Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   66.610536] ==================================================================
[   66.617623] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   66.624476] Write of size 121 at addr ffff000800da9800 by task kunit_try_catch/329
[   66.632027] 
[   66.633510] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   66.633558] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.633577] Hardware name: WinLink E850-96 board (DT)
[   66.633596] Call trace:
[   66.633607]  show_stack+0x20/0x38 (C)
[   66.633640]  dump_stack_lvl+0x8c/0xd0
[   66.633677]  print_report+0x118/0x608
[   66.633711]  kasan_report+0xdc/0x128
[   66.633743]  kasan_check_range+0x100/0x1a8
[   66.633777]  __kasan_check_write+0x20/0x30
[   66.633806]  strncpy_from_user+0x3c/0x2a0
[   66.633839]  copy_user_test_oob+0x5c0/0xec8
[   66.633874]  kunit_try_run_case+0x170/0x3f0
[   66.633909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.633950]  kthread+0x328/0x630
[   66.633976]  ret_from_fork+0x10/0x20
[   66.634008] 
[   66.704595] Allocated by task 329:
[   66.707981]  kasan_save_stack+0x3c/0x68
[   66.711801]  kasan_save_track+0x20/0x40
[   66.715620]  kasan_save_alloc_info+0x40/0x58
[   66.719874]  __kasan_kmalloc+0xd4/0xd8
[   66.723606]  __kmalloc_noprof+0x190/0x4d0
[   66.727599]  kunit_kmalloc_array+0x34/0x88
[   66.731679]  copy_user_test_oob+0xac/0xec8
[   66.735759]  kunit_try_run_case+0x170/0x3f0
[   66.739925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.745394]  kthread+0x328/0x630
[   66.748606]  ret_from_fork+0x10/0x20
[   66.752165] 
[   66.753640] The buggy address belongs to the object at ffff000800da9800
[   66.753640]  which belongs to the cache kmalloc-128 of size 128
[   66.766140] The buggy address is located 0 bytes inside of
[   66.766140]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   66.778553] 
[   66.780031] The buggy address belongs to the physical page:
[   66.785585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   66.793570] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   66.801211] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   66.808153] page_type: f5(slab)
[   66.811286] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.819010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.826737] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   66.834548] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   66.842361] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   66.850173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   66.857979] page dumped because: kasan: bad access detected
[   66.863536] 
[   66.865010] Memory state around the buggy address:
[   66.869790]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   66.876993]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.884197] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   66.891398]                                                                 ^
[   66.898520]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.905725]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   66.912926] ==================================================================
[   66.920336] ==================================================================
[   66.927341] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   66.934280] Write of size 1 at addr ffff000800da9878 by task kunit_try_catch/329
[   66.941658] 
[   66.943142] CPU: 2 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   66.943190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   66.943209] Hardware name: WinLink E850-96 board (DT)
[   66.943229] Call trace:
[   66.943241]  show_stack+0x20/0x38 (C)
[   66.943277]  dump_stack_lvl+0x8c/0xd0
[   66.943315]  print_report+0x118/0x608
[   66.943350]  kasan_report+0xdc/0x128
[   66.943384]  __asan_report_store1_noabort+0x20/0x30
[   66.943415]  strncpy_from_user+0x270/0x2a0
[   66.943444]  copy_user_test_oob+0x5c0/0xec8
[   66.943478]  kunit_try_run_case+0x170/0x3f0
[   66.943514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   66.943554]  kthread+0x328/0x630
[   66.943580]  ret_from_fork+0x10/0x20
[   66.943614] 
[   67.011015] Allocated by task 329:
[   67.014400]  kasan_save_stack+0x3c/0x68
[   67.018220]  kasan_save_track+0x20/0x40
[   67.022039]  kasan_save_alloc_info+0x40/0x58
[   67.026293]  __kasan_kmalloc+0xd4/0xd8
[   67.030025]  __kmalloc_noprof+0x190/0x4d0
[   67.034018]  kunit_kmalloc_array+0x34/0x88
[   67.038097]  copy_user_test_oob+0xac/0xec8
[   67.042177]  kunit_try_run_case+0x170/0x3f0
[   67.046345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   67.051813]  kthread+0x328/0x630
[   67.055025]  ret_from_fork+0x10/0x20
[   67.058584] 
[   67.060061] The buggy address belongs to the object at ffff000800da9800
[   67.060061]  which belongs to the cache kmalloc-128 of size 128
[   67.072559] The buggy address is located 0 bytes to the right of
[   67.072559]  allocated 120-byte region [ffff000800da9800, ffff000800da9878)
[   67.085493] 
[   67.086970] The buggy address belongs to the physical page:
[   67.092527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880da8
[   67.100511] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   67.108149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   67.115093] page_type: f5(slab)
[   67.118229] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   67.125950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.133677] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   67.141488] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   67.149301] head: 0bfffe0000000001 fffffdffe0036a01 00000000ffffffff 00000000ffffffff
[   67.157113] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   67.164919] page dumped because: kasan: bad access detected
[   67.170474] 
[   67.171950] Memory state around the buggy address:
[   67.176730]  ffff000800da9700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   67.183932]  ffff000800da9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.191137] >ffff000800da9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   67.198338]                                                                 ^
[   67.205460]  ffff000800da9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.212665]  ffff000800da9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   67.219866] ==================================================================

[   30.088773] ==================================================================
[   30.089033] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   30.090696] Write of size 121 at addr fff00000c56e8f00 by task kunit_try_catch/286
[   30.090840] 
[   30.090973] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.091186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.091550] Hardware name: linux,dummy-virt (DT)
[   30.091663] Call trace:
[   30.091739]  show_stack+0x20/0x38 (C)
[   30.091869]  dump_stack_lvl+0x8c/0xd0
[   30.091992]  print_report+0x118/0x608
[   30.092117]  kasan_report+0xdc/0x128
[   30.092239]  kasan_check_range+0x100/0x1a8
[   30.093739]  __kasan_check_write+0x20/0x30
[   30.093942]  strncpy_from_user+0x3c/0x2a0
[   30.094077]  copy_user_test_oob+0x5c0/0xec8
[   30.094566]  kunit_try_run_case+0x170/0x3f0
[   30.094876]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.095016]  kthread+0x328/0x630
[   30.095131]  ret_from_fork+0x10/0x20
[   30.095241] 
[   30.095286] Allocated by task 286:
[   30.095355]  kasan_save_stack+0x3c/0x68
[   30.095463]  kasan_save_track+0x20/0x40
[   30.095560]  kasan_save_alloc_info+0x40/0x58
[   30.095652]  __kasan_kmalloc+0xd4/0xd8
[   30.095764]  __kmalloc_noprof+0x190/0x4d0
[   30.095865]  kunit_kmalloc_array+0x34/0x88
[   30.095964]  copy_user_test_oob+0xac/0xec8
[   30.096062]  kunit_try_run_case+0x170/0x3f0
[   30.096162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.096359]  kthread+0x328/0x630
[   30.096668]  ret_from_fork+0x10/0x20
[   30.096788] 
[   30.096842] The buggy address belongs to the object at fff00000c56e8f00
[   30.096842]  which belongs to the cache kmalloc-128 of size 128
[   30.096981] The buggy address is located 0 bytes inside of
[   30.096981]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   30.097137] 
[   30.097188] The buggy address belongs to the physical page:
[   30.097278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   30.098464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.098778] page_type: f5(slab)
[   30.099117] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.099967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.100121] page dumped because: kasan: bad access detected
[   30.100208] 
[   30.100258] Memory state around the buggy address:
[   30.100344]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.100462]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.100573] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.101182]                                                                 ^
[   30.101664]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.101920]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.102461] ==================================================================
[   30.104744] ==================================================================
[   30.104853] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   30.104962] Write of size 1 at addr fff00000c56e8f78 by task kunit_try_catch/286
[   30.105083] 
[   30.105152] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   30.105379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.105449] Hardware name: linux,dummy-virt (DT)
[   30.105522] Call trace:
[   30.105582]  show_stack+0x20/0x38 (C)
[   30.105716]  dump_stack_lvl+0x8c/0xd0
[   30.105849]  print_report+0x118/0x608
[   30.107002]  kasan_report+0xdc/0x128
[   30.107432]  __asan_report_store1_noabort+0x20/0x30
[   30.107762]  strncpy_from_user+0x270/0x2a0
[   30.107894]  copy_user_test_oob+0x5c0/0xec8
[   30.108112]  kunit_try_run_case+0x170/0x3f0
[   30.108265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.108402]  kthread+0x328/0x630
[   30.108533]  ret_from_fork+0x10/0x20
[   30.108760] 
[   30.108817] Allocated by task 286:
[   30.108905]  kasan_save_stack+0x3c/0x68
[   30.109022]  kasan_save_track+0x20/0x40
[   30.109131]  kasan_save_alloc_info+0x40/0x58
[   30.109236]  __kasan_kmalloc+0xd4/0xd8
[   30.109395]  __kmalloc_noprof+0x190/0x4d0
[   30.109507]  kunit_kmalloc_array+0x34/0x88
[   30.109611]  copy_user_test_oob+0xac/0xec8
[   30.109767]  kunit_try_run_case+0x170/0x3f0
[   30.109936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.110116]  kthread+0x328/0x630
[   30.110373]  ret_from_fork+0x10/0x20
[   30.110478] 
[   30.110570] The buggy address belongs to the object at fff00000c56e8f00
[   30.110570]  which belongs to the cache kmalloc-128 of size 128
[   30.110747] The buggy address is located 0 bytes to the right of
[   30.110747]  allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78)
[   30.110974] 
[   30.111085] The buggy address belongs to the physical page:
[   30.111212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8
[   30.111361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.111496] page_type: f5(slab)
[   30.111672] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.111967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.112359] page dumped because: kasan: bad access detected
[   30.112506] 
[   30.112557] Memory state around the buggy address:
[   30.112659]  fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.112818]  fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.113130] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.113286]                                                                 ^
[   30.113390]  fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.113500]  fff00000c56e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.113632] ==================================================================

[   25.865559] ==================================================================
[   25.866131] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   25.867093] Write of size 121 at addr ffff8881022e0700 by task kunit_try_catch/302
[   25.867775] 
[   25.868418] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.868898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.868932] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.868967] Call Trace:
[   25.868992]  <TASK>
[   25.869018]  dump_stack_lvl+0x73/0xb0
[   25.869058]  print_report+0xd1/0x650
[   25.869096]  ? __virt_addr_valid+0x1db/0x2d0
[   25.869130]  ? strncpy_from_user+0x2e/0x1d0
[   25.869160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.869195]  ? strncpy_from_user+0x2e/0x1d0
[   25.869225]  kasan_report+0x141/0x180
[   25.869259]  ? strncpy_from_user+0x2e/0x1d0
[   25.869295]  kasan_check_range+0x10c/0x1c0
[   25.869331]  __kasan_check_write+0x18/0x20
[   25.869361]  strncpy_from_user+0x2e/0x1d0
[   25.869394]  copy_user_test_oob+0x760/0x10f0
[   25.869426]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.869455]  ? finish_task_switch.isra.0+0x153/0x700
[   25.869489]  ? __switch_to+0x47/0xf50
[   25.869527]  ? __schedule+0x10cc/0x2b60
[   25.869620]  ? __pfx_read_tsc+0x10/0x10
[   25.869657]  ? ktime_get_ts64+0x86/0x230
[   25.869693]  kunit_try_run_case+0x1a5/0x480
[   25.869727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.869756]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.869794]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.869857]  ? __kthread_parkme+0x82/0x180
[   25.869892]  ? preempt_count_sub+0x50/0x80
[   25.869926]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.869957]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.869996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.870035]  kthread+0x337/0x6f0
[   25.870065]  ? trace_preempt_on+0x20/0xc0
[   25.870098]  ? __pfx_kthread+0x10/0x10
[   25.870129]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.870163]  ? calculate_sigpending+0x7b/0xa0
[   25.870211]  ? __pfx_kthread+0x10/0x10
[   25.870246]  ret_from_fork+0x116/0x1d0
[   25.870273]  ? __pfx_kthread+0x10/0x10
[   25.870303]  ret_from_fork_asm+0x1a/0x30
[   25.870347]  </TASK>
[   25.870364] 
[   25.891619] Allocated by task 302:
[   25.892389]  kasan_save_stack+0x45/0x70
[   25.893052]  kasan_save_track+0x18/0x40
[   25.893404]  kasan_save_alloc_info+0x3b/0x50
[   25.893877]  __kasan_kmalloc+0xb7/0xc0
[   25.894814]  __kmalloc_noprof+0x1c9/0x500
[   25.895136]  kunit_kmalloc_array+0x25/0x60
[   25.895929]  copy_user_test_oob+0xab/0x10f0
[   25.896273]  kunit_try_run_case+0x1a5/0x480
[   25.896638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.897069]  kthread+0x337/0x6f0
[   25.897353]  ret_from_fork+0x116/0x1d0
[   25.898687]  ret_from_fork_asm+0x1a/0x30
[   25.899033] 
[   25.899440] The buggy address belongs to the object at ffff8881022e0700
[   25.899440]  which belongs to the cache kmalloc-128 of size 128
[   25.900747] The buggy address is located 0 bytes inside of
[   25.900747]  allocated 120-byte region [ffff8881022e0700, ffff8881022e0778)
[   25.902375] 
[   25.902569] The buggy address belongs to the physical page:
[   25.903250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0
[   25.903952] flags: 0x200000000000000(node=0|zone=2)
[   25.904150] page_type: f5(slab)
[   25.904297] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.904571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.904856] page dumped because: kasan: bad access detected
[   25.905052] 
[   25.905138] Memory state around the buggy address:
[   25.905311]  ffff8881022e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.905563]  ffff8881022e0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.905816] >ffff8881022e0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.906326]                                                                 ^
[   25.906802]  ffff8881022e0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.907800]  ffff8881022e0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.908862] ==================================================================
[   25.911070] ==================================================================
[   25.911632] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   25.912376] Write of size 1 at addr ffff8881022e0778 by task kunit_try_catch/302
[   25.913598] 
[   25.914287] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.914370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.914418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.914488] Call Trace:
[   25.914548]  <TASK>
[   25.914755]  dump_stack_lvl+0x73/0xb0
[   25.914803]  print_report+0xd1/0x650
[   25.914870]  ? __virt_addr_valid+0x1db/0x2d0
[   25.914907]  ? strncpy_from_user+0x1a5/0x1d0
[   25.914940]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.914977]  ? strncpy_from_user+0x1a5/0x1d0
[   25.915008]  kasan_report+0x141/0x180
[   25.915041]  ? strncpy_from_user+0x1a5/0x1d0
[   25.915079]  __asan_report_store1_noabort+0x1b/0x30
[   25.915110]  strncpy_from_user+0x1a5/0x1d0
[   25.915144]  copy_user_test_oob+0x760/0x10f0
[   25.915176]  ? __pfx_copy_user_test_oob+0x10/0x10
[   25.915204]  ? finish_task_switch.isra.0+0x153/0x700
[   25.915237]  ? __switch_to+0x47/0xf50
[   25.915275]  ? __schedule+0x10cc/0x2b60
[   25.915312]  ? __pfx_read_tsc+0x10/0x10
[   25.915344]  ? ktime_get_ts64+0x86/0x230
[   25.915380]  kunit_try_run_case+0x1a5/0x480
[   25.915411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.915441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.915477]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.915514]  ? __kthread_parkme+0x82/0x180
[   25.915557]  ? preempt_count_sub+0x50/0x80
[   25.915612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.915645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.915684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.915722]  kthread+0x337/0x6f0
[   25.915753]  ? trace_preempt_on+0x20/0xc0
[   25.915789]  ? __pfx_kthread+0x10/0x10
[   25.915839]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.915897]  ? calculate_sigpending+0x7b/0xa0
[   25.915934]  ? __pfx_kthread+0x10/0x10
[   25.915967]  ret_from_fork+0x116/0x1d0
[   25.915996]  ? __pfx_kthread+0x10/0x10
[   25.916061]  ret_from_fork_asm+0x1a/0x30
[   25.916119]  </TASK>
[   25.916136] 
[   25.932963] Allocated by task 302:
[   25.933440]  kasan_save_stack+0x45/0x70
[   25.934022]  kasan_save_track+0x18/0x40
[   25.934501]  kasan_save_alloc_info+0x3b/0x50
[   25.935086]  __kasan_kmalloc+0xb7/0xc0
[   25.935527]  __kmalloc_noprof+0x1c9/0x500
[   25.936091]  kunit_kmalloc_array+0x25/0x60
[   25.936644]  copy_user_test_oob+0xab/0x10f0
[   25.937136]  kunit_try_run_case+0x1a5/0x480
[   25.937661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.938229]  kthread+0x337/0x6f0
[   25.938719]  ret_from_fork+0x116/0x1d0
[   25.939224]  ret_from_fork_asm+0x1a/0x30
[   25.939780] 
[   25.939993] The buggy address belongs to the object at ffff8881022e0700
[   25.939993]  which belongs to the cache kmalloc-128 of size 128
[   25.941121] The buggy address is located 0 bytes to the right of
[   25.941121]  allocated 120-byte region [ffff8881022e0700, ffff8881022e0778)
[   25.942335] 
[   25.942615] The buggy address belongs to the physical page:
[   25.943271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022e0
[   25.944093] flags: 0x200000000000000(node=0|zone=2)
[   25.944490] page_type: f5(slab)
[   25.944813] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.945497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.946183] page dumped because: kasan: bad access detected
[   25.946693] 
[   25.946945] Memory state around the buggy address:
[   25.947372]  ffff8881022e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.947910]  ffff8881022e0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.948368] >ffff8881022e0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   25.949017]                                                                 ^
[   25.949678]  ffff8881022e0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.951092]  ffff8881022e0800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.951595] ==================================================================

[   92.975952] ==================================================================
[   92.983245] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x248/0x260
[   92.990234] Write of size 1 at addr cc90cd78 by task kunit_try_catch/337
[   92.996978] 
[   92.998504] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   92.998535] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.998535] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.998535] Call trace: 
[   92.998565]  unwind_backtrace from show_stack+0x18/0x1c
[   92.998565]  show_stack from dump_stack_lvl+0x70/0x90
[   92.998596]  dump_stack_lvl from print_report+0x158/0x528
[   92.998626]  print_report from kasan_report+0xdc/0x118
[   92.998657]  kasan_report from strncpy_from_user+0x248/0x260
[   92.998687]  strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0
[   92.998687]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.998718]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.998748]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.998779]  kthread from ret_from_fork+0x14/0x20
[   92.998809] Exception stack(0xf256bfb0 to 0xf256bff8)
[   92.998809] bfa0:                                     00000000 00000000 00000000 00000000
[   92.998840] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.998840] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.998870] 
[   93.110992] Allocated by task 337:
[   93.114410]  kasan_save_track+0x30/0x5c
[   93.118286]  __kasan_kmalloc+0x8c/0x94
[   93.122039]  __kmalloc_noprof+0x20c/0x488
[   93.126098]  kunit_kmalloc_array+0x28/0x60
[   93.130218]  copy_user_test_oob+0xac/0x12b0
[   93.134429]  kunit_try_run_case+0x22c/0x5a8
[   93.138671]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   93.144195]  kthread+0x464/0x810
[   93.147460]  ret_from_fork+0x14/0x20
[   93.151062] 
[   93.152557] The buggy address belongs to the object at cc90cd00
[   93.152557]  which belongs to the cache kmalloc-128 of size 128
[   93.164459] The buggy address is located 0 bytes to the right of
[   93.164459]  allocated 120-byte region [cc90cd00, cc90cd78)
[   93.176086] 
[   93.177581] The buggy address belongs to the physical page:
[   93.183197] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   93.190460] flags: 0x0(zone=0)
[   93.193542] page_type: f5(slab)
[   93.196716] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   93.204864] raw: 00000000
[   93.207489] page dumped because: kasan: bad access detected
[   93.213104] 
[   93.214599] Memory state around the buggy address:
[   93.219421]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   93.226013]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.232574] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   93.239135]                                                         ^
[   93.245635]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.252197]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   93.258758] ==================================================================
[   92.680206] ==================================================================
[   92.687469] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x20/0x260
[   92.694427] Write of size 121 at addr cc90cd00 by task kunit_try_catch/337
[   92.701324] 
[   92.702850] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   92.702880] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   92.702880] Hardware name: Generic DRA74X (Flattened Device Tree)
[   92.702880] Call trace: 
[   92.702911]  unwind_backtrace from show_stack+0x18/0x1c
[   92.702911]  show_stack from dump_stack_lvl+0x70/0x90
[   92.702941]  dump_stack_lvl from print_report+0x158/0x528
[   92.702972]  print_report from kasan_report+0xdc/0x118
[   92.703002]  kasan_report from kasan_check_range+0x14c/0x198
[   92.703033]  kasan_check_range from strncpy_from_user+0x20/0x260
[   92.703033]  strncpy_from_user from copy_user_test_oob+0x7a4/0x12b0
[   92.703063]  copy_user_test_oob from kunit_try_run_case+0x22c/0x5a8
[   92.703094]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.703124]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   92.703155]  kthread from ret_from_fork+0x14/0x20
[   92.703186] Exception stack(0xf256bfb0 to 0xf256bff8)
[   92.703186] bfa0:                                     00000000 00000000 00000000 00000000
[   92.703216] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   92.703216] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   92.703247] 
[   92.821380] Allocated by task 337:
[   92.824829]  kasan_save_track+0x30/0x5c
[   92.828674]  __kasan_kmalloc+0x8c/0x94
[   92.832458]  __kmalloc_noprof+0x20c/0x488
[   92.836486]  kunit_kmalloc_array+0x28/0x60
[   92.840637]  copy_user_test_oob+0xac/0x12b0
[   92.844848]  kunit_try_run_case+0x22c/0x5a8
[   92.849060]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   92.854583]  kthread+0x464/0x810
[   92.857849]  ret_from_fork+0x14/0x20
[   92.861450] 
[   92.862945] The buggy address belongs to the object at cc90cd00
[   92.862945]  which belongs to the cache kmalloc-128 of size 128
[   92.874847] The buggy address is located 0 bytes inside of
[   92.874847]  allocated 120-byte region [cc90cd00, cc90cd78)
[   92.885955] 
[   92.887481] The buggy address belongs to the physical page:
[   92.893066] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90c
[   92.900360] flags: 0x0(zone=0)
[   92.903411] page_type: f5(slab)
[   92.906585] raw: 00000000 c7001400 00000122 00000000 00000000 80100010 f5000000 00000000
[   92.914733] raw: 00000000
[   92.917358] page dumped because: kasan: bad access detected
[   92.922973] 
[   92.924468] Memory state around the buggy address:
[   92.929290]  cc90cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 05 fc fc
[   92.935882]  cc90cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.942443] >cc90cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   92.949005]                                                         ^
[   92.955505]  cc90cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.962066]  cc90ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   92.968658] ==================================================================