Hay
Date
Dec. 4, 2024, 3:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.478515] ==================================================================
[   30.479507] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   30.480359] Write of size 1 at addr fff00000c66da078 by task kunit_try_catch/124
[   30.481063] 
[   30.481333] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.482896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.483445] Hardware name: linux,dummy-virt (DT)
[   30.484265] Call trace:
[   30.484678]  show_stack+0x20/0x38 (C)
[   30.485849]  dump_stack_lvl+0x8c/0xd0
[   30.486875]  print_report+0x118/0x5e0
[   30.487696]  kasan_report+0xc8/0x118
[   30.488117]  __asan_report_store1_noabort+0x20/0x30
[   30.488672]  kmalloc_oob_right+0x538/0x660
[   30.489148]  kunit_try_run_case+0x14c/0x3d0
[   30.490641]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.491608]  kthread+0x24c/0x2d0
[   30.492156]  ret_from_fork+0x10/0x20
[   30.492780] 
[   30.493099] Allocated by task 124:
[   30.493664]  kasan_save_stack+0x3c/0x68
[   30.494274]  kasan_save_track+0x20/0x40
[   30.495802]  kasan_save_alloc_info+0x40/0x58
[   30.496377]  __kasan_kmalloc+0xd4/0xd8
[   30.496942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.498001]  kmalloc_oob_right+0xb0/0x660
[   30.498658]  kunit_try_run_case+0x14c/0x3d0
[   30.499229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.500302]  kthread+0x24c/0x2d0
[   30.500804]  ret_from_fork+0x10/0x20
[   30.501357] 
[   30.502721] The buggy address belongs to the object at fff00000c66da000
[   30.502721]  which belongs to the cache kmalloc-128 of size 128
[   30.504171] The buggy address is located 5 bytes to the right of
[   30.504171]  allocated 115-byte region [fff00000c66da000, fff00000c66da073)
[   30.506311] 
[   30.506574] The buggy address belongs to the physical page:
[   30.507406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da
[   30.508326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.509345] page_type: f5(slab)
[   30.509861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.511787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.512711] page dumped because: kasan: bad access detected
[   30.513338] 
[   30.514134] Memory state around the buggy address:
[   30.514670]  fff00000c66d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.515620]  fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.516583] >fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.517487]                                                                 ^
[   30.518455]  fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.519188]  fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.520142] ==================================================================
[   30.425199] ==================================================================
[   30.427052] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   30.429365] Write of size 1 at addr fff00000c66da073 by task kunit_try_catch/124
[   30.430414] 
[   30.432816] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241204 #1
[   30.434575] Tainted: [N]=TEST
[   30.435415] Hardware name: linux,dummy-virt (DT)
[   30.437175] Call trace:
[   30.438148]  show_stack+0x20/0x38 (C)
[   30.438994]  dump_stack_lvl+0x8c/0xd0
[   30.439700]  print_report+0x118/0x5e0
[   30.440227]  kasan_report+0xc8/0x118
[   30.440847]  __asan_report_store1_noabort+0x20/0x30
[   30.441537]  kmalloc_oob_right+0x5a4/0x660
[   30.442194]  kunit_try_run_case+0x14c/0x3d0
[   30.442955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.443612]  kthread+0x24c/0x2d0
[   30.444301]  ret_from_fork+0x10/0x20
[   30.445100] 
[   30.445576] Allocated by task 124:
[   30.446575]  kasan_save_stack+0x3c/0x68
[   30.447153]  kasan_save_track+0x20/0x40
[   30.447839]  kasan_save_alloc_info+0x40/0x58
[   30.448420]  __kasan_kmalloc+0xd4/0xd8
[   30.449028]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.449603]  kmalloc_oob_right+0xb0/0x660
[   30.450412]  kunit_try_run_case+0x14c/0x3d0
[   30.451099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.452302]  kthread+0x24c/0x2d0
[   30.452937]  ret_from_fork+0x10/0x20
[   30.453592] 
[   30.455198] The buggy address belongs to the object at fff00000c66da000
[   30.455198]  which belongs to the cache kmalloc-128 of size 128
[   30.456616] The buggy address is located 0 bytes to the right of
[   30.456616]  allocated 115-byte region [fff00000c66da000, fff00000c66da073)
[   30.458498] 
[   30.459047] The buggy address belongs to the physical page:
[   30.460197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da
[   30.461499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.463381] page_type: f5(slab)
[   30.464478] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.465439] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.466951] page dumped because: kasan: bad access detected
[   30.467524] 
[   30.467841] Memory state around the buggy address:
[   30.468746]  fff00000c66d9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.470458]  fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.471803] >fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.472566]                                                              ^
[   30.473300]  fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.474083]  fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.475037] ==================================================================
[   30.521889] ==================================================================
[   30.522989] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   30.524262] Read of size 1 at addr fff00000c66da080 by task kunit_try_catch/124
[   30.525577] 
[   30.526095] CPU: 1 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   30.527784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.528199] Hardware name: linux,dummy-virt (DT)
[   30.528868] Call trace:
[   30.529240]  show_stack+0x20/0x38 (C)
[   30.529685]  dump_stack_lvl+0x8c/0xd0
[   30.530779]  print_report+0x118/0x5e0
[   30.531956]  kasan_report+0xc8/0x118
[   30.532975]  __asan_report_load1_noabort+0x20/0x30
[   30.533668]  kmalloc_oob_right+0x5d0/0x660
[   30.534833]  kunit_try_run_case+0x14c/0x3d0
[   30.535779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.536784]  kthread+0x24c/0x2d0
[   30.537169]  ret_from_fork+0x10/0x20
[   30.538175] 
[   30.538537] Allocated by task 124:
[   30.539488]  kasan_save_stack+0x3c/0x68
[   30.540195]  kasan_save_track+0x20/0x40
[   30.540494]  kasan_save_alloc_info+0x40/0x58
[   30.540916]  __kasan_kmalloc+0xd4/0xd8
[   30.541568]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.543358]  kmalloc_oob_right+0xb0/0x660
[   30.543797]  kunit_try_run_case+0x14c/0x3d0
[   30.544617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.545376]  kthread+0x24c/0x2d0
[   30.545856]  ret_from_fork+0x10/0x20
[   30.546497] 
[   30.546937] The buggy address belongs to the object at fff00000c66da000
[   30.546937]  which belongs to the cache kmalloc-128 of size 128
[   30.549380] The buggy address is located 13 bytes to the right of
[   30.549380]  allocated 115-byte region [fff00000c66da000, fff00000c66da073)
[   30.551347] 
[   30.551614] The buggy address belongs to the physical page:
[   30.552165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066da
[   30.552942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.553539] page_type: f5(slab)
[   30.554735] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.555954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.557007] page dumped because: kasan: bad access detected
[   30.558137] 
[   30.558392] Memory state around the buggy address:
[   30.559540]  fff00000c66d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.560831]  fff00000c66da000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.561933] >fff00000c66da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.563341]                    ^
[   30.564064]  fff00000c66da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.565018]  fff00000c66da180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.566457] ==================================================================

[   21.204942] ==================================================================
[   21.206157] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   21.206887] Read of size 1 at addr ffff888101ae3480 by task kunit_try_catch/144
[   21.207509] 
[   21.207813] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   21.208834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.209369] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.210047] Call Trace:
[   21.210509]  <TASK>
[   21.210787]  dump_stack_lvl+0x73/0xb0
[   21.211367]  print_report+0xd1/0x640
[   21.211852]  ? __virt_addr_valid+0x1db/0x2d0
[   21.212162]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.212853]  kasan_report+0x102/0x140
[   21.213446]  ? kmalloc_oob_right+0x68c/0x7f0
[   21.213893]  ? kmalloc_oob_right+0x68c/0x7f0
[   21.214504]  __asan_report_load1_noabort+0x18/0x20
[   21.215023]  kmalloc_oob_right+0x68c/0x7f0
[   21.215449]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   21.216079]  ? __schedule+0xc3e/0x2790
[   21.216466]  ? __pfx_read_tsc+0x10/0x10
[   21.216962]  ? ktime_get_ts64+0x86/0x230
[   21.217525]  kunit_try_run_case+0x1b3/0x490
[   21.217986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.218574]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.219110]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.219666]  ? __kthread_parkme+0x82/0x160
[   21.220208]  ? preempt_count_sub+0x50/0x80
[   21.220781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.221210]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.221953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.222508]  kthread+0x257/0x310
[   21.222976]  ? __pfx_kthread+0x10/0x10
[   21.223258]  ret_from_fork+0x41/0x80
[   21.223829]  ? __pfx_kthread+0x10/0x10
[   21.224152]  ret_from_fork_asm+0x1a/0x30
[   21.224827]  </TASK>
[   21.225092] 
[   21.225351] Allocated by task 144:
[   21.225640]  kasan_save_stack+0x3d/0x60
[   21.225938]  kasan_save_track+0x18/0x40
[   21.226206]  kasan_save_alloc_info+0x3b/0x50
[   21.226502]  __kasan_kmalloc+0xb7/0xc0
[   21.226870]  __kmalloc_cache_noprof+0x184/0x410
[   21.227687]  kmalloc_oob_right+0xaa/0x7f0
[   21.228204]  kunit_try_run_case+0x1b3/0x490
[   21.228869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.229524]  kthread+0x257/0x310
[   21.229801]  ret_from_fork+0x41/0x80
[   21.230282]  ret_from_fork_asm+0x1a/0x30
[   21.230855] 
[   21.231171] The buggy address belongs to the object at ffff888101ae3400
[   21.231171]  which belongs to the cache kmalloc-128 of size 128
[   21.232595] The buggy address is located 13 bytes to the right of
[   21.232595]  allocated 115-byte region [ffff888101ae3400, ffff888101ae3473)
[   21.233822] 
[   21.233983] The buggy address belongs to the physical page:
[   21.234638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ae3
[   21.235680] flags: 0x200000000000000(node=0|zone=2)
[   21.236423] page_type: f5(slab)
[   21.236677] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.237147] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.237733] page dumped because: kasan: bad access detected
[   21.238373] 
[   21.238632] Memory state around the buggy address:
[   21.239184]  ffff888101ae3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.240143]  ffff888101ae3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.240671] >ffff888101ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.241116]                    ^
[   21.241357]  ffff888101ae3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.241831]  ffff888101ae3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.243123] ==================================================================
[   21.115075] ==================================================================
[   21.116349] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   21.117853] Write of size 1 at addr ffff888101ae3473 by task kunit_try_catch/144
[   21.118490] 
[   21.120632] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241204 #1
[   21.121783] Tainted: [N]=TEST
[   21.122159] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.123736] Call Trace:
[   21.124104]  <TASK>
[   21.124850]  dump_stack_lvl+0x73/0xb0
[   21.125732]  print_report+0xd1/0x640
[   21.126135]  ? __virt_addr_valid+0x1db/0x2d0
[   21.126543]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.127094]  kasan_report+0x102/0x140
[   21.127525]  ? kmalloc_oob_right+0x6f2/0x7f0
[   21.127966]  ? kmalloc_oob_right+0x6f2/0x7f0
[   21.128375]  __asan_report_store1_noabort+0x1b/0x30
[   21.128919]  kmalloc_oob_right+0x6f2/0x7f0
[   21.129819]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   21.130168]  ? __schedule+0xc3e/0x2790
[   21.130681]  ? __pfx_read_tsc+0x10/0x10
[   21.131110]  ? ktime_get_ts64+0x86/0x230
[   21.131493]  kunit_try_run_case+0x1b3/0x490
[   21.132071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.132527]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.133008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.133867]  ? __kthread_parkme+0x82/0x160
[   21.134193]  ? preempt_count_sub+0x50/0x80
[   21.134749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.135295]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.135729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.136731]  kthread+0x257/0x310
[   21.137348]  ? __pfx_kthread+0x10/0x10
[   21.137619]  ret_from_fork+0x41/0x80
[   21.138352]  ? __pfx_kthread+0x10/0x10
[   21.138829]  ret_from_fork_asm+0x1a/0x30
[   21.139446]  </TASK>
[   21.140116] 
[   21.140452] Allocated by task 144:
[   21.141088]  kasan_save_stack+0x3d/0x60
[   21.141585]  kasan_save_track+0x18/0x40
[   21.141898]  kasan_save_alloc_info+0x3b/0x50
[   21.142362]  __kasan_kmalloc+0xb7/0xc0
[   21.142829]  __kmalloc_cache_noprof+0x184/0x410
[   21.143292]  kmalloc_oob_right+0xaa/0x7f0
[   21.143702]  kunit_try_run_case+0x1b3/0x490
[   21.144101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.144727]  kthread+0x257/0x310
[   21.144980]  ret_from_fork+0x41/0x80
[   21.145490]  ret_from_fork_asm+0x1a/0x30
[   21.146089] 
[   21.146479] The buggy address belongs to the object at ffff888101ae3400
[   21.146479]  which belongs to the cache kmalloc-128 of size 128
[   21.147689] The buggy address is located 0 bytes to the right of
[   21.147689]  allocated 115-byte region [ffff888101ae3400, ffff888101ae3473)
[   21.149040] 
[   21.149502] The buggy address belongs to the physical page:
[   21.150471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ae3
[   21.151600] flags: 0x200000000000000(node=0|zone=2)
[   21.152848] page_type: f5(slab)
[   21.153926] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.154562] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.155412] page dumped because: kasan: bad access detected
[   21.155925] 
[   21.156305] Memory state around the buggy address:
[   21.157320]  ffff888101ae3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.158052]  ffff888101ae3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159206] >ffff888101ae3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.160056]                                                              ^
[   21.160808]  ffff888101ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.161565]  ffff888101ae3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.162278] ==================================================================
[   21.165687] ==================================================================
[   21.166605] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   21.167200] Write of size 1 at addr ffff888101ae3478 by task kunit_try_catch/144
[   21.167949] 
[   21.168150] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241204 #1
[   21.169188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.169624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.170586] Call Trace:
[   21.170959]  <TASK>
[   21.171246]  dump_stack_lvl+0x73/0xb0
[   21.171738]  print_report+0xd1/0x640
[   21.172089]  ? __virt_addr_valid+0x1db/0x2d0
[   21.172629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.173208]  kasan_report+0x102/0x140
[   21.173669]  ? kmalloc_oob_right+0x6bf/0x7f0
[   21.174230]  ? kmalloc_oob_right+0x6bf/0x7f0
[   21.174803]  __asan_report_store1_noabort+0x1b/0x30
[   21.175160]  kmalloc_oob_right+0x6bf/0x7f0
[   21.175677]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   21.176475]  ? __schedule+0xc3e/0x2790
[   21.176943]  ? __pfx_read_tsc+0x10/0x10
[   21.177591]  ? ktime_get_ts64+0x86/0x230
[   21.178099]  kunit_try_run_case+0x1b3/0x490
[   21.178638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.179060]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.179373]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.180282]  ? __kthread_parkme+0x82/0x160
[   21.180843]  ? preempt_count_sub+0x50/0x80
[   21.181299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.181820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.182453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.183189]  kthread+0x257/0x310
[   21.183674]  ? __pfx_kthread+0x10/0x10
[   21.184025]  ret_from_fork+0x41/0x80
[   21.184301]  ? __pfx_kthread+0x10/0x10
[   21.185331]  ret_from_fork_asm+0x1a/0x30
[   21.185892]  </TASK>
[   21.186210] 
[   21.187307] Allocated by task 144:
[   21.187611]  kasan_save_stack+0x3d/0x60
[   21.187919]  kasan_save_track+0x18/0x40
[   21.188224]  kasan_save_alloc_info+0x3b/0x50
[   21.188591]  __kasan_kmalloc+0xb7/0xc0
[   21.189081]  __kmalloc_cache_noprof+0x184/0x410
[   21.189470]  kmalloc_oob_right+0xaa/0x7f0
[   21.189989]  kunit_try_run_case+0x1b3/0x490
[   21.190432]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.190798]  kthread+0x257/0x310
[   21.191218]  ret_from_fork+0x41/0x80
[   21.191618]  ret_from_fork_asm+0x1a/0x30
[   21.191978] 
[   21.192143] The buggy address belongs to the object at ffff888101ae3400
[   21.192143]  which belongs to the cache kmalloc-128 of size 128
[   21.193459] The buggy address is located 5 bytes to the right of
[   21.193459]  allocated 115-byte region [ffff888101ae3400, ffff888101ae3473)
[   21.194556] 
[   21.194776] The buggy address belongs to the physical page:
[   21.195186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ae3
[   21.195766] flags: 0x200000000000000(node=0|zone=2)
[   21.196330] page_type: f5(slab)
[   21.196914] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.197607] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.198059] page dumped because: kasan: bad access detected
[   21.198877] 
[   21.199088] Memory state around the buggy address:
[   21.199471]  ffff888101ae3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.200182]  ffff888101ae3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.200780] >ffff888101ae3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.201176]                                                                 ^
[   21.202061]  ffff888101ae3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.203065]  ffff888101ae3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.203772] ==================================================================