Hay
Date
Dec. 9, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.886487] ==================================================================
[   22.887918] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   22.889451] Write of size 1 at addr fff00000c126df73 by task kunit_try_catch/124
[   22.890326] 
[   22.891847] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc2-next-20241209 #1
[   22.893059] Tainted: [N]=TEST
[   22.893522] Hardware name: linux,dummy-virt (DT)
[   22.894469] Call trace:
[   22.895130]  show_stack+0x20/0x38 (C)
[   22.895990]  dump_stack_lvl+0x8c/0xd0
[   22.896499]  print_report+0x118/0x5e0
[   22.897020]  kasan_report+0xc8/0x118
[   22.897578]  __asan_report_store1_noabort+0x20/0x30
[   22.898217]  kmalloc_oob_right+0x5a4/0x660
[   22.898877]  kunit_try_run_case+0x14c/0x3d0
[   22.899504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.900564]  kthread+0x24c/0x2d0
[   22.901093]  ret_from_fork+0x10/0x20
[   22.901926] 
[   22.902344] Allocated by task 124:
[   22.903266]  kasan_save_stack+0x3c/0x68
[   22.903818]  kasan_save_track+0x20/0x40
[   22.904366]  kasan_save_alloc_info+0x40/0x58
[   22.904989]  __kasan_kmalloc+0xd4/0xd8
[   22.905484]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.906118]  kmalloc_oob_right+0xb0/0x660
[   22.906665]  kunit_try_run_case+0x14c/0x3d0
[   22.907328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.907946]  kthread+0x24c/0x2d0
[   22.908798]  ret_from_fork+0x10/0x20
[   22.909537] 
[   22.910109] The buggy address belongs to the object at fff00000c126df00
[   22.910109]  which belongs to the cache kmalloc-128 of size 128
[   22.912031] The buggy address is located 0 bytes to the right of
[   22.912031]  allocated 115-byte region [fff00000c126df00, fff00000c126df73)
[   22.913300] 
[   22.913822] The buggy address belongs to the physical page:
[   22.914806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d
[   22.916028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.917013] page_type: f5(slab)
[   22.918097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.918893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.920054] page dumped because: kasan: bad access detected
[   22.920777] 
[   22.921084] Memory state around the buggy address:
[   22.922113]  fff00000c126de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   22.923198]  fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.924339] >fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.925216]                                                              ^
[   22.926076]  fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.926847]  fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.927944] ==================================================================
[   22.930691] ==================================================================
[   22.931811] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   22.932440] Write of size 1 at addr fff00000c126df78 by task kunit_try_catch/124
[   22.933032] 
[   22.933420] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   22.934801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.935554] Hardware name: linux,dummy-virt (DT)
[   22.936153] Call trace:
[   22.936632]  show_stack+0x20/0x38 (C)
[   22.937917]  dump_stack_lvl+0x8c/0xd0
[   22.938639]  print_report+0x118/0x5e0
[   22.939440]  kasan_report+0xc8/0x118
[   22.940152]  __asan_report_store1_noabort+0x20/0x30
[   22.940791]  kmalloc_oob_right+0x538/0x660
[   22.941273]  kunit_try_run_case+0x14c/0x3d0
[   22.941970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.942631]  kthread+0x24c/0x2d0
[   22.943559]  ret_from_fork+0x10/0x20
[   22.944009] 
[   22.944286] Allocated by task 124:
[   22.944632]  kasan_save_stack+0x3c/0x68
[   22.945237]  kasan_save_track+0x20/0x40
[   22.945918]  kasan_save_alloc_info+0x40/0x58
[   22.946483]  __kasan_kmalloc+0xd4/0xd8
[   22.947051]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.947932]  kmalloc_oob_right+0xb0/0x660
[   22.948499]  kunit_try_run_case+0x14c/0x3d0
[   22.949084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.949789]  kthread+0x24c/0x2d0
[   22.950155]  ret_from_fork+0x10/0x20
[   22.950815] 
[   22.951159] The buggy address belongs to the object at fff00000c126df00
[   22.951159]  which belongs to the cache kmalloc-128 of size 128
[   22.953294] The buggy address is located 5 bytes to the right of
[   22.953294]  allocated 115-byte region [fff00000c126df00, fff00000c126df73)
[   22.954639] 
[   22.955192] The buggy address belongs to the physical page:
[   22.956004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d
[   22.956755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.957478] page_type: f5(slab)
[   22.958028] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.958886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.959687] page dumped because: kasan: bad access detected
[   22.960358] 
[   22.961018] Memory state around the buggy address:
[   22.961614]  fff00000c126de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.962673]  fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.964099] >fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.965099]                                                                 ^
[   22.965879]  fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.966783]  fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   22.967584] ==================================================================
[   22.969889] ==================================================================
[   22.970841] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   22.972105] Read of size 1 at addr fff00000c126df80 by task kunit_try_catch/124
[   22.973248] 
[   22.973551] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   22.975023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.975633] Hardware name: linux,dummy-virt (DT)
[   22.976131] Call trace:
[   22.976642]  show_stack+0x20/0x38 (C)
[   22.977416]  dump_stack_lvl+0x8c/0xd0
[   22.977963]  print_report+0x118/0x5e0
[   22.978718]  kasan_report+0xc8/0x118
[   22.979367]  __asan_report_load1_noabort+0x20/0x30
[   22.980158]  kmalloc_oob_right+0x5d0/0x660
[   22.980824]  kunit_try_run_case+0x14c/0x3d0
[   22.981089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.981379]  kthread+0x24c/0x2d0
[   22.981599]  ret_from_fork+0x10/0x20
[   22.981855] 
[   22.981993] Allocated by task 124:
[   22.982190]  kasan_save_stack+0x3c/0x68
[   22.982425]  kasan_save_track+0x20/0x40
[   22.982649]  kasan_save_alloc_info+0x40/0x58
[   22.984179]  __kasan_kmalloc+0xd4/0xd8
[   22.984667]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.985184]  kmalloc_oob_right+0xb0/0x660
[   22.986013]  kunit_try_run_case+0x14c/0x3d0
[   22.986920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.987607]  kthread+0x24c/0x2d0
[   22.988463]  ret_from_fork+0x10/0x20
[   22.989019] 
[   22.989545] The buggy address belongs to the object at fff00000c126df00
[   22.989545]  which belongs to the cache kmalloc-128 of size 128
[   22.991110] The buggy address is located 13 bytes to the right of
[   22.991110]  allocated 115-byte region [fff00000c126df00, fff00000c126df73)
[   22.992447] 
[   22.993058] The buggy address belongs to the physical page:
[   22.993723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d
[   22.994780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.995680] page_type: f5(slab)
[   22.996501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.997342] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.998156] page dumped because: kasan: bad access detected
[   22.998820] 
[   22.999164] Memory state around the buggy address:
[   22.999877]  fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.001411]  fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   23.002259] >fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.003107]                    ^
[   23.003521]  fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.004803]  fff00000c126e080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.005631] ==================================================================

[   22.461182] ==================================================================
[   22.461827] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   22.462753] Write of size 1 at addr ffff888102954378 by task kunit_try_catch/143
[   22.463616] 
[   22.464171] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   22.465320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.465897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.466825] Call Trace:
[   22.467421]  <TASK>
[   22.467650]  dump_stack_lvl+0x73/0xb0
[   22.468360]  print_report+0xd1/0x640
[   22.468562]  ? __virt_addr_valid+0x1db/0x2d0
[   22.468761]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.469600]  kasan_report+0x102/0x140
[   22.470537]  ? kmalloc_oob_right+0x6bf/0x7f0
[   22.471446]  ? kmalloc_oob_right+0x6bf/0x7f0
[   22.472355]  __asan_report_store1_noabort+0x1b/0x30
[   22.472976]  kmalloc_oob_right+0x6bf/0x7f0
[   22.473387]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.473847]  ? __schedule+0xc70/0x27e0
[   22.474393]  ? __pfx_read_tsc+0x10/0x10
[   22.474970]  ? ktime_get_ts64+0x86/0x230
[   22.475604]  kunit_try_run_case+0x1b3/0x490
[   22.476320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.476985]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.477713]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.478534]  ? __kthread_parkme+0x82/0x160
[   22.479126]  ? preempt_count_sub+0x50/0x80
[   22.479577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.480372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.481116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.481855]  kthread+0x257/0x310
[   22.482181]  ? __pfx_kthread+0x10/0x10
[   22.482564]  ret_from_fork+0x41/0x80
[   22.482995]  ? __pfx_kthread+0x10/0x10
[   22.483460]  ret_from_fork_asm+0x1a/0x30
[   22.483880]  </TASK>
[   22.484199] 
[   22.484409] Allocated by task 143:
[   22.484860]  kasan_save_stack+0x3d/0x60
[   22.485260]  kasan_save_track+0x18/0x40
[   22.485600]  kasan_save_alloc_info+0x3b/0x50
[   22.486100]  __kasan_kmalloc+0xb7/0xc0
[   22.486413]  __kmalloc_cache_noprof+0x184/0x410
[   22.487003]  kmalloc_oob_right+0xaa/0x7f0
[   22.487334]  kunit_try_run_case+0x1b3/0x490
[   22.487873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.488510]  kthread+0x257/0x310
[   22.488901]  ret_from_fork+0x41/0x80
[   22.489353]  ret_from_fork_asm+0x1a/0x30
[   22.489661] 
[   22.489931] The buggy address belongs to the object at ffff888102954300
[   22.489931]  which belongs to the cache kmalloc-128 of size 128
[   22.490767] The buggy address is located 5 bytes to the right of
[   22.490767]  allocated 115-byte region [ffff888102954300, ffff888102954373)
[   22.491964] 
[   22.492229] The buggy address belongs to the physical page:
[   22.492822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954
[   22.493362] flags: 0x200000000000000(node=0|zone=2)
[   22.493987] page_type: f5(slab)
[   22.494452] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.495123] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.495859] page dumped because: kasan: bad access detected
[   22.496280] 
[   22.496484] Memory state around the buggy address:
[   22.496889]  ffff888102954200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   22.497619]  ffff888102954280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.498157] >ffff888102954300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.498889]                                                                 ^
[   22.499542]  ffff888102954380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.500222]  ffff888102954400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.500903] ==================================================================
[   22.502148] ==================================================================
[   22.503249] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   22.503666] Read of size 1 at addr ffff888102954380 by task kunit_try_catch/143
[   22.504508] 
[   22.504758] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   22.505527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.506035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.506817] Call Trace:
[   22.507179]  <TASK>
[   22.507467]  dump_stack_lvl+0x73/0xb0
[   22.507961]  print_report+0xd1/0x640
[   22.508430]  ? __virt_addr_valid+0x1db/0x2d0
[   22.508745]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.509454]  kasan_report+0x102/0x140
[   22.509971]  ? kmalloc_oob_right+0x68c/0x7f0
[   22.510286]  ? kmalloc_oob_right+0x68c/0x7f0
[   22.510672]  __asan_report_load1_noabort+0x18/0x20
[   22.511285]  kmalloc_oob_right+0x68c/0x7f0
[   22.511862]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.512954]  ? __schedule+0xc70/0x27e0
[   22.513445]  ? __pfx_read_tsc+0x10/0x10
[   22.513927]  ? ktime_get_ts64+0x86/0x230
[   22.514402]  kunit_try_run_case+0x1b3/0x490
[   22.514809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.515232]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.516798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.517626]  ? __kthread_parkme+0x82/0x160
[   22.518562]  ? preempt_count_sub+0x50/0x80
[   22.519337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.519824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.520487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.521252]  kthread+0x257/0x310
[   22.521773]  ? __pfx_kthread+0x10/0x10
[   22.522148]  ret_from_fork+0x41/0x80
[   22.522657]  ? __pfx_kthread+0x10/0x10
[   22.523150]  ret_from_fork_asm+0x1a/0x30
[   22.523748]  </TASK>
[   22.524085] 
[   22.524379] Allocated by task 143:
[   22.524758]  kasan_save_stack+0x3d/0x60
[   22.525923]  kasan_save_track+0x18/0x40
[   22.526472]  kasan_save_alloc_info+0x3b/0x50
[   22.527253]  __kasan_kmalloc+0xb7/0xc0
[   22.527697]  __kmalloc_cache_noprof+0x184/0x410
[   22.528653]  kmalloc_oob_right+0xaa/0x7f0
[   22.529940]  kunit_try_run_case+0x1b3/0x490
[   22.530359]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.531177]  kthread+0x257/0x310
[   22.531622]  ret_from_fork+0x41/0x80
[   22.532018]  ret_from_fork_asm+0x1a/0x30
[   22.532436] 
[   22.532622] The buggy address belongs to the object at ffff888102954300
[   22.532622]  which belongs to the cache kmalloc-128 of size 128
[   22.534571] The buggy address is located 13 bytes to the right of
[   22.534571]  allocated 115-byte region [ffff888102954300, ffff888102954373)
[   22.535663] 
[   22.535969] The buggy address belongs to the physical page:
[   22.536802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954
[   22.537492] flags: 0x200000000000000(node=0|zone=2)
[   22.538266] page_type: f5(slab)
[   22.538881] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.539667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.540358] page dumped because: kasan: bad access detected
[   22.540834] 
[   22.541251] Memory state around the buggy address:
[   22.542439]  ffff888102954280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.543553]  ffff888102954300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.544384] >ffff888102954380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.545200]                    ^
[   22.545840]  ffff888102954400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.546357]  ffff888102954480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.547040] ==================================================================
[   22.402224] ==================================================================
[   22.403852] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   22.405031] Write of size 1 at addr ffff888102954373 by task kunit_try_catch/143
[   22.405762] 
[   22.407593] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G                 N 6.13.0-rc2-next-20241209 #1
[   22.409002] Tainted: [N]=TEST
[   22.409265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.410542] Call Trace:
[   22.411008]  <TASK>
[   22.411659]  dump_stack_lvl+0x73/0xb0
[   22.412563]  print_report+0xd1/0x640
[   22.413090]  ? __virt_addr_valid+0x1db/0x2d0
[   22.413787]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.414425]  kasan_report+0x102/0x140
[   22.415343]  ? kmalloc_oob_right+0x6f2/0x7f0
[   22.415777]  ? kmalloc_oob_right+0x6f2/0x7f0
[   22.416248]  __asan_report_store1_noabort+0x1b/0x30
[   22.416763]  kmalloc_oob_right+0x6f2/0x7f0
[   22.417949]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   22.418687]  ? __schedule+0xc70/0x27e0
[   22.419069]  ? __pfx_read_tsc+0x10/0x10
[   22.419582]  ? ktime_get_ts64+0x86/0x230
[   22.420102]  kunit_try_run_case+0x1b3/0x490
[   22.420604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.421596]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.422605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.423154]  ? __kthread_parkme+0x82/0x160
[   22.423741]  ? preempt_count_sub+0x50/0x80
[   22.424360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.424598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.425204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.425773]  kthread+0x257/0x310
[   22.426650]  ? __pfx_kthread+0x10/0x10
[   22.427392]  ret_from_fork+0x41/0x80
[   22.427727]  ? __pfx_kthread+0x10/0x10
[   22.428503]  ret_from_fork_asm+0x1a/0x30
[   22.429384]  </TASK>
[   22.429755] 
[   22.430422] Allocated by task 143:
[   22.431457]  kasan_save_stack+0x3d/0x60
[   22.432195]  kasan_save_track+0x18/0x40
[   22.432682]  kasan_save_alloc_info+0x3b/0x50
[   22.433403]  __kasan_kmalloc+0xb7/0xc0
[   22.433682]  __kmalloc_cache_noprof+0x184/0x410
[   22.434284]  kmalloc_oob_right+0xaa/0x7f0
[   22.434649]  kunit_try_run_case+0x1b3/0x490
[   22.435247]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.435893]  kthread+0x257/0x310
[   22.436656]  ret_from_fork+0x41/0x80
[   22.437468]  ret_from_fork_asm+0x1a/0x30
[   22.438184] 
[   22.438511] The buggy address belongs to the object at ffff888102954300
[   22.438511]  which belongs to the cache kmalloc-128 of size 128
[   22.440451] The buggy address is located 0 bytes to the right of
[   22.440451]  allocated 115-byte region [ffff888102954300, ffff888102954373)
[   22.442743] 
[   22.443383] The buggy address belongs to the physical page:
[   22.444559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954
[   22.445729] flags: 0x200000000000000(node=0|zone=2)
[   22.447112] page_type: f5(slab)
[   22.448226] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.448827] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.449617] page dumped because: kasan: bad access detected
[   22.450733] 
[   22.451256] Memory state around the buggy address:
[   22.452266]  ffff888102954200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   22.452908]  ffff888102954280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.453686] >ffff888102954300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   22.455009]                                                              ^
[   22.455586]  ffff888102954380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.456710]  ffff888102954400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.458391] ==================================================================