Date
Dec. 4, 2024, 3:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 30.478515] ================================================================== [ 30.479507] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 30.480359] Write of size 1 at addr fff00000c66da078 by task kunit_try_catch/124 [ 30.481063] [ 30.481333] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.482896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.483445] Hardware name: linux,dummy-virt (DT) [ 30.484265] Call trace: [ 30.484678] show_stack+0x20/0x38 (C) [ 30.485849] dump_stack_lvl+0x8c/0xd0 [ 30.486875] print_report+0x118/0x5e0 [ 30.487696] kasan_report+0xc8/0x118 [ 30.488117] __asan_report_store1_noabort+0x20/0x30 [ 30.488672] kmalloc_oob_right+0x538/0x660 [ 30.489148] kunit_try_run_case+0x14c/0x3d0 [ 30.490641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.491608] kthread+0x24c/0x2d0 [ 30.492156] ret_from_fork+0x10/0x20 [ 30.492780] [ 30.493099] Allocated by task 124: [ 30.493664] kasan_save_stack+0x3c/0x68 [ 30.494274] kasan_save_track+0x20/0x40 [ 30.495802] kasan_save_alloc_info+0x40/0x58 [ 30.496377] __kasan_kmalloc+0xd4/0xd8 [ 30.496942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.498001] kmalloc_oob_right+0xb0/0x660 [ 30.498658] kunit_try_run_case+0x14c/0x3d0 [ 30.499229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.500302] kthread+0x24c/0x2d0 [ 30.500804] ret_from_fork+0x10/0x20 [ 30.501357] [ 30.502721] The buggy address belongs to the object at fff00000c66da000 [ 30.502721] which belongs to the cache kmalloc-128 of size 128 [ 30.504171] The buggy address is located 5 bytes to the right of [ 30.504171] allocated 115-byte region [fff00000c66da000, fff00000c66da073) [ 30.506311] [ 30.506574] The buggy address belongs to the physical page: [ 30.507406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da [ 30.508326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.509345] page_type: f5(slab) [ 30.509861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.511787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.512711] page dumped because: kasan: bad access detected [ 30.513338] [ 30.514134] Memory state around the buggy address: [ 30.514670] fff00000c66d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.515620] fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.516583] >fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.517487] ^ [ 30.518455] fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.519188] fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.520142] ================================================================== [ 30.425199] ================================================================== [ 30.427052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 30.429365] Write of size 1 at addr fff00000c66da073 by task kunit_try_catch/124 [ 30.430414] [ 30.432816] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G N 6.13.0-rc1-next-20241204 #1 [ 30.434575] Tainted: [N]=TEST [ 30.435415] Hardware name: linux,dummy-virt (DT) [ 30.437175] Call trace: [ 30.438148] show_stack+0x20/0x38 (C) [ 30.438994] dump_stack_lvl+0x8c/0xd0 [ 30.439700] print_report+0x118/0x5e0 [ 30.440227] kasan_report+0xc8/0x118 [ 30.440847] __asan_report_store1_noabort+0x20/0x30 [ 30.441537] kmalloc_oob_right+0x5a4/0x660 [ 30.442194] kunit_try_run_case+0x14c/0x3d0 [ 30.442955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.443612] kthread+0x24c/0x2d0 [ 30.444301] ret_from_fork+0x10/0x20 [ 30.445100] [ 30.445576] Allocated by task 124: [ 30.446575] kasan_save_stack+0x3c/0x68 [ 30.447153] kasan_save_track+0x20/0x40 [ 30.447839] kasan_save_alloc_info+0x40/0x58 [ 30.448420] __kasan_kmalloc+0xd4/0xd8 [ 30.449028] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.449603] kmalloc_oob_right+0xb0/0x660 [ 30.450412] kunit_try_run_case+0x14c/0x3d0 [ 30.451099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.452302] kthread+0x24c/0x2d0 [ 30.452937] ret_from_fork+0x10/0x20 [ 30.453592] [ 30.455198] The buggy address belongs to the object at fff00000c66da000 [ 30.455198] which belongs to the cache kmalloc-128 of size 128 [ 30.456616] The buggy address is located 0 bytes to the right of [ 30.456616] allocated 115-byte region [fff00000c66da000, fff00000c66da073) [ 30.458498] [ 30.459047] The buggy address belongs to the physical page: [ 30.460197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da [ 30.461499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.463381] page_type: f5(slab) [ 30.464478] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.465439] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.466951] page dumped because: kasan: bad access detected [ 30.467524] [ 30.467841] Memory state around the buggy address: [ 30.468746] fff00000c66d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.470458] fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.471803] >fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.472566] ^ [ 30.473300] fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.474083] fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.475037] ================================================================== [ 30.521889] ================================================================== [ 30.522989] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 30.524262] Read of size 1 at addr fff00000c66da080 by task kunit_try_catch/124 [ 30.525577] [ 30.526095] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.527784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.528199] Hardware name: linux,dummy-virt (DT) [ 30.528868] Call trace: [ 30.529240] show_stack+0x20/0x38 (C) [ 30.529685] dump_stack_lvl+0x8c/0xd0 [ 30.530779] print_report+0x118/0x5e0 [ 30.531956] kasan_report+0xc8/0x118 [ 30.532975] __asan_report_load1_noabort+0x20/0x30 [ 30.533668] kmalloc_oob_right+0x5d0/0x660 [ 30.534833] kunit_try_run_case+0x14c/0x3d0 [ 30.535779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.536784] kthread+0x24c/0x2d0 [ 30.537169] ret_from_fork+0x10/0x20 [ 30.538175] [ 30.538537] Allocated by task 124: [ 30.539488] kasan_save_stack+0x3c/0x68 [ 30.540195] kasan_save_track+0x20/0x40 [ 30.540494] kasan_save_alloc_info+0x40/0x58 [ 30.540916] __kasan_kmalloc+0xd4/0xd8 [ 30.541568] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.543358] kmalloc_oob_right+0xb0/0x660 [ 30.543797] kunit_try_run_case+0x14c/0x3d0 [ 30.544617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.545376] kthread+0x24c/0x2d0 [ 30.545856] ret_from_fork+0x10/0x20 [ 30.546497] [ 30.546937] The buggy address belongs to the object at fff00000c66da000 [ 30.546937] which belongs to the cache kmalloc-128 of size 128 [ 30.549380] The buggy address is located 13 bytes to the right of [ 30.549380] allocated 115-byte region [fff00000c66da000, fff00000c66da073) [ 30.551347] [ 30.551614] The buggy address belongs to the physical page: [ 30.552165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da [ 30.552942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.553539] page_type: f5(slab) [ 30.554735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.555954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.557007] page dumped because: kasan: bad access detected [ 30.558137] [ 30.558392] Memory state around the buggy address: [ 30.559540] fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.560831] fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.561933] >fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.563341] ^ [ 30.564064] fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.565018] fff00000c66da180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.566457] ==================================================================
[ 21.204942] ================================================================== [ 21.206157] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 21.206887] Read of size 1 at addr ffff888101ae3480 by task kunit_try_catch/144 [ 21.207509] [ 21.207813] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 21.208834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.209369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.210047] Call Trace: [ 21.210509] <TASK> [ 21.210787] dump_stack_lvl+0x73/0xb0 [ 21.211367] print_report+0xd1/0x640 [ 21.211852] ? __virt_addr_valid+0x1db/0x2d0 [ 21.212162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.212853] kasan_report+0x102/0x140 [ 21.213446] ? kmalloc_oob_right+0x68c/0x7f0 [ 21.213893] ? kmalloc_oob_right+0x68c/0x7f0 [ 21.214504] __asan_report_load1_noabort+0x18/0x20 [ 21.215023] kmalloc_oob_right+0x68c/0x7f0 [ 21.215449] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 21.216079] ? __schedule+0xc3e/0x2790 [ 21.216466] ? __pfx_read_tsc+0x10/0x10 [ 21.216962] ? ktime_get_ts64+0x86/0x230 [ 21.217525] kunit_try_run_case+0x1b3/0x490 [ 21.217986] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.218574] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.219110] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.219666] ? __kthread_parkme+0x82/0x160 [ 21.220208] ? preempt_count_sub+0x50/0x80 [ 21.220781] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.221210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.221953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.222508] kthread+0x257/0x310 [ 21.222976] ? __pfx_kthread+0x10/0x10 [ 21.223258] ret_from_fork+0x41/0x80 [ 21.223829] ? __pfx_kthread+0x10/0x10 [ 21.224152] ret_from_fork_asm+0x1a/0x30 [ 21.224827] </TASK> [ 21.225092] [ 21.225351] Allocated by task 144: [ 21.225640] kasan_save_stack+0x3d/0x60 [ 21.225938] kasan_save_track+0x18/0x40 [ 21.226206] kasan_save_alloc_info+0x3b/0x50 [ 21.226502] __kasan_kmalloc+0xb7/0xc0 [ 21.226870] __kmalloc_cache_noprof+0x184/0x410 [ 21.227687] kmalloc_oob_right+0xaa/0x7f0 [ 21.228204] kunit_try_run_case+0x1b3/0x490 [ 21.228869] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.229524] kthread+0x257/0x310 [ 21.229801] ret_from_fork+0x41/0x80 [ 21.230282] ret_from_fork_asm+0x1a/0x30 [ 21.230855] [ 21.231171] The buggy address belongs to the object at ffff888101ae3400 [ 21.231171] which belongs to the cache kmalloc-128 of size 128 [ 21.232595] The buggy address is located 13 bytes to the right of [ 21.232595] allocated 115-byte region [ffff888101ae3400, ffff888101ae3473) [ 21.233822] [ 21.233983] The buggy address belongs to the physical page: [ 21.234638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ae3 [ 21.235680] flags: 0x200000000000000(node=0|zone=2) [ 21.236423] page_type: f5(slab) [ 21.236677] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.237147] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.237733] page dumped because: kasan: bad access detected [ 21.238373] [ 21.238632] Memory state around the buggy address: [ 21.239184] ffff888101ae3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.240143] ffff888101ae3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.240671] >ffff888101ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.241116] ^ [ 21.241357] ffff888101ae3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.241831] ffff888101ae3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.243123] ================================================================== [ 21.115075] ================================================================== [ 21.116349] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 21.117853] Write of size 1 at addr ffff888101ae3473 by task kunit_try_catch/144 [ 21.118490] [ 21.120632] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G N 6.13.0-rc1-next-20241204 #1 [ 21.121783] Tainted: [N]=TEST [ 21.122159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.123736] Call Trace: [ 21.124104] <TASK> [ 21.124850] dump_stack_lvl+0x73/0xb0 [ 21.125732] print_report+0xd1/0x640 [ 21.126135] ? __virt_addr_valid+0x1db/0x2d0 [ 21.126543] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.127094] kasan_report+0x102/0x140 [ 21.127525] ? kmalloc_oob_right+0x6f2/0x7f0 [ 21.127966] ? kmalloc_oob_right+0x6f2/0x7f0 [ 21.128375] __asan_report_store1_noabort+0x1b/0x30 [ 21.128919] kmalloc_oob_right+0x6f2/0x7f0 [ 21.129819] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 21.130168] ? __schedule+0xc3e/0x2790 [ 21.130681] ? __pfx_read_tsc+0x10/0x10 [ 21.131110] ? ktime_get_ts64+0x86/0x230 [ 21.131493] kunit_try_run_case+0x1b3/0x490 [ 21.132071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.132527] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.133008] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.133867] ? __kthread_parkme+0x82/0x160 [ 21.134193] ? preempt_count_sub+0x50/0x80 [ 21.134749] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.135295] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.135729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.136731] kthread+0x257/0x310 [ 21.137348] ? __pfx_kthread+0x10/0x10 [ 21.137619] ret_from_fork+0x41/0x80 [ 21.138352] ? __pfx_kthread+0x10/0x10 [ 21.138829] ret_from_fork_asm+0x1a/0x30 [ 21.139446] </TASK> [ 21.140116] [ 21.140452] Allocated by task 144: [ 21.141088] kasan_save_stack+0x3d/0x60 [ 21.141585] kasan_save_track+0x18/0x40 [ 21.141898] kasan_save_alloc_info+0x3b/0x50 [ 21.142362] __kasan_kmalloc+0xb7/0xc0 [ 21.142829] __kmalloc_cache_noprof+0x184/0x410 [ 21.143292] kmalloc_oob_right+0xaa/0x7f0 [ 21.143702] kunit_try_run_case+0x1b3/0x490 [ 21.144101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.144727] kthread+0x257/0x310 [ 21.144980] ret_from_fork+0x41/0x80 [ 21.145490] ret_from_fork_asm+0x1a/0x30 [ 21.146089] [ 21.146479] The buggy address belongs to the object at ffff888101ae3400 [ 21.146479] which belongs to the cache kmalloc-128 of size 128 [ 21.147689] The buggy address is located 0 bytes to the right of [ 21.147689] allocated 115-byte region [ffff888101ae3400, ffff888101ae3473) [ 21.149040] [ 21.149502] The buggy address belongs to the physical page: [ 21.150471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ae3 [ 21.151600] flags: 0x200000000000000(node=0|zone=2) [ 21.152848] page_type: f5(slab) [ 21.153926] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.154562] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.155412] page dumped because: kasan: bad access detected [ 21.155925] [ 21.156305] Memory state around the buggy address: [ 21.157320] ffff888101ae3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.158052] ffff888101ae3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.159206] >ffff888101ae3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.160056] ^ [ 21.160808] ffff888101ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.161565] ffff888101ae3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.162278] ================================================================== [ 21.165687] ================================================================== [ 21.166605] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 21.167200] Write of size 1 at addr ffff888101ae3478 by task kunit_try_catch/144 [ 21.167949] [ 21.168150] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 21.169188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.169624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.170586] Call Trace: [ 21.170959] <TASK> [ 21.171246] dump_stack_lvl+0x73/0xb0 [ 21.171738] print_report+0xd1/0x640 [ 21.172089] ? __virt_addr_valid+0x1db/0x2d0 [ 21.172629] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.173208] kasan_report+0x102/0x140 [ 21.173669] ? kmalloc_oob_right+0x6bf/0x7f0 [ 21.174230] ? kmalloc_oob_right+0x6bf/0x7f0 [ 21.174803] __asan_report_store1_noabort+0x1b/0x30 [ 21.175160] kmalloc_oob_right+0x6bf/0x7f0 [ 21.175677] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 21.176475] ? __schedule+0xc3e/0x2790 [ 21.176943] ? __pfx_read_tsc+0x10/0x10 [ 21.177591] ? ktime_get_ts64+0x86/0x230 [ 21.178099] kunit_try_run_case+0x1b3/0x490 [ 21.178638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.179060] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.179373] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.180282] ? __kthread_parkme+0x82/0x160 [ 21.180843] ? preempt_count_sub+0x50/0x80 [ 21.181299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.181820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.182453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.183189] kthread+0x257/0x310 [ 21.183674] ? __pfx_kthread+0x10/0x10 [ 21.184025] ret_from_fork+0x41/0x80 [ 21.184301] ? __pfx_kthread+0x10/0x10 [ 21.185331] ret_from_fork_asm+0x1a/0x30 [ 21.185892] </TASK> [ 21.186210] [ 21.187307] Allocated by task 144: [ 21.187611] kasan_save_stack+0x3d/0x60 [ 21.187919] kasan_save_track+0x18/0x40 [ 21.188224] kasan_save_alloc_info+0x3b/0x50 [ 21.188591] __kasan_kmalloc+0xb7/0xc0 [ 21.189081] __kmalloc_cache_noprof+0x184/0x410 [ 21.189470] kmalloc_oob_right+0xaa/0x7f0 [ 21.189989] kunit_try_run_case+0x1b3/0x490 [ 21.190432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.190798] kthread+0x257/0x310 [ 21.191218] ret_from_fork+0x41/0x80 [ 21.191618] ret_from_fork_asm+0x1a/0x30 [ 21.191978] [ 21.192143] The buggy address belongs to the object at ffff888101ae3400 [ 21.192143] which belongs to the cache kmalloc-128 of size 128 [ 21.193459] The buggy address is located 5 bytes to the right of [ 21.193459] allocated 115-byte region [ffff888101ae3400, ffff888101ae3473) [ 21.194556] [ 21.194776] The buggy address belongs to the physical page: [ 21.195186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ae3 [ 21.195766] flags: 0x200000000000000(node=0|zone=2) [ 21.196330] page_type: f5(slab) [ 21.196914] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.197607] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.198059] page dumped because: kasan: bad access detected [ 21.198877] [ 21.199088] Memory state around the buggy address: [ 21.199471] ffff888101ae3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.200182] ffff888101ae3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.200780] >ffff888101ae3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.201176] ^ [ 21.202061] ffff888101ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.203065] ffff888101ae3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.203772] ==================================================================