Date
June 17, 2025, 3:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 94.028146] ================================================================== [ 94.028778] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x150/0x378 [ 94.029373] Read of size 1 at addr ffff0000c60b6d7f by task kunit_try_catch/191 [ 94.030089] [ 94.030289] CPU: 1 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 94.031258] Hardware name: linux,dummy-virt (DT) [ 94.031824] Call trace: [ 94.032194] dump_backtrace+0x9c/0x128 [ 94.032656] show_stack+0x20/0x38 [ 94.032988] dump_stack_lvl+0x60/0xb0 [ 94.033340] print_report+0xf8/0x5e8 [ 94.033899] kasan_report+0xdc/0x128 [ 94.034447] __asan_load1+0x60/0x70 [ 94.034999] ksize_unpoisons_memory+0x150/0x378 [ 94.035483] kunit_try_run_case+0x114/0x298 [ 94.036112] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 94.036777] kthread+0x18c/0x1a8 [ 94.037199] ret_from_fork+0x10/0x20 [ 94.037671] [ 94.037861] Allocated by task 191: [ 94.038237] kasan_save_stack+0x3c/0x68 [ 94.039029] kasan_set_track+0x2c/0x40 [ 94.039636] kasan_save_alloc_info+0x24/0x38 [ 94.040132] __kasan_kmalloc+0xd4/0xd8 [ 94.040599] kmalloc_trace+0x68/0x130 [ 94.041013] ksize_unpoisons_memory+0xb0/0x378 [ 94.041836] kunit_try_run_case+0x114/0x298 [ 94.042519] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 94.043338] kthread+0x18c/0x1a8 [ 94.043788] ret_from_fork+0x10/0x20 [ 94.044261] [ 94.044547] The buggy address belongs to the object at ffff0000c60b6d00 [ 94.044547] which belongs to the cache kmalloc-128 of size 128 [ 94.045627] The buggy address is located 12 bytes to the right of [ 94.045627] allocated 115-byte region [ffff0000c60b6d00, ffff0000c60b6d73) [ 94.046653] [ 94.046981] The buggy address belongs to the physical page: [ 94.047582] page:00000000abb31ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b6 [ 94.048725] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 94.049572] page_type: 0xffffffff() [ 94.050035] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 94.051000] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 94.052141] page dumped because: kasan: bad access detected [ 94.052701] [ 94.052945] Memory state around the buggy address: [ 94.053515] ffff0000c60b6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.054221] ffff0000c60b6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.055160] >ffff0000c60b6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 94.055838] ^ [ 94.056820] ffff0000c60b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.057598] ffff0000c60b6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.058292] ================================================================== [ 93.961287] ================================================================== [ 93.962021] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x104/0x378 [ 93.963174] Read of size 1 at addr ffff0000c60b6d73 by task kunit_try_catch/191 [ 93.963913] [ 93.964158] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 93.964977] Hardware name: linux,dummy-virt (DT) [ 93.965459] Call trace: [ 93.965710] dump_backtrace+0x9c/0x128 [ 93.966167] show_stack+0x20/0x38 [ 93.966537] dump_stack_lvl+0x60/0xb0 [ 93.967571] print_report+0xf8/0x5e8 [ 93.968080] kasan_report+0xdc/0x128 [ 93.968553] __asan_load1+0x60/0x70 [ 93.969042] ksize_unpoisons_memory+0x104/0x378 [ 93.969616] kunit_try_run_case+0x114/0x298 [ 93.970123] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 93.970913] kthread+0x18c/0x1a8 [ 93.971248] ret_from_fork+0x10/0x20 [ 93.971624] [ 93.971863] Allocated by task 191: [ 93.972190] kasan_save_stack+0x3c/0x68 [ 93.972713] kasan_set_track+0x2c/0x40 [ 93.973201] kasan_save_alloc_info+0x24/0x38 [ 93.973666] __kasan_kmalloc+0xd4/0xd8 [ 93.974148] kmalloc_trace+0x68/0x130 [ 93.974629] ksize_unpoisons_memory+0xb0/0x378 [ 93.975135] kunit_try_run_case+0x114/0x298 [ 93.975604] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 93.976621] kthread+0x18c/0x1a8 [ 93.977050] ret_from_fork+0x10/0x20 [ 93.977504] [ 93.977769] The buggy address belongs to the object at ffff0000c60b6d00 [ 93.977769] which belongs to the cache kmalloc-128 of size 128 [ 93.978754] The buggy address is located 0 bytes to the right of [ 93.978754] allocated 115-byte region [ffff0000c60b6d00, ffff0000c60b6d73) [ 93.980045] [ 93.980262] The buggy address belongs to the physical page: [ 93.980903] page:00000000abb31ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b6 [ 93.981733] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 93.982378] page_type: 0xffffffff() [ 93.982810] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 93.983565] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 93.984185] page dumped because: kasan: bad access detected [ 93.984840] [ 93.985099] Memory state around the buggy address: [ 93.985688] ffff0000c60b6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 93.986385] ffff0000c60b6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.987192] >ffff0000c60b6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 93.987757] ^ [ 93.988244] ffff0000c60b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.988843] ffff0000c60b6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 93.989586] ================================================================== [ 93.991929] ================================================================== [ 93.992696] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x128/0x378 [ 93.993503] Read of size 1 at addr ffff0000c60b6d78 by task kunit_try_catch/191 [ 93.994122] [ 93.994354] CPU: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 93.995348] Hardware name: linux,dummy-virt (DT) [ 93.995943] Call trace: [ 93.996255] dump_backtrace+0x9c/0x128 [ 93.996754] show_stack+0x20/0x38 [ 93.997289] dump_stack_lvl+0x60/0xb0 [ 93.997678] print_report+0xf8/0x5e8 [ 93.998050] kasan_report+0xdc/0x128 [ 93.998436] __asan_load1+0x60/0x70 [ 93.999431] ksize_unpoisons_memory+0x128/0x378 [ 94.000158] kunit_try_run_case+0x114/0x298 [ 94.000819] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 94.001633] kthread+0x18c/0x1a8 [ 94.002135] ret_from_fork+0x10/0x20 [ 94.002900] [ 94.003232] Allocated by task 191: [ 94.003591] kasan_save_stack+0x3c/0x68 [ 94.004029] kasan_set_track+0x2c/0x40 [ 94.004519] kasan_save_alloc_info+0x24/0x38 [ 94.005156] __kasan_kmalloc+0xd4/0xd8 [ 94.005669] kmalloc_trace+0x68/0x130 [ 94.006157] ksize_unpoisons_memory+0xb0/0x378 [ 94.006845] kunit_try_run_case+0x114/0x298 [ 94.007782] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 94.008331] kthread+0x18c/0x1a8 [ 94.008665] ret_from_fork+0x10/0x20 [ 94.009027] [ 94.009300] The buggy address belongs to the object at ffff0000c60b6d00 [ 94.009300] which belongs to the cache kmalloc-128 of size 128 [ 94.010665] The buggy address is located 5 bytes to the right of [ 94.010665] allocated 115-byte region [ffff0000c60b6d00, ffff0000c60b6d73) [ 94.012482] [ 94.012746] The buggy address belongs to the physical page: [ 94.013971] page:00000000abb31ec0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060b6 [ 94.014658] flags: 0xbfffc0000000800(slab|node=0|zone=2|lastcpupid=0xffff) [ 94.016142] page_type: 0xffffffff() [ 94.017092] raw: 0bfffc0000000800 ffff0000c00018c0 dead000000000122 0000000000000000 [ 94.017857] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 94.018555] page dumped because: kasan: bad access detected [ 94.019117] [ 94.019323] Memory state around the buggy address: [ 94.020422] ffff0000c60b6c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 94.021227] ffff0000c60b6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.021989] >ffff0000c60b6d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 94.022652] ^ [ 94.023374] ffff0000c60b6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.025174] ffff0000c60b6e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 94.025830] ==================================================================
[ 35.069152] ================================================================== [ 35.070079] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x146/0x3b0 [ 35.070580] Read of size 1 at addr ffff888102897a78 by task kunit_try_catch/206 [ 35.071175] [ 35.071332] CPU: 1 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.071847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.072432] Call Trace: [ 35.072620] <TASK> [ 35.072798] dump_stack_lvl+0x4e/0x90 [ 35.073131] print_report+0xd2/0x650 [ 35.074131] ? __virt_addr_valid+0x156/0x1e0 [ 35.074490] ? ksize_unpoisons_memory+0x146/0x3b0 [ 35.074873] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.075243] ? ksize_unpoisons_memory+0x146/0x3b0 [ 35.075579] kasan_report+0x147/0x180 [ 35.075889] ? ksize_unpoisons_memory+0x146/0x3b0 [ 35.076235] __asan_load1+0x66/0x70 [ 35.076519] ksize_unpoisons_memory+0x146/0x3b0 [ 35.076895] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 35.077243] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 35.078023] ? __schedule+0x715/0x11a0 [ 35.078333] ? ktime_get_ts64+0x118/0x140 [ 35.078648] kunit_try_run_case+0x120/0x290 [ 35.079048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.079398] ? __kasan_check_write+0x18/0x20 [ 35.079696] ? trace_preempt_on+0x20/0xa0 [ 35.080164] ? __kthread_parkme+0x4f/0xd0 [ 35.080573] ? preempt_count_sub+0x50/0x80 [ 35.080974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.081279] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.082206] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.082521] kthread+0x19e/0x1e0 [ 35.082732] ? __pfx_kthread+0x10/0x10 [ 35.083013] ret_from_fork+0x41/0x70 [ 35.083230] ? __pfx_kthread+0x10/0x10 [ 35.083444] ret_from_fork_asm+0x1b/0x30 [ 35.083764] </TASK> [ 35.083955] [ 35.084084] Allocated by task 206: [ 35.084326] kasan_save_stack+0x44/0x70 [ 35.084643] kasan_set_track+0x29/0x40 [ 35.084926] kasan_save_alloc_info+0x22/0x30 [ 35.085239] __kasan_kmalloc+0xb7/0xc0 [ 35.085592] kmalloc_trace+0x4c/0xb0 [ 35.085833] ksize_unpoisons_memory+0xb0/0x3b0 [ 35.086481] kunit_try_run_case+0x120/0x290 [ 35.087029] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.087428] kthread+0x19e/0x1e0 [ 35.087676] ret_from_fork+0x41/0x70 [ 35.088208] ret_from_fork_asm+0x1b/0x30 [ 35.088495] [ 35.088639] The buggy address belongs to the object at ffff888102897a00 [ 35.088639] which belongs to the cache kmalloc-128 of size 128 [ 35.089795] The buggy address is located 5 bytes to the right of [ 35.089795] allocated 115-byte region [ffff888102897a00, ffff888102897a73) [ 35.090512] [ 35.090642] The buggy address belongs to the physical page: [ 35.091021] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102897 [ 35.091525] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.091890] page_type: 0xffffffff() [ 35.092123] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.092531] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 35.092955] page dumped because: kasan: bad access detected [ 35.093254] [ 35.094023] Memory state around the buggy address: [ 35.094464] ffff888102897900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.095235] ffff888102897980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.096219] >ffff888102897a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.097293] ^ [ 35.098113] ffff888102897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.099011] ffff888102897b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.099410] ================================================================== [ 35.101251] ================================================================== [ 35.101793] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x183/0x3b0 [ 35.102382] Read of size 1 at addr ffff888102897a7f by task kunit_try_catch/206 [ 35.103384] [ 35.103557] CPU: 1 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.104239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.105177] Call Trace: [ 35.105576] <TASK> [ 35.105946] dump_stack_lvl+0x4e/0x90 [ 35.106248] print_report+0xd2/0x650 [ 35.106602] ? __virt_addr_valid+0x156/0x1e0 [ 35.107098] ? ksize_unpoisons_memory+0x183/0x3b0 [ 35.107607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.108077] ? ksize_unpoisons_memory+0x183/0x3b0 [ 35.108594] kasan_report+0x147/0x180 [ 35.109055] ? ksize_unpoisons_memory+0x183/0x3b0 [ 35.109906] __asan_load1+0x66/0x70 [ 35.110285] ksize_unpoisons_memory+0x183/0x3b0 [ 35.110708] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 35.111273] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 35.111941] ? __schedule+0x715/0x11a0 [ 35.112387] ? ktime_get_ts64+0x118/0x140 [ 35.112886] kunit_try_run_case+0x120/0x290 [ 35.113748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.114123] ? __kasan_check_write+0x18/0x20 [ 35.114354] ? trace_preempt_on+0x20/0xa0 [ 35.114568] ? __kthread_parkme+0x4f/0xd0 [ 35.114796] ? preempt_count_sub+0x50/0x80 [ 35.115449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.115791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.116140] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.116493] kthread+0x19e/0x1e0 [ 35.116736] ? __pfx_kthread+0x10/0x10 [ 35.116999] ret_from_fork+0x41/0x70 [ 35.117257] ? __pfx_kthread+0x10/0x10 [ 35.117915] ret_from_fork_asm+0x1b/0x30 [ 35.118205] </TASK> [ 35.118415] [ 35.118556] Allocated by task 206: [ 35.118736] kasan_save_stack+0x44/0x70 [ 35.119098] kasan_set_track+0x29/0x40 [ 35.119337] kasan_save_alloc_info+0x22/0x30 [ 35.119574] __kasan_kmalloc+0xb7/0xc0 [ 35.119830] kmalloc_trace+0x4c/0xb0 [ 35.120051] ksize_unpoisons_memory+0xb0/0x3b0 [ 35.120335] kunit_try_run_case+0x120/0x290 [ 35.120572] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.120975] kthread+0x19e/0x1e0 [ 35.121182] ret_from_fork+0x41/0x70 [ 35.121422] ret_from_fork_asm+0x1b/0x30 [ 35.122183] [ 35.122298] The buggy address belongs to the object at ffff888102897a00 [ 35.122298] which belongs to the cache kmalloc-128 of size 128 [ 35.123030] The buggy address is located 12 bytes to the right of [ 35.123030] allocated 115-byte region [ffff888102897a00, ffff888102897a73) [ 35.123688] [ 35.123826] The buggy address belongs to the physical page: [ 35.124101] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102897 [ 35.124594] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.124953] page_type: 0xffffffff() [ 35.125170] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.126066] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 35.126487] page dumped because: kasan: bad access detected [ 35.126797] [ 35.126938] Memory state around the buggy address: [ 35.127219] ffff888102897900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.127625] ffff888102897980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.128055] >ffff888102897a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.128416] ^ [ 35.128897] ffff888102897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.129281] ffff888102897b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.130270] ================================================================== [ 35.043463] ================================================================== [ 35.044191] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10d/0x3b0 [ 35.044717] Read of size 1 at addr ffff888102897a73 by task kunit_try_catch/206 [ 35.045315] [ 35.045460] CPU: 1 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 35.045996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.046838] Call Trace: [ 35.047042] <TASK> [ 35.047220] dump_stack_lvl+0x4e/0x90 [ 35.047576] print_report+0xd2/0x650 [ 35.047903] ? __virt_addr_valid+0x156/0x1e0 [ 35.048253] ? ksize_unpoisons_memory+0x10d/0x3b0 [ 35.048598] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.049101] ? ksize_unpoisons_memory+0x10d/0x3b0 [ 35.049448] kasan_report+0x147/0x180 [ 35.049691] ? ksize_unpoisons_memory+0x10d/0x3b0 [ 35.050017] __asan_load1+0x66/0x70 [ 35.050315] ksize_unpoisons_memory+0x10d/0x3b0 [ 35.050634] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 35.051047] ? finish_task_switch.isra.0+0xc8/0x3e0 [ 35.051406] ? __schedule+0x715/0x11a0 [ 35.051687] ? ktime_get_ts64+0x118/0x140 [ 35.051990] kunit_try_run_case+0x120/0x290 [ 35.052313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.052649] ? __kasan_check_write+0x18/0x20 [ 35.052998] ? trace_preempt_on+0x20/0xa0 [ 35.053220] ? __kthread_parkme+0x4f/0xd0 [ 35.053557] ? preempt_count_sub+0x50/0x80 [ 35.053845] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.054224] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.054661] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.055043] kthread+0x19e/0x1e0 [ 35.055394] ? __pfx_kthread+0x10/0x10 [ 35.055776] ret_from_fork+0x41/0x70 [ 35.056040] ? __pfx_kthread+0x10/0x10 [ 35.056314] ret_from_fork_asm+0x1b/0x30 [ 35.056663] </TASK> [ 35.056901] [ 35.057038] Allocated by task 206: [ 35.057276] kasan_save_stack+0x44/0x70 [ 35.057615] kasan_set_track+0x29/0x40 [ 35.057913] kasan_save_alloc_info+0x22/0x30 [ 35.058212] __kasan_kmalloc+0xb7/0xc0 [ 35.058459] kmalloc_trace+0x4c/0xb0 [ 35.058680] ksize_unpoisons_memory+0xb0/0x3b0 [ 35.058983] kunit_try_run_case+0x120/0x290 [ 35.059337] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 35.059661] kthread+0x19e/0x1e0 [ 35.059914] ret_from_fork+0x41/0x70 [ 35.060129] ret_from_fork_asm+0x1b/0x30 [ 35.060371] [ 35.060498] The buggy address belongs to the object at ffff888102897a00 [ 35.060498] which belongs to the cache kmalloc-128 of size 128 [ 35.061254] The buggy address is located 0 bytes to the right of [ 35.061254] allocated 115-byte region [ffff888102897a00, ffff888102897a73) [ 35.061971] [ 35.062102] The buggy address belongs to the physical page: [ 35.062512] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102897 [ 35.063138] flags: 0x200000000000800(slab|node=0|zone=2) [ 35.063504] page_type: 0xffffffff() [ 35.063776] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.064258] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 35.064687] page dumped because: kasan: bad access detected [ 35.065149] [ 35.065259] Memory state around the buggy address: [ 35.065571] ffff888102897900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.066081] ffff888102897980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.066495] >ffff888102897a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.066982] ^ [ 35.067369] ffff888102897a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.067800] ffff888102897b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.068223] ==================================================================