Hay
Date
July 1, 2025, 11:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.091041] ==================================================================
[   22.091228] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   22.091327] Write of size 1 at addr fff00000c76c3a78 by task kunit_try_catch/286
[   22.091393] 
[   22.091830] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.092128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.092177] Hardware name: linux,dummy-virt (DT)
[   22.092550] Call trace:
[   22.092658]  show_stack+0x20/0x38 (C)
[   22.093030]  dump_stack_lvl+0x8c/0xd0
[   22.093424]  print_report+0x118/0x608
[   22.093491]  kasan_report+0xdc/0x128
[   22.093824]  __asan_report_store1_noabort+0x20/0x30
[   22.093929]  strncpy_from_user+0x270/0x2a0
[   22.094459]  copy_user_test_oob+0x5c0/0xec8
[   22.094624]  kunit_try_run_case+0x170/0x3f0
[   22.094882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.094968]  kthread+0x328/0x630
[   22.095059]  ret_from_fork+0x10/0x20
[   22.095795] 
[   22.095848] Allocated by task 286:
[   22.096329]  kasan_save_stack+0x3c/0x68
[   22.096399]  kasan_save_track+0x20/0x40
[   22.096454]  kasan_save_alloc_info+0x40/0x58
[   22.096501]  __kasan_kmalloc+0xd4/0xd8
[   22.096542]  __kmalloc_noprof+0x198/0x4c8
[   22.096587]  kunit_kmalloc_array+0x34/0x88
[   22.096631]  copy_user_test_oob+0xac/0xec8
[   22.096680]  kunit_try_run_case+0x170/0x3f0
[   22.096978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.097421]  kthread+0x328/0x630
[   22.097721]  ret_from_fork+0x10/0x20
[   22.097847] 
[   22.098026] The buggy address belongs to the object at fff00000c76c3a00
[   22.098026]  which belongs to the cache kmalloc-128 of size 128
[   22.098104] The buggy address is located 0 bytes to the right of
[   22.098104]  allocated 120-byte region [fff00000c76c3a00, fff00000c76c3a78)
[   22.099399] 
[   22.099449] The buggy address belongs to the physical page:
[   22.099510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c3
[   22.099610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.099847] page_type: f5(slab)
[   22.099944] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.100021] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.100071] page dumped because: kasan: bad access detected
[   22.100392] 
[   22.100821] Memory state around the buggy address:
[   22.101126]  fff00000c76c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.101395]  fff00000c76c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.101521] >fff00000c76c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.101698]                                                                 ^
[   22.101902]  fff00000c76c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.101957]  fff00000c76c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.102004] ==================================================================
[   22.081363] ==================================================================
[   22.081661] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   22.081874] Write of size 121 at addr fff00000c76c3a00 by task kunit_try_catch/286
[   22.082472] 
[   22.082586] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   22.082831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.083087] Hardware name: linux,dummy-virt (DT)
[   22.083318] Call trace:
[   22.083405]  show_stack+0x20/0x38 (C)
[   22.083688]  dump_stack_lvl+0x8c/0xd0
[   22.083745]  print_report+0x118/0x608
[   22.083895]  kasan_report+0xdc/0x128
[   22.083981]  kasan_check_range+0x100/0x1a8
[   22.084042]  __kasan_check_write+0x20/0x30
[   22.084105]  strncpy_from_user+0x3c/0x2a0
[   22.084184]  copy_user_test_oob+0x5c0/0xec8
[   22.084239]  kunit_try_run_case+0x170/0x3f0
[   22.084295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.084358]  kthread+0x328/0x630
[   22.084415]  ret_from_fork+0x10/0x20
[   22.084495] 
[   22.084519] Allocated by task 286:
[   22.084554]  kasan_save_stack+0x3c/0x68
[   22.084612]  kasan_save_track+0x20/0x40
[   22.084656]  kasan_save_alloc_info+0x40/0x58
[   22.084719]  __kasan_kmalloc+0xd4/0xd8
[   22.084772]  __kmalloc_noprof+0x198/0x4c8
[   22.084817]  kunit_kmalloc_array+0x34/0x88
[   22.084861]  copy_user_test_oob+0xac/0xec8
[   22.084904]  kunit_try_run_case+0x170/0x3f0
[   22.084960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.085017]  kthread+0x328/0x630
[   22.085063]  ret_from_fork+0x10/0x20
[   22.085121] 
[   22.085176] The buggy address belongs to the object at fff00000c76c3a00
[   22.085176]  which belongs to the cache kmalloc-128 of size 128
[   22.085541] The buggy address is located 0 bytes inside of
[   22.085541]  allocated 120-byte region [fff00000c76c3a00, fff00000c76c3a78)
[   22.085693] 
[   22.086032] The buggy address belongs to the physical page:
[   22.086076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c3
[   22.086172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.086641] page_type: f5(slab)
[   22.086924] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   22.087176] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.087231] page dumped because: kasan: bad access detected
[   22.087271] 
[   22.087493] Memory state around the buggy address:
[   22.087572]  fff00000c76c3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.087951]  fff00000c76c3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.088189] >fff00000c76c3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.088288]                                                                 ^
[   22.088634]  fff00000c76c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.088746]  fff00000c76c3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.088822] ==================================================================

[   15.600110] ==================================================================
[   15.600479] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   15.600910] Write of size 1 at addr ffff88810258dd78 by task kunit_try_catch/302
[   15.601290] 
[   15.601404] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.601449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.601463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.601484] Call Trace:
[   15.601502]  <TASK>
[   15.601521]  dump_stack_lvl+0x73/0xb0
[   15.601549]  print_report+0xd1/0x650
[   15.601575]  ? __virt_addr_valid+0x1db/0x2d0
[   15.601598]  ? strncpy_from_user+0x1a5/0x1d0
[   15.601622]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.601659]  ? strncpy_from_user+0x1a5/0x1d0
[   15.601682]  kasan_report+0x141/0x180
[   15.601704]  ? strncpy_from_user+0x1a5/0x1d0
[   15.601767]  __asan_report_store1_noabort+0x1b/0x30
[   15.601790]  strncpy_from_user+0x1a5/0x1d0
[   15.601827]  copy_user_test_oob+0x760/0x10f0
[   15.601853]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.601876]  ? finish_task_switch.isra.0+0x153/0x700
[   15.601900]  ? __switch_to+0x47/0xf50
[   15.601926]  ? __schedule+0x10cc/0x2b60
[   15.601950]  ? __pfx_read_tsc+0x10/0x10
[   15.601972]  ? ktime_get_ts64+0x86/0x230
[   15.602026]  kunit_try_run_case+0x1a5/0x480
[   15.602051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.602084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.602109]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.602132]  ? __kthread_parkme+0x82/0x180
[   15.602154]  ? preempt_count_sub+0x50/0x80
[   15.602178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.602203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.602254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.602278]  kthread+0x337/0x6f0
[   15.602298]  ? trace_preempt_on+0x20/0xc0
[   15.602334]  ? __pfx_kthread+0x10/0x10
[   15.602355]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.602385]  ? calculate_sigpending+0x7b/0xa0
[   15.602410]  ? __pfx_kthread+0x10/0x10
[   15.602432]  ret_from_fork+0x116/0x1d0
[   15.602451]  ? __pfx_kthread+0x10/0x10
[   15.602471]  ret_from_fork_asm+0x1a/0x30
[   15.602502]  </TASK>
[   15.602513] 
[   15.610620] Allocated by task 302:
[   15.610809]  kasan_save_stack+0x45/0x70
[   15.611022]  kasan_save_track+0x18/0x40
[   15.611195]  kasan_save_alloc_info+0x3b/0x50
[   15.611493]  __kasan_kmalloc+0xb7/0xc0
[   15.611787]  __kmalloc_noprof+0x1c9/0x500
[   15.611985]  kunit_kmalloc_array+0x25/0x60
[   15.612219]  copy_user_test_oob+0xab/0x10f0
[   15.612460]  kunit_try_run_case+0x1a5/0x480
[   15.612716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.612995]  kthread+0x337/0x6f0
[   15.613196]  ret_from_fork+0x116/0x1d0
[   15.613414]  ret_from_fork_asm+0x1a/0x30
[   15.613557] 
[   15.613641] The buggy address belongs to the object at ffff88810258dd00
[   15.613641]  which belongs to the cache kmalloc-128 of size 128
[   15.614318] The buggy address is located 0 bytes to the right of
[   15.614318]  allocated 120-byte region [ffff88810258dd00, ffff88810258dd78)
[   15.614904] 
[   15.615012] The buggy address belongs to the physical page:
[   15.615427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10258d
[   15.615779] flags: 0x200000000000000(node=0|zone=2)
[   15.615949] page_type: f5(slab)
[   15.616072] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.616418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.616989] page dumped because: kasan: bad access detected
[   15.617260] 
[   15.617358] Memory state around the buggy address:
[   15.617567]  ffff88810258dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.617891]  ffff88810258dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.618112] >ffff88810258dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.618486]                                                                 ^
[   15.618918]  ffff88810258dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.619190]  ffff88810258de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.619555] ==================================================================
[   15.580519] ==================================================================
[   15.580876] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   15.581310] Write of size 121 at addr ffff88810258dd00 by task kunit_try_catch/302
[   15.581847] 
[   15.582054] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.582103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.582116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.582139] Call Trace:
[   15.582156]  <TASK>
[   15.582176]  dump_stack_lvl+0x73/0xb0
[   15.582206]  print_report+0xd1/0x650
[   15.582231]  ? __virt_addr_valid+0x1db/0x2d0
[   15.582256]  ? strncpy_from_user+0x2e/0x1d0
[   15.582280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.582304]  ? strncpy_from_user+0x2e/0x1d0
[   15.582328]  kasan_report+0x141/0x180
[   15.582351]  ? strncpy_from_user+0x2e/0x1d0
[   15.582389]  kasan_check_range+0x10c/0x1c0
[   15.582414]  __kasan_check_write+0x18/0x20
[   15.582435]  strncpy_from_user+0x2e/0x1d0
[   15.582458]  ? __kasan_check_read+0x15/0x20
[   15.582480]  copy_user_test_oob+0x760/0x10f0
[   15.582507]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.582532]  ? finish_task_switch.isra.0+0x153/0x700
[   15.582557]  ? __switch_to+0x47/0xf50
[   15.582607]  ? __schedule+0x10cc/0x2b60
[   15.582631]  ? __pfx_read_tsc+0x10/0x10
[   15.582653]  ? ktime_get_ts64+0x86/0x230
[   15.582678]  kunit_try_run_case+0x1a5/0x480
[   15.582703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.582726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.582751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.582775]  ? __kthread_parkme+0x82/0x180
[   15.582796]  ? preempt_count_sub+0x50/0x80
[   15.582819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.582844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.582867]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.582891]  kthread+0x337/0x6f0
[   15.582911]  ? trace_preempt_on+0x20/0xc0
[   15.582936]  ? __pfx_kthread+0x10/0x10
[   15.582958]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.582979]  ? calculate_sigpending+0x7b/0xa0
[   15.583003]  ? __pfx_kthread+0x10/0x10
[   15.583024]  ret_from_fork+0x116/0x1d0
[   15.583044]  ? __pfx_kthread+0x10/0x10
[   15.583065]  ret_from_fork_asm+0x1a/0x30
[   15.583096]  </TASK>
[   15.583109] 
[   15.590883] Allocated by task 302:
[   15.591029]  kasan_save_stack+0x45/0x70
[   15.591176]  kasan_save_track+0x18/0x40
[   15.591361]  kasan_save_alloc_info+0x3b/0x50
[   15.591627]  __kasan_kmalloc+0xb7/0xc0
[   15.591814]  __kmalloc_noprof+0x1c9/0x500
[   15.592027]  kunit_kmalloc_array+0x25/0x60
[   15.592175]  copy_user_test_oob+0xab/0x10f0
[   15.592454]  kunit_try_run_case+0x1a5/0x480
[   15.592782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.593077]  kthread+0x337/0x6f0
[   15.593221]  ret_from_fork+0x116/0x1d0
[   15.593355]  ret_from_fork_asm+0x1a/0x30
[   15.593503] 
[   15.593575] The buggy address belongs to the object at ffff88810258dd00
[   15.593575]  which belongs to the cache kmalloc-128 of size 128
[   15.594184] The buggy address is located 0 bytes inside of
[   15.594184]  allocated 120-byte region [ffff88810258dd00, ffff88810258dd78)
[   15.594795] 
[   15.594942] The buggy address belongs to the physical page:
[   15.595209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10258d
[   15.595539] flags: 0x200000000000000(node=0|zone=2)
[   15.595711] page_type: f5(slab)
[   15.595834] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.596091] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.596581] page dumped because: kasan: bad access detected
[   15.596841] 
[   15.596937] Memory state around the buggy address:
[   15.597274]  ffff88810258dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.597866]  ffff88810258dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.598191] >ffff88810258dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.598450]                                                                 ^
[   15.598865]  ffff88810258dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.599087]  ffff88810258de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.599316] ==================================================================