Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-armv7
qemu-x86_64

[  146.667172] ==================================================================
[  146.667901] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x13c/0x3b4
[  146.668814] Read of size 1 at addr c8e02a78 by task kunit_try_catch/185
[  146.669484] 
[  146.669805] CPU: 1 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  146.670944] Hardware name: Generic DT based system
[  146.671666]  unwind_backtrace from show_stack+0x18/0x1c
[  146.672482]  show_stack from dump_stack_lvl+0x58/0x70
[  146.673146]  dump_stack_lvl from print_report+0x164/0x51c
[  146.673850]  print_report from kasan_report+0xc8/0x104
[  146.674608]  kasan_report from ksize_unpoisons_memory+0x13c/0x3b4
[  146.675449]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  146.676407]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.677406]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  146.678322]  kthread from ret_from_fork+0x14/0x30
[  146.678994] Exception stack(0xfa093fb0 to 0xfa093ff8)
[  146.679672] 3fa0:                                     00000000 00000000 00000000 00000000
[  146.680756] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  146.681751] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  146.682565] 
[  146.682888] Allocated by task 185:
[  146.683517]  kasan_set_track+0x3c/0x5c
[  146.684139]  __kasan_kmalloc+0x8c/0x94
[  146.684763]  ksize_unpoisons_memory+0xb4/0x3b4
[  146.685432]  kunit_try_run_case+0x11c/0x2e4
[  146.686043]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.686914]  kthread+0x184/0x1a8
[  146.687290]  ret_from_fork+0x14/0x30
[  146.688084] 
[  146.688355] The buggy address belongs to the object at c8e02a00
[  146.688355]  which belongs to the cache kmalloc-128 of size 128
[  146.689886] The buggy address is located 5 bytes to the right of
[  146.689886]  allocated 115-byte region [c8e02a00, c8e02a73)
[  146.691032] 
[  146.691463] The buggy address belongs to the physical page:
[  146.692312] page:b76fc2b6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e02
[  146.693173] flags: 0x800(slab|zone=0)
[  146.693848] page_type: 0xffffffff()
[  146.694536] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  146.695490] raw: 00000000
[  146.695841] page dumped because: kasan: bad access detected
[  146.696565] 
[  146.696798] Memory state around the buggy address:
[  146.697493]  c8e02900: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  146.698269]  c8e02980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.699023] >c8e02a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  146.699823]                                                         ^
[  146.700607]  c8e02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.701508]  c8e02b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.702333] ==================================================================
[  146.627097] ==================================================================
[  146.628547] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10c/0x3b4
[  146.629482] Read of size 1 at addr c8e02a73 by task kunit_try_catch/185
[  146.630285] 
[  146.630559] CPU: 1 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  146.631547] Hardware name: Generic DT based system
[  146.632160]  unwind_backtrace from show_stack+0x18/0x1c
[  146.633121]  show_stack from dump_stack_lvl+0x58/0x70
[  146.633690]  dump_stack_lvl from print_report+0x164/0x51c
[  146.634429]  print_report from kasan_report+0xc8/0x104
[  146.635141]  kasan_report from ksize_unpoisons_memory+0x10c/0x3b4
[  146.636185]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  146.637088]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.638231]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  146.639035]  kthread from ret_from_fork+0x14/0x30
[  146.639763] Exception stack(0xfa093fb0 to 0xfa093ff8)
[  146.640390] 3fa0:                                     00000000 00000000 00000000 00000000
[  146.641291] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  146.642207] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  146.642919] 
[  146.643250] Allocated by task 185:
[  146.643677]  kasan_set_track+0x3c/0x5c
[  146.644173]  __kasan_kmalloc+0x8c/0x94
[  146.644738]  ksize_unpoisons_memory+0xb4/0x3b4
[  146.645265]  kunit_try_run_case+0x11c/0x2e4
[  146.646223]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.647803]  kthread+0x184/0x1a8
[  146.648632]  ret_from_fork+0x14/0x30
[  146.649332] 
[  146.649547] The buggy address belongs to the object at c8e02a00
[  146.649547]  which belongs to the cache kmalloc-128 of size 128
[  146.650970] The buggy address is located 0 bytes to the right of
[  146.650970]  allocated 115-byte region [c8e02a00, c8e02a73)
[  146.652371] 
[  146.652727] The buggy address belongs to the physical page:
[  146.653440] page:b76fc2b6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e02
[  146.654458] flags: 0x800(slab|zone=0)
[  146.655008] page_type: 0xffffffff()
[  146.655514] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  146.656482] raw: 00000000
[  146.656839] page dumped because: kasan: bad access detected
[  146.657462] 
[  146.657827] Memory state around the buggy address:
[  146.658477]  c8e02900: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  146.659246]  c8e02980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.660093] >c8e02a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  146.660876]                                                      ^
[  146.661594]  c8e02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.662410]  c8e02b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.663176] ==================================================================
[  146.706279] ==================================================================
[  146.706893] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x170/0x3b4
[  146.708149] Read of size 1 at addr c8e02a7f by task kunit_try_catch/185
[  146.708941] 
[  146.709259] CPU: 1 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  146.710421] Hardware name: Generic DT based system
[  146.711179]  unwind_backtrace from show_stack+0x18/0x1c
[  146.711937]  show_stack from dump_stack_lvl+0x58/0x70
[  146.712660]  dump_stack_lvl from print_report+0x164/0x51c
[  146.713380]  print_report from kasan_report+0xc8/0x104
[  146.714119]  kasan_report from ksize_unpoisons_memory+0x170/0x3b4
[  146.714979]  ksize_unpoisons_memory from kunit_try_run_case+0x11c/0x2e4
[  146.715925]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.716948]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  146.717874]  kthread from ret_from_fork+0x14/0x30
[  146.718562] Exception stack(0xfa093fb0 to 0xfa093ff8)
[  146.719387] 3fa0:                                     00000000 00000000 00000000 00000000
[  146.720423] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  146.721438] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  146.722263] 
[  146.722613] Allocated by task 185:
[  146.723210]  kasan_set_track+0x3c/0x5c
[  146.723782]  __kasan_kmalloc+0x8c/0x94
[  146.724440]  ksize_unpoisons_memory+0xb4/0x3b4
[  146.725028]  kunit_try_run_case+0x11c/0x2e4
[  146.725672]  kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.727289]  kthread+0x184/0x1a8
[  146.727923]  ret_from_fork+0x14/0x30
[  146.728460] 
[  146.728792] The buggy address belongs to the object at c8e02a00
[  146.728792]  which belongs to the cache kmalloc-128 of size 128
[  146.730179] The buggy address is located 12 bytes to the right of
[  146.730179]  allocated 115-byte region [c8e02a00, c8e02a73)
[  146.731556] 
[  146.731906] The buggy address belongs to the physical page:
[  146.732842] page:b76fc2b6 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x48e02
[  146.733843] flags: 0x800(slab|zone=0)
[  146.734350] page_type: 0xffffffff()
[  146.734954] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001
[  146.735926] raw: 00000000
[  146.736343] page dumped because: kasan: bad access detected
[  146.737075] 
[  146.737374] Memory state around the buggy address:
[  146.737856]  c8e02900: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  146.738833]  c8e02980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.739732] >c8e02a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[  146.740551]                                                         ^
[  146.741445]  c8e02a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.742372]  c8e02b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  146.743178] ==================================================================


[   49.630670] ==================================================================
[   49.631419] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x183/0x3b0
[   49.632209] Read of size 1 at addr ffff88810284c87f by task kunit_try_catch/208
[   49.633073] 
[   49.633368] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   49.634354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.635148] Call Trace:
[   49.635477]  <TASK>
[   49.635883]  dump_stack_lvl+0x4e/0x90
[   49.636435]  print_report+0xd2/0x660
[   49.637005]  ? __virt_addr_valid+0x156/0x1e0
[   49.637518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.638339]  kasan_report+0xff/0x140
[   49.638860]  ? ksize_unpoisons_memory+0x183/0x3b0
[   49.639574]  ? ksize_unpoisons_memory+0x183/0x3b0
[   49.640141]  __asan_load1+0x66/0x70
[   49.640652]  ksize_unpoisons_memory+0x183/0x3b0
[   49.641241]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   49.641963]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   49.642633]  ? __schedule+0x70b/0x1190
[   49.643289]  ? ktime_get_ts64+0x118/0x140
[   49.644035]  kunit_try_run_case+0x126/0x290
[   49.644684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.645381]  ? __kasan_check_write+0x18/0x20
[   49.646056]  ? trace_preempt_on+0x20/0xa0
[   49.646548]  ? __kthread_parkme+0x4f/0xd0
[   49.647365]  ? preempt_count_sub+0x50/0x80
[   49.648075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.648670]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.649631]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.650457]  kthread+0x19e/0x1e0
[   49.651328]  ? __pfx_kthread+0x10/0x10
[   49.651994]  ret_from_fork+0x41/0x70
[   49.652521]  ? __pfx_kthread+0x10/0x10
[   49.653219]  ret_from_fork_asm+0x1b/0x30
[   49.653807]  </TASK>
[   49.654204] 
[   49.654444] Allocated by task 208:
[   49.654975]  kasan_save_stack+0x3c/0x60
[   49.655625]  kasan_set_track+0x29/0x40
[   49.656176]  kasan_save_alloc_info+0x22/0x30
[   49.656859]  __kasan_kmalloc+0xb7/0xc0
[   49.657413]  kmalloc_trace+0x4c/0xb0
[   49.658094]  ksize_unpoisons_memory+0xb0/0x3b0
[   49.658671]  kunit_try_run_case+0x126/0x290
[   49.659265]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.660147]  kthread+0x19e/0x1e0
[   49.660764]  ret_from_fork+0x41/0x70
[   49.661390]  ret_from_fork_asm+0x1b/0x30
[   49.661977] 
[   49.662215] The buggy address belongs to the object at ffff88810284c800
[   49.662215]  which belongs to the cache kmalloc-128 of size 128
[   49.663616] The buggy address is located 12 bytes to the right of
[   49.663616]  allocated 115-byte region [ffff88810284c800, ffff88810284c873)
[   49.665505] 
[   49.665819] The buggy address belongs to the physical page:
[   49.666413] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284c
[   49.667319] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.667884] page_type: 0xffffffff()
[   49.669006] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.669858] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.670625] page dumped because: kasan: bad access detected
[   49.671130] 
[   49.671428] Memory state around the buggy address:
[   49.672090]  ffff88810284c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.672772]  ffff88810284c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.673990] >ffff88810284c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   49.675147]                                                                 ^
[   49.675920]  ffff88810284c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.676665]  ffff88810284c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.677675] ==================================================================
[   49.586239] ==================================================================
[   49.587029] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x146/0x3b0
[   49.587868] Read of size 1 at addr ffff88810284c878 by task kunit_try_catch/208
[   49.588511] 
[   49.588866] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   49.589594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.590536] Call Trace:
[   49.590891]  <TASK>
[   49.591261]  dump_stack_lvl+0x4e/0x90
[   49.591875]  print_report+0xd2/0x660
[   49.592322]  ? __virt_addr_valid+0x156/0x1e0
[   49.592905]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.593610]  kasan_report+0xff/0x140
[   49.594215]  ? ksize_unpoisons_memory+0x146/0x3b0
[   49.594939]  ? ksize_unpoisons_memory+0x146/0x3b0
[   49.595475]  __asan_load1+0x66/0x70
[   49.595963]  ksize_unpoisons_memory+0x146/0x3b0
[   49.596617]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   49.597350]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   49.597955]  ? __schedule+0x70b/0x1190
[   49.598532]  ? ktime_get_ts64+0x118/0x140
[   49.599127]  kunit_try_run_case+0x126/0x290
[   49.599775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.600330]  ? __kasan_check_write+0x18/0x20
[   49.600962]  ? trace_preempt_on+0x20/0xa0
[   49.601524]  ? __kthread_parkme+0x4f/0xd0
[   49.602078]  ? preempt_count_sub+0x50/0x80
[   49.602584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.603245]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.603978]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.604771]  kthread+0x19e/0x1e0
[   49.605308]  ? __pfx_kthread+0x10/0x10
[   49.605920]  ret_from_fork+0x41/0x70
[   49.606475]  ? __pfx_kthread+0x10/0x10
[   49.606956]  ret_from_fork_asm+0x1b/0x30
[   49.607581]  </TASK>
[   49.607986] 
[   49.608299] Allocated by task 208:
[   49.608675]  kasan_save_stack+0x3c/0x60
[   49.609270]  kasan_set_track+0x29/0x40
[   49.609819]  kasan_save_alloc_info+0x22/0x30
[   49.610402]  __kasan_kmalloc+0xb7/0xc0
[   49.610928]  kmalloc_trace+0x4c/0xb0
[   49.611389]  ksize_unpoisons_memory+0xb0/0x3b0
[   49.612017]  kunit_try_run_case+0x126/0x290
[   49.612567]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.613264]  kthread+0x19e/0x1e0
[   49.613775]  ret_from_fork+0x41/0x70
[   49.614242]  ret_from_fork_asm+0x1b/0x30
[   49.614668] 
[   49.615003] The buggy address belongs to the object at ffff88810284c800
[   49.615003]  which belongs to the cache kmalloc-128 of size 128
[   49.616290] The buggy address is located 5 bytes to the right of
[   49.616290]  allocated 115-byte region [ffff88810284c800, ffff88810284c873)
[   49.617484] 
[   49.617753] The buggy address belongs to the physical page:
[   49.618397] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284c
[   49.619374] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.620059] page_type: 0xffffffff()
[   49.620504] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.621375] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.622072] page dumped because: kasan: bad access detected
[   49.622581] 
[   49.622906] Memory state around the buggy address:
[   49.623470]  ffff88810284c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.624141]  ffff88810284c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.624901] >ffff88810284c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   49.625655]                                                                 ^
[   49.626363]  ffff88810284c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.627172]  ffff88810284c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.627893] ==================================================================
[   49.540472] ==================================================================
[   49.541588] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x10d/0x3b0
[   49.542392] Read of size 1 at addr ffff88810284c873 by task kunit_try_catch/208
[   49.543180] 
[   49.543480] CPU: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   49.544387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.545279] Call Trace:
[   49.545681]  <TASK>
[   49.546125]  dump_stack_lvl+0x4e/0x90
[   49.546730]  print_report+0xd2/0x660
[   49.547199]  ? __virt_addr_valid+0x156/0x1e0
[   49.547944]  ? kasan_complete_mode_report_info+0x2a/0x200
[   49.548578]  kasan_report+0xff/0x140
[   49.549209]  ? ksize_unpoisons_memory+0x10d/0x3b0
[   49.549957]  ? ksize_unpoisons_memory+0x10d/0x3b0
[   49.550652]  __asan_load1+0x66/0x70
[   49.551212]  ksize_unpoisons_memory+0x10d/0x3b0
[   49.551859]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   49.552398]  ? finish_task_switch.isra.0+0xc8/0x3e0
[   49.553150]  ? __schedule+0x70b/0x1190
[   49.553764]  ? ktime_get_ts64+0x118/0x140
[   49.554335]  kunit_try_run_case+0x126/0x290
[   49.555026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.555646]  ? __kasan_check_write+0x18/0x20
[   49.556296]  ? trace_preempt_on+0x20/0xa0
[   49.556922]  ? __kthread_parkme+0x4f/0xd0
[   49.557495]  ? preempt_count_sub+0x50/0x80
[   49.558124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.558684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.559555]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.560306]  kthread+0x19e/0x1e0
[   49.560852]  ? __pfx_kthread+0x10/0x10
[   49.561426]  ret_from_fork+0x41/0x70
[   49.562049]  ? __pfx_kthread+0x10/0x10
[   49.562596]  ret_from_fork_asm+0x1b/0x30
[   49.563261]  </TASK>
[   49.563608] 
[   49.563949] Allocated by task 208:
[   49.564406]  kasan_save_stack+0x3c/0x60
[   49.565052]  kasan_set_track+0x29/0x40
[   49.565520]  kasan_save_alloc_info+0x22/0x30
[   49.566213]  __kasan_kmalloc+0xb7/0xc0
[   49.566816]  kmalloc_trace+0x4c/0xb0
[   49.567410]  ksize_unpoisons_memory+0xb0/0x3b0
[   49.567995]  kunit_try_run_case+0x126/0x290
[   49.568613]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.569389]  kthread+0x19e/0x1e0
[   49.569933]  ret_from_fork+0x41/0x70
[   49.570452]  ret_from_fork_asm+0x1b/0x30
[   49.571102] 
[   49.571395] The buggy address belongs to the object at ffff88810284c800
[   49.571395]  which belongs to the cache kmalloc-128 of size 128
[   49.572652] The buggy address is located 0 bytes to the right of
[   49.572652]  allocated 115-byte region [ffff88810284c800, ffff88810284c873)
[   49.574037] 
[   49.574325] The buggy address belongs to the physical page:
[   49.574956] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10284c
[   49.576064] flags: 0x200000000000800(slab|node=0|zone=2)
[   49.576550] page_type: 0xffffffff()
[   49.577050] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000
[   49.577856] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   49.579021] page dumped because: kasan: bad access detected
[   49.579586] 
[   49.579888] Memory state around the buggy address:
[   49.580413]  ffff88810284c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.581129]  ffff88810284c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.581885] >ffff88810284c800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   49.582508]                                                              ^
[   49.583187]  ffff88810284c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.583939]  ffff88810284c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.584569] ==================================================================