Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   94.028146] ==================================================================
[   94.028778] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x150/0x378
[   94.029373] Read of size 1 at addr ffff0000c60b6d7f by task kunit_try_catch/191
[   94.030089] 
[   94.030289] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   94.031258] Hardware name: linux,dummy-virt (DT)
[   94.031824] Call trace:
[   94.032194]  dump_backtrace+0x9c/0x128
[   94.032656]  show_stack+0x20/0x38
[   94.032988]  dump_stack_lvl+0x60/0xb0
[   94.033340]  print_report+0xf8/0x5e8
[   94.033899]  kasan_report+0xdc/0x128
[   94.034447]  __asan_load1+0x60/0x70
[   94.034999]  ksize_unpoisons_memory+0x150/0x378
[   94.035483]  kunit_try_run_case+0x114/0x298
[   94.036112]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.036777]  kthread+0x18c/0x1a8
[   94.037199]  ret_from_fork+0x10/0x20
[   94.037671] 
[   94.037861] Allocated by task 191:
[   94.038237]  kasan_save_stack+0x3c/0x68
[   94.039029]  kasan_set_track+0x2c/0x40
[   94.039636]  kasan_save_alloc_info+0x24/0x38
[   94.040132]  __kasan_kmalloc+0xd4/0xd8
[   94.040599]  kmalloc_trace+0x68/0x130
[   94.041013]  ksize_unpoisons_memory+0xb0/0x378
[   94.041836]  kunit_try_run_case+0x114/0x298
[   94.042519]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.043338]  kthread+0x18c/0x1a8
[   94.043788]  ret_from_fork+0x10/0x20
[   94.044261] 
[   94.044547] The buggy address belongs to the object at ffff0000c60b6d00
[   94.044547]  which belongs to the cache kmalloc-128 of size 128
[   94.045627] The buggy address is located 12 bytes to the right of
[   94.045627]  allocated 115-byte region [ffff0000c60b6d00, ffff0000c60b6d73)
[   94.046653] 
[   94.046981] The buggy address belongs to the physical page:
[   94.047582] page:00000000abb31ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b6
[   94.048725] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   94.049572] page_type: 0xffffffff()
[   94.050035] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[   94.051000] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   94.052141] page dumped because: kasan: bad access detected
[   94.052701] 
[   94.052945] Memory state around the buggy address:
[   94.053515]  ffff0000c60b6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   94.054221]  ffff0000c60b6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.055160] >ffff0000c60b6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   94.055838]                                                                 ^
[   94.056820]  ffff0000c60b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.057598]  ffff0000c60b6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.058292] ==================================================================
[   93.961287] ==================================================================
[   93.962021] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x104/0x378
[   93.963174] Read of size 1 at addr ffff0000c60b6d73 by task kunit_try_catch/191
[   93.963913] 
[   93.964158] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   93.964977] Hardware name: linux,dummy-virt (DT)
[   93.965459] Call trace:
[   93.965710]  dump_backtrace+0x9c/0x128
[   93.966167]  show_stack+0x20/0x38
[   93.966537]  dump_stack_lvl+0x60/0xb0
[   93.967571]  print_report+0xf8/0x5e8
[   93.968080]  kasan_report+0xdc/0x128
[   93.968553]  __asan_load1+0x60/0x70
[   93.969042]  ksize_unpoisons_memory+0x104/0x378
[   93.969616]  kunit_try_run_case+0x114/0x298
[   93.970123]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   93.970913]  kthread+0x18c/0x1a8
[   93.971248]  ret_from_fork+0x10/0x20
[   93.971624] 
[   93.971863] Allocated by task 191:
[   93.972190]  kasan_save_stack+0x3c/0x68
[   93.972713]  kasan_set_track+0x2c/0x40
[   93.973201]  kasan_save_alloc_info+0x24/0x38
[   93.973666]  __kasan_kmalloc+0xd4/0xd8
[   93.974148]  kmalloc_trace+0x68/0x130
[   93.974629]  ksize_unpoisons_memory+0xb0/0x378
[   93.975135]  kunit_try_run_case+0x114/0x298
[   93.975604]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   93.976621]  kthread+0x18c/0x1a8
[   93.977050]  ret_from_fork+0x10/0x20
[   93.977504] 
[   93.977769] The buggy address belongs to the object at ffff0000c60b6d00
[   93.977769]  which belongs to the cache kmalloc-128 of size 128
[   93.978754] The buggy address is located 0 bytes to the right of
[   93.978754]  allocated 115-byte region [ffff0000c60b6d00, ffff0000c60b6d73)
[   93.980045] 
[   93.980262] The buggy address belongs to the physical page:
[   93.980903] page:00000000abb31ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b6
[   93.981733] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   93.982378] page_type: 0xffffffff()
[   93.982810] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[   93.983565] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   93.984185] page dumped because: kasan: bad access detected
[   93.984840] 
[   93.985099] Memory state around the buggy address:
[   93.985688]  ffff0000c60b6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   93.986385]  ffff0000c60b6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.987192] >ffff0000c60b6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   93.987757]                                                              ^
[   93.988244]  ffff0000c60b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.988843]  ffff0000c60b6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.989586] ==================================================================
[   93.991929] ==================================================================
[   93.992696] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x128/0x378
[   93.993503] Read of size 1 at addr ffff0000c60b6d78 by task kunit_try_catch/191
[   93.994122] 
[   93.994354] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   93.995348] Hardware name: linux,dummy-virt (DT)
[   93.995943] Call trace:
[   93.996255]  dump_backtrace+0x9c/0x128
[   93.996754]  show_stack+0x20/0x38
[   93.997289]  dump_stack_lvl+0x60/0xb0
[   93.997678]  print_report+0xf8/0x5e8
[   93.998050]  kasan_report+0xdc/0x128
[   93.998436]  __asan_load1+0x60/0x70
[   93.999431]  ksize_unpoisons_memory+0x128/0x378
[   94.000158]  kunit_try_run_case+0x114/0x298
[   94.000819]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.001633]  kthread+0x18c/0x1a8
[   94.002135]  ret_from_fork+0x10/0x20
[   94.002900] 
[   94.003232] Allocated by task 191:
[   94.003591]  kasan_save_stack+0x3c/0x68
[   94.004029]  kasan_set_track+0x2c/0x40
[   94.004519]  kasan_save_alloc_info+0x24/0x38
[   94.005156]  __kasan_kmalloc+0xd4/0xd8
[   94.005669]  kmalloc_trace+0x68/0x130
[   94.006157]  ksize_unpoisons_memory+0xb0/0x378
[   94.006845]  kunit_try_run_case+0x114/0x298
[   94.007782]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   94.008331]  kthread+0x18c/0x1a8
[   94.008665]  ret_from_fork+0x10/0x20
[   94.009027] 
[   94.009300] The buggy address belongs to the object at ffff0000c60b6d00
[   94.009300]  which belongs to the cache kmalloc-128 of size 128
[   94.010665] The buggy address is located 5 bytes to the right of
[   94.010665]  allocated 115-byte region [ffff0000c60b6d00, ffff0000c60b6d73)
[   94.012482] 
[   94.012746] The buggy address belongs to the physical page:
[   94.013971] page:00000000abb31ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b6
[   94.014658] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff)
[   94.016142] page_type: 0xffffffff()
[   94.017092] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000
[   94.017857] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   94.018555] page dumped because: kasan: bad access detected
[   94.019117] 
[   94.019323] Memory state around the buggy address:
[   94.020422]  ffff0000c60b6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   94.021227]  ffff0000c60b6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.021989] >ffff0000c60b6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   94.022652]                                                                 ^
[   94.023374]  ffff0000c60b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.025174]  ffff0000c60b6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   94.025830] ==================================================================


[   35.069152] ==================================================================
[   35.070079] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x146/0x3b0
[   35.070580] Read of size 1 at addr ffff888102897a78 by task kunit_try_catch/206
[   35.071175] 
[   35.071332] CPU: 1 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.071847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.072432] Call Trace:
[   35.072620]  <TASK>
[   35.072798]  dump_stack_lvl+0x4e/0x90
[   35.073131]  print_report+0xd2/0x650
[   35.074131]  ? __virt_addr_valid+0x156/0x1e0
[   35.074490]  ? ksize_unpoisons_memory+0x146/0x3b0
[   35.074873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.075243]  ? ksize_unpoisons_memory+0x146/0x3b0
[   35.075579]  kasan_report+0x147/0x180
[   35.075889]  ? ksize_unpoisons_memory+0x146/0x3b0
[   35.076235]  __asan_load1+0x66/0x70
[   35.076519]  ksize_unpoisons_memory+0x146/0x3b0
[   35.076895]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   35.077243]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   35.078023]  ? __schedule+0x715/0x11a0
[   35.078333]  ? ktime_get_ts64+0x118/0x140
[   35.078648]  kunit_try_run_case+0x120/0x290
[   35.079048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.079398]  ? __kasan_check_write+0x18/0x20
[   35.079696]  ? trace_preempt_on+0x20/0xa0
[   35.080164]  ? __kthread_parkme+0x4f/0xd0
[   35.080573]  ? preempt_count_sub+0x50/0x80
[   35.080974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.081279]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.082206]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.082521]  kthread+0x19e/0x1e0
[   35.082732]  ? __pfx_kthread+0x10/0x10
[   35.083013]  ret_from_fork+0x41/0x70
[   35.083230]  ? __pfx_kthread+0x10/0x10
[   35.083444]  ret_from_fork_asm+0x1b/0x30
[   35.083764]  </TASK>
[   35.083955] 
[   35.084084] Allocated by task 206:
[   35.084326]  kasan_save_stack+0x44/0x70
[   35.084643]  kasan_set_track+0x29/0x40
[   35.084926]  kasan_save_alloc_info+0x22/0x30
[   35.085239]  __kasan_kmalloc+0xb7/0xc0
[   35.085592]  kmalloc_trace+0x4c/0xb0
[   35.085833]  ksize_unpoisons_memory+0xb0/0x3b0
[   35.086481]  kunit_try_run_case+0x120/0x290
[   35.087029]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.087428]  kthread+0x19e/0x1e0
[   35.087676]  ret_from_fork+0x41/0x70
[   35.088208]  ret_from_fork_asm+0x1b/0x30
[   35.088495] 
[   35.088639] The buggy address belongs to the object at ffff888102897a00
[   35.088639]  which belongs to the cache kmalloc-128 of size 128
[   35.089795] The buggy address is located 5 bytes to the right of
[   35.089795]  allocated 115-byte region [ffff888102897a00, ffff888102897a73)
[   35.090512] 
[   35.090642] The buggy address belongs to the physical page:
[   35.091021] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102897
[   35.091525] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.091890] page_type: 0xffffffff()
[   35.092123] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   35.092531] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   35.092955] page dumped because: kasan: bad access detected
[   35.093254] 
[   35.094023] Memory state around the buggy address:
[   35.094464]  ffff888102897900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.095235]  ffff888102897980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.096219] >ffff888102897a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.097293]                                                                 ^
[   35.098113]  ffff888102897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.099011]  ffff888102897b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.099410] ==================================================================
[   35.101251] ==================================================================
[   35.101793] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x183/0x3b0
[   35.102382] Read of size 1 at addr ffff888102897a7f by task kunit_try_catch/206
[   35.103384] 
[   35.103557] CPU: 1 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.104239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.105177] Call Trace:
[   35.105576]  <TASK>
[   35.105946]  dump_stack_lvl+0x4e/0x90
[   35.106248]  print_report+0xd2/0x650
[   35.106602]  ? __virt_addr_valid+0x156/0x1e0
[   35.107098]  ? ksize_unpoisons_memory+0x183/0x3b0
[   35.107607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.108077]  ? ksize_unpoisons_memory+0x183/0x3b0
[   35.108594]  kasan_report+0x147/0x180
[   35.109055]  ? ksize_unpoisons_memory+0x183/0x3b0
[   35.109906]  __asan_load1+0x66/0x70
[   35.110285]  ksize_unpoisons_memory+0x183/0x3b0
[   35.110708]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   35.111273]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   35.111941]  ? __schedule+0x715/0x11a0
[   35.112387]  ? ktime_get_ts64+0x118/0x140
[   35.112886]  kunit_try_run_case+0x120/0x290
[   35.113748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.114123]  ? __kasan_check_write+0x18/0x20
[   35.114354]  ? trace_preempt_on+0x20/0xa0
[   35.114568]  ? __kthread_parkme+0x4f/0xd0
[   35.114796]  ? preempt_count_sub+0x50/0x80
[   35.115449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.115791]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.116140]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.116493]  kthread+0x19e/0x1e0
[   35.116736]  ? __pfx_kthread+0x10/0x10
[   35.116999]  ret_from_fork+0x41/0x70
[   35.117257]  ? __pfx_kthread+0x10/0x10
[   35.117915]  ret_from_fork_asm+0x1b/0x30
[   35.118205]  </TASK>
[   35.118415] 
[   35.118556] Allocated by task 206:
[   35.118736]  kasan_save_stack+0x44/0x70
[   35.119098]  kasan_set_track+0x29/0x40
[   35.119337]  kasan_save_alloc_info+0x22/0x30
[   35.119574]  __kasan_kmalloc+0xb7/0xc0
[   35.119830]  kmalloc_trace+0x4c/0xb0
[   35.120051]  ksize_unpoisons_memory+0xb0/0x3b0
[   35.120335]  kunit_try_run_case+0x120/0x290
[   35.120572]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.120975]  kthread+0x19e/0x1e0
[   35.121182]  ret_from_fork+0x41/0x70
[   35.121422]  ret_from_fork_asm+0x1b/0x30
[   35.122183] 
[   35.122298] The buggy address belongs to the object at ffff888102897a00
[   35.122298]  which belongs to the cache kmalloc-128 of size 128
[   35.123030] The buggy address is located 12 bytes to the right of
[   35.123030]  allocated 115-byte region [ffff888102897a00, ffff888102897a73)
[   35.123688] 
[   35.123826] The buggy address belongs to the physical page:
[   35.124101] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102897
[   35.124594] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.124953] page_type: 0xffffffff()
[   35.125170] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   35.126066] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   35.126487] page dumped because: kasan: bad access detected
[   35.126797] 
[   35.126938] Memory state around the buggy address:
[   35.127219]  ffff888102897900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.127625]  ffff888102897980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.128055] >ffff888102897a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.128416]                                                                 ^
[   35.128897]  ffff888102897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.129281]  ffff888102897b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.130270] ==================================================================
[   35.043463] ==================================================================
[   35.044191] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10d/0x3b0
[   35.044717] Read of size 1 at addr ffff888102897a73 by task kunit_try_catch/206
[   35.045315] 
[   35.045460] CPU: 1 PID: 206 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.045996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.046838] Call Trace:
[   35.047042]  <TASK>
[   35.047220]  dump_stack_lvl+0x4e/0x90
[   35.047576]  print_report+0xd2/0x650
[   35.047903]  ? __virt_addr_valid+0x156/0x1e0
[   35.048253]  ? ksize_unpoisons_memory+0x10d/0x3b0
[   35.048598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   35.049101]  ? ksize_unpoisons_memory+0x10d/0x3b0
[   35.049448]  kasan_report+0x147/0x180
[   35.049691]  ? ksize_unpoisons_memory+0x10d/0x3b0
[   35.050017]  __asan_load1+0x66/0x70
[   35.050315]  ksize_unpoisons_memory+0x10d/0x3b0
[   35.050634]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   35.051047]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   35.051406]  ? __schedule+0x715/0x11a0
[   35.051687]  ? ktime_get_ts64+0x118/0x140
[   35.051990]  kunit_try_run_case+0x120/0x290
[   35.052313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.052649]  ? __kasan_check_write+0x18/0x20
[   35.052998]  ? trace_preempt_on+0x20/0xa0
[   35.053220]  ? __kthread_parkme+0x4f/0xd0
[   35.053557]  ? preempt_count_sub+0x50/0x80
[   35.053845]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.054224]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.054661]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.055043]  kthread+0x19e/0x1e0
[   35.055394]  ? __pfx_kthread+0x10/0x10
[   35.055776]  ret_from_fork+0x41/0x70
[   35.056040]  ? __pfx_kthread+0x10/0x10
[   35.056314]  ret_from_fork_asm+0x1b/0x30
[   35.056663]  </TASK>
[   35.056901] 
[   35.057038] Allocated by task 206:
[   35.057276]  kasan_save_stack+0x44/0x70
[   35.057615]  kasan_set_track+0x29/0x40
[   35.057913]  kasan_save_alloc_info+0x22/0x30
[   35.058212]  __kasan_kmalloc+0xb7/0xc0
[   35.058459]  kmalloc_trace+0x4c/0xb0
[   35.058680]  ksize_unpoisons_memory+0xb0/0x3b0
[   35.058983]  kunit_try_run_case+0x120/0x290
[   35.059337]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.059661]  kthread+0x19e/0x1e0
[   35.059914]  ret_from_fork+0x41/0x70
[   35.060129]  ret_from_fork_asm+0x1b/0x30
[   35.060371] 
[   35.060498] The buggy address belongs to the object at ffff888102897a00
[   35.060498]  which belongs to the cache kmalloc-128 of size 128
[   35.061254] The buggy address is located 0 bytes to the right of
[   35.061254]  allocated 115-byte region [ffff888102897a00, ffff888102897a73)
[   35.061971] 
[   35.062102] The buggy address belongs to the physical page:
[   35.062512] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102897
[   35.063138] flags: 0x200000000000800(slab|node=0|zone=2)
[   35.063504] page_type: 0xffffffff()
[   35.063776] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   35.064258] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   35.064687] page dumped because: kasan: bad access detected
[   35.065149] 
[   35.065259] Memory state around the buggy address:
[   35.065571]  ffff888102897900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   35.066081]  ffff888102897980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.066495] >ffff888102897a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   35.066982]                                                              ^
[   35.067369]  ffff888102897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.067800]  ffff888102897b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.068223] ==================================================================