Hay
Date
May 15, 2025, 10:38 a.m.

Environment
e850-96

[   66.001325] ==================================================================
[   66.008420] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   66.015447] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   66.022998] 
[   66.024483] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   66.024541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.024558] Hardware name: WinLink E850-96 board (DT)
[   66.024580] Call trace:
[   66.024596]  show_stack+0x20/0x38 (C)
[   66.024634]  dump_stack_lvl+0x8c/0xd0
[   66.024667]  print_report+0x118/0x608
[   66.024702]  kasan_report+0xdc/0x128
[   66.024733]  kasan_check_range+0x100/0x1a8
[   66.024767]  __kasan_check_write+0x20/0x30
[   66.024801]  copy_user_test_oob+0x434/0xec8
[   66.024832]  kunit_try_run_case+0x170/0x3f0
[   66.024864]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.024902]  kthread+0x328/0x630
[   66.024937]  ret_from_fork+0x10/0x20
[   66.024973] 
[   66.091922] Allocated by task 330:
[   66.095309]  kasan_save_stack+0x3c/0x68
[   66.099126]  kasan_save_track+0x20/0x40
[   66.102946]  kasan_save_alloc_info+0x40/0x58
[   66.107199]  __kasan_kmalloc+0xd4/0xd8
[   66.110931]  __kmalloc_noprof+0x190/0x4d0
[   66.114924]  kunit_kmalloc_array+0x34/0x88
[   66.119004]  copy_user_test_oob+0xac/0xec8
[   66.123084]  kunit_try_run_case+0x170/0x3f0
[   66.127250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.132719]  kthread+0x328/0x630
[   66.135932]  ret_from_fork+0x10/0x20
[   66.139490] 
[   66.140967] The buggy address belongs to the object at ffff000803cf7000
[   66.140967]  which belongs to the cache kmalloc-128 of size 128
[   66.153469] The buggy address is located 0 bytes inside of
[   66.153469]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   66.165878] 
[   66.167356] The buggy address belongs to the physical page:
[   66.172913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   66.180897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.188536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.195480] page_type: f5(slab)
[   66.198618] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.206336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.214062] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.221873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.229687] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   66.237498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.245304] page dumped because: kasan: bad access detected
[   66.250860] 
[   66.252335] Memory state around the buggy address:
[   66.257117]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.264318]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.271524] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.278724]                                                                 ^
[   66.285845]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.293050]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.300253] ==================================================================
[   66.307584] ==================================================================
[   66.314666] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   66.321692] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   66.329157] 
[   66.330641] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   66.330696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.330710] Hardware name: WinLink E850-96 board (DT)
[   66.330731] Call trace:
[   66.330746]  show_stack+0x20/0x38 (C)
[   66.330779]  dump_stack_lvl+0x8c/0xd0
[   66.330809]  print_report+0x118/0x608
[   66.330840]  kasan_report+0xdc/0x128
[   66.330870]  kasan_check_range+0x100/0x1a8
[   66.330904]  __kasan_check_read+0x20/0x30
[   66.330935]  copy_user_test_oob+0x4a0/0xec8
[   66.330966]  kunit_try_run_case+0x170/0x3f0
[   66.330998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.331035]  kthread+0x328/0x630
[   66.331071]  ret_from_fork+0x10/0x20
[   66.331102] 
[   66.397993] Allocated by task 330:
[   66.401380]  kasan_save_stack+0x3c/0x68
[   66.405198]  kasan_save_track+0x20/0x40
[   66.409019]  kasan_save_alloc_info+0x40/0x58
[   66.413271]  __kasan_kmalloc+0xd4/0xd8
[   66.417003]  __kmalloc_noprof+0x190/0x4d0
[   66.420996]  kunit_kmalloc_array+0x34/0x88
[   66.425076]  copy_user_test_oob+0xac/0xec8
[   66.429156]  kunit_try_run_case+0x170/0x3f0
[   66.433322]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.438791]  kthread+0x328/0x630
[   66.442004]  ret_from_fork+0x10/0x20
[   66.445561] 
[   66.447037] The buggy address belongs to the object at ffff000803cf7000
[   66.447037]  which belongs to the cache kmalloc-128 of size 128
[   66.459540] The buggy address is located 0 bytes inside of
[   66.459540]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   66.471950] 
[   66.473426] The buggy address belongs to the physical page:
[   66.478987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   66.486969] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.494608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.501550] page_type: f5(slab)
[   66.504687] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.512408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.520134] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.527945] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.535758] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   66.543570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.551376] page dumped because: kasan: bad access detected
[   66.556931] 
[   66.558408] Memory state around the buggy address:
[   66.563187]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.570390]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.577595] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.584795]                                                                 ^
[   66.591917]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.599122]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.606325] ==================================================================
[   65.083291] ==================================================================
[   65.090030] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   65.097058] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   65.104524] 
[   65.106009] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   65.106066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.106087] Hardware name: WinLink E850-96 board (DT)
[   65.106107] Call trace:
[   65.106122]  show_stack+0x20/0x38 (C)
[   65.106158]  dump_stack_lvl+0x8c/0xd0
[   65.106192]  print_report+0x118/0x608
[   65.106228]  kasan_report+0xdc/0x128
[   65.106258]  kasan_check_range+0x100/0x1a8
[   65.106295]  __kasan_check_read+0x20/0x30
[   65.106331]  copy_user_test_oob+0x728/0xec8
[   65.106363]  kunit_try_run_case+0x170/0x3f0
[   65.106399]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.106437]  kthread+0x328/0x630
[   65.106472]  ret_from_fork+0x10/0x20
[   65.106508] 
[   65.173359] Allocated by task 330:
[   65.176746]  kasan_save_stack+0x3c/0x68
[   65.180563]  kasan_save_track+0x20/0x40
[   65.184384]  kasan_save_alloc_info+0x40/0x58
[   65.188636]  __kasan_kmalloc+0xd4/0xd8
[   65.192368]  __kmalloc_noprof+0x190/0x4d0
[   65.196361]  kunit_kmalloc_array+0x34/0x88
[   65.200441]  copy_user_test_oob+0xac/0xec8
[   65.204521]  kunit_try_run_case+0x170/0x3f0
[   65.208688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.214157]  kthread+0x328/0x630
[   65.217370]  ret_from_fork+0x10/0x20
[   65.220927] 
[   65.222405] The buggy address belongs to the object at ffff000803cf7000
[   65.222405]  which belongs to the cache kmalloc-128 of size 128
[   65.234905] The buggy address is located 0 bytes inside of
[   65.234905]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   65.247316] 
[   65.248795] The buggy address belongs to the physical page:
[   65.254351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   65.262334] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.269975] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.276916] page_type: f5(slab)
[   65.280054] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.287773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.295499] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.303311] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.311124] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   65.318936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.326742] page dumped because: kasan: bad access detected
[   65.332297] 
[   65.333772] Memory state around the buggy address:
[   65.338555]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.345757]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.352962] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.360161]                                                                 ^
[   65.367283]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.374487]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.381689] ==================================================================
[   65.389222] ==================================================================
[   65.396104] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   65.403131] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   65.410683] 
[   65.412165] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   65.412223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.412240] Hardware name: WinLink E850-96 board (DT)
[   65.412258] Call trace:
[   65.412273]  show_stack+0x20/0x38 (C)
[   65.412311]  dump_stack_lvl+0x8c/0xd0
[   65.412345]  print_report+0x118/0x608
[   65.412379]  kasan_report+0xdc/0x128
[   65.412411]  kasan_check_range+0x100/0x1a8
[   65.412446]  __kasan_check_write+0x20/0x30
[   65.412480]  copy_user_test_oob+0x35c/0xec8
[   65.412511]  kunit_try_run_case+0x170/0x3f0
[   65.412545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.412583]  kthread+0x328/0x630
[   65.412618]  ret_from_fork+0x10/0x20
[   65.412657] 
[   65.479606] Allocated by task 330:
[   65.482993]  kasan_save_stack+0x3c/0x68
[   65.486810]  kasan_save_track+0x20/0x40
[   65.490630]  kasan_save_alloc_info+0x40/0x58
[   65.494882]  __kasan_kmalloc+0xd4/0xd8
[   65.498614]  __kmalloc_noprof+0x190/0x4d0
[   65.502607]  kunit_kmalloc_array+0x34/0x88
[   65.506687]  copy_user_test_oob+0xac/0xec8
[   65.510767]  kunit_try_run_case+0x170/0x3f0
[   65.514933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.520402]  kthread+0x328/0x630
[   65.523615]  ret_from_fork+0x10/0x20
[   65.527172] 
[   65.528650] The buggy address belongs to the object at ffff000803cf7000
[   65.528650]  which belongs to the cache kmalloc-128 of size 128
[   65.541151] The buggy address is located 0 bytes inside of
[   65.541151]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   65.553561] 
[   65.555040] The buggy address belongs to the physical page:
[   65.560596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   65.568581] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.576220] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.583163] page_type: f5(slab)
[   65.586298] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.594019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.601745] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.609556] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.617369] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   65.625181] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.632987] page dumped because: kasan: bad access detected
[   65.638542] 
[   65.640018] Memory state around the buggy address:
[   65.644800]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.652001]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.659207] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.666407]                                                                 ^
[   65.673528]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.680733]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.687934] ==================================================================
[   64.771337] ==================================================================
[   64.783789] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   64.790812] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   64.798366] 
[   64.799852] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   64.799914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   64.799933] Hardware name: WinLink E850-96 board (DT)
[   64.799957] Call trace:
[   64.799971]  show_stack+0x20/0x38 (C)
[   64.800006]  dump_stack_lvl+0x8c/0xd0
[   64.800041]  print_report+0x118/0x608
[   64.800077]  kasan_report+0xdc/0x128
[   64.800111]  kasan_check_range+0x100/0x1a8
[   64.800147]  __kasan_check_write+0x20/0x30
[   64.800181]  copy_user_test_oob+0x234/0xec8
[   64.800212]  kunit_try_run_case+0x170/0x3f0
[   64.800246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.800281]  kthread+0x328/0x630
[   64.800317]  ret_from_fork+0x10/0x20
[   64.800353] 
[   64.867289] Allocated by task 330:
[   64.870677]  kasan_save_stack+0x3c/0x68
[   64.874492]  kasan_save_track+0x20/0x40
[   64.878312]  kasan_save_alloc_info+0x40/0x58
[   64.882564]  __kasan_kmalloc+0xd4/0xd8
[   64.886297]  __kmalloc_noprof+0x190/0x4d0
[   64.890290]  kunit_kmalloc_array+0x34/0x88
[   64.894369]  copy_user_test_oob+0xac/0xec8
[   64.898449]  kunit_try_run_case+0x170/0x3f0
[   64.902616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   64.908085]  kthread+0x328/0x630
[   64.911298]  ret_from_fork+0x10/0x20
[   64.914855] 
[   64.916333] The buggy address belongs to the object at ffff000803cf7000
[   64.916333]  which belongs to the cache kmalloc-128 of size 128
[   64.928833] The buggy address is located 0 bytes inside of
[   64.928833]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   64.941244] 
[   64.942724] The buggy address belongs to the physical page:
[   64.948279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   64.956263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   64.963902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   64.970846] page_type: f5(slab)
[   64.973984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.981701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   64.989430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   64.997239] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.005052] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   65.012864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.020670] page dumped because: kasan: bad access detected
[   65.026225] 
[   65.027701] Memory state around the buggy address:
[   65.032483]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.039684]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.046890] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.054089]                                                                 ^
[   65.061211]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.068416]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.075618] ==================================================================
[   65.695262] ==================================================================
[   65.702347] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   65.709375] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330
[   65.716840] 
[   65.718325] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   65.718376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   65.718394] Hardware name: WinLink E850-96 board (DT)
[   65.718417] Call trace:
[   65.718431]  show_stack+0x20/0x38 (C)
[   65.718463]  dump_stack_lvl+0x8c/0xd0
[   65.718494]  print_report+0x118/0x608
[   65.718526]  kasan_report+0xdc/0x128
[   65.718558]  kasan_check_range+0x100/0x1a8
[   65.718594]  __kasan_check_read+0x20/0x30
[   65.718628]  copy_user_test_oob+0x3c8/0xec8
[   65.718660]  kunit_try_run_case+0x170/0x3f0
[   65.718690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.718727]  kthread+0x328/0x630
[   65.718759]  ret_from_fork+0x10/0x20
[   65.718794] 
[   65.785675] Allocated by task 330:
[   65.789063]  kasan_save_stack+0x3c/0x68
[   65.792881]  kasan_save_track+0x20/0x40
[   65.796701]  kasan_save_alloc_info+0x40/0x58
[   65.800953]  __kasan_kmalloc+0xd4/0xd8
[   65.804686]  __kmalloc_noprof+0x190/0x4d0
[   65.808679]  kunit_kmalloc_array+0x34/0x88
[   65.812758]  copy_user_test_oob+0xac/0xec8
[   65.816839]  kunit_try_run_case+0x170/0x3f0
[   65.821005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   65.826474]  kthread+0x328/0x630
[   65.829687]  ret_from_fork+0x10/0x20
[   65.833245] 
[   65.834720] The buggy address belongs to the object at ffff000803cf7000
[   65.834720]  which belongs to the cache kmalloc-128 of size 128
[   65.847224] The buggy address is located 0 bytes inside of
[   65.847224]  allocated 120-byte region [ffff000803cf7000, ffff000803cf7078)
[   65.859633] 
[   65.861112] The buggy address belongs to the physical page:
[   65.866668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6
[   65.874652] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   65.882292] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   65.889234] page_type: f5(slab)
[   65.892369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.900090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.907817] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   65.915628] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   65.923441] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff
[   65.931253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   65.939058] page dumped because: kasan: bad access detected
[   65.944614] 
[   65.946090] Memory state around the buggy address:
[   65.950872]  ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   65.958072]  ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.965279] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   65.972478]                                                                 ^
[   65.979600]  ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.986805]  ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   65.994006] ==================================================================