Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   28.548604] ==================================================================
[   28.558185] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   28.565734] Read of size 18446744073709551614 at addr ffff000800c2e904 by task kunit_try_catch/227
[   28.574674] 
[   28.576161] CPU: 5 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.576214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.576229] Hardware name: WinLink E850-96 board (DT)
[   28.576249] Call trace:
[   28.576264]  show_stack+0x20/0x38 (C)
[   28.576301]  dump_stack_lvl+0x8c/0xd0
[   28.576339]  print_report+0x118/0x608
[   28.576372]  kasan_report+0xdc/0x128
[   28.576403]  kasan_check_range+0x100/0x1a8
[   28.576439]  __asan_memmove+0x3c/0x98
[   28.576465]  kmalloc_memmove_negative_size+0x154/0x2e0
[   28.576499]  kunit_try_run_case+0x170/0x3f0
[   28.576535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.576571]  kthread+0x328/0x630
[   28.576601]  ret_from_fork+0x10/0x20
[   28.576636] 
[   28.642901] Allocated by task 227:
[   28.646290]  kasan_save_stack+0x3c/0x68
[   28.650109]  kasan_save_track+0x20/0x40
[   28.653927]  kasan_save_alloc_info+0x40/0x58
[   28.658179]  __kasan_kmalloc+0xd4/0xd8
[   28.661913]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.666426]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   28.671459]  kunit_try_run_case+0x170/0x3f0
[   28.675627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.681097]  kthread+0x328/0x630
[   28.684307]  ret_from_fork+0x10/0x20
[   28.687866] 
[   28.689344] The buggy address belongs to the object at ffff000800c2e900
[   28.689344]  which belongs to the cache kmalloc-64 of size 64
[   28.701671] The buggy address is located 4 bytes inside of
[   28.701671]  64-byte region [ffff000800c2e900, ffff000800c2e940)
[   28.713126] 
[   28.714606] The buggy address belongs to the physical page:
[   28.720162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   28.728145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.734656] page_type: f5(slab)
[   28.737793] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   28.745511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.753231] page dumped because: kasan: bad access detected
[   28.758785] 
[   28.760260] Memory state around the buggy address:
[   28.765042]  ffff000800c2e800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.772244]  ffff000800c2e880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.779448] >ffff000800c2e900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   28.786649]                    ^
[   28.789865]  ffff000800c2e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.797071]  ffff000800c2ea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.804273] ==================================================================

[   25.481988] ==================================================================
[   25.483026] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   25.483406] Read of size 18446744073709551614 at addr fff00000c6418084 by task kunit_try_catch/180
[   25.483599] 
[   25.483676] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.483868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.483951] Hardware name: linux,dummy-virt (DT)
[   25.484029] Call trace:
[   25.484093]  show_stack+0x20/0x38 (C)
[   25.484252]  dump_stack_lvl+0x8c/0xd0
[   25.484567]  print_report+0x118/0x608
[   25.484688]  kasan_report+0xdc/0x128
[   25.484800]  kasan_check_range+0x100/0x1a8
[   25.484988]  __asan_memmove+0x3c/0x98
[   25.485160]  kmalloc_memmove_negative_size+0x154/0x2e0
[   25.485358]  kunit_try_run_case+0x170/0x3f0
[   25.485629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.485786]  kthread+0x328/0x630
[   25.485924]  ret_from_fork+0x10/0x20
[   25.486435] 
[   25.486820] Allocated by task 180:
[   25.486915]  kasan_save_stack+0x3c/0x68
[   25.487317]  kasan_save_track+0x20/0x40
[   25.487426]  kasan_save_alloc_info+0x40/0x58
[   25.487807]  __kasan_kmalloc+0xd4/0xd8
[   25.488090]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.488216]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   25.488691]  kunit_try_run_case+0x170/0x3f0
[   25.489354]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.489468]  kthread+0x328/0x630
[   25.489556]  ret_from_fork+0x10/0x20
[   25.491245] 
[   25.491743] The buggy address belongs to the object at fff00000c6418080
[   25.491743]  which belongs to the cache kmalloc-64 of size 64
[   25.492476] The buggy address is located 4 bytes inside of
[   25.492476]  64-byte region [fff00000c6418080, fff00000c64180c0)
[   25.493181] 
[   25.493255] The buggy address belongs to the physical page:
[   25.493366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418
[   25.493715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.493859] page_type: f5(slab)
[   25.494023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.494214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.494339] page dumped because: kasan: bad access detected
[   25.494552] 
[   25.494599] Memory state around the buggy address:
[   25.494670]  fff00000c6417f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.495638]  fff00000c6418000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.495800] >fff00000c6418080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.495901]                    ^
[   25.495991]  fff00000c6418100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.496140]  fff00000c6418180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.496309] ==================================================================

[   25.720407] ==================================================================
[   25.720541] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   25.720653] Read of size 18446744073709551614 at addr fff00000c7742d04 by task kunit_try_catch/180
[   25.720853] 
[   25.720933] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.721425] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.721495] Hardware name: linux,dummy-virt (DT)
[   25.721575] Call trace:
[   25.721637]  show_stack+0x20/0x38 (C)
[   25.722120]  dump_stack_lvl+0x8c/0xd0
[   25.722261]  print_report+0x118/0x608
[   25.722386]  kasan_report+0xdc/0x128
[   25.722514]  kasan_check_range+0x100/0x1a8
[   25.722689]  __asan_memmove+0x3c/0x98
[   25.722808]  kmalloc_memmove_negative_size+0x154/0x2e0
[   25.723374]  kunit_try_run_case+0x170/0x3f0
[   25.723715]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.723997]  kthread+0x328/0x630
[   25.724225]  ret_from_fork+0x10/0x20
[   25.724356] 
[   25.724423] Allocated by task 180:
[   25.724563]  kasan_save_stack+0x3c/0x68
[   25.724668]  kasan_save_track+0x20/0x40
[   25.724763]  kasan_save_alloc_info+0x40/0x58
[   25.724894]  __kasan_kmalloc+0xd4/0xd8
[   25.725008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.725515]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   25.726099]  kunit_try_run_case+0x170/0x3f0
[   25.726339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.726454]  kthread+0x328/0x630
[   25.726714]  ret_from_fork+0x10/0x20
[   25.726816] 
[   25.726884] The buggy address belongs to the object at fff00000c7742d00
[   25.726884]  which belongs to the cache kmalloc-64 of size 64
[   25.727312] The buggy address is located 4 bytes inside of
[   25.727312]  64-byte region [fff00000c7742d00, fff00000c7742d40)
[   25.727507] 
[   25.727557] The buggy address belongs to the physical page:
[   25.727629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107742
[   25.727769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.728098] page_type: f5(slab)
[   25.728377] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.728599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.728769] page dumped because: kasan: bad access detected
[   25.728945] 
[   25.728990] Memory state around the buggy address:
[   25.729066]  fff00000c7742c00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   25.730097]  fff00000c7742c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.730232] >fff00000c7742d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.730442]                    ^
[   25.730637]  fff00000c7742d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.730810]  fff00000c7742e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.731169] ==================================================================

[   19.138865] ==================================================================
[   19.139905] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   19.141536] Read of size 18446744073709551614 at addr ffff888102b89e04 by task kunit_try_catch/198
[   19.142722] 
[   19.143008] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.143133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.143169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.143222] Call Trace:
[   19.143426]  <TASK>
[   19.143483]  dump_stack_lvl+0x73/0xb0
[   19.143717]  print_report+0xd1/0x650
[   19.143757]  ? __virt_addr_valid+0x1db/0x2d0
[   19.143793]  ? kmalloc_memmove_negative_size+0x171/0x330
[   19.143829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.143860]  ? kmalloc_memmove_negative_size+0x171/0x330
[   19.143928]  kasan_report+0x141/0x180
[   19.143968]  ? kmalloc_memmove_negative_size+0x171/0x330
[   19.144012]  kasan_check_range+0x10c/0x1c0
[   19.144047]  __asan_memmove+0x27/0x70
[   19.144075]  kmalloc_memmove_negative_size+0x171/0x330
[   19.144111]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   19.144151]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   19.144193]  kunit_try_run_case+0x1a5/0x480
[   19.144253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.144303]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.144341]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.144377]  ? __kthread_parkme+0x82/0x180
[   19.144406]  ? preempt_count_sub+0x50/0x80
[   19.144437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.144474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.144541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.144867]  kthread+0x337/0x6f0
[   19.144902]  ? trace_preempt_on+0x20/0xc0
[   19.144939]  ? __pfx_kthread+0x10/0x10
[   19.144969]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.145000]  ? calculate_sigpending+0x7b/0xa0
[   19.145035]  ? __pfx_kthread+0x10/0x10
[   19.145065]  ret_from_fork+0x116/0x1d0
[   19.145091]  ? __pfx_kthread+0x10/0x10
[   19.145119]  ret_from_fork_asm+0x1a/0x30
[   19.145161]  </TASK>
[   19.145178] 
[   19.166371] Allocated by task 198:
[   19.167195]  kasan_save_stack+0x45/0x70
[   19.167997]  kasan_save_track+0x18/0x40
[   19.168782]  kasan_save_alloc_info+0x3b/0x50
[   19.168990]  __kasan_kmalloc+0xb7/0xc0
[   19.169154]  __kmalloc_cache_noprof+0x189/0x420
[   19.169567]  kmalloc_memmove_negative_size+0xac/0x330
[   19.169967]  kunit_try_run_case+0x1a5/0x480
[   19.170323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.172375]  kthread+0x337/0x6f0
[   19.173050]  ret_from_fork+0x116/0x1d0
[   19.173782]  ret_from_fork_asm+0x1a/0x30
[   19.174209] 
[   19.174471] The buggy address belongs to the object at ffff888102b89e00
[   19.174471]  which belongs to the cache kmalloc-64 of size 64
[   19.175678] The buggy address is located 4 bytes inside of
[   19.175678]  64-byte region [ffff888102b89e00, ffff888102b89e40)
[   19.176459] 
[   19.176907] The buggy address belongs to the physical page:
[   19.177701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b89
[   19.178773] flags: 0x200000000000000(node=0|zone=2)
[   19.179706] page_type: f5(slab)
[   19.180513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.181457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.182148] page dumped because: kasan: bad access detected
[   19.182671] 
[   19.182889] Memory state around the buggy address:
[   19.183318]  ffff888102b89d00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   19.184867]  ffff888102b89d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.185124] >ffff888102b89e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.185559]                    ^
[   19.185857]  ffff888102b89e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.186310]  ffff888102b89f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.186843] ==================================================================

[   18.192303] ==================================================================
[   18.193522] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x171/0x330
[   18.194057] Read of size 18446744073709551614 at addr ffff888103302304 by task kunit_try_catch/198
[   18.195669] 
[   18.195969] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.196079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.196101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.196152] Call Trace:
[   18.196169]  <TASK>
[   18.196189]  dump_stack_lvl+0x73/0xb0
[   18.196232]  print_report+0xd1/0x650
[   18.196264]  ? __virt_addr_valid+0x1db/0x2d0
[   18.196295]  ? kmalloc_memmove_negative_size+0x171/0x330
[   18.196330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.196361]  ? kmalloc_memmove_negative_size+0x171/0x330
[   18.196420]  kasan_report+0x141/0x180
[   18.196455]  ? kmalloc_memmove_negative_size+0x171/0x330
[   18.196497]  kasan_check_range+0x10c/0x1c0
[   18.196928]  __asan_memmove+0x27/0x70
[   18.197073]  kmalloc_memmove_negative_size+0x171/0x330
[   18.197222]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   18.197268]  ? __schedule+0x10cc/0x2b60
[   18.197304]  ? __pfx_read_tsc+0x10/0x10
[   18.197333]  ? ktime_get_ts64+0x86/0x230
[   18.197367]  kunit_try_run_case+0x1a5/0x480
[   18.197403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.197436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.197468]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.197501]  ? __kthread_parkme+0x82/0x180
[   18.197654]  ? preempt_count_sub+0x50/0x80
[   18.197695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.197732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.197766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.197800]  kthread+0x337/0x6f0
[   18.197827]  ? trace_preempt_on+0x20/0xc0
[   18.197859]  ? __pfx_kthread+0x10/0x10
[   18.197915]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.197949]  ? calculate_sigpending+0x7b/0xa0
[   18.197984]  ? __pfx_kthread+0x10/0x10
[   18.198013]  ret_from_fork+0x116/0x1d0
[   18.198038]  ? __pfx_kthread+0x10/0x10
[   18.198066]  ret_from_fork_asm+0x1a/0x30
[   18.198116]  </TASK>
[   18.198150] 
[   18.217745] Allocated by task 198:
[   18.218496]  kasan_save_stack+0x45/0x70
[   18.219026]  kasan_save_track+0x18/0x40
[   18.219469]  kasan_save_alloc_info+0x3b/0x50
[   18.219957]  __kasan_kmalloc+0xb7/0xc0
[   18.220390]  __kmalloc_cache_noprof+0x189/0x420
[   18.220748]  kmalloc_memmove_negative_size+0xac/0x330
[   18.222016]  kunit_try_run_case+0x1a5/0x480
[   18.222562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.223046]  kthread+0x337/0x6f0
[   18.223419]  ret_from_fork+0x116/0x1d0
[   18.224017]  ret_from_fork_asm+0x1a/0x30
[   18.224463] 
[   18.224862] The buggy address belongs to the object at ffff888103302300
[   18.224862]  which belongs to the cache kmalloc-64 of size 64
[   18.226338] The buggy address is located 4 bytes inside of
[   18.226338]  64-byte region [ffff888103302300, ffff888103302340)
[   18.227239] 
[   18.227456] The buggy address belongs to the physical page:
[   18.228195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103302
[   18.228995] flags: 0x200000000000000(node=0|zone=2)
[   18.229355] page_type: f5(slab)
[   18.229841] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.230972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.231918] page dumped because: kasan: bad access detected
[   18.232750] 
[   18.233015] Memory state around the buggy address:
[   18.233787]  ffff888103302200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.234304]  ffff888103302280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.235264] >ffff888103302300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.235986]                    ^
[   18.236845]  ffff888103302380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.237451]  ffff888103302400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.238141] ==================================================================

[   20.646950] ==================================================================
[   20.648011] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   20.648720] Read of size 18446744073709551614 at addr ffff00000e2e8a84 by task kunit_try_catch/233
[   20.649551] 
[   20.649719] CPU: 3 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.649770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.649786] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.649803] Call trace:
[   20.649814]  show_stack+0x20/0x38 (C)
[   20.649852]  dump_stack_lvl+0x8c/0xd0
[   20.649888]  print_report+0x118/0x608
[   20.649923]  kasan_report+0xdc/0x128
[   20.649954]  kasan_check_range+0x100/0x1a8
[   20.649990]  __asan_memmove+0x3c/0x98
[   20.650016]  kmalloc_memmove_negative_size+0x154/0x2e0
[   20.650050]  kunit_try_run_case+0x170/0x3f0
[   20.650084]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.650121]  kthread+0x328/0x630
[   20.650148]  ret_from_fork+0x10/0x20
[   20.650179] 
[   20.656109] Allocated by task 233:
[   20.656435]  kasan_save_stack+0x3c/0x68
[   20.656814]  kasan_save_track+0x20/0x40
[   20.657189]  kasan_save_alloc_info+0x40/0x58
[   20.657605]  __kasan_kmalloc+0xd4/0xd8
[   20.657971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.658408]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   20.658890]  kunit_try_run_case+0x170/0x3f0
[   20.659297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.659820]  kthread+0x328/0x630
[   20.660136]  ret_from_fork+0x10/0x20
[   20.660488] 
[   20.660641] The buggy address belongs to the object at ffff00000e2e8a80
[   20.660641]  which belongs to the cache kmalloc-64 of size 64
[   20.661758] The buggy address is located 4 bytes inside of
[   20.661758]  64-byte region [ffff00000e2e8a80, ffff00000e2e8ac0)
[   20.662801] 
[   20.662956] The buggy address belongs to the physical page:
[   20.663470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe2e8
[   20.664196] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.664807] page_type: f5(slab)
[   20.665119] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   20.665835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.666542] page dumped because: kasan: bad access detected
[   20.667056] 
[   20.667210] Memory state around the buggy address:
[   20.667658]  ffff00000e2e8980: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   20.668323]  ffff00000e2e8a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.668989] >ffff00000e2e8a80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.669650]                    ^
[   20.669960]  ffff00000e2e8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.670625]  ffff00000e2e8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.671286] ==================================================================