Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-armv7 | |
qemu-x86_64 |
[ 146.667172] ================================================================== [ 146.667901] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x13c/0x3b4 [ 146.668814] Read of size 1 at addr c8e02a78 by task kunit_try_catch/185 [ 146.669484] [ 146.669805] CPU: 1 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 146.670944] Hardware name: Generic DT based system [ 146.671666] unwind_backtrace from show_stack+0x18/0x1c [ 146.672482] show_stack from dump_stack_lvl+0x58/0x70 [ 146.673146] dump_stack_lvl from print_report+0x164/0x51c [ 146.673850] print_report from kasan_report+0xc8/0x104 [ 146.674608] kasan_report from ksize_unpoisons_memory+0x13c/0x3b4 [ 146.675449] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4 [ 146.676407] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.677406] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 146.678322] kthread from ret_from_fork+0x14/0x30 [ 146.678994] Exception stack(0xfa093fb0 to 0xfa093ff8) [ 146.679672] 3fa0: 00000000 00000000 00000000 00000000 [ 146.680756] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 146.681751] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 146.682565] [ 146.682888] Allocated by task 185: [ 146.683517] kasan_set_track+0x3c/0x5c [ 146.684139] __kasan_kmalloc+0x8c/0x94 [ 146.684763] ksize_unpoisons_memory+0xb4/0x3b4 [ 146.685432] kunit_try_run_case+0x11c/0x2e4 [ 146.686043] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.686914] kthread+0x184/0x1a8 [ 146.687290] ret_from_fork+0x14/0x30 [ 146.688084] [ 146.688355] The buggy address belongs to the object at c8e02a00 [ 146.688355] which belongs to the cache kmalloc-128 of size 128 [ 146.689886] The buggy address is located 5 bytes to the right of [ 146.689886] allocated 115-byte region [c8e02a00, c8e02a73) [ 146.691032] [ 146.691463] The buggy address belongs to the physical page: [ 146.692312] page:b76fc2b6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e02 [ 146.693173] flags: 0x800(slab|zone=0) [ 146.693848] page_type: 0xffffffff() [ 146.694536] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001 [ 146.695490] raw: 00000000 [ 146.695841] page dumped because: kasan: bad access detected [ 146.696565] [ 146.696798] Memory state around the buggy address: [ 146.697493] c8e02900: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 146.698269] c8e02980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.699023] >c8e02a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 146.699823] ^ [ 146.700607] c8e02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.701508] c8e02b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.702333] ================================================================== [ 146.627097] ================================================================== [ 146.628547] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10c/0x3b4 [ 146.629482] Read of size 1 at addr c8e02a73 by task kunit_try_catch/185 [ 146.630285] [ 146.630559] CPU: 1 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 146.631547] Hardware name: Generic DT based system [ 146.632160] unwind_backtrace from show_stack+0x18/0x1c [ 146.633121] show_stack from dump_stack_lvl+0x58/0x70 [ 146.633690] dump_stack_lvl from print_report+0x164/0x51c [ 146.634429] print_report from kasan_report+0xc8/0x104 [ 146.635141] kasan_report from ksize_unpoisons_memory+0x10c/0x3b4 [ 146.636185] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4 [ 146.637088] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.638231] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 146.639035] kthread from ret_from_fork+0x14/0x30 [ 146.639763] Exception stack(0xfa093fb0 to 0xfa093ff8) [ 146.640390] 3fa0: 00000000 00000000 00000000 00000000 [ 146.641291] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 146.642207] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 146.642919] [ 146.643250] Allocated by task 185: [ 146.643677] kasan_set_track+0x3c/0x5c [ 146.644173] __kasan_kmalloc+0x8c/0x94 [ 146.644738] ksize_unpoisons_memory+0xb4/0x3b4 [ 146.645265] kunit_try_run_case+0x11c/0x2e4 [ 146.646223] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.647803] kthread+0x184/0x1a8 [ 146.648632] ret_from_fork+0x14/0x30 [ 146.649332] [ 146.649547] The buggy address belongs to the object at c8e02a00 [ 146.649547] which belongs to the cache kmalloc-128 of size 128 [ 146.650970] The buggy address is located 0 bytes to the right of [ 146.650970] allocated 115-byte region [c8e02a00, c8e02a73) [ 146.652371] [ 146.652727] The buggy address belongs to the physical page: [ 146.653440] page:b76fc2b6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e02 [ 146.654458] flags: 0x800(slab|zone=0) [ 146.655008] page_type: 0xffffffff() [ 146.655514] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001 [ 146.656482] raw: 00000000 [ 146.656839] page dumped because: kasan: bad access detected [ 146.657462] [ 146.657827] Memory state around the buggy address: [ 146.658477] c8e02900: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 146.659246] c8e02980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.660093] >c8e02a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 146.660876] ^ [ 146.661594] c8e02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.662410] c8e02b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.663176] ================================================================== [ 146.706279] ================================================================== [ 146.706893] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x170/0x3b4 [ 146.708149] Read of size 1 at addr c8e02a7f by task kunit_try_catch/185 [ 146.708941] [ 146.709259] CPU: 1 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 146.710421] Hardware name: Generic DT based system [ 146.711179] unwind_backtrace from show_stack+0x18/0x1c [ 146.711937] show_stack from dump_stack_lvl+0x58/0x70 [ 146.712660] dump_stack_lvl from print_report+0x164/0x51c [ 146.713380] print_report from kasan_report+0xc8/0x104 [ 146.714119] kasan_report from ksize_unpoisons_memory+0x170/0x3b4 [ 146.714979] ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4 [ 146.715925] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.716948] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 146.717874] kthread from ret_from_fork+0x14/0x30 [ 146.718562] Exception stack(0xfa093fb0 to 0xfa093ff8) [ 146.719387] 3fa0: 00000000 00000000 00000000 00000000 [ 146.720423] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 146.721438] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 146.722263] [ 146.722613] Allocated by task 185: [ 146.723210] kasan_set_track+0x3c/0x5c [ 146.723782] __kasan_kmalloc+0x8c/0x94 [ 146.724440] ksize_unpoisons_memory+0xb4/0x3b4 [ 146.725028] kunit_try_run_case+0x11c/0x2e4 [ 146.725672] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.727289] kthread+0x184/0x1a8 [ 146.727923] ret_from_fork+0x14/0x30 [ 146.728460] [ 146.728792] The buggy address belongs to the object at c8e02a00 [ 146.728792] which belongs to the cache kmalloc-128 of size 128 [ 146.730179] The buggy address is located 12 bytes to the right of [ 146.730179] allocated 115-byte region [c8e02a00, c8e02a73) [ 146.731556] [ 146.731906] The buggy address belongs to the physical page: [ 146.732842] page:b76fc2b6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e02 [ 146.733843] flags: 0x800(slab|zone=0) [ 146.734350] page_type: 0xffffffff() [ 146.734954] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001 [ 146.735926] raw: 00000000 [ 146.736343] page dumped because: kasan: bad access detected [ 146.737075] [ 146.737374] Memory state around the buggy address: [ 146.737856] c8e02900: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 146.738833] c8e02980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.739732] >c8e02a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 146.740551] ^ [ 146.741445] c8e02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.742372] c8e02b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 146.743178] ==================================================================
[ 49.630670] ================================================================== [ 49.631419] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x183/0x3b0 [ 49.632209] Read of size 1 at addr ffff88810284c87f by task kunit_try_catch/208 [ 49.633073] [ 49.633368] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 49.634354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 49.635148] Call Trace: [ 49.635477] <TASK> [ 49.635883] dump_stack_lvl+0x4e/0x90 [ 49.636435] print_report+0xd2/0x660 [ 49.637005] ? __virt_addr_valid+0x156/0x1e0 [ 49.637518] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.638339] kasan_report+0xff/0x140 [ 49.638860] ? ksize_unpoisons_memory+0x183/0x3b0 [ 49.639574] ? ksize_unpoisons_memory+0x183/0x3b0 [ 49.640141] __asan_load1+0x66/0x70 [ 49.640652] ksize_unpoisons_memory+0x183/0x3b0 [ 49.641241] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 49.641963] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 49.642633] ? __schedule+0x70b/0x1190 [ 49.643289] ? ktime_get_ts64+0x118/0x140 [ 49.644035] kunit_try_run_case+0x126/0x290 [ 49.644684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.645381] ? __kasan_check_write+0x18/0x20 [ 49.646056] ? trace_preempt_on+0x20/0xa0 [ 49.646548] ? __kthread_parkme+0x4f/0xd0 [ 49.647365] ? preempt_count_sub+0x50/0x80 [ 49.648075] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.648670] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.649631] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.650457] kthread+0x19e/0x1e0 [ 49.651328] ? __pfx_kthread+0x10/0x10 [ 49.651994] ret_from_fork+0x41/0x70 [ 49.652521] ? __pfx_kthread+0x10/0x10 [ 49.653219] ret_from_fork_asm+0x1b/0x30 [ 49.653807] </TASK> [ 49.654204] [ 49.654444] Allocated by task 208: [ 49.654975] kasan_save_stack+0x3c/0x60 [ 49.655625] kasan_set_track+0x29/0x40 [ 49.656176] kasan_save_alloc_info+0x22/0x30 [ 49.656859] __kasan_kmalloc+0xb7/0xc0 [ 49.657413] kmalloc_trace+0x4c/0xb0 [ 49.658094] ksize_unpoisons_memory+0xb0/0x3b0 [ 49.658671] kunit_try_run_case+0x126/0x290 [ 49.659265] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.660147] kthread+0x19e/0x1e0 [ 49.660764] ret_from_fork+0x41/0x70 [ 49.661390] ret_from_fork_asm+0x1b/0x30 [ 49.661977] [ 49.662215] The buggy address belongs to the object at ffff88810284c800 [ 49.662215] which belongs to the cache kmalloc-128 of size 128 [ 49.663616] The buggy address is located 12 bytes to the right of [ 49.663616] allocated 115-byte region [ffff88810284c800, ffff88810284c873) [ 49.665505] [ 49.665819] The buggy address belongs to the physical page: [ 49.666413] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284c [ 49.667319] flags: 0x200000000000800(slab|node=0|zone=2) [ 49.667884] page_type: 0xffffffff() [ 49.669006] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 49.669858] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 49.670625] page dumped because: kasan: bad access detected [ 49.671130] [ 49.671428] Memory state around the buggy address: [ 49.672090] ffff88810284c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.672772] ffff88810284c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.673990] >ffff88810284c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 49.675147] ^ [ 49.675920] ffff88810284c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.676665] ffff88810284c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.677675] ================================================================== [ 49.586239] ================================================================== [ 49.587029] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x146/0x3b0 [ 49.587868] Read of size 1 at addr ffff88810284c878 by task kunit_try_catch/208 [ 49.588511] [ 49.588866] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 49.589594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 49.590536] Call Trace: [ 49.590891] <TASK> [ 49.591261] dump_stack_lvl+0x4e/0x90 [ 49.591875] print_report+0xd2/0x660 [ 49.592322] ? __virt_addr_valid+0x156/0x1e0 [ 49.592905] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.593610] kasan_report+0xff/0x140 [ 49.594215] ? ksize_unpoisons_memory+0x146/0x3b0 [ 49.594939] ? ksize_unpoisons_memory+0x146/0x3b0 [ 49.595475] __asan_load1+0x66/0x70 [ 49.595963] ksize_unpoisons_memory+0x146/0x3b0 [ 49.596617] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 49.597350] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 49.597955] ? __schedule+0x70b/0x1190 [ 49.598532] ? ktime_get_ts64+0x118/0x140 [ 49.599127] kunit_try_run_case+0x126/0x290 [ 49.599775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.600330] ? __kasan_check_write+0x18/0x20 [ 49.600962] ? trace_preempt_on+0x20/0xa0 [ 49.601524] ? __kthread_parkme+0x4f/0xd0 [ 49.602078] ? preempt_count_sub+0x50/0x80 [ 49.602584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.603245] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.603978] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.604771] kthread+0x19e/0x1e0 [ 49.605308] ? __pfx_kthread+0x10/0x10 [ 49.605920] ret_from_fork+0x41/0x70 [ 49.606475] ? __pfx_kthread+0x10/0x10 [ 49.606956] ret_from_fork_asm+0x1b/0x30 [ 49.607581] </TASK> [ 49.607986] [ 49.608299] Allocated by task 208: [ 49.608675] kasan_save_stack+0x3c/0x60 [ 49.609270] kasan_set_track+0x29/0x40 [ 49.609819] kasan_save_alloc_info+0x22/0x30 [ 49.610402] __kasan_kmalloc+0xb7/0xc0 [ 49.610928] kmalloc_trace+0x4c/0xb0 [ 49.611389] ksize_unpoisons_memory+0xb0/0x3b0 [ 49.612017] kunit_try_run_case+0x126/0x290 [ 49.612567] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.613264] kthread+0x19e/0x1e0 [ 49.613775] ret_from_fork+0x41/0x70 [ 49.614242] ret_from_fork_asm+0x1b/0x30 [ 49.614668] [ 49.615003] The buggy address belongs to the object at ffff88810284c800 [ 49.615003] which belongs to the cache kmalloc-128 of size 128 [ 49.616290] The buggy address is located 5 bytes to the right of [ 49.616290] allocated 115-byte region [ffff88810284c800, ffff88810284c873) [ 49.617484] [ 49.617753] The buggy address belongs to the physical page: [ 49.618397] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284c [ 49.619374] flags: 0x200000000000800(slab|node=0|zone=2) [ 49.620059] page_type: 0xffffffff() [ 49.620504] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 49.621375] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 49.622072] page dumped because: kasan: bad access detected [ 49.622581] [ 49.622906] Memory state around the buggy address: [ 49.623470] ffff88810284c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.624141] ffff88810284c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.624901] >ffff88810284c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 49.625655] ^ [ 49.626363] ffff88810284c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.627172] ffff88810284c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.627893] ================================================================== [ 49.540472] ================================================================== [ 49.541588] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10d/0x3b0 [ 49.542392] Read of size 1 at addr ffff88810284c873 by task kunit_try_catch/208 [ 49.543180] [ 49.543480] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 49.544387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 49.545279] Call Trace: [ 49.545681] <TASK> [ 49.546125] dump_stack_lvl+0x4e/0x90 [ 49.546730] print_report+0xd2/0x660 [ 49.547199] ? __virt_addr_valid+0x156/0x1e0 [ 49.547944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 49.548578] kasan_report+0xff/0x140 [ 49.549209] ? ksize_unpoisons_memory+0x10d/0x3b0 [ 49.549957] ? ksize_unpoisons_memory+0x10d/0x3b0 [ 49.550652] __asan_load1+0x66/0x70 [ 49.551212] ksize_unpoisons_memory+0x10d/0x3b0 [ 49.551859] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 49.552398] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 49.553150] ? __schedule+0x70b/0x1190 [ 49.553764] ? ktime_get_ts64+0x118/0x140 [ 49.554335] kunit_try_run_case+0x126/0x290 [ 49.555026] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.555646] ? __kasan_check_write+0x18/0x20 [ 49.556296] ? trace_preempt_on+0x20/0xa0 [ 49.556922] ? __kthread_parkme+0x4f/0xd0 [ 49.557495] ? preempt_count_sub+0x50/0x80 [ 49.558124] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.558684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.559555] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.560306] kthread+0x19e/0x1e0 [ 49.560852] ? __pfx_kthread+0x10/0x10 [ 49.561426] ret_from_fork+0x41/0x70 [ 49.562049] ? __pfx_kthread+0x10/0x10 [ 49.562596] ret_from_fork_asm+0x1b/0x30 [ 49.563261] </TASK> [ 49.563608] [ 49.563949] Allocated by task 208: [ 49.564406] kasan_save_stack+0x3c/0x60 [ 49.565052] kasan_set_track+0x29/0x40 [ 49.565520] kasan_save_alloc_info+0x22/0x30 [ 49.566213] __kasan_kmalloc+0xb7/0xc0 [ 49.566816] kmalloc_trace+0x4c/0xb0 [ 49.567410] ksize_unpoisons_memory+0xb0/0x3b0 [ 49.567995] kunit_try_run_case+0x126/0x290 [ 49.568613] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.569389] kthread+0x19e/0x1e0 [ 49.569933] ret_from_fork+0x41/0x70 [ 49.570452] ret_from_fork_asm+0x1b/0x30 [ 49.571102] [ 49.571395] The buggy address belongs to the object at ffff88810284c800 [ 49.571395] which belongs to the cache kmalloc-128 of size 128 [ 49.572652] The buggy address is located 0 bytes to the right of [ 49.572652] allocated 115-byte region [ffff88810284c800, ffff88810284c873) [ 49.574037] [ 49.574325] The buggy address belongs to the physical page: [ 49.574956] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284c [ 49.576064] flags: 0x200000000000800(slab|node=0|zone=2) [ 49.576550] page_type: 0xffffffff() [ 49.577050] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 49.577856] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 49.579021] page dumped because: kasan: bad access detected [ 49.579586] [ 49.579888] Memory state around the buggy address: [ 49.580413] ffff88810284c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.581129] ffff88810284c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.581885] >ffff88810284c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 49.582508] ^ [ 49.583187] ffff88810284c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.583939] ffff88810284c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.584569] ==================================================================