Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
juno-r2
qemu-arm64
qemu-x86_64

[   78.929293] ==================================================================
[   78.936627] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   78.943600] Write of size 121 at addr ffff00008039fd00 by task kunit_try_catch/371
[   78.951262] 
[   78.952798] CPU: 6 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   78.952830] Tainted: [B]=BAD_PAGE, [N]=TEST
[   78.952839] Hardware name: Thundercomm Dragonboard 845c (DT)
[   78.952851] Call trace:
[   78.952858]  show_stack+0x20/0x38 (C)
[   78.952877]  dump_stack_lvl+0x8c/0xd0
[   78.952897]  print_report+0x118/0x608
[   78.952915]  kasan_report+0xdc/0x128
[   78.952935]  kasan_check_range+0x100/0x1a8
[   78.952956]  __kasan_check_write+0x20/0x30
[   78.952971]  strncpy_from_user+0x3c/0x2a0
[   78.952988]  copy_user_test_oob+0x5c0/0xec8
[   78.953005]  kunit_try_run_case+0x170/0x3f0
[   78.953023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   78.953043]  kthread+0x328/0x630
[   78.953056]  ret_from_fork+0x10/0x20
[   78.953073] 
[   79.026246] Allocated by task 371:
[   79.029699]  kasan_save_stack+0x3c/0x68
[   79.033607]  kasan_save_track+0x20/0x40
[   79.037512]  kasan_save_alloc_info+0x40/0x58
[   79.041847]  __kasan_kmalloc+0xd4/0xd8
[   79.045664]  __kmalloc_noprof+0x198/0x4c8
[   79.049741]  kunit_kmalloc_array+0x34/0x88
[   79.053904]  copy_user_test_oob+0xac/0xec8
[   79.058066]  kunit_try_run_case+0x170/0x3f0
[   79.062316]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.067877]  kthread+0x328/0x630
[   79.071163]  ret_from_fork+0x10/0x20
[   79.074793] 
[   79.076324] The buggy address belongs to the object at ffff00008039fd00
[   79.076324]  which belongs to the cache kmalloc-128 of size 128
[   79.088979] The buggy address is located 0 bytes inside of
[   79.088979]  allocated 120-byte region [ffff00008039fd00, ffff00008039fd78)
[   79.101549] 
[   79.103074] The buggy address belongs to the physical page:
[   79.108712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   79.116813] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   79.124564] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   79.131611] page_type: f5(slab)
[   79.134812] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   79.142655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.150495] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   79.158421] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.166347] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   79.174272] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   79.182194] page dumped because: kasan: bad access detected
[   79.187834] 
[   79.189357] Memory state around the buggy address:
[   79.194208]  ffff00008039fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   79.201515]  ffff00008039fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.208821] >ffff00008039fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   79.216136]                                                                 ^
[   79.223354]  ffff00008039fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.230659]  ffff00008039fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.237974] ==================================================================
[   79.245580] ==================================================================
[   79.252913] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   79.259973] Write of size 1 at addr ffff00008039fd78 by task kunit_try_catch/371
[   79.267474] 
[   79.269007] CPU: 1 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   79.269038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   79.269047] Hardware name: Thundercomm Dragonboard 845c (DT)
[   79.269058] Call trace:
[   79.269065]  show_stack+0x20/0x38 (C)
[   79.269083]  dump_stack_lvl+0x8c/0xd0
[   79.269102]  print_report+0x118/0x608
[   79.269124]  kasan_report+0xdc/0x128
[   79.269145]  __asan_report_store1_noabort+0x20/0x30
[   79.269164]  strncpy_from_user+0x270/0x2a0
[   79.269183]  copy_user_test_oob+0x5c0/0xec8
[   79.269202]  kunit_try_run_case+0x170/0x3f0
[   79.269223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.269244]  kthread+0x328/0x630
[   79.269260]  ret_from_fork+0x10/0x20
[   79.269278] 
[   79.339217] Allocated by task 371:
[   79.342684]  kasan_save_stack+0x3c/0x68
[   79.346590]  kasan_save_track+0x20/0x40
[   79.350498]  kasan_save_alloc_info+0x40/0x58
[   79.354845]  __kasan_kmalloc+0xd4/0xd8
[   79.358662]  __kmalloc_noprof+0x198/0x4c8
[   79.362740]  kunit_kmalloc_array+0x34/0x88
[   79.366904]  copy_user_test_oob+0xac/0xec8
[   79.371068]  kunit_try_run_case+0x170/0x3f0
[   79.375329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   79.380899]  kthread+0x328/0x630
[   79.384185]  ret_from_fork+0x10/0x20
[   79.387830] 
[   79.389359] The buggy address belongs to the object at ffff00008039fd00
[   79.389359]  which belongs to the cache kmalloc-128 of size 128
[   79.402021] The buggy address is located 0 bytes to the right of
[   79.402021]  allocated 120-byte region [ffff00008039fd00, ffff00008039fd78)
[   79.415128] 
[   79.416660] The buggy address belongs to the physical page:
[   79.422305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   79.430410] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   79.438168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   79.445225] page_type: f5(slab)
[   79.448425] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   79.456275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.464124] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   79.472059] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   79.479993] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   79.487927] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   79.495857] page dumped because: kasan: bad access detected
[   79.501503] 
[   79.503034] Memory state around the buggy address:
[   79.507892]  ffff00008039fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   79.515209]  ffff00008039fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.522525] >ffff00008039fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   79.529839]                                                                 ^
[   79.537066]  ffff00008039fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.544383]  ffff00008039fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.551698] ==================================================================

[ 1525.470259] ==================================================================
[ 1525.470283] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[ 1525.470317] Write of size 121 at addr ffff000827f2f500 by task kunit_try_catch/356
[ 1525.470352] 
[ 1525.470367] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.470429] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.470449] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.470471] Call trace:
[ 1525.470483]  show_stack+0x20/0x38 (C)
[ 1525.470520]  dump_stack_lvl+0x8c/0xd0
[ 1525.470560]  print_report+0x118/0x608
[ 1525.470601]  kasan_report+0xdc/0x128
[ 1525.470642]  kasan_check_range+0x100/0x1a8
[ 1525.470684]  __kasan_check_write+0x20/0x30
[ 1525.470721]  strncpy_from_user+0x3c/0x2a0
[ 1525.470758]  copy_user_test_oob+0x5c0/0xec8
[ 1525.470800]  kunit_try_run_case+0x170/0x3f0
[ 1525.470839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.470885]  kthread+0x328/0x630
[ 1525.470917]  ret_from_fork+0x10/0x20
[ 1525.470955] 
[ 1525.470965] Allocated by task 356:
[ 1525.470983]  kasan_save_stack+0x3c/0x68
[ 1525.471017]  kasan_save_track+0x20/0x40
[ 1525.471050]  kasan_save_alloc_info+0x40/0x58
[ 1525.471079]  __kasan_kmalloc+0xd4/0xd8
[ 1525.471112]  __kmalloc_noprof+0x198/0x4c8
[ 1525.471145]  kunit_kmalloc_array+0x34/0x88
[ 1525.471177]  copy_user_test_oob+0xac/0xec8
[ 1525.471209]  kunit_try_run_case+0x170/0x3f0
[ 1525.471242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.471280]  kthread+0x328/0x630
[ 1525.471304]  ret_from_fork+0x10/0x20
[ 1525.471335] 
[ 1525.471346] The buggy address belongs to the object at ffff000827f2f500
[ 1525.471346]  which belongs to the cache kmalloc-128 of size 128
[ 1525.471385] The buggy address is located 0 bytes inside of
[ 1525.471385]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.471430] 
[ 1525.471440] The buggy address belongs to the physical page:
[ 1525.471458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.471493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.471525] page_type: f5(slab)
[ 1525.471552] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.471588] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.471615] page dumped because: kasan: bad access detected
[ 1525.471635] 
[ 1525.471644] Memory state around the buggy address:
[ 1525.471665]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.471695]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.471726] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.471751]                                                                 ^
[ 1525.471779]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.471809]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.471835] ==================================================================
[ 1525.471864] ==================================================================
[ 1525.471886] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[ 1525.471920] Write of size 1 at addr ffff000827f2f578 by task kunit_try_catch/356
[ 1525.471955] 
[ 1525.471970] CPU: 3 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.472031] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.472051] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.472073] Call trace:
[ 1525.472085]  show_stack+0x20/0x38 (C)
[ 1525.472122]  dump_stack_lvl+0x8c/0xd0
[ 1525.472162]  print_report+0x118/0x608
[ 1525.472204]  kasan_report+0xdc/0x128
[ 1525.472244]  __asan_report_store1_noabort+0x20/0x30
[ 1525.472282]  strncpy_from_user+0x270/0x2a0
[ 1525.472320]  copy_user_test_oob+0x5c0/0xec8
[ 1525.472361]  kunit_try_run_case+0x170/0x3f0
[ 1525.472400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.472447]  kthread+0x328/0x630
[ 1525.472479]  ret_from_fork+0x10/0x20
[ 1525.472516] 
[ 1525.472527] Allocated by task 356:
[ 1525.472545]  kasan_save_stack+0x3c/0x68
[ 1525.472579]  kasan_save_track+0x20/0x40
[ 1525.472612]  kasan_save_alloc_info+0x40/0x58
[ 1525.472641]  __kasan_kmalloc+0xd4/0xd8
[ 1525.472674]  __kmalloc_noprof+0x198/0x4c8
[ 1525.472707]  kunit_kmalloc_array+0x34/0x88
[ 1525.472738]  copy_user_test_oob+0xac/0xec8
[ 1525.472771]  kunit_try_run_case+0x170/0x3f0
[ 1525.472803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.472841]  kthread+0x328/0x630
[ 1525.472865]  ret_from_fork+0x10/0x20
[ 1525.472896] 
[ 1525.472906] The buggy address belongs to the object at ffff000827f2f500
[ 1525.472906]  which belongs to the cache kmalloc-128 of size 128
[ 1525.472946] The buggy address is located 0 bytes to the right of
[ 1525.472946]  allocated 120-byte region [ffff000827f2f500, ffff000827f2f578)
[ 1525.472992] 
[ 1525.473002] The buggy address belongs to the physical page:
[ 1525.473021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a7f2f
[ 1525.473056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.473088] page_type: f5(slab)
[ 1525.473114] raw: 0bfffe0000000000 ffff000800002a00 dead000000000122 0000000000000000
[ 1525.473150] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[ 1525.473178] page dumped because: kasan: bad access detected
[ 1525.473197] 
[ 1525.473207] Memory state around the buggy address:
[ 1525.473228]  ffff000827f2f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 1525.473258]  ffff000827f2f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.473289] >ffff000827f2f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[ 1525.473314]                                                                 ^
[ 1525.473341]  ffff000827f2f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.473372]  ffff000827f2f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1525.473398] ==================================================================

[   30.089091] ==================================================================
[   30.089283] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   30.089463] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297
[   30.089621] 
[   30.089661] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.089751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.089780] Hardware name: linux,dummy-virt (DT)
[   30.089841] Call trace:
[   30.089867]  show_stack+0x20/0x38 (C)
[   30.089918]  dump_stack_lvl+0x8c/0xd0
[   30.089995]  print_report+0x118/0x608
[   30.090046]  kasan_report+0xdc/0x128
[   30.090105]  kasan_check_range+0x100/0x1a8
[   30.090163]  __kasan_check_write+0x20/0x30
[   30.090210]  strncpy_from_user+0x3c/0x2a0
[   30.090258]  copy_user_test_oob+0x5c0/0xec8
[   30.090309]  kunit_try_run_case+0x170/0x3f0
[   30.090361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.090425]  kthread+0x328/0x630
[   30.090471]  ret_from_fork+0x10/0x20
[   30.090530] 
[   30.090550] Allocated by task 297:
[   30.090579]  kasan_save_stack+0x3c/0x68
[   30.090632]  kasan_save_track+0x20/0x40
[   30.090679]  kasan_save_alloc_info+0x40/0x58
[   30.090716]  __kasan_kmalloc+0xd4/0xd8
[   30.090762]  __kmalloc_noprof+0x198/0x4c8
[   30.090810]  kunit_kmalloc_array+0x34/0x88
[   30.090859]  copy_user_test_oob+0xac/0xec8
[   30.090899]  kunit_try_run_case+0x170/0x3f0
[   30.090938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.090984]  kthread+0x328/0x630
[   30.091017]  ret_from_fork+0x10/0x20
[   30.091366] 
[   30.091424] The buggy address belongs to the object at fff00000c5773e00
[   30.091424]  which belongs to the cache kmalloc-128 of size 128
[   30.091756] The buggy address is located 0 bytes inside of
[   30.091756]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.091864] 
[   30.091914] The buggy address belongs to the physical page:
[   30.092164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.092240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.092549] page_type: f5(slab)
[   30.092676] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.093017] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.093695] page dumped because: kasan: bad access detected
[   30.094150] 
[   30.094218] Memory state around the buggy address:
[   30.094255]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.094309]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094512] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.094845]                                                                 ^
[   30.095159]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.095499]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.095585] ==================================================================
[   30.096977] ==================================================================
[   30.097155] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   30.097217] Write of size 1 at addr fff00000c5773e78 by task kunit_try_catch/297
[   30.097270] 
[   30.097334] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   30.097454] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.097482] Hardware name: linux,dummy-virt (DT)
[   30.097514] Call trace:
[   30.097538]  show_stack+0x20/0x38 (C)
[   30.097588]  dump_stack_lvl+0x8c/0xd0
[   30.097635]  print_report+0x118/0x608
[   30.097684]  kasan_report+0xdc/0x128
[   30.097754]  __asan_report_store1_noabort+0x20/0x30
[   30.097814]  strncpy_from_user+0x270/0x2a0
[   30.097863]  copy_user_test_oob+0x5c0/0xec8
[   30.097920]  kunit_try_run_case+0x170/0x3f0
[   30.097970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.098025]  kthread+0x328/0x630
[   30.098526]  ret_from_fork+0x10/0x20
[   30.098888] 
[   30.098925] Allocated by task 297:
[   30.098956]  kasan_save_stack+0x3c/0x68
[   30.099009]  kasan_save_track+0x20/0x40
[   30.099546]  kasan_save_alloc_info+0x40/0x58
[   30.099612]  __kasan_kmalloc+0xd4/0xd8
[   30.099844]  __kmalloc_noprof+0x198/0x4c8
[   30.099928]  kunit_kmalloc_array+0x34/0x88
[   30.099981]  copy_user_test_oob+0xac/0xec8
[   30.100034]  kunit_try_run_case+0x170/0x3f0
[   30.100246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.100382]  kthread+0x328/0x630
[   30.100587]  ret_from_fork+0x10/0x20
[   30.100779] 
[   30.100969] The buggy address belongs to the object at fff00000c5773e00
[   30.100969]  which belongs to the cache kmalloc-128 of size 128
[   30.101094] The buggy address is located 0 bytes to the right of
[   30.101094]  allocated 120-byte region [fff00000c5773e00, fff00000c5773e78)
[   30.101344] 
[   30.101776] The buggy address belongs to the physical page:
[   30.101814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   30.102209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.102390] page_type: f5(slab)
[   30.102501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   30.102653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   30.102883] page dumped because: kasan: bad access detected
[   30.102990] 
[   30.103410] Memory state around the buggy address:
[   30.103812]  fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   30.104031]  fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.104183] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   30.104352]                                                                 ^
[   30.104443]  fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.104577]  fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.104781] ==================================================================

[   26.204719] ==================================================================
[   26.205316] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   26.205685] Write of size 1 at addr ffff8881024e1b78 by task kunit_try_catch/314
[   26.206028] 
[   26.206337] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   26.206396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.206410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.206434] Call Trace:
[   26.206455]  <TASK>
[   26.206649]  dump_stack_lvl+0x73/0xb0
[   26.206686]  print_report+0xd1/0x650
[   26.206712]  ? __virt_addr_valid+0x1db/0x2d0
[   26.206738]  ? strncpy_from_user+0x1a5/0x1d0
[   26.206763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.206791]  ? strncpy_from_user+0x1a5/0x1d0
[   26.206816]  kasan_report+0x141/0x180
[   26.206840]  ? strncpy_from_user+0x1a5/0x1d0
[   26.206868]  __asan_report_store1_noabort+0x1b/0x30
[   26.206892]  strncpy_from_user+0x1a5/0x1d0
[   26.206919]  copy_user_test_oob+0x760/0x10f0
[   26.206944]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.206969]  ? finish_task_switch.isra.0+0x153/0x700
[   26.206993]  ? __switch_to+0x47/0xf50
[   26.207021]  ? __schedule+0x10cc/0x2b60
[   26.207054]  ? __pfx_read_tsc+0x10/0x10
[   26.207077]  ? ktime_get_ts64+0x86/0x230
[   26.207103]  kunit_try_run_case+0x1a5/0x480
[   26.207129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.207152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.207178]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.207204]  ? __kthread_parkme+0x82/0x180
[   26.207235]  ? preempt_count_sub+0x50/0x80
[   26.207260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.207285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.207310]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.207333]  kthread+0x337/0x6f0
[   26.207354]  ? trace_preempt_on+0x20/0xc0
[   26.207378]  ? __pfx_kthread+0x10/0x10
[   26.207400]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.207424]  ? calculate_sigpending+0x7b/0xa0
[   26.207449]  ? __pfx_kthread+0x10/0x10
[   26.207471]  ret_from_fork+0x116/0x1d0
[   26.207491]  ? __pfx_kthread+0x10/0x10
[   26.207512]  ret_from_fork_asm+0x1a/0x30
[   26.207543]  </TASK>
[   26.207556] 
[   26.216526] Allocated by task 314:
[   26.216984]  kasan_save_stack+0x45/0x70
[   26.217187]  kasan_save_track+0x18/0x40
[   26.217393]  kasan_save_alloc_info+0x3b/0x50
[   26.217544]  __kasan_kmalloc+0xb7/0xc0
[   26.217749]  __kmalloc_noprof+0x1c9/0x500
[   26.217925]  kunit_kmalloc_array+0x25/0x60
[   26.218161]  copy_user_test_oob+0xab/0x10f0
[   26.218395]  kunit_try_run_case+0x1a5/0x480
[   26.218608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.218846]  kthread+0x337/0x6f0
[   26.218960]  ret_from_fork+0x116/0x1d0
[   26.219105]  ret_from_fork_asm+0x1a/0x30
[   26.219344] 
[   26.219457] The buggy address belongs to the object at ffff8881024e1b00
[   26.219457]  which belongs to the cache kmalloc-128 of size 128
[   26.219982] The buggy address is located 0 bytes to the right of
[   26.219982]  allocated 120-byte region [ffff8881024e1b00, ffff8881024e1b78)
[   26.220530] 
[   26.220626] The buggy address belongs to the physical page:
[   26.220857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e1
[   26.221125] flags: 0x200000000000000(node=0|zone=2)
[   26.221368] page_type: f5(slab)
[   26.221554] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.221927] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.222470] page dumped because: kasan: bad access detected
[   26.222642] 
[   26.222706] Memory state around the buggy address:
[   26.222852]  ffff8881024e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.223358]  ffff8881024e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.223676] >ffff8881024e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.223979]                                                                 ^
[   26.224370]  ffff8881024e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.224623]  ffff8881024e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.224838] ==================================================================
[   26.177695] ==================================================================
[   26.178344] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   26.178781] Write of size 121 at addr ffff8881024e1b00 by task kunit_try_catch/314
[   26.179440] 
[   26.179771] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   26.179831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.179846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.179873] Call Trace:
[   26.179897]  <TASK>
[   26.179919]  dump_stack_lvl+0x73/0xb0
[   26.179952]  print_report+0xd1/0x650
[   26.179977]  ? __virt_addr_valid+0x1db/0x2d0
[   26.180003]  ? strncpy_from_user+0x2e/0x1d0
[   26.180027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.180054]  ? strncpy_from_user+0x2e/0x1d0
[   26.180079]  kasan_report+0x141/0x180
[   26.180102]  ? strncpy_from_user+0x2e/0x1d0
[   26.180131]  kasan_check_range+0x10c/0x1c0
[   26.180155]  __kasan_check_write+0x18/0x20
[   26.180179]  strncpy_from_user+0x2e/0x1d0
[   26.180202]  ? __kasan_check_read+0x15/0x20
[   26.180244]  copy_user_test_oob+0x760/0x10f0
[   26.180269]  ? __pfx_copy_user_test_oob+0x10/0x10
[   26.180292]  ? finish_task_switch.isra.0+0x153/0x700
[   26.180316]  ? __switch_to+0x47/0xf50
[   26.180343]  ? __schedule+0x10cc/0x2b60
[   26.180368]  ? __pfx_read_tsc+0x10/0x10
[   26.180391]  ? ktime_get_ts64+0x86/0x230
[   26.180418]  kunit_try_run_case+0x1a5/0x480
[   26.180443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.180467]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.180493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.180518]  ? __kthread_parkme+0x82/0x180
[   26.180540]  ? preempt_count_sub+0x50/0x80
[   26.180563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.180588]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.180613]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.180638]  kthread+0x337/0x6f0
[   26.180659]  ? trace_preempt_on+0x20/0xc0
[   26.180683]  ? __pfx_kthread+0x10/0x10
[   26.180704]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.180728]  ? calculate_sigpending+0x7b/0xa0
[   26.180753]  ? __pfx_kthread+0x10/0x10
[   26.180775]  ret_from_fork+0x116/0x1d0
[   26.180795]  ? __pfx_kthread+0x10/0x10
[   26.180816]  ret_from_fork_asm+0x1a/0x30
[   26.180848]  </TASK>
[   26.180861] 
[   26.192716] Allocated by task 314:
[   26.192890]  kasan_save_stack+0x45/0x70
[   26.193140]  kasan_save_track+0x18/0x40
[   26.193339]  kasan_save_alloc_info+0x3b/0x50
[   26.193546]  __kasan_kmalloc+0xb7/0xc0
[   26.193726]  __kmalloc_noprof+0x1c9/0x500
[   26.193920]  kunit_kmalloc_array+0x25/0x60
[   26.194592]  copy_user_test_oob+0xab/0x10f0
[   26.194787]  kunit_try_run_case+0x1a5/0x480
[   26.195307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.195703]  kthread+0x337/0x6f0
[   26.195970]  ret_from_fork+0x116/0x1d0
[   26.196366]  ret_from_fork_asm+0x1a/0x30
[   26.196623] 
[   26.196702] The buggy address belongs to the object at ffff8881024e1b00
[   26.196702]  which belongs to the cache kmalloc-128 of size 128
[   26.197565] The buggy address is located 0 bytes inside of
[   26.197565]  allocated 120-byte region [ffff8881024e1b00, ffff8881024e1b78)
[   26.198210] 
[   26.198305] The buggy address belongs to the physical page:
[   26.198706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e1
[   26.199163] flags: 0x200000000000000(node=0|zone=2)
[   26.199511] page_type: f5(slab)
[   26.199774] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.200303] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.200729] page dumped because: kasan: bad access detected
[   26.201083] 
[   26.201300] Memory state around the buggy address:
[   26.201585]  ffff8881024e1a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.201893]  ffff8881024e1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.202321] >ffff8881024e1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   26.202716]                                                                 ^
[   26.203165]  ffff8881024e1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.203603]  ffff8881024e1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.203998] ==================================================================