Hay
Date
Dec. 5, 2024, 2:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   30.721333] ==================================================================
[   30.722667] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x750
[   30.723520] Read of size 1 at addr fff00000c653d073 by task kunit_try_catch/183
[   30.724725] 
[   30.725129] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.726447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.727320] Hardware name: linux,dummy-virt (DT)
[   30.728407] Call trace:
[   30.728819]  show_stack+0x20/0x38 (C)
[   30.729509]  dump_stack_lvl+0x8c/0xd0
[   30.730133]  print_report+0x118/0x5e0
[   30.730807]  kasan_report+0xc8/0x118
[   30.731741]  __asan_report_load1_noabort+0x20/0x30
[   30.732945]  ksize_unpoisons_memory+0x638/0x750
[   30.733803]  kunit_try_run_case+0x14c/0x3d0
[   30.734468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.735682]  kthread+0x24c/0x2d0
[   30.736419]  ret_from_fork+0x10/0x20
[   30.737082] 
[   30.737405] Allocated by task 183:
[   30.738058]  kasan_save_stack+0x3c/0x68
[   30.738694]  kasan_save_track+0x20/0x40
[   30.739456]  kasan_save_alloc_info+0x40/0x58
[   30.740215]  __kasan_kmalloc+0xd4/0xd8
[   30.740789]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.741368]  ksize_unpoisons_memory+0xc0/0x750
[   30.741855]  kunit_try_run_case+0x14c/0x3d0
[   30.742585]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.743315]  kthread+0x24c/0x2d0
[   30.744079]  ret_from_fork+0x10/0x20
[   30.745042] 
[   30.745320] The buggy address belongs to the object at fff00000c653d000
[   30.745320]  which belongs to the cache kmalloc-128 of size 128
[   30.746584] The buggy address is located 0 bytes to the right of
[   30.746584]  allocated 115-byte region [fff00000c653d000, fff00000c653d073)
[   30.748179] 
[   30.748589] The buggy address belongs to the physical page:
[   30.749157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d
[   30.750928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.751867] page_type: f5(slab)
[   30.752384] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.753275] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.754427] page dumped because: kasan: bad access detected
[   30.755480] 
[   30.756101] Memory state around the buggy address:
[   30.756591]  fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.757453]  fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.758475] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.759287]                                                              ^
[   30.760329]  fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.760744]  fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.761683] ==================================================================
[   30.764250] ==================================================================
[   30.765177] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x750
[   30.765836] Read of size 1 at addr fff00000c653d078 by task kunit_try_catch/183
[   30.767668] 
[   30.767967] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.769233] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.769746] Hardware name: linux,dummy-virt (DT)
[   30.770349] Call trace:
[   30.770960]  show_stack+0x20/0x38 (C)
[   30.771751]  dump_stack_lvl+0x8c/0xd0
[   30.772559]  print_report+0x118/0x5e0
[   30.773212]  kasan_report+0xc8/0x118
[   30.773804]  __asan_report_load1_noabort+0x20/0x30
[   30.774628]  ksize_unpoisons_memory+0x628/0x750
[   30.775748]  kunit_try_run_case+0x14c/0x3d0
[   30.776502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.777217]  kthread+0x24c/0x2d0
[   30.777724]  ret_from_fork+0x10/0x20
[   30.778384] 
[   30.778747] Allocated by task 183:
[   30.779314]  kasan_save_stack+0x3c/0x68
[   30.780466]  kasan_save_track+0x20/0x40
[   30.781296]  kasan_save_alloc_info+0x40/0x58
[   30.781934]  __kasan_kmalloc+0xd4/0xd8
[   30.782628]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.783193]  ksize_unpoisons_memory+0xc0/0x750
[   30.784182]  kunit_try_run_case+0x14c/0x3d0
[   30.784699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.785473]  kthread+0x24c/0x2d0
[   30.786072]  ret_from_fork+0x10/0x20
[   30.786625] 
[   30.786923] The buggy address belongs to the object at fff00000c653d000
[   30.786923]  which belongs to the cache kmalloc-128 of size 128
[   30.788983] The buggy address is located 5 bytes to the right of
[   30.788983]  allocated 115-byte region [fff00000c653d000, fff00000c653d073)
[   30.790468] 
[   30.790772] The buggy address belongs to the physical page:
[   30.792289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d
[   30.792774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.793193] page_type: f5(slab)
[   30.793443] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.794104] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.795607] page dumped because: kasan: bad access detected
[   30.797033] 
[   30.797701] Memory state around the buggy address:
[   30.798553]  fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.800190]  fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.800807] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.801890]                                                                 ^
[   30.802941]  fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.804104]  fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.805260] ==================================================================
[   30.806635] ==================================================================
[   30.807595] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x6a0/0x750
[   30.808710] Read of size 1 at addr fff00000c653d07f by task kunit_try_catch/183
[   30.809623] 
[   30.810138] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   30.812091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.812800] Hardware name: linux,dummy-virt (DT)
[   30.813631] Call trace:
[   30.814060]  show_stack+0x20/0x38 (C)
[   30.814769]  dump_stack_lvl+0x8c/0xd0
[   30.815758]  print_report+0x118/0x5e0
[   30.816620]  kasan_report+0xc8/0x118
[   30.817425]  __asan_report_load1_noabort+0x20/0x30
[   30.818022]  ksize_unpoisons_memory+0x6a0/0x750
[   30.818708]  kunit_try_run_case+0x14c/0x3d0
[   30.819598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.820356]  kthread+0x24c/0x2d0
[   30.820938]  ret_from_fork+0x10/0x20
[   30.821541] 
[   30.821824] Allocated by task 183:
[   30.822562]  kasan_save_stack+0x3c/0x68
[   30.823085]  kasan_save_track+0x20/0x40
[   30.824376]  kasan_save_alloc_info+0x40/0x58
[   30.825017]  __kasan_kmalloc+0xd4/0xd8
[   30.825656]  __kmalloc_cache_noprof+0x15c/0x3c0
[   30.826169]  ksize_unpoisons_memory+0xc0/0x750
[   30.826845]  kunit_try_run_case+0x14c/0x3d0
[   30.827479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.828574]  kthread+0x24c/0x2d0
[   30.829074]  ret_from_fork+0x10/0x20
[   30.829685] 
[   30.830060] The buggy address belongs to the object at fff00000c653d000
[   30.830060]  which belongs to the cache kmalloc-128 of size 128
[   30.832232] The buggy address is located 12 bytes to the right of
[   30.832232]  allocated 115-byte region [fff00000c653d000, fff00000c653d073)
[   30.833647] 
[   30.833973] The buggy address belongs to the physical page:
[   30.834825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10653d
[   30.836145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.837011] page_type: f5(slab)
[   30.837557] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.838725] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.839749] page dumped because: kasan: bad access detected
[   30.840850] 
[   30.841224] Memory state around the buggy address:
[   30.841806]  fff00000c653cf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.842701]  fff00000c653cf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   30.843666] >fff00000c653d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   30.844588]                                                                 ^
[   30.845729]  fff00000c653d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.846615]  fff00000c653d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.847170] ==================================================================

[   28.601621] ==================================================================
[   28.603358] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7eb/0x9b0
[   28.604725] Read of size 1 at addr ffff888101ab2b78 by task kunit_try_catch/201
[   28.605448] 
[   28.605627] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.606918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.607621] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.608879] Call Trace:
[   28.609639]  <TASK>
[   28.610235]  dump_stack_lvl+0x73/0xb0
[   28.610663]  print_report+0xd1/0x640
[   28.611081]  ? __virt_addr_valid+0x1db/0x2d0
[   28.611553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.612320]  kasan_report+0x102/0x140
[   28.613184]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   28.614484]  ? ksize_unpoisons_memory+0x7eb/0x9b0
[   28.615302]  __asan_report_load1_noabort+0x18/0x20
[   28.616283]  ksize_unpoisons_memory+0x7eb/0x9b0
[   28.616775]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   28.617598]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   28.618521]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   28.619272]  kunit_try_run_case+0x1b3/0x490
[   28.619730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.620247]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.620821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.621836]  ? __kthread_parkme+0x82/0x160
[   28.622457]  ? preempt_count_sub+0x50/0x80
[   28.622832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.623946]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.624710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.625456]  kthread+0x257/0x310
[   28.626243]  ? __pfx_kthread+0x10/0x10
[   28.626882]  ret_from_fork+0x41/0x80
[   28.627950]  ? __pfx_kthread+0x10/0x10
[   28.628396]  ret_from_fork_asm+0x1a/0x30
[   28.628893]  </TASK>
[   28.629400] 
[   28.629763] Allocated by task 201:
[   28.630652]  kasan_save_stack+0x3d/0x60
[   28.630967]  kasan_save_track+0x18/0x40
[   28.631525]  kasan_save_alloc_info+0x3b/0x50
[   28.632388]  __kasan_kmalloc+0xb7/0xc0
[   28.632658]  __kmalloc_cache_noprof+0x184/0x410
[   28.633549]  ksize_unpoisons_memory+0xc8/0x9b0
[   28.634456]  kunit_try_run_case+0x1b3/0x490
[   28.635229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.636081]  kthread+0x257/0x310
[   28.636876]  ret_from_fork+0x41/0x80
[   28.637120]  ret_from_fork_asm+0x1a/0x30
[   28.637312] 
[   28.637411] The buggy address belongs to the object at ffff888101ab2b00
[   28.637411]  which belongs to the cache kmalloc-128 of size 128
[   28.638143] The buggy address is located 5 bytes to the right of
[   28.638143]  allocated 115-byte region [ffff888101ab2b00, ffff888101ab2b73)
[   28.639287] 
[   28.639535] The buggy address belongs to the physical page:
[   28.640134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab2
[   28.640642] flags: 0x200000000000000(node=0|zone=2)
[   28.641335] page_type: f5(slab)
[   28.641813] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.642455] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.643455] page dumped because: kasan: bad access detected
[   28.644059] 
[   28.644322] Memory state around the buggy address:
[   28.644858]  ffff888101ab2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.645457]  ffff888101ab2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.645938] >ffff888101ab2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.647111]                                                                 ^
[   28.647912]  ffff888101ab2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.648653]  ffff888101ab2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.649451] ==================================================================
[   28.549532] ==================================================================
[   28.550655] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81e/0x9b0
[   28.551825] Read of size 1 at addr ffff888101ab2b73 by task kunit_try_catch/201
[   28.552783] 
[   28.553052] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.553640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.554128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.555512] Call Trace:
[   28.556003]  <TASK>
[   28.556210]  dump_stack_lvl+0x73/0xb0
[   28.557037]  print_report+0xd1/0x640
[   28.557582]  ? __virt_addr_valid+0x1db/0x2d0
[   28.558477]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.559508]  kasan_report+0x102/0x140
[   28.560232]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   28.560917]  ? ksize_unpoisons_memory+0x81e/0x9b0
[   28.561591]  __asan_report_load1_noabort+0x18/0x20
[   28.562929]  ksize_unpoisons_memory+0x81e/0x9b0
[   28.563793]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   28.564524]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   28.565382]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   28.566294]  kunit_try_run_case+0x1b3/0x490
[   28.566932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.567594]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.568124]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.569286]  ? __kthread_parkme+0x82/0x160
[   28.569651]  ? preempt_count_sub+0x50/0x80
[   28.570675]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.571313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.572015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.572523]  kthread+0x257/0x310
[   28.573520]  ? __pfx_kthread+0x10/0x10
[   28.573870]  ret_from_fork+0x41/0x80
[   28.574400]  ? __pfx_kthread+0x10/0x10
[   28.575116]  ret_from_fork_asm+0x1a/0x30
[   28.575512]  </TASK>
[   28.576348] 
[   28.576525] Allocated by task 201:
[   28.576912]  kasan_save_stack+0x3d/0x60
[   28.577226]  kasan_save_track+0x18/0x40
[   28.577642]  kasan_save_alloc_info+0x3b/0x50
[   28.578736]  __kasan_kmalloc+0xb7/0xc0
[   28.579284]  __kmalloc_cache_noprof+0x184/0x410
[   28.579950]  ksize_unpoisons_memory+0xc8/0x9b0
[   28.580995]  kunit_try_run_case+0x1b3/0x490
[   28.581500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.582269]  kthread+0x257/0x310
[   28.582615]  ret_from_fork+0x41/0x80
[   28.583551]  ret_from_fork_asm+0x1a/0x30
[   28.583936] 
[   28.584250] The buggy address belongs to the object at ffff888101ab2b00
[   28.584250]  which belongs to the cache kmalloc-128 of size 128
[   28.585746] The buggy address is located 0 bytes to the right of
[   28.585746]  allocated 115-byte region [ffff888101ab2b00, ffff888101ab2b73)
[   28.587224] 
[   28.587636] The buggy address belongs to the physical page:
[   28.588665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab2
[   28.589583] flags: 0x200000000000000(node=0|zone=2)
[   28.590286] page_type: f5(slab)
[   28.590793] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.591960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.592578] page dumped because: kasan: bad access detected
[   28.593443] 
[   28.593723] Memory state around the buggy address:
[   28.594426]  ffff888101ab2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.595585]  ffff888101ab2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.596398] >ffff888101ab2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.597671]                                                              ^
[   28.598429]  ffff888101ab2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.599455]  ffff888101ab2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.600298] ==================================================================
[   28.650518] ==================================================================
[   28.651238] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b8/0x9b0
[   28.651718] Read of size 1 at addr ffff888101ab2b7f by task kunit_try_catch/201
[   28.652666] 
[   28.653014] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241205 #1
[   28.654052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.654527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.655138] Call Trace:
[   28.655546]  <TASK>
[   28.655944]  dump_stack_lvl+0x73/0xb0
[   28.656401]  print_report+0xd1/0x640
[   28.656700]  ? __virt_addr_valid+0x1db/0x2d0
[   28.657064]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.657853]  kasan_report+0x102/0x140
[   28.658634]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   28.659331]  ? ksize_unpoisons_memory+0x7b8/0x9b0
[   28.659848]  __asan_report_load1_noabort+0x18/0x20
[   28.660187]  ksize_unpoisons_memory+0x7b8/0x9b0
[   28.660670]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   28.661497]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   28.662984]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   28.663569]  kunit_try_run_case+0x1b3/0x490
[   28.665413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.666248]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.666725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.667463]  ? __kthread_parkme+0x82/0x160
[   28.668252]  ? preempt_count_sub+0x50/0x80
[   28.668984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.669571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.670485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.671156]  kthread+0x257/0x310
[   28.672214]  ? __pfx_kthread+0x10/0x10
[   28.672553]  ret_from_fork+0x41/0x80
[   28.673439]  ? __pfx_kthread+0x10/0x10
[   28.673631]  ret_from_fork_asm+0x1a/0x30
[   28.674021]  </TASK>
[   28.674490] 
[   28.674778] Allocated by task 201:
[   28.675575]  kasan_save_stack+0x3d/0x60
[   28.676514]  kasan_save_track+0x18/0x40
[   28.677159]  kasan_save_alloc_info+0x3b/0x50
[   28.678122]  __kasan_kmalloc+0xb7/0xc0
[   28.678472]  __kmalloc_cache_noprof+0x184/0x410
[   28.679542]  ksize_unpoisons_memory+0xc8/0x9b0
[   28.680010]  kunit_try_run_case+0x1b3/0x490
[   28.680668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.682263]  kthread+0x257/0x310
[   28.682612]  ret_from_fork+0x41/0x80
[   28.683025]  ret_from_fork_asm+0x1a/0x30
[   28.683872] 
[   28.684283] The buggy address belongs to the object at ffff888101ab2b00
[   28.684283]  which belongs to the cache kmalloc-128 of size 128
[   28.685587] The buggy address is located 12 bytes to the right of
[   28.685587]  allocated 115-byte region [ffff888101ab2b00, ffff888101ab2b73)
[   28.687561] 
[   28.688022] The buggy address belongs to the physical page:
[   28.688701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ab2
[   28.689933] flags: 0x200000000000000(node=0|zone=2)
[   28.690373] page_type: f5(slab)
[   28.690698] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   28.691354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.692474] page dumped because: kasan: bad access detected
[   28.693266] 
[   28.693524] Memory state around the buggy address:
[   28.694179]  ffff888101ab2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   28.694845]  ffff888101ab2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.695605] >ffff888101ab2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   28.696534]                                                                 ^
[   28.697278]  ffff888101ab2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.697899]  ffff888101ab2c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.698635] ==================================================================