Hay
Date
July 3, 2025, 6:13 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.070842] ==================================================================
[   20.070936] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   20.071008] Write of size 1 at addr fff00000c7834578 by task kunit_try_catch/285
[   20.071141] 
[   20.071173] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.071256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.071411] Hardware name: linux,dummy-virt (DT)
[   20.071458] Call trace:
[   20.071481]  show_stack+0x20/0x38 (C)
[   20.071532]  dump_stack_lvl+0x8c/0xd0
[   20.071792]  print_report+0x118/0x608
[   20.071852]  kasan_report+0xdc/0x128
[   20.071936]  __asan_report_store1_noabort+0x20/0x30
[   20.071988]  strncpy_from_user+0x270/0x2a0
[   20.072111]  copy_user_test_oob+0x5c0/0xec8
[   20.072252]  kunit_try_run_case+0x170/0x3f0
[   20.072431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.072512]  kthread+0x328/0x630
[   20.072565]  ret_from_fork+0x10/0x20
[   20.072674] 
[   20.072695] Allocated by task 285:
[   20.072725]  kasan_save_stack+0x3c/0x68
[   20.072767]  kasan_save_track+0x20/0x40
[   20.072806]  kasan_save_alloc_info+0x40/0x58
[   20.072848]  __kasan_kmalloc+0xd4/0xd8
[   20.072885]  __kmalloc_noprof+0x198/0x4c8
[   20.073009]  kunit_kmalloc_array+0x34/0x88
[   20.073067]  copy_user_test_oob+0xac/0xec8
[   20.073153]  kunit_try_run_case+0x170/0x3f0
[   20.073268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.073471]  kthread+0x328/0x630
[   20.073672]  ret_from_fork+0x10/0x20
[   20.073848] 
[   20.073938] The buggy address belongs to the object at fff00000c7834500
[   20.073938]  which belongs to the cache kmalloc-128 of size 128
[   20.074109] The buggy address is located 0 bytes to the right of
[   20.074109]  allocated 120-byte region [fff00000c7834500, fff00000c7834578)
[   20.074189] 
[   20.074210] The buggy address belongs to the physical page:
[   20.074243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   20.074305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.074354] page_type: f5(slab)
[   20.074393] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.074445] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.074488] page dumped because: kasan: bad access detected
[   20.074530] 
[   20.074565] Memory state around the buggy address:
[   20.074600]  fff00000c7834400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.074645]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.074699] >fff00000c7834500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.074739]                                                                 ^
[   20.074781]  fff00000c7834580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.074826]  fff00000c7834600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.074867] ==================================================================
[   20.065514] ==================================================================
[   20.065582] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   20.065685] Write of size 121 at addr fff00000c7834500 by task kunit_try_catch/285
[   20.065739] 
[   20.065768] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.066001] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.066051] Hardware name: linux,dummy-virt (DT)
[   20.066086] Call trace:
[   20.066108]  show_stack+0x20/0x38 (C)
[   20.066161]  dump_stack_lvl+0x8c/0xd0
[   20.066208]  print_report+0x118/0x608
[   20.066282]  kasan_report+0xdc/0x128
[   20.066350]  kasan_check_range+0x100/0x1a8
[   20.066401]  __kasan_check_write+0x20/0x30
[   20.066477]  strncpy_from_user+0x3c/0x2a0
[   20.066530]  copy_user_test_oob+0x5c0/0xec8
[   20.066596]  kunit_try_run_case+0x170/0x3f0
[   20.066780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.066839]  kthread+0x328/0x630
[   20.066884]  ret_from_fork+0x10/0x20
[   20.067148] 
[   20.067202] Allocated by task 285:
[   20.067249]  kasan_save_stack+0x3c/0x68
[   20.067331]  kasan_save_track+0x20/0x40
[   20.067390]  kasan_save_alloc_info+0x40/0x58
[   20.067433]  __kasan_kmalloc+0xd4/0xd8
[   20.067469]  __kmalloc_noprof+0x198/0x4c8
[   20.067524]  kunit_kmalloc_array+0x34/0x88
[   20.067646]  copy_user_test_oob+0xac/0xec8
[   20.067820]  kunit_try_run_case+0x170/0x3f0
[   20.067871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.067957]  kthread+0x328/0x630
[   20.068023]  ret_from_fork+0x10/0x20
[   20.068108] 
[   20.068147] The buggy address belongs to the object at fff00000c7834500
[   20.068147]  which belongs to the cache kmalloc-128 of size 128
[   20.068207] The buggy address is located 0 bytes inside of
[   20.068207]  allocated 120-byte region [fff00000c7834500, fff00000c7834578)
[   20.068269] 
[   20.068317] The buggy address belongs to the physical page:
[   20.068366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107834
[   20.068428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.068527] page_type: f5(slab)
[   20.068591] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.068647] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.068859] page dumped because: kasan: bad access detected
[   20.068896] 
[   20.068915] Memory state around the buggy address:
[   20.068948]  fff00000c7834400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.068993]  fff00000c7834480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.069051] >fff00000c7834500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.069195]                                                                 ^
[   20.069252]  fff00000c7834580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.069353]  fff00000c7834600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.069451] ==================================================================

[   15.559210] ==================================================================
[   15.559536] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   15.559808] Write of size 1 at addr ffff8881029dbd78 by task kunit_try_catch/303
[   15.560125] 
[   15.560264] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.560308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.560321] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.560350] Call Trace:
[   15.560366]  <TASK>
[   15.560384]  dump_stack_lvl+0x73/0xb0
[   15.560410]  print_report+0xd1/0x650
[   15.560434]  ? __virt_addr_valid+0x1db/0x2d0
[   15.560457]  ? strncpy_from_user+0x1a5/0x1d0
[   15.560480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.560502]  ? strncpy_from_user+0x1a5/0x1d0
[   15.560526]  kasan_report+0x141/0x180
[   15.560549]  ? strncpy_from_user+0x1a5/0x1d0
[   15.560576]  __asan_report_store1_noabort+0x1b/0x30
[   15.560598]  strncpy_from_user+0x1a5/0x1d0
[   15.560624]  copy_user_test_oob+0x760/0x10f0
[   15.560650]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.560674]  ? finish_task_switch.isra.0+0x153/0x700
[   15.560695]  ? __switch_to+0x47/0xf50
[   15.560721]  ? __schedule+0x10cc/0x2b60
[   15.560743]  ? __pfx_read_tsc+0x10/0x10
[   15.560764]  ? ktime_get_ts64+0x86/0x230
[   15.560788]  kunit_try_run_case+0x1a5/0x480
[   15.560812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.560836]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.560860]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.560884]  ? __kthread_parkme+0x82/0x180
[   15.560904]  ? preempt_count_sub+0x50/0x80
[   15.560928]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.560954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.560980]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.561004]  kthread+0x337/0x6f0
[   15.561025]  ? trace_preempt_on+0x20/0xc0
[   15.561048]  ? __pfx_kthread+0x10/0x10
[   15.561072]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.561092]  ? calculate_sigpending+0x7b/0xa0
[   15.561129]  ? __pfx_kthread+0x10/0x10
[   15.561152]  ret_from_fork+0x116/0x1d0
[   15.561170]  ? __pfx_kthread+0x10/0x10
[   15.561191]  ret_from_fork_asm+0x1a/0x30
[   15.561223]  </TASK>
[   15.561234] 
[   15.572366] Allocated by task 303:
[   15.572562]  kasan_save_stack+0x45/0x70
[   15.572746]  kasan_save_track+0x18/0x40
[   15.572925]  kasan_save_alloc_info+0x3b/0x50
[   15.573131]  __kasan_kmalloc+0xb7/0xc0
[   15.573316]  __kmalloc_noprof+0x1c9/0x500
[   15.573502]  kunit_kmalloc_array+0x25/0x60
[   15.573693]  copy_user_test_oob+0xab/0x10f0
[   15.573887]  kunit_try_run_case+0x1a5/0x480
[   15.574081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.574292]  kthread+0x337/0x6f0
[   15.574436]  ret_from_fork+0x116/0x1d0
[   15.574577]  ret_from_fork_asm+0x1a/0x30
[   15.574776] 
[   15.574873] The buggy address belongs to the object at ffff8881029dbd00
[   15.574873]  which belongs to the cache kmalloc-128 of size 128
[   15.575385] The buggy address is located 0 bytes to the right of
[   15.575385]  allocated 120-byte region [ffff8881029dbd00, ffff8881029dbd78)
[   15.575879] 
[   15.575977] The buggy address belongs to the physical page:
[   15.576248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   15.576626] flags: 0x200000000000000(node=0|zone=2)
[   15.576835] page_type: f5(slab)
[   15.576974] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.577292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.577545] page dumped because: kasan: bad access detected
[   15.577796] 
[   15.577893] Memory state around the buggy address:
[   15.578121]  ffff8881029dbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.578439]  ffff8881029dbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.578658] >ffff8881029dbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.578981]                                                                 ^
[   15.579325]  ffff8881029dbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.579585]  ffff8881029dbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.579899] ==================================================================
[   15.541027] ==================================================================
[   15.541681] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   15.542011] Write of size 121 at addr ffff8881029dbd00 by task kunit_try_catch/303
[   15.542424] 
[   15.542519] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.542561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.542574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.542596] Call Trace:
[   15.542610]  <TASK>
[   15.542626]  dump_stack_lvl+0x73/0xb0
[   15.542651]  print_report+0xd1/0x650
[   15.542674]  ? __virt_addr_valid+0x1db/0x2d0
[   15.542696]  ? strncpy_from_user+0x2e/0x1d0
[   15.542719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.542741]  ? strncpy_from_user+0x2e/0x1d0
[   15.542765]  kasan_report+0x141/0x180
[   15.542788]  ? strncpy_from_user+0x2e/0x1d0
[   15.542815]  kasan_check_range+0x10c/0x1c0
[   15.542838]  __kasan_check_write+0x18/0x20
[   15.542859]  strncpy_from_user+0x2e/0x1d0
[   15.542881]  ? __kasan_check_read+0x15/0x20
[   15.542903]  copy_user_test_oob+0x760/0x10f0
[   15.542929]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.542952]  ? finish_task_switch.isra.0+0x153/0x700
[   15.542975]  ? __switch_to+0x47/0xf50
[   15.543000]  ? __schedule+0x10cc/0x2b60
[   15.543023]  ? __pfx_read_tsc+0x10/0x10
[   15.543044]  ? ktime_get_ts64+0x86/0x230
[   15.543068]  kunit_try_run_case+0x1a5/0x480
[   15.543092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.543128]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.543151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.543174]  ? __kthread_parkme+0x82/0x180
[   15.543195]  ? preempt_count_sub+0x50/0x80
[   15.543224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.543249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.543272]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.543296]  kthread+0x337/0x6f0
[   15.543316]  ? trace_preempt_on+0x20/0xc0
[   15.543340]  ? __pfx_kthread+0x10/0x10
[   15.543361]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.543382]  ? calculate_sigpending+0x7b/0xa0
[   15.543405]  ? __pfx_kthread+0x10/0x10
[   15.543428]  ret_from_fork+0x116/0x1d0
[   15.543449]  ? __pfx_kthread+0x10/0x10
[   15.543471]  ret_from_fork_asm+0x1a/0x30
[   15.543502]  </TASK>
[   15.543515] 
[   15.550911] Allocated by task 303:
[   15.551110]  kasan_save_stack+0x45/0x70
[   15.551333]  kasan_save_track+0x18/0x40
[   15.551536]  kasan_save_alloc_info+0x3b/0x50
[   15.551751]  __kasan_kmalloc+0xb7/0xc0
[   15.551942]  __kmalloc_noprof+0x1c9/0x500
[   15.552162]  kunit_kmalloc_array+0x25/0x60
[   15.552403]  copy_user_test_oob+0xab/0x10f0
[   15.552579]  kunit_try_run_case+0x1a5/0x480
[   15.552727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.552904]  kthread+0x337/0x6f0
[   15.553027]  ret_from_fork+0x116/0x1d0
[   15.553172]  ret_from_fork_asm+0x1a/0x30
[   15.553418] 
[   15.553516] The buggy address belongs to the object at ffff8881029dbd00
[   15.553516]  which belongs to the cache kmalloc-128 of size 128
[   15.554061] The buggy address is located 0 bytes inside of
[   15.554061]  allocated 120-byte region [ffff8881029dbd00, ffff8881029dbd78)
[   15.554570] 
[   15.554645] The buggy address belongs to the physical page:
[   15.554819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029db
[   15.555064] flags: 0x200000000000000(node=0|zone=2)
[   15.555329] page_type: f5(slab)
[   15.555501] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.555839] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.556187] page dumped because: kasan: bad access detected
[   15.556436] 
[   15.556534] Memory state around the buggy address:
[   15.556728]  ffff8881029dbc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.556946]  ffff8881029dbc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.557175] >ffff8881029dbd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.557540]                                                                 ^
[   15.557859]  ffff8881029dbd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.558193]  ffff8881029dbe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.558668] ==================================================================