Date
Dec. 9, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.886487] ================================================================== [ 22.887918] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 22.889451] Write of size 1 at addr fff00000c126df73 by task kunit_try_catch/124 [ 22.890326] [ 22.891847] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G N 6.13.0-rc2-next-20241209 #1 [ 22.893059] Tainted: [N]=TEST [ 22.893522] Hardware name: linux,dummy-virt (DT) [ 22.894469] Call trace: [ 22.895130] show_stack+0x20/0x38 (C) [ 22.895990] dump_stack_lvl+0x8c/0xd0 [ 22.896499] print_report+0x118/0x5e0 [ 22.897020] kasan_report+0xc8/0x118 [ 22.897578] __asan_report_store1_noabort+0x20/0x30 [ 22.898217] kmalloc_oob_right+0x5a4/0x660 [ 22.898877] kunit_try_run_case+0x14c/0x3d0 [ 22.899504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.900564] kthread+0x24c/0x2d0 [ 22.901093] ret_from_fork+0x10/0x20 [ 22.901926] [ 22.902344] Allocated by task 124: [ 22.903266] kasan_save_stack+0x3c/0x68 [ 22.903818] kasan_save_track+0x20/0x40 [ 22.904366] kasan_save_alloc_info+0x40/0x58 [ 22.904989] __kasan_kmalloc+0xd4/0xd8 [ 22.905484] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.906118] kmalloc_oob_right+0xb0/0x660 [ 22.906665] kunit_try_run_case+0x14c/0x3d0 [ 22.907328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.907946] kthread+0x24c/0x2d0 [ 22.908798] ret_from_fork+0x10/0x20 [ 22.909537] [ 22.910109] The buggy address belongs to the object at fff00000c126df00 [ 22.910109] which belongs to the cache kmalloc-128 of size 128 [ 22.912031] The buggy address is located 0 bytes to the right of [ 22.912031] allocated 115-byte region [fff00000c126df00, fff00000c126df73) [ 22.913300] [ 22.913822] The buggy address belongs to the physical page: [ 22.914806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d [ 22.916028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.917013] page_type: f5(slab) [ 22.918097] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.918893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.920054] page dumped because: kasan: bad access detected [ 22.920777] [ 22.921084] Memory state around the buggy address: [ 22.922113] fff00000c126de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 22.923198] fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.924339] >fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.925216] ^ [ 22.926076] fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.926847] fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.927944] ================================================================== [ 22.930691] ================================================================== [ 22.931811] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 22.932440] Write of size 1 at addr fff00000c126df78 by task kunit_try_catch/124 [ 22.933032] [ 22.933420] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 22.934801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.935554] Hardware name: linux,dummy-virt (DT) [ 22.936153] Call trace: [ 22.936632] show_stack+0x20/0x38 (C) [ 22.937917] dump_stack_lvl+0x8c/0xd0 [ 22.938639] print_report+0x118/0x5e0 [ 22.939440] kasan_report+0xc8/0x118 [ 22.940152] __asan_report_store1_noabort+0x20/0x30 [ 22.940791] kmalloc_oob_right+0x538/0x660 [ 22.941273] kunit_try_run_case+0x14c/0x3d0 [ 22.941970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.942631] kthread+0x24c/0x2d0 [ 22.943559] ret_from_fork+0x10/0x20 [ 22.944009] [ 22.944286] Allocated by task 124: [ 22.944632] kasan_save_stack+0x3c/0x68 [ 22.945237] kasan_save_track+0x20/0x40 [ 22.945918] kasan_save_alloc_info+0x40/0x58 [ 22.946483] __kasan_kmalloc+0xd4/0xd8 [ 22.947051] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.947932] kmalloc_oob_right+0xb0/0x660 [ 22.948499] kunit_try_run_case+0x14c/0x3d0 [ 22.949084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.949789] kthread+0x24c/0x2d0 [ 22.950155] ret_from_fork+0x10/0x20 [ 22.950815] [ 22.951159] The buggy address belongs to the object at fff00000c126df00 [ 22.951159] which belongs to the cache kmalloc-128 of size 128 [ 22.953294] The buggy address is located 5 bytes to the right of [ 22.953294] allocated 115-byte region [fff00000c126df00, fff00000c126df73) [ 22.954639] [ 22.955192] The buggy address belongs to the physical page: [ 22.956004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d [ 22.956755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.957478] page_type: f5(slab) [ 22.958028] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.958886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.959687] page dumped because: kasan: bad access detected [ 22.960358] [ 22.961018] Memory state around the buggy address: [ 22.961614] fff00000c126de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.962673] fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.964099] >fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.965099] ^ [ 22.965879] fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.966783] fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.967584] ================================================================== [ 22.969889] ================================================================== [ 22.970841] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 22.972105] Read of size 1 at addr fff00000c126df80 by task kunit_try_catch/124 [ 22.973248] [ 22.973551] CPU: 0 UID: 0 PID: 124 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 22.975023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.975633] Hardware name: linux,dummy-virt (DT) [ 22.976131] Call trace: [ 22.976642] show_stack+0x20/0x38 (C) [ 22.977416] dump_stack_lvl+0x8c/0xd0 [ 22.977963] print_report+0x118/0x5e0 [ 22.978718] kasan_report+0xc8/0x118 [ 22.979367] __asan_report_load1_noabort+0x20/0x30 [ 22.980158] kmalloc_oob_right+0x5d0/0x660 [ 22.980824] kunit_try_run_case+0x14c/0x3d0 [ 22.981089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.981379] kthread+0x24c/0x2d0 [ 22.981599] ret_from_fork+0x10/0x20 [ 22.981855] [ 22.981993] Allocated by task 124: [ 22.982190] kasan_save_stack+0x3c/0x68 [ 22.982425] kasan_save_track+0x20/0x40 [ 22.982649] kasan_save_alloc_info+0x40/0x58 [ 22.984179] __kasan_kmalloc+0xd4/0xd8 [ 22.984667] __kmalloc_cache_noprof+0x15c/0x3c0 [ 22.985184] kmalloc_oob_right+0xb0/0x660 [ 22.986013] kunit_try_run_case+0x14c/0x3d0 [ 22.986920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.987607] kthread+0x24c/0x2d0 [ 22.988463] ret_from_fork+0x10/0x20 [ 22.989019] [ 22.989545] The buggy address belongs to the object at fff00000c126df00 [ 22.989545] which belongs to the cache kmalloc-128 of size 128 [ 22.991110] The buggy address is located 13 bytes to the right of [ 22.991110] allocated 115-byte region [fff00000c126df00, fff00000c126df73) [ 22.992447] [ 22.993058] The buggy address belongs to the physical page: [ 22.993723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10126d [ 22.994780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.995680] page_type: f5(slab) [ 22.996501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.997342] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.998156] page dumped because: kasan: bad access detected [ 22.998820] [ 22.999164] Memory state around the buggy address: [ 22.999877] fff00000c126de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.001411] fff00000c126df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 23.002259] >fff00000c126df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.003107] ^ [ 23.003521] fff00000c126e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.004803] fff00000c126e080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.005631] ==================================================================
[ 22.461182] ================================================================== [ 22.461827] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bf/0x7f0 [ 22.462753] Write of size 1 at addr ffff888102954378 by task kunit_try_catch/143 [ 22.463616] [ 22.464171] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 22.465320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.465897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.466825] Call Trace: [ 22.467421] <TASK> [ 22.467650] dump_stack_lvl+0x73/0xb0 [ 22.468360] print_report+0xd1/0x640 [ 22.468562] ? __virt_addr_valid+0x1db/0x2d0 [ 22.468761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.469600] kasan_report+0x102/0x140 [ 22.470537] ? kmalloc_oob_right+0x6bf/0x7f0 [ 22.471446] ? kmalloc_oob_right+0x6bf/0x7f0 [ 22.472355] __asan_report_store1_noabort+0x1b/0x30 [ 22.472976] kmalloc_oob_right+0x6bf/0x7f0 [ 22.473387] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 22.473847] ? __schedule+0xc70/0x27e0 [ 22.474393] ? __pfx_read_tsc+0x10/0x10 [ 22.474970] ? ktime_get_ts64+0x86/0x230 [ 22.475604] kunit_try_run_case+0x1b3/0x490 [ 22.476320] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.476985] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.477713] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.478534] ? __kthread_parkme+0x82/0x160 [ 22.479126] ? preempt_count_sub+0x50/0x80 [ 22.479577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.480372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.481116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.481855] kthread+0x257/0x310 [ 22.482181] ? __pfx_kthread+0x10/0x10 [ 22.482564] ret_from_fork+0x41/0x80 [ 22.482995] ? __pfx_kthread+0x10/0x10 [ 22.483460] ret_from_fork_asm+0x1a/0x30 [ 22.483880] </TASK> [ 22.484199] [ 22.484409] Allocated by task 143: [ 22.484860] kasan_save_stack+0x3d/0x60 [ 22.485260] kasan_save_track+0x18/0x40 [ 22.485600] kasan_save_alloc_info+0x3b/0x50 [ 22.486100] __kasan_kmalloc+0xb7/0xc0 [ 22.486413] __kmalloc_cache_noprof+0x184/0x410 [ 22.487003] kmalloc_oob_right+0xaa/0x7f0 [ 22.487334] kunit_try_run_case+0x1b3/0x490 [ 22.487873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.488510] kthread+0x257/0x310 [ 22.488901] ret_from_fork+0x41/0x80 [ 22.489353] ret_from_fork_asm+0x1a/0x30 [ 22.489661] [ 22.489931] The buggy address belongs to the object at ffff888102954300 [ 22.489931] which belongs to the cache kmalloc-128 of size 128 [ 22.490767] The buggy address is located 5 bytes to the right of [ 22.490767] allocated 115-byte region [ffff888102954300, ffff888102954373) [ 22.491964] [ 22.492229] The buggy address belongs to the physical page: [ 22.492822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954 [ 22.493362] flags: 0x200000000000000(node=0|zone=2) [ 22.493987] page_type: f5(slab) [ 22.494452] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.495123] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.495859] page dumped because: kasan: bad access detected [ 22.496280] [ 22.496484] Memory state around the buggy address: [ 22.496889] ffff888102954200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 22.497619] ffff888102954280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.498157] >ffff888102954300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.498889] ^ [ 22.499542] ffff888102954380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.500222] ffff888102954400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.500903] ================================================================== [ 22.502148] ================================================================== [ 22.503249] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68c/0x7f0 [ 22.503666] Read of size 1 at addr ffff888102954380 by task kunit_try_catch/143 [ 22.504508] [ 22.504758] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 22.505527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.506035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.506817] Call Trace: [ 22.507179] <TASK> [ 22.507467] dump_stack_lvl+0x73/0xb0 [ 22.507961] print_report+0xd1/0x640 [ 22.508430] ? __virt_addr_valid+0x1db/0x2d0 [ 22.508745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.509454] kasan_report+0x102/0x140 [ 22.509971] ? kmalloc_oob_right+0x68c/0x7f0 [ 22.510286] ? kmalloc_oob_right+0x68c/0x7f0 [ 22.510672] __asan_report_load1_noabort+0x18/0x20 [ 22.511285] kmalloc_oob_right+0x68c/0x7f0 [ 22.511862] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 22.512954] ? __schedule+0xc70/0x27e0 [ 22.513445] ? __pfx_read_tsc+0x10/0x10 [ 22.513927] ? ktime_get_ts64+0x86/0x230 [ 22.514402] kunit_try_run_case+0x1b3/0x490 [ 22.514809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.515232] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.516798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.517626] ? __kthread_parkme+0x82/0x160 [ 22.518562] ? preempt_count_sub+0x50/0x80 [ 22.519337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.519824] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.520487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.521252] kthread+0x257/0x310 [ 22.521773] ? __pfx_kthread+0x10/0x10 [ 22.522148] ret_from_fork+0x41/0x80 [ 22.522657] ? __pfx_kthread+0x10/0x10 [ 22.523150] ret_from_fork_asm+0x1a/0x30 [ 22.523748] </TASK> [ 22.524085] [ 22.524379] Allocated by task 143: [ 22.524758] kasan_save_stack+0x3d/0x60 [ 22.525923] kasan_save_track+0x18/0x40 [ 22.526472] kasan_save_alloc_info+0x3b/0x50 [ 22.527253] __kasan_kmalloc+0xb7/0xc0 [ 22.527697] __kmalloc_cache_noprof+0x184/0x410 [ 22.528653] kmalloc_oob_right+0xaa/0x7f0 [ 22.529940] kunit_try_run_case+0x1b3/0x490 [ 22.530359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.531177] kthread+0x257/0x310 [ 22.531622] ret_from_fork+0x41/0x80 [ 22.532018] ret_from_fork_asm+0x1a/0x30 [ 22.532436] [ 22.532622] The buggy address belongs to the object at ffff888102954300 [ 22.532622] which belongs to the cache kmalloc-128 of size 128 [ 22.534571] The buggy address is located 13 bytes to the right of [ 22.534571] allocated 115-byte region [ffff888102954300, ffff888102954373) [ 22.535663] [ 22.535969] The buggy address belongs to the physical page: [ 22.536802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954 [ 22.537492] flags: 0x200000000000000(node=0|zone=2) [ 22.538266] page_type: f5(slab) [ 22.538881] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.539667] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.540358] page dumped because: kasan: bad access detected [ 22.540834] [ 22.541251] Memory state around the buggy address: [ 22.542439] ffff888102954280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.543553] ffff888102954300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.544384] >ffff888102954380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.545200] ^ [ 22.545840] ffff888102954400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.546357] ffff888102954480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.547040] ================================================================== [ 22.402224] ================================================================== [ 22.403852] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f2/0x7f0 [ 22.405031] Write of size 1 at addr ffff888102954373 by task kunit_try_catch/143 [ 22.405762] [ 22.407593] CPU: 0 UID: 0 PID: 143 Comm: kunit_try_catch Tainted: G N 6.13.0-rc2-next-20241209 #1 [ 22.409002] Tainted: [N]=TEST [ 22.409265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 22.410542] Call Trace: [ 22.411008] <TASK> [ 22.411659] dump_stack_lvl+0x73/0xb0 [ 22.412563] print_report+0xd1/0x640 [ 22.413090] ? __virt_addr_valid+0x1db/0x2d0 [ 22.413787] ? kasan_complete_mode_report_info+0x2a/0x200 [ 22.414425] kasan_report+0x102/0x140 [ 22.415343] ? kmalloc_oob_right+0x6f2/0x7f0 [ 22.415777] ? kmalloc_oob_right+0x6f2/0x7f0 [ 22.416248] __asan_report_store1_noabort+0x1b/0x30 [ 22.416763] kmalloc_oob_right+0x6f2/0x7f0 [ 22.417949] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 22.418687] ? __schedule+0xc70/0x27e0 [ 22.419069] ? __pfx_read_tsc+0x10/0x10 [ 22.419582] ? ktime_get_ts64+0x86/0x230 [ 22.420102] kunit_try_run_case+0x1b3/0x490 [ 22.420604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.421596] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 22.422605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 22.423154] ? __kthread_parkme+0x82/0x160 [ 22.423741] ? preempt_count_sub+0x50/0x80 [ 22.424360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 22.424598] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 22.425204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.425773] kthread+0x257/0x310 [ 22.426650] ? __pfx_kthread+0x10/0x10 [ 22.427392] ret_from_fork+0x41/0x80 [ 22.427727] ? __pfx_kthread+0x10/0x10 [ 22.428503] ret_from_fork_asm+0x1a/0x30 [ 22.429384] </TASK> [ 22.429755] [ 22.430422] Allocated by task 143: [ 22.431457] kasan_save_stack+0x3d/0x60 [ 22.432195] kasan_save_track+0x18/0x40 [ 22.432682] kasan_save_alloc_info+0x3b/0x50 [ 22.433403] __kasan_kmalloc+0xb7/0xc0 [ 22.433682] __kmalloc_cache_noprof+0x184/0x410 [ 22.434284] kmalloc_oob_right+0xaa/0x7f0 [ 22.434649] kunit_try_run_case+0x1b3/0x490 [ 22.435247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 22.435893] kthread+0x257/0x310 [ 22.436656] ret_from_fork+0x41/0x80 [ 22.437468] ret_from_fork_asm+0x1a/0x30 [ 22.438184] [ 22.438511] The buggy address belongs to the object at ffff888102954300 [ 22.438511] which belongs to the cache kmalloc-128 of size 128 [ 22.440451] The buggy address is located 0 bytes to the right of [ 22.440451] allocated 115-byte region [ffff888102954300, ffff888102954373) [ 22.442743] [ 22.443383] The buggy address belongs to the physical page: [ 22.444559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102954 [ 22.445729] flags: 0x200000000000000(node=0|zone=2) [ 22.447112] page_type: f5(slab) [ 22.448226] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 22.448827] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.449617] page dumped because: kasan: bad access detected [ 22.450733] [ 22.451256] Memory state around the buggy address: [ 22.452266] ffff888102954200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc [ 22.452908] ffff888102954280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.453686] >ffff888102954300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.455009] ^ [ 22.455586] ffff888102954380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.456710] ffff888102954400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.458391] ==================================================================