Date
Dec. 6, 2024, 3:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 29.804808] ================================================================== [ 29.805793] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.806899] Read of size 1 at addr fff00000c66f7580 by task kunit_try_catch/125 [ 29.808143] [ 29.808720] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.809873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.810335] Hardware name: linux,dummy-virt (DT) [ 29.810848] Call trace: [ 29.811295] show_stack+0x20/0x38 (C) [ 29.811897] dump_stack_lvl+0x8c/0xd0 [ 29.812457] print_report+0x118/0x5e0 [ 29.813102] kasan_report+0xc8/0x118 [ 29.813710] __asan_report_load1_noabort+0x20/0x30 [ 29.814447] kmalloc_oob_right+0x5d0/0x660 [ 29.815036] kunit_try_run_case+0x14c/0x3d0 [ 29.815779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.816526] kthread+0x24c/0x2d0 [ 29.817068] ret_from_fork+0x10/0x20 [ 29.817665] [ 29.818001] Allocated by task 125: [ 29.818560] kasan_save_stack+0x3c/0x68 [ 29.819203] kasan_save_track+0x20/0x40 [ 29.819782] kasan_save_alloc_info+0x40/0x58 [ 29.820411] __kasan_kmalloc+0xd4/0xd8 [ 29.821050] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.821615] kmalloc_oob_right+0xb0/0x660 [ 29.822257] kunit_try_run_case+0x14c/0x3d0 [ 29.822953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.823714] kthread+0x24c/0x2d0 [ 29.824250] ret_from_fork+0x10/0x20 [ 29.824865] [ 29.825232] The buggy address belongs to the object at fff00000c66f7500 [ 29.825232] which belongs to the cache kmalloc-128 of size 128 [ 29.826532] The buggy address is located 13 bytes to the right of [ 29.826532] allocated 115-byte region [fff00000c66f7500, fff00000c66f7573) [ 29.827614] [ 29.827986] The buggy address belongs to the physical page: [ 29.828738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7 [ 29.829748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.830463] page_type: f5(slab) [ 29.831050] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.831894] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.832824] page dumped because: kasan: bad access detected [ 29.833574] [ 29.833944] Memory state around the buggy address: [ 29.834494] fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.835324] fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.836118] >fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.837015] ^ [ 29.837758] fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.838700] fff00000c66f7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.839449] ================================================================== [ 29.721153] ================================================================== [ 29.722692] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.725165] Write of size 1 at addr fff00000c66f7573 by task kunit_try_catch/125 [ 29.726060] [ 29.728086] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G N 6.13.0-rc1-next-20241206 #1 [ 29.729541] Tainted: [N]=TEST [ 29.730003] Hardware name: linux,dummy-virt (DT) [ 29.731201] Call trace: [ 29.731961] show_stack+0x20/0x38 (C) [ 29.732776] dump_stack_lvl+0x8c/0xd0 [ 29.733429] print_report+0x118/0x5e0 [ 29.734013] kasan_report+0xc8/0x118 [ 29.734584] __asan_report_store1_noabort+0x20/0x30 [ 29.735266] kmalloc_oob_right+0x5a4/0x660 [ 29.735982] kunit_try_run_case+0x14c/0x3d0 [ 29.736625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.737297] kthread+0x24c/0x2d0 [ 29.737909] ret_from_fork+0x10/0x20 [ 29.738837] [ 29.739278] Allocated by task 125: [ 29.740139] kasan_save_stack+0x3c/0x68 [ 29.740880] kasan_save_track+0x20/0x40 [ 29.741416] kasan_save_alloc_info+0x40/0x58 [ 29.742032] __kasan_kmalloc+0xd4/0xd8 [ 29.742596] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.743221] kmalloc_oob_right+0xb0/0x660 [ 29.743806] kunit_try_run_case+0x14c/0x3d0 [ 29.744333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.745129] kthread+0x24c/0x2d0 [ 29.745698] ret_from_fork+0x10/0x20 [ 29.746257] [ 29.746779] The buggy address belongs to the object at fff00000c66f7500 [ 29.746779] which belongs to the cache kmalloc-128 of size 128 [ 29.748065] The buggy address is located 0 bytes to the right of [ 29.748065] allocated 115-byte region [fff00000c66f7500, fff00000c66f7573) [ 29.749292] [ 29.749917] The buggy address belongs to the physical page: [ 29.750971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7 [ 29.752309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.753672] page_type: f5(slab) [ 29.754823] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.755687] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.756735] page dumped because: kasan: bad access detected [ 29.757456] [ 29.757823] Memory state around the buggy address: [ 29.759082] fff00000c66f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.759970] fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.760819] >fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.761698] ^ [ 29.762633] fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.763414] fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.764274] ================================================================== [ 29.768134] ================================================================== [ 29.769222] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.770003] Write of size 1 at addr fff00000c66f7578 by task kunit_try_catch/125 [ 29.770922] [ 29.771332] CPU: 0 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.772447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.773154] Hardware name: linux,dummy-virt (DT) [ 29.773863] Call trace: [ 29.774262] show_stack+0x20/0x38 (C) [ 29.774966] dump_stack_lvl+0x8c/0xd0 [ 29.775267] print_report+0x118/0x5e0 [ 29.775568] kasan_report+0xc8/0x118 [ 29.776228] __asan_report_store1_noabort+0x20/0x30 [ 29.777244] kmalloc_oob_right+0x538/0x660 [ 29.777868] kunit_try_run_case+0x14c/0x3d0 [ 29.778471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.779214] kthread+0x24c/0x2d0 [ 29.779782] ret_from_fork+0x10/0x20 [ 29.780356] [ 29.780718] Allocated by task 125: [ 29.781265] kasan_save_stack+0x3c/0x68 [ 29.781805] kasan_save_track+0x20/0x40 [ 29.782437] kasan_save_alloc_info+0x40/0x58 [ 29.783049] __kasan_kmalloc+0xd4/0xd8 [ 29.783692] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.784371] kmalloc_oob_right+0xb0/0x660 [ 29.785028] kunit_try_run_case+0x14c/0x3d0 [ 29.785659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.786395] kthread+0x24c/0x2d0 [ 29.786903] ret_from_fork+0x10/0x20 [ 29.787500] [ 29.787887] The buggy address belongs to the object at fff00000c66f7500 [ 29.787887] which belongs to the cache kmalloc-128 of size 128 [ 29.789106] The buggy address is located 5 bytes to the right of [ 29.789106] allocated 115-byte region [fff00000c66f7500, fff00000c66f7573) [ 29.790387] [ 29.790784] The buggy address belongs to the physical page: [ 29.791492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066f7 [ 29.792341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.793170] page_type: f5(slab) [ 29.793710] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.794617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.795445] page dumped because: kasan: bad access detected [ 29.796169] [ 29.796492] Memory state around the buggy address: [ 29.797163] fff00000c66f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.797957] fff00000c66f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.798796] >fff00000c66f7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.799722] ^ [ 29.800560] fff00000c66f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801378] fff00000c66f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.802201] ==================================================================
[ 21.816740] ================================================================== [ 21.817770] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 21.818901] Write of size 1 at addr ffff888102914878 by task kunit_try_catch/144 [ 21.820479] [ 21.820822] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 21.822543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.823330] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.825104] Call Trace: [ 21.825532] <TASK> [ 21.825971] dump_stack_lvl+0x73/0xb0 [ 21.826653] print_report+0xd1/0x640 [ 21.827378] ? __virt_addr_valid+0x1db/0x2d0 [ 21.828205] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.829077] kasan_report+0x102/0x140 [ 21.829477] ? kmalloc_oob_right+0x6bf/0x7f0 [ 21.829958] ? kmalloc_oob_right+0x6bf/0x7f0 [ 21.830487] __asan_report_store1_noabort+0x1b/0x30 [ 21.830979] kmalloc_oob_right+0x6bf/0x7f0 [ 21.831417] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 21.831917] ? __schedule+0xc70/0x27e0 [ 21.832391] ? __pfx_read_tsc+0x10/0x10 [ 21.832734] ? ktime_get_ts64+0x86/0x230 [ 21.833415] kunit_try_run_case+0x1b3/0x490 [ 21.834116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.834531] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.835028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.836560] ? __kthread_parkme+0x82/0x160 [ 21.837428] ? preempt_count_sub+0x50/0x80 [ 21.838254] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.838620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.839388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.840107] kthread+0x257/0x310 [ 21.840868] ? __pfx_kthread+0x10/0x10 [ 21.841191] ret_from_fork+0x41/0x80 [ 21.842266] ? __pfx_kthread+0x10/0x10 [ 21.842997] ret_from_fork_asm+0x1a/0x30 [ 21.843739] </TASK> [ 21.844334] [ 21.844694] Allocated by task 144: [ 21.845521] kasan_save_stack+0x3d/0x60 [ 21.846277] kasan_save_track+0x18/0x40 [ 21.846680] kasan_save_alloc_info+0x3b/0x50 [ 21.847190] __kasan_kmalloc+0xb7/0xc0 [ 21.848220] __kmalloc_cache_noprof+0x184/0x410 [ 21.848623] kmalloc_oob_right+0xaa/0x7f0 [ 21.849088] kunit_try_run_case+0x1b3/0x490 [ 21.849918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.850669] kthread+0x257/0x310 [ 21.851613] ret_from_fork+0x41/0x80 [ 21.852222] ret_from_fork_asm+0x1a/0x30 [ 21.852902] [ 21.853204] The buggy address belongs to the object at ffff888102914800 [ 21.853204] which belongs to the cache kmalloc-128 of size 128 [ 21.854216] The buggy address is located 5 bytes to the right of [ 21.854216] allocated 115-byte region [ffff888102914800, ffff888102914873) [ 21.855981] [ 21.856249] The buggy address belongs to the physical page: [ 21.857461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102914 [ 21.857801] flags: 0x200000000000000(node=0|zone=2) [ 21.858096] page_type: f5(slab) [ 21.858920] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.860399] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.861138] page dumped because: kasan: bad access detected [ 21.862390] [ 21.862578] Memory state around the buggy address: [ 21.863065] ffff888102914700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.864290] ffff888102914780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.865253] >ffff888102914800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.866094] ^ [ 21.866671] ffff888102914880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.867575] ffff888102914900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.868657] ================================================================== [ 21.870844] ================================================================== [ 21.871816] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 21.873429] Read of size 1 at addr ffff888102914880 by task kunit_try_catch/144 [ 21.874813] [ 21.875038] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 21.875983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.876265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.877613] Call Trace: [ 21.878061] <TASK> [ 21.878715] dump_stack_lvl+0x73/0xb0 [ 21.879813] print_report+0xd1/0x640 [ 21.880512] ? __virt_addr_valid+0x1db/0x2d0 [ 21.881016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.882081] kasan_report+0x102/0x140 [ 21.882922] ? kmalloc_oob_right+0x68c/0x7f0 [ 21.883661] ? kmalloc_oob_right+0x68c/0x7f0 [ 21.883999] __asan_report_load1_noabort+0x18/0x20 [ 21.885060] kmalloc_oob_right+0x68c/0x7f0 [ 21.885560] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 21.886352] ? __schedule+0xc70/0x27e0 [ 21.886790] ? __pfx_read_tsc+0x10/0x10 [ 21.887380] ? ktime_get_ts64+0x86/0x230 [ 21.887766] kunit_try_run_case+0x1b3/0x490 [ 21.888150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.888529] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.889034] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.889426] ? __kthread_parkme+0x82/0x160 [ 21.889882] ? preempt_count_sub+0x50/0x80 [ 21.890402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.890843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.891484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.892212] kthread+0x257/0x310 [ 21.892544] ? __pfx_kthread+0x10/0x10 [ 21.892861] ret_from_fork+0x41/0x80 [ 21.893338] ? __pfx_kthread+0x10/0x10 [ 21.893775] ret_from_fork_asm+0x1a/0x30 [ 21.894233] </TASK> [ 21.894425] [ 21.894665] Allocated by task 144: [ 21.895141] kasan_save_stack+0x3d/0x60 [ 21.895628] kasan_save_track+0x18/0x40 [ 21.896015] kasan_save_alloc_info+0x3b/0x50 [ 21.896379] __kasan_kmalloc+0xb7/0xc0 [ 21.896851] __kmalloc_cache_noprof+0x184/0x410 [ 21.897502] kmalloc_oob_right+0xaa/0x7f0 [ 21.897922] kunit_try_run_case+0x1b3/0x490 [ 21.898410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.898927] kthread+0x257/0x310 [ 21.899432] ret_from_fork+0x41/0x80 [ 21.899762] ret_from_fork_asm+0x1a/0x30 [ 21.900136] [ 21.900372] The buggy address belongs to the object at ffff888102914800 [ 21.900372] which belongs to the cache kmalloc-128 of size 128 [ 21.901322] The buggy address is located 13 bytes to the right of [ 21.901322] allocated 115-byte region [ffff888102914800, ffff888102914873) [ 21.902395] [ 21.902591] The buggy address belongs to the physical page: [ 21.903281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102914 [ 21.904229] flags: 0x200000000000000(node=0|zone=2) [ 21.904567] page_type: f5(slab) [ 21.904970] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.905710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.906488] page dumped because: kasan: bad access detected [ 21.906996] [ 21.907345] Memory state around the buggy address: [ 21.907831] ffff888102914780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.908452] ffff888102914800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.909043] >ffff888102914880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.909495] ^ [ 21.909965] ffff888102914900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.910736] ffff888102914980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.911281] ================================================================== [ 21.769276] ================================================================== [ 21.770332] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 21.771664] Write of size 1 at addr ffff888102914873 by task kunit_try_catch/144 [ 21.772383] [ 21.774401] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G N 6.13.0-rc1-next-20241206 #1 [ 21.775585] Tainted: [N]=TEST [ 21.775960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.777310] Call Trace: [ 21.777774] <TASK> [ 21.778268] dump_stack_lvl+0x73/0xb0 [ 21.778778] print_report+0xd1/0x640 [ 21.779161] ? __virt_addr_valid+0x1db/0x2d0 [ 21.779547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 21.780092] kasan_report+0x102/0x140 [ 21.780531] ? kmalloc_oob_right+0x6f2/0x7f0 [ 21.781171] ? kmalloc_oob_right+0x6f2/0x7f0 [ 21.781557] __asan_report_store1_noabort+0x1b/0x30 [ 21.782218] kmalloc_oob_right+0x6f2/0x7f0 [ 21.782546] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 21.783146] ? __schedule+0xc70/0x27e0 [ 21.783685] ? __pfx_read_tsc+0x10/0x10 [ 21.784009] ? ktime_get_ts64+0x86/0x230 [ 21.784590] kunit_try_run_case+0x1b3/0x490 [ 21.785019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.785354] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 21.786073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.786531] ? __kthread_parkme+0x82/0x160 [ 21.786925] ? preempt_count_sub+0x50/0x80 [ 21.787694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.788068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.788732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.789396] kthread+0x257/0x310 [ 21.789679] ? __pfx_kthread+0x10/0x10 [ 21.790020] ret_from_fork+0x41/0x80 [ 21.790361] ? __pfx_kthread+0x10/0x10 [ 21.790883] ret_from_fork_asm+0x1a/0x30 [ 21.791543] </TASK> [ 21.792181] [ 21.792403] Allocated by task 144: [ 21.793110] kasan_save_stack+0x3d/0x60 [ 21.793602] kasan_save_track+0x18/0x40 [ 21.793969] kasan_save_alloc_info+0x3b/0x50 [ 21.794660] __kasan_kmalloc+0xb7/0xc0 [ 21.795103] __kmalloc_cache_noprof+0x184/0x410 [ 21.795479] kmalloc_oob_right+0xaa/0x7f0 [ 21.795771] kunit_try_run_case+0x1b3/0x490 [ 21.796099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.796808] kthread+0x257/0x310 [ 21.797303] ret_from_fork+0x41/0x80 [ 21.797566] ret_from_fork_asm+0x1a/0x30 [ 21.798005] [ 21.798420] The buggy address belongs to the object at ffff888102914800 [ 21.798420] which belongs to the cache kmalloc-128 of size 128 [ 21.800267] The buggy address is located 0 bytes to the right of [ 21.800267] allocated 115-byte region [ffff888102914800, ffff888102914873) [ 21.801368] [ 21.801774] The buggy address belongs to the physical page: [ 21.802515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102914 [ 21.803611] flags: 0x200000000000000(node=0|zone=2) [ 21.805183] page_type: f5(slab) [ 21.806688] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 21.807238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.808083] page dumped because: kasan: bad access detected [ 21.808661] [ 21.808842] Memory state around the buggy address: [ 21.809717] ffff888102914700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.810911] ffff888102914780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.811720] >ffff888102914800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.812471] ^ [ 21.813168] ffff888102914880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.813750] ffff888102914900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.814328] ==================================================================