Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 17.616739] ================================================================== [ 17.616815] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.616879] Free of addr fff00000c77a1001 by task kunit_try_catch/212 [ 17.616923] [ 17.616963] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.617332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.617666] Hardware name: linux,dummy-virt (DT) [ 17.617819] Call trace: [ 17.617965] show_stack+0x20/0x38 (C) [ 17.618086] dump_stack_lvl+0x8c/0xd0 [ 17.618338] print_report+0x118/0x608 [ 17.618558] kasan_report_invalid_free+0xc0/0xe8 [ 17.618656] check_slab_allocation+0xfc/0x108 [ 17.618706] __kasan_slab_pre_free+0x2c/0x48 [ 17.618754] kmem_cache_free+0xf0/0x468 [ 17.618799] kmem_cache_invalid_free+0x184/0x3c8 [ 17.618961] kunit_try_run_case+0x170/0x3f0 [ 17.619461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.619692] kthread+0x328/0x630 [ 17.619740] ret_from_fork+0x10/0x20 [ 17.619788] [ 17.619808] Allocated by task 212: [ 17.619902] kasan_save_stack+0x3c/0x68 [ 17.620199] kasan_save_track+0x20/0x40 [ 17.620366] kasan_save_alloc_info+0x40/0x58 [ 17.620415] __kasan_slab_alloc+0xa8/0xb0 [ 17.620556] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.620629] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.620685] kunit_try_run_case+0x170/0x3f0 [ 17.620747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.620790] kthread+0x328/0x630 [ 17.620821] ret_from_fork+0x10/0x20 [ 17.621123] [ 17.621146] The buggy address belongs to the object at fff00000c77a1000 [ 17.621146] which belongs to the cache test_cache of size 200 [ 17.621553] The buggy address is located 1 bytes inside of [ 17.621553] 200-byte region [fff00000c77a1000, fff00000c77a10c8) [ 17.621829] [ 17.621851] The buggy address belongs to the physical page: [ 17.621897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077a1 [ 17.621961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.622039] page_type: f5(slab) [ 17.622080] raw: 0bfffe0000000000 fff00000c5d093c0 dead000000000122 0000000000000000 [ 17.622131] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.622638] page dumped because: kasan: bad access detected [ 17.622678] [ 17.622695] Memory state around the buggy address: [ 17.622733] fff00000c77a0f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.622778] fff00000c77a0f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 17.623081] >fff00000c77a1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.623334] ^ [ 17.623404] fff00000c77a1080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.623450] fff00000c77a1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.623489] ==================================================================
[ 17.427486] ================================================================== [ 17.427658] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.427751] Free of addr fff00000c77de001 by task kunit_try_catch/212 [ 17.427848] [ 17.427939] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 17.428029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.428280] Hardware name: linux,dummy-virt (DT) [ 17.428326] Call trace: [ 17.428356] show_stack+0x20/0x38 (C) [ 17.428419] dump_stack_lvl+0x8c/0xd0 [ 17.428576] print_report+0x118/0x608 [ 17.428670] kasan_report_invalid_free+0xc0/0xe8 [ 17.428791] check_slab_allocation+0xfc/0x108 [ 17.428844] __kasan_slab_pre_free+0x2c/0x48 [ 17.428943] kmem_cache_free+0xf0/0x468 [ 17.428995] kmem_cache_invalid_free+0x184/0x3c8 [ 17.429275] kunit_try_run_case+0x170/0x3f0 [ 17.429365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.429419] kthread+0x328/0x630 [ 17.429464] ret_from_fork+0x10/0x20 [ 17.429564] [ 17.429604] Allocated by task 212: [ 17.429634] kasan_save_stack+0x3c/0x68 [ 17.429696] kasan_save_track+0x20/0x40 [ 17.430037] kasan_save_alloc_info+0x40/0x58 [ 17.430172] __kasan_slab_alloc+0xa8/0xb0 [ 17.430276] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.430418] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.430519] kunit_try_run_case+0x170/0x3f0 [ 17.430605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.430887] kthread+0x328/0x630 [ 17.431088] ret_from_fork+0x10/0x20 [ 17.431151] [ 17.431230] The buggy address belongs to the object at fff00000c77de000 [ 17.431230] which belongs to the cache test_cache of size 200 [ 17.431304] The buggy address is located 1 bytes inside of [ 17.431304] 200-byte region [fff00000c77de000, fff00000c77de0c8) [ 17.431377] [ 17.431409] The buggy address belongs to the physical page: [ 17.431443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077de [ 17.431510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.431562] page_type: f5(slab) [ 17.431606] raw: 0bfffe0000000000 fff00000c77d9280 dead000000000122 0000000000000000 [ 17.431657] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.431713] page dumped because: kasan: bad access detected [ 17.431746] [ 17.431764] Memory state around the buggy address: [ 17.431821] fff00000c77ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.431862] fff00000c77ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.431923] >fff00000c77de000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.431962] ^ [ 17.432773] fff00000c77de080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.432857] fff00000c77de100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.433166] ==================================================================
[ 14.181402] ================================================================== [ 14.181856] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 14.182540] Free of addr ffff888102568001 by task kunit_try_catch/229 [ 14.182849] [ 14.183014] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.183126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.183152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.183187] Call Trace: [ 14.183214] <TASK> [ 14.183247] dump_stack_lvl+0x73/0xb0 [ 14.183309] print_report+0xd1/0x650 [ 14.183345] ? __virt_addr_valid+0x1db/0x2d0 [ 14.183420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.183479] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.183524] kasan_report_invalid_free+0x10a/0x130 [ 14.183568] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.183609] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.183650] check_slab_allocation+0x11f/0x130 [ 14.183670] __kasan_slab_pre_free+0x28/0x40 [ 14.183688] kmem_cache_free+0xed/0x420 [ 14.183705] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.183723] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.183746] kmem_cache_invalid_free+0x1d8/0x460 [ 14.183767] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 14.183786] ? finish_task_switch.isra.0+0x153/0x700 [ 14.183807] ? __switch_to+0x47/0xf50 [ 14.183833] ? __pfx_read_tsc+0x10/0x10 [ 14.183851] ? ktime_get_ts64+0x86/0x230 [ 14.183873] kunit_try_run_case+0x1a5/0x480 [ 14.183895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.183914] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.183935] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.183954] ? __kthread_parkme+0x82/0x180 [ 14.183972] ? preempt_count_sub+0x50/0x80 [ 14.183993] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.184013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.184032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.184053] kthread+0x337/0x6f0 [ 14.184069] ? trace_preempt_on+0x20/0xc0 [ 14.184091] ? __pfx_kthread+0x10/0x10 [ 14.184133] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.184152] ? calculate_sigpending+0x7b/0xa0 [ 14.184173] ? __pfx_kthread+0x10/0x10 [ 14.184192] ret_from_fork+0x116/0x1d0 [ 14.184209] ? __pfx_kthread+0x10/0x10 [ 14.184226] ret_from_fork_asm+0x1a/0x30 [ 14.184253] </TASK> [ 14.184266] [ 14.195336] Allocated by task 229: [ 14.195654] kasan_save_stack+0x45/0x70 [ 14.195921] kasan_save_track+0x18/0x40 [ 14.196238] kasan_save_alloc_info+0x3b/0x50 [ 14.196552] __kasan_slab_alloc+0x91/0xa0 [ 14.196879] kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.197144] kmem_cache_invalid_free+0x157/0x460 [ 14.197477] kunit_try_run_case+0x1a5/0x480 [ 14.197768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.198175] kthread+0x337/0x6f0 [ 14.198457] ret_from_fork+0x116/0x1d0 [ 14.198711] ret_from_fork_asm+0x1a/0x30 [ 14.199050] [ 14.199246] The buggy address belongs to the object at ffff888102568000 [ 14.199246] which belongs to the cache test_cache of size 200 [ 14.199820] The buggy address is located 1 bytes inside of [ 14.199820] 200-byte region [ffff888102568000, ffff8881025680c8) [ 14.200528] [ 14.200657] The buggy address belongs to the physical page: [ 14.201018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102568 [ 14.201408] flags: 0x200000000000000(node=0|zone=2) [ 14.201639] page_type: f5(slab) [ 14.201792] raw: 0200000000000000 ffff888101f27dc0 dead000000000122 0000000000000000 [ 14.202043] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 14.202317] page dumped because: kasan: bad access detected [ 14.202773] [ 14.202932] Memory state around the buggy address: [ 14.203326] ffff888102567f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.203875] ffff888102567f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.204230] >ffff888102568000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.204463] ^ [ 14.204609] ffff888102568080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 14.205206] ffff888102568100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.205720] ==================================================================
[ 14.331547] ================================================================== [ 14.332433] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 14.333661] Free of addr ffff8881031cb001 by task kunit_try_catch/228 [ 14.333951] [ 14.334310] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 14.334407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.334423] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.334445] Call Trace: [ 14.334460] <TASK> [ 14.334478] dump_stack_lvl+0x73/0xb0 [ 14.334511] print_report+0xd1/0x650 [ 14.334534] ? __virt_addr_valid+0x1db/0x2d0 [ 14.334561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.334586] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.334611] kasan_report_invalid_free+0x10a/0x130 [ 14.334635] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.334661] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.334685] check_slab_allocation+0x11f/0x130 [ 14.334708] __kasan_slab_pre_free+0x28/0x40 [ 14.334756] kmem_cache_free+0xed/0x420 [ 14.334789] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.334809] ? kmem_cache_invalid_free+0x1d8/0x460 [ 14.334837] kmem_cache_invalid_free+0x1d8/0x460 [ 14.334861] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 14.334884] ? finish_task_switch.isra.0+0x153/0x700 [ 14.334907] ? __switch_to+0x47/0xf50 [ 14.334938] ? __pfx_read_tsc+0x10/0x10 [ 14.334960] ? ktime_get_ts64+0x86/0x230 [ 14.334985] kunit_try_run_case+0x1a5/0x480 [ 14.335010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.335033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.335068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.335091] ? __kthread_parkme+0x82/0x180 [ 14.335111] ? preempt_count_sub+0x50/0x80 [ 14.335134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.335158] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.335180] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.335203] kthread+0x337/0x6f0 [ 14.335223] ? trace_preempt_on+0x20/0xc0 [ 14.335249] ? __pfx_kthread+0x10/0x10 [ 14.335270] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.335291] ? calculate_sigpending+0x7b/0xa0 [ 14.335317] ? __pfx_kthread+0x10/0x10 [ 14.335338] ret_from_fork+0x116/0x1d0 [ 14.335358] ? __pfx_kthread+0x10/0x10 [ 14.335379] ret_from_fork_asm+0x1a/0x30 [ 14.335412] </TASK> [ 14.335423] [ 14.349390] Allocated by task 228: [ 14.349830] kasan_save_stack+0x45/0x70 [ 14.350120] kasan_save_track+0x18/0x40 [ 14.350403] kasan_save_alloc_info+0x3b/0x50 [ 14.350611] __kasan_slab_alloc+0x91/0xa0 [ 14.350959] kmem_cache_alloc_noprof+0x123/0x3f0 [ 14.351157] kmem_cache_invalid_free+0x157/0x460 [ 14.351546] kunit_try_run_case+0x1a5/0x480 [ 14.351746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.352134] kthread+0x337/0x6f0 [ 14.352416] ret_from_fork+0x116/0x1d0 [ 14.352602] ret_from_fork_asm+0x1a/0x30 [ 14.352975] [ 14.353130] The buggy address belongs to the object at ffff8881031cb000 [ 14.353130] which belongs to the cache test_cache of size 200 [ 14.353968] The buggy address is located 1 bytes inside of [ 14.353968] 200-byte region [ffff8881031cb000, ffff8881031cb0c8) [ 14.354568] [ 14.354681] The buggy address belongs to the physical page: [ 14.355262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031cb [ 14.355692] flags: 0x200000000000000(node=0|zone=2) [ 14.355899] page_type: f5(slab) [ 14.356230] raw: 0200000000000000 ffff888101985640 dead000000000122 0000000000000000 [ 14.356557] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 14.357122] page dumped because: kasan: bad access detected [ 14.357433] [ 14.357526] Memory state around the buggy address: [ 14.357940] ffff8881031caf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.358304] ffff8881031caf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.358695] >ffff8881031cb000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.359178] ^ [ 14.359352] ffff8881031cb080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 14.359753] ffff8881031cb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.360289] ==================================================================
[ 33.652307] ================================================================== [ 33.663800] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 33.670768] Free of addr ffff888100ac2001 by task kunit_try_catch/252 [ 33.677209] [ 33.678710] CPU: 2 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 33.678719] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 33.678722] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 33.678726] Call Trace: [ 33.678727] <TASK> [ 33.678729] dump_stack_lvl+0x73/0xb0 [ 33.678735] print_report+0xd1/0x650 [ 33.678739] ? __virt_addr_valid+0x1db/0x2d0 [ 33.678744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.678749] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.678754] kasan_report_invalid_free+0x10a/0x130 [ 33.678758] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.678764] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.678768] check_slab_allocation+0x11f/0x130 [ 33.678772] __kasan_slab_pre_free+0x28/0x40 [ 33.678776] kmem_cache_free+0xed/0x420 [ 33.678779] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 33.678783] ? kmem_cache_invalid_free+0x1d8/0x460 [ 33.678788] kmem_cache_invalid_free+0x1d8/0x460 [ 33.678793] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 33.678798] ? finish_task_switch.isra.0+0x153/0x700 [ 33.678802] ? __switch_to+0x544/0xf50 [ 33.678808] ? ktime_get_ts64+0x83/0x230 [ 33.678812] kunit_try_run_case+0x1a2/0x480 [ 33.678818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.678822] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 33.678827] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.678831] ? __kthread_parkme+0x82/0x180 [ 33.678835] ? preempt_count_sub+0x50/0x80 [ 33.678839] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.678843] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.678847] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.678852] kthread+0x334/0x6f0 [ 33.678856] ? trace_preempt_on+0x20/0xc0 [ 33.678860] ? __pfx_kthread+0x10/0x10 [ 33.678864] ? _raw_spin_unlock_irq+0x47/0x80 [ 33.678868] ? calculate_sigpending+0x7b/0xa0 [ 33.678873] ? __pfx_kthread+0x10/0x10 [ 33.678877] ret_from_fork+0x113/0x1d0 [ 33.678880] ? __pfx_kthread+0x10/0x10 [ 33.678884] ret_from_fork_asm+0x1a/0x30 [ 33.678890] </TASK> [ 33.678892] [ 33.869649] Allocated by task 252: [ 33.873056] kasan_save_stack+0x45/0x70 [ 33.876894] kasan_save_track+0x18/0x40 [ 33.880735] kasan_save_alloc_info+0x3b/0x50 [ 33.885008] __kasan_slab_alloc+0x91/0xa0 [ 33.889020] kmem_cache_alloc_noprof+0x123/0x3f0 [ 33.893639] kmem_cache_invalid_free+0x157/0x460 [ 33.898260] kunit_try_run_case+0x1a2/0x480 [ 33.902454] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 33.907854] kthread+0x334/0x6f0 [ 33.911084] ret_from_fork+0x113/0x1d0 [ 33.914839] ret_from_fork_asm+0x1a/0x30 [ 33.918772] [ 33.920273] The buggy address belongs to the object at ffff888100ac2000 [ 33.920273] which belongs to the cache test_cache of size 200 [ 33.932700] The buggy address is located 1 bytes inside of [ 33.932700] 200-byte region [ffff888100ac2000, ffff888100ac20c8) [ 33.944262] [ 33.945762] The buggy address belongs to the physical page: [ 33.951362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100ac2 [ 33.959401] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.967056] flags: 0x200000000000040(head|node=0|zone=2) [ 33.972397] page_type: f5(slab) [ 33.975549] raw: 0200000000000040 ffff888100aa28c0 dead000000000122 0000000000000000 [ 33.983296] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 33.991035] head: 0200000000000040 ffff888100aa28c0 dead000000000122 0000000000000000 [ 33.998861] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.006688] head: 0200000000000001 ffffea000402b081 00000000ffffffff 00000000ffffffff [ 34.014515] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.022365] page dumped because: kasan: bad access detected [ 34.027963] [ 34.029464] Memory state around the buggy address: [ 34.034257] ffff888100ac1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.041475] ffff888100ac1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.048694] >ffff888100ac2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.055914] ^ [ 34.059148] ffff888100ac2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 34.066365] ffff888100ac2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.073611] ==================================================================