Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.098946] ================================================================== [ 19.099006] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 19.099063] Write of size 121 at addr fff00000c58c3b00 by task kunit_try_catch/286 [ 19.099124] [ 19.099309] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.099481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.099637] Hardware name: linux,dummy-virt (DT) [ 19.099808] Call trace: [ 19.099936] show_stack+0x20/0x38 (C) [ 19.100030] dump_stack_lvl+0x8c/0xd0 [ 19.100082] print_report+0x118/0x5d0 [ 19.100232] kasan_report+0xdc/0x128 [ 19.100322] kasan_check_range+0x100/0x1a8 [ 19.100374] __kasan_check_write+0x20/0x30 [ 19.100425] strncpy_from_user+0x3c/0x2a0 [ 19.100475] copy_user_test_oob+0x5c0/0xec8 [ 19.100524] kunit_try_run_case+0x170/0x3f0 [ 19.100572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.101007] kthread+0x328/0x630 [ 19.101101] ret_from_fork+0x10/0x20 [ 19.101223] [ 19.101307] Allocated by task 286: [ 19.101340] kasan_save_stack+0x3c/0x68 [ 19.101401] kasan_save_track+0x20/0x40 [ 19.101458] kasan_save_alloc_info+0x40/0x58 [ 19.101564] __kasan_kmalloc+0xd4/0xd8 [ 19.101631] __kmalloc_noprof+0x198/0x4c8 [ 19.101727] kunit_kmalloc_array+0x34/0x88 [ 19.101783] copy_user_test_oob+0xac/0xec8 [ 19.101837] kunit_try_run_case+0x170/0x3f0 [ 19.101876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.101921] kthread+0x328/0x630 [ 19.101956] ret_from_fork+0x10/0x20 [ 19.102042] [ 19.102066] The buggy address belongs to the object at fff00000c58c3b00 [ 19.102066] which belongs to the cache kmalloc-128 of size 128 [ 19.102127] The buggy address is located 0 bytes inside of [ 19.102127] allocated 120-byte region [fff00000c58c3b00, fff00000c58c3b78) [ 19.102217] [ 19.102238] The buggy address belongs to the physical page: [ 19.102271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 19.102327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.103248] page_type: f5(slab) [ 19.103293] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.103346] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.103397] page dumped because: kasan: bad access detected [ 19.103431] [ 19.103451] Memory state around the buggy address: [ 19.103484] fff00000c58c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.103531] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.103577] >fff00000c58c3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.103618] ^ [ 19.103662] fff00000c58c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.103712] fff00000c58c3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.103754] ================================================================== [ 19.104023] ================================================================== [ 19.104072] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 19.104122] Write of size 1 at addr fff00000c58c3b78 by task kunit_try_catch/286 [ 19.104194] [ 19.104316] CPU: 0 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.104407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.104434] Hardware name: linux,dummy-virt (DT) [ 19.104619] Call trace: [ 19.104931] show_stack+0x20/0x38 (C) [ 19.105233] dump_stack_lvl+0x8c/0xd0 [ 19.105576] print_report+0x118/0x5d0 [ 19.105671] kasan_report+0xdc/0x128 [ 19.105728] __asan_report_store1_noabort+0x20/0x30 [ 19.105788] strncpy_from_user+0x270/0x2a0 [ 19.105838] copy_user_test_oob+0x5c0/0xec8 [ 19.105888] kunit_try_run_case+0x170/0x3f0 [ 19.105944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.106000] kthread+0x328/0x630 [ 19.106045] ret_from_fork+0x10/0x20 [ 19.106343] [ 19.106462] Allocated by task 286: [ 19.106496] kasan_save_stack+0x3c/0x68 [ 19.108114] kasan_save_track+0x20/0x40 [ 19.108755] kasan_save_alloc_info+0x40/0x58 [ 19.109457] __kasan_kmalloc+0xd4/0xd8 [ 19.109878] __kmalloc_noprof+0x198/0x4c8 [ 19.110139] kunit_kmalloc_array+0x34/0x88 [ 19.110213] copy_user_test_oob+0xac/0xec8 [ 19.110461] kunit_try_run_case+0x170/0x3f0 [ 19.110514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.110560] kthread+0x328/0x630 [ 19.110598] ret_from_fork+0x10/0x20 [ 19.110636] [ 19.111418] The buggy address belongs to the object at fff00000c58c3b00 [ 19.111418] which belongs to the cache kmalloc-128 of size 128 [ 19.111772] The buggy address is located 0 bytes to the right of [ 19.111772] allocated 120-byte region [fff00000c58c3b00, fff00000c58c3b78) [ 19.112854] [ 19.112936] The buggy address belongs to the physical page: [ 19.113022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c3 [ 19.113318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.113556] page_type: f5(slab) [ 19.113651] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.113735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.113968] page dumped because: kasan: bad access detected [ 19.114308] [ 19.114331] Memory state around the buggy address: [ 19.114367] fff00000c58c3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.114420] fff00000c58c3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.114466] >fff00000c58c3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.116116] ^ [ 19.116763] fff00000c58c3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.117110] fff00000c58c3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.117156] ==================================================================
[ 19.770846] ================================================================== [ 19.770922] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 19.770980] Write of size 1 at addr fff00000c5ae0b78 by task kunit_try_catch/286 [ 19.771038] [ 19.771071] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.771156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.771197] Hardware name: linux,dummy-virt (DT) [ 19.771230] Call trace: [ 19.771254] show_stack+0x20/0x38 (C) [ 19.771311] dump_stack_lvl+0x8c/0xd0 [ 19.771358] print_report+0x118/0x5d0 [ 19.773250] kasan_report+0xdc/0x128 [ 19.773526] __asan_report_store1_noabort+0x20/0x30 [ 19.774466] strncpy_from_user+0x270/0x2a0 [ 19.774605] copy_user_test_oob+0x5c0/0xec8 [ 19.774731] kunit_try_run_case+0x170/0x3f0 [ 19.775324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.775841] kthread+0x328/0x630 [ 19.775890] ret_from_fork+0x10/0x20 [ 19.776216] [ 19.776241] Allocated by task 286: [ 19.776883] kasan_save_stack+0x3c/0x68 [ 19.777467] kasan_save_track+0x20/0x40 [ 19.777867] kasan_save_alloc_info+0x40/0x58 [ 19.778468] __kasan_kmalloc+0xd4/0xd8 [ 19.778614] __kmalloc_noprof+0x198/0x4c8 [ 19.778659] kunit_kmalloc_array+0x34/0x88 [ 19.778699] copy_user_test_oob+0xac/0xec8 [ 19.778742] kunit_try_run_case+0x170/0x3f0 [ 19.778783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.778830] kthread+0x328/0x630 [ 19.778866] ret_from_fork+0x10/0x20 [ 19.778903] [ 19.780437] The buggy address belongs to the object at fff00000c5ae0b00 [ 19.780437] which belongs to the cache kmalloc-128 of size 128 [ 19.781229] The buggy address is located 0 bytes to the right of [ 19.781229] allocated 120-byte region [fff00000c5ae0b00, fff00000c5ae0b78) [ 19.781828] [ 19.782128] The buggy address belongs to the physical page: [ 19.782451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.783134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.783750] page_type: f5(slab) [ 19.783986] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.784173] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.784516] page dumped because: kasan: bad access detected [ 19.785486] [ 19.785537] Memory state around the buggy address: [ 19.785578] fff00000c5ae0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.785627] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.785678] >fff00000c5ae0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.785721] ^ [ 19.787168] fff00000c5ae0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.787605] fff00000c5ae0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.787652] ================================================================== [ 19.758713] ================================================================== [ 19.758925] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 19.759120] Write of size 121 at addr fff00000c5ae0b00 by task kunit_try_catch/286 [ 19.759190] [ 19.759225] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.759310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.759375] Hardware name: linux,dummy-virt (DT) [ 19.759446] Call trace: [ 19.759479] show_stack+0x20/0x38 (C) [ 19.759529] dump_stack_lvl+0x8c/0xd0 [ 19.759839] print_report+0x118/0x5d0 [ 19.759892] kasan_report+0xdc/0x128 [ 19.759996] kasan_check_range+0x100/0x1a8 [ 19.760049] __kasan_check_write+0x20/0x30 [ 19.760095] strncpy_from_user+0x3c/0x2a0 [ 19.760286] copy_user_test_oob+0x5c0/0xec8 [ 19.760345] kunit_try_run_case+0x170/0x3f0 [ 19.760450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.760609] kthread+0x328/0x630 [ 19.760705] ret_from_fork+0x10/0x20 [ 19.760889] [ 19.760909] Allocated by task 286: [ 19.760940] kasan_save_stack+0x3c/0x68 [ 19.761136] kasan_save_track+0x20/0x40 [ 19.761270] kasan_save_alloc_info+0x40/0x58 [ 19.761315] __kasan_kmalloc+0xd4/0xd8 [ 19.761353] __kmalloc_noprof+0x198/0x4c8 [ 19.761393] kunit_kmalloc_array+0x34/0x88 [ 19.761435] copy_user_test_oob+0xac/0xec8 [ 19.761550] kunit_try_run_case+0x170/0x3f0 [ 19.761763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.761849] kthread+0x328/0x630 [ 19.762215] ret_from_fork+0x10/0x20 [ 19.762347] [ 19.762408] The buggy address belongs to the object at fff00000c5ae0b00 [ 19.762408] which belongs to the cache kmalloc-128 of size 128 [ 19.762502] The buggy address is located 0 bytes inside of [ 19.762502] allocated 120-byte region [fff00000c5ae0b00, fff00000c5ae0b78) [ 19.763537] [ 19.763630] The buggy address belongs to the physical page: [ 19.763691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae0 [ 19.763852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.763903] page_type: f5(slab) [ 19.764075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.764218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.764395] page dumped because: kasan: bad access detected [ 19.764569] [ 19.764683] Memory state around the buggy address: [ 19.764832] fff00000c5ae0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.764904] fff00000c5ae0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.764961] >fff00000c5ae0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.765003] ^ [ 19.765090] fff00000c5ae0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.765225] fff00000c5ae0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.765493] ==================================================================
[ 16.729074] ================================================================== [ 16.729420] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 16.729819] Write of size 1 at addr ffff888103434a78 by task kunit_try_catch/303 [ 16.730107] [ 16.730221] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.730265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.730278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.730301] Call Trace: [ 16.730316] <TASK> [ 16.730333] dump_stack_lvl+0x73/0xb0 [ 16.730362] print_report+0xd1/0x610 [ 16.730386] ? __virt_addr_valid+0x1db/0x2d0 [ 16.730422] ? strncpy_from_user+0x1a5/0x1d0 [ 16.730448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.730484] ? strncpy_from_user+0x1a5/0x1d0 [ 16.730508] kasan_report+0x141/0x180 [ 16.730532] ? strncpy_from_user+0x1a5/0x1d0 [ 16.730561] __asan_report_store1_noabort+0x1b/0x30 [ 16.730588] strncpy_from_user+0x1a5/0x1d0 [ 16.730616] copy_user_test_oob+0x760/0x10f0 [ 16.730644] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.730669] ? finish_task_switch.isra.0+0x153/0x700 [ 16.730694] ? __switch_to+0x47/0xf50 [ 16.730722] ? __schedule+0x10cc/0x2b60 [ 16.730745] ? __pfx_read_tsc+0x10/0x10 [ 16.730768] ? ktime_get_ts64+0x86/0x230 [ 16.730794] kunit_try_run_case+0x1a5/0x480 [ 16.730820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.730844] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.730871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.730897] ? __kthread_parkme+0x82/0x180 [ 16.730920] ? preempt_count_sub+0x50/0x80 [ 16.730944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.730970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.730996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.731024] kthread+0x337/0x6f0 [ 16.731045] ? trace_preempt_on+0x20/0xc0 [ 16.731071] ? __pfx_kthread+0x10/0x10 [ 16.731094] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.731117] ? calculate_sigpending+0x7b/0xa0 [ 16.731143] ? __pfx_kthread+0x10/0x10 [ 16.731166] ret_from_fork+0x116/0x1d0 [ 16.731186] ? __pfx_kthread+0x10/0x10 [ 16.731209] ret_from_fork_asm+0x1a/0x30 [ 16.731241] </TASK> [ 16.731252] [ 16.738442] Allocated by task 303: [ 16.738630] kasan_save_stack+0x45/0x70 [ 16.738829] kasan_save_track+0x18/0x40 [ 16.739024] kasan_save_alloc_info+0x3b/0x50 [ 16.739236] __kasan_kmalloc+0xb7/0xc0 [ 16.739429] __kmalloc_noprof+0x1c9/0x500 [ 16.739619] kunit_kmalloc_array+0x25/0x60 [ 16.739824] copy_user_test_oob+0xab/0x10f0 [ 16.739987] kunit_try_run_case+0x1a5/0x480 [ 16.740137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.740318] kthread+0x337/0x6f0 [ 16.740550] ret_from_fork+0x116/0x1d0 [ 16.740744] ret_from_fork_asm+0x1a/0x30 [ 16.740946] [ 16.741046] The buggy address belongs to the object at ffff888103434a00 [ 16.741046] which belongs to the cache kmalloc-128 of size 128 [ 16.741533] The buggy address is located 0 bytes to the right of [ 16.741533] allocated 120-byte region [ffff888103434a00, ffff888103434a78) [ 16.742031] [ 16.742128] The buggy address belongs to the physical page: [ 16.742345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103434 [ 16.742708] flags: 0x200000000000000(node=0|zone=2) [ 16.742951] page_type: f5(slab) [ 16.743091] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.743395] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.743694] page dumped because: kasan: bad access detected [ 16.743881] [ 16.743951] Memory state around the buggy address: [ 16.744107] ffff888103434900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.744332] ffff888103434980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.744754] >ffff888103434a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.745080] ^ [ 16.745390] ffff888103434a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.745726] ffff888103434b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.746010] ================================================================== [ 16.710679] ================================================================== [ 16.711038] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 16.711544] Write of size 121 at addr ffff888103434a00 by task kunit_try_catch/303 [ 16.711808] [ 16.711902] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 16.711948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.711961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.711985] Call Trace: [ 16.712005] <TASK> [ 16.712024] dump_stack_lvl+0x73/0xb0 [ 16.712055] print_report+0xd1/0x610 [ 16.712081] ? __virt_addr_valid+0x1db/0x2d0 [ 16.712107] ? strncpy_from_user+0x2e/0x1d0 [ 16.712132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.712157] ? strncpy_from_user+0x2e/0x1d0 [ 16.712181] kasan_report+0x141/0x180 [ 16.712205] ? strncpy_from_user+0x2e/0x1d0 [ 16.712235] kasan_check_range+0x10c/0x1c0 [ 16.712259] __kasan_check_write+0x18/0x20 [ 16.712286] strncpy_from_user+0x2e/0x1d0 [ 16.712309] ? __kasan_check_read+0x15/0x20 [ 16.712333] copy_user_test_oob+0x760/0x10f0 [ 16.712361] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.712394] ? finish_task_switch.isra.0+0x153/0x700 [ 16.712419] ? __switch_to+0x47/0xf50 [ 16.712448] ? __schedule+0x10cc/0x2b60 [ 16.712482] ? __pfx_read_tsc+0x10/0x10 [ 16.712505] ? ktime_get_ts64+0x86/0x230 [ 16.712530] kunit_try_run_case+0x1a5/0x480 [ 16.712557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.712581] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.712607] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.712633] ? __kthread_parkme+0x82/0x180 [ 16.712655] ? preempt_count_sub+0x50/0x80 [ 16.712681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.712707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.712734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.712761] kthread+0x337/0x6f0 [ 16.712781] ? trace_preempt_on+0x20/0xc0 [ 16.712807] ? __pfx_kthread+0x10/0x10 [ 16.712829] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.712853] ? calculate_sigpending+0x7b/0xa0 [ 16.712880] ? __pfx_kthread+0x10/0x10 [ 16.712903] ret_from_fork+0x116/0x1d0 [ 16.712923] ? __pfx_kthread+0x10/0x10 [ 16.712944] ret_from_fork_asm+0x1a/0x30 [ 16.712978] </TASK> [ 16.712989] [ 16.721028] Allocated by task 303: [ 16.721182] kasan_save_stack+0x45/0x70 [ 16.721333] kasan_save_track+0x18/0x40 [ 16.721480] kasan_save_alloc_info+0x3b/0x50 [ 16.721632] __kasan_kmalloc+0xb7/0xc0 [ 16.721766] __kmalloc_noprof+0x1c9/0x500 [ 16.721907] kunit_kmalloc_array+0x25/0x60 [ 16.722054] copy_user_test_oob+0xab/0x10f0 [ 16.722203] kunit_try_run_case+0x1a5/0x480 [ 16.722529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.722787] kthread+0x337/0x6f0 [ 16.722956] ret_from_fork+0x116/0x1d0 [ 16.723141] ret_from_fork_asm+0x1a/0x30 [ 16.723337] [ 16.723431] The buggy address belongs to the object at ffff888103434a00 [ 16.723431] which belongs to the cache kmalloc-128 of size 128 [ 16.723851] The buggy address is located 0 bytes inside of [ 16.723851] allocated 120-byte region [ffff888103434a00, ffff888103434a78) [ 16.724207] [ 16.724278] The buggy address belongs to the physical page: [ 16.724464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103434 [ 16.724849] flags: 0x200000000000000(node=0|zone=2) [ 16.725091] page_type: f5(slab) [ 16.725264] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.725845] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.726185] page dumped because: kasan: bad access detected [ 16.726441] [ 16.726555] Memory state around the buggy address: [ 16.726780] ffff888103434900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.727051] ffff888103434980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.727266] >ffff888103434a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.727651] ^ [ 16.727968] ffff888103434a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.728287] ffff888103434b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.728563] ==================================================================
[ 17.087628] ================================================================== [ 17.088023] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 17.088318] Write of size 121 at addr ffff8881025b8100 by task kunit_try_catch/304 [ 17.088690] [ 17.088803] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.088847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.088860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.088883] Call Trace: [ 17.088901] <TASK> [ 17.088918] dump_stack_lvl+0x73/0xb0 [ 17.088947] print_report+0xd1/0x610 [ 17.088971] ? __virt_addr_valid+0x1db/0x2d0 [ 17.088996] ? strncpy_from_user+0x2e/0x1d0 [ 17.089021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.089047] ? strncpy_from_user+0x2e/0x1d0 [ 17.089279] kasan_report+0x141/0x180 [ 17.089307] ? strncpy_from_user+0x2e/0x1d0 [ 17.089337] kasan_check_range+0x10c/0x1c0 [ 17.089362] __kasan_check_write+0x18/0x20 [ 17.089384] strncpy_from_user+0x2e/0x1d0 [ 17.089408] ? __kasan_check_read+0x15/0x20 [ 17.089431] copy_user_test_oob+0x760/0x10f0 [ 17.089460] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.089486] ? finish_task_switch.isra.0+0x153/0x700 [ 17.089512] ? __switch_to+0x47/0xf50 [ 17.089539] ? __schedule+0x10cc/0x2b60 [ 17.089563] ? __pfx_read_tsc+0x10/0x10 [ 17.089586] ? ktime_get_ts64+0x86/0x230 [ 17.089612] kunit_try_run_case+0x1a5/0x480 [ 17.089638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.089664] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.089691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.089717] ? __kthread_parkme+0x82/0x180 [ 17.089738] ? preempt_count_sub+0x50/0x80 [ 17.089763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.089789] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.089816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.089843] kthread+0x337/0x6f0 [ 17.089864] ? trace_preempt_on+0x20/0xc0 [ 17.089891] ? __pfx_kthread+0x10/0x10 [ 17.089913] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.089937] ? calculate_sigpending+0x7b/0xa0 [ 17.089962] ? __pfx_kthread+0x10/0x10 [ 17.089984] ret_from_fork+0x116/0x1d0 [ 17.090006] ? __pfx_kthread+0x10/0x10 [ 17.090028] ret_from_fork_asm+0x1a/0x30 [ 17.090243] </TASK> [ 17.090264] [ 17.102979] Allocated by task 304: [ 17.103520] kasan_save_stack+0x45/0x70 [ 17.103726] kasan_save_track+0x18/0x40 [ 17.103909] kasan_save_alloc_info+0x3b/0x50 [ 17.104383] __kasan_kmalloc+0xb7/0xc0 [ 17.104637] __kmalloc_noprof+0x1c9/0x500 [ 17.104987] kunit_kmalloc_array+0x25/0x60 [ 17.105456] copy_user_test_oob+0xab/0x10f0 [ 17.105836] kunit_try_run_case+0x1a5/0x480 [ 17.106035] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.106522] kthread+0x337/0x6f0 [ 17.106700] ret_from_fork+0x116/0x1d0 [ 17.106883] ret_from_fork_asm+0x1a/0x30 [ 17.107079] [ 17.107536] The buggy address belongs to the object at ffff8881025b8100 [ 17.107536] which belongs to the cache kmalloc-128 of size 128 [ 17.108225] The buggy address is located 0 bytes inside of [ 17.108225] allocated 120-byte region [ffff8881025b8100, ffff8881025b8178) [ 17.108605] [ 17.108684] The buggy address belongs to the physical page: [ 17.108863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8 [ 17.109572] flags: 0x200000000000000(node=0|zone=2) [ 17.109925] page_type: f5(slab) [ 17.110063] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.110856] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.111576] page dumped because: kasan: bad access detected [ 17.111761] [ 17.111836] Memory state around the buggy address: [ 17.111994] ffff8881025b8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.112408] ffff8881025b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.112872] >ffff8881025b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.113316] ^ [ 17.113653] ffff8881025b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.113996] ffff8881025b8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.114365] ================================================================== [ 17.115232] ================================================================== [ 17.115591] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 17.116551] Write of size 1 at addr ffff8881025b8178 by task kunit_try_catch/304 [ 17.117033] [ 17.117271] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 17.117321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.117336] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 17.117357] Call Trace: [ 17.117376] <TASK> [ 17.117394] dump_stack_lvl+0x73/0xb0 [ 17.117425] print_report+0xd1/0x610 [ 17.117450] ? __virt_addr_valid+0x1db/0x2d0 [ 17.117475] ? strncpy_from_user+0x1a5/0x1d0 [ 17.117500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 17.117526] ? strncpy_from_user+0x1a5/0x1d0 [ 17.117551] kasan_report+0x141/0x180 [ 17.117574] ? strncpy_from_user+0x1a5/0x1d0 [ 17.117603] __asan_report_store1_noabort+0x1b/0x30 [ 17.117630] strncpy_from_user+0x1a5/0x1d0 [ 17.117658] copy_user_test_oob+0x760/0x10f0 [ 17.117687] ? __pfx_copy_user_test_oob+0x10/0x10 [ 17.117712] ? finish_task_switch.isra.0+0x153/0x700 [ 17.117738] ? __switch_to+0x47/0xf50 [ 17.117764] ? __schedule+0x10cc/0x2b60 [ 17.117788] ? __pfx_read_tsc+0x10/0x10 [ 17.117811] ? ktime_get_ts64+0x86/0x230 [ 17.117837] kunit_try_run_case+0x1a5/0x480 [ 17.117863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.117889] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 17.117915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 17.117941] ? __kthread_parkme+0x82/0x180 [ 17.117963] ? preempt_count_sub+0x50/0x80 [ 17.117988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 17.118014] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.118041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 17.118080] kthread+0x337/0x6f0 [ 17.118101] ? trace_preempt_on+0x20/0xc0 [ 17.118127] ? __pfx_kthread+0x10/0x10 [ 17.118150] ? _raw_spin_unlock_irq+0x47/0x80 [ 17.118173] ? calculate_sigpending+0x7b/0xa0 [ 17.118198] ? __pfx_kthread+0x10/0x10 [ 17.118221] ret_from_fork+0x116/0x1d0 [ 17.118242] ? __pfx_kthread+0x10/0x10 [ 17.118274] ret_from_fork_asm+0x1a/0x30 [ 17.118307] </TASK> [ 17.118319] [ 17.126517] Allocated by task 304: [ 17.126650] kasan_save_stack+0x45/0x70 [ 17.126964] kasan_save_track+0x18/0x40 [ 17.127223] kasan_save_alloc_info+0x3b/0x50 [ 17.127446] __kasan_kmalloc+0xb7/0xc0 [ 17.127814] __kmalloc_noprof+0x1c9/0x500 [ 17.127971] kunit_kmalloc_array+0x25/0x60 [ 17.128128] copy_user_test_oob+0xab/0x10f0 [ 17.128292] kunit_try_run_case+0x1a5/0x480 [ 17.128512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 17.128771] kthread+0x337/0x6f0 [ 17.128944] ret_from_fork+0x116/0x1d0 [ 17.129151] ret_from_fork_asm+0x1a/0x30 [ 17.129337] [ 17.129415] The buggy address belongs to the object at ffff8881025b8100 [ 17.129415] which belongs to the cache kmalloc-128 of size 128 [ 17.129882] The buggy address is located 0 bytes to the right of [ 17.129882] allocated 120-byte region [ffff8881025b8100, ffff8881025b8178) [ 17.130360] [ 17.130434] The buggy address belongs to the physical page: [ 17.130609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025b8 [ 17.130911] flags: 0x200000000000000(node=0|zone=2) [ 17.131156] page_type: f5(slab) [ 17.131326] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 17.131888] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.132312] page dumped because: kasan: bad access detected [ 17.132539] [ 17.132624] Memory state around the buggy address: [ 17.132810] ffff8881025b8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.133082] ffff8881025b8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.133631] >ffff8881025b8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 17.133928] ^ [ 17.134194] ffff8881025b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.134514] ffff8881025b8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.134959] ==================================================================