427]  kasan_save_stack+0x3d/0x60
[   24.650782]  kasan_save_track+0x18/0x40
[   24.651276]  kasan_save_alloc_info+0x3b/0x50
[   24.651810]  __kasan_kmalloc+0xb7/0xc0
[   24.652132]  __kmalloc_cache_noprof+0x184/0x410
[   24.652499]  kmalloc_oob_right+0xaa/0x7f0
[   24.653395]  kunit_try_run_case+0x1b3/0x490
[   24.653761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.654188]  kthread+0x257/0x310
[   24.654801]  ret_from_fork+0x41/0x80
[   24.655151]  ret_from_fork_asm+0x1a/0x30
[   24.655885] 
[   24.656026] The buggy address belongs to the object at ffff888102715f00
[   24.656026]  which belongs to the cache kmalloc-128 of size 128
[   24.656859] The buggy address is located 5 bytes to the right of
[   24.656859]  allocated 115-byte region [ffff888102715f00, ffff888102715f73)
[   24.658124] 
[   24.658336] The buggy address belongs to the physical page:
[   24.659374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102715
[   24.659905] flags: 0x200000000000000(node=0|zone=2)
[   24.660473] page_type: f5(slab)
[   24.660819] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.661377] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.662507] page dumped because: kasan: bad access detected
[   24.662862] 
[   24.663069] Memory state around the buggy address:
[   24.663421]  ffff888102715e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.664294]  ffff888102715e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.664993] >ffff888102715f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.666028]                                                                 ^
[   24.666471]  ffff888102715f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.667412]  ffff888102716000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.668341] ==================================================================
[   24.669417] ==================================================================
[   24.669918] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   24.670746] Read of size 1 at addr ffff888102715f80 by task kunit_try_catch/145
[   24.671117] 
[   24.671292] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241203 #1
[   24.671842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.672244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.673005] Call Trace:
[   24.673271]  <TASK>
[   24.673576]  dump_stack_lvl+0x73/0xb0
[   24.673944]  print_report+0xd1/0x640
[   24.674229]  ? __virt_addr_valid+0x1db/0x2d0
[   24.674762]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.675295]  kasan_report+0x102/0x140
[   24.675715]  ? kmalloc_oob_right+0x68c/0x7f0
[   24.676076]  ? kmalloc_oob_right+0x68c/0x7f0
[   24.676368]  __asan_report_load1_noabort+0x18/0x20
[   24.676874]  kmalloc_oob_right+0x68c/0x7f0
[   24.677291]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.677783]  ? __schedule+0xc3e/0x2790
[   24.678172]  ? __pfx_read_tsc+0x10/0x10
[   24.678480]  ? ktime_get_ts64+0x86/0x230
[   24.678892]  kunit_try_run_case+0x1b3/0x490
[   24.679260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.679595]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.679989]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.680536]  ? __kthread_parkme+0x82/0x160
[   24.680955]  ? preempt_count_sub+0x50/0x80
[   24.681388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.681740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.682276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.682649]  kthread+0x257/0x310
[   24.682968]  ? __pfx_kthread+0x10/0x10
[   24.683348]  ret_from_fork+0x41/0x80
[   24.683747]  ? __pfx_kthread+0x10/0x10
[   24.684139]  ret_from_fork_asm+0x1a/0x30
[   24.684654]  </TASK>
[   24.684922] 
[   24.685142] Allocated by task 145:
[   24.685419]  kasan_save_stack+0x3d/0x60
[   24.685729]  kasan_save_track+0x18/0x40
[   24.686021]  kasan_save_alloc_info+0x3b/0x50
[   24.686489]  __kasan_kmalloc+0xb7/0xc0
[   24.686870]  __kmalloc_cache_noprof+0x184/0x410
[   24.687316]  kmalloc_oob_right+0xaa/0x7f0
[   24.687735]  kunit_try_run_case+0x1b3/0x490
[   24.688131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.688486]  kthread+0x257/0x310
[   24.688721]  ret_from_fork+0x41/0x80
[   24.689085]  ret_from_fork_asm+0x1a/0x30
[   24.689515] 
[   24.689718] The buggy address belongs to the object at ffff888102715f00
[   24.689718]  which belongs to the cache kmalloc-128 of size 128
[   24.690697] The buggy address is located 13 bytes to the right of
[   24.690697]  allocated 115-byte region [ffff888102715f00, ffff888102715f73)
[   24.691391] 
[   24.691629] The buggy address belongs to the physical page:
[   24.692118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102715
[   24.692799] flags: 0x200000000000000(node=0|zone=2)
[   24.693241] page_type: f5(slab)
[   24.693509] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.693950] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.694620] page dumped because: kasan: bad access detected
[   24.695095] 
[   24.695299] Memory state around the buggy address:
[   24.695749]  ffff888102715e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.696362]  ffff888102715f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.696819] >ffff888102715f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.697252]                    ^
[   24.699158]  ffff888102716000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.699765]  ffff888102716080: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc
[   24.700353] ==================================================================
[   24.578150] ==================================================================
[   24.580097] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   24.581230] Write of size 1 at addr ffff888102715f73 by task kunit_try_catch/145
[   24.581868] 
[   24.583660] CPU: 1 UID: 0 PID: 145 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241203 #1
[   24.584958] Tainted: [N]=TEST
[   24.585299] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.586931] Call Trace:
[   24.587321]  <TASK>
[   24.588175]  dump_stack_lvl+0x73/0xb0
[   24.588990]  print_report+0xd1/0x640
[   24.589389]  ? __virt_addr_valid+0x1db/0x2d0
[   24.589767]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.590483]  kasan_report+0x102/0x140
[   24.591134]  ? kmalloc_oob_right+0x6f2/0x7f0
[   24.591420]  ? kmalloc_oob_right+0x6f2/0x7f0
[   24.591909]  __asan_report_store1_noabort+0x1b/0x30
[   24.592313]  kmalloc_oob_right+0x6f2/0x7f0
[   24.593219]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.593533]  ? __schedule+0xc3e/0x2790
[   24.594067]  ? __pfx_read_tsc+0x10/0x10
[   24.594969]  ? ktime_get_ts64+0x86/0x230
[   24.595273]  kunit_try_run_case+0x1b3/0x490
[   24.595593]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.596038]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.596983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.597526]  ? __kthread_parkme+0x82/0x160
[   24.598036]  ? preempt_count_sub+0x50/0x80
[   24.598561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.598855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.599400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.599894]  kthread+0x257/0x310
[   24.600511]  ? __pfx_kthread+0x10/0x10
[   24.600993]  ret_from_fork+0x41/0x80
[   24.601377]  ? __pfx_kthread+0x10/0x10
[   24.601927]  ret_from_fork_asm+0x1a/0x30
[   24.602506]  </TASK>
[   24.603124] 
[   24.603383] Allocated by task 145:
[   24.604194]  kasan_save_stack+0x3d/0x60
[   24.604868]  kasan_save_track+0x18/0x40
[   24.605286]  kasan_save_alloc_info+0x3b/0x50
[   24.605726]  __kasan_kmalloc+0xb7/0xc0
[   24.606043]  __kmalloc_cache_noprof+0x184/0x410
[   24.606822]  kmalloc_oob_right+0xaa/0x7f0
[   24.607151]  kunit_try_run_case+0x1b3/0x490
[   24.607599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.608263]  kthread+0x257/0x310
[   24.608750]  ret_from_fork+0x41/0x80
[   24.609127]  ret_from_fork_asm+0x1a/0x30
[   24.609789] 
[   24.610169] The buggy address belongs to the object at ffff888102715f00
[   24.610169]  which belongs to the cache kmalloc-128 of size 128
[   24.611106] The buggy address is located 0 bytes to the right of
[   24.611106]  allocated 115-byte region [ffff888102715f00, ffff888102715f73)
[   24.612472] 
[   24.613044] The buggy address belongs to the physical page:
[   24.614205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102715
[   24.615379] flags: 0x200000000000000(node=0|zone=2)
[   24.616815] page_type: f5(slab)
[   24.617934] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.619020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.619967] page dumped because: kasan: bad access detected
[   24.620799] 
[   24.621017] Memory state around the buggy address:
[   24.622179]  ffff888102715e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.623014]  ffff888102715e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.623486] >ffff888102715f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.624330]                                                              ^
[   24.624957]  ffff888102715f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.625892]  ffff888102716000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.626543] ==================================================================