Hay
Date
July 19, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.232822] ==================================================================
[   18.233033] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   18.233138] Write of size 121 at addr fff00000c790e600 by task kunit_try_catch/285
[   18.233331] 
[   18.233435] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.233543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.233621] Hardware name: linux,dummy-virt (DT)
[   18.233656] Call trace:
[   18.233747]  show_stack+0x20/0x38 (C)
[   18.233829]  dump_stack_lvl+0x8c/0xd0
[   18.234039]  print_report+0x118/0x5d0
[   18.234105]  kasan_report+0xdc/0x128
[   18.234195]  kasan_check_range+0x100/0x1a8
[   18.234249]  __kasan_check_write+0x20/0x30
[   18.234297]  strncpy_from_user+0x3c/0x2a0
[   18.234347]  copy_user_test_oob+0x5c0/0xec8
[   18.234533]  kunit_try_run_case+0x170/0x3f0
[   18.234629]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.234744]  kthread+0x328/0x630
[   18.234818]  ret_from_fork+0x10/0x20
[   18.235066] 
[   18.235098] Allocated by task 285:
[   18.235143]  kasan_save_stack+0x3c/0x68
[   18.235188]  kasan_save_track+0x20/0x40
[   18.235238]  kasan_save_alloc_info+0x40/0x58
[   18.235281]  __kasan_kmalloc+0xd4/0xd8
[   18.235460]  __kmalloc_noprof+0x198/0x4c8
[   18.235518]  kunit_kmalloc_array+0x34/0x88
[   18.235557]  copy_user_test_oob+0xac/0xec8
[   18.235616]  kunit_try_run_case+0x170/0x3f0
[   18.235664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.235983]  kthread+0x328/0x630
[   18.236098]  ret_from_fork+0x10/0x20
[   18.236199] 
[   18.236274] The buggy address belongs to the object at fff00000c790e600
[   18.236274]  which belongs to the cache kmalloc-128 of size 128
[   18.236426] The buggy address is located 0 bytes inside of
[   18.236426]  allocated 120-byte region [fff00000c790e600, fff00000c790e678)
[   18.236598] 
[   18.236670] The buggy address belongs to the physical page:
[   18.236725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e
[   18.236781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.236983] page_type: f5(slab)
[   18.237026] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.237113] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.237159] page dumped because: kasan: bad access detected
[   18.237282] 
[   18.237361] Memory state around the buggy address:
[   18.237523]  fff00000c790e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.237854]  fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.238022] >fff00000c790e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.238110]                                                                 ^
[   18.238448]  fff00000c790e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.238597]  fff00000c790e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.238699] ==================================================================
[   18.239372] ==================================================================
[   18.239424] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   18.239721] Write of size 1 at addr fff00000c790e678 by task kunit_try_catch/285
[   18.239791] 
[   18.239825] CPU: 0 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.240025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.240182] Hardware name: linux,dummy-virt (DT)
[   18.240216] Call trace:
[   18.240241]  show_stack+0x20/0x38 (C)
[   18.240473]  dump_stack_lvl+0x8c/0xd0
[   18.240534]  print_report+0x118/0x5d0
[   18.240712]  kasan_report+0xdc/0x128
[   18.240895]  __asan_report_store1_noabort+0x20/0x30
[   18.240980]  strncpy_from_user+0x270/0x2a0
[   18.241192]  copy_user_test_oob+0x5c0/0xec8
[   18.241367]  kunit_try_run_case+0x170/0x3f0
[   18.241453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.241640]  kthread+0x328/0x630
[   18.241755]  ret_from_fork+0x10/0x20
[   18.241929] 
[   18.242048] Allocated by task 285:
[   18.242082]  kasan_save_stack+0x3c/0x68
[   18.242330]  kasan_save_track+0x20/0x40
[   18.242546]  kasan_save_alloc_info+0x40/0x58
[   18.242633]  __kasan_kmalloc+0xd4/0xd8
[   18.242729]  __kmalloc_noprof+0x198/0x4c8
[   18.243025]  kunit_kmalloc_array+0x34/0x88
[   18.243134]  copy_user_test_oob+0xac/0xec8
[   18.243242]  kunit_try_run_case+0x170/0x3f0
[   18.243286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.243366]  kthread+0x328/0x630
[   18.243562]  ret_from_fork+0x10/0x20
[   18.243611] 
[   18.243681] The buggy address belongs to the object at fff00000c790e600
[   18.243681]  which belongs to the cache kmalloc-128 of size 128
[   18.243787] The buggy address is located 0 bytes to the right of
[   18.243787]  allocated 120-byte region [fff00000c790e600, fff00000c790e678)
[   18.244103] 
[   18.244218] The buggy address belongs to the physical page:
[   18.244323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790e
[   18.244406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.244467] page_type: f5(slab)
[   18.244545] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.244601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.244671] page dumped because: kasan: bad access detected
[   18.244720] 
[   18.244741] Memory state around the buggy address:
[   18.244788]  fff00000c790e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.244835]  fff00000c790e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.244892] >fff00000c790e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   18.244940]                                                                 ^
[   18.244986]  fff00000c790e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.245031]  fff00000c790e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.245081] ==================================================================

[   16.075934] ==================================================================
[   16.076280] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   16.076653] Write of size 121 at addr ffff888102fd1e00 by task kunit_try_catch/303
[   16.076993] 
[   16.077110] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.077151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.077163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.077184] Call Trace:
[   16.077197]  <TASK>
[   16.077211]  dump_stack_lvl+0x73/0xb0
[   16.077238]  print_report+0xd1/0x610
[   16.077260]  ? __virt_addr_valid+0x1db/0x2d0
[   16.077283]  ? strncpy_from_user+0x2e/0x1d0
[   16.077306]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.077329]  ? strncpy_from_user+0x2e/0x1d0
[   16.077352]  kasan_report+0x141/0x180
[   16.077374]  ? strncpy_from_user+0x2e/0x1d0
[   16.077680]  kasan_check_range+0x10c/0x1c0
[   16.077707]  __kasan_check_write+0x18/0x20
[   16.077727]  strncpy_from_user+0x2e/0x1d0
[   16.077750]  ? __kasan_check_read+0x15/0x20
[   16.077772]  copy_user_test_oob+0x760/0x10f0
[   16.077800]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.077824]  ? finish_task_switch.isra.0+0x153/0x700
[   16.077846]  ? __switch_to+0x47/0xf50
[   16.077871]  ? __schedule+0x10cc/0x2b60
[   16.077893]  ? __pfx_read_tsc+0x10/0x10
[   16.077915]  ? ktime_get_ts64+0x86/0x230
[   16.077939]  kunit_try_run_case+0x1a5/0x480
[   16.077963]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.077986]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.078023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.078047]  ? __kthread_parkme+0x82/0x180
[   16.078888]  ? preempt_count_sub+0x50/0x80
[   16.078917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.078943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.078967]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.078992]  kthread+0x337/0x6f0
[   16.079027]  ? trace_preempt_on+0x20/0xc0
[   16.079052]  ? __pfx_kthread+0x10/0x10
[   16.079074]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.079096]  ? calculate_sigpending+0x7b/0xa0
[   16.079119]  ? __pfx_kthread+0x10/0x10
[   16.079141]  ret_from_fork+0x116/0x1d0
[   16.079160]  ? __pfx_kthread+0x10/0x10
[   16.079180]  ret_from_fork_asm+0x1a/0x30
[   16.079210]  </TASK>
[   16.079221] 
[   16.092661] Allocated by task 303:
[   16.093056]  kasan_save_stack+0x45/0x70
[   16.093499]  kasan_save_track+0x18/0x40
[   16.093842]  kasan_save_alloc_info+0x3b/0x50
[   16.094229]  __kasan_kmalloc+0xb7/0xc0
[   16.094568]  __kmalloc_noprof+0x1c9/0x500
[   16.094707]  kunit_kmalloc_array+0x25/0x60
[   16.094845]  copy_user_test_oob+0xab/0x10f0
[   16.094987]  kunit_try_run_case+0x1a5/0x480
[   16.095138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.095308]  kthread+0x337/0x6f0
[   16.095625]  ret_from_fork+0x116/0x1d0
[   16.096044]  ret_from_fork_asm+0x1a/0x30
[   16.096475] 
[   16.096635] The buggy address belongs to the object at ffff888102fd1e00
[   16.096635]  which belongs to the cache kmalloc-128 of size 128
[   16.097806] The buggy address is located 0 bytes inside of
[   16.097806]  allocated 120-byte region [ffff888102fd1e00, ffff888102fd1e78)
[   16.098926] 
[   16.099098] The buggy address belongs to the physical page:
[   16.099629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1
[   16.100183] flags: 0x200000000000000(node=0|zone=2)
[   16.100345] page_type: f5(slab)
[   16.100500] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.101113] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.101419] page dumped because: kasan: bad access detected
[   16.102038] 
[   16.102216] Memory state around the buggy address:
[   16.102584]  ffff888102fd1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.102804]  ffff888102fd1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.103028] >ffff888102fd1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.103241]                                                                 ^
[   16.103581]  ffff888102fd1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.104211]  ffff888102fd1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.104907] ==================================================================
[   16.105909] ==================================================================
[   16.106650] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   16.107386] Write of size 1 at addr ffff888102fd1e78 by task kunit_try_catch/303
[   16.108137] 
[   16.108309] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   16.108351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.108363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.108385] Call Trace:
[   16.108399]  <TASK>
[   16.108425]  dump_stack_lvl+0x73/0xb0
[   16.108454]  print_report+0xd1/0x610
[   16.108476]  ? __virt_addr_valid+0x1db/0x2d0
[   16.108511]  ? strncpy_from_user+0x1a5/0x1d0
[   16.108537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.108560]  ? strncpy_from_user+0x1a5/0x1d0
[   16.108584]  kasan_report+0x141/0x180
[   16.108607]  ? strncpy_from_user+0x1a5/0x1d0
[   16.108636]  __asan_report_store1_noabort+0x1b/0x30
[   16.108661]  strncpy_from_user+0x1a5/0x1d0
[   16.108686]  copy_user_test_oob+0x760/0x10f0
[   16.108712]  ? __pfx_copy_user_test_oob+0x10/0x10
[   16.108735]  ? finish_task_switch.isra.0+0x153/0x700
[   16.108757]  ? __switch_to+0x47/0xf50
[   16.108783]  ? __schedule+0x10cc/0x2b60
[   16.108805]  ? __pfx_read_tsc+0x10/0x10
[   16.108828]  ? ktime_get_ts64+0x86/0x230
[   16.108852]  kunit_try_run_case+0x1a5/0x480
[   16.108876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.108899]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.108923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.108946]  ? __kthread_parkme+0x82/0x180
[   16.108966]  ? preempt_count_sub+0x50/0x80
[   16.108996]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.109029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.109053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.109076]  kthread+0x337/0x6f0
[   16.109096]  ? trace_preempt_on+0x20/0xc0
[   16.109119]  ? __pfx_kthread+0x10/0x10
[   16.109140]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.109162]  ? calculate_sigpending+0x7b/0xa0
[   16.109184]  ? __pfx_kthread+0x10/0x10
[   16.109206]  ret_from_fork+0x116/0x1d0
[   16.109224]  ? __pfx_kthread+0x10/0x10
[   16.109244]  ret_from_fork_asm+0x1a/0x30
[   16.109276]  </TASK>
[   16.109287] 
[   16.122070] Allocated by task 303:
[   16.122429]  kasan_save_stack+0x45/0x70
[   16.122711]  kasan_save_track+0x18/0x40
[   16.123097]  kasan_save_alloc_info+0x3b/0x50
[   16.123258]  __kasan_kmalloc+0xb7/0xc0
[   16.123531]  __kmalloc_noprof+0x1c9/0x500
[   16.123926]  kunit_kmalloc_array+0x25/0x60
[   16.124344]  copy_user_test_oob+0xab/0x10f0
[   16.124644]  kunit_try_run_case+0x1a5/0x480
[   16.124916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.125138]  kthread+0x337/0x6f0
[   16.125261]  ret_from_fork+0x116/0x1d0
[   16.125415]  ret_from_fork_asm+0x1a/0x30
[   16.125782] 
[   16.125962] The buggy address belongs to the object at ffff888102fd1e00
[   16.125962]  which belongs to the cache kmalloc-128 of size 128
[   16.127111] The buggy address is located 0 bytes to the right of
[   16.127111]  allocated 120-byte region [ffff888102fd1e00, ffff888102fd1e78)
[   16.128258] 
[   16.128436] The buggy address belongs to the physical page:
[   16.128833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fd1
[   16.129096] flags: 0x200000000000000(node=0|zone=2)
[   16.129259] page_type: f5(slab)
[   16.129379] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.129692] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.130037] page dumped because: kasan: bad access detected
[   16.130276] 
[   16.130381] Memory state around the buggy address:
[   16.130597]  ffff888102fd1d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.130844]  ffff888102fd1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.131179] >ffff888102fd1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.131441]                                                                 ^
[   16.131751]  ffff888102fd1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.132103]  ffff888102fd1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.132391] ==================================================================