Hay
Date
June 5, 2025, 7:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   28.888685] ==================================================================
[   28.888825] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   28.888956] Write of size 8 at addr fff00000c3fa5928 by task kunit_try_catch/261
[   28.889089] 
[   28.889168] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   28.890479] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.890585] Hardware name: linux,dummy-virt (DT)
[   28.890681] Call trace:
[   28.891070]  show_stack+0x20/0x38 (C)
[   28.891910]  dump_stack_lvl+0x8c/0xd0
[   28.892319]  print_report+0x118/0x608
[   28.892684]  kasan_report+0xdc/0x128
[   28.893040]  kasan_check_range+0x100/0x1a8
[   28.893658]  __kasan_check_write+0x20/0x30
[   28.893829]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   28.894023]  kasan_bitops_generic+0x110/0x1c8
[   28.894156]  kunit_try_run_case+0x170/0x3f0
[   28.894636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.895373]  kthread+0x328/0x630
[   28.895570]  ret_from_fork+0x10/0x20
[   28.895851] 
[   28.896196] Allocated by task 261:
[   28.896290]  kasan_save_stack+0x3c/0x68
[   28.896439]  kasan_save_track+0x20/0x40
[   28.896790]  kasan_save_alloc_info+0x40/0x58
[   28.897315]  __kasan_kmalloc+0xd4/0xd8
[   28.897435]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.897779]  kasan_bitops_generic+0xa0/0x1c8
[   28.898159]  kunit_try_run_case+0x170/0x3f0
[   28.898927]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.899129]  kthread+0x328/0x630
[   28.899222]  ret_from_fork+0x10/0x20
[   28.899749] 
[   28.899946] The buggy address belongs to the object at fff00000c3fa5920
[   28.899946]  which belongs to the cache kmalloc-16 of size 16
[   28.900385] The buggy address is located 8 bytes inside of
[   28.900385]  allocated 9-byte region [fff00000c3fa5920, fff00000c3fa5929)
[   28.900553] 
[   28.900607] The buggy address belongs to the physical page:
[   28.900690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fa5
[   28.901454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.902055] page_type: f5(slab)
[   28.902160] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   28.903424]  fff00000c3fa5800: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   28.904655] ==================================================================


[   13.478549] ==================================================================
[   13.479104] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.479368] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.479591] 
[   13.479694] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.479738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.479750] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.479771] Call Trace:
[   13.479783]  <TASK>
[   13.479795]  dump_stack_lvl+0x73/0xb0
[   13.479818]  print_report+0xd1/0x650
[   13.479840]  ? __virt_addr_valid+0x1db/0x2d0
[   13.479862]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.479887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.479928]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.479999]  kasan_report+0x141/0x180
[   13.480023]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.480053]  kasan_check_range+0x10c/0x1c0
[   13.480076]  __kasan_check_write+0x18/0x20
[   13.480095]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   13.480120]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.480147]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.480171]  ? trace_hardirqs_on+0x37/0xe0
[   13.480191]  ? kasan_bitops_generic+0x92/0x1c0
[   13.480218]  kasan_bitops_generic+0x116/0x1c0
[   13.480271]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.480295]  ? __pfx_read_tsc+0x10/0x10
[   13.480316]  ? ktime_get_ts64+0x86/0x230
[   13.480338]  kunit_try_run_case+0x1a5/0x480
[   13.480360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.481107]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.481151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.481179]  ? __kthread_parkme+0x82/0x180
[   13.481199]  ? preempt_count_sub+0x50/0x80
[   13.481222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.481244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.481269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.481294]  kthread+0x337/0x6f0
[   13.481312]  ? trace_preempt_on+0x20/0xc0
[   13.481334]  ? __pfx_kthread+0x10/0x10
[   13.481354]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.481377]  ? calculate_sigpending+0x7b/0xa0
[   13.481400]  ? __pfx_kthread+0x10/0x10
[   13.481421]  ret_from_fork+0x116/0x1d0
[   13.481438]  ? __pfx_kthread+0x10/0x10
[   13.481459]  ret_from_fork_asm+0x1a/0x30
[   13.481488]  </TASK>
[   13.481499] 
[   13.494933] Allocated by task 278:
[   13.495178]  kasan_save_stack+0x45/0x70
[   13.495465]  kasan_save_track+0x18/0x40
[   13.495683]  kasan_save_alloc_info+0x3b/0x50
[   13.495928]  __kasan_kmalloc+0xb7/0xc0
[   13.496060]  __kmalloc_cache_noprof+0x189/0x420
[   13.496304]  kasan_bitops_generic+0x92/0x1c0
[   13.496605]  kunit_try_run_case+0x1a5/0x480
[   13.496884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.497163]  kthread+0x337/0x6f0
[   13.497550]  ret_from_fork+0x116/0x1d0
[   13.497932]  ret_from_fork_asm+0x1a/0x30
[   13.498149] 
[   13.498246] The buggy address belongs to the object at ffff888102ae9140
[   13.498246]  which belongs to the cache kmalloc-16 of size 16
[   13.498650] The buggy address is located 8 bytes inside of
[   13.498650]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.499364] 
[   13.499473] The buggy address belongs to the physical page:
[   13.499717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.500051] flags: 0x200000000000000(node=0|zone=2)
[   13.500313] page_type: f5(slab)
[   13.500493] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.500960] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.501328] page dumped because: kasan: bad access detected
[   13.501503] 
[   13.501598] Memory state around the buggy address:
[   13.501850]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.502303]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.502561] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.502966]                                               ^
[   13.503467]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.504070]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.504346] ==================================================================
[   13.600505] ==================================================================
[   13.600750] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.601374] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.601753] 
[   13.601857] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.601909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.601920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.601940] Call Trace:
[   13.601985]  <TASK>
[   13.601999]  dump_stack_lvl+0x73/0xb0
[   13.602026]  print_report+0xd1/0x650
[   13.602086]  ? __virt_addr_valid+0x1db/0x2d0
[   13.602111]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.602137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.602159]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.602185]  kasan_report+0x141/0x180
[   13.602217]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.602246]  kasan_check_range+0x10c/0x1c0
[   13.602280]  __kasan_check_write+0x18/0x20
[   13.602300]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   13.602325]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.602352]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.602376]  ? trace_hardirqs_on+0x37/0xe0
[   13.602396]  ? kasan_bitops_generic+0x92/0x1c0
[   13.602423]  kasan_bitops_generic+0x116/0x1c0
[   13.602447]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.602472]  ? __pfx_read_tsc+0x10/0x10
[   13.602502]  ? ktime_get_ts64+0x86/0x230
[   13.602525]  kunit_try_run_case+0x1a5/0x480
[   13.602546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.602574]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.602600]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.602624]  ? __kthread_parkme+0x82/0x180
[   13.602654]  ? preempt_count_sub+0x50/0x80
[   13.602686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.602706]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.602730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.602764]  kthread+0x337/0x6f0
[   13.602783]  ? trace_preempt_on+0x20/0xc0
[   13.602804]  ? __pfx_kthread+0x10/0x10
[   13.602824]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.602846]  ? calculate_sigpending+0x7b/0xa0
[   13.602868]  ? __pfx_kthread+0x10/0x10
[   13.602889]  ret_from_fork+0x116/0x1d0
[   13.602916]  ? __pfx_kthread+0x10/0x10
[   13.602936]  ret_from_fork_asm+0x1a/0x30
[   13.602965]  </TASK>
[   13.602976] 
[   13.612139] Allocated by task 278:
[   13.612330]  kasan_save_stack+0x45/0x70
[   13.612528]  kasan_save_track+0x18/0x40
[   13.612739]  kasan_save_alloc_info+0x3b/0x50
[   13.612984]  __kasan_kmalloc+0xb7/0xc0
[   13.613207]  __kmalloc_cache_noprof+0x189/0x420
[   13.613412]  kasan_bitops_generic+0x92/0x1c0
[   13.613558]  kunit_try_run_case+0x1a5/0x480
[   13.613718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.614034]  kthread+0x337/0x6f0
[   13.614206]  ret_from_fork+0x116/0x1d0
[   13.614390]  ret_from_fork_asm+0x1a/0x30
[   13.614590] 
[   13.614704] The buggy address belongs to the object at ffff888102ae9140
[   13.614704]  which belongs to the cache kmalloc-16 of size 16
[   13.615196] The buggy address is located 8 bytes inside of
[   13.615196]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.615776] 
[   13.615875] The buggy address belongs to the physical page:
[   13.616322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.616687] flags: 0x200000000000000(node=0|zone=2)
[   13.616852] page_type: f5(slab)
[   13.617081] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.617435] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.617789] page dumped because: kasan: bad access detected
[   13.618106] 
[   13.618185] Memory state around the buggy address:
[   13.618402]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.618687]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.619112] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.619411]                                               ^
[   13.619702]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.620077]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.620396] ==================================================================
[   13.438698] ==================================================================
[   13.438955] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.439373] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.439911] 
[   13.440125] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.440171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.440181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.440202] Call Trace:
[   13.440213]  <TASK>
[   13.440225]  dump_stack_lvl+0x73/0xb0
[   13.440250]  print_report+0xd1/0x650
[   13.440272]  ? __virt_addr_valid+0x1db/0x2d0
[   13.440295]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.440320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.440342]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.440367]  kasan_report+0x141/0x180
[   13.440389]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.440419]  kasan_check_range+0x10c/0x1c0
[   13.440441]  __kasan_check_write+0x18/0x20
[   13.440460]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   13.440486]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.440511]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.440535]  ? trace_hardirqs_on+0x37/0xe0
[   13.440556]  ? kasan_bitops_generic+0x92/0x1c0
[   13.440583]  kasan_bitops_generic+0x116/0x1c0
[   13.440606]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.440631]  ? __pfx_read_tsc+0x10/0x10
[   13.440651]  ? ktime_get_ts64+0x86/0x230
[   13.440674]  kunit_try_run_case+0x1a5/0x480
[   13.440695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.440715]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.440739]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.440763]  ? __kthread_parkme+0x82/0x180
[   13.440783]  ? preempt_count_sub+0x50/0x80
[   13.440806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.440827]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.440851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.440875]  kthread+0x337/0x6f0
[   13.440918]  ? trace_preempt_on+0x20/0xc0
[   13.440940]  ? __pfx_kthread+0x10/0x10
[   13.440971]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.440993]  ? calculate_sigpending+0x7b/0xa0
[   13.441015]  ? __pfx_kthread+0x10/0x10
[   13.441036]  ret_from_fork+0x116/0x1d0
[   13.441058]  ? __pfx_kthread+0x10/0x10
[   13.441079]  ret_from_fork_asm+0x1a/0x30
[   13.441108]  </TASK>
[   13.441117] 
[   13.450036] Allocated by task 278:
[   13.450169]  kasan_save_stack+0x45/0x70
[   13.450312]  kasan_save_track+0x18/0x40
[   13.450448]  kasan_save_alloc_info+0x3b/0x50
[   13.450596]  __kasan_kmalloc+0xb7/0xc0
[   13.450785]  __kmalloc_cache_noprof+0x189/0x420
[   13.451022]  kasan_bitops_generic+0x92/0x1c0
[   13.451238]  kunit_try_run_case+0x1a5/0x480
[   13.451480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.451833]  kthread+0x337/0x6f0
[   13.452037]  ret_from_fork+0x116/0x1d0
[   13.452173]  ret_from_fork_asm+0x1a/0x30
[   13.452313] 
[   13.452383] The buggy address belongs to the object at ffff888102ae9140
[   13.452383]  which belongs to the cache kmalloc-16 of size 16
[   13.452965] The buggy address is located 8 bytes inside of
[   13.452965]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.453496] 
[   13.453588] The buggy address belongs to the physical page:
[   13.454051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.454365] flags: 0x200000000000000(node=0|zone=2)
[   13.454548] page_type: f5(slab)
[   13.454681] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.455038] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.455503] page dumped because: kasan: bad access detected
[   13.455769] 
[   13.455840] Memory state around the buggy address:
[   13.456010]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.456230]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.456443] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.456725]                                               ^
[   13.456988]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.457316]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.457822] ==================================================================
[   13.504818] ==================================================================
[   13.505305] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.505853] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.506198] 
[   13.506336] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.506398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.506409] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.506429] Call Trace:
[   13.506442]  <TASK>
[   13.506456]  dump_stack_lvl+0x73/0xb0
[   13.506481]  print_report+0xd1/0x650
[   13.506502]  ? __virt_addr_valid+0x1db/0x2d0
[   13.506524]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.506568]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.506590]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.506616]  kasan_report+0x141/0x180
[   13.506650]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.506680]  kasan_check_range+0x10c/0x1c0
[   13.506719]  __kasan_check_write+0x18/0x20
[   13.506739]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   13.506764]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.506804]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.506827]  ? trace_hardirqs_on+0x37/0xe0
[   13.506861]  ? kasan_bitops_generic+0x92/0x1c0
[   13.506926]  kasan_bitops_generic+0x116/0x1c0
[   13.506966]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.506992]  ? __pfx_read_tsc+0x10/0x10
[   13.507013]  ? ktime_get_ts64+0x86/0x230
[   13.507036]  kunit_try_run_case+0x1a5/0x480
[   13.507057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.507076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.507101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.507125]  ? __kthread_parkme+0x82/0x180
[   13.507145]  ? preempt_count_sub+0x50/0x80
[   13.507168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.507189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.507212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.507237]  kthread+0x337/0x6f0
[   13.507255]  ? trace_preempt_on+0x20/0xc0
[   13.507277]  ? __pfx_kthread+0x10/0x10
[   13.507297]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.507319]  ? calculate_sigpending+0x7b/0xa0
[   13.507342]  ? __pfx_kthread+0x10/0x10
[   13.507364]  ret_from_fork+0x116/0x1d0
[   13.507382]  ? __pfx_kthread+0x10/0x10
[   13.507467]  ret_from_fork_asm+0x1a/0x30
[   13.507499]  </TASK>
[   13.507509] 
[   13.517871] Allocated by task 278:
[   13.518071]  kasan_save_stack+0x45/0x70
[   13.518276]  kasan_save_track+0x18/0x40
[   13.518816]  kasan_save_alloc_info+0x3b/0x50
[   13.519359]  __kasan_kmalloc+0xb7/0xc0
[   13.519682]  __kmalloc_cache_noprof+0x189/0x420
[   13.520080]  kasan_bitops_generic+0x92/0x1c0
[   13.520238]  kunit_try_run_case+0x1a5/0x480
[   13.520383]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.520559]  kthread+0x337/0x6f0
[   13.520886]  ret_from_fork+0x116/0x1d0
[   13.521470]  ret_from_fork_asm+0x1a/0x30
[   13.521909] 
[   13.522185] The buggy address belongs to the object at ffff888102ae9140
[   13.522185]  which belongs to the cache kmalloc-16 of size 16
[   13.523355] The buggy address is located 8 bytes inside of
[   13.523355]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.524332] 
[   13.524411] The buggy address belongs to the physical page:
[   13.524584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.524833] flags: 0x200000000000000(node=0|zone=2)
[   13.525359] page_type: f5(slab)
[   13.525717] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.526844] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.527685] page dumped because: kasan: bad access detected
[   13.528336] 
[   13.528629] Memory state around the buggy address:
[   13.529179]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.529871]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.530303] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.531054]                                               ^
[   13.531447]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.531683]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.531908] ==================================================================
[   13.458249] ==================================================================
[   13.458702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.459240] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.459465] 
[   13.459546] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.459586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.459597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.459617] Call Trace:
[   13.459630]  <TASK>
[   13.459642]  dump_stack_lvl+0x73/0xb0
[   13.459665]  print_report+0xd1/0x650
[   13.459686]  ? __virt_addr_valid+0x1db/0x2d0
[   13.459710]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.459735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.459757]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.459782]  kasan_report+0x141/0x180
[   13.459804]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.459833]  kasan_check_range+0x10c/0x1c0
[   13.459856]  __kasan_check_write+0x18/0x20
[   13.459875]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   13.459913]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.459938]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.459963]  ? trace_hardirqs_on+0x37/0xe0
[   13.459983]  ? kasan_bitops_generic+0x92/0x1c0
[   13.460010]  kasan_bitops_generic+0x116/0x1c0
[   13.460033]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.460058]  ? __pfx_read_tsc+0x10/0x10
[   13.460078]  ? ktime_get_ts64+0x86/0x230
[   13.460102]  kunit_try_run_case+0x1a5/0x480
[   13.460123]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.460188]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.460214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.460238]  ? __kthread_parkme+0x82/0x180
[   13.460258]  ? preempt_count_sub+0x50/0x80
[   13.460281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.460303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.460327]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.460351]  kthread+0x337/0x6f0
[   13.460370]  ? trace_preempt_on+0x20/0xc0
[   13.460391]  ? __pfx_kthread+0x10/0x10
[   13.460411]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.460434]  ? calculate_sigpending+0x7b/0xa0
[   13.460459]  ? __pfx_kthread+0x10/0x10
[   13.460480]  ret_from_fork+0x116/0x1d0
[   13.460498]  ? __pfx_kthread+0x10/0x10
[   13.460519]  ret_from_fork_asm+0x1a/0x30
[   13.460549]  </TASK>
[   13.460558] 
[   13.468772] Allocated by task 278:
[   13.469006]  kasan_save_stack+0x45/0x70
[   13.469216]  kasan_save_track+0x18/0x40
[   13.469407]  kasan_save_alloc_info+0x3b/0x50
[   13.469566]  __kasan_kmalloc+0xb7/0xc0
[   13.469818]  __kmalloc_cache_noprof+0x189/0x420
[   13.470136]  kasan_bitops_generic+0x92/0x1c0
[   13.470326]  kunit_try_run_case+0x1a5/0x480
[   13.470506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.470746]  kthread+0x337/0x6f0
[   13.470868]  ret_from_fork+0x116/0x1d0
[   13.471012]  ret_from_fork_asm+0x1a/0x30
[   13.471384] 
[   13.471492] The buggy address belongs to the object at ffff888102ae9140
[   13.471492]  which belongs to the cache kmalloc-16 of size 16
[   13.472080] The buggy address is located 8 bytes inside of
[   13.472080]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.472582] 
[   13.472694] The buggy address belongs to the physical page:
[   13.472927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.473199] flags: 0x200000000000000(node=0|zone=2)
[   13.473363] page_type: f5(slab)
[   13.473484] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.473729] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.474073] page dumped because: kasan: bad access detected
[   13.474320] 
[   13.474410] Memory state around the buggy address:
[   13.474590]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.475004]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.475219] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.477286]                                               ^
[   13.477475]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.477726]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.478061] ==================================================================
[   13.532780] ==================================================================
[   13.533581] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.534536] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.535122] 
[   13.535215] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.535258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.535270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.535290] Call Trace:
[   13.535304]  <TASK>
[   13.535318]  dump_stack_lvl+0x73/0xb0
[   13.535346]  print_report+0xd1/0x650
[   13.535367]  ? __virt_addr_valid+0x1db/0x2d0
[   13.535389]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.535414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.535437]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.535462]  kasan_report+0x141/0x180
[   13.535485]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.535516]  kasan_check_range+0x10c/0x1c0
[   13.535539]  __kasan_check_write+0x18/0x20
[   13.535559]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   13.535585]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.535612]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.535636]  ? trace_hardirqs_on+0x37/0xe0
[   13.535656]  ? kasan_bitops_generic+0x92/0x1c0
[   13.535683]  kasan_bitops_generic+0x116/0x1c0
[   13.535706]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.535731]  ? __pfx_read_tsc+0x10/0x10
[   13.535751]  ? ktime_get_ts64+0x86/0x230
[   13.535775]  kunit_try_run_case+0x1a5/0x480
[   13.535796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.535815]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.535839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.535863]  ? __kthread_parkme+0x82/0x180
[   13.535884]  ? preempt_count_sub+0x50/0x80
[   13.535920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.535951]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.535976]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.536001]  kthread+0x337/0x6f0
[   13.536020]  ? trace_preempt_on+0x20/0xc0
[   13.536041]  ? __pfx_kthread+0x10/0x10
[   13.536061]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.536083]  ? calculate_sigpending+0x7b/0xa0
[   13.536107]  ? __pfx_kthread+0x10/0x10
[   13.536128]  ret_from_fork+0x116/0x1d0
[   13.536146]  ? __pfx_kthread+0x10/0x10
[   13.536176]  ret_from_fork_asm+0x1a/0x30
[   13.536206]  </TASK>
[   13.536216] 
[   13.552839] Allocated by task 278:
[   13.553318]  kasan_save_stack+0x45/0x70
[   13.553539]  kasan_save_track+0x18/0x40
[   13.553735]  kasan_save_alloc_info+0x3b/0x50
[   13.554262]  __kasan_kmalloc+0xb7/0xc0
[   13.554694]  __kmalloc_cache_noprof+0x189/0x420
[   13.555163]  kasan_bitops_generic+0x92/0x1c0
[   13.555316]  kunit_try_run_case+0x1a5/0x480
[   13.555462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.555646]  kthread+0x337/0x6f0
[   13.555976]  ret_from_fork+0x116/0x1d0
[   13.556348]  ret_from_fork_asm+0x1a/0x30
[   13.556867] 
[   13.557056] The buggy address belongs to the object at ffff888102ae9140
[   13.557056]  which belongs to the cache kmalloc-16 of size 16
[   13.558286] The buggy address is located 8 bytes inside of
[   13.558286]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.559374] 
[   13.559452] The buggy address belongs to the physical page:
[   13.559624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.560497] flags: 0x200000000000000(node=0|zone=2)
[   13.561053] page_type: f5(slab)
[   13.561366] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.562107] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.562651] page dumped because: kasan: bad access detected
[   13.563130] 
[   13.563316] Memory state around the buggy address:
[   13.563670]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.564293]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.564828] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.565274]                                               ^
[   13.565453]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.565746]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.566428] ==================================================================
[   13.567339] ==================================================================
[   13.568257] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.569287] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.569625] 
[   13.569813] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.569857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.569881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.569911] Call Trace:
[   13.569925]  <TASK>
[   13.569939]  dump_stack_lvl+0x73/0xb0
[   13.569964]  print_report+0xd1/0x650
[   13.569986]  ? __virt_addr_valid+0x1db/0x2d0
[   13.570009]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.570034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.570100]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.570139]  kasan_report+0x141/0x180
[   13.570161]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.570191]  kasan_check_range+0x10c/0x1c0
[   13.570215]  __kasan_check_write+0x18/0x20
[   13.570234]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   13.570259]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.570286]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.570310]  ? trace_hardirqs_on+0x37/0xe0
[   13.570331]  ? kasan_bitops_generic+0x92/0x1c0
[   13.570358]  kasan_bitops_generic+0x116/0x1c0
[   13.570381]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.570406]  ? __pfx_read_tsc+0x10/0x10
[   13.570426]  ? ktime_get_ts64+0x86/0x230
[   13.570449]  kunit_try_run_case+0x1a5/0x480
[   13.570469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.570489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.570515]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.570539]  ? __kthread_parkme+0x82/0x180
[   13.570560]  ? preempt_count_sub+0x50/0x80
[   13.570583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.570605]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.570637]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.570662]  kthread+0x337/0x6f0
[   13.570681]  ? trace_preempt_on+0x20/0xc0
[   13.570702]  ? __pfx_kthread+0x10/0x10
[   13.570722]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.570744]  ? calculate_sigpending+0x7b/0xa0
[   13.570768]  ? __pfx_kthread+0x10/0x10
[   13.570788]  ret_from_fork+0x116/0x1d0
[   13.570806]  ? __pfx_kthread+0x10/0x10
[   13.570826]  ret_from_fork_asm+0x1a/0x30
[   13.570856]  </TASK>
[   13.570866] 
[   13.586883] Allocated by task 278:
[   13.587138]  kasan_save_stack+0x45/0x70
[   13.587549]  kasan_save_track+0x18/0x40
[   13.588020]  kasan_save_alloc_info+0x3b/0x50
[   13.588336]  __kasan_kmalloc+0xb7/0xc0
[   13.588474]  __kmalloc_cache_noprof+0x189/0x420
[   13.588637]  kasan_bitops_generic+0x92/0x1c0
[   13.589076]  kunit_try_run_case+0x1a5/0x480
[   13.589631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.590291]  kthread+0x337/0x6f0
[   13.590627]  ret_from_fork+0x116/0x1d0
[   13.591089]  ret_from_fork_asm+0x1a/0x30
[   13.591450] 
[   13.591523] The buggy address belongs to the object at ffff888102ae9140
[   13.591523]  which belongs to the cache kmalloc-16 of size 16
[   13.592537] The buggy address is located 8 bytes inside of
[   13.592537]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.593484] 
[   13.593563] The buggy address belongs to the physical page:
[   13.593780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.594504] flags: 0x200000000000000(node=0|zone=2)
[   13.595059] page_type: f5(slab)
[   13.595184] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.595414] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.595646] page dumped because: kasan: bad access detected
[   13.596148] 
[   13.596372] Memory state around the buggy address:
[   13.596813]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.597655]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.598405] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.599207]                                               ^
[   13.599697]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.599928]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.600143] ==================================================================
[   13.418198] ==================================================================
[   13.418647] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.419477] Write of size 8 at addr ffff888102ae9148 by task kunit_try_catch/278
[   13.419907] 
[   13.420130] CPU: 0 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.420179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.420191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.420212] Call Trace:
[   13.420224]  <TASK>
[   13.420238]  dump_stack_lvl+0x73/0xb0
[   13.420265]  print_report+0xd1/0x650
[   13.420288]  ? __virt_addr_valid+0x1db/0x2d0
[   13.420311]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.420335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.420358]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.420384]  kasan_report+0x141/0x180
[   13.420406]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.420436]  kasan_check_range+0x10c/0x1c0
[   13.420460]  __kasan_check_write+0x18/0x20
[   13.420479]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   13.420504]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   13.420531]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.420556]  ? trace_hardirqs_on+0x37/0xe0
[   13.420578]  ? kasan_bitops_generic+0x92/0x1c0
[   13.420606]  kasan_bitops_generic+0x116/0x1c0
[   13.420640]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   13.420665]  ? __pfx_read_tsc+0x10/0x10
[   13.420687]  ? ktime_get_ts64+0x86/0x230
[   13.420711]  kunit_try_run_case+0x1a5/0x480
[   13.420731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.420752]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.420776]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.420801]  ? __kthread_parkme+0x82/0x180
[   13.420820]  ? preempt_count_sub+0x50/0x80
[   13.420844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.420865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.420889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.420927]  kthread+0x337/0x6f0
[   13.420992]  ? trace_preempt_on+0x20/0xc0
[   13.421015]  ? __pfx_kthread+0x10/0x10
[   13.421035]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.421064]  ? calculate_sigpending+0x7b/0xa0
[   13.421088]  ? __pfx_kthread+0x10/0x10
[   13.421109]  ret_from_fork+0x116/0x1d0
[   13.421127]  ? __pfx_kthread+0x10/0x10
[   13.421148]  ret_from_fork_asm+0x1a/0x30
[   13.421177]  </TASK>
[   13.421188] 
[   13.429912] Allocated by task 278:
[   13.430083]  kasan_save_stack+0x45/0x70
[   13.430232]  kasan_save_track+0x18/0x40
[   13.430429]  kasan_save_alloc_info+0x3b/0x50
[   13.430611]  __kasan_kmalloc+0xb7/0xc0
[   13.430852]  __kmalloc_cache_noprof+0x189/0x420
[   13.431105]  kasan_bitops_generic+0x92/0x1c0
[   13.431279]  kunit_try_run_case+0x1a5/0x480
[   13.431456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.431710]  kthread+0x337/0x6f0
[   13.431850]  ret_from_fork+0x116/0x1d0
[   13.432085]  ret_from_fork_asm+0x1a/0x30
[   13.432275] 
[   13.432363] The buggy address belongs to the object at ffff888102ae9140
[   13.432363]  which belongs to the cache kmalloc-16 of size 16
[   13.432755] The buggy address is located 8 bytes inside of
[   13.432755]  allocated 9-byte region [ffff888102ae9140, ffff888102ae9149)
[   13.433124] 
[   13.433196] The buggy address belongs to the physical page:
[   13.433443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ae9
[   13.434322] flags: 0x200000000000000(node=0|zone=2)
[   13.434498] page_type: f5(slab)
[   13.434618] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   13.434849] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   13.435585] page dumped because: kasan: bad access detected
[   13.436041] 
[   13.436119] Memory state around the buggy address:
[   13.436399]  ffff888102ae9000: 00 02 fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   13.436726]  ffff888102ae9080: fa fb fc fc 00 05 fc fc fa fb fc fc fa fb fc fc
[   13.437009] >ffff888102ae9100: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc
[   13.437261]                                               ^
[   13.437448]  ffff888102ae9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.437763]  ffff888102ae9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.438194] ==================================================================