Date
June 5, 2025, 7:08 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 28.888685] ================================================================== [ 28.888825] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 28.888956] Write of size 8 at addr fff00000c3fa5928 by task kunit_try_catch/261 [ 28.889089] [ 28.889168] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT [ 28.890479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.890585] Hardware name: linux,dummy-virt (DT) [ 28.890681] Call trace: [ 28.891070] show_stack+0x20/0x38 (C) [ 28.891910] dump_stack_lvl+0x8c/0xd0 [ 28.892319] print_report+0x118/0x608 [ 28.892684] kasan_report+0xdc/0x128 [ 28.893040] kasan_check_range+0x100/0x1a8 [ 28.893658] __kasan_check_write+0x20/0x30 [ 28.893829] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 28.894023] kasan_bitops_generic+0x110/0x1c8 [ 28.894156] kunit_try_run_case+0x170/0x3f0 [ 28.894636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.895373] kthread+0x328/0x630 [ 28.895570] ret_from_fork+0x10/0x20 [ 28.895851] [ 28.896196] Allocated by task 261: [ 28.896290] kasan_save_stack+0x3c/0x68 [ 28.896439] kasan_save_track+0x20/0x40 [ 28.896790] kasan_save_alloc_info+0x40/0x58 [ 28.897315] __kasan_kmalloc+0xd4/0xd8 [ 28.897435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.897779] kasan_bitops_generic+0xa0/0x1c8 [ 28.898159] kunit_try_run_case+0x170/0x3f0 [ 28.898927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.899129] kthread+0x328/0x630 [ 28.899222] ret_from_fork+0x10/0x20 [ 28.899749] [ 28.899946] The buggy address belongs to the object at fff00000c3fa5920 [ 28.899946] which belongs to the cache kmalloc-16 of size 16 [ 28.900385] The buggy address is located 8 bytes inside of [ 28.900385] allocated 9-byte region [fff00000c3fa5920, fff00000c3fa5929) [ 28.900553] [ 28.900607] The buggy address belongs to the physical page: [ 28.900690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5 [ 28.901454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.902055] page_type: f5(slab) [ 28.902160] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.903424] fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 28.904655] ==================================================================
[ 13.478549] ================================================================== [ 13.479104] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.479368] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.479591] [ 13.479694] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.479738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.479750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.479771] Call Trace: [ 13.479783] <TASK> [ 13.479795] dump_stack_lvl+0x73/0xb0 [ 13.479818] print_report+0xd1/0x650 [ 13.479840] ? __virt_addr_valid+0x1db/0x2d0 [ 13.479862] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.479887] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.479928] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.479999] kasan_report+0x141/0x180 [ 13.480023] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.480053] kasan_check_range+0x10c/0x1c0 [ 13.480076] __kasan_check_write+0x18/0x20 [ 13.480095] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 13.480120] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.480147] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.480171] ? trace_hardirqs_on+0x37/0xe0 [ 13.480191] ? kasan_bitops_generic+0x92/0x1c0 [ 13.480218] kasan_bitops_generic+0x116/0x1c0 [ 13.480271] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.480295] ? __pfx_read_tsc+0x10/0x10 [ 13.480316] ? ktime_get_ts64+0x86/0x230 [ 13.480338] kunit_try_run_case+0x1a5/0x480 [ 13.480360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.481107] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.481151] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.481179] ? __kthread_parkme+0x82/0x180 [ 13.481199] ? preempt_count_sub+0x50/0x80 [ 13.481222] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.481244] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.481269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.481294] kthread+0x337/0x6f0 [ 13.481312] ? trace_preempt_on+0x20/0xc0 [ 13.481334] ? __pfx_kthread+0x10/0x10 [ 13.481354] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.481377] ? calculate_sigpending+0x7b/0xa0 [ 13.481400] ? __pfx_kthread+0x10/0x10 [ 13.481421] ret_from_fork+0x116/0x1d0 [ 13.481438] ? __pfx_kthread+0x10/0x10 [ 13.481459] ret_from_fork_asm+0x1a/0x30 [ 13.481488] </TASK> [ 13.481499] [ 13.494933] Allocated by task 278: [ 13.495178] kasan_save_stack+0x45/0x70 [ 13.495465] kasan_save_track+0x18/0x40 [ 13.495683] kasan_save_alloc_info+0x3b/0x50 [ 13.495928] __kasan_kmalloc+0xb7/0xc0 [ 13.496060] __kmalloc_cache_noprof+0x189/0x420 [ 13.496304] kasan_bitops_generic+0x92/0x1c0 [ 13.496605] kunit_try_run_case+0x1a5/0x480 [ 13.496884] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.497163] kthread+0x337/0x6f0 [ 13.497550] ret_from_fork+0x116/0x1d0 [ 13.497932] ret_from_fork_asm+0x1a/0x30 [ 13.498149] [ 13.498246] The buggy address belongs to the object at ffff888102ae9140 [ 13.498246] which belongs to the cache kmalloc-16 of size 16 [ 13.498650] The buggy address is located 8 bytes inside of [ 13.498650] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.499364] [ 13.499473] The buggy address belongs to the physical page: [ 13.499717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.500051] flags: 0x200000000000000(node=0|zone=2) [ 13.500313] page_type: f5(slab) [ 13.500493] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.500960] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.501328] page dumped because: kasan: bad access detected [ 13.501503] [ 13.501598] Memory state around the buggy address: [ 13.501850] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.502303] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.502561] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.502966] ^ [ 13.503467] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.504070] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.504346] ================================================================== [ 13.600505] ================================================================== [ 13.600750] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.601374] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.601753] [ 13.601857] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.601909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.601920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.601940] Call Trace: [ 13.601985] <TASK> [ 13.601999] dump_stack_lvl+0x73/0xb0 [ 13.602026] print_report+0xd1/0x650 [ 13.602086] ? __virt_addr_valid+0x1db/0x2d0 [ 13.602111] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.602137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.602159] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.602185] kasan_report+0x141/0x180 [ 13.602217] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.602246] kasan_check_range+0x10c/0x1c0 [ 13.602280] __kasan_check_write+0x18/0x20 [ 13.602300] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 13.602325] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.602352] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.602376] ? trace_hardirqs_on+0x37/0xe0 [ 13.602396] ? kasan_bitops_generic+0x92/0x1c0 [ 13.602423] kasan_bitops_generic+0x116/0x1c0 [ 13.602447] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.602472] ? __pfx_read_tsc+0x10/0x10 [ 13.602502] ? ktime_get_ts64+0x86/0x230 [ 13.602525] kunit_try_run_case+0x1a5/0x480 [ 13.602546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.602574] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.602600] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.602624] ? __kthread_parkme+0x82/0x180 [ 13.602654] ? preempt_count_sub+0x50/0x80 [ 13.602686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.602706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.602730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.602764] kthread+0x337/0x6f0 [ 13.602783] ? trace_preempt_on+0x20/0xc0 [ 13.602804] ? __pfx_kthread+0x10/0x10 [ 13.602824] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.602846] ? calculate_sigpending+0x7b/0xa0 [ 13.602868] ? __pfx_kthread+0x10/0x10 [ 13.602889] ret_from_fork+0x116/0x1d0 [ 13.602916] ? __pfx_kthread+0x10/0x10 [ 13.602936] ret_from_fork_asm+0x1a/0x30 [ 13.602965] </TASK> [ 13.602976] [ 13.612139] Allocated by task 278: [ 13.612330] kasan_save_stack+0x45/0x70 [ 13.612528] kasan_save_track+0x18/0x40 [ 13.612739] kasan_save_alloc_info+0x3b/0x50 [ 13.612984] __kasan_kmalloc+0xb7/0xc0 [ 13.613207] __kmalloc_cache_noprof+0x189/0x420 [ 13.613412] kasan_bitops_generic+0x92/0x1c0 [ 13.613558] kunit_try_run_case+0x1a5/0x480 [ 13.613718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.614034] kthread+0x337/0x6f0 [ 13.614206] ret_from_fork+0x116/0x1d0 [ 13.614390] ret_from_fork_asm+0x1a/0x30 [ 13.614590] [ 13.614704] The buggy address belongs to the object at ffff888102ae9140 [ 13.614704] which belongs to the cache kmalloc-16 of size 16 [ 13.615196] The buggy address is located 8 bytes inside of [ 13.615196] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.615776] [ 13.615875] The buggy address belongs to the physical page: [ 13.616322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.616687] flags: 0x200000000000000(node=0|zone=2) [ 13.616852] page_type: f5(slab) [ 13.617081] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.617435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.617789] page dumped because: kasan: bad access detected [ 13.618106] [ 13.618185] Memory state around the buggy address: [ 13.618402] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.618687] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.619112] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.619411] ^ [ 13.619702] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.620077] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.620396] ================================================================== [ 13.438698] ================================================================== [ 13.438955] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.439373] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.439911] [ 13.440125] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.440171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.440181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.440202] Call Trace: [ 13.440213] <TASK> [ 13.440225] dump_stack_lvl+0x73/0xb0 [ 13.440250] print_report+0xd1/0x650 [ 13.440272] ? __virt_addr_valid+0x1db/0x2d0 [ 13.440295] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.440320] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.440342] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.440367] kasan_report+0x141/0x180 [ 13.440389] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.440419] kasan_check_range+0x10c/0x1c0 [ 13.440441] __kasan_check_write+0x18/0x20 [ 13.440460] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 13.440486] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.440511] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.440535] ? trace_hardirqs_on+0x37/0xe0 [ 13.440556] ? kasan_bitops_generic+0x92/0x1c0 [ 13.440583] kasan_bitops_generic+0x116/0x1c0 [ 13.440606] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.440631] ? __pfx_read_tsc+0x10/0x10 [ 13.440651] ? ktime_get_ts64+0x86/0x230 [ 13.440674] kunit_try_run_case+0x1a5/0x480 [ 13.440695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.440715] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.440739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.440763] ? __kthread_parkme+0x82/0x180 [ 13.440783] ? preempt_count_sub+0x50/0x80 [ 13.440806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.440827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.440851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.440875] kthread+0x337/0x6f0 [ 13.440918] ? trace_preempt_on+0x20/0xc0 [ 13.440940] ? __pfx_kthread+0x10/0x10 [ 13.440971] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.440993] ? calculate_sigpending+0x7b/0xa0 [ 13.441015] ? __pfx_kthread+0x10/0x10 [ 13.441036] ret_from_fork+0x116/0x1d0 [ 13.441058] ? __pfx_kthread+0x10/0x10 [ 13.441079] ret_from_fork_asm+0x1a/0x30 [ 13.441108] </TASK> [ 13.441117] [ 13.450036] Allocated by task 278: [ 13.450169] kasan_save_stack+0x45/0x70 [ 13.450312] kasan_save_track+0x18/0x40 [ 13.450448] kasan_save_alloc_info+0x3b/0x50 [ 13.450596] __kasan_kmalloc+0xb7/0xc0 [ 13.450785] __kmalloc_cache_noprof+0x189/0x420 [ 13.451022] kasan_bitops_generic+0x92/0x1c0 [ 13.451238] kunit_try_run_case+0x1a5/0x480 [ 13.451480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.451833] kthread+0x337/0x6f0 [ 13.452037] ret_from_fork+0x116/0x1d0 [ 13.452173] ret_from_fork_asm+0x1a/0x30 [ 13.452313] [ 13.452383] The buggy address belongs to the object at ffff888102ae9140 [ 13.452383] which belongs to the cache kmalloc-16 of size 16 [ 13.452965] The buggy address is located 8 bytes inside of [ 13.452965] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.453496] [ 13.453588] The buggy address belongs to the physical page: [ 13.454051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.454365] flags: 0x200000000000000(node=0|zone=2) [ 13.454548] page_type: f5(slab) [ 13.454681] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.455038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.455503] page dumped because: kasan: bad access detected [ 13.455769] [ 13.455840] Memory state around the buggy address: [ 13.456010] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.456230] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.456443] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.456725] ^ [ 13.456988] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.457316] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.457822] ================================================================== [ 13.504818] ================================================================== [ 13.505305] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.505853] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.506198] [ 13.506336] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.506398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.506409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.506429] Call Trace: [ 13.506442] <TASK> [ 13.506456] dump_stack_lvl+0x73/0xb0 [ 13.506481] print_report+0xd1/0x650 [ 13.506502] ? __virt_addr_valid+0x1db/0x2d0 [ 13.506524] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.506568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.506590] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.506616] kasan_report+0x141/0x180 [ 13.506650] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.506680] kasan_check_range+0x10c/0x1c0 [ 13.506719] __kasan_check_write+0x18/0x20 [ 13.506739] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 13.506764] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.506804] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.506827] ? trace_hardirqs_on+0x37/0xe0 [ 13.506861] ? kasan_bitops_generic+0x92/0x1c0 [ 13.506926] kasan_bitops_generic+0x116/0x1c0 [ 13.506966] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.506992] ? __pfx_read_tsc+0x10/0x10 [ 13.507013] ? ktime_get_ts64+0x86/0x230 [ 13.507036] kunit_try_run_case+0x1a5/0x480 [ 13.507057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.507076] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.507101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.507125] ? __kthread_parkme+0x82/0x180 [ 13.507145] ? preempt_count_sub+0x50/0x80 [ 13.507168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.507189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.507212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.507237] kthread+0x337/0x6f0 [ 13.507255] ? trace_preempt_on+0x20/0xc0 [ 13.507277] ? __pfx_kthread+0x10/0x10 [ 13.507297] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.507319] ? calculate_sigpending+0x7b/0xa0 [ 13.507342] ? __pfx_kthread+0x10/0x10 [ 13.507364] ret_from_fork+0x116/0x1d0 [ 13.507382] ? __pfx_kthread+0x10/0x10 [ 13.507467] ret_from_fork_asm+0x1a/0x30 [ 13.507499] </TASK> [ 13.507509] [ 13.517871] Allocated by task 278: [ 13.518071] kasan_save_stack+0x45/0x70 [ 13.518276] kasan_save_track+0x18/0x40 [ 13.518816] kasan_save_alloc_info+0x3b/0x50 [ 13.519359] __kasan_kmalloc+0xb7/0xc0 [ 13.519682] __kmalloc_cache_noprof+0x189/0x420 [ 13.520080] kasan_bitops_generic+0x92/0x1c0 [ 13.520238] kunit_try_run_case+0x1a5/0x480 [ 13.520383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.520559] kthread+0x337/0x6f0 [ 13.520886] ret_from_fork+0x116/0x1d0 [ 13.521470] ret_from_fork_asm+0x1a/0x30 [ 13.521909] [ 13.522185] The buggy address belongs to the object at ffff888102ae9140 [ 13.522185] which belongs to the cache kmalloc-16 of size 16 [ 13.523355] The buggy address is located 8 bytes inside of [ 13.523355] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.524332] [ 13.524411] The buggy address belongs to the physical page: [ 13.524584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.524833] flags: 0x200000000000000(node=0|zone=2) [ 13.525359] page_type: f5(slab) [ 13.525717] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.526844] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.527685] page dumped because: kasan: bad access detected [ 13.528336] [ 13.528629] Memory state around the buggy address: [ 13.529179] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.529871] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.530303] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.531054] ^ [ 13.531447] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.531683] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.531908] ================================================================== [ 13.458249] ================================================================== [ 13.458702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.459240] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.459465] [ 13.459546] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.459586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.459597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.459617] Call Trace: [ 13.459630] <TASK> [ 13.459642] dump_stack_lvl+0x73/0xb0 [ 13.459665] print_report+0xd1/0x650 [ 13.459686] ? __virt_addr_valid+0x1db/0x2d0 [ 13.459710] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.459735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.459757] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.459782] kasan_report+0x141/0x180 [ 13.459804] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.459833] kasan_check_range+0x10c/0x1c0 [ 13.459856] __kasan_check_write+0x18/0x20 [ 13.459875] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 13.459913] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.459938] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.459963] ? trace_hardirqs_on+0x37/0xe0 [ 13.459983] ? kasan_bitops_generic+0x92/0x1c0 [ 13.460010] kasan_bitops_generic+0x116/0x1c0 [ 13.460033] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.460058] ? __pfx_read_tsc+0x10/0x10 [ 13.460078] ? ktime_get_ts64+0x86/0x230 [ 13.460102] kunit_try_run_case+0x1a5/0x480 [ 13.460123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.460188] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.460214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.460238] ? __kthread_parkme+0x82/0x180 [ 13.460258] ? preempt_count_sub+0x50/0x80 [ 13.460281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.460303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.460327] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.460351] kthread+0x337/0x6f0 [ 13.460370] ? trace_preempt_on+0x20/0xc0 [ 13.460391] ? __pfx_kthread+0x10/0x10 [ 13.460411] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.460434] ? calculate_sigpending+0x7b/0xa0 [ 13.460459] ? __pfx_kthread+0x10/0x10 [ 13.460480] ret_from_fork+0x116/0x1d0 [ 13.460498] ? __pfx_kthread+0x10/0x10 [ 13.460519] ret_from_fork_asm+0x1a/0x30 [ 13.460549] </TASK> [ 13.460558] [ 13.468772] Allocated by task 278: [ 13.469006] kasan_save_stack+0x45/0x70 [ 13.469216] kasan_save_track+0x18/0x40 [ 13.469407] kasan_save_alloc_info+0x3b/0x50 [ 13.469566] __kasan_kmalloc+0xb7/0xc0 [ 13.469818] __kmalloc_cache_noprof+0x189/0x420 [ 13.470136] kasan_bitops_generic+0x92/0x1c0 [ 13.470326] kunit_try_run_case+0x1a5/0x480 [ 13.470506] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.470746] kthread+0x337/0x6f0 [ 13.470868] ret_from_fork+0x116/0x1d0 [ 13.471012] ret_from_fork_asm+0x1a/0x30 [ 13.471384] [ 13.471492] The buggy address belongs to the object at ffff888102ae9140 [ 13.471492] which belongs to the cache kmalloc-16 of size 16 [ 13.472080] The buggy address is located 8 bytes inside of [ 13.472080] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.472582] [ 13.472694] The buggy address belongs to the physical page: [ 13.472927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.473199] flags: 0x200000000000000(node=0|zone=2) [ 13.473363] page_type: f5(slab) [ 13.473484] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.473729] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.474073] page dumped because: kasan: bad access detected [ 13.474320] [ 13.474410] Memory state around the buggy address: [ 13.474590] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.475004] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.475219] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.477286] ^ [ 13.477475] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.477726] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.478061] ================================================================== [ 13.532780] ================================================================== [ 13.533581] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.534536] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.535122] [ 13.535215] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.535258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.535270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.535290] Call Trace: [ 13.535304] <TASK> [ 13.535318] dump_stack_lvl+0x73/0xb0 [ 13.535346] print_report+0xd1/0x650 [ 13.535367] ? __virt_addr_valid+0x1db/0x2d0 [ 13.535389] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.535414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.535437] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.535462] kasan_report+0x141/0x180 [ 13.535485] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.535516] kasan_check_range+0x10c/0x1c0 [ 13.535539] __kasan_check_write+0x18/0x20 [ 13.535559] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 13.535585] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.535612] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.535636] ? trace_hardirqs_on+0x37/0xe0 [ 13.535656] ? kasan_bitops_generic+0x92/0x1c0 [ 13.535683] kasan_bitops_generic+0x116/0x1c0 [ 13.535706] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.535731] ? __pfx_read_tsc+0x10/0x10 [ 13.535751] ? ktime_get_ts64+0x86/0x230 [ 13.535775] kunit_try_run_case+0x1a5/0x480 [ 13.535796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.535815] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.535839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.535863] ? __kthread_parkme+0x82/0x180 [ 13.535884] ? preempt_count_sub+0x50/0x80 [ 13.535920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.535951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.535976] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.536001] kthread+0x337/0x6f0 [ 13.536020] ? trace_preempt_on+0x20/0xc0 [ 13.536041] ? __pfx_kthread+0x10/0x10 [ 13.536061] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.536083] ? calculate_sigpending+0x7b/0xa0 [ 13.536107] ? __pfx_kthread+0x10/0x10 [ 13.536128] ret_from_fork+0x116/0x1d0 [ 13.536146] ? __pfx_kthread+0x10/0x10 [ 13.536176] ret_from_fork_asm+0x1a/0x30 [ 13.536206] </TASK> [ 13.536216] [ 13.552839] Allocated by task 278: [ 13.553318] kasan_save_stack+0x45/0x70 [ 13.553539] kasan_save_track+0x18/0x40 [ 13.553735] kasan_save_alloc_info+0x3b/0x50 [ 13.554262] __kasan_kmalloc+0xb7/0xc0 [ 13.554694] __kmalloc_cache_noprof+0x189/0x420 [ 13.555163] kasan_bitops_generic+0x92/0x1c0 [ 13.555316] kunit_try_run_case+0x1a5/0x480 [ 13.555462] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.555646] kthread+0x337/0x6f0 [ 13.555976] ret_from_fork+0x116/0x1d0 [ 13.556348] ret_from_fork_asm+0x1a/0x30 [ 13.556867] [ 13.557056] The buggy address belongs to the object at ffff888102ae9140 [ 13.557056] which belongs to the cache kmalloc-16 of size 16 [ 13.558286] The buggy address is located 8 bytes inside of [ 13.558286] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.559374] [ 13.559452] The buggy address belongs to the physical page: [ 13.559624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.560497] flags: 0x200000000000000(node=0|zone=2) [ 13.561053] page_type: f5(slab) [ 13.561366] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.562107] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.562651] page dumped because: kasan: bad access detected [ 13.563130] [ 13.563316] Memory state around the buggy address: [ 13.563670] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.564293] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.564828] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.565274] ^ [ 13.565453] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.565746] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.566428] ================================================================== [ 13.567339] ================================================================== [ 13.568257] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.569287] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.569625] [ 13.569813] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.569857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.569881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.569911] Call Trace: [ 13.569925] <TASK> [ 13.569939] dump_stack_lvl+0x73/0xb0 [ 13.569964] print_report+0xd1/0x650 [ 13.569986] ? __virt_addr_valid+0x1db/0x2d0 [ 13.570009] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.570034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.570100] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.570139] kasan_report+0x141/0x180 [ 13.570161] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.570191] kasan_check_range+0x10c/0x1c0 [ 13.570215] __kasan_check_write+0x18/0x20 [ 13.570234] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 13.570259] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.570286] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.570310] ? trace_hardirqs_on+0x37/0xe0 [ 13.570331] ? kasan_bitops_generic+0x92/0x1c0 [ 13.570358] kasan_bitops_generic+0x116/0x1c0 [ 13.570381] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.570406] ? __pfx_read_tsc+0x10/0x10 [ 13.570426] ? ktime_get_ts64+0x86/0x230 [ 13.570449] kunit_try_run_case+0x1a5/0x480 [ 13.570469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.570489] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.570515] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.570539] ? __kthread_parkme+0x82/0x180 [ 13.570560] ? preempt_count_sub+0x50/0x80 [ 13.570583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.570605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.570637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.570662] kthread+0x337/0x6f0 [ 13.570681] ? trace_preempt_on+0x20/0xc0 [ 13.570702] ? __pfx_kthread+0x10/0x10 [ 13.570722] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.570744] ? calculate_sigpending+0x7b/0xa0 [ 13.570768] ? __pfx_kthread+0x10/0x10 [ 13.570788] ret_from_fork+0x116/0x1d0 [ 13.570806] ? __pfx_kthread+0x10/0x10 [ 13.570826] ret_from_fork_asm+0x1a/0x30 [ 13.570856] </TASK> [ 13.570866] [ 13.586883] Allocated by task 278: [ 13.587138] kasan_save_stack+0x45/0x70 [ 13.587549] kasan_save_track+0x18/0x40 [ 13.588020] kasan_save_alloc_info+0x3b/0x50 [ 13.588336] __kasan_kmalloc+0xb7/0xc0 [ 13.588474] __kmalloc_cache_noprof+0x189/0x420 [ 13.588637] kasan_bitops_generic+0x92/0x1c0 [ 13.589076] kunit_try_run_case+0x1a5/0x480 [ 13.589631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.590291] kthread+0x337/0x6f0 [ 13.590627] ret_from_fork+0x116/0x1d0 [ 13.591089] ret_from_fork_asm+0x1a/0x30 [ 13.591450] [ 13.591523] The buggy address belongs to the object at ffff888102ae9140 [ 13.591523] which belongs to the cache kmalloc-16 of size 16 [ 13.592537] The buggy address is located 8 bytes inside of [ 13.592537] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.593484] [ 13.593563] The buggy address belongs to the physical page: [ 13.593780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.594504] flags: 0x200000000000000(node=0|zone=2) [ 13.595059] page_type: f5(slab) [ 13.595184] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.595414] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.595646] page dumped because: kasan: bad access detected [ 13.596148] [ 13.596372] Memory state around the buggy address: [ 13.596813] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.597655] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.598405] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.599207] ^ [ 13.599697] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.599928] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.600143] ================================================================== [ 13.418198] ================================================================== [ 13.418647] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.419477] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278 [ 13.419907] [ 13.420130] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250605 #1 PREEMPT(voluntary) [ 13.420179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.420191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.420212] Call Trace: [ 13.420224] <TASK> [ 13.420238] dump_stack_lvl+0x73/0xb0 [ 13.420265] print_report+0xd1/0x650 [ 13.420288] ? __virt_addr_valid+0x1db/0x2d0 [ 13.420311] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.420335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.420358] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.420384] kasan_report+0x141/0x180 [ 13.420406] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.420436] kasan_check_range+0x10c/0x1c0 [ 13.420460] __kasan_check_write+0x18/0x20 [ 13.420479] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 13.420504] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 13.420531] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.420556] ? trace_hardirqs_on+0x37/0xe0 [ 13.420578] ? kasan_bitops_generic+0x92/0x1c0 [ 13.420606] kasan_bitops_generic+0x116/0x1c0 [ 13.420640] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 13.420665] ? __pfx_read_tsc+0x10/0x10 [ 13.420687] ? ktime_get_ts64+0x86/0x230 [ 13.420711] kunit_try_run_case+0x1a5/0x480 [ 13.420731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.420752] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.420776] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.420801] ? __kthread_parkme+0x82/0x180 [ 13.420820] ? preempt_count_sub+0x50/0x80 [ 13.420844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.420865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.420889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.420927] kthread+0x337/0x6f0 [ 13.420992] ? trace_preempt_on+0x20/0xc0 [ 13.421015] ? __pfx_kthread+0x10/0x10 [ 13.421035] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.421064] ? calculate_sigpending+0x7b/0xa0 [ 13.421088] ? __pfx_kthread+0x10/0x10 [ 13.421109] ret_from_fork+0x116/0x1d0 [ 13.421127] ? __pfx_kthread+0x10/0x10 [ 13.421148] ret_from_fork_asm+0x1a/0x30 [ 13.421177] </TASK> [ 13.421188] [ 13.429912] Allocated by task 278: [ 13.430083] kasan_save_stack+0x45/0x70 [ 13.430232] kasan_save_track+0x18/0x40 [ 13.430429] kasan_save_alloc_info+0x3b/0x50 [ 13.430611] __kasan_kmalloc+0xb7/0xc0 [ 13.430852] __kmalloc_cache_noprof+0x189/0x420 [ 13.431105] kasan_bitops_generic+0x92/0x1c0 [ 13.431279] kunit_try_run_case+0x1a5/0x480 [ 13.431456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.431710] kthread+0x337/0x6f0 [ 13.431850] ret_from_fork+0x116/0x1d0 [ 13.432085] ret_from_fork_asm+0x1a/0x30 [ 13.432275] [ 13.432363] The buggy address belongs to the object at ffff888102ae9140 [ 13.432363] which belongs to the cache kmalloc-16 of size 16 [ 13.432755] The buggy address is located 8 bytes inside of [ 13.432755] allocated 9-byte region [ffff888102ae9140, ffff888102ae9149) [ 13.433124] [ 13.433196] The buggy address belongs to the physical page: [ 13.433443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9 [ 13.434322] flags: 0x200000000000000(node=0|zone=2) [ 13.434498] page_type: f5(slab) [ 13.434618] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 13.434849] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 13.435585] page dumped because: kasan: bad access detected [ 13.436041] [ 13.436119] Memory state around the buggy address: [ 13.436399] ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc [ 13.436726] ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc [ 13.437009] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 13.437261] ^ [ 13.437448] ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.437763] ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.438194] ==================================================================