Date
May 15, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 |
[ 66.001325] ================================================================== [ 66.008420] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 66.015447] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 66.022998] [ 66.024483] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 66.024541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.024558] Hardware name: WinLink E850-96 board (DT) [ 66.024580] Call trace: [ 66.024596] show_stack+0x20/0x38 (C) [ 66.024634] dump_stack_lvl+0x8c/0xd0 [ 66.024667] print_report+0x118/0x608 [ 66.024702] kasan_report+0xdc/0x128 [ 66.024733] kasan_check_range+0x100/0x1a8 [ 66.024767] __kasan_check_write+0x20/0x30 [ 66.024801] copy_user_test_oob+0x434/0xec8 [ 66.024832] kunit_try_run_case+0x170/0x3f0 [ 66.024864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.024902] kthread+0x328/0x630 [ 66.024937] ret_from_fork+0x10/0x20 [ 66.024973] [ 66.091922] Allocated by task 330: [ 66.095309] kasan_save_stack+0x3c/0x68 [ 66.099126] kasan_save_track+0x20/0x40 [ 66.102946] kasan_save_alloc_info+0x40/0x58 [ 66.107199] __kasan_kmalloc+0xd4/0xd8 [ 66.110931] __kmalloc_noprof+0x190/0x4d0 [ 66.114924] kunit_kmalloc_array+0x34/0x88 [ 66.119004] copy_user_test_oob+0xac/0xec8 [ 66.123084] kunit_try_run_case+0x170/0x3f0 [ 66.127250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.132719] kthread+0x328/0x630 [ 66.135932] ret_from_fork+0x10/0x20 [ 66.139490] [ 66.140967] The buggy address belongs to the object at ffff000803cf7000 [ 66.140967] which belongs to the cache kmalloc-128 of size 128 [ 66.153469] The buggy address is located 0 bytes inside of [ 66.153469] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 66.165878] [ 66.167356] The buggy address belongs to the physical page: [ 66.172913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 66.180897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.188536] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.195480] page_type: f5(slab) [ 66.198618] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.206336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.214062] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.221873] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.229687] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 66.237498] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.245304] page dumped because: kasan: bad access detected [ 66.250860] [ 66.252335] Memory state around the buggy address: [ 66.257117] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.264318] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.271524] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.278724] ^ [ 66.285845] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.293050] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.300253] ================================================================== [ 66.307584] ================================================================== [ 66.314666] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 66.321692] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 66.329157] [ 66.330641] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 66.330696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.330710] Hardware name: WinLink E850-96 board (DT) [ 66.330731] Call trace: [ 66.330746] show_stack+0x20/0x38 (C) [ 66.330779] dump_stack_lvl+0x8c/0xd0 [ 66.330809] print_report+0x118/0x608 [ 66.330840] kasan_report+0xdc/0x128 [ 66.330870] kasan_check_range+0x100/0x1a8 [ 66.330904] __kasan_check_read+0x20/0x30 [ 66.330935] copy_user_test_oob+0x4a0/0xec8 [ 66.330966] kunit_try_run_case+0x170/0x3f0 [ 66.330998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.331035] kthread+0x328/0x630 [ 66.331071] ret_from_fork+0x10/0x20 [ 66.331102] [ 66.397993] Allocated by task 330: [ 66.401380] kasan_save_stack+0x3c/0x68 [ 66.405198] kasan_save_track+0x20/0x40 [ 66.409019] kasan_save_alloc_info+0x40/0x58 [ 66.413271] __kasan_kmalloc+0xd4/0xd8 [ 66.417003] __kmalloc_noprof+0x190/0x4d0 [ 66.420996] kunit_kmalloc_array+0x34/0x88 [ 66.425076] copy_user_test_oob+0xac/0xec8 [ 66.429156] kunit_try_run_case+0x170/0x3f0 [ 66.433322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.438791] kthread+0x328/0x630 [ 66.442004] ret_from_fork+0x10/0x20 [ 66.445561] [ 66.447037] The buggy address belongs to the object at ffff000803cf7000 [ 66.447037] which belongs to the cache kmalloc-128 of size 128 [ 66.459540] The buggy address is located 0 bytes inside of [ 66.459540] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 66.471950] [ 66.473426] The buggy address belongs to the physical page: [ 66.478987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 66.486969] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 66.494608] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 66.501550] page_type: f5(slab) [ 66.504687] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.512408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.520134] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 66.527945] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.535758] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 66.543570] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 66.551376] page dumped because: kasan: bad access detected [ 66.556931] [ 66.558408] Memory state around the buggy address: [ 66.563187] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.570390] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.577595] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 66.584795] ^ [ 66.591917] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.599122] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.606325] ================================================================== [ 65.083291] ================================================================== [ 65.090030] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 65.097058] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 65.104524] [ 65.106009] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 65.106066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.106087] Hardware name: WinLink E850-96 board (DT) [ 65.106107] Call trace: [ 65.106122] show_stack+0x20/0x38 (C) [ 65.106158] dump_stack_lvl+0x8c/0xd0 [ 65.106192] print_report+0x118/0x608 [ 65.106228] kasan_report+0xdc/0x128 [ 65.106258] kasan_check_range+0x100/0x1a8 [ 65.106295] __kasan_check_read+0x20/0x30 [ 65.106331] copy_user_test_oob+0x728/0xec8 [ 65.106363] kunit_try_run_case+0x170/0x3f0 [ 65.106399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.106437] kthread+0x328/0x630 [ 65.106472] ret_from_fork+0x10/0x20 [ 65.106508] [ 65.173359] Allocated by task 330: [ 65.176746] kasan_save_stack+0x3c/0x68 [ 65.180563] kasan_save_track+0x20/0x40 [ 65.184384] kasan_save_alloc_info+0x40/0x58 [ 65.188636] __kasan_kmalloc+0xd4/0xd8 [ 65.192368] __kmalloc_noprof+0x190/0x4d0 [ 65.196361] kunit_kmalloc_array+0x34/0x88 [ 65.200441] copy_user_test_oob+0xac/0xec8 [ 65.204521] kunit_try_run_case+0x170/0x3f0 [ 65.208688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.214157] kthread+0x328/0x630 [ 65.217370] ret_from_fork+0x10/0x20 [ 65.220927] [ 65.222405] The buggy address belongs to the object at ffff000803cf7000 [ 65.222405] which belongs to the cache kmalloc-128 of size 128 [ 65.234905] The buggy address is located 0 bytes inside of [ 65.234905] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 65.247316] [ 65.248795] The buggy address belongs to the physical page: [ 65.254351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 65.262334] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.269975] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.276916] page_type: f5(slab) [ 65.280054] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.287773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.295499] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.303311] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.311124] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 65.318936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.326742] page dumped because: kasan: bad access detected [ 65.332297] [ 65.333772] Memory state around the buggy address: [ 65.338555] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.345757] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.352962] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.360161] ^ [ 65.367283] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.374487] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.381689] ================================================================== [ 65.389222] ================================================================== [ 65.396104] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 65.403131] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 65.410683] [ 65.412165] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 65.412223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.412240] Hardware name: WinLink E850-96 board (DT) [ 65.412258] Call trace: [ 65.412273] show_stack+0x20/0x38 (C) [ 65.412311] dump_stack_lvl+0x8c/0xd0 [ 65.412345] print_report+0x118/0x608 [ 65.412379] kasan_report+0xdc/0x128 [ 65.412411] kasan_check_range+0x100/0x1a8 [ 65.412446] __kasan_check_write+0x20/0x30 [ 65.412480] copy_user_test_oob+0x35c/0xec8 [ 65.412511] kunit_try_run_case+0x170/0x3f0 [ 65.412545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.412583] kthread+0x328/0x630 [ 65.412618] ret_from_fork+0x10/0x20 [ 65.412657] [ 65.479606] Allocated by task 330: [ 65.482993] kasan_save_stack+0x3c/0x68 [ 65.486810] kasan_save_track+0x20/0x40 [ 65.490630] kasan_save_alloc_info+0x40/0x58 [ 65.494882] __kasan_kmalloc+0xd4/0xd8 [ 65.498614] __kmalloc_noprof+0x190/0x4d0 [ 65.502607] kunit_kmalloc_array+0x34/0x88 [ 65.506687] copy_user_test_oob+0xac/0xec8 [ 65.510767] kunit_try_run_case+0x170/0x3f0 [ 65.514933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.520402] kthread+0x328/0x630 [ 65.523615] ret_from_fork+0x10/0x20 [ 65.527172] [ 65.528650] The buggy address belongs to the object at ffff000803cf7000 [ 65.528650] which belongs to the cache kmalloc-128 of size 128 [ 65.541151] The buggy address is located 0 bytes inside of [ 65.541151] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 65.553561] [ 65.555040] The buggy address belongs to the physical page: [ 65.560596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 65.568581] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.576220] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.583163] page_type: f5(slab) [ 65.586298] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.594019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.601745] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.609556] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.617369] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 65.625181] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.632987] page dumped because: kasan: bad access detected [ 65.638542] [ 65.640018] Memory state around the buggy address: [ 65.644800] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.652001] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.659207] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.666407] ^ [ 65.673528] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.680733] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.687934] ================================================================== [ 64.771337] ================================================================== [ 64.783789] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 64.790812] Write of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 64.798366] [ 64.799852] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 64.799914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.799933] Hardware name: WinLink E850-96 board (DT) [ 64.799957] Call trace: [ 64.799971] show_stack+0x20/0x38 (C) [ 64.800006] dump_stack_lvl+0x8c/0xd0 [ 64.800041] print_report+0x118/0x608 [ 64.800077] kasan_report+0xdc/0x128 [ 64.800111] kasan_check_range+0x100/0x1a8 [ 64.800147] __kasan_check_write+0x20/0x30 [ 64.800181] copy_user_test_oob+0x234/0xec8 [ 64.800212] kunit_try_run_case+0x170/0x3f0 [ 64.800246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.800281] kthread+0x328/0x630 [ 64.800317] ret_from_fork+0x10/0x20 [ 64.800353] [ 64.867289] Allocated by task 330: [ 64.870677] kasan_save_stack+0x3c/0x68 [ 64.874492] kasan_save_track+0x20/0x40 [ 64.878312] kasan_save_alloc_info+0x40/0x58 [ 64.882564] __kasan_kmalloc+0xd4/0xd8 [ 64.886297] __kmalloc_noprof+0x190/0x4d0 [ 64.890290] kunit_kmalloc_array+0x34/0x88 [ 64.894369] copy_user_test_oob+0xac/0xec8 [ 64.898449] kunit_try_run_case+0x170/0x3f0 [ 64.902616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.908085] kthread+0x328/0x630 [ 64.911298] ret_from_fork+0x10/0x20 [ 64.914855] [ 64.916333] The buggy address belongs to the object at ffff000803cf7000 [ 64.916333] which belongs to the cache kmalloc-128 of size 128 [ 64.928833] The buggy address is located 0 bytes inside of [ 64.928833] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 64.941244] [ 64.942724] The buggy address belongs to the physical page: [ 64.948279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 64.956263] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 64.963902] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 64.970846] page_type: f5(slab) [ 64.973984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.981701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.989430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 64.997239] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.005052] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 65.012864] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.020670] page dumped because: kasan: bad access detected [ 65.026225] [ 65.027701] Memory state around the buggy address: [ 65.032483] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.039684] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.046890] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.054089] ^ [ 65.061211] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.068416] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.075618] ================================================================== [ 65.695262] ================================================================== [ 65.702347] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 65.709375] Read of size 121 at addr ffff000803cf7000 by task kunit_try_catch/330 [ 65.716840] [ 65.718325] CPU: 1 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc6-next-20250515 #1 PREEMPT [ 65.718376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.718394] Hardware name: WinLink E850-96 board (DT) [ 65.718417] Call trace: [ 65.718431] show_stack+0x20/0x38 (C) [ 65.718463] dump_stack_lvl+0x8c/0xd0 [ 65.718494] print_report+0x118/0x608 [ 65.718526] kasan_report+0xdc/0x128 [ 65.718558] kasan_check_range+0x100/0x1a8 [ 65.718594] __kasan_check_read+0x20/0x30 [ 65.718628] copy_user_test_oob+0x3c8/0xec8 [ 65.718660] kunit_try_run_case+0x170/0x3f0 [ 65.718690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.718727] kthread+0x328/0x630 [ 65.718759] ret_from_fork+0x10/0x20 [ 65.718794] [ 65.785675] Allocated by task 330: [ 65.789063] kasan_save_stack+0x3c/0x68 [ 65.792881] kasan_save_track+0x20/0x40 [ 65.796701] kasan_save_alloc_info+0x40/0x58 [ 65.800953] __kasan_kmalloc+0xd4/0xd8 [ 65.804686] __kmalloc_noprof+0x190/0x4d0 [ 65.808679] kunit_kmalloc_array+0x34/0x88 [ 65.812758] copy_user_test_oob+0xac/0xec8 [ 65.816839] kunit_try_run_case+0x170/0x3f0 [ 65.821005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.826474] kthread+0x328/0x630 [ 65.829687] ret_from_fork+0x10/0x20 [ 65.833245] [ 65.834720] The buggy address belongs to the object at ffff000803cf7000 [ 65.834720] which belongs to the cache kmalloc-128 of size 128 [ 65.847224] The buggy address is located 0 bytes inside of [ 65.847224] allocated 120-byte region [ffff000803cf7000, ffff000803cf7078) [ 65.859633] [ 65.861112] The buggy address belongs to the physical page: [ 65.866668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883cf6 [ 65.874652] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 65.882292] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 65.889234] page_type: f5(slab) [ 65.892369] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.900090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.907817] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 65.915628] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.923441] head: 0bfffe0000000001 fffffdffe00f3d81 00000000ffffffff 00000000ffffffff [ 65.931253] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 65.939058] page dumped because: kasan: bad access detected [ 65.944614] [ 65.946090] Memory state around the buggy address: [ 65.950872] ffff000803cf6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 65.958072] ffff000803cf6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.965279] >ffff000803cf7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 65.972478] ^ [ 65.979600] ffff000803cf7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.986805] ffff000803cf7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.994006] ==================================================================