Hay
Date
July 8, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   34.454065] ==================================================================
[   34.454127] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   34.454184] Write of size 1 at addr fff00000c9adfc78 by task kunit_try_catch/316
[   34.454260] 
[   34.454293] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.454389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.454419] Hardware name: linux,dummy-virt (DT)
[   34.454452] Call trace:
[   34.454483]  show_stack+0x20/0x38 (C)
[   34.454737]  dump_stack_lvl+0x8c/0xd0
[   34.454801]  print_report+0x118/0x5d0
[   34.454894]  kasan_report+0xdc/0x128
[   34.454975]  __asan_report_store1_noabort+0x20/0x30
[   34.455033]  strncpy_from_user+0x270/0x2a0
[   34.455090]  copy_user_test_oob+0x5c0/0xec8
[   34.455155]  kunit_try_run_case+0x170/0x3f0
[   34.455274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.455410]  kthread+0x328/0x630
[   34.455490]  ret_from_fork+0x10/0x20
[   34.455572] 
[   34.455602] Allocated by task 316:
[   34.455640]  kasan_save_stack+0x3c/0x68
[   34.455686]  kasan_save_track+0x20/0x40
[   34.455742]  kasan_save_alloc_info+0x40/0x58
[   34.455803]  __kasan_kmalloc+0xd4/0xd8
[   34.455851]  __kmalloc_noprof+0x198/0x4c8
[   34.455899]  kunit_kmalloc_array+0x34/0x88
[   34.455946]  copy_user_test_oob+0xac/0xec8
[   34.455988]  kunit_try_run_case+0x170/0x3f0
[   34.456048]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.456098]  kthread+0x328/0x630
[   34.456134]  ret_from_fork+0x10/0x20
[   34.456188] 
[   34.456342] The buggy address belongs to the object at fff00000c9adfc00
[   34.456342]  which belongs to the cache kmalloc-128 of size 128
[   34.456484] The buggy address is located 0 bytes to the right of
[   34.456484]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.456656] 
[   34.456716] The buggy address belongs to the physical page:
[   34.456765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.456992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.457164] page_type: f5(slab)
[   34.457291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.457344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.457386] page dumped because: kasan: bad access detected
[   34.457444] 
[   34.457466] Memory state around the buggy address:
[   34.457501]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.457772]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.457890] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.457995]                                                                 ^
[   34.458311]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.458441]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.458489] ==================================================================
[   34.448430] ==================================================================
[   34.448484] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   34.448538] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316
[   34.448605] 
[   34.448635] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT 
[   34.449175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.449240] Hardware name: linux,dummy-virt (DT)
[   34.449291] Call trace:
[   34.449317]  show_stack+0x20/0x38 (C)
[   34.449384]  dump_stack_lvl+0x8c/0xd0
[   34.449507]  print_report+0x118/0x5d0
[   34.449576]  kasan_report+0xdc/0x128
[   34.449645]  kasan_check_range+0x100/0x1a8
[   34.449735]  __kasan_check_write+0x20/0x30
[   34.449783]  strncpy_from_user+0x3c/0x2a0
[   34.449852]  copy_user_test_oob+0x5c0/0xec8
[   34.449901]  kunit_try_run_case+0x170/0x3f0
[   34.450089]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.450192]  kthread+0x328/0x630
[   34.450285]  ret_from_fork+0x10/0x20
[   34.450369] 
[   34.450420] Allocated by task 316:
[   34.450532]  kasan_save_stack+0x3c/0x68
[   34.450638]  kasan_save_track+0x20/0x40
[   34.450905]  kasan_save_alloc_info+0x40/0x58
[   34.450989]  __kasan_kmalloc+0xd4/0xd8
[   34.451058]  __kmalloc_noprof+0x198/0x4c8
[   34.451142]  kunit_kmalloc_array+0x34/0x88
[   34.451200]  copy_user_test_oob+0xac/0xec8
[   34.451306]  kunit_try_run_case+0x170/0x3f0
[   34.451386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.451461]  kthread+0x328/0x630
[   34.451519]  ret_from_fork+0x10/0x20
[   34.451632] 
[   34.451687] The buggy address belongs to the object at fff00000c9adfc00
[   34.451687]  which belongs to the cache kmalloc-128 of size 128
[   34.451747] The buggy address is located 0 bytes inside of
[   34.451747]  allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78)
[   34.451811] 
[   34.451833] The buggy address belongs to the physical page:
[   34.451866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf
[   34.452064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.452156] page_type: f5(slab)
[   34.452236] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.452313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.452373] page dumped because: kasan: bad access detected
[   34.452437] 
[   34.452767] Memory state around the buggy address:
[   34.452858]  fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.452965]  fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.453036] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   34.453097]                                                                 ^
[   34.453139]  fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.453219]  fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.453261] ==================================================================

[   27.752639] ==================================================================
[   27.753012] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   27.753343] Write of size 121 at addr ffff8881062af800 by task kunit_try_catch/333
[   27.753649] 
[   27.753761] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.754040] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.754061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.754087] Call Trace:
[   27.754111]  <TASK>
[   27.754134]  dump_stack_lvl+0x73/0xb0
[   27.754169]  print_report+0xd1/0x610
[   27.754391]  ? __virt_addr_valid+0x1db/0x2d0
[   27.754423]  ? strncpy_from_user+0x2e/0x1d0
[   27.754447]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.754479]  ? strncpy_from_user+0x2e/0x1d0
[   27.754504]  kasan_report+0x141/0x180
[   27.754528]  ? strncpy_from_user+0x2e/0x1d0
[   27.754557]  kasan_check_range+0x10c/0x1c0
[   27.754584]  __kasan_check_write+0x18/0x20
[   27.754611]  strncpy_from_user+0x2e/0x1d0
[   27.754635]  ? __kasan_check_read+0x15/0x20
[   27.754665]  copy_user_test_oob+0x760/0x10f0
[   27.754695]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.754720]  ? finish_task_switch.isra.0+0x153/0x700
[   27.754744]  ? __switch_to+0x47/0xf50
[   27.754775]  ? __schedule+0x10cc/0x2b60
[   27.754806]  ? __pfx_read_tsc+0x10/0x10
[   27.754851]  ? ktime_get_ts64+0x86/0x230
[   27.754880]  kunit_try_run_case+0x1a5/0x480
[   27.754905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.754927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.754949]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.754980]  ? __kthread_parkme+0x82/0x180
[   27.755003]  ? preempt_count_sub+0x50/0x80
[   27.755028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.755051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.755080]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.755108]  kthread+0x337/0x6f0
[   27.755131]  ? trace_preempt_on+0x20/0xc0
[   27.755158]  ? __pfx_kthread+0x10/0x10
[   27.755181]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.755210]  ? calculate_sigpending+0x7b/0xa0
[   27.755250]  ? __pfx_kthread+0x10/0x10
[   27.755275]  ret_from_fork+0x116/0x1d0
[   27.755296]  ? __pfx_kthread+0x10/0x10
[   27.755321]  ret_from_fork_asm+0x1a/0x30
[   27.755356]  </TASK>
[   27.755368] 
[   27.766103] Allocated by task 333:
[   27.766841]  kasan_save_stack+0x45/0x70
[   27.767459]  kasan_save_track+0x18/0x40
[   27.767971]  kasan_save_alloc_info+0x3b/0x50
[   27.768494]  __kasan_kmalloc+0xb7/0xc0
[   27.768985]  __kmalloc_noprof+0x1c9/0x500
[   27.769486]  kunit_kmalloc_array+0x25/0x60
[   27.770018]  copy_user_test_oob+0xab/0x10f0
[   27.770503]  kunit_try_run_case+0x1a5/0x480
[   27.770659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.770852]  kthread+0x337/0x6f0
[   27.771341]  ret_from_fork+0x116/0x1d0
[   27.771899]  ret_from_fork_asm+0x1a/0x30
[   27.772406] 
[   27.772621] The buggy address belongs to the object at ffff8881062af800
[   27.772621]  which belongs to the cache kmalloc-128 of size 128
[   27.773298] The buggy address is located 0 bytes inside of
[   27.773298]  allocated 120-byte region [ffff8881062af800, ffff8881062af878)
[   27.773661] 
[   27.773734] The buggy address belongs to the physical page:
[   27.774148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af
[   27.775288] flags: 0x200000000000000(node=0|zone=2)
[   27.775864] page_type: f5(slab)
[   27.776315] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.777130] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.777924] page dumped because: kasan: bad access detected
[   27.778199] 
[   27.778493] Memory state around the buggy address:
[   27.778983]  ffff8881062af700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.779206]  ffff8881062af780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.779430] >ffff8881062af800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.779640]                                                                 ^
[   27.779866]  ffff8881062af880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.780208]  ffff8881062af900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.780570] ==================================================================
[   27.781105] ==================================================================
[   27.781396] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   27.781675] Write of size 1 at addr ffff8881062af878 by task kunit_try_catch/333
[   27.782293] 
[   27.782422] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250708 #1 PREEMPT(voluntary) 
[   27.782496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.782510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.782573] Call Trace:
[   27.782595]  <TASK>
[   27.782614]  dump_stack_lvl+0x73/0xb0
[   27.782648]  print_report+0xd1/0x610
[   27.782672]  ? __virt_addr_valid+0x1db/0x2d0
[   27.782699]  ? strncpy_from_user+0x1a5/0x1d0
[   27.782723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.783287]  ? strncpy_from_user+0x1a5/0x1d0
[   27.783325]  kasan_report+0x141/0x180
[   27.783355]  ? strncpy_from_user+0x1a5/0x1d0
[   27.783385]  __asan_report_store1_noabort+0x1b/0x30
[   27.783415]  strncpy_from_user+0x1a5/0x1d0
[   27.783442]  copy_user_test_oob+0x760/0x10f0
[   27.783473]  ? __pfx_copy_user_test_oob+0x10/0x10
[   27.783499]  ? finish_task_switch.isra.0+0x153/0x700
[   27.783524]  ? __switch_to+0x47/0xf50
[   27.783554]  ? __schedule+0x10cc/0x2b60
[   27.783585]  ? __pfx_read_tsc+0x10/0x10
[   27.783612]  ? ktime_get_ts64+0x86/0x230
[   27.783640]  kunit_try_run_case+0x1a5/0x480
[   27.783664]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.783686]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.783708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.783739]  ? __kthread_parkme+0x82/0x180
[   27.783761]  ? preempt_count_sub+0x50/0x80
[   27.783786]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.783835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.783864]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.783893]  kthread+0x337/0x6f0
[   27.783916]  ? trace_preempt_on+0x20/0xc0
[   27.783943]  ? __pfx_kthread+0x10/0x10
[   27.783969]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.783998]  ? calculate_sigpending+0x7b/0xa0
[   27.784027]  ? __pfx_kthread+0x10/0x10
[   27.784051]  ret_from_fork+0x116/0x1d0
[   27.784073]  ? __pfx_kthread+0x10/0x10
[   27.784097]  ret_from_fork_asm+0x1a/0x30
[   27.784132]  </TASK>
[   27.784145] 
[   27.798715] Allocated by task 333:
[   27.799030]  kasan_save_stack+0x45/0x70
[   27.799413]  kasan_save_track+0x18/0x40
[   27.799764]  kasan_save_alloc_info+0x3b/0x50
[   27.800072]  __kasan_kmalloc+0xb7/0xc0
[   27.800363]  __kmalloc_noprof+0x1c9/0x500
[   27.800543]  kunit_kmalloc_array+0x25/0x60
[   27.800711]  copy_user_test_oob+0xab/0x10f0
[   27.801131]  kunit_try_run_case+0x1a5/0x480
[   27.801537]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.801895]  kthread+0x337/0x6f0
[   27.802181]  ret_from_fork+0x116/0x1d0
[   27.802323]  ret_from_fork_asm+0x1a/0x30
[   27.802465] 
[   27.802533] The buggy address belongs to the object at ffff8881062af800
[   27.802533]  which belongs to the cache kmalloc-128 of size 128
[   27.803134] The buggy address is located 0 bytes to the right of
[   27.803134]  allocated 120-byte region [ffff8881062af800, ffff8881062af878)
[   27.804253] 
[   27.804436] The buggy address belongs to the physical page:
[   27.804944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1062af
[   27.805629] flags: 0x200000000000000(node=0|zone=2)
[   27.805962] page_type: f5(slab)
[   27.806083] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   27.806319] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   27.806537] page dumped because: kasan: bad access detected
[   27.806701] 
[   27.806764] Memory state around the buggy address:
[   27.807233]  ffff8881062af700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   27.807868]  ffff8881062af780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.808485] >ffff8881062af800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   27.809152]                                                                 ^
[   27.809789]  ffff8881062af880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.810518]  ffff8881062af900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.811184] ==================================================================