Hay
Date
June 2, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.977257] ==================================================================
[   18.977796] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x528/0x5f0
[   18.978361] Write of size 1 at addr fff00000c64acc78 by task kunit_try_catch/125
[   18.978608] 
[   18.978732] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   18.978842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.978874] Hardware name: linux,dummy-virt (DT)
[   18.978914] Call trace:
[   18.978942]  dump_backtrace+0x9c/0x128
[   18.978996]  show_stack+0x20/0x38
[   18.979036]  dump_stack_lvl+0x8c/0xd0
[   18.979118]  print_report+0x118/0x5f0
[   18.979200]  kasan_report+0xdc/0x128
[   18.979298]  __asan_report_store1_noabort+0x20/0x30
[   18.979390]  kmalloc_oob_right+0x528/0x5f0
[   18.979484]  kunit_try_run_case+0x170/0x3f0
[   18.979589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.979696]  kthread+0x24c/0x2d0
[   18.979786]  ret_from_fork+0x10/0x20
[   18.979892] 
[   18.985506] Allocated by task 125:
[   18.985973]  kasan_save_stack+0x3c/0x68
[   18.986386]  kasan_save_track+0x20/0x40
[   18.986872]  kasan_save_alloc_info+0x40/0x58
[   18.987284]  __kasan_kmalloc+0xd4/0xd8
[   18.987744]  __kmalloc_cache_noprof+0x154/0x320
[   18.988281]  kmalloc_oob_right+0xb8/0x5f0
[   18.988698]  kunit_try_run_case+0x170/0x3f0
[   18.989115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.989625]  kthread+0x24c/0x2d0
[   18.990069]  ret_from_fork+0x10/0x20
[   18.990525] 
[   18.990802] The buggy address belongs to the object at fff00000c64acc00
[   18.990802]  which belongs to the cache kmalloc-128 of size 128
[   18.991662] The buggy address is located 5 bytes to the right of
[   18.991662]  allocated 115-byte region [fff00000c64acc00, fff00000c64acc73)
[   18.992630] 
[   18.992933] The buggy address belongs to the physical page:
[   18.993411] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ac
[   18.994153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.994771] page_type: f5(slab)
[   18.995168] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.995868] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   18.996464] page dumped because: kasan: bad access detected
[   18.996905] 
[   18.997167] Memory state around the buggy address:
[   18.997555]  fff00000c64acb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.998255]  fff00000c64acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.998750] >fff00000c64acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.999362]                                                                 ^
[   18.999963]  fff00000c64acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.000616]  fff00000c64acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.001265] ==================================================================
[   19.003418] ==================================================================
[   19.004069] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x588/0x5f0
[   19.004788] Read of size 1 at addr fff00000c64acc80 by task kunit_try_catch/125
[   19.005427] 
[   19.005712] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   19.005932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.005999] Hardware name: linux,dummy-virt (DT)
[   19.006087] Call trace:
[   19.006149]  dump_backtrace+0x9c/0x128
[   19.006274]  show_stack+0x20/0x38
[   19.006364]  dump_stack_lvl+0x8c/0xd0
[   19.006467]  print_report+0x118/0x5f0
[   19.006569]  kasan_report+0xdc/0x128
[   19.006652]  __asan_report_load1_noabort+0x20/0x30
[   19.006711]  kmalloc_oob_right+0x588/0x5f0
[   19.006756]  kunit_try_run_case+0x170/0x3f0
[   19.006803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.006851]  kthread+0x24c/0x2d0
[   19.006892]  ret_from_fork+0x10/0x20
[   19.006939] 
[   19.012068] Allocated by task 125:
[   19.012440]  kasan_save_stack+0x3c/0x68
[   19.012814]  kasan_save_track+0x20/0x40
[   19.013260]  kasan_save_alloc_info+0x40/0x58
[   19.013792]  __kasan_kmalloc+0xd4/0xd8
[   19.014210]  __kmalloc_cache_noprof+0x154/0x320
[   19.014704]  kmalloc_oob_right+0xb8/0x5f0
[   19.015151]  kunit_try_run_case+0x170/0x3f0
[   19.015649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.016179]  kthread+0x24c/0x2d0
[   19.016510]  ret_from_fork+0x10/0x20
[   19.016945] 
[   19.017226] The buggy address belongs to the object at fff00000c64acc00
[   19.017226]  which belongs to the cache kmalloc-128 of size 128
[   19.017996] The buggy address is located 13 bytes to the right of
[   19.017996]  allocated 115-byte region [fff00000c64acc00, fff00000c64acc73)
[   19.019020] 
[   19.019331] The buggy address belongs to the physical page:
[   19.019725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ac
[   19.020447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.020915] page_type: f5(slab)
[   19.021377] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.022048] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   19.022693] page dumped because: kasan: bad access detected
[   19.023166] 
[   19.023448] Memory state around the buggy address:
[   19.023862]  fff00000c64acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.024488]  fff00000c64acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.025185] >fff00000c64acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.025616]                    ^
[   19.026025]  fff00000c64acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.026665]  fff00000c64acd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.027299] ==================================================================
[   18.940440] ==================================================================
[   18.941601] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x56c/0x5f0
[   18.943446] Write of size 1 at addr fff00000c64acc73 by task kunit_try_catch/125
[   18.945118] 
[   18.946671] CPU: 1 UID: 0 PID: 125 Comm: kunit_try_catch Tainted: G                 N 6.12.32-rc1 #1
[   18.947410] Tainted: [N]=TEST
[   18.947497] Hardware name: linux,dummy-virt (DT)
[   18.947953] Call trace:
[   18.948007]  dump_backtrace+0x9c/0x128
[   18.948113]  show_stack+0x20/0x38
[   18.948157]  dump_stack_lvl+0x8c/0xd0
[   18.948208]  print_report+0x118/0x5f0
[   18.948294]  kasan_report+0xdc/0x128
[   18.948346]  __asan_report_store1_noabort+0x20/0x30
[   18.948393]  kmalloc_oob_right+0x56c/0x5f0
[   18.948438]  kunit_try_run_case+0x170/0x3f0
[   18.948485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.948533]  kthread+0x24c/0x2d0
[   18.948576]  ret_from_fork+0x10/0x20
[   18.948718] 
[   18.954068] Allocated by task 125:
[   18.954690]  kasan_save_stack+0x3c/0x68
[   18.955212]  kasan_save_track+0x20/0x40
[   18.955648]  kasan_save_alloc_info+0x40/0x58
[   18.956057]  __kasan_kmalloc+0xd4/0xd8
[   18.956542]  __kmalloc_cache_noprof+0x154/0x320
[   18.957087]  kmalloc_oob_right+0xb8/0x5f0
[   18.957456]  kunit_try_run_case+0x170/0x3f0
[   18.957956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.958526]  kthread+0x24c/0x2d0
[   18.958961]  ret_from_fork+0x10/0x20
[   18.959430] 
[   18.959800] The buggy address belongs to the object at fff00000c64acc00
[   18.959800]  which belongs to the cache kmalloc-128 of size 128
[   18.960768] The buggy address is located 0 bytes to the right of
[   18.960768]  allocated 115-byte region [fff00000c64acc00, fff00000c64acc73)
[   18.961772] 
[   18.962286] The buggy address belongs to the physical page:
[   18.963172] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064ac
[   18.964082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.965088] page_type: f5(slab)
[   18.966051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.966624] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   18.967412] page dumped because: kasan: bad access detected
[   18.967902] 
[   18.968196] Memory state around the buggy address:
[   18.969060]  fff00000c64acb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.969671]  fff00000c64acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.970330] >fff00000c64acc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.970905]                                                              ^
[   18.971576]  fff00000c64acc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.972181]  fff00000c64acd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.972859] ==================================================================

[   11.292542] ==================================================================
[   11.293368] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0
[   11.294413] Write of size 1 at addr ffff888102975073 by task kunit_try_catch/143
[   11.294866] 
[   11.296357] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G                 N 6.12.32-rc1 #1
[   11.296867] Tainted: [N]=TEST
[   11.296904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.297174] Call Trace:
[   11.297252]  <TASK>
[   11.297414]  dump_stack_lvl+0x73/0xb0
[   11.297513]  print_report+0xd1/0x640
[   11.297546]  ? __virt_addr_valid+0x1db/0x2d0
[   11.297571]  ? kmalloc_oob_right+0x6f2/0x7f0
[   11.297591]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.297613]  ? kmalloc_oob_right+0x6f2/0x7f0
[   11.297633]  kasan_report+0x140/0x180
[   11.297670]  ? kmalloc_oob_right+0x6f2/0x7f0
[   11.297700]  __asan_report_store1_noabort+0x1b/0x30
[   11.297720]  kmalloc_oob_right+0x6f2/0x7f0
[   11.297740]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.297762]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.297786]  kunit_try_run_case+0x1a6/0x480
[   11.297809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.297827]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.297848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.297870]  ? __kthread_parkme+0x82/0x160
[   11.297899]  ? preempt_count_sub+0x50/0x80
[   11.297928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.297948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.297974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.298000]  kthread+0x257/0x310
[   11.298019]  ? __pfx_kthread+0x10/0x10
[   11.298039]  ret_from_fork+0x41/0x80
[   11.298085]  ? __pfx_kthread+0x10/0x10
[   11.298106]  ret_from_fork_asm+0x1a/0x30
[   11.298171]  </TASK>
[   11.298259] 
[   11.305715] Allocated by task 143:
[   11.306200]  kasan_save_stack+0x45/0x70
[   11.306895]  kasan_save_track+0x18/0x40
[   11.307083]  kasan_save_alloc_info+0x3b/0x50
[   11.307369]  __kasan_kmalloc+0xb7/0xc0
[   11.307630]  __kmalloc_cache_noprof+0x168/0x350
[   11.307944]  kmalloc_oob_right+0xaa/0x7f0
[   11.308255]  kunit_try_run_case+0x1a6/0x480
[   11.308728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.308946]  kthread+0x257/0x310
[   11.309122]  ret_from_fork+0x41/0x80
[   11.309462]  ret_from_fork_asm+0x1a/0x30
[   11.309876] 
[   11.310200] The buggy address belongs to the object at ffff888102975000
[   11.310200]  which belongs to the cache kmalloc-128 of size 128
[   11.310981] The buggy address is located 0 bytes to the right of
[   11.310981]  allocated 115-byte region [ffff888102975000, ffff888102975073)
[   11.311807] 
[   11.312083] The buggy address belongs to the physical page:
[   11.312651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102975
[   11.313634] flags: 0x200000000000000(node=0|zone=2)
[   11.314453] page_type: f5(slab)
[   11.315284] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.315652] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.316275] page dumped because: kasan: bad access detected
[   11.316488] 
[   11.316650] Memory state around the buggy address:
[   11.317578]  ffff888102974f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.318048]  ffff888102974f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.318686] >ffff888102975000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.319048]                                                              ^
[   11.319507]  ffff888102975080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.320127]  ffff888102975100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.320567] ==================================================================
[   11.342521] ==================================================================
[   11.343088] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0
[   11.343573] Read of size 1 at addr ffff888102975080 by task kunit_try_catch/143
[   11.344040] 
[   11.344347] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.344432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.344456] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.344494] Call Trace:
[   11.344521]  <TASK>
[   11.344550]  dump_stack_lvl+0x73/0xb0
[   11.344605]  print_report+0xd1/0x640
[   11.344649]  ? __virt_addr_valid+0x1db/0x2d0
[   11.344704]  ? kmalloc_oob_right+0x68c/0x7f0
[   11.344741]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.344776]  ? kmalloc_oob_right+0x68c/0x7f0
[   11.344811]  kasan_report+0x140/0x180
[   11.344850]  ? kmalloc_oob_right+0x68c/0x7f0
[   11.344917]  __asan_report_load1_noabort+0x18/0x20
[   11.344958]  kmalloc_oob_right+0x68c/0x7f0
[   11.345012]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.345097]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.345149]  kunit_try_run_case+0x1a6/0x480
[   11.345189]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.345223]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.345262]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.345306]  ? __kthread_parkme+0x82/0x160
[   11.345345]  ? preempt_count_sub+0x50/0x80
[   11.345385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.345422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.345468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.345516]  kthread+0x257/0x310
[   11.345553]  ? __pfx_kthread+0x10/0x10
[   11.345592]  ret_from_fork+0x41/0x80
[   11.345631]  ? __pfx_kthread+0x10/0x10
[   11.345674]  ret_from_fork_asm+0x1a/0x30
[   11.345747]  </TASK>
[   11.345768] 
[   11.353126] Allocated by task 143:
[   11.353388]  kasan_save_stack+0x45/0x70
[   11.353663]  kasan_save_track+0x18/0x40
[   11.353967]  kasan_save_alloc_info+0x3b/0x50
[   11.354212]  __kasan_kmalloc+0xb7/0xc0
[   11.354526]  __kmalloc_cache_noprof+0x168/0x350
[   11.354768]  kmalloc_oob_right+0xaa/0x7f0
[   11.354976]  kunit_try_run_case+0x1a6/0x480
[   11.355215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.355454]  kthread+0x257/0x310
[   11.355627]  ret_from_fork+0x41/0x80
[   11.355908]  ret_from_fork_asm+0x1a/0x30
[   11.356237] 
[   11.356394] The buggy address belongs to the object at ffff888102975000
[   11.356394]  which belongs to the cache kmalloc-128 of size 128
[   11.357167] The buggy address is located 13 bytes to the right of
[   11.357167]  allocated 115-byte region [ffff888102975000, ffff888102975073)
[   11.357977] 
[   11.358139] The buggy address belongs to the physical page:
[   11.358541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102975
[   11.358834] flags: 0x200000000000000(node=0|zone=2)
[   11.359219] page_type: f5(slab)
[   11.359467] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.359870] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.360277] page dumped because: kasan: bad access detected
[   11.360544] 
[   11.360663] Memory state around the buggy address:
[   11.360991]  ffff888102974f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.361304]  ffff888102975000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.361786] >ffff888102975080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.362166]                    ^
[   11.362414]  ffff888102975100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.362861]  ffff888102975180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.363229] ==================================================================
[   11.323358] ==================================================================
[   11.323675] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0
[   11.324033] Write of size 1 at addr ffff888102975078 by task kunit_try_catch/143
[   11.324551] 
[   11.324724] CPU: 1 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.12.32-rc1 #1
[   11.324800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   11.324821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   11.324857] Call Trace:
[   11.324903]  <TASK>
[   11.324935]  dump_stack_lvl+0x73/0xb0
[   11.324998]  print_report+0xd1/0x640
[   11.325038]  ? __virt_addr_valid+0x1db/0x2d0
[   11.325109]  ? kmalloc_oob_right+0x6bf/0x7f0
[   11.325149]  ? kasan_complete_mode_report_info+0x2a/0x200
[   11.325190]  ? kmalloc_oob_right+0x6bf/0x7f0
[   11.325233]  kasan_report+0x140/0x180
[   11.325273]  ? kmalloc_oob_right+0x6bf/0x7f0
[   11.325317]  __asan_report_store1_noabort+0x1b/0x30
[   11.325355]  kmalloc_oob_right+0x6bf/0x7f0
[   11.325417]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.325462]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   11.325508]  kunit_try_run_case+0x1a6/0x480
[   11.325546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.325577]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.325616]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   11.325671]  ? __kthread_parkme+0x82/0x160
[   11.325704]  ? preempt_count_sub+0x50/0x80
[   11.325727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.325746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.325769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.325792]  kthread+0x257/0x310
[   11.325809]  ? __pfx_kthread+0x10/0x10
[   11.325826]  ret_from_fork+0x41/0x80
[   11.325845]  ? __pfx_kthread+0x10/0x10
[   11.325863]  ret_from_fork_asm+0x1a/0x30
[   11.325905]  </TASK>
[   11.325922] 
[   11.332503] Allocated by task 143:
[   11.332712]  kasan_save_stack+0x45/0x70
[   11.332993]  kasan_save_track+0x18/0x40
[   11.333310]  kasan_save_alloc_info+0x3b/0x50
[   11.333564]  __kasan_kmalloc+0xb7/0xc0
[   11.333861]  __kmalloc_cache_noprof+0x168/0x350
[   11.334179]  kmalloc_oob_right+0xaa/0x7f0
[   11.334398]  kunit_try_run_case+0x1a6/0x480
[   11.334712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   11.334944]  kthread+0x257/0x310
[   11.335230]  ret_from_fork+0x41/0x80
[   11.335462]  ret_from_fork_asm+0x1a/0x30
[   11.335628] 
[   11.335782] The buggy address belongs to the object at ffff888102975000
[   11.335782]  which belongs to the cache kmalloc-128 of size 128
[   11.336431] The buggy address is located 5 bytes to the right of
[   11.336431]  allocated 115-byte region [ffff888102975000, ffff888102975073)
[   11.336941] 
[   11.337078] The buggy address belongs to the physical page:
[   11.337273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102975
[   11.337740] flags: 0x200000000000000(node=0|zone=2)
[   11.338129] page_type: f5(slab)
[   11.338400] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   11.338890] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000
[   11.339362] page dumped because: kasan: bad access detected
[   11.339575] 
[   11.339724] Memory state around the buggy address:
[   11.339972]  ffff888102974f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.340297]  ffff888102974f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.340532] >ffff888102975000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   11.340760]                                                                 ^
[   11.340988]  ffff888102975080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.341241]  ffff888102975100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.341585] ==================================================================