Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   20.264870] ==================================================================
[   20.266404] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   20.266512] Write of size 1 at addr fff00000c77ac378 by task kunit_try_catch/286
[   20.266563] 
[   20.266600] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.267224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.267263] Hardware name: linux,dummy-virt (DT)
[   20.267324] Call trace:
[   20.267348]  show_stack+0x20/0x38 (C)
[   20.267399]  dump_stack_lvl+0x8c/0xd0
[   20.267657]  print_report+0x118/0x608
[   20.267942]  kasan_report+0xdc/0x128
[   20.268262]  __asan_report_store1_noabort+0x20/0x30
[   20.268484]  strncpy_from_user+0x270/0x2a0
[   20.268544]  copy_user_test_oob+0x5c0/0xec8
[   20.268855]  kunit_try_run_case+0x170/0x3f0
[   20.268938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.269125]  kthread+0x328/0x630
[   20.269265]  ret_from_fork+0x10/0x20
[   20.269593] 
[   20.269626] Allocated by task 286:
[   20.269658]  kasan_save_stack+0x3c/0x68
[   20.270177]  kasan_save_track+0x20/0x40
[   20.270442]  kasan_save_alloc_info+0x40/0x58
[   20.270508]  __kasan_kmalloc+0xd4/0xd8
[   20.270549]  __kmalloc_noprof+0x198/0x4c8
[   20.271043]  kunit_kmalloc_array+0x34/0x88
[   20.271100]  copy_user_test_oob+0xac/0xec8
[   20.271142]  kunit_try_run_case+0x170/0x3f0
[   20.271182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.271227]  kthread+0x328/0x630
[   20.271261]  ret_from_fork+0x10/0x20
[   20.271998] 
[   20.272185] The buggy address belongs to the object at fff00000c77ac300
[   20.272185]  which belongs to the cache kmalloc-128 of size 128
[   20.272349] The buggy address is located 0 bytes to the right of
[   20.272349]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.272539] 
[   20.272658] The buggy address belongs to the physical page:
[   20.272869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.273161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.273736] page_type: f5(slab)
[   20.273937] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.274039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.274420] page dumped because: kasan: bad access detected
[   20.274496] 
[   20.274562] Memory state around the buggy address:
[   20.274937]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.275205]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.275347] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.275393]                                                                 ^
[   20.275578]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.275866]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.276125] ==================================================================
[   20.254544] ==================================================================
[   20.254995] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   20.255341] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286
[   20.255397] 
[   20.255429] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.256056] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.256685] Hardware name: linux,dummy-virt (DT)
[   20.256913] Call trace:
[   20.256939]  show_stack+0x20/0x38 (C)
[   20.257151]  dump_stack_lvl+0x8c/0xd0
[   20.257388]  print_report+0x118/0x608
[   20.257437]  kasan_report+0xdc/0x128
[   20.257484]  kasan_check_range+0x100/0x1a8
[   20.257532]  __kasan_check_write+0x20/0x30
[   20.257578]  strncpy_from_user+0x3c/0x2a0
[   20.258084]  copy_user_test_oob+0x5c0/0xec8
[   20.258161]  kunit_try_run_case+0x170/0x3f0
[   20.258215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.258270]  kthread+0x328/0x630
[   20.258571]  ret_from_fork+0x10/0x20
[   20.258695] 
[   20.258716] Allocated by task 286:
[   20.258906]  kasan_save_stack+0x3c/0x68
[   20.258956]  kasan_save_track+0x20/0x40
[   20.259121]  kasan_save_alloc_info+0x40/0x58
[   20.259199]  __kasan_kmalloc+0xd4/0xd8
[   20.259241]  __kmalloc_noprof+0x198/0x4c8
[   20.259280]  kunit_kmalloc_array+0x34/0x88
[   20.259319]  copy_user_test_oob+0xac/0xec8
[   20.259499]  kunit_try_run_case+0x170/0x3f0
[   20.259939]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.260189]  kthread+0x328/0x630
[   20.260224]  ret_from_fork+0x10/0x20
[   20.260262] 
[   20.260489] The buggy address belongs to the object at fff00000c77ac300
[   20.260489]  which belongs to the cache kmalloc-128 of size 128
[   20.260777] The buggy address is located 0 bytes inside of
[   20.260777]  allocated 120-byte region [fff00000c77ac300, fff00000c77ac378)
[   20.260912] 
[   20.261063] The buggy address belongs to the physical page:
[   20.261120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.261405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.261630] page_type: f5(slab)
[   20.261673] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.261726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.262047] page dumped because: kasan: bad access detected
[   20.262240] 
[   20.262296] Memory state around the buggy address:
[   20.262656]  fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.262724]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.262854] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.263064]                                                                 ^
[   20.263120]  fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.263175]  fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.263598] ==================================================================

[   19.847384] ==================================================================
[   19.847457] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   19.847516] Write of size 1 at addr fff00000c76c9378 by task kunit_try_catch/286
[   19.847718] 
[   19.847857] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.847970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.847999] Hardware name: linux,dummy-virt (DT)
[   19.848035] Call trace:
[   19.848299]  show_stack+0x20/0x38 (C)
[   19.848418]  dump_stack_lvl+0x8c/0xd0
[   19.848469]  print_report+0x118/0x608
[   19.848696]  kasan_report+0xdc/0x128
[   19.848947]  __asan_report_store1_noabort+0x20/0x30
[   19.849148]  strncpy_from_user+0x270/0x2a0
[   19.849254]  copy_user_test_oob+0x5c0/0xec8
[   19.849363]  kunit_try_run_case+0x170/0x3f0
[   19.849490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.849562]  kthread+0x328/0x630
[   19.849631]  ret_from_fork+0x10/0x20
[   19.849705] 
[   19.849856] Allocated by task 286:
[   19.850067]  kasan_save_stack+0x3c/0x68
[   19.850140]  kasan_save_track+0x20/0x40
[   19.850454]  kasan_save_alloc_info+0x40/0x58
[   19.850541]  __kasan_kmalloc+0xd4/0xd8
[   19.850603]  __kmalloc_noprof+0x198/0x4c8
[   19.850719]  kunit_kmalloc_array+0x34/0x88
[   19.850787]  copy_user_test_oob+0xac/0xec8
[   19.850924]  kunit_try_run_case+0x170/0x3f0
[   19.850977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.851053]  kthread+0x328/0x630
[   19.851169]  ret_from_fork+0x10/0x20
[   19.851212] 
[   19.851234] The buggy address belongs to the object at fff00000c76c9300
[   19.851234]  which belongs to the cache kmalloc-128 of size 128
[   19.851308] The buggy address is located 0 bytes to the right of
[   19.851308]  allocated 120-byte region [fff00000c76c9300, fff00000c76c9378)
[   19.851579] 
[   19.851743] The buggy address belongs to the physical page:
[   19.851826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.852137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.852350] page_type: f5(slab)
[   19.852420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.852492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.852725] page dumped because: kasan: bad access detected
[   19.852841] 
[   19.852881] Memory state around the buggy address:
[   19.852929]  fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.853257]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853473] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.853566]                                                                 ^
[   19.853686]  fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853741]  fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853881] ==================================================================
[   19.841739] ==================================================================
[   19.841788] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   19.841851] Write of size 121 at addr fff00000c76c9300 by task kunit_try_catch/286
[   19.841907] 
[   19.841950] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.842031] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.842059] Hardware name: linux,dummy-virt (DT)
[   19.842090] Call trace:
[   19.842125]  show_stack+0x20/0x38 (C)
[   19.842175]  dump_stack_lvl+0x8c/0xd0
[   19.842223]  print_report+0x118/0x608
[   19.842278]  kasan_report+0xdc/0x128
[   19.842326]  kasan_check_range+0x100/0x1a8
[   19.842374]  __kasan_check_write+0x20/0x30
[   19.842423]  strncpy_from_user+0x3c/0x2a0
[   19.842483]  copy_user_test_oob+0x5c0/0xec8
[   19.842532]  kunit_try_run_case+0x170/0x3f0
[   19.842587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.842642]  kthread+0x328/0x630
[   19.842686]  ret_from_fork+0x10/0x20
[   19.842734] 
[   19.842754] Allocated by task 286:
[   19.842784]  kasan_save_stack+0x3c/0x68
[   19.842823]  kasan_save_track+0x20/0x40
[   19.842869]  kasan_save_alloc_info+0x40/0x58
[   19.842920]  __kasan_kmalloc+0xd4/0xd8
[   19.843450]  __kmalloc_noprof+0x198/0x4c8
[   19.843490]  kunit_kmalloc_array+0x34/0x88
[   19.843537]  copy_user_test_oob+0xac/0xec8
[   19.843577]  kunit_try_run_case+0x170/0x3f0
[   19.843615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.843660]  kthread+0x328/0x630
[   19.843693]  ret_from_fork+0x10/0x20
[   19.843731] 
[   19.843752] The buggy address belongs to the object at fff00000c76c9300
[   19.843752]  which belongs to the cache kmalloc-128 of size 128
[   19.843923] The buggy address is located 0 bytes inside of
[   19.843923]  allocated 120-byte region [fff00000c76c9300, fff00000c76c9378)
[   19.844033] 
[   19.844124] The buggy address belongs to the physical page:
[   19.844206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.844395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.844471] page_type: f5(slab)
[   19.844618] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.844797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.844886] page dumped because: kasan: bad access detected
[   19.845159] 
[   19.845198] Memory state around the buggy address:
[   19.845329]  fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.845396]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.845462] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.845511]                                                                 ^
[   19.845773]  fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.845827]  fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.845963] ==================================================================

[   18.199338] ==================================================================
[   18.200386] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   18.200843] Write of size 1 at addr ffff88810254dc78 by task kunit_try_catch/303
[   18.201348] 
[   18.201523] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.201610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.201650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.201691] Call Trace:
[   18.201726]  <TASK>
[   18.201756]  dump_stack_lvl+0x73/0xb0
[   18.201817]  print_report+0xd1/0x650
[   18.201855]  ? __virt_addr_valid+0x1db/0x2d0
[   18.201890]  ? strncpy_from_user+0x1a5/0x1d0
[   18.201940]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.201986]  ? strncpy_from_user+0x1a5/0x1d0
[   18.202032]  kasan_report+0x141/0x180
[   18.202078]  ? strncpy_from_user+0x1a5/0x1d0
[   18.202132]  __asan_report_store1_noabort+0x1b/0x30
[   18.202179]  strncpy_from_user+0x1a5/0x1d0
[   18.202247]  copy_user_test_oob+0x760/0x10f0
[   18.202300]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.202324]  ? finish_task_switch.isra.0+0x153/0x700
[   18.202354]  ? __switch_to+0x47/0xf50
[   18.202381]  ? __schedule+0x10cc/0x2b60
[   18.202402]  ? __pfx_read_tsc+0x10/0x10
[   18.202422]  ? ktime_get_ts64+0x86/0x230
[   18.202445]  kunit_try_run_case+0x1a5/0x480
[   18.202469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.202489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.202511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.202532]  ? __kthread_parkme+0x82/0x180
[   18.202551]  ? preempt_count_sub+0x50/0x80
[   18.202573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.202594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.202632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.202657]  kthread+0x337/0x6f0
[   18.202677]  ? trace_preempt_on+0x20/0xc0
[   18.202699]  ? __pfx_kthread+0x10/0x10
[   18.202719]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.202738]  ? calculate_sigpending+0x7b/0xa0
[   18.202761]  ? __pfx_kthread+0x10/0x10
[   18.202781]  ret_from_fork+0x116/0x1d0
[   18.202799]  ? __pfx_kthread+0x10/0x10
[   18.202818]  ret_from_fork_asm+0x1a/0x30
[   18.202847]  </TASK>
[   18.202862] 
[   18.213022] Allocated by task 303:
[   18.213336]  kasan_save_stack+0x45/0x70
[   18.213938]  kasan_save_track+0x18/0x40
[   18.214795]  kasan_save_alloc_info+0x3b/0x50
[   18.215071]  __kasan_kmalloc+0xb7/0xc0
[   18.215743]  __kmalloc_noprof+0x1c9/0x500
[   18.215920]  kunit_kmalloc_array+0x25/0x60
[   18.216229]  copy_user_test_oob+0xab/0x10f0
[   18.216837]  kunit_try_run_case+0x1a5/0x480
[   18.217166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.217514]  kthread+0x337/0x6f0
[   18.217783]  ret_from_fork+0x116/0x1d0
[   18.218010]  ret_from_fork_asm+0x1a/0x30
[   18.218272] 
[   18.218784] The buggy address belongs to the object at ffff88810254dc00
[   18.218784]  which belongs to the cache kmalloc-128 of size 128
[   18.219264] The buggy address is located 0 bytes to the right of
[   18.219264]  allocated 120-byte region [ffff88810254dc00, ffff88810254dc78)
[   18.219707] 
[   18.219834] The buggy address belongs to the physical page:
[   18.220507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   18.220859] flags: 0x200000000000000(node=0|zone=2)
[   18.221101] page_type: f5(slab)
[   18.221654] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.222097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.222682] page dumped because: kasan: bad access detected
[   18.222963] 
[   18.223120] Memory state around the buggy address:
[   18.223666]  ffff88810254db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.224268]  ffff88810254db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.224559] >ffff88810254dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.224984]                                                                 ^
[   18.225698]  ffff88810254dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.226275]  ffff88810254dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.226497] ==================================================================
[   18.171636] ==================================================================
[   18.172565] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   18.172854] Write of size 121 at addr ffff88810254dc00 by task kunit_try_catch/303
[   18.173470] 
[   18.173736] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.173840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.173871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.173919] Call Trace:
[   18.173957]  <TASK>
[   18.173994]  dump_stack_lvl+0x73/0xb0
[   18.174056]  print_report+0xd1/0x650
[   18.174113]  ? __virt_addr_valid+0x1db/0x2d0
[   18.174164]  ? strncpy_from_user+0x2e/0x1d0
[   18.174212]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.174255]  ? strncpy_from_user+0x2e/0x1d0
[   18.174292]  kasan_report+0x141/0x180
[   18.174334]  ? strncpy_from_user+0x2e/0x1d0
[   18.174381]  kasan_check_range+0x10c/0x1c0
[   18.174423]  __kasan_check_write+0x18/0x20
[   18.174462]  strncpy_from_user+0x2e/0x1d0
[   18.174503]  ? __kasan_check_read+0x15/0x20
[   18.174536]  copy_user_test_oob+0x760/0x10f0
[   18.174584]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.174632]  ? finish_task_switch.isra.0+0x153/0x700
[   18.174669]  ? __switch_to+0x47/0xf50
[   18.174708]  ? __schedule+0x10cc/0x2b60
[   18.174744]  ? __pfx_read_tsc+0x10/0x10
[   18.174779]  ? ktime_get_ts64+0x86/0x230
[   18.174822]  kunit_try_run_case+0x1a5/0x480
[   18.174863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.174900]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.174938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.174974]  ? __kthread_parkme+0x82/0x180
[   18.175008]  ? preempt_count_sub+0x50/0x80
[   18.175051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.175091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.175131]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.175169]  kthread+0x337/0x6f0
[   18.175202]  ? trace_preempt_on+0x20/0xc0
[   18.175243]  ? __pfx_kthread+0x10/0x10
[   18.175279]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.175314]  ? calculate_sigpending+0x7b/0xa0
[   18.175356]  ? __pfx_kthread+0x10/0x10
[   18.175393]  ret_from_fork+0x116/0x1d0
[   18.175426]  ? __pfx_kthread+0x10/0x10
[   18.175459]  ret_from_fork_asm+0x1a/0x30
[   18.175510]  </TASK>
[   18.175533] 
[   18.185790] Allocated by task 303:
[   18.185966]  kasan_save_stack+0x45/0x70
[   18.186245]  kasan_save_track+0x18/0x40
[   18.186538]  kasan_save_alloc_info+0x3b/0x50
[   18.186879]  __kasan_kmalloc+0xb7/0xc0
[   18.187224]  __kmalloc_noprof+0x1c9/0x500
[   18.187550]  kunit_kmalloc_array+0x25/0x60
[   18.187891]  copy_user_test_oob+0xab/0x10f0
[   18.188271]  kunit_try_run_case+0x1a5/0x480
[   18.188574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.188972]  kthread+0x337/0x6f0
[   18.189277]  ret_from_fork+0x116/0x1d0
[   18.189581]  ret_from_fork_asm+0x1a/0x30
[   18.189899] 
[   18.190082] The buggy address belongs to the object at ffff88810254dc00
[   18.190082]  which belongs to the cache kmalloc-128 of size 128
[   18.190922] The buggy address is located 0 bytes inside of
[   18.190922]  allocated 120-byte region [ffff88810254dc00, ffff88810254dc78)
[   18.191832] 
[   18.192051] The buggy address belongs to the physical page:
[   18.192477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d
[   18.193057] flags: 0x200000000000000(node=0|zone=2)
[   18.193646] page_type: f5(slab)
[   18.193867] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.194153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.194548] page dumped because: kasan: bad access detected
[   18.194944] 
[   18.195061] Memory state around the buggy address:
[   18.195238]  ffff88810254db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.196234]  ffff88810254db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.196470] >ffff88810254dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.197073]                                                                 ^
[   18.197663]  ffff88810254dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.197965]  ffff88810254dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.198640] ==================================================================

[   18.109459] ==================================================================
[   18.110083] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   18.110406] Write of size 1 at addr ffff8881031c0b78 by task kunit_try_catch/302
[   18.110711] 
[   18.110977] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.111024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.111039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.111074] Call Trace:
[   18.111093]  <TASK>
[   18.111113]  dump_stack_lvl+0x73/0xb0
[   18.111295]  print_report+0xd1/0x650
[   18.111322]  ? __virt_addr_valid+0x1db/0x2d0
[   18.111347]  ? strncpy_from_user+0x1a5/0x1d0
[   18.111373]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.111401]  ? strncpy_from_user+0x1a5/0x1d0
[   18.111428]  kasan_report+0x141/0x180
[   18.111452]  ? strncpy_from_user+0x1a5/0x1d0
[   18.111483]  __asan_report_store1_noabort+0x1b/0x30
[   18.111511]  strncpy_from_user+0x1a5/0x1d0
[   18.111539]  copy_user_test_oob+0x760/0x10f0
[   18.111570]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.111596]  ? __kasan_check_write+0x18/0x20
[   18.111618]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.111643]  ? irqentry_exit+0x2a/0x60
[   18.111667]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.111693]  ? trace_hardirqs_on+0x37/0xe0
[   18.111719]  ? __pfx_read_tsc+0x10/0x10
[   18.111743]  ? ktime_get_ts64+0x86/0x230
[   18.111770]  kunit_try_run_case+0x1a5/0x480
[   18.111796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.111823]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.111847]  ? __kthread_parkme+0x82/0x180
[   18.111869]  ? preempt_count_sub+0x50/0x80
[   18.111895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.111920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.111946]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.111971]  kthread+0x337/0x6f0
[   18.111993]  ? trace_preempt_on+0x20/0xc0
[   18.112017]  ? __pfx_kthread+0x10/0x10
[   18.112040]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.112074]  ? calculate_sigpending+0x7b/0xa0
[   18.112101]  ? __pfx_kthread+0x10/0x10
[   18.112125]  ret_from_fork+0x116/0x1d0
[   18.112145]  ? __pfx_kthread+0x10/0x10
[   18.112169]  ret_from_fork_asm+0x1a/0x30
[   18.112202]  </TASK>
[   18.112217] 
[   18.121722] Allocated by task 302:
[   18.122039]  kasan_save_stack+0x45/0x70
[   18.122243]  kasan_save_track+0x18/0x40
[   18.122426]  kasan_save_alloc_info+0x3b/0x50
[   18.122630]  __kasan_kmalloc+0xb7/0xc0
[   18.123060]  __kmalloc_noprof+0x1c9/0x500
[   18.123310]  kunit_kmalloc_array+0x25/0x60
[   18.123583]  copy_user_test_oob+0xab/0x10f0
[   18.123873]  kunit_try_run_case+0x1a5/0x480
[   18.124155]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.124364]  kthread+0x337/0x6f0
[   18.124671]  ret_from_fork+0x116/0x1d0
[   18.124818]  ret_from_fork_asm+0x1a/0x30
[   18.124961] 
[   18.126245] The buggy address belongs to the object at ffff8881031c0b00
[   18.126245]  which belongs to the cache kmalloc-128 of size 128
[   18.126960] The buggy address is located 0 bytes to the right of
[   18.126960]  allocated 120-byte region [ffff8881031c0b00, ffff8881031c0b78)
[   18.127359] 
[   18.127438] The buggy address belongs to the physical page:
[   18.127615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   18.127861] flags: 0x200000000000000(node=0|zone=2)
[   18.128293] page_type: f5(slab)
[   18.128660] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.129306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.130070] page dumped because: kasan: bad access detected
[   18.130533] 
[   18.130691] Memory state around the buggy address:
[   18.131102]  ffff8881031c0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.131950]  ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132237] >ffff8881031c0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.132454]                                                                 ^
[   18.133218]  ffff8881031c0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.133716]  ffff8881031c0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.133982] ==================================================================
[   18.085991] ==================================================================
[   18.086281] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   18.086612] Write of size 121 at addr ffff8881031c0b00 by task kunit_try_catch/302
[   18.087377] 
[   18.087609] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   18.087656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.087669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.087691] Call Trace:
[   18.087771]  <TASK>
[   18.087793]  dump_stack_lvl+0x73/0xb0
[   18.087825]  print_report+0xd1/0x650
[   18.087850]  ? __virt_addr_valid+0x1db/0x2d0
[   18.087875]  ? strncpy_from_user+0x2e/0x1d0
[   18.087901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.087931]  ? strncpy_from_user+0x2e/0x1d0
[   18.087957]  kasan_report+0x141/0x180
[   18.087982]  ? strncpy_from_user+0x2e/0x1d0
[   18.088013]  kasan_check_range+0x10c/0x1c0
[   18.088039]  __kasan_check_write+0x18/0x20
[   18.088073]  strncpy_from_user+0x2e/0x1d0
[   18.088098]  ? __kasan_check_read+0x15/0x20
[   18.088122]  copy_user_test_oob+0x760/0x10f0
[   18.088151]  ? __pfx_copy_user_test_oob+0x10/0x10
[   18.088180]  ? __kasan_check_write+0x18/0x20
[   18.088201]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.088227]  ? irqentry_exit+0x2a/0x60
[   18.088250]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   18.088276]  ? trace_hardirqs_on+0x37/0xe0
[   18.088302]  ? __pfx_read_tsc+0x10/0x10
[   18.088324]  ? ktime_get_ts64+0x86/0x230
[   18.088351]  kunit_try_run_case+0x1a5/0x480
[   18.088377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.088404]  ? queued_spin_lock_slowpath+0x116/0xb40
[   18.088430]  ? __kthread_parkme+0x82/0x180
[   18.088452]  ? preempt_count_sub+0x50/0x80
[   18.088477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.088502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.088526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.088552]  kthread+0x337/0x6f0
[   18.088574]  ? trace_preempt_on+0x20/0xc0
[   18.088598]  ? __pfx_kthread+0x10/0x10
[   18.088620]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.088644]  ? calculate_sigpending+0x7b/0xa0
[   18.088670]  ? __pfx_kthread+0x10/0x10
[   18.088694]  ret_from_fork+0x116/0x1d0
[   18.088714]  ? __pfx_kthread+0x10/0x10
[   18.088749]  ret_from_fork_asm+0x1a/0x30
[   18.088782]  </TASK>
[   18.088795] 
[   18.098923] Allocated by task 302:
[   18.099241]  kasan_save_stack+0x45/0x70
[   18.099536]  kasan_save_track+0x18/0x40
[   18.099734]  kasan_save_alloc_info+0x3b/0x50
[   18.100097]  __kasan_kmalloc+0xb7/0xc0
[   18.100283]  __kmalloc_noprof+0x1c9/0x500
[   18.100473]  kunit_kmalloc_array+0x25/0x60
[   18.100657]  copy_user_test_oob+0xab/0x10f0
[   18.101097]  kunit_try_run_case+0x1a5/0x480
[   18.101302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.101621]  kthread+0x337/0x6f0
[   18.101803]  ret_from_fork+0x116/0x1d0
[   18.101976]  ret_from_fork_asm+0x1a/0x30
[   18.102331] 
[   18.102418] The buggy address belongs to the object at ffff8881031c0b00
[   18.102418]  which belongs to the cache kmalloc-128 of size 128
[   18.103042] The buggy address is located 0 bytes inside of
[   18.103042]  allocated 120-byte region [ffff8881031c0b00, ffff8881031c0b78)
[   18.103532] 
[   18.103643] The buggy address belongs to the physical page:
[   18.104157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   18.104547] flags: 0x200000000000000(node=0|zone=2)
[   18.104783] page_type: f5(slab)
[   18.105081] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   18.105467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.105764] page dumped because: kasan: bad access detected
[   18.106126] 
[   18.106229] Memory state around the buggy address:
[   18.106545]  ffff8881031c0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.106835]  ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.107281] >ffff8881031c0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.107588]                                                                 ^
[   18.108013]  ffff8881031c0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.108433]  ffff8881031c0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.108794] ==================================================================

[   79.037519] ==================================================================
[   79.044765] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   79.051638] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326
[   79.059213] 
[   79.060712] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   79.060720] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   79.060723] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   79.060727] Call Trace:
[   79.060728]  <TASK>
[   79.060730]  dump_stack_lvl+0x73/0xb0
[   79.060735]  print_report+0xd1/0x650
[   79.060739]  ? __virt_addr_valid+0x1db/0x2d0
[   79.060743]  ? strncpy_from_user+0x2e/0x1d0
[   79.060747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   79.060753]  ? strncpy_from_user+0x2e/0x1d0
[   79.060757]  kasan_report+0x141/0x180
[   79.060761]  ? strncpy_from_user+0x2e/0x1d0
[   79.060767]  kasan_check_range+0x10c/0x1c0
[   79.060771]  __kasan_check_write+0x18/0x20
[   79.060775]  strncpy_from_user+0x2e/0x1d0
[   79.060779]  ? __kasan_check_read+0x15/0x20
[   79.060783]  copy_user_test_oob+0x760/0x10f0
[   79.060788]  ? __pfx_copy_user_test_oob+0x10/0x10
[   79.060793]  ? finish_task_switch.isra.0+0x153/0x700
[   79.060797]  ? __switch_to+0x544/0xf50
[   79.060802]  ? __schedule+0x10cc/0x2b60
[   79.060806]  ? ktime_get_ts64+0x83/0x230
[   79.060810]  kunit_try_run_case+0x1a2/0x480
[   79.060815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.060819]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   79.060824]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   79.060828]  ? __kthread_parkme+0x82/0x180
[   79.060832]  ? preempt_count_sub+0x50/0x80
[   79.060836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.060841]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.060845]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   79.060850]  kthread+0x334/0x6f0
[   79.060853]  ? trace_preempt_on+0x20/0xc0
[   79.060857]  ? __pfx_kthread+0x10/0x10
[   79.060861]  ? _raw_spin_unlock_irq+0x47/0x80
[   79.060865]  ? calculate_sigpending+0x7b/0xa0
[   79.060870]  ? __pfx_kthread+0x10/0x10
[   79.060874]  ret_from_fork+0x113/0x1d0
[   79.060878]  ? __pfx_kthread+0x10/0x10
[   79.060881]  ret_from_fork_asm+0x1a/0x30
[   79.060887]  </TASK>
[   79.060889] 
[   79.246046] Allocated by task 326:
[   79.249452]  kasan_save_stack+0x45/0x70
[   79.253293]  kasan_save_track+0x18/0x40
[   79.257133]  kasan_save_alloc_info+0x3b/0x50
[   79.261421]  __kasan_kmalloc+0xb7/0xc0
[   79.265176]  __kmalloc_noprof+0x1c9/0x500
[   79.269189]  kunit_kmalloc_array+0x25/0x60
[   79.273297]  copy_user_test_oob+0xab/0x10f0
[   79.277492]  kunit_try_run_case+0x1a2/0x480
[   79.281684]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.287086]  kthread+0x334/0x6f0
[   79.290325]  ret_from_fork+0x113/0x1d0
[   79.294155]  ret_from_fork_asm+0x1a/0x30
[   79.298081] 
[   79.299581] The buggy address belongs to the object at ffff8881066e9300
[   79.299581]  which belongs to the cache kmalloc-128 of size 128
[   79.312098] The buggy address is located 0 bytes inside of
[   79.312098]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   79.324525] 
[   79.326022] The buggy address belongs to the physical page:
[   79.331596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   79.339596] flags: 0x200000000000000(node=0|zone=2)
[   79.344476] page_type: f5(slab)
[   79.347622] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   79.355406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   79.363150] page dumped because: kasan: bad access detected
[   79.368723] 
[   79.370224] Memory state around the buggy address:
[   79.375016]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   79.382235]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.389456] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   79.396683]                                                                 ^
[   79.403815]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.411035]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.418254] ==================================================================
[   79.425481] ==================================================================
[   79.432727] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   79.439686] Write of size 1 at addr ffff8881066e9378 by task kunit_try_catch/326
[   79.447080] 
[   79.448581] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   79.448589] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   79.448592] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   79.448595] Call Trace:
[   79.448597]  <TASK>
[   79.448599]  dump_stack_lvl+0x73/0xb0
[   79.448603]  print_report+0xd1/0x650
[   79.448607]  ? __virt_addr_valid+0x1db/0x2d0
[   79.448611]  ? strncpy_from_user+0x1a5/0x1d0
[   79.448616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   79.448621]  ? strncpy_from_user+0x1a5/0x1d0
[   79.448626]  kasan_report+0x141/0x180
[   79.448630]  ? strncpy_from_user+0x1a5/0x1d0
[   79.448635]  __asan_report_store1_noabort+0x1b/0x30
[   79.448640]  strncpy_from_user+0x1a5/0x1d0
[   79.448645]  copy_user_test_oob+0x760/0x10f0
[   79.448650]  ? __pfx_copy_user_test_oob+0x10/0x10
[   79.448655]  ? finish_task_switch.isra.0+0x153/0x700
[   79.448659]  ? __switch_to+0x544/0xf50
[   79.448664]  ? __schedule+0x10cc/0x2b60
[   79.448668]  ? ktime_get_ts64+0x83/0x230
[   79.448672]  kunit_try_run_case+0x1a2/0x480
[   79.448677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.448681]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   79.448686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   79.448690]  ? __kthread_parkme+0x82/0x180
[   79.448694]  ? preempt_count_sub+0x50/0x80
[   79.448698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   79.448703]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.448707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   79.448712]  kthread+0x334/0x6f0
[   79.448715]  ? trace_preempt_on+0x20/0xc0
[   79.448719]  ? __pfx_kthread+0x10/0x10
[   79.448723]  ? _raw_spin_unlock_irq+0x47/0x80
[   79.448727]  ? calculate_sigpending+0x7b/0xa0
[   79.448732]  ? __pfx_kthread+0x10/0x10
[   79.448736]  ret_from_fork+0x113/0x1d0
[   79.448740]  ? __pfx_kthread+0x10/0x10
[   79.448744]  ret_from_fork_asm+0x1a/0x30
[   79.448749]  </TASK>
[   79.448751] 
[   79.626763] Allocated by task 326:
[   79.630170]  kasan_save_stack+0x45/0x70
[   79.634011]  kasan_save_track+0x18/0x40
[   79.637857]  kasan_save_alloc_info+0x3b/0x50
[   79.642130]  __kasan_kmalloc+0xb7/0xc0
[   79.645882]  __kmalloc_noprof+0x1c9/0x500
[   79.649896]  kunit_kmalloc_array+0x25/0x60
[   79.653994]  copy_user_test_oob+0xab/0x10f0
[   79.658179]  kunit_try_run_case+0x1a2/0x480
[   79.662380]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   79.667808]  kthread+0x334/0x6f0
[   79.671041]  ret_from_fork+0x113/0x1d0
[   79.674795]  ret_from_fork_asm+0x1a/0x30
[   79.678720] 
[   79.680219] The buggy address belongs to the object at ffff8881066e9300
[   79.680219]  which belongs to the cache kmalloc-128 of size 128
[   79.692725] The buggy address is located 0 bytes to the right of
[   79.692725]  allocated 120-byte region [ffff8881066e9300, ffff8881066e9378)
[   79.705673] 
[   79.707174] The buggy address belongs to the physical page:
[   79.712746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9
[   79.720755] flags: 0x200000000000000(node=0|zone=2)
[   79.725641] page_type: f5(slab)
[   79.728789] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   79.736538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   79.744284] page dumped because: kasan: bad access detected
[   79.749855] 
[   79.751363] Memory state around the buggy address:
[   79.756185]  ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   79.763425]  ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.770647] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   79.777868]                                                                 ^
[   79.784998]  ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.792218]  ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.799437] ==================================================================