Hay
Date
July 3, 2025, 11:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[   23.897054] ==================================================================
[   23.897187] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   23.897295] Write of size 1 at addr fff00000c638a078 by task kunit_try_catch/285
[   23.897394] 
[   23.897459] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.897726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.897809] Hardware name: linux,dummy-virt (DT)
[   23.897933] Call trace:
[   23.897987]  show_stack+0x20/0x38 (C)
[   23.898175]  dump_stack_lvl+0x8c/0xd0
[   23.898463]  print_report+0x118/0x608
[   23.898608]  kasan_report+0xdc/0x128
[   23.898711]  __asan_report_store1_noabort+0x20/0x30
[   23.898815]  strncpy_from_user+0x270/0x2a0
[   23.898927]  copy_user_test_oob+0x5c0/0xec8
[   23.899102]  kunit_try_run_case+0x170/0x3f0
[   23.899270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.899404]  kthread+0x328/0x630
[   23.899501]  ret_from_fork+0x10/0x20
[   23.899612] 
[   23.899658] Allocated by task 285:
[   23.899722]  kasan_save_stack+0x3c/0x68
[   23.899814]  kasan_save_track+0x20/0x40
[   23.899899]  kasan_save_alloc_info+0x40/0x58
[   23.899996]  __kasan_kmalloc+0xd4/0xd8
[   23.900119]  __kmalloc_noprof+0x198/0x4c8
[   23.900241]  kunit_kmalloc_array+0x34/0x88
[   23.900364]  copy_user_test_oob+0xac/0xec8
[   23.900489]  kunit_try_run_case+0x170/0x3f0
[   23.900635]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.900761]  kthread+0x328/0x630
[   23.900836]  ret_from_fork+0x10/0x20
[   23.900922] 
[   23.900970] The buggy address belongs to the object at fff00000c638a000
[   23.900970]  which belongs to the cache kmalloc-128 of size 128
[   23.901102] The buggy address is located 0 bytes to the right of
[   23.901102]  allocated 120-byte region [fff00000c638a000, fff00000c638a078)
[   23.901268] 
[   23.901334] The buggy address belongs to the physical page:
[   23.901429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   23.901548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.901650] page_type: f5(slab)
[   23.901778] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.901905] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.902011] page dumped because: kasan: bad access detected
[   23.902095] 
[   23.902136] Memory state around the buggy address:
[   23.902221]  fff00000c6389f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.902448]  fff00000c6389f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.902582] >fff00000c638a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.902661]                                                                 ^
[   23.902775]  fff00000c638a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.902868]  fff00000c638a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.902958] ==================================================================
[   23.890146] ==================================================================
[   23.890312] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   23.890491] Write of size 121 at addr fff00000c638a000 by task kunit_try_catch/285
[   23.890652] 
[   23.890758] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   23.890942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.891001] Hardware name: linux,dummy-virt (DT)
[   23.891080] Call trace:
[   23.891125]  show_stack+0x20/0x38 (C)
[   23.891241]  dump_stack_lvl+0x8c/0xd0
[   23.891331]  print_report+0x118/0x608
[   23.891463]  kasan_report+0xdc/0x128
[   23.891573]  kasan_check_range+0x100/0x1a8
[   23.891671]  __kasan_check_write+0x20/0x30
[   23.891764]  strncpy_from_user+0x3c/0x2a0
[   23.891878]  copy_user_test_oob+0x5c0/0xec8
[   23.891979]  kunit_try_run_case+0x170/0x3f0
[   23.892105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.892250]  kthread+0x328/0x630
[   23.892401]  ret_from_fork+0x10/0x20
[   23.892549] 
[   23.892617] Allocated by task 285:
[   23.892726]  kasan_save_stack+0x3c/0x68
[   23.892871]  kasan_save_track+0x20/0x40
[   23.892963]  kasan_save_alloc_info+0x40/0x58
[   23.893075]  __kasan_kmalloc+0xd4/0xd8
[   23.893175]  __kmalloc_noprof+0x198/0x4c8
[   23.893276]  kunit_kmalloc_array+0x34/0x88
[   23.893368]  copy_user_test_oob+0xac/0xec8
[   23.893454]  kunit_try_run_case+0x170/0x3f0
[   23.893538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.893637]  kthread+0x328/0x630
[   23.893769]  ret_from_fork+0x10/0x20
[   23.894041] 
[   23.894114] The buggy address belongs to the object at fff00000c638a000
[   23.894114]  which belongs to the cache kmalloc-128 of size 128
[   23.894276] The buggy address is located 0 bytes inside of
[   23.894276]  allocated 120-byte region [fff00000c638a000, fff00000c638a078)
[   23.894415] 
[   23.894453] The buggy address belongs to the physical page:
[   23.894518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10638a
[   23.894632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.894752] page_type: f5(slab)
[   23.894837] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   23.894966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.895123] page dumped because: kasan: bad access detected
[   23.895232] 
[   23.895273] Memory state around the buggy address:
[   23.895347]  fff00000c6389f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.895455]  fff00000c6389f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.895562] >fff00000c638a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.895656]                                                                 ^
[   23.895750]  fff00000c638a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.895853]  fff00000c638a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.895946] ==================================================================

[   15.741162] ==================================================================
[   15.741961] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   15.742553] Write of size 1 at addr ffff8881039bf778 by task kunit_try_catch/303
[   15.742878] 
[   15.742987] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.743032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.743046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.743068] Call Trace:
[   15.743084]  <TASK>
[   15.743100]  dump_stack_lvl+0x73/0xb0
[   15.743334]  print_report+0xd1/0x650
[   15.743367]  ? __virt_addr_valid+0x1db/0x2d0
[   15.743393]  ? strncpy_from_user+0x1a5/0x1d0
[   15.743418]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.743442]  ? strncpy_from_user+0x1a5/0x1d0
[   15.743691]  kasan_report+0x141/0x180
[   15.743724]  ? strncpy_from_user+0x1a5/0x1d0
[   15.743754]  __asan_report_store1_noabort+0x1b/0x30
[   15.743777]  strncpy_from_user+0x1a5/0x1d0
[   15.743802]  copy_user_test_oob+0x760/0x10f0
[   15.743830]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.743855]  ? finish_task_switch.isra.0+0x153/0x700
[   15.743878]  ? __switch_to+0x47/0xf50
[   15.743906]  ? __schedule+0x10cc/0x2b60
[   15.743928]  ? __pfx_read_tsc+0x10/0x10
[   15.743950]  ? ktime_get_ts64+0x86/0x230
[   15.743975]  kunit_try_run_case+0x1a5/0x480
[   15.744000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.744024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.744047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.744071]  ? __kthread_parkme+0x82/0x180
[   15.744092]  ? preempt_count_sub+0x50/0x80
[   15.744117]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.744154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.744178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.744216]  kthread+0x337/0x6f0
[   15.744237]  ? trace_preempt_on+0x20/0xc0
[   15.744260]  ? __pfx_kthread+0x10/0x10
[   15.744283]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.744304]  ? calculate_sigpending+0x7b/0xa0
[   15.744329]  ? __pfx_kthread+0x10/0x10
[   15.744350]  ret_from_fork+0x116/0x1d0
[   15.744369]  ? __pfx_kthread+0x10/0x10
[   15.744389]  ret_from_fork_asm+0x1a/0x30
[   15.744421]  </TASK>
[   15.744432] 
[   15.755688] Allocated by task 303:
[   15.755868]  kasan_save_stack+0x45/0x70
[   15.756073]  kasan_save_track+0x18/0x40
[   15.756365]  kasan_save_alloc_info+0x3b/0x50
[   15.756567]  __kasan_kmalloc+0xb7/0xc0
[   15.756742]  __kmalloc_noprof+0x1c9/0x500
[   15.756932]  kunit_kmalloc_array+0x25/0x60
[   15.757595]  copy_user_test_oob+0xab/0x10f0
[   15.757876]  kunit_try_run_case+0x1a5/0x480
[   15.758224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.758872]  kthread+0x337/0x6f0
[   15.759428]  ret_from_fork+0x116/0x1d0
[   15.760025]  ret_from_fork_asm+0x1a/0x30
[   15.760727] 
[   15.760972] The buggy address belongs to the object at ffff8881039bf700
[   15.760972]  which belongs to the cache kmalloc-128 of size 128
[   15.762306] The buggy address is located 0 bytes to the right of
[   15.762306]  allocated 120-byte region [ffff8881039bf700, ffff8881039bf778)
[   15.763001] 
[   15.763087] The buggy address belongs to the physical page:
[   15.763330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bf
[   15.763621] flags: 0x200000000000000(node=0|zone=2)
[   15.763865] page_type: f5(slab)
[   15.763997] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.764364] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.764600] page dumped because: kasan: bad access detected
[   15.764856] 
[   15.764953] Memory state around the buggy address:
[   15.765247]  ffff8881039bf600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.765536]  ffff8881039bf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.765789] >ffff8881039bf700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.766114]                                                                 ^
[   15.766388]  ffff8881039bf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.766708]  ffff8881039bf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.767004] ==================================================================
[   15.714119] ==================================================================
[   15.714680] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   15.715233] Write of size 121 at addr ffff8881039bf700 by task kunit_try_catch/303
[   15.715939] 
[   15.716051] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.716207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.716222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.716245] Call Trace:
[   15.716261]  <TASK>
[   15.716277]  dump_stack_lvl+0x73/0xb0
[   15.716339]  print_report+0xd1/0x650
[   15.716367]  ? __virt_addr_valid+0x1db/0x2d0
[   15.716392]  ? strncpy_from_user+0x2e/0x1d0
[   15.716416]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.716440]  ? strncpy_from_user+0x2e/0x1d0
[   15.716463]  kasan_report+0x141/0x180
[   15.716485]  ? strncpy_from_user+0x2e/0x1d0
[   15.716513]  kasan_check_range+0x10c/0x1c0
[   15.716537]  __kasan_check_write+0x18/0x20
[   15.716558]  strncpy_from_user+0x2e/0x1d0
[   15.716580]  ? __kasan_check_read+0x15/0x20
[   15.716602]  copy_user_test_oob+0x760/0x10f0
[   15.716630]  ? __pfx_copy_user_test_oob+0x10/0x10
[   15.716653]  ? finish_task_switch.isra.0+0x153/0x700
[   15.716677]  ? __switch_to+0x47/0xf50
[   15.716702]  ? __schedule+0x10cc/0x2b60
[   15.716725]  ? __pfx_read_tsc+0x10/0x10
[   15.716746]  ? ktime_get_ts64+0x86/0x230
[   15.716770]  kunit_try_run_case+0x1a5/0x480
[   15.716795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.716818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.716841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.716866]  ? __kthread_parkme+0x82/0x180
[   15.716887]  ? preempt_count_sub+0x50/0x80
[   15.716911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.716935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.716958]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.716982]  kthread+0x337/0x6f0
[   15.717002]  ? trace_preempt_on+0x20/0xc0
[   15.717026]  ? __pfx_kthread+0x10/0x10
[   15.717047]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.717069]  ? calculate_sigpending+0x7b/0xa0
[   15.717093]  ? __pfx_kthread+0x10/0x10
[   15.717116]  ret_from_fork+0x116/0x1d0
[   15.717156]  ? __pfx_kthread+0x10/0x10
[   15.717177]  ret_from_fork_asm+0x1a/0x30
[   15.717207]  </TASK>
[   15.717219] 
[   15.728631] Allocated by task 303:
[   15.728826]  kasan_save_stack+0x45/0x70
[   15.729021]  kasan_save_track+0x18/0x40
[   15.729534]  kasan_save_alloc_info+0x3b/0x50
[   15.729796]  __kasan_kmalloc+0xb7/0xc0
[   15.730089]  __kmalloc_noprof+0x1c9/0x500
[   15.730479]  kunit_kmalloc_array+0x25/0x60
[   15.730802]  copy_user_test_oob+0xab/0x10f0
[   15.731015]  kunit_try_run_case+0x1a5/0x480
[   15.731483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.731762]  kthread+0x337/0x6f0
[   15.732038]  ret_from_fork+0x116/0x1d0
[   15.732383]  ret_from_fork_asm+0x1a/0x30
[   15.732574] 
[   15.732666] The buggy address belongs to the object at ffff8881039bf700
[   15.732666]  which belongs to the cache kmalloc-128 of size 128
[   15.733431] The buggy address is located 0 bytes inside of
[   15.733431]  allocated 120-byte region [ffff8881039bf700, ffff8881039bf778)
[   15.734164] 
[   15.734436] The buggy address belongs to the physical page:
[   15.734730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bf
[   15.735349] flags: 0x200000000000000(node=0|zone=2)
[   15.735649] page_type: f5(slab)
[   15.735927] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   15.736446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   15.736883] page dumped because: kasan: bad access detected
[   15.737296] 
[   15.737400] Memory state around the buggy address:
[   15.737833]  ffff8881039bf600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   15.738280]  ffff8881039bf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.738662] >ffff8881039bf700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   15.738961]                                                                 ^
[   15.739458]  ffff8881039bf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.739943]  ffff8881039bf800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.740459] ==================================================================