Hay
Date
Dec. 5, 2024, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   28.794488] ==================================================================
[   28.795337] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   28.796261] Read of size 1 at addr fff00000c6397d80 by task kunit_try_catch/125
[   28.797233] 
[   28.797670] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.798824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.799863] Hardware name: linux,dummy-virt (DT)
[   28.800575] Call trace:
[   28.801049]  show_stack+0x20/0x38 (C)
[   28.801566]  dump_stack_lvl+0x8c/0xd0
[   28.802251]  print_report+0x118/0x5e0
[   28.802826]  kasan_report+0xc8/0x118
[   28.803377]  __asan_report_load1_noabort+0x20/0x30
[   28.804723]  kmalloc_oob_right+0x5d0/0x660
[   28.805411]  kunit_try_run_case+0x14c/0x3d0
[   28.806073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.806805]  kthread+0x24c/0x2d0
[   28.807450]  ret_from_fork+0x10/0x20
[   28.807992] 
[   28.808357] Allocated by task 125:
[   28.808836]  kasan_save_stack+0x3c/0x68
[   28.810400]  kasan_save_track+0x20/0x40
[   28.810973]  kasan_save_alloc_info+0x40/0x58
[   28.811775]  __kasan_kmalloc+0xd4/0xd8
[   28.812383]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.813023]  kmalloc_oob_right+0xb0/0x660
[   28.813718]  kunit_try_run_case+0x14c/0x3d0
[   28.814482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.815704]  kthread+0x24c/0x2d0
[   28.816147]  ret_from_fork+0x10/0x20
[   28.816649] 
[   28.817022] The buggy address belongs to the object at fff00000c6397d00
[   28.817022]  which belongs to the cache kmalloc-128 of size 128
[   28.818408] The buggy address is located 13 bytes to the right of
[   28.818408]  allocated 115-byte region [fff00000c6397d00, fff00000c6397d73)
[   28.819835] 
[   28.820542] The buggy address belongs to the physical page:
[   28.821254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   28.822307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.823115] page_type: f5(slab)
[   28.824295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.825231] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.826115] page dumped because: kasan: bad access detected
[   28.826734] 
[   28.827096] Memory state around the buggy address:
[   28.827711]  fff00000c6397c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.828964]  fff00000c6397d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.829794] >fff00000c6397d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.830847]                    ^
[   28.831675]  fff00000c6397e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.832574]  fff00000c6397e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.833524] ==================================================================
[   28.701270] ==================================================================
[   28.702711] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   28.704855] Write of size 1 at addr fff00000c6397d73 by task kunit_try_catch/125
[   28.705762] 
[   28.707551] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241205 #1
[   28.708952] Tainted: [N]=TEST
[   28.709452] Hardware name: linux,dummy-virt (DT)
[   28.710562] Call trace:
[   28.711255]  show_stack+0x20/0x38 (C)
[   28.712295]  dump_stack_lvl+0x8c/0xd0
[   28.712895]  print_report+0x118/0x5e0
[   28.713428]  kasan_report+0xc8/0x118
[   28.714043]  __asan_report_store1_noabort+0x20/0x30
[   28.714770]  kmalloc_oob_right+0x5a4/0x660
[   28.715697]  kunit_try_run_case+0x14c/0x3d0
[   28.716149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.716920]  kthread+0x24c/0x2d0
[   28.717383]  ret_from_fork+0x10/0x20
[   28.718308] 
[   28.718696] Allocated by task 125:
[   28.719367]  kasan_save_stack+0x3c/0x68
[   28.720296]  kasan_save_track+0x20/0x40
[   28.720731]  kasan_save_alloc_info+0x40/0x58
[   28.721318]  __kasan_kmalloc+0xd4/0xd8
[   28.721925]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.722506]  kmalloc_oob_right+0xb0/0x660
[   28.723160]  kunit_try_run_case+0x14c/0x3d0
[   28.723783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.725250]  kthread+0x24c/0x2d0
[   28.725742]  ret_from_fork+0x10/0x20
[   28.726398] 
[   28.726802] The buggy address belongs to the object at fff00000c6397d00
[   28.726802]  which belongs to the cache kmalloc-128 of size 128
[   28.728685] The buggy address is located 0 bytes to the right of
[   28.728685]  allocated 115-byte region [fff00000c6397d00, fff00000c6397d73)
[   28.730225] 
[   28.730705] The buggy address belongs to the physical page:
[   28.732141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   28.733402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.734727] page_type: f5(slab)
[   28.735944] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.736868] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.737943] page dumped because: kasan: bad access detected
[   28.738677] 
[   28.739023] Memory state around the buggy address:
[   28.740359]  fff00000c6397c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.741292]  fff00000c6397c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.742239] >fff00000c6397d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.743563]                                                              ^
[   28.744650]  fff00000c6397d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.745406]  fff00000c6397e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.746338] ==================================================================
[   28.751248] ==================================================================
[   28.752676] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   28.753530] Write of size 1 at addr fff00000c6397d78 by task kunit_try_catch/125
[   28.754423] 
[   28.754765] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.756795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.757299] Hardware name: linux,dummy-virt (DT)
[   28.757925] Call trace:
[   28.758297]  show_stack+0x20/0x38 (C)
[   28.759024]  dump_stack_lvl+0x8c/0xd0
[   28.759667]  print_report+0x118/0x5e0
[   28.760356]  kasan_report+0xc8/0x118
[   28.761295]  __asan_report_store1_noabort+0x20/0x30
[   28.761866]  kmalloc_oob_right+0x538/0x660
[   28.762621]  kunit_try_run_case+0x14c/0x3d0
[   28.763803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.764497]  kthread+0x24c/0x2d0
[   28.765073]  ret_from_fork+0x10/0x20
[   28.765603] 
[   28.765995] Allocated by task 125:
[   28.766542]  kasan_save_stack+0x3c/0x68
[   28.767085]  kasan_save_track+0x20/0x40
[   28.768483]  kasan_save_alloc_info+0x40/0x58
[   28.769323]  __kasan_kmalloc+0xd4/0xd8
[   28.769932]  __kmalloc_cache_noprof+0x15c/0x3c0
[   28.770549]  kmalloc_oob_right+0xb0/0x660
[   28.771145]  kunit_try_run_case+0x14c/0x3d0
[   28.771994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.773127]  kthread+0x24c/0x2d0
[   28.773685]  ret_from_fork+0x10/0x20
[   28.774282] 
[   28.774666] The buggy address belongs to the object at fff00000c6397d00
[   28.774666]  which belongs to the cache kmalloc-128 of size 128
[   28.776385] The buggy address is located 5 bytes to the right of
[   28.776385]  allocated 115-byte region [fff00000c6397d00, fff00000c6397d73)
[   28.777841] 
[   28.778635] The buggy address belongs to the physical page:
[   28.779858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106397
[   28.781039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.781903] page_type: f5(slab)
[   28.782375] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.783772] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.784530] page dumped because: kasan: bad access detected
[   28.784863] 
[   28.785508] Memory state around the buggy address:
[   28.786150]  fff00000c6397c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.786979]  fff00000c6397c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.788317] >fff00000c6397d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.789170]                                                                 ^
[   28.790034]  fff00000c6397d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.790934]  fff00000c6397e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.791972] ==================================================================

[   26.295904] ==================================================================
[   26.296817] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   26.297409] Write of size 1 at addr ffff8881029f9178 by task kunit_try_catch/143
[   26.298091] 
[   26.298300] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   26.299113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.299474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.300363] Call Trace:
[   26.300579]  <TASK>
[   26.300962]  dump_stack_lvl+0x73/0xb0
[   26.301435]  print_report+0xd1/0x640
[   26.301842]  ? __virt_addr_valid+0x1db/0x2d0
[   26.302393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.302952]  kasan_report+0x102/0x140
[   26.303432]  ? kmalloc_oob_right+0x6bf/0x7f0
[   26.304019]  ? kmalloc_oob_right+0x6bf/0x7f0
[   26.304355]  __asan_report_store1_noabort+0x1b/0x30
[   26.304988]  kmalloc_oob_right+0x6bf/0x7f0
[   26.305375]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   26.305796]  ? __schedule+0xc70/0x27e0
[   26.306287]  ? __pfx_read_tsc+0x10/0x10
[   26.306610]  ? ktime_get_ts64+0x86/0x230
[   26.307130]  kunit_try_run_case+0x1b3/0x490
[   26.307524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.308181]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.308596]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.309081]  ? __kthread_parkme+0x82/0x160
[   26.309526]  ? preempt_count_sub+0x50/0x80
[   26.309971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.310347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.311119]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.311644]  kthread+0x257/0x310
[   26.312020]  ? __pfx_kthread+0x10/0x10
[   26.312404]  ret_from_fork+0x41/0x80
[   26.312705]  ? __pfx_kthread+0x10/0x10
[   26.313196]  ret_from_fork_asm+0x1a/0x30
[   26.313750]  </TASK>
[   26.314103] 
[   26.314334] Allocated by task 143:
[   26.314668]  kasan_save_stack+0x3d/0x60
[   26.315147]  kasan_save_track+0x18/0x40
[   26.315517]  kasan_save_alloc_info+0x3b/0x50
[   26.317014]  __kasan_kmalloc+0xb7/0xc0
[   26.317406]  __kmalloc_cache_noprof+0x184/0x410
[   26.318333]  kmalloc_oob_right+0xaa/0x7f0
[   26.318971]  kunit_try_run_case+0x1b3/0x490
[   26.319560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.320081]  kthread+0x257/0x310
[   26.320488]  ret_from_fork+0x41/0x80
[   26.321113]  ret_from_fork_asm+0x1a/0x30
[   26.321515] 
[   26.321707] The buggy address belongs to the object at ffff8881029f9100
[   26.321707]  which belongs to the cache kmalloc-128 of size 128
[   26.323408] The buggy address is located 5 bytes to the right of
[   26.323408]  allocated 115-byte region [ffff8881029f9100, ffff8881029f9173)
[   26.325129] 
[   26.325338] The buggy address belongs to the physical page:
[   26.326275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   26.327386] flags: 0x200000000000000(node=0|zone=2)
[   26.327890] page_type: f5(slab)
[   26.328239] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.329344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.330128] page dumped because: kasan: bad access detected
[   26.330352] 
[   26.330449] Memory state around the buggy address:
[   26.330648]  ffff8881029f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.331924]  ffff8881029f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.332597] >ffff8881029f9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.333226]                                                                 ^
[   26.334391]  ffff8881029f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.335442]  ffff8881029f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.336290] ==================================================================
[   26.337577] ==================================================================
[   26.338815] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   26.339374] Read of size 1 at addr ffff8881029f9180 by task kunit_try_catch/143
[   26.339974] 
[   26.340269] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   26.341237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.341623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.342293] Call Trace:
[   26.342694]  <TASK>
[   26.343480]  dump_stack_lvl+0x73/0xb0
[   26.344061]  print_report+0xd1/0x640
[   26.344466]  ? __virt_addr_valid+0x1db/0x2d0
[   26.345217]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.345598]  kasan_report+0x102/0x140
[   26.346039]  ? kmalloc_oob_right+0x68c/0x7f0
[   26.346451]  ? kmalloc_oob_right+0x68c/0x7f0
[   26.346955]  __asan_report_load1_noabort+0x18/0x20
[   26.347412]  kmalloc_oob_right+0x68c/0x7f0
[   26.348005]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   26.348602]  ? __schedule+0xc70/0x27e0
[   26.349143]  ? __pfx_read_tsc+0x10/0x10
[   26.349634]  ? ktime_get_ts64+0x86/0x230
[   26.350147]  kunit_try_run_case+0x1b3/0x490
[   26.350713]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.351319]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.351815]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.352323]  ? __kthread_parkme+0x82/0x160
[   26.352893]  ? preempt_count_sub+0x50/0x80
[   26.353422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.353898]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.354554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.355053]  kthread+0x257/0x310
[   26.355529]  ? __pfx_kthread+0x10/0x10
[   26.355997]  ret_from_fork+0x41/0x80
[   26.356444]  ? __pfx_kthread+0x10/0x10
[   26.356962]  ret_from_fork_asm+0x1a/0x30
[   26.357461]  </TASK>
[   26.357866] 
[   26.358065] Allocated by task 143:
[   26.358559]  kasan_save_stack+0x3d/0x60
[   26.358978]  kasan_save_track+0x18/0x40
[   26.359374]  kasan_save_alloc_info+0x3b/0x50
[   26.360057]  __kasan_kmalloc+0xb7/0xc0
[   26.360385]  __kmalloc_cache_noprof+0x184/0x410
[   26.360979]  kmalloc_oob_right+0xaa/0x7f0
[   26.361362]  kunit_try_run_case+0x1b3/0x490
[   26.361911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.362447]  kthread+0x257/0x310
[   26.363055]  ret_from_fork+0x41/0x80
[   26.363302]  ret_from_fork_asm+0x1a/0x30
[   26.364390] 
[   26.364573] The buggy address belongs to the object at ffff8881029f9100
[   26.364573]  which belongs to the cache kmalloc-128 of size 128
[   26.365592] The buggy address is located 13 bytes to the right of
[   26.365592]  allocated 115-byte region [ffff8881029f9100, ffff8881029f9173)
[   26.367057] 
[   26.367247] The buggy address belongs to the physical page:
[   26.368176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   26.369156] flags: 0x200000000000000(node=0|zone=2)
[   26.369650] page_type: f5(slab)
[   26.370182] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.370878] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.372106] page dumped because: kasan: bad access detected
[   26.372821] 
[   26.373277] Memory state around the buggy address:
[   26.373568]  ffff8881029f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.374467]  ffff8881029f9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.375848] >ffff8881029f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.376492]                    ^
[   26.377166]  ffff8881029f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.378293]  ffff8881029f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.379255] ==================================================================
[   26.242379] ==================================================================
[   26.243631] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   26.244881] Write of size 1 at addr ffff8881029f9173 by task kunit_try_catch/143
[   26.245621] 
[   26.247332] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241205 #1
[   26.248637] Tainted: [N]=TEST
[   26.249151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.250696] Call Trace:
[   26.251233]  <TASK>
[   26.252083]  dump_stack_lvl+0x73/0xb0
[   26.252566]  print_report+0xd1/0x640
[   26.253239]  ? __virt_addr_valid+0x1db/0x2d0
[   26.253712]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.254367]  kasan_report+0x102/0x140
[   26.255101]  ? kmalloc_oob_right+0x6f2/0x7f0
[   26.255754]  ? kmalloc_oob_right+0x6f2/0x7f0
[   26.256220]  __asan_report_store1_noabort+0x1b/0x30
[   26.256457]  kmalloc_oob_right+0x6f2/0x7f0
[   26.256652]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   26.257310]  ? __schedule+0xc70/0x27e0
[   26.258119]  ? __pfx_read_tsc+0x10/0x10
[   26.258862]  ? ktime_get_ts64+0x86/0x230
[   26.259503]  kunit_try_run_case+0x1b3/0x490
[   26.259941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.260598]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.261128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.261804]  ? __kthread_parkme+0x82/0x160
[   26.262226]  ? preempt_count_sub+0x50/0x80
[   26.262808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.263187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.264042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.264816]  kthread+0x257/0x310
[   26.265346]  ? __pfx_kthread+0x10/0x10
[   26.265842]  ret_from_fork+0x41/0x80
[   26.266233]  ? __pfx_kthread+0x10/0x10
[   26.266602]  ret_from_fork_asm+0x1a/0x30
[   26.267424]  </TASK>
[   26.268138] 
[   26.268421] Allocated by task 143:
[   26.269465]  kasan_save_stack+0x3d/0x60
[   26.270106]  kasan_save_track+0x18/0x40
[   26.270497]  kasan_save_alloc_info+0x3b/0x50
[   26.271247]  __kasan_kmalloc+0xb7/0xc0
[   26.271914]  __kmalloc_cache_noprof+0x184/0x410
[   26.272716]  kmalloc_oob_right+0xaa/0x7f0
[   26.273129]  kunit_try_run_case+0x1b3/0x490
[   26.273568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.274384]  kthread+0x257/0x310
[   26.274721]  ret_from_fork+0x41/0x80
[   26.275257]  ret_from_fork_asm+0x1a/0x30
[   26.276043] 
[   26.276335] The buggy address belongs to the object at ffff8881029f9100
[   26.276335]  which belongs to the cache kmalloc-128 of size 128
[   26.278236] The buggy address is located 0 bytes to the right of
[   26.278236]  allocated 115-byte region [ffff8881029f9100, ffff8881029f9173)
[   26.280135] 
[   26.280466] The buggy address belongs to the physical page:
[   26.281884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9
[   26.283157] flags: 0x200000000000000(node=0|zone=2)
[   26.284288] page_type: f5(slab)
[   26.285434] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.286144] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.287039] page dumped because: kasan: bad access detected
[   26.287576] 
[   26.287933] Memory state around the buggy address:
[   26.289012]  ffff8881029f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.289722]  ffff8881029f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.290380] >ffff8881029f9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   26.291148]                                                              ^
[   26.291876]  ffff8881029f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.292314]  ffff8881029f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.293120] ==================================================================