================================================================== BUG: KASAN: slab-out-of-bounds in shrink_folio_list+0x141d/0x37d0 Read of size 8 at addr ffff88800e7bdeb1 by task kswapd0/41 CPU: 0 PID: 41 Comm: kswapd0 Not tainted 6.4.0-next-20230706 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0x91/0xf0 print_report+0xcc/0x620 kasan_report+0xbe/0xf0 kasan_check_range+0x39/0x1b0 shrink_folio_list+0x141d/0x37d0 shrink_lruvec+0xbf1/0x22b0 shrink_node+0x894/0x20b0 balance_pgdat+0x8bb/0x1450 kswapd+0x647/0xcd0 kthread+0x33f/0x440 ret_from_fork+0x2c/0x50 Allocated by task 241: kasan_save_stack+0x22/0x50 kasan_set_track+0x25/0x30 __kasan_slab_alloc+0x59/0x70 kmem_cache_alloc+0x17b/0x390 __anon_vma_prepare+0x26c/0x500 __handle_mm_fault+0x250b/0x2d10 handle_mm_fault+0x1af/0xba0 __get_user_pages+0x4b3/0x1250 get_user_pages_remote+0x248/0x970 get_arg_page+0x12c/0x480 copy_string_kernel+0x196/0x4e0 do_execveat_common+0x4e7/0x8e0 __x64_sys_execve+0x93/0xc0 do_syscall_64+0x3f/0x90 entry_SYSCALL_64_after_hwframe+0x6e/0xd8 The buggy address belongs to the object at ffff88800e7bddd0 which belongs to the cache anon_vma of size 208 The buggy address is located 17 bytes to the right of allocated 208-byte region [ffff88800e7bddd0, ffff88800e7bdea0) The buggy address belongs to the physical page: page:00000000fc41b7a6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe7bd memcg:ffff88800d2ab001 anon flags: 0x100000000000200(slab|node=0|zone=1) page_type: 0xffffffff() raw: 0100000000000200 ffff8880087a2280 ffffea00004fb140 dead000000000003 raw: 0000000000000000 00000000000f000f 00000001ffffffff ffff88800d2ab001 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88800e7bdd80: 00 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 ffff88800e7bde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88800e7bde80: 00 00 00 00 fc fc fc fc fc fc fc fc 00 00 00 00 ^ ffff88800e7bdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88800e7bdf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc ==================================================================