Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-armv7 |
[ 147.338981] ================================================================== [ 147.340787] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x168/0xc30 [ 147.341256] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.341955] [ 147.342249] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.343131] Hardware name: Generic DT based system [ 147.343684] unwind_backtrace from show_stack+0x18/0x1c [ 147.344335] show_stack from dump_stack_lvl+0x58/0x70 [ 147.345020] dump_stack_lvl from print_report+0x164/0x51c [ 147.345706] print_report from kasan_report+0xc8/0x104 [ 147.346391] kasan_report from kasan_bitops_generic+0x168/0xc30 [ 147.347209] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.347965] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.349340] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.350187] kthread from ret_from_fork+0x14/0x30 [ 147.350789] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.351483] bfa0: 00000000 00000000 00000000 00000000 [ 147.352412] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.353377] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.354184] [ 147.354545] Allocated by task 201: [ 147.355009] kasan_set_track+0x3c/0x5c [ 147.355526] __kasan_kmalloc+0x8c/0x94 [ 147.356361] kasan_bitops_generic+0xa0/0xc30 [ 147.356908] kunit_try_run_case+0x11c/0x2e4 [ 147.357442] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.358294] kthread+0x184/0x1a8 [ 147.358799] ret_from_fork+0x14/0x30 [ 147.359449] [ 147.359674] The buggy address belongs to the object at c8fbac80 [ 147.359674] which belongs to the cache kmalloc-64 of size 64 [ 147.360899] The buggy address is located 4 bytes inside of [ 147.360899] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.362135] [ 147.362419] The buggy address belongs to the physical page: [ 147.363006] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.363780] flags: 0x800(slab|zone=0) [ 147.364502] page_type: 0xffffffff() [ 147.364926] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.366087] raw: 00000000 [ 147.366455] page dumped because: kasan: bad access detected [ 147.367141] [ 147.367368] Memory state around the buggy address: [ 147.367953] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.368912] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.369828] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.370545] ^ [ 147.370975] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.371758] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.372427] ================================================================== [ 147.718512] ================================================================== [ 147.720525] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x404/0xc30 [ 147.721269] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.721838] [ 147.722190] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.723132] Hardware name: Generic DT based system [ 147.723608] unwind_backtrace from show_stack+0x18/0x1c [ 147.724444] show_stack from dump_stack_lvl+0x58/0x70 [ 147.725048] dump_stack_lvl from print_report+0x164/0x51c [ 147.725977] print_report from kasan_report+0xc8/0x104 [ 147.726539] kasan_report from kasan_bitops_generic+0x404/0xc30 [ 147.727379] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.728289] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.729357] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.730238] kthread from ret_from_fork+0x14/0x30 [ 147.730814] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.731520] bfa0: 00000000 00000000 00000000 00000000 [ 147.732471] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.733347] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.734067] [ 147.734364] Allocated by task 201: [ 147.734803] kasan_set_track+0x3c/0x5c [ 147.735287] __kasan_kmalloc+0x8c/0x94 [ 147.735882] kasan_bitops_generic+0xa0/0xc30 [ 147.736548] kunit_try_run_case+0x11c/0x2e4 [ 147.737348] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.738137] kthread+0x184/0x1a8 [ 147.738652] ret_from_fork+0x14/0x30 [ 147.739135] [ 147.739419] The buggy address belongs to the object at c8fbac80 [ 147.739419] which belongs to the cache kmalloc-64 of size 64 [ 147.740631] The buggy address is located 4 bytes inside of [ 147.740631] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.741812] [ 147.742168] The buggy address belongs to the physical page: [ 147.742865] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.743721] flags: 0x800(slab|zone=0) [ 147.744206] page_type: 0xffffffff() [ 147.744678] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.745599] raw: 00000000 [ 147.746115] page dumped because: kasan: bad access detected [ 147.746591] [ 147.746953] Memory state around the buggy address: [ 147.747566] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.748297] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.749026] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.749731] ^ [ 147.750089] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.750905] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.751545] ================================================================== [ 147.677153] ================================================================== [ 147.679194] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x39c/0xc30 [ 147.680019] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.680846] [ 147.681174] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.682234] Hardware name: Generic DT based system [ 147.682815] unwind_backtrace from show_stack+0x18/0x1c [ 147.683692] show_stack from dump_stack_lvl+0x58/0x70 [ 147.684446] dump_stack_lvl from print_report+0x164/0x51c [ 147.685219] print_report from kasan_report+0xc8/0x104 [ 147.686261] kasan_report from kasan_bitops_generic+0x39c/0xc30 [ 147.687200] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.688109] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.689136] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.690076] kthread from ret_from_fork+0x14/0x30 [ 147.690774] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.691470] bfa0: 00000000 00000000 00000000 00000000 [ 147.692477] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.693428] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.694223] [ 147.694555] Allocated by task 201: [ 147.695089] kasan_set_track+0x3c/0x5c [ 147.695707] __kasan_kmalloc+0x8c/0x94 [ 147.696584] kasan_bitops_generic+0xa0/0xc30 [ 147.697263] kunit_try_run_case+0x11c/0x2e4 [ 147.697903] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.698649] kthread+0x184/0x1a8 [ 147.699262] ret_from_fork+0x14/0x30 [ 147.699840] [ 147.700171] The buggy address belongs to the object at c8fbac80 [ 147.700171] which belongs to the cache kmalloc-64 of size 64 [ 147.701769] The buggy address is located 4 bytes inside of [ 147.701769] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.703021] [ 147.703432] The buggy address belongs to the physical page: [ 147.704040] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.705135] flags: 0x800(slab|zone=0) [ 147.705660] page_type: 0xffffffff() [ 147.706727] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.707576] raw: 00000000 [ 147.707955] page dumped because: kasan: bad access detected [ 147.708756] [ 147.709146] Memory state around the buggy address: [ 147.709959] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.710772] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.711669] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.712544] ^ [ 147.713005] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.713829] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.714649] ================================================================== [ 147.752735] ================================================================== [ 147.753559] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x43c/0xc30 [ 147.754256] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.755098] [ 147.755314] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.756500] Hardware name: Generic DT based system [ 147.756972] unwind_backtrace from show_stack+0x18/0x1c [ 147.758008] show_stack from dump_stack_lvl+0x58/0x70 [ 147.758584] dump_stack_lvl from print_report+0x164/0x51c [ 147.759285] print_report from kasan_report+0xc8/0x104 [ 147.760146] kasan_report from kasan_bitops_generic+0x43c/0xc30 [ 147.760810] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.762035] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.763140] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.764188] kthread from ret_from_fork+0x14/0x30 [ 147.764843] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.765559] bfa0: 00000000 00000000 00000000 00000000 [ 147.766889] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.767928] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.768705] [ 147.769084] Allocated by task 201: [ 147.769523] kasan_set_track+0x3c/0x5c [ 147.770049] __kasan_kmalloc+0x8c/0x94 [ 147.770695] kasan_bitops_generic+0xa0/0xc30 [ 147.771256] kunit_try_run_case+0x11c/0x2e4 [ 147.771928] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.772599] kthread+0x184/0x1a8 [ 147.773146] ret_from_fork+0x14/0x30 [ 147.773680] [ 147.773911] The buggy address belongs to the object at c8fbac80 [ 147.773911] which belongs to the cache kmalloc-64 of size 64 [ 147.775134] The buggy address is located 4 bytes inside of [ 147.775134] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.776891] [ 147.777150] The buggy address belongs to the physical page: [ 147.777705] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.778807] flags: 0x800(slab|zone=0) [ 147.779418] page_type: 0xffffffff() [ 147.779952] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.780936] raw: 00000000 [ 147.781345] page dumped because: kasan: bad access detected [ 147.782010] [ 147.782347] Memory state around the buggy address: [ 147.782975] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.783859] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.784733] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.785475] ^ [ 147.786097] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.786878] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.787706] ================================================================== [ 147.599484] ================================================================== [ 147.600304] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x310/0xc30 [ 147.601126] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.601845] [ 147.602082] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.603038] Hardware name: Generic DT based system [ 147.603719] unwind_backtrace from show_stack+0x18/0x1c [ 147.604390] show_stack from dump_stack_lvl+0x58/0x70 [ 147.605155] dump_stack_lvl from print_report+0x164/0x51c [ 147.605710] print_report from kasan_report+0xc8/0x104 [ 147.607225] kasan_report from kasan_check_range+0x14c/0x198 [ 147.608432] kasan_check_range from kasan_bitops_generic+0x310/0xc30 [ 147.609534] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.610349] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.611349] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.612390] kthread from ret_from_fork+0x14/0x30 [ 147.613122] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.613695] bfa0: 00000000 00000000 00000000 00000000 [ 147.614615] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.615100] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.616116] [ 147.616486] Allocated by task 201: [ 147.616900] kasan_set_track+0x3c/0x5c [ 147.617637] __kasan_kmalloc+0x8c/0x94 [ 147.618327] kasan_bitops_generic+0xa0/0xc30 [ 147.619009] kunit_try_run_case+0x11c/0x2e4 [ 147.619683] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.620443] kthread+0x184/0x1a8 [ 147.621099] ret_from_fork+0x14/0x30 [ 147.621641] [ 147.621973] The buggy address belongs to the object at c8fbac80 [ 147.621973] which belongs to the cache kmalloc-64 of size 64 [ 147.623204] The buggy address is located 4 bytes inside of [ 147.623204] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.624539] [ 147.624908] The buggy address belongs to the physical page: [ 147.625586] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.626734] flags: 0x800(slab|zone=0) [ 147.627298] page_type: 0xffffffff() [ 147.627843] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.628825] raw: 00000000 [ 147.629172] page dumped because: kasan: bad access detected [ 147.629866] [ 147.630253] Memory state around the buggy address: [ 147.630764] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.631680] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.632515] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.633310] ^ [ 147.633729] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.634514] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.635388] ================================================================== [ 147.447811] ================================================================== [ 147.448401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f8/0xc30 [ 147.449204] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.449801] [ 147.450134] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.451069] Hardware name: Generic DT based system [ 147.451582] unwind_backtrace from show_stack+0x18/0x1c [ 147.452247] show_stack from dump_stack_lvl+0x58/0x70 [ 147.452947] dump_stack_lvl from print_report+0x164/0x51c [ 147.453627] print_report from kasan_report+0xc8/0x104 [ 147.454414] kasan_report from kasan_bitops_generic+0x1f8/0xc30 [ 147.455216] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.456072] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.456924] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.458686] kthread from ret_from_fork+0x14/0x30 [ 147.459602] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.460355] bfa0: 00000000 00000000 00000000 00000000 [ 147.461319] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.462234] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.462946] [ 147.463203] Allocated by task 201: [ 147.463657] kasan_set_track+0x3c/0x5c [ 147.464236] __kasan_kmalloc+0x8c/0x94 [ 147.464868] kasan_bitops_generic+0xa0/0xc30 [ 147.465388] kunit_try_run_case+0x11c/0x2e4 [ 147.466211] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.467177] kthread+0x184/0x1a8 [ 147.467636] ret_from_fork+0x14/0x30 [ 147.468104] [ 147.468424] The buggy address belongs to the object at c8fbac80 [ 147.468424] which belongs to the cache kmalloc-64 of size 64 [ 147.469682] The buggy address is located 4 bytes inside of [ 147.469682] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.470707] [ 147.471110] The buggy address belongs to the physical page: [ 147.471696] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.472476] flags: 0x800(slab|zone=0) [ 147.473047] page_type: 0xffffffff() [ 147.473600] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.474525] raw: 00000000 [ 147.474820] page dumped because: kasan: bad access detected [ 147.475498] [ 147.475848] Memory state around the buggy address: [ 147.476914] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.477746] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.478597] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.479390] ^ [ 147.479758] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.480353] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.481095] ================================================================== [ 147.522199] ================================================================== [ 147.524174] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x26c/0xc30 [ 147.524869] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.526481] [ 147.526728] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.527746] Hardware name: Generic DT based system [ 147.528308] unwind_backtrace from show_stack+0x18/0x1c [ 147.528973] show_stack from dump_stack_lvl+0x58/0x70 [ 147.529668] dump_stack_lvl from print_report+0x164/0x51c [ 147.530414] print_report from kasan_report+0xc8/0x104 [ 147.531172] kasan_report from kasan_bitops_generic+0x26c/0xc30 [ 147.531968] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.532831] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.533808] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.534689] kthread from ret_from_fork+0x14/0x30 [ 147.535413] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.536331] bfa0: 00000000 00000000 00000000 00000000 [ 147.537214] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.538110] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.538832] [ 147.539102] Allocated by task 201: [ 147.539478] kasan_set_track+0x3c/0x5c [ 147.540125] __kasan_kmalloc+0x8c/0x94 [ 147.540596] kasan_bitops_generic+0xa0/0xc30 [ 147.541179] kunit_try_run_case+0x11c/0x2e4 [ 147.541923] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.542592] kthread+0x184/0x1a8 [ 147.543205] ret_from_fork+0x14/0x30 [ 147.543723] [ 147.543983] The buggy address belongs to the object at c8fbac80 [ 147.543983] which belongs to the cache kmalloc-64 of size 64 [ 147.545348] The buggy address is located 4 bytes inside of [ 147.545348] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.547517] [ 147.547800] The buggy address belongs to the physical page: [ 147.548392] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.549298] flags: 0x800(slab|zone=0) [ 147.549788] page_type: 0xffffffff() [ 147.550241] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.551195] raw: 00000000 [ 147.551581] page dumped because: kasan: bad access detected [ 147.552120] [ 147.552455] Memory state around the buggy address: [ 147.553091] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.553780] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.554530] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.555402] ^ [ 147.556035] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.556865] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.557664] ================================================================== [ 147.484299] ================================================================== [ 147.485018] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x20c/0xc30 [ 147.485817] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.486417] [ 147.486746] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.487657] Hardware name: Generic DT based system [ 147.488386] unwind_backtrace from show_stack+0x18/0x1c [ 147.489116] show_stack from dump_stack_lvl+0x58/0x70 [ 147.490085] dump_stack_lvl from print_report+0x164/0x51c [ 147.490775] print_report from kasan_report+0xc8/0x104 [ 147.491643] kasan_report from kasan_bitops_generic+0x20c/0xc30 [ 147.492443] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.493375] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.494438] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.495382] kthread from ret_from_fork+0x14/0x30 [ 147.496232] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.496969] bfa0: 00000000 00000000 00000000 00000000 [ 147.497874] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.498871] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.499535] [ 147.499821] Allocated by task 201: [ 147.500359] kasan_set_track+0x3c/0x5c [ 147.500871] __kasan_kmalloc+0x8c/0x94 [ 147.501356] kasan_bitops_generic+0xa0/0xc30 [ 147.502024] kunit_try_run_case+0x11c/0x2e4 [ 147.502618] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.503223] kthread+0x184/0x1a8 [ 147.503749] ret_from_fork+0x14/0x30 [ 147.504218] [ 147.504529] The buggy address belongs to the object at c8fbac80 [ 147.504529] which belongs to the cache kmalloc-64 of size 64 [ 147.506117] The buggy address is located 4 bytes inside of [ 147.506117] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.507249] [ 147.507578] The buggy address belongs to the physical page: [ 147.508320] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.509111] flags: 0x800(slab|zone=0) [ 147.509685] page_type: 0xffffffff() [ 147.510191] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.511041] raw: 00000000 [ 147.511475] page dumped because: kasan: bad access detected [ 147.512137] [ 147.512362] Memory state around the buggy address: [ 147.512997] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.513842] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.514644] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.515431] ^ [ 147.516036] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.516813] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.517614] ================================================================== [ 147.412205] ================================================================== [ 147.412893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xc30 [ 147.413655] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.414242] [ 147.414567] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.415511] Hardware name: Generic DT based system [ 147.416178] unwind_backtrace from show_stack+0x18/0x1c [ 147.417138] show_stack from dump_stack_lvl+0x58/0x70 [ 147.417797] dump_stack_lvl from print_report+0x164/0x51c [ 147.418528] print_report from kasan_report+0xc8/0x104 [ 147.419164] kasan_report from kasan_check_range+0x14c/0x198 [ 147.419753] kasan_check_range from kasan_bitops_generic+0x1f0/0xc30 [ 147.420273] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.421167] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.422173] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.423270] kthread from ret_from_fork+0x14/0x30 [ 147.423851] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.424530] bfa0: 00000000 00000000 00000000 00000000 [ 147.425405] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.426499] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.427207] [ 147.427529] Allocated by task 201: [ 147.427908] kasan_set_track+0x3c/0x5c [ 147.428510] __kasan_kmalloc+0x8c/0x94 [ 147.429078] kasan_bitops_generic+0xa0/0xc30 [ 147.429640] kunit_try_run_case+0x11c/0x2e4 [ 147.430253] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.431015] kthread+0x184/0x1a8 [ 147.431437] ret_from_fork+0x14/0x30 [ 147.431905] [ 147.432197] The buggy address belongs to the object at c8fbac80 [ 147.432197] which belongs to the cache kmalloc-64 of size 64 [ 147.433349] The buggy address is located 4 bytes inside of [ 147.433349] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.434458] [ 147.434763] The buggy address belongs to the physical page: [ 147.435295] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.436673] flags: 0x800(slab|zone=0) [ 147.437171] page_type: 0xffffffff() [ 147.437689] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.438537] raw: 00000000 [ 147.439003] page dumped because: kasan: bad access detected [ 147.439650] [ 147.439909] Memory state around the buggy address: [ 147.440493] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.441237] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.442077] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.442861] ^ [ 147.443193] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.444029] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.445184] ================================================================== [ 147.636912] ================================================================== [ 147.637733] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x318/0xc30 [ 147.638703] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.639619] [ 147.639971] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.640935] Hardware name: Generic DT based system [ 147.641595] unwind_backtrace from show_stack+0x18/0x1c [ 147.642490] show_stack from dump_stack_lvl+0x58/0x70 [ 147.643222] dump_stack_lvl from print_report+0x164/0x51c [ 147.644101] print_report from kasan_report+0xc8/0x104 [ 147.644830] kasan_report from kasan_bitops_generic+0x318/0xc30 [ 147.645967] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.647153] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.647955] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.648818] kthread from ret_from_fork+0x14/0x30 [ 147.649533] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.650234] bfa0: 00000000 00000000 00000000 00000000 [ 147.651180] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.652113] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.652873] [ 147.653240] Allocated by task 201: [ 147.653879] kasan_set_track+0x3c/0x5c [ 147.654540] __kasan_kmalloc+0x8c/0x94 [ 147.655289] kasan_bitops_generic+0xa0/0xc30 [ 147.656221] kunit_try_run_case+0x11c/0x2e4 [ 147.656856] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.657561] kthread+0x184/0x1a8 [ 147.658066] ret_from_fork+0x14/0x30 [ 147.658660] [ 147.658975] The buggy address belongs to the object at c8fbac80 [ 147.658975] which belongs to the cache kmalloc-64 of size 64 [ 147.660377] The buggy address is located 4 bytes inside of [ 147.660377] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.661597] [ 147.662002] The buggy address belongs to the physical page: [ 147.662731] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.663654] flags: 0x800(slab|zone=0) [ 147.664298] page_type: 0xffffffff() [ 147.664844] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.665964] raw: 00000000 [ 147.666574] page dumped because: kasan: bad access detected [ 147.667446] [ 147.667772] Memory state around the buggy address: [ 147.668454] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.669290] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.670206] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.670991] ^ [ 147.671508] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.672343] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.673156] ================================================================== [ 147.300632] ================================================================== [ 147.302491] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x100/0xc30 [ 147.303268] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.303975] [ 147.304304] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.305015] Hardware name: Generic DT based system [ 147.305709] unwind_backtrace from show_stack+0x18/0x1c [ 147.306544] show_stack from dump_stack_lvl+0x58/0x70 [ 147.307165] dump_stack_lvl from print_report+0x164/0x51c [ 147.307839] print_report from kasan_report+0xc8/0x104 [ 147.308823] kasan_report from kasan_bitops_generic+0x100/0xc30 [ 147.309677] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.310554] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.311537] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.312518] kthread from ret_from_fork+0x14/0x30 [ 147.313141] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.313715] bfa0: 00000000 00000000 00000000 00000000 [ 147.314664] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.315803] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.316481] [ 147.316724] Allocated by task 201: [ 147.317125] kasan_set_track+0x3c/0x5c [ 147.317706] __kasan_kmalloc+0x8c/0x94 [ 147.318186] kasan_bitops_generic+0xa0/0xc30 [ 147.318853] kunit_try_run_case+0x11c/0x2e4 [ 147.319448] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.320168] kthread+0x184/0x1a8 [ 147.320566] ret_from_fork+0x14/0x30 [ 147.321139] [ 147.321377] The buggy address belongs to the object at c8fbac80 [ 147.321377] which belongs to the cache kmalloc-64 of size 64 [ 147.322608] The buggy address is located 4 bytes inside of [ 147.322608] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.323851] [ 147.324147] The buggy address belongs to the physical page: [ 147.324900] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.326044] flags: 0x800(slab|zone=0) [ 147.326455] page_type: 0xffffffff() [ 147.327104] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.328028] raw: 00000000 [ 147.328378] page dumped because: kasan: bad access detected [ 147.328934] [ 147.329301] Memory state around the buggy address: [ 147.329900] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.330616] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.331413] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.332177] ^ [ 147.332591] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.333338] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.334162] ================================================================== [ 147.561973] ================================================================== [ 147.563876] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2d4/0xc30 [ 147.564824] Read of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.565551] [ 147.566662] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.567597] Hardware name: Generic DT based system [ 147.568185] unwind_backtrace from show_stack+0x18/0x1c [ 147.569005] show_stack from dump_stack_lvl+0x58/0x70 [ 147.569695] dump_stack_lvl from print_report+0x164/0x51c [ 147.570537] print_report from kasan_report+0xc8/0x104 [ 147.571261] kasan_report from kasan_bitops_generic+0x2d4/0xc30 [ 147.572072] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.572949] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.573940] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.575004] kthread from ret_from_fork+0x14/0x30 [ 147.575943] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.576563] bfa0: 00000000 00000000 00000000 00000000 [ 147.577255] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.578486] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.579304] [ 147.579576] Allocated by task 201: [ 147.579984] kasan_set_track+0x3c/0x5c [ 147.580546] __kasan_kmalloc+0x8c/0x94 [ 147.581140] kasan_bitops_generic+0xa0/0xc30 [ 147.581673] kunit_try_run_case+0x11c/0x2e4 [ 147.582354] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.583106] kthread+0x184/0x1a8 [ 147.583535] ret_from_fork+0x14/0x30 [ 147.584002] [ 147.584314] The buggy address belongs to the object at c8fbac80 [ 147.584314] which belongs to the cache kmalloc-64 of size 64 [ 147.585516] The buggy address is located 4 bytes inside of [ 147.585516] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.587466] [ 147.587726] The buggy address belongs to the physical page: [ 147.588576] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.589513] flags: 0x800(slab|zone=0) [ 147.590096] page_type: 0xffffffff() [ 147.590652] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.591597] raw: 00000000 [ 147.591993] page dumped because: kasan: bad access detected [ 147.592671] [ 147.592882] Memory state around the buggy address: [ 147.593672] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.594508] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.595236] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.596292] ^ [ 147.596668] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.597416] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.598224] ================================================================== [ 147.374826] ================================================================== [ 147.376317] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1a4/0xc30 [ 147.377085] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.377666] [ 147.377976] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.378982] Hardware name: Generic DT based system [ 147.379461] unwind_backtrace from show_stack+0x18/0x1c [ 147.380320] show_stack from dump_stack_lvl+0x58/0x70 [ 147.381173] dump_stack_lvl from print_report+0x164/0x51c [ 147.381754] print_report from kasan_report+0xc8/0x104 [ 147.382576] kasan_report from kasan_check_range+0x14c/0x198 [ 147.383494] kasan_check_range from kasan_bitops_generic+0x1a4/0xc30 [ 147.384339] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.385189] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.386315] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.387151] kthread from ret_from_fork+0x14/0x30 [ 147.387771] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.388347] bfa0: 00000000 00000000 00000000 00000000 [ 147.389387] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.390361] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.391087] [ 147.391382] Allocated by task 201: [ 147.391814] kasan_set_track+0x3c/0x5c [ 147.392314] __kasan_kmalloc+0x8c/0x94 [ 147.392908] kasan_bitops_generic+0xa0/0xc30 [ 147.393412] kunit_try_run_case+0x11c/0x2e4 [ 147.393986] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.394779] kthread+0x184/0x1a8 [ 147.395218] ret_from_fork+0x14/0x30 [ 147.395842] [ 147.396104] The buggy address belongs to the object at c8fbac80 [ 147.396104] which belongs to the cache kmalloc-64 of size 64 [ 147.397842] The buggy address is located 4 bytes inside of [ 147.397842] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.398945] [ 147.399334] The buggy address belongs to the physical page: [ 147.400048] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.400981] flags: 0x800(slab|zone=0) [ 147.401468] page_type: 0xffffffff() [ 147.402140] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.403092] raw: 00000000 [ 147.403469] page dumped because: kasan: bad access detected [ 147.404343] [ 147.404671] Memory state around the buggy address: [ 147.405351] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.406478] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.407115] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.407922] ^ [ 147.408332] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.409073] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.409835] ================================================================== [ 147.788925] ================================================================== [ 147.789558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x478/0xc30 [ 147.790620] Write of size 4 at addr c8fbac84 by task kunit_try_catch/201 [ 147.791575] [ 147.791814] CPU: 1 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 147.792835] Hardware name: Generic DT based system [ 147.793656] unwind_backtrace from show_stack+0x18/0x1c [ 147.794541] show_stack from dump_stack_lvl+0x58/0x70 [ 147.795388] dump_stack_lvl from print_report+0x164/0x51c [ 147.796262] print_report from kasan_report+0xc8/0x104 [ 147.796905] kasan_report from kasan_check_range+0x14c/0x198 [ 147.797901] kasan_check_range from kasan_bitops_generic+0x478/0xc30 [ 147.798901] kasan_bitops_generic from kunit_try_run_case+0x11c/0x2e4 [ 147.799798] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.800723] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 147.801656] kthread from ret_from_fork+0x14/0x30 [ 147.802352] Exception stack(0xfa10bfb0 to 0xfa10bff8) [ 147.803017] bfa0: 00000000 00000000 00000000 00000000 [ 147.804137] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 147.805072] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 147.805850] [ 147.806257] Allocated by task 201: [ 147.806765] kasan_set_track+0x3c/0x5c [ 147.807688] __kasan_kmalloc+0x8c/0x94 [ 147.808099] kasan_bitops_generic+0xa0/0xc30 [ 147.808882] kunit_try_run_case+0x11c/0x2e4 [ 147.809701] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 147.810619] kthread+0x184/0x1a8 [ 147.811111] ret_from_fork+0x14/0x30 [ 147.811677] [ 147.812073] The buggy address belongs to the object at c8fbac80 [ 147.812073] which belongs to the cache kmalloc-64 of size 64 [ 147.813296] The buggy address is located 4 bytes inside of [ 147.813296] allocated 5-byte region [c8fbac80, c8fbac85) [ 147.814609] [ 147.814900] The buggy address belongs to the physical page: [ 147.815655] page:3fba6f39 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48fba [ 147.816861] flags: 0x800(slab|zone=0) [ 147.817460] page_type: 0xffffffff() [ 147.818168] raw: 00000800 c4801200 00000122 00000000 00000000 00200020 ffffffff 00000001 [ 147.819252] raw: 00000000 [ 147.819806] page dumped because: kasan: bad access detected [ 147.820416] [ 147.820974] Memory state around the buggy address: [ 147.821693] c8fbab80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.822555] c8fbac00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 147.823227] >c8fbac80: 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.823570] ^ [ 147.823752] c8fbad00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.824159] c8fbad80: 00 00 00 00 04 fc fc fc fc fc fc fc fc fc fc fc [ 147.824894] ==================================================================