Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 26.458632] ================================================================== [ 26.467680] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 26.474358] Write of size 16 at addr ffff000800d63020 by task kunit_try_catch/213 [ 26.481823] [ 26.483310] CPU: 7 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.483364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.483380] Hardware name: WinLink E850-96 board (DT) [ 26.483401] Call trace: [ 26.483416] show_stack+0x20/0x38 (C) [ 26.483455] dump_stack_lvl+0x8c/0xd0 [ 26.483491] print_report+0x118/0x608 [ 26.483527] kasan_report+0xdc/0x128 [ 26.483564] __asan_report_store16_noabort+0x20/0x30 [ 26.483598] kmalloc_oob_16+0x3a0/0x3f8 [ 26.483627] kunit_try_run_case+0x170/0x3f0 [ 26.483664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.483702] kthread+0x328/0x630 [ 26.483732] ret_from_fork+0x10/0x20 [ 26.483766] [ 26.545971] Allocated by task 213: [ 26.549358] kasan_save_stack+0x3c/0x68 [ 26.553177] kasan_save_track+0x20/0x40 [ 26.556995] kasan_save_alloc_info+0x40/0x58 [ 26.561250] __kasan_kmalloc+0xd4/0xd8 [ 26.564982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.569495] kmalloc_oob_16+0xb4/0x3f8 [ 26.573227] kunit_try_run_case+0x170/0x3f0 [ 26.577394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.582863] kthread+0x328/0x630 [ 26.586075] ret_from_fork+0x10/0x20 [ 26.589633] [ 26.591111] The buggy address belongs to the object at ffff000800d63020 [ 26.591111] which belongs to the cache kmalloc-16 of size 16 [ 26.603438] The buggy address is located 0 bytes inside of [ 26.603438] allocated 13-byte region [ffff000800d63020, ffff000800d6302d) [ 26.615762] [ 26.617240] The buggy address belongs to the physical page: [ 26.622797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d63 [ 26.630781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.637291] page_type: f5(slab) [ 26.640427] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 26.648147] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.655867] page dumped because: kasan: bad access detected [ 26.661421] [ 26.662896] Memory state around the buggy address: [ 26.667675] ffff000800d62f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.674879] ffff000800d62f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.682086] >ffff000800d63000: 00 04 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 26.689285] ^ [ 26.693803] ffff000800d63080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.701007] ffff000800d63100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.708211] ==================================================================
[ 25.212849] ================================================================== [ 25.214853] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 25.215185] Write of size 16 at addr fff00000c62bd280 by task kunit_try_catch/166 [ 25.215455] [ 25.216165] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.216509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.217178] Hardware name: linux,dummy-virt (DT) [ 25.217272] Call trace: [ 25.217525] show_stack+0x20/0x38 (C) [ 25.217687] dump_stack_lvl+0x8c/0xd0 [ 25.217812] print_report+0x118/0x608 [ 25.217952] kasan_report+0xdc/0x128 [ 25.218069] __asan_report_store16_noabort+0x20/0x30 [ 25.218191] kmalloc_oob_16+0x3a0/0x3f8 [ 25.218307] kunit_try_run_case+0x170/0x3f0 [ 25.219220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.219497] kthread+0x328/0x630 [ 25.220947] ret_from_fork+0x10/0x20 [ 25.221674] [ 25.221820] Allocated by task 166: [ 25.222265] kasan_save_stack+0x3c/0x68 [ 25.222449] kasan_save_track+0x20/0x40 [ 25.223057] kasan_save_alloc_info+0x40/0x58 [ 25.223455] __kasan_kmalloc+0xd4/0xd8 [ 25.224074] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.224208] kmalloc_oob_16+0xb4/0x3f8 [ 25.224303] kunit_try_run_case+0x170/0x3f0 [ 25.224440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.224562] kthread+0x328/0x630 [ 25.224799] ret_from_fork+0x10/0x20 [ 25.224892] [ 25.224957] The buggy address belongs to the object at fff00000c62bd280 [ 25.224957] which belongs to the cache kmalloc-16 of size 16 [ 25.225090] The buggy address is located 0 bytes inside of [ 25.225090] allocated 13-byte region [fff00000c62bd280, fff00000c62bd28d) [ 25.225232] [ 25.225293] The buggy address belongs to the physical page: [ 25.225446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062bd [ 25.225578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.225729] page_type: f5(slab) [ 25.225958] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.226257] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.226393] page dumped because: kasan: bad access detected [ 25.226475] [ 25.226526] Memory state around the buggy address: [ 25.226610] fff00000c62bd180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.226721] fff00000c62bd200: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 25.226824] >fff00000c62bd280: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.226923] ^ [ 25.227010] fff00000c62bd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.227131] fff00000c62bd380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.227387] ==================================================================
[ 25.428380] ================================================================== [ 25.428608] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 25.428824] Write of size 16 at addr fff00000c56fe360 by task kunit_try_catch/166 [ 25.429123] [ 25.429212] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 25.430254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.430475] Hardware name: linux,dummy-virt (DT) [ 25.430631] Call trace: [ 25.430663] show_stack+0x20/0x38 (C) [ 25.430729] dump_stack_lvl+0x8c/0xd0 [ 25.430831] print_report+0x118/0x608 [ 25.431136] kasan_report+0xdc/0x128 [ 25.431261] __asan_report_store16_noabort+0x20/0x30 [ 25.431397] kmalloc_oob_16+0x3a0/0x3f8 [ 25.431995] kunit_try_run_case+0x170/0x3f0 [ 25.432703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.432862] kthread+0x328/0x630 [ 25.432977] ret_from_fork+0x10/0x20 [ 25.433102] [ 25.433147] Allocated by task 166: [ 25.433216] kasan_save_stack+0x3c/0x68 [ 25.433330] kasan_save_track+0x20/0x40 [ 25.433441] kasan_save_alloc_info+0x40/0x58 [ 25.434005] __kasan_kmalloc+0xd4/0xd8 [ 25.434104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 25.434206] kmalloc_oob_16+0xb4/0x3f8 [ 25.434473] kunit_try_run_case+0x170/0x3f0 [ 25.434572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.434931] kthread+0x328/0x630 [ 25.435024] ret_from_fork+0x10/0x20 [ 25.435308] [ 25.435357] The buggy address belongs to the object at fff00000c56fe360 [ 25.435357] which belongs to the cache kmalloc-16 of size 16 [ 25.435688] The buggy address is located 0 bytes inside of [ 25.435688] allocated 13-byte region [fff00000c56fe360, fff00000c56fe36d) [ 25.435955] [ 25.436066] The buggy address belongs to the physical page: [ 25.436137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056fe [ 25.436287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.436437] page_type: f5(slab) [ 25.436531] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 25.436730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 25.436998] page dumped because: kasan: bad access detected [ 25.437095] [ 25.437147] Memory state around the buggy address: [ 25.437311] fff00000c56fe200: 00 02 fc fc 00 05 fc fc fa fb fc fc 00 02 fc fc [ 25.437714] fff00000c56fe280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 25.437825] >fff00000c56fe300: fa fb fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 25.438478] ^ [ 25.439791] fff00000c56fe380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.440051] fff00000c56fe400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.440141] ==================================================================
[ 18.761188] ================================================================== [ 18.762079] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0 [ 18.762731] Write of size 16 at addr ffff888101a90b40 by task kunit_try_catch/184 [ 18.763778] [ 18.764189] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 18.764310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.764343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.764397] Call Trace: [ 18.764432] <TASK> [ 18.764478] dump_stack_lvl+0x73/0xb0 [ 18.764599] print_report+0xd1/0x650 [ 18.764677] ? __virt_addr_valid+0x1db/0x2d0 [ 18.764765] ? kmalloc_oob_16+0x452/0x4a0 [ 18.764833] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.764899] ? kmalloc_oob_16+0x452/0x4a0 [ 18.764964] kasan_report+0x141/0x180 [ 18.765034] ? kmalloc_oob_16+0x452/0x4a0 [ 18.765118] __asan_report_store16_noabort+0x1b/0x30 [ 18.765191] kmalloc_oob_16+0x452/0x4a0 [ 18.765264] ? __pfx_kmalloc_oob_16+0x10/0x10 [ 18.765581] ? __schedule+0x10cc/0x2b60 [ 18.765693] ? __pfx_read_tsc+0x10/0x10 [ 18.765764] ? ktime_get_ts64+0x86/0x230 [ 18.765840] kunit_try_run_case+0x1a5/0x480 [ 18.765923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.766000] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.766073] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.766155] ? __kthread_parkme+0x82/0x180 [ 18.766233] ? preempt_count_sub+0x50/0x80 [ 18.766312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.766392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.766470] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.766570] kthread+0x337/0x6f0 [ 18.766637] ? trace_preempt_on+0x20/0xc0 [ 18.766714] ? __pfx_kthread+0x10/0x10 [ 18.766777] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.766819] ? calculate_sigpending+0x7b/0xa0 [ 18.766855] ? __pfx_kthread+0x10/0x10 [ 18.766886] ret_from_fork+0x116/0x1d0 [ 18.766912] ? __pfx_kthread+0x10/0x10 [ 18.766940] ret_from_fork_asm+0x1a/0x30 [ 18.766982] </TASK> [ 18.766998] [ 18.786114] Allocated by task 184: [ 18.786653] kasan_save_stack+0x45/0x70 [ 18.787136] kasan_save_track+0x18/0x40 [ 18.787594] kasan_save_alloc_info+0x3b/0x50 [ 18.788067] __kasan_kmalloc+0xb7/0xc0 [ 18.788536] __kmalloc_cache_noprof+0x189/0x420 [ 18.789078] kmalloc_oob_16+0xa8/0x4a0 [ 18.789607] kunit_try_run_case+0x1a5/0x480 [ 18.789993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.790663] kthread+0x337/0x6f0 [ 18.790996] ret_from_fork+0x116/0x1d0 [ 18.791572] ret_from_fork_asm+0x1a/0x30 [ 18.792037] [ 18.792329] The buggy address belongs to the object at ffff888101a90b40 [ 18.792329] which belongs to the cache kmalloc-16 of size 16 [ 18.793372] The buggy address is located 0 bytes inside of [ 18.793372] allocated 13-byte region [ffff888101a90b40, ffff888101a90b4d) [ 18.794415] [ 18.794701] The buggy address belongs to the physical page: [ 18.795206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a90 [ 18.796072] flags: 0x200000000000000(node=0|zone=2) [ 18.796562] page_type: f5(slab) [ 18.796973] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 18.797806] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 18.798356] page dumped because: kasan: bad access detected [ 18.798918] [ 18.799191] Memory state around the buggy address: [ 18.799764] ffff888101a90a00: 00 01 fc fc 00 01 fc fc fa fb fc fc fa fb fc fc [ 18.800358] ffff888101a90a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 18.801024] >ffff888101a90b00: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 18.801700] ^ [ 18.802068] ffff888101a90b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.802659] ffff888101a90c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.803402] ==================================================================
[ 17.816871] ================================================================== [ 17.817828] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x452/0x4a0 [ 17.818920] Write of size 16 at addr ffff88810262e120 by task kunit_try_catch/184 [ 17.820166] [ 17.820402] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 17.820521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.820562] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.820620] Call Trace: [ 17.820657] <TASK> [ 17.820700] dump_stack_lvl+0x73/0xb0 [ 17.820790] print_report+0xd1/0x650 [ 17.820869] ? __virt_addr_valid+0x1db/0x2d0 [ 17.820965] ? kmalloc_oob_16+0x452/0x4a0 [ 17.821006] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.821038] ? kmalloc_oob_16+0x452/0x4a0 [ 17.821067] kasan_report+0x141/0x180 [ 17.821102] ? kmalloc_oob_16+0x452/0x4a0 [ 17.821165] __asan_report_store16_noabort+0x1b/0x30 [ 17.821198] kmalloc_oob_16+0x452/0x4a0 [ 17.821228] ? __pfx_kmalloc_oob_16+0x10/0x10 [ 17.821259] ? __schedule+0x10cc/0x2b60 [ 17.821294] ? __pfx_read_tsc+0x10/0x10 [ 17.821324] ? ktime_get_ts64+0x86/0x230 [ 17.821357] kunit_try_run_case+0x1a5/0x480 [ 17.821393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.821426] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.821459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.821491] ? __kthread_parkme+0x82/0x180 [ 17.821519] ? preempt_count_sub+0x50/0x80 [ 17.821550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.821584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.821617] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.821651] kthread+0x337/0x6f0 [ 17.821678] ? trace_preempt_on+0x20/0xc0 [ 17.821710] ? __pfx_kthread+0x10/0x10 [ 17.821738] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.821768] ? calculate_sigpending+0x7b/0xa0 [ 17.821801] ? __pfx_kthread+0x10/0x10 [ 17.821829] ret_from_fork+0x116/0x1d0 [ 17.821854] ? __pfx_kthread+0x10/0x10 [ 17.821942] ret_from_fork_asm+0x1a/0x30 [ 17.822086] </TASK> [ 17.822111] [ 17.836589] Allocated by task 184: [ 17.837060] kasan_save_stack+0x45/0x70 [ 17.837463] kasan_save_track+0x18/0x40 [ 17.837895] kasan_save_alloc_info+0x3b/0x50 [ 17.838341] __kasan_kmalloc+0xb7/0xc0 [ 17.838943] __kmalloc_cache_noprof+0x189/0x420 [ 17.839420] kmalloc_oob_16+0xa8/0x4a0 [ 17.839728] kunit_try_run_case+0x1a5/0x480 [ 17.840167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.840806] kthread+0x337/0x6f0 [ 17.841244] ret_from_fork+0x116/0x1d0 [ 17.841741] ret_from_fork_asm+0x1a/0x30 [ 17.842164] [ 17.842402] The buggy address belongs to the object at ffff88810262e120 [ 17.842402] which belongs to the cache kmalloc-16 of size 16 [ 17.843525] The buggy address is located 0 bytes inside of [ 17.843525] allocated 13-byte region [ffff88810262e120, ffff88810262e12d) [ 17.844614] [ 17.844833] The buggy address belongs to the physical page: [ 17.845301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10262e [ 17.845957] flags: 0x200000000000000(node=0|zone=2) [ 17.846432] page_type: f5(slab) [ 17.846969] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 17.847694] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 17.850107] page dumped because: kasan: bad access detected [ 17.850664] [ 17.850930] Memory state around the buggy address: [ 17.851506] ffff88810262e000: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 17.852175] ffff88810262e080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 17.853753] >ffff88810262e100: 00 05 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 17.854414] ^ [ 17.855868] ffff88810262e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.856902] ffff88810262e200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.857396] ==================================================================
[ 20.442999] ================================================================== [ 20.444045] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 20.444713] Write of size 16 at addr ffff000001e6e6a0 by task kunit_try_catch/219 [ 20.445430] [ 20.445595] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 20.445644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.445657] Hardware name: Radxa ROCK Pi 4B (DT) [ 20.445674] Call trace: [ 20.445685] show_stack+0x20/0x38 (C) [ 20.445719] dump_stack_lvl+0x8c/0xd0 [ 20.445754] print_report+0x118/0x608 [ 20.445788] kasan_report+0xdc/0x128 [ 20.445819] __asan_report_store16_noabort+0x20/0x30 [ 20.445849] kmalloc_oob_16+0x3a0/0x3f8 [ 20.445877] kunit_try_run_case+0x170/0x3f0 [ 20.445911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.445948] kthread+0x328/0x630 [ 20.445974] ret_from_fork+0x10/0x20 [ 20.446005] [ 20.451570] Allocated by task 219: [ 20.451894] kasan_save_stack+0x3c/0x68 [ 20.452271] kasan_save_track+0x20/0x40 [ 20.452646] kasan_save_alloc_info+0x40/0x58 [ 20.453062] __kasan_kmalloc+0xd4/0xd8 [ 20.453428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.453865] kmalloc_oob_16+0xb4/0x3f8 [ 20.454228] kunit_try_run_case+0x170/0x3f0 [ 20.454634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.455156] kthread+0x328/0x630 [ 20.455471] ret_from_fork+0x10/0x20 [ 20.455820] [ 20.455973] The buggy address belongs to the object at ffff000001e6e6a0 [ 20.455973] which belongs to the cache kmalloc-16 of size 16 [ 20.457088] The buggy address is located 0 bytes inside of [ 20.457088] allocated 13-byte region [ffff000001e6e6a0, ffff000001e6e6ad) [ 20.458206] [ 20.458360] The buggy address belongs to the physical page: [ 20.458874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1e6e [ 20.459598] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 20.460207] page_type: f5(slab) [ 20.460521] raw: 03fffe0000000000 ffff000000402640 dead000000000122 0000000000000000 [ 20.461235] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.461941] page dumped because: kasan: bad access detected [ 20.462454] [ 20.462606] Memory state around the buggy address: [ 20.463054] ffff000001e6e580: 00 05 fc fc 00 05 fc fc 00 05 fc fc fa fb fc fc [ 20.463719] ffff000001e6e600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 20.464383] >ffff000001e6e680: 00 05 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 20.465043] ^ [ 20.465468] ffff000001e6e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.466133] ffff000001e6e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.466793] ==================================================================