Date
Dec. 4, 2024, 3:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.795035] ================================================================== [ 32.796669] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750 [ 32.798048] Read of size 1 at addr fff00000c672c07f by task kunit_try_catch/182 [ 32.799024] [ 32.799447] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.800812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.801396] Hardware name: linux,dummy-virt (DT) [ 32.802297] Call trace: [ 32.803111] show_stack+0x20/0x38 (C) [ 32.804337] dump_stack_lvl+0x8c/0xd0 [ 32.805135] print_report+0x118/0x5e0 [ 32.805807] kasan_report+0xc8/0x118 [ 32.806373] __asan_report_load1_noabort+0x20/0x30 [ 32.807482] ksize_unpoisons_memory+0x6a0/0x750 [ 32.808442] kunit_try_run_case+0x14c/0x3d0 [ 32.809314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.810177] kthread+0x24c/0x2d0 [ 32.811859] ret_from_fork+0x10/0x20 [ 32.812410] [ 32.812835] Allocated by task 182: [ 32.813346] kasan_save_stack+0x3c/0x68 [ 32.813957] kasan_save_track+0x20/0x40 [ 32.814517] kasan_save_alloc_info+0x40/0x58 [ 32.815379] __kasan_kmalloc+0xd4/0xd8 [ 32.816382] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.817000] ksize_unpoisons_memory+0xc0/0x750 [ 32.818347] kunit_try_run_case+0x14c/0x3d0 [ 32.818872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.819293] kthread+0x24c/0x2d0 [ 32.819560] ret_from_fork+0x10/0x20 [ 32.819894] [ 32.820266] The buggy address belongs to the object at fff00000c672c000 [ 32.820266] which belongs to the cache kmalloc-128 of size 128 [ 32.823374] The buggy address is located 12 bytes to the right of [ 32.823374] allocated 115-byte region [fff00000c672c000, fff00000c672c073) [ 32.825003] [ 32.825354] The buggy address belongs to the physical page: [ 32.826671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10672c [ 32.828713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.829531] page_type: f5(slab) [ 32.830732] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.831709] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.832369] page dumped because: kasan: bad access detected [ 32.832746] [ 32.832915] Memory state around the buggy address: [ 32.833225] fff00000c672bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.833706] fff00000c672bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.834442] >fff00000c672c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.836506] ^ [ 32.837533] fff00000c672c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.839303] fff00000c672c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.840309] ================================================================== [ 32.744892] ================================================================== [ 32.746555] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750 [ 32.747255] Read of size 1 at addr fff00000c672c078 by task kunit_try_catch/182 [ 32.749184] [ 32.749783] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.751575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.752183] Hardware name: linux,dummy-virt (DT) [ 32.752645] Call trace: [ 32.753198] show_stack+0x20/0x38 (C) [ 32.754169] dump_stack_lvl+0x8c/0xd0 [ 32.755186] print_report+0x118/0x5e0 [ 32.756011] kasan_report+0xc8/0x118 [ 32.756826] __asan_report_load1_noabort+0x20/0x30 [ 32.757274] ksize_unpoisons_memory+0x628/0x750 [ 32.758898] kunit_try_run_case+0x14c/0x3d0 [ 32.759532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.760430] kthread+0x24c/0x2d0 [ 32.760992] ret_from_fork+0x10/0x20 [ 32.761570] [ 32.762420] Allocated by task 182: [ 32.763335] kasan_save_stack+0x3c/0x68 [ 32.763787] kasan_save_track+0x20/0x40 [ 32.764211] kasan_save_alloc_info+0x40/0x58 [ 32.764967] __kasan_kmalloc+0xd4/0xd8 [ 32.765662] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.766590] ksize_unpoisons_memory+0xc0/0x750 [ 32.767888] kunit_try_run_case+0x14c/0x3d0 [ 32.768378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.769438] kthread+0x24c/0x2d0 [ 32.770225] ret_from_fork+0x10/0x20 [ 32.771653] [ 32.772334] The buggy address belongs to the object at fff00000c672c000 [ 32.772334] which belongs to the cache kmalloc-128 of size 128 [ 32.774372] The buggy address is located 5 bytes to the right of [ 32.774372] allocated 115-byte region [fff00000c672c000, fff00000c672c073) [ 32.776345] [ 32.776652] The buggy address belongs to the physical page: [ 32.777391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10672c [ 32.779132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.780050] page_type: f5(slab) [ 32.780544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.782306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.783234] page dumped because: kasan: bad access detected [ 32.784292] [ 32.784546] Memory state around the buggy address: [ 32.785416] fff00000c672bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.786180] fff00000c672bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.788311] >fff00000c672c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.789375] ^ [ 32.790650] fff00000c672c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.791536] fff00000c672c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.792668] ================================================================== [ 32.697320] ================================================================== [ 32.699108] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750 [ 32.700444] Read of size 1 at addr fff00000c672c073 by task kunit_try_catch/182 [ 32.701350] [ 32.701712] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 32.704834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.706262] Hardware name: linux,dummy-virt (DT) [ 32.707585] Call trace: [ 32.708034] show_stack+0x20/0x38 (C) [ 32.708437] dump_stack_lvl+0x8c/0xd0 [ 32.709220] print_report+0x118/0x5e0 [ 32.709852] kasan_report+0xc8/0x118 [ 32.710490] __asan_report_load1_noabort+0x20/0x30 [ 32.711881] ksize_unpoisons_memory+0x638/0x750 [ 32.712431] kunit_try_run_case+0x14c/0x3d0 [ 32.712863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.713757] kthread+0x24c/0x2d0 [ 32.714315] ret_from_fork+0x10/0x20 [ 32.714978] [ 32.716045] Allocated by task 182: [ 32.716453] kasan_save_stack+0x3c/0x68 [ 32.716919] kasan_save_track+0x20/0x40 [ 32.717512] kasan_save_alloc_info+0x40/0x58 [ 32.718270] __kasan_kmalloc+0xd4/0xd8 [ 32.719514] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.720081] ksize_unpoisons_memory+0xc0/0x750 [ 32.720734] kunit_try_run_case+0x14c/0x3d0 [ 32.721321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.722809] kthread+0x24c/0x2d0 [ 32.723307] ret_from_fork+0x10/0x20 [ 32.724072] [ 32.724442] The buggy address belongs to the object at fff00000c672c000 [ 32.724442] which belongs to the cache kmalloc-128 of size 128 [ 32.726677] The buggy address is located 0 bytes to the right of [ 32.726677] allocated 115-byte region [fff00000c672c000, fff00000c672c073) [ 32.728078] [ 32.728458] The buggy address belongs to the physical page: [ 32.729520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10672c [ 32.730820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.731435] page_type: f5(slab) [ 32.732247] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.733136] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.734196] page dumped because: kasan: bad access detected [ 32.735405] [ 32.735735] Memory state around the buggy address: [ 32.736363] fff00000c672bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.737192] fff00000c672bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.738336] >fff00000c672c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.739487] ^ [ 32.740921] fff00000c672c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.741941] fff00000c672c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.743005] ==================================================================
[ 23.549044] ================================================================== [ 23.549579] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0 [ 23.550407] Read of size 1 at addr ffff88810298fe78 by task kunit_try_catch/202 [ 23.551381] [ 23.551795] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 23.553641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.554239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.555565] Call Trace: [ 23.555882] <TASK> [ 23.556306] dump_stack_lvl+0x73/0xb0 [ 23.557365] print_report+0xd1/0x640 [ 23.557764] ? __virt_addr_valid+0x1db/0x2d0 [ 23.558215] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.558757] kasan_report+0x102/0x140 [ 23.560501] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 23.560808] ? ksize_unpoisons_memory+0x7eb/0x9b0 [ 23.561956] __asan_report_load1_noabort+0x18/0x20 [ 23.563022] ksize_unpoisons_memory+0x7eb/0x9b0 [ 23.563451] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.564314] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 23.565074] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.566468] kunit_try_run_case+0x1b3/0x490 [ 23.566874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.567402] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.567852] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.568290] ? __kthread_parkme+0x82/0x160 [ 23.568717] ? preempt_count_sub+0x50/0x80 [ 23.569975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.570870] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.572004] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.572772] kthread+0x257/0x310 [ 23.573148] ? __pfx_kthread+0x10/0x10 [ 23.574113] ret_from_fork+0x41/0x80 [ 23.574636] ? __pfx_kthread+0x10/0x10 [ 23.575300] ret_from_fork_asm+0x1a/0x30 [ 23.575790] </TASK> [ 23.576116] [ 23.576339] Allocated by task 202: [ 23.576671] kasan_save_stack+0x3d/0x60 [ 23.577097] kasan_save_track+0x18/0x40 [ 23.577438] kasan_save_alloc_info+0x3b/0x50 [ 23.577743] __kasan_kmalloc+0xb7/0xc0 [ 23.578557] __kmalloc_cache_noprof+0x184/0x410 [ 23.579142] ksize_unpoisons_memory+0xc8/0x9b0 [ 23.580155] kunit_try_run_case+0x1b3/0x490 [ 23.580773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.581455] kthread+0x257/0x310 [ 23.581866] ret_from_fork+0x41/0x80 [ 23.582186] ret_from_fork_asm+0x1a/0x30 [ 23.583071] [ 23.583526] The buggy address belongs to the object at ffff88810298fe00 [ 23.583526] which belongs to the cache kmalloc-128 of size 128 [ 23.584651] The buggy address is located 5 bytes to the right of [ 23.584651] allocated 115-byte region [ffff88810298fe00, ffff88810298fe73) [ 23.585970] [ 23.586177] The buggy address belongs to the physical page: [ 23.587133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298f [ 23.587888] flags: 0x200000000000000(node=0|zone=2) [ 23.588615] page_type: f5(slab) [ 23.588881] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.589719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.590768] page dumped because: kasan: bad access detected [ 23.591258] [ 23.591487] Memory state around the buggy address: [ 23.591881] ffff88810298fd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.592553] ffff88810298fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.593203] >ffff88810298fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.593971] ^ [ 23.594747] ffff88810298fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.595343] ffff88810298ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.596721] ================================================================== [ 23.597701] ================================================================== [ 23.598136] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0 [ 23.598927] Read of size 1 at addr ffff88810298fe7f by task kunit_try_catch/202 [ 23.600351] [ 23.600618] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 23.601537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.601895] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.603540] Call Trace: [ 23.603941] <TASK> [ 23.604496] dump_stack_lvl+0x73/0xb0 [ 23.605191] print_report+0xd1/0x640 [ 23.605541] ? __virt_addr_valid+0x1db/0x2d0 [ 23.606080] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.606617] kasan_report+0x102/0x140 [ 23.607749] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 23.608202] ? ksize_unpoisons_memory+0x7b8/0x9b0 [ 23.608861] __asan_report_load1_noabort+0x18/0x20 [ 23.609501] ksize_unpoisons_memory+0x7b8/0x9b0 [ 23.609997] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.610425] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 23.611209] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.611863] kunit_try_run_case+0x1b3/0x490 [ 23.612222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.612876] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.613670] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.614706] ? __kthread_parkme+0x82/0x160 [ 23.615199] ? preempt_count_sub+0x50/0x80 [ 23.615594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.615994] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.616568] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.617441] kthread+0x257/0x310 [ 23.617991] ? __pfx_kthread+0x10/0x10 [ 23.619026] ret_from_fork+0x41/0x80 [ 23.619653] ? __pfx_kthread+0x10/0x10 [ 23.619997] ret_from_fork_asm+0x1a/0x30 [ 23.620754] </TASK> [ 23.621108] [ 23.621266] Allocated by task 202: [ 23.621916] kasan_save_stack+0x3d/0x60 [ 23.622422] kasan_save_track+0x18/0x40 [ 23.623171] kasan_save_alloc_info+0x3b/0x50 [ 23.623781] __kasan_kmalloc+0xb7/0xc0 [ 23.624291] __kmalloc_cache_noprof+0x184/0x410 [ 23.624785] ksize_unpoisons_memory+0xc8/0x9b0 [ 23.625311] kunit_try_run_case+0x1b3/0x490 [ 23.625777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.626448] kthread+0x257/0x310 [ 23.626898] ret_from_fork+0x41/0x80 [ 23.627720] ret_from_fork_asm+0x1a/0x30 [ 23.628044] [ 23.628463] The buggy address belongs to the object at ffff88810298fe00 [ 23.628463] which belongs to the cache kmalloc-128 of size 128 [ 23.629734] The buggy address is located 12 bytes to the right of [ 23.629734] allocated 115-byte region [ffff88810298fe00, ffff88810298fe73) [ 23.630495] [ 23.630739] The buggy address belongs to the physical page: [ 23.631506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298f [ 23.632099] flags: 0x200000000000000(node=0|zone=2) [ 23.632420] page_type: f5(slab) [ 23.632832] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.634332] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.634906] page dumped because: kasan: bad access detected [ 23.636163] [ 23.637155] Memory state around the buggy address: [ 23.637597] ffff88810298fd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.638868] ffff88810298fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.639767] >ffff88810298fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.640188] ^ [ 23.641204] ffff88810298fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.641938] ffff88810298ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.643108] ================================================================== [ 23.494972] ================================================================== [ 23.496268] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0 [ 23.497580] Read of size 1 at addr ffff88810298fe73 by task kunit_try_catch/202 [ 23.497920] [ 23.498134] CPU: 1 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 23.499731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.500205] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.501892] Call Trace: [ 23.502445] <TASK> [ 23.503255] dump_stack_lvl+0x73/0xb0 [ 23.504127] print_report+0xd1/0x640 [ 23.505118] ? __virt_addr_valid+0x1db/0x2d0 [ 23.505889] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.506786] kasan_report+0x102/0x140 [ 23.507109] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 23.507663] ? ksize_unpoisons_memory+0x81e/0x9b0 [ 23.508432] __asan_report_load1_noabort+0x18/0x20 [ 23.508921] ksize_unpoisons_memory+0x81e/0x9b0 [ 23.509392] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.510462] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 23.511055] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 23.511975] kunit_try_run_case+0x1b3/0x490 [ 23.512641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.513211] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.514059] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.515002] ? __kthread_parkme+0x82/0x160 [ 23.516002] ? preempt_count_sub+0x50/0x80 [ 23.516550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.517087] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.518161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.519309] kthread+0x257/0x310 [ 23.519808] ? __pfx_kthread+0x10/0x10 [ 23.520250] ret_from_fork+0x41/0x80 [ 23.521057] ? __pfx_kthread+0x10/0x10 [ 23.521582] ret_from_fork_asm+0x1a/0x30 [ 23.522283] </TASK> [ 23.522757] [ 23.522972] Allocated by task 202: [ 23.523312] kasan_save_stack+0x3d/0x60 [ 23.524370] kasan_save_track+0x18/0x40 [ 23.524819] kasan_save_alloc_info+0x3b/0x50 [ 23.525236] __kasan_kmalloc+0xb7/0xc0 [ 23.525627] __kmalloc_cache_noprof+0x184/0x410 [ 23.526089] ksize_unpoisons_memory+0xc8/0x9b0 [ 23.527228] kunit_try_run_case+0x1b3/0x490 [ 23.527826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.528632] kthread+0x257/0x310 [ 23.529173] ret_from_fork+0x41/0x80 [ 23.529862] ret_from_fork_asm+0x1a/0x30 [ 23.530211] [ 23.530518] The buggy address belongs to the object at ffff88810298fe00 [ 23.530518] which belongs to the cache kmalloc-128 of size 128 [ 23.532095] The buggy address is located 0 bytes to the right of [ 23.532095] allocated 115-byte region [ffff88810298fe00, ffff88810298fe73) [ 23.533832] [ 23.534098] The buggy address belongs to the physical page: [ 23.535084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10298f [ 23.536124] flags: 0x200000000000000(node=0|zone=2) [ 23.536888] page_type: f5(slab) [ 23.537168] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.538537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.539148] page dumped because: kasan: bad access detected [ 23.539740] [ 23.540436] Memory state around the buggy address: [ 23.540820] ffff88810298fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 23.541564] ffff88810298fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.542787] >ffff88810298fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.543534] ^ [ 23.544387] ffff88810298fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.544993] ffff88810298ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.545584] ==================================================================