Date
June 17, 2025, 3:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 91.232884] ================================================================== [ 91.234248] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc8/0x308 [ 91.236527] Write of size 1 at addr ffff0000c5f2ab73 by task kunit_try_catch/117 [ 91.237567] [ 91.238354] CPU: 0 PID: 117 Comm: kunit_try_catch Tainted: G N 6.6.94-rc1 #1 [ 91.239568] Hardware name: linux,dummy-virt (DT) [ 91.240736] Call trace: [ 91.241182] dump_backtrace+0x9c/0x128 [ 91.242029] show_stack+0x20/0x38 [ 91.242713] dump_stack_lvl+0x60/0xb0 [ 91.243432] print_report+0xf8/0x5e8 [ 91.244252] kasan_report+0xdc/0x128 [ 91.245085] __asan_store1+0x60/0x70 [ 91.245961] kmalloc_oob_right+0xc8/0x308 [ 91.246766] kunit_try_run_case+0x114/0x298 [ 91.247672] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.248736] kthread+0x18c/0x1a8 [ 91.249484] ret_from_fork+0x10/0x20 [ 91.250483] [ 91.250897] Allocated by task 117: [ 91.251603] kasan_save_stack+0x3c/0x68 [ 91.252440] kasan_set_track+0x2c/0x40 [ 91.253256] kasan_save_alloc_info+0x24/0x38 [ 91.254066] __kasan_kmalloc+0xd4/0xd8 [ 91.254854] kmalloc_trace+0x68/0x130 [ 91.255536] kmalloc_oob_right+0xa0/0x308 [ 91.256466] kunit_try_run_case+0x114/0x298 [ 91.257344] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.258307] kthread+0x18c/0x1a8 [ 91.259729] ret_from_fork+0x10/0x20 [ 91.260549] [ 91.261015] The buggy address belongs to the object at ffff0000c5f2ab00 [ 91.261015] which belongs to the cache kmalloc-128 of size 128 [ 91.262932] The buggy address is located 0 bytes to the right of [ 91.262932] allocated 115-byte region [ffff0000c5f2ab00, ffff0000c5f2ab73) [ 91.264779] [ 91.265465] The buggy address belongs to the physical page: [ 91.266709] page:00000000b9a49c63 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2a [ 91.268430] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 91.269725] page_type: 0xffffffff() [ 91.270957] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 91.272109] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 91.273445] page dumped because: kasan: bad access detected [ 91.274440] [ 91.274923] Memory state around the buggy address: [ 91.276116] ffff0000c5f2aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 91.277196] ffff0000c5f2aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.278300] >ffff0000c5f2ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 91.279379] ^ [ 91.280570] ffff0000c5f2ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.281748] ffff0000c5f2ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.282872] ================================================================== [ 91.332934] ================================================================== [ 91.334081] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x118/0x308 [ 91.335296] Read of size 1 at addr ffff0000c5f2ab80 by task kunit_try_catch/117 [ 91.336280] [ 91.336803] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 91.338098] Hardware name: linux,dummy-virt (DT) [ 91.338878] Call trace: [ 91.339359] dump_backtrace+0x9c/0x128 [ 91.340207] show_stack+0x20/0x38 [ 91.341019] dump_stack_lvl+0x60/0xb0 [ 91.341784] print_report+0xf8/0x5e8 [ 91.342563] kasan_report+0xdc/0x128 [ 91.343364] __asan_load1+0x60/0x70 [ 91.344229] kmalloc_oob_right+0x118/0x308 [ 91.345133] kunit_try_run_case+0x114/0x298 [ 91.346035] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.347156] kthread+0x18c/0x1a8 [ 91.347927] ret_from_fork+0x10/0x20 [ 91.348769] [ 91.349235] Allocated by task 117: [ 91.349954] kasan_save_stack+0x3c/0x68 [ 91.350813] kasan_set_track+0x2c/0x40 [ 91.351542] kasan_save_alloc_info+0x24/0x38 [ 91.352340] __kasan_kmalloc+0xd4/0xd8 [ 91.353220] kmalloc_trace+0x68/0x130 [ 91.353991] kmalloc_oob_right+0xa0/0x308 [ 91.354812] kunit_try_run_case+0x114/0x298 [ 91.355673] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.356745] kthread+0x18c/0x1a8 [ 91.357460] ret_from_fork+0x10/0x20 [ 91.358236] [ 91.358633] The buggy address belongs to the object at ffff0000c5f2ab00 [ 91.358633] which belongs to the cache kmalloc-128 of size 128 [ 91.360226] The buggy address is located 13 bytes to the right of [ 91.360226] allocated 115-byte region [ffff0000c5f2ab00, ffff0000c5f2ab73) [ 91.361942] [ 91.362388] The buggy address belongs to the physical page: [ 91.363304] page:00000000b9a49c63 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2a [ 91.364612] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 91.365746] page_type: 0xffffffff() [ 91.366531] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 91.367657] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 91.368829] page dumped because: kasan: bad access detected [ 91.369746] [ 91.370154] Memory state around the buggy address: [ 91.371014] ffff0000c5f2aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.372135] ffff0000c5f2ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 91.373309] >ffff0000c5f2ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.374300] ^ [ 91.374919] ffff0000c5f2ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.375942] ffff0000c5f2ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.376991] ================================================================== [ 91.288834] ================================================================== [ 91.289984] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xf0/0x308 [ 91.292115] Write of size 1 at addr ffff0000c5f2ab78 by task kunit_try_catch/117 [ 91.293131] [ 91.293373] CPU: 1 PID: 117 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 91.293913] Hardware name: linux,dummy-virt (DT) [ 91.294228] Call trace: [ 91.294463] dump_backtrace+0x9c/0x128 [ 91.294845] show_stack+0x20/0x38 [ 91.295178] dump_stack_lvl+0x60/0xb0 [ 91.295715] print_report+0xf8/0x5e8 [ 91.296293] kasan_report+0xdc/0x128 [ 91.297312] __asan_store1+0x60/0x70 [ 91.298336] kmalloc_oob_right+0xf0/0x308 [ 91.299156] kunit_try_run_case+0x114/0x298 [ 91.299612] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.300119] kthread+0x18c/0x1a8 [ 91.300497] ret_from_fork+0x10/0x20 [ 91.301481] [ 91.301925] Allocated by task 117: [ 91.302646] kasan_save_stack+0x3c/0x68 [ 91.303534] kasan_set_track+0x2c/0x40 [ 91.304419] kasan_save_alloc_info+0x24/0x38 [ 91.305321] __kasan_kmalloc+0xd4/0xd8 [ 91.306206] kmalloc_trace+0x68/0x130 [ 91.306985] kmalloc_oob_right+0xa0/0x308 [ 91.307844] kunit_try_run_case+0x114/0x298 [ 91.308770] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 91.309847] kthread+0x18c/0x1a8 [ 91.310541] ret_from_fork+0x10/0x20 [ 91.311351] [ 91.311816] The buggy address belongs to the object at ffff0000c5f2ab00 [ 91.311816] which belongs to the cache kmalloc-128 of size 128 [ 91.313491] The buggy address is located 5 bytes to the right of [ 91.313491] allocated 115-byte region [ffff0000c5f2ab00, ffff0000c5f2ab73) [ 91.314881] [ 91.315424] The buggy address belongs to the physical page: [ 91.316351] page:00000000b9a49c63 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f2a [ 91.317720] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 91.318845] page_type: 0xffffffff() [ 91.319738] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 91.320940] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 91.322060] page dumped because: kasan: bad access detected [ 91.322996] [ 91.323481] Memory state around the buggy address: [ 91.324427] ffff0000c5f2aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 91.325539] ffff0000c5f2aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.326628] >ffff0000c5f2ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 91.327673] ^ [ 91.328839] ffff0000c5f2ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.329889] ffff0000c5f2ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 91.330923] ==================================================================
[ 33.036670] ================================================================== [ 33.037423] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcf/0x330 [ 33.038219] Write of size 1 at addr ffff88810285ed73 by task kunit_try_catch/132 [ 33.038665] [ 33.039145] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G N 6.6.94-rc1 #1 [ 33.039801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.040567] Call Trace: [ 33.040875] <TASK> [ 33.041221] dump_stack_lvl+0x4e/0x90 [ 33.041561] print_report+0xd2/0x650 [ 33.041907] ? __virt_addr_valid+0x156/0x1e0 [ 33.042266] ? kmalloc_oob_right+0xcf/0x330 [ 33.042579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.042993] ? kmalloc_oob_right+0xcf/0x330 [ 33.043320] kasan_report+0x147/0x180 [ 33.043609] ? kmalloc_oob_right+0xcf/0x330 [ 33.043977] __asan_store1+0x69/0x70 [ 33.044271] kmalloc_oob_right+0xcf/0x330 [ 33.044589] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 33.044980] ? __schedule+0x715/0x11a0 [ 33.045251] ? irqentry_exit+0x29/0x60 [ 33.045569] ? ktime_get_ts64+0x118/0x140 [ 33.045935] kunit_try_run_case+0x120/0x290 [ 33.046274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.046630] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 33.047109] ? kunit_generic_run_threadfn_adapter+0x1c/0x50 [ 33.047501] ? __kthread_parkme+0xaa/0xd0 [ 33.047820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.048174] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.048545] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.049171] kthread+0x19e/0x1e0 [ 33.049467] ? __pfx_kthread+0x10/0x10 [ 33.049760] ret_from_fork+0x41/0x70 [ 33.050063] ? __pfx_kthread+0x10/0x10 [ 33.050373] ret_from_fork_asm+0x1b/0x30 [ 33.050792] </TASK> [ 33.051075] [ 33.051242] Allocated by task 132: [ 33.051550] kasan_save_stack+0x44/0x70 [ 33.051949] kasan_set_track+0x29/0x40 [ 33.052238] kasan_save_alloc_info+0x22/0x30 [ 33.052546] __kasan_kmalloc+0xb7/0xc0 [ 33.052825] kmalloc_trace+0x4c/0xb0 [ 33.053137] kmalloc_oob_right+0x9f/0x330 [ 33.053426] kunit_try_run_case+0x120/0x290 [ 33.053736] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.054097] kthread+0x19e/0x1e0 [ 33.054394] ret_from_fork+0x41/0x70 [ 33.054675] ret_from_fork_asm+0x1b/0x30 [ 33.055038] [ 33.055288] The buggy address belongs to the object at ffff88810285ed00 [ 33.055288] which belongs to the cache kmalloc-128 of size 128 [ 33.056134] The buggy address is located 0 bytes to the right of [ 33.056134] allocated 115-byte region [ffff88810285ed00, ffff88810285ed73) [ 33.056956] [ 33.057235] The buggy address belongs to the physical page: [ 33.057781] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10285e [ 33.058564] flags: 0x200000000000800(slab|node=0|zone=2) [ 33.059204] page_type: 0xffffffff() [ 33.059747] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.060192] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 33.060722] page dumped because: kasan: bad access detected [ 33.061172] [ 33.061319] Memory state around the buggy address: [ 33.061866] ffff88810285ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.062315] ffff88810285ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.062796] >ffff88810285ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.063285] ^ [ 33.063752] ffff88810285ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.064189] ffff88810285ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.064667] ================================================================== [ 33.066548] ================================================================== [ 33.066977] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x330 [ 33.067432] Write of size 1 at addr ffff88810285ed78 by task kunit_try_catch/132 [ 33.067913] [ 33.068057] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 33.068576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.069188] Call Trace: [ 33.069363] <TASK> [ 33.069565] dump_stack_lvl+0x4e/0x90 [ 33.069927] print_report+0xd2/0x650 [ 33.070215] ? __virt_addr_valid+0x156/0x1e0 [ 33.070513] ? kmalloc_oob_right+0x108/0x330 [ 33.070822] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.071244] ? kmalloc_oob_right+0x108/0x330 [ 33.071544] kasan_report+0x147/0x180 [ 33.071886] ? kmalloc_oob_right+0x108/0x330 [ 33.072186] __asan_store1+0x69/0x70 [ 33.072446] kmalloc_oob_right+0x108/0x330 [ 33.072748] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 33.073083] ? __schedule+0x715/0x11a0 [ 33.073361] ? irqentry_exit+0x29/0x60 [ 33.073609] ? ktime_get_ts64+0x118/0x140 [ 33.073976] kunit_try_run_case+0x120/0x290 [ 33.074283] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.074597] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 33.074997] ? kunit_generic_run_threadfn_adapter+0x1c/0x50 [ 33.075372] ? __kthread_parkme+0xaa/0xd0 [ 33.075664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.076033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.076384] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.076763] kthread+0x19e/0x1e0 [ 33.077026] ? __pfx_kthread+0x10/0x10 [ 33.077308] ret_from_fork+0x41/0x70 [ 33.077573] ? __pfx_kthread+0x10/0x10 [ 33.077904] ret_from_fork_asm+0x1b/0x30 [ 33.078191] </TASK> [ 33.078363] [ 33.078507] Allocated by task 132: [ 33.078732] kasan_save_stack+0x44/0x70 [ 33.079034] kasan_set_track+0x29/0x40 [ 33.079294] kasan_save_alloc_info+0x22/0x30 [ 33.079584] __kasan_kmalloc+0xb7/0xc0 [ 33.079879] kmalloc_trace+0x4c/0xb0 [ 33.080144] kmalloc_oob_right+0x9f/0x330 [ 33.080404] kunit_try_run_case+0x120/0x290 [ 33.080690] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.081038] kthread+0x19e/0x1e0 [ 33.081284] ret_from_fork+0x41/0x70 [ 33.081540] ret_from_fork_asm+0x1b/0x30 [ 33.081936] [ 33.082084] The buggy address belongs to the object at ffff88810285ed00 [ 33.082084] which belongs to the cache kmalloc-128 of size 128 [ 33.082746] The buggy address is located 5 bytes to the right of [ 33.082746] allocated 115-byte region [ffff88810285ed00, ffff88810285ed73) [ 33.083473] [ 33.083610] The buggy address belongs to the physical page: [ 33.083993] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10285e [ 33.084448] flags: 0x200000000000800(slab|node=0|zone=2) [ 33.084822] page_type: 0xffffffff() [ 33.085207] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.085651] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 33.086179] page dumped because: kasan: bad access detected [ 33.086542] [ 33.086674] Memory state around the buggy address: [ 33.086969] ffff88810285ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.087377] ffff88810285ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.087796] >ffff88810285ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.088214] ^ [ 33.088586] ffff88810285ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.089091] ffff88810285ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.089483] ================================================================== [ 33.090373] ================================================================== [ 33.090873] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x144/0x330 [ 33.091347] Read of size 1 at addr ffff88810285ed80 by task kunit_try_catch/132 [ 33.091835] [ 33.091982] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 33.092491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.093079] Call Trace: [ 33.093287] <TASK> [ 33.093462] dump_stack_lvl+0x4e/0x90 [ 33.093776] print_report+0xd2/0x650 [ 33.094076] ? __virt_addr_valid+0x156/0x1e0 [ 33.094388] ? kmalloc_oob_right+0x144/0x330 [ 33.094671] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.095081] ? kmalloc_oob_right+0x144/0x330 [ 33.095393] kasan_report+0x147/0x180 [ 33.095691] ? kmalloc_oob_right+0x144/0x330 [ 33.095990] __asan_load1+0x66/0x70 [ 33.096242] kmalloc_oob_right+0x144/0x330 [ 33.096549] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 33.096978] ? __schedule+0x715/0x11a0 [ 33.097229] ? irqentry_exit+0x29/0x60 [ 33.097511] ? ktime_get_ts64+0x118/0x140 [ 33.097826] kunit_try_run_case+0x120/0x290 [ 33.098123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.098467] ? asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 33.098834] ? kunit_generic_run_threadfn_adapter+0x1c/0x50 [ 33.099250] ? __kthread_parkme+0xaa/0xd0 [ 33.099515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.099853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.100275] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.100603] kthread+0x19e/0x1e0 [ 33.100905] ? __pfx_kthread+0x10/0x10 [ 33.101170] ret_from_fork+0x41/0x70 [ 33.101424] ? __pfx_kthread+0x10/0x10 [ 33.101698] ret_from_fork_asm+0x1b/0x30 [ 33.101999] </TASK> [ 33.102185] [ 33.102325] Allocated by task 132: [ 33.102535] kasan_save_stack+0x44/0x70 [ 33.102869] kasan_set_track+0x29/0x40 [ 33.103139] kasan_save_alloc_info+0x22/0x30 [ 33.103435] __kasan_kmalloc+0xb7/0xc0 [ 33.103673] kmalloc_trace+0x4c/0xb0 [ 33.103928] kmalloc_oob_right+0x9f/0x330 [ 33.104215] kunit_try_run_case+0x120/0x290 [ 33.104509] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 33.104828] kthread+0x19e/0x1e0 [ 33.105163] ret_from_fork+0x41/0x70 [ 33.105395] ret_from_fork_asm+0x1b/0x30 [ 33.105669] [ 33.105807] The buggy address belongs to the object at ffff88810285ed00 [ 33.105807] which belongs to the cache kmalloc-128 of size 128 [ 33.106612] The buggy address is located 13 bytes to the right of [ 33.106612] allocated 115-byte region [ffff88810285ed00, ffff88810285ed73) [ 33.107400] [ 33.107521] The buggy address belongs to the physical page: [ 33.107894] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10285e [ 33.108428] flags: 0x200000000000800(slab|node=0|zone=2) [ 33.108761] page_type: 0xffffffff() [ 33.109034] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.109470] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 33.109956] page dumped because: kasan: bad access detected [ 33.110262] [ 33.110369] Memory state around the buggy address: [ 33.110676] ffff88810285ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.111144] ffff88810285ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.111553] >ffff88810285ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.111999] ^ [ 33.112233] ffff88810285ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.112630] ffff88810285ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.113003] ==================================================================