Hay
Date
Dec. 6, 2024, 3:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   29.804808] ==================================================================
[   29.805793] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.806899] Read of size 1 at addr fff00000c66f7580 by task kunit_try_catch/125
[   29.808143] 
[   29.808720] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.809873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.810335] Hardware name: linux,dummy-virt (DT)
[   29.810848] Call trace:
[   29.811295]  show_stack+0x20/0x38 (C)
[   29.811897]  dump_stack_lvl+0x8c/0xd0
[   29.812457]  print_report+0x118/0x5e0
[   29.813102]  kasan_report+0xc8/0x118
[   29.813710]  __asan_report_load1_noabort+0x20/0x30
[   29.814447]  kmalloc_oob_right+0x5d0/0x660
[   29.815036]  kunit_try_run_case+0x14c/0x3d0
[   29.815779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.816526]  kthread+0x24c/0x2d0
[   29.817068]  ret_from_fork+0x10/0x20
[   29.817665] 
[   29.818001] Allocated by task 125:
[   29.818560]  kasan_save_stack+0x3c/0x68
[   29.819203]  kasan_save_track+0x20/0x40
[   29.819782]  kasan_save_alloc_info+0x40/0x58
[   29.820411]  __kasan_kmalloc+0xd4/0xd8
[   29.821050]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.821615]  kmalloc_oob_right+0xb0/0x660
[   29.822257]  kunit_try_run_case+0x14c/0x3d0
[   29.822953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.823714]  kthread+0x24c/0x2d0
[   29.824250]  ret_from_fork+0x10/0x20
[   29.824865] 
[   29.825232] The buggy address belongs to the object at fff00000c66f7500
[   29.825232]  which belongs to the cache kmalloc-128 of size 128
[   29.826532] The buggy address is located 13 bytes to the right of
[   29.826532]  allocated 115-byte region [fff00000c66f7500, fff00000c66f7573)
[   29.827614] 
[   29.827986] The buggy address belongs to the physical page:
[   29.828738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7
[   29.829748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.830463] page_type: f5(slab)
[   29.831050] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.831894] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.832824] page dumped because: kasan: bad access detected
[   29.833574] 
[   29.833944] Memory state around the buggy address:
[   29.834494]  fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.835324]  fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.836118] >fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.837015]                    ^
[   29.837758]  fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.838700]  fff00000c66f7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.839449] ==================================================================
[   29.721153] ==================================================================
[   29.722692] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.725165] Write of size 1 at addr fff00000c66f7573 by task kunit_try_catch/125
[   29.726060] 
[   29.728086] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241206 #1
[   29.729541] Tainted: [N]=TEST
[   29.730003] Hardware name: linux,dummy-virt (DT)
[   29.731201] Call trace:
[   29.731961]  show_stack+0x20/0x38 (C)
[   29.732776]  dump_stack_lvl+0x8c/0xd0
[   29.733429]  print_report+0x118/0x5e0
[   29.734013]  kasan_report+0xc8/0x118
[   29.734584]  __asan_report_store1_noabort+0x20/0x30
[   29.735266]  kmalloc_oob_right+0x5a4/0x660
[   29.735982]  kunit_try_run_case+0x14c/0x3d0
[   29.736625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.737297]  kthread+0x24c/0x2d0
[   29.737909]  ret_from_fork+0x10/0x20
[   29.738837] 
[   29.739278] Allocated by task 125:
[   29.740139]  kasan_save_stack+0x3c/0x68
[   29.740880]  kasan_save_track+0x20/0x40
[   29.741416]  kasan_save_alloc_info+0x40/0x58
[   29.742032]  __kasan_kmalloc+0xd4/0xd8
[   29.742596]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.743221]  kmalloc_oob_right+0xb0/0x660
[   29.743806]  kunit_try_run_case+0x14c/0x3d0
[   29.744333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.745129]  kthread+0x24c/0x2d0
[   29.745698]  ret_from_fork+0x10/0x20
[   29.746257] 
[   29.746779] The buggy address belongs to the object at fff00000c66f7500
[   29.746779]  which belongs to the cache kmalloc-128 of size 128
[   29.748065] The buggy address is located 0 bytes to the right of
[   29.748065]  allocated 115-byte region [fff00000c66f7500, fff00000c66f7573)
[   29.749292] 
[   29.749917] The buggy address belongs to the physical page:
[   29.750971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7
[   29.752309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.753672] page_type: f5(slab)
[   29.754823] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.755687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.756735] page dumped because: kasan: bad access detected
[   29.757456] 
[   29.757823] Memory state around the buggy address:
[   29.759082]  fff00000c66f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.759970]  fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.760819] >fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.761698]                                                              ^
[   29.762633]  fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.763414]  fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.764274] ==================================================================
[   29.768134] ==================================================================
[   29.769222] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.770003] Write of size 1 at addr fff00000c66f7578 by task kunit_try_catch/125
[   29.770922] 
[   29.771332] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   29.772447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.773154] Hardware name: linux,dummy-virt (DT)
[   29.773863] Call trace:
[   29.774262]  show_stack+0x20/0x38 (C)
[   29.774966]  dump_stack_lvl+0x8c/0xd0
[   29.775267]  print_report+0x118/0x5e0
[   29.775568]  kasan_report+0xc8/0x118
[   29.776228]  __asan_report_store1_noabort+0x20/0x30
[   29.777244]  kmalloc_oob_right+0x538/0x660
[   29.777868]  kunit_try_run_case+0x14c/0x3d0
[   29.778471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.779214]  kthread+0x24c/0x2d0
[   29.779782]  ret_from_fork+0x10/0x20
[   29.780356] 
[   29.780718] Allocated by task 125:
[   29.781265]  kasan_save_stack+0x3c/0x68
[   29.781805]  kasan_save_track+0x20/0x40
[   29.782437]  kasan_save_alloc_info+0x40/0x58
[   29.783049]  __kasan_kmalloc+0xd4/0xd8
[   29.783692]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.784371]  kmalloc_oob_right+0xb0/0x660
[   29.785028]  kunit_try_run_case+0x14c/0x3d0
[   29.785659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.786395]  kthread+0x24c/0x2d0
[   29.786903]  ret_from_fork+0x10/0x20
[   29.787500] 
[   29.787887] The buggy address belongs to the object at fff00000c66f7500
[   29.787887]  which belongs to the cache kmalloc-128 of size 128
[   29.789106] The buggy address is located 5 bytes to the right of
[   29.789106]  allocated 115-byte region [fff00000c66f7500, fff00000c66f7573)
[   29.790387] 
[   29.790784] The buggy address belongs to the physical page:
[   29.791492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7
[   29.792341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.793170] page_type: f5(slab)
[   29.793710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   29.794617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.795445] page dumped because: kasan: bad access detected
[   29.796169] 
[   29.796492] Memory state around the buggy address:
[   29.797163]  fff00000c66f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.797957]  fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.798796] >fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.799722]                                                                 ^
[   29.800560]  fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801378]  fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.802201] ==================================================================

[   21.816740] ==================================================================
[   21.817770] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   21.818901] Write of size 1 at addr ffff888102914878 by task kunit_try_catch/144
[   21.820479] 
[   21.820822] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   21.822543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.823330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.825104] Call Trace:
[   21.825532]  <TASK>
[   21.825971]  dump_stack_lvl+0x73/0xb0
[   21.826653]  print_report+0xd1/0x640
[   21.827378]  ? __virt_addr_valid+0x1db/0x2d0
[   21.828205]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.829077]  kasan_report+0x102/0x140
[   21.829477]  ? kmalloc_oob_right+0x6bf/0x7f0
[   21.829958]  ? kmalloc_oob_right+0x6bf/0x7f0
[   21.830487]  __asan_report_store1_noabort+0x1b/0x30
[   21.830979]  kmalloc_oob_right+0x6bf/0x7f0
[   21.831417]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   21.831917]  ? __schedule+0xc70/0x27e0
[   21.832391]  ? __pfx_read_tsc+0x10/0x10
[   21.832734]  ? ktime_get_ts64+0x86/0x230
[   21.833415]  kunit_try_run_case+0x1b3/0x490
[   21.834116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.834531]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.835028]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.836560]  ? __kthread_parkme+0x82/0x160
[   21.837428]  ? preempt_count_sub+0x50/0x80
[   21.838254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.838620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.839388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.840107]  kthread+0x257/0x310
[   21.840868]  ? __pfx_kthread+0x10/0x10
[   21.841191]  ret_from_fork+0x41/0x80
[   21.842266]  ? __pfx_kthread+0x10/0x10
[   21.842997]  ret_from_fork_asm+0x1a/0x30
[   21.843739]  </TASK>
[   21.844334] 
[   21.844694] Allocated by task 144:
[   21.845521]  kasan_save_stack+0x3d/0x60
[   21.846277]  kasan_save_track+0x18/0x40
[   21.846680]  kasan_save_alloc_info+0x3b/0x50
[   21.847190]  __kasan_kmalloc+0xb7/0xc0
[   21.848220]  __kmalloc_cache_noprof+0x184/0x410
[   21.848623]  kmalloc_oob_right+0xaa/0x7f0
[   21.849088]  kunit_try_run_case+0x1b3/0x490
[   21.849918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.850669]  kthread+0x257/0x310
[   21.851613]  ret_from_fork+0x41/0x80
[   21.852222]  ret_from_fork_asm+0x1a/0x30
[   21.852902] 
[   21.853204] The buggy address belongs to the object at ffff888102914800
[   21.853204]  which belongs to the cache kmalloc-128 of size 128
[   21.854216] The buggy address is located 5 bytes to the right of
[   21.854216]  allocated 115-byte region [ffff888102914800, ffff888102914873)
[   21.855981] 
[   21.856249] The buggy address belongs to the physical page:
[   21.857461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102914
[   21.857801] flags: 0x200000000000000(node=0|zone=2)
[   21.858096] page_type: f5(slab)
[   21.858920] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.860399] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.861138] page dumped because: kasan: bad access detected
[   21.862390] 
[   21.862578] Memory state around the buggy address:
[   21.863065]  ffff888102914700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.864290]  ffff888102914780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.865253] >ffff888102914800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.866094]                                                                 ^
[   21.866671]  ffff888102914880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.867575]  ffff888102914900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.868657] ==================================================================
[   21.870844] ==================================================================
[   21.871816] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   21.873429] Read of size 1 at addr ffff888102914880 by task kunit_try_catch/144
[   21.874813] 
[   21.875038] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc1-next-20241206 #1
[   21.875983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.876265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.877613] Call Trace:
[   21.878061]  <TASK>
[   21.878715]  dump_stack_lvl+0x73/0xb0
[   21.879813]  print_report+0xd1/0x640
[   21.880512]  ? __virt_addr_valid+0x1db/0x2d0
[   21.881016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.882081]  kasan_report+0x102/0x140
[   21.882922]  ? kmalloc_oob_right+0x68c/0x7f0
[   21.883661]  ? kmalloc_oob_right+0x68c/0x7f0
[   21.883999]  __asan_report_load1_noabort+0x18/0x20
[   21.885060]  kmalloc_oob_right+0x68c/0x7f0
[   21.885560]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   21.886352]  ? __schedule+0xc70/0x27e0
[   21.886790]  ? __pfx_read_tsc+0x10/0x10
[   21.887380]  ? ktime_get_ts64+0x86/0x230
[   21.887766]  kunit_try_run_case+0x1b3/0x490
[   21.888150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.888529]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.889034]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.889426]  ? __kthread_parkme+0x82/0x160
[   21.889882]  ? preempt_count_sub+0x50/0x80
[   21.890402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.890843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.891484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.892212]  kthread+0x257/0x310
[   21.892544]  ? __pfx_kthread+0x10/0x10
[   21.892861]  ret_from_fork+0x41/0x80
[   21.893338]  ? __pfx_kthread+0x10/0x10
[   21.893775]  ret_from_fork_asm+0x1a/0x30
[   21.894233]  </TASK>
[   21.894425] 
[   21.894665] Allocated by task 144:
[   21.895141]  kasan_save_stack+0x3d/0x60
[   21.895628]  kasan_save_track+0x18/0x40
[   21.896015]  kasan_save_alloc_info+0x3b/0x50
[   21.896379]  __kasan_kmalloc+0xb7/0xc0
[   21.896851]  __kmalloc_cache_noprof+0x184/0x410
[   21.897502]  kmalloc_oob_right+0xaa/0x7f0
[   21.897922]  kunit_try_run_case+0x1b3/0x490
[   21.898410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.898927]  kthread+0x257/0x310
[   21.899432]  ret_from_fork+0x41/0x80
[   21.899762]  ret_from_fork_asm+0x1a/0x30
[   21.900136] 
[   21.900372] The buggy address belongs to the object at ffff888102914800
[   21.900372]  which belongs to the cache kmalloc-128 of size 128
[   21.901322] The buggy address is located 13 bytes to the right of
[   21.901322]  allocated 115-byte region [ffff888102914800, ffff888102914873)
[   21.902395] 
[   21.902591] The buggy address belongs to the physical page:
[   21.903281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102914
[   21.904229] flags: 0x200000000000000(node=0|zone=2)
[   21.904567] page_type: f5(slab)
[   21.904970] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.905710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.906488] page dumped because: kasan: bad access detected
[   21.906996] 
[   21.907345] Memory state around the buggy address:
[   21.907831]  ffff888102914780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.908452]  ffff888102914800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.909043] >ffff888102914880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.909495]                    ^
[   21.909965]  ffff888102914900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.910736]  ffff888102914980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.911281] ==================================================================
[   21.769276] ==================================================================
[   21.770332] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   21.771664] Write of size 1 at addr ffff888102914873 by task kunit_try_catch/144
[   21.772383] 
[   21.774401] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc1-next-20241206 #1
[   21.775585] Tainted: [N]=TEST
[   21.775960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.777310] Call Trace:
[   21.777774]  <TASK>
[   21.778268]  dump_stack_lvl+0x73/0xb0
[   21.778778]  print_report+0xd1/0x640
[   21.779161]  ? __virt_addr_valid+0x1db/0x2d0
[   21.779547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.780092]  kasan_report+0x102/0x140
[   21.780531]  ? kmalloc_oob_right+0x6f2/0x7f0
[   21.781171]  ? kmalloc_oob_right+0x6f2/0x7f0
[   21.781557]  __asan_report_store1_noabort+0x1b/0x30
[   21.782218]  kmalloc_oob_right+0x6f2/0x7f0
[   21.782546]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   21.783146]  ? __schedule+0xc70/0x27e0
[   21.783685]  ? __pfx_read_tsc+0x10/0x10
[   21.784009]  ? ktime_get_ts64+0x86/0x230
[   21.784590]  kunit_try_run_case+0x1b3/0x490
[   21.785019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.785354]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.786073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.786531]  ? __kthread_parkme+0x82/0x160
[   21.786925]  ? preempt_count_sub+0x50/0x80
[   21.787694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.788068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.788732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.789396]  kthread+0x257/0x310
[   21.789679]  ? __pfx_kthread+0x10/0x10
[   21.790020]  ret_from_fork+0x41/0x80
[   21.790361]  ? __pfx_kthread+0x10/0x10
[   21.790883]  ret_from_fork_asm+0x1a/0x30
[   21.791543]  </TASK>
[   21.792181] 
[   21.792403] Allocated by task 144:
[   21.793110]  kasan_save_stack+0x3d/0x60
[   21.793602]  kasan_save_track+0x18/0x40
[   21.793969]  kasan_save_alloc_info+0x3b/0x50
[   21.794660]  __kasan_kmalloc+0xb7/0xc0
[   21.795103]  __kmalloc_cache_noprof+0x184/0x410
[   21.795479]  kmalloc_oob_right+0xaa/0x7f0
[   21.795771]  kunit_try_run_case+0x1b3/0x490
[   21.796099]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.796808]  kthread+0x257/0x310
[   21.797303]  ret_from_fork+0x41/0x80
[   21.797566]  ret_from_fork_asm+0x1a/0x30
[   21.798005] 
[   21.798420] The buggy address belongs to the object at ffff888102914800
[   21.798420]  which belongs to the cache kmalloc-128 of size 128
[   21.800267] The buggy address is located 0 bytes to the right of
[   21.800267]  allocated 115-byte region [ffff888102914800, ffff888102914873)
[   21.801368] 
[   21.801774] The buggy address belongs to the physical page:
[   21.802515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102914
[   21.803611] flags: 0x200000000000000(node=0|zone=2)
[   21.805183] page_type: f5(slab)
[   21.806688] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   21.807238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.808083] page dumped because: kasan: bad access detected
[   21.808661] 
[   21.808842] Memory state around the buggy address:
[   21.809717]  ffff888102914700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.810911]  ffff888102914780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.811720] >ffff888102914800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   21.812471]                                                              ^
[   21.813168]  ffff888102914880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.813750]  ffff888102914900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.814328] ==================================================================