Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 28.813228] ================================================================== [ 28.823545] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.831442] Read of size 64 at addr ffff000800d62204 by task kunit_try_catch/229 [ 28.838819] [ 28.840306] CPU: 7 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.840368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.840386] Hardware name: WinLink E850-96 board (DT) [ 28.840406] Call trace: [ 28.840422] show_stack+0x20/0x38 (C) [ 28.840459] dump_stack_lvl+0x8c/0xd0 [ 28.840497] print_report+0x118/0x608 [ 28.840533] kasan_report+0xdc/0x128 [ 28.840566] kasan_check_range+0x100/0x1a8 [ 28.840603] __asan_memmove+0x3c/0x98 [ 28.840632] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 28.840668] kunit_try_run_case+0x170/0x3f0 [ 28.840706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.840746] kthread+0x328/0x630 [ 28.840775] ret_from_fork+0x10/0x20 [ 28.840810] [ 28.906961] Allocated by task 229: [ 28.910348] kasan_save_stack+0x3c/0x68 [ 28.914164] kasan_save_track+0x20/0x40 [ 28.917984] kasan_save_alloc_info+0x40/0x58 [ 28.922237] __kasan_kmalloc+0xd4/0xd8 [ 28.925971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.930484] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 28.935432] kunit_try_run_case+0x170/0x3f0 [ 28.939598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.945067] kthread+0x328/0x630 [ 28.948279] ret_from_fork+0x10/0x20 [ 28.951838] [ 28.953316] The buggy address belongs to the object at ffff000800d62200 [ 28.953316] which belongs to the cache kmalloc-64 of size 64 [ 28.965642] The buggy address is located 4 bytes inside of [ 28.965642] allocated 64-byte region [ffff000800d62200, ffff000800d62240) [ 28.977966] [ 28.979445] The buggy address belongs to the physical page: [ 28.985002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62 [ 28.992985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.999495] page_type: f5(slab) [ 29.002631] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 29.010351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.018071] page dumped because: kasan: bad access detected [ 29.023625] [ 29.025100] Memory state around the buggy address: [ 29.029881] ffff000800d62100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.037083] ffff000800d62180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.044289] >ffff000800d62200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.051488] ^ [ 29.056788] ffff000800d62280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.063993] ffff000800d62300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.071195] ==================================================================
[ 25.508678] ================================================================== [ 25.508802] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 25.508922] Read of size 64 at addr fff00000c6418284 by task kunit_try_catch/182 [ 25.509179] [ 25.509368] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.509898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.510097] Hardware name: linux,dummy-virt (DT) [ 25.510235] Call trace: [ 25.510291] show_stack+0x20/0x38 (C) [ 25.510609] dump_stack_lvl+0x8c/0xd0 [ 25.510773] print_report+0x118/0x608 [ 25.510904] kasan_report+0xdc/0x128 [ 25.511043] kasan_check_range+0x100/0x1a8 [ 25.511198] __asan_memmove+0x3c/0x98 [ 25.511650] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 25.511865] kunit_try_run_case+0x170/0x3f0 [ 25.512113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.512264] kthread+0x328/0x630 [ 25.512400] ret_from_fork+0x10/0x20 [ 25.512759] [ 25.512807] Allocated by task 182: [ 25.512963] kasan_save_stack+0x3c/0x68 [ 25.513112] kasan_save_track+0x20/0x40 [ 25.513284] kasan_save_alloc_info+0x40/0x58 [ 25.513409] __kasan_kmalloc+0xd4/0xd8 [ 25.513541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.513667] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 25.513929] kunit_try_run_case+0x170/0x3f0 [ 25.514052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.514249] kthread+0x328/0x630 [ 25.514342] ret_from_fork+0x10/0x20 [ 25.514436] [ 25.514482] The buggy address belongs to the object at fff00000c6418280 [ 25.514482] which belongs to the cache kmalloc-64 of size 64 [ 25.514620] The buggy address is located 4 bytes inside of [ 25.514620] allocated 64-byte region [fff00000c6418280, fff00000c64182c0) [ 25.514768] [ 25.514815] The buggy address belongs to the physical page: [ 25.514984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418 [ 25.515497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.515625] page_type: f5(slab) [ 25.515731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.515872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.516002] page dumped because: kasan: bad access detected [ 25.517119] [ 25.517192] Memory state around the buggy address: [ 25.517305] fff00000c6418180: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.517659] fff00000c6418200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.518017] >fff00000c6418280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.518127] ^ [ 25.518232] fff00000c6418300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.519214] fff00000c6418380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.519463] ==================================================================
[ 25.748101] ================================================================== [ 25.748235] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 25.748359] Read of size 64 at addr fff00000c7742f04 by task kunit_try_catch/182 [ 25.748483] [ 25.748554] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.748750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.748813] Hardware name: linux,dummy-virt (DT) [ 25.748909] Call trace: [ 25.748981] show_stack+0x20/0x38 (C) [ 25.749120] dump_stack_lvl+0x8c/0xd0 [ 25.749449] print_report+0x118/0x608 [ 25.749580] kasan_report+0xdc/0x128 [ 25.749716] kasan_check_range+0x100/0x1a8 [ 25.749880] __asan_memmove+0x3c/0x98 [ 25.750015] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 25.751895] kunit_try_run_case+0x170/0x3f0 [ 25.752044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.752183] kthread+0x328/0x630 [ 25.753449] ret_from_fork+0x10/0x20 [ 25.753640] [ 25.753740] Allocated by task 182: [ 25.753850] kasan_save_stack+0x3c/0x68 [ 25.754048] kasan_save_track+0x20/0x40 [ 25.754178] kasan_save_alloc_info+0x40/0x58 [ 25.754299] __kasan_kmalloc+0xd4/0xd8 [ 25.754412] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.754624] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 25.754745] kunit_try_run_case+0x170/0x3f0 [ 25.754953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.755214] kthread+0x328/0x630 [ 25.755757] ret_from_fork+0x10/0x20 [ 25.755910] [ 25.756028] The buggy address belongs to the object at fff00000c7742f00 [ 25.756028] which belongs to the cache kmalloc-64 of size 64 [ 25.756381] The buggy address is located 4 bytes inside of [ 25.756381] allocated 64-byte region [fff00000c7742f00, fff00000c7742f40) [ 25.756538] [ 25.756588] The buggy address belongs to the physical page: [ 25.756664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107742 [ 25.756783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.756918] page_type: f5(slab) [ 25.757015] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 25.757201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.757442] page dumped because: kasan: bad access detected [ 25.757536] [ 25.757711] Memory state around the buggy address: [ 25.757870] fff00000c7742e00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 25.758155] fff00000c7742e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.758266] >fff00000c7742f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 25.759105] ^ [ 25.759384] fff00000c7742f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.759892] fff00000c7743000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.759993] ==================================================================
[ 19.194310] ================================================================== [ 19.195449] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 19.196334] Read of size 64 at addr ffff888101b2f204 by task kunit_try_catch/200 [ 19.198107] [ 19.198560] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 19.198732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.198775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.198885] Call Trace: [ 19.198934] <TASK> [ 19.198986] dump_stack_lvl+0x73/0xb0 [ 19.199073] print_report+0xd1/0x650 [ 19.199109] ? __virt_addr_valid+0x1db/0x2d0 [ 19.199144] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 19.199180] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.199210] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 19.199292] kasan_report+0x141/0x180 [ 19.199327] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 19.199368] kasan_check_range+0x10c/0x1c0 [ 19.199401] __asan_memmove+0x27/0x70 [ 19.199429] kmalloc_memmove_invalid_size+0x16f/0x330 [ 19.199464] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 19.199527] ? __schedule+0x10cc/0x2b60 [ 19.199603] ? __pfx_read_tsc+0x10/0x10 [ 19.199667] ? ktime_get_ts64+0x86/0x230 [ 19.199732] kunit_try_run_case+0x1a5/0x480 [ 19.199801] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.199860] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.199923] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.199984] ? __kthread_parkme+0x82/0x180 [ 19.200039] ? preempt_count_sub+0x50/0x80 [ 19.200097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.200159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.200226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.200320] kthread+0x337/0x6f0 [ 19.200357] ? trace_preempt_on+0x20/0xc0 [ 19.200394] ? __pfx_kthread+0x10/0x10 [ 19.200424] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.200458] ? calculate_sigpending+0x7b/0xa0 [ 19.200495] ? __pfx_kthread+0x10/0x10 [ 19.200572] ret_from_fork+0x116/0x1d0 [ 19.200642] ? __pfx_kthread+0x10/0x10 [ 19.200690] ret_from_fork_asm+0x1a/0x30 [ 19.200735] </TASK> [ 19.200751] [ 19.222390] Allocated by task 200: [ 19.223528] kasan_save_stack+0x45/0x70 [ 19.224242] kasan_save_track+0x18/0x40 [ 19.225453] kasan_save_alloc_info+0x3b/0x50 [ 19.225878] __kasan_kmalloc+0xb7/0xc0 [ 19.226193] __kmalloc_cache_noprof+0x189/0x420 [ 19.227145] kmalloc_memmove_invalid_size+0xac/0x330 [ 19.227919] kunit_try_run_case+0x1a5/0x480 [ 19.228587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.229032] kthread+0x337/0x6f0 [ 19.229364] ret_from_fork+0x116/0x1d0 [ 19.230454] ret_from_fork_asm+0x1a/0x30 [ 19.231138] [ 19.231614] The buggy address belongs to the object at ffff888101b2f200 [ 19.231614] which belongs to the cache kmalloc-64 of size 64 [ 19.233595] The buggy address is located 4 bytes inside of [ 19.233595] allocated 64-byte region [ffff888101b2f200, ffff888101b2f240) [ 19.235034] [ 19.235285] The buggy address belongs to the physical page: [ 19.236614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b2f [ 19.237253] flags: 0x200000000000000(node=0|zone=2) [ 19.237690] page_type: f5(slab) [ 19.238044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 19.239020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 19.241319] page dumped because: kasan: bad access detected [ 19.242250] [ 19.243645] Memory state around the buggy address: [ 19.244098] ffff888101b2f100: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 19.244709] ffff888101b2f180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 19.245270] >ffff888101b2f200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 19.248290] ^ [ 19.249193] ffff888101b2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.250204] ffff888101b2f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.252325] ==================================================================
[ 18.243162] ================================================================== [ 18.244088] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330 [ 18.245524] Read of size 64 at addr ffff8881038d4c84 by task kunit_try_catch/200 [ 18.246629] [ 18.246750] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.246809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.246825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.246854] Call Trace: [ 18.246869] <TASK> [ 18.246923] dump_stack_lvl+0x73/0xb0 [ 18.247014] print_report+0xd1/0x650 [ 18.247091] ? __virt_addr_valid+0x1db/0x2d0 [ 18.247167] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 18.247245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.247688] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 18.247729] kasan_report+0x141/0x180 [ 18.247761] ? kmalloc_memmove_invalid_size+0x16f/0x330 [ 18.247802] kasan_check_range+0x10c/0x1c0 [ 18.247835] __asan_memmove+0x27/0x70 [ 18.247861] kmalloc_memmove_invalid_size+0x16f/0x330 [ 18.247924] ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10 [ 18.247964] ? __schedule+0x10cc/0x2b60 [ 18.247997] ? __pfx_read_tsc+0x10/0x10 [ 18.248027] ? ktime_get_ts64+0x86/0x230 [ 18.248059] kunit_try_run_case+0x1a5/0x480 [ 18.248097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.248158] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.248194] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.248227] ? __kthread_parkme+0x82/0x180 [ 18.248255] ? preempt_count_sub+0x50/0x80 [ 18.248285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.248319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.248352] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.248385] kthread+0x337/0x6f0 [ 18.248411] ? trace_preempt_on+0x20/0xc0 [ 18.248443] ? __pfx_kthread+0x10/0x10 [ 18.248471] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.248500] ? calculate_sigpending+0x7b/0xa0 [ 18.248597] ? __pfx_kthread+0x10/0x10 [ 18.248679] ret_from_fork+0x116/0x1d0 [ 18.248753] ? __pfx_kthread+0x10/0x10 [ 18.248830] ret_from_fork_asm+0x1a/0x30 [ 18.248915] </TASK> [ 18.248935] [ 18.271205] Allocated by task 200: [ 18.271858] kasan_save_stack+0x45/0x70 [ 18.272425] kasan_save_track+0x18/0x40 [ 18.272987] kasan_save_alloc_info+0x3b/0x50 [ 18.273422] __kasan_kmalloc+0xb7/0xc0 [ 18.273816] __kmalloc_cache_noprof+0x189/0x420 [ 18.274318] kmalloc_memmove_invalid_size+0xac/0x330 [ 18.275331] kunit_try_run_case+0x1a5/0x480 [ 18.276033] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.276656] kthread+0x337/0x6f0 [ 18.277034] ret_from_fork+0x116/0x1d0 [ 18.277431] ret_from_fork_asm+0x1a/0x30 [ 18.278103] [ 18.278378] The buggy address belongs to the object at ffff8881038d4c80 [ 18.278378] which belongs to the cache kmalloc-64 of size 64 [ 18.279559] The buggy address is located 4 bytes inside of [ 18.279559] allocated 64-byte region [ffff8881038d4c80, ffff8881038d4cc0) [ 18.280920] [ 18.281160] The buggy address belongs to the physical page: [ 18.281836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d4 [ 18.282542] flags: 0x200000000000000(node=0|zone=2) [ 18.283282] page_type: f5(slab) [ 18.283751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 18.284524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 18.285383] page dumped because: kasan: bad access detected [ 18.286321] [ 18.286677] Memory state around the buggy address: [ 18.287266] ffff8881038d4b80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 18.287927] ffff8881038d4c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 18.288740] >ffff8881038d4c80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 18.289511] ^ [ 18.290421] ffff8881038d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.291086] ffff8881038d4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.291770] ==================================================================
[ 20.674758] ================================================================== [ 20.675901] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 20.676652] Read of size 64 at addr ffff00000101c904 by task kunit_try_catch/235 [ 20.677339] [ 20.677505] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.677556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.677570] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.677588] Call trace: [ 20.677599] show_stack+0x20/0x38 (C) [ 20.677633] dump_stack_lvl+0x8c/0xd0 [ 20.677669] print_report+0x118/0x608 [ 20.677704] kasan_report+0xdc/0x128 [ 20.677735] kasan_check_range+0x100/0x1a8 [ 20.677768] __asan_memmove+0x3c/0x98 [ 20.677795] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 20.677828] kunit_try_run_case+0x170/0x3f0 [ 20.677862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.677899] kthread+0x328/0x630 [ 20.677926] ret_from_fork+0x10/0x20 [ 20.677958] [ 20.683880] Allocated by task 235: [ 20.684204] kasan_save_stack+0x3c/0x68 [ 20.684582] kasan_save_track+0x20/0x40 [ 20.684959] kasan_save_alloc_info+0x40/0x58 [ 20.685374] __kasan_kmalloc+0xd4/0xd8 [ 20.685741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.686177] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 20.686651] kunit_try_run_case+0x170/0x3f0 [ 20.687058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.687580] kthread+0x328/0x630 [ 20.687897] ret_from_fork+0x10/0x20 [ 20.688247] [ 20.688400] The buggy address belongs to the object at ffff00000101c900 [ 20.688400] which belongs to the cache kmalloc-64 of size 64 [ 20.689518] The buggy address is located 4 bytes inside of [ 20.689518] allocated 64-byte region [ffff00000101c900, ffff00000101c940) [ 20.690638] [ 20.690793] The buggy address belongs to the physical page: [ 20.691308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c [ 20.692033] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.692644] page_type: f5(slab) [ 20.692957] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000 [ 20.693674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 20.694381] page dumped because: kasan: bad access detected [ 20.694896] [ 20.695047] Memory state around the buggy address: [ 20.695496] ffff00000101c800: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 20.696162] ffff00000101c880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 20.696827] >ffff00000101c900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 20.697490] ^ [ 20.697984] ffff00000101c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.698651] ffff00000101ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.699312] ==================================================================