Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   17.616739] ==================================================================
[   17.616815] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   17.616879] Free of addr fff00000c77a1001 by task kunit_try_catch/212
[   17.616923] 
[   17.616963] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.617332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.617666] Hardware name: linux,dummy-virt (DT)
[   17.617819] Call trace:
[   17.617965]  show_stack+0x20/0x38 (C)
[   17.618086]  dump_stack_lvl+0x8c/0xd0
[   17.618338]  print_report+0x118/0x608
[   17.618558]  kasan_report_invalid_free+0xc0/0xe8
[   17.618656]  check_slab_allocation+0xfc/0x108
[   17.618706]  __kasan_slab_pre_free+0x2c/0x48
[   17.618754]  kmem_cache_free+0xf0/0x468
[   17.618799]  kmem_cache_invalid_free+0x184/0x3c8
[   17.618961]  kunit_try_run_case+0x170/0x3f0
[   17.619461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.619692]  kthread+0x328/0x630
[   17.619740]  ret_from_fork+0x10/0x20
[   17.619788] 
[   17.619808] Allocated by task 212:
[   17.619902]  kasan_save_stack+0x3c/0x68
[   17.620199]  kasan_save_track+0x20/0x40
[   17.620366]  kasan_save_alloc_info+0x40/0x58
[   17.620415]  __kasan_slab_alloc+0xa8/0xb0
[   17.620556]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.620629]  kmem_cache_invalid_free+0x12c/0x3c8
[   17.620685]  kunit_try_run_case+0x170/0x3f0
[   17.620747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.620790]  kthread+0x328/0x630
[   17.620821]  ret_from_fork+0x10/0x20
[   17.621123] 
[   17.621146] The buggy address belongs to the object at fff00000c77a1000
[   17.621146]  which belongs to the cache test_cache of size 200
[   17.621553] The buggy address is located 1 bytes inside of
[   17.621553]  200-byte region [fff00000c77a1000, fff00000c77a10c8)
[   17.621829] 
[   17.621851] The buggy address belongs to the physical page:
[   17.621897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a1
[   17.621961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.622039] page_type: f5(slab)
[   17.622080] raw: 0bfffe0000000000 fff00000c5d093c0 dead000000000122 0000000000000000
[   17.622131] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.622638] page dumped because: kasan: bad access detected
[   17.622678] 
[   17.622695] Memory state around the buggy address:
[   17.622733]  fff00000c77a0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.622778]  fff00000c77a0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.623081] >fff00000c77a1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.623334]                    ^
[   17.623404]  fff00000c77a1080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.623450]  fff00000c77a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.623489] ==================================================================

[   17.427486] ==================================================================
[   17.427658] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   17.427751] Free of addr fff00000c77de001 by task kunit_try_catch/212
[   17.427848] 
[   17.427939] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   17.428029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.428280] Hardware name: linux,dummy-virt (DT)
[   17.428326] Call trace:
[   17.428356]  show_stack+0x20/0x38 (C)
[   17.428419]  dump_stack_lvl+0x8c/0xd0
[   17.428576]  print_report+0x118/0x608
[   17.428670]  kasan_report_invalid_free+0xc0/0xe8
[   17.428791]  check_slab_allocation+0xfc/0x108
[   17.428844]  __kasan_slab_pre_free+0x2c/0x48
[   17.428943]  kmem_cache_free+0xf0/0x468
[   17.428995]  kmem_cache_invalid_free+0x184/0x3c8
[   17.429275]  kunit_try_run_case+0x170/0x3f0
[   17.429365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.429419]  kthread+0x328/0x630
[   17.429464]  ret_from_fork+0x10/0x20
[   17.429564] 
[   17.429604] Allocated by task 212:
[   17.429634]  kasan_save_stack+0x3c/0x68
[   17.429696]  kasan_save_track+0x20/0x40
[   17.430037]  kasan_save_alloc_info+0x40/0x58
[   17.430172]  __kasan_slab_alloc+0xa8/0xb0
[   17.430276]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.430418]  kmem_cache_invalid_free+0x12c/0x3c8
[   17.430519]  kunit_try_run_case+0x170/0x3f0
[   17.430605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.430887]  kthread+0x328/0x630
[   17.431088]  ret_from_fork+0x10/0x20
[   17.431151] 
[   17.431230] The buggy address belongs to the object at fff00000c77de000
[   17.431230]  which belongs to the cache test_cache of size 200
[   17.431304] The buggy address is located 1 bytes inside of
[   17.431304]  200-byte region [fff00000c77de000, fff00000c77de0c8)
[   17.431377] 
[   17.431409] The buggy address belongs to the physical page:
[   17.431443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077de
[   17.431510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.431562] page_type: f5(slab)
[   17.431606] raw: 0bfffe0000000000 fff00000c77d9280 dead000000000122 0000000000000000
[   17.431657] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.431713] page dumped because: kasan: bad access detected
[   17.431746] 
[   17.431764] Memory state around the buggy address:
[   17.431821]  fff00000c77ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.431862]  fff00000c77ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.431923] >fff00000c77de000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.431962]                    ^
[   17.432773]  fff00000c77de080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.432857]  fff00000c77de100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.433166] ==================================================================

[   14.181402] ==================================================================
[   14.181856] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   14.182540] Free of addr ffff888102568001 by task kunit_try_catch/229
[   14.182849] 
[   14.183014] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.183126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.183152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.183187] Call Trace:
[   14.183214]  <TASK>
[   14.183247]  dump_stack_lvl+0x73/0xb0
[   14.183309]  print_report+0xd1/0x650
[   14.183345]  ? __virt_addr_valid+0x1db/0x2d0
[   14.183420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.183479]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.183524]  kasan_report_invalid_free+0x10a/0x130
[   14.183568]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.183609]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.183650]  check_slab_allocation+0x11f/0x130
[   14.183670]  __kasan_slab_pre_free+0x28/0x40
[   14.183688]  kmem_cache_free+0xed/0x420
[   14.183705]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   14.183723]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.183746]  kmem_cache_invalid_free+0x1d8/0x460
[   14.183767]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   14.183786]  ? finish_task_switch.isra.0+0x153/0x700
[   14.183807]  ? __switch_to+0x47/0xf50
[   14.183833]  ? __pfx_read_tsc+0x10/0x10
[   14.183851]  ? ktime_get_ts64+0x86/0x230
[   14.183873]  kunit_try_run_case+0x1a5/0x480
[   14.183895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.183914]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.183935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.183954]  ? __kthread_parkme+0x82/0x180
[   14.183972]  ? preempt_count_sub+0x50/0x80
[   14.183993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.184013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.184032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.184053]  kthread+0x337/0x6f0
[   14.184069]  ? trace_preempt_on+0x20/0xc0
[   14.184091]  ? __pfx_kthread+0x10/0x10
[   14.184133]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.184152]  ? calculate_sigpending+0x7b/0xa0
[   14.184173]  ? __pfx_kthread+0x10/0x10
[   14.184192]  ret_from_fork+0x116/0x1d0
[   14.184209]  ? __pfx_kthread+0x10/0x10
[   14.184226]  ret_from_fork_asm+0x1a/0x30
[   14.184253]  </TASK>
[   14.184266] 
[   14.195336] Allocated by task 229:
[   14.195654]  kasan_save_stack+0x45/0x70
[   14.195921]  kasan_save_track+0x18/0x40
[   14.196238]  kasan_save_alloc_info+0x3b/0x50
[   14.196552]  __kasan_slab_alloc+0x91/0xa0
[   14.196879]  kmem_cache_alloc_noprof+0x123/0x3f0
[   14.197144]  kmem_cache_invalid_free+0x157/0x460
[   14.197477]  kunit_try_run_case+0x1a5/0x480
[   14.197768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.198175]  kthread+0x337/0x6f0
[   14.198457]  ret_from_fork+0x116/0x1d0
[   14.198711]  ret_from_fork_asm+0x1a/0x30
[   14.199050] 
[   14.199246] The buggy address belongs to the object at ffff888102568000
[   14.199246]  which belongs to the cache test_cache of size 200
[   14.199820] The buggy address is located 1 bytes inside of
[   14.199820]  200-byte region [ffff888102568000, ffff8881025680c8)
[   14.200528] 
[   14.200657] The buggy address belongs to the physical page:
[   14.201018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102568
[   14.201408] flags: 0x200000000000000(node=0|zone=2)
[   14.201639] page_type: f5(slab)
[   14.201792] raw: 0200000000000000 ffff888101f27dc0 dead000000000122 0000000000000000
[   14.202043] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   14.202317] page dumped because: kasan: bad access detected
[   14.202773] 
[   14.202932] Memory state around the buggy address:
[   14.203326]  ffff888102567f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.203875]  ffff888102567f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.204230] >ffff888102568000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.204463]                    ^
[   14.204609]  ffff888102568080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   14.205206]  ffff888102568100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.205720] ==================================================================

[   14.331547] ==================================================================
[   14.332433] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   14.333661] Free of addr ffff8881031cb001 by task kunit_try_catch/228
[   14.333951] 
[   14.334310] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   14.334407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.334423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.334445] Call Trace:
[   14.334460]  <TASK>
[   14.334478]  dump_stack_lvl+0x73/0xb0
[   14.334511]  print_report+0xd1/0x650
[   14.334534]  ? __virt_addr_valid+0x1db/0x2d0
[   14.334561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.334586]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.334611]  kasan_report_invalid_free+0x10a/0x130
[   14.334635]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.334661]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.334685]  check_slab_allocation+0x11f/0x130
[   14.334708]  __kasan_slab_pre_free+0x28/0x40
[   14.334756]  kmem_cache_free+0xed/0x420
[   14.334789]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   14.334809]  ? kmem_cache_invalid_free+0x1d8/0x460
[   14.334837]  kmem_cache_invalid_free+0x1d8/0x460
[   14.334861]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   14.334884]  ? finish_task_switch.isra.0+0x153/0x700
[   14.334907]  ? __switch_to+0x47/0xf50
[   14.334938]  ? __pfx_read_tsc+0x10/0x10
[   14.334960]  ? ktime_get_ts64+0x86/0x230
[   14.334985]  kunit_try_run_case+0x1a5/0x480
[   14.335010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.335033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.335068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.335091]  ? __kthread_parkme+0x82/0x180
[   14.335111]  ? preempt_count_sub+0x50/0x80
[   14.335134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.335158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.335180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.335203]  kthread+0x337/0x6f0
[   14.335223]  ? trace_preempt_on+0x20/0xc0
[   14.335249]  ? __pfx_kthread+0x10/0x10
[   14.335270]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.335291]  ? calculate_sigpending+0x7b/0xa0
[   14.335317]  ? __pfx_kthread+0x10/0x10
[   14.335338]  ret_from_fork+0x116/0x1d0
[   14.335358]  ? __pfx_kthread+0x10/0x10
[   14.335379]  ret_from_fork_asm+0x1a/0x30
[   14.335412]  </TASK>
[   14.335423] 
[   14.349390] Allocated by task 228:
[   14.349830]  kasan_save_stack+0x45/0x70
[   14.350120]  kasan_save_track+0x18/0x40
[   14.350403]  kasan_save_alloc_info+0x3b/0x50
[   14.350611]  __kasan_slab_alloc+0x91/0xa0
[   14.350959]  kmem_cache_alloc_noprof+0x123/0x3f0
[   14.351157]  kmem_cache_invalid_free+0x157/0x460
[   14.351546]  kunit_try_run_case+0x1a5/0x480
[   14.351746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.352134]  kthread+0x337/0x6f0
[   14.352416]  ret_from_fork+0x116/0x1d0
[   14.352602]  ret_from_fork_asm+0x1a/0x30
[   14.352975] 
[   14.353130] The buggy address belongs to the object at ffff8881031cb000
[   14.353130]  which belongs to the cache test_cache of size 200
[   14.353968] The buggy address is located 1 bytes inside of
[   14.353968]  200-byte region [ffff8881031cb000, ffff8881031cb0c8)
[   14.354568] 
[   14.354681] The buggy address belongs to the physical page:
[   14.355262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031cb
[   14.355692] flags: 0x200000000000000(node=0|zone=2)
[   14.355899] page_type: f5(slab)
[   14.356230] raw: 0200000000000000 ffff888101985640 dead000000000122 0000000000000000
[   14.356557] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   14.357122] page dumped because: kasan: bad access detected
[   14.357433] 
[   14.357526] Memory state around the buggy address:
[   14.357940]  ffff8881031caf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.358304]  ffff8881031caf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.358695] >ffff8881031cb000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.359178]                    ^
[   14.359352]  ffff8881031cb080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   14.359753]  ffff8881031cb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.360289] ==================================================================

[   33.652307] ==================================================================
[   33.663800] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   33.670768] Free of addr ffff888100ac2001 by task kunit_try_catch/252
[   33.677209] 
[   33.678710] CPU: 2 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   33.678719] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   33.678722] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   33.678726] Call Trace:
[   33.678727]  <TASK>
[   33.678729]  dump_stack_lvl+0x73/0xb0
[   33.678735]  print_report+0xd1/0x650
[   33.678739]  ? __virt_addr_valid+0x1db/0x2d0
[   33.678744]  ? kasan_complete_mode_report_info+0x2a/0x200
[   33.678749]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.678754]  kasan_report_invalid_free+0x10a/0x130
[   33.678758]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.678764]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.678768]  check_slab_allocation+0x11f/0x130
[   33.678772]  __kasan_slab_pre_free+0x28/0x40
[   33.678776]  kmem_cache_free+0xed/0x420
[   33.678779]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   33.678783]  ? kmem_cache_invalid_free+0x1d8/0x460
[   33.678788]  kmem_cache_invalid_free+0x1d8/0x460
[   33.678793]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   33.678798]  ? finish_task_switch.isra.0+0x153/0x700
[   33.678802]  ? __switch_to+0x544/0xf50
[   33.678808]  ? ktime_get_ts64+0x83/0x230
[   33.678812]  kunit_try_run_case+0x1a2/0x480
[   33.678818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.678822]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   33.678827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   33.678831]  ? __kthread_parkme+0x82/0x180
[   33.678835]  ? preempt_count_sub+0x50/0x80
[   33.678839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   33.678843]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.678847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   33.678852]  kthread+0x334/0x6f0
[   33.678856]  ? trace_preempt_on+0x20/0xc0
[   33.678860]  ? __pfx_kthread+0x10/0x10
[   33.678864]  ? _raw_spin_unlock_irq+0x47/0x80
[   33.678868]  ? calculate_sigpending+0x7b/0xa0
[   33.678873]  ? __pfx_kthread+0x10/0x10
[   33.678877]  ret_from_fork+0x113/0x1d0
[   33.678880]  ? __pfx_kthread+0x10/0x10
[   33.678884]  ret_from_fork_asm+0x1a/0x30
[   33.678890]  </TASK>
[   33.678892] 
[   33.869649] Allocated by task 252:
[   33.873056]  kasan_save_stack+0x45/0x70
[   33.876894]  kasan_save_track+0x18/0x40
[   33.880735]  kasan_save_alloc_info+0x3b/0x50
[   33.885008]  __kasan_slab_alloc+0x91/0xa0
[   33.889020]  kmem_cache_alloc_noprof+0x123/0x3f0
[   33.893639]  kmem_cache_invalid_free+0x157/0x460
[   33.898260]  kunit_try_run_case+0x1a2/0x480
[   33.902454]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   33.907854]  kthread+0x334/0x6f0
[   33.911084]  ret_from_fork+0x113/0x1d0
[   33.914839]  ret_from_fork_asm+0x1a/0x30
[   33.918772] 
[   33.920273] The buggy address belongs to the object at ffff888100ac2000
[   33.920273]  which belongs to the cache test_cache of size 200
[   33.932700] The buggy address is located 1 bytes inside of
[   33.932700]  200-byte region [ffff888100ac2000, ffff888100ac20c8)
[   33.944262] 
[   33.945762] The buggy address belongs to the physical page:
[   33.951362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ac2
[   33.959401] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.967056] flags: 0x200000000000040(head|node=0|zone=2)
[   33.972397] page_type: f5(slab)
[   33.975549] raw: 0200000000000040 ffff888100aa28c0 dead000000000122 0000000000000000
[   33.983296] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.991035] head: 0200000000000040 ffff888100aa28c0 dead000000000122 0000000000000000
[   33.998861] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   34.006688] head: 0200000000000001 ffffea000402b081 00000000ffffffff 00000000ffffffff
[   34.014515] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   34.022365] page dumped because: kasan: bad access detected
[   34.027963] 
[   34.029464] Memory state around the buggy address:
[   34.034257]  ffff888100ac1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.041475]  ffff888100ac1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.048694] >ffff888100ac2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.055914]                    ^
[   34.059148]  ffff888100ac2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   34.066365]  ffff888100ac2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.073611] ==================================================================