Date
July 12, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 23.625990] ================================================================== [ 23.626100] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 23.626223] Write of size 121 at addr fff00000c5942a00 by task kunit_try_catch/286 [ 23.626370] [ 23.627069] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.627262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.627371] Hardware name: linux,dummy-virt (DT) [ 23.627529] Call trace: [ 23.627599] show_stack+0x20/0x38 (C) [ 23.627714] dump_stack_lvl+0x8c/0xd0 [ 23.627818] print_report+0x118/0x608 [ 23.628134] kasan_report+0xdc/0x128 [ 23.628240] kasan_check_range+0x100/0x1a8 [ 23.628350] __kasan_check_write+0x20/0x30 [ 23.628465] strncpy_from_user+0x3c/0x2a0 [ 23.628586] copy_user_test_oob+0x5c0/0xec8 [ 23.628722] kunit_try_run_case+0x170/0x3f0 [ 23.628885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.629069] kthread+0x328/0x630 [ 23.629232] ret_from_fork+0x10/0x20 [ 23.629339] [ 23.629593] Allocated by task 286: [ 23.629702] kasan_save_stack+0x3c/0x68 [ 23.629803] kasan_save_track+0x20/0x40 [ 23.629914] kasan_save_alloc_info+0x40/0x58 [ 23.630056] __kasan_kmalloc+0xd4/0xd8 [ 23.630138] __kmalloc_noprof+0x198/0x4c8 [ 23.630251] kunit_kmalloc_array+0x34/0x88 [ 23.630436] copy_user_test_oob+0xac/0xec8 [ 23.630538] kunit_try_run_case+0x170/0x3f0 [ 23.630621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.630724] kthread+0x328/0x630 [ 23.630810] ret_from_fork+0x10/0x20 [ 23.631350] [ 23.631404] The buggy address belongs to the object at fff00000c5942a00 [ 23.631404] which belongs to the cache kmalloc-128 of size 128 [ 23.631547] The buggy address is located 0 bytes inside of [ 23.631547] allocated 120-byte region [fff00000c5942a00, fff00000c5942a78) [ 23.631696] [ 23.631747] The buggy address belongs to the physical page: [ 23.631817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942 [ 23.631957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.632076] page_type: f5(slab) [ 23.632168] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.632287] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.632387] page dumped because: kasan: bad access detected [ 23.632469] [ 23.632526] Memory state around the buggy address: [ 23.632635] fff00000c5942900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.632793] fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.632935] >fff00000c5942a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.633034] ^ [ 23.633174] fff00000c5942a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.633277] fff00000c5942b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.633376] ================================================================== [ 23.634589] ================================================================== [ 23.634717] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 23.634865] Write of size 1 at addr fff00000c5942a78 by task kunit_try_catch/286 [ 23.635048] [ 23.635151] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 23.635427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.635519] Hardware name: linux,dummy-virt (DT) [ 23.635625] Call trace: [ 23.635698] show_stack+0x20/0x38 (C) [ 23.635806] dump_stack_lvl+0x8c/0xd0 [ 23.635949] print_report+0x118/0x608 [ 23.636110] kasan_report+0xdc/0x128 [ 23.636268] __asan_report_store1_noabort+0x20/0x30 [ 23.636445] strncpy_from_user+0x270/0x2a0 [ 23.636606] copy_user_test_oob+0x5c0/0xec8 [ 23.636750] kunit_try_run_case+0x170/0x3f0 [ 23.636867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.636979] kthread+0x328/0x630 [ 23.637079] ret_from_fork+0x10/0x20 [ 23.637236] [ 23.637286] Allocated by task 286: [ 23.637361] kasan_save_stack+0x3c/0x68 [ 23.637467] kasan_save_track+0x20/0x40 [ 23.637552] kasan_save_alloc_info+0x40/0x58 [ 23.637657] __kasan_kmalloc+0xd4/0xd8 [ 23.637760] __kmalloc_noprof+0x198/0x4c8 [ 23.637878] kunit_kmalloc_array+0x34/0x88 [ 23.637973] copy_user_test_oob+0xac/0xec8 [ 23.638119] kunit_try_run_case+0x170/0x3f0 [ 23.638218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.638344] kthread+0x328/0x630 [ 23.638441] ret_from_fork+0x10/0x20 [ 23.638522] [ 23.638599] The buggy address belongs to the object at fff00000c5942a00 [ 23.638599] which belongs to the cache kmalloc-128 of size 128 [ 23.638745] The buggy address is located 0 bytes to the right of [ 23.638745] allocated 120-byte region [fff00000c5942a00, fff00000c5942a78) [ 23.638912] [ 23.638968] The buggy address belongs to the physical page: [ 23.639045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105942 [ 23.639168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.639302] page_type: f5(slab) [ 23.639400] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.639515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.639601] page dumped because: kasan: bad access detected [ 23.639666] [ 23.639705] Memory state around the buggy address: [ 23.639799] fff00000c5942900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.639896] fff00000c5942980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.639999] >fff00000c5942a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.640092] ^ [ 23.640192] fff00000c5942a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.640338] fff00000c5942b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.640435] ==================================================================
[ 16.930614] ================================================================== [ 16.930946] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 16.931279] Write of size 121 at addr ffff888103ad9000 by task kunit_try_catch/303 [ 16.931617] [ 16.931762] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.931807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.931818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.931840] Call Trace: [ 16.931857] <TASK> [ 16.931873] dump_stack_lvl+0x73/0xb0 [ 16.931903] print_report+0xd1/0x650 [ 16.931927] ? __virt_addr_valid+0x1db/0x2d0 [ 16.931950] ? strncpy_from_user+0x2e/0x1d0 [ 16.931975] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.931999] ? strncpy_from_user+0x2e/0x1d0 [ 16.932024] kasan_report+0x141/0x180 [ 16.932047] ? strncpy_from_user+0x2e/0x1d0 [ 16.932076] kasan_check_range+0x10c/0x1c0 [ 16.932101] __kasan_check_write+0x18/0x20 [ 16.932121] strncpy_from_user+0x2e/0x1d0 [ 16.932145] ? __kasan_check_read+0x15/0x20 [ 16.932167] copy_user_test_oob+0x760/0x10f0 [ 16.932195] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.932219] ? finish_task_switch.isra.0+0x153/0x700 [ 16.932244] ? __switch_to+0x47/0xf50 [ 16.932270] ? __schedule+0x10cc/0x2b60 [ 16.932293] ? __pfx_read_tsc+0x10/0x10 [ 16.932314] ? ktime_get_ts64+0x86/0x230 [ 16.932339] kunit_try_run_case+0x1a5/0x480 [ 16.932364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.932389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.932414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.932440] ? __kthread_parkme+0x82/0x180 [ 16.932461] ? preempt_count_sub+0x50/0x80 [ 16.932486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.932512] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.932537] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.932565] kthread+0x337/0x6f0 [ 16.932585] ? trace_preempt_on+0x20/0xc0 [ 16.932609] ? __pfx_kthread+0x10/0x10 [ 16.932632] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.932676] ? calculate_sigpending+0x7b/0xa0 [ 16.932700] ? __pfx_kthread+0x10/0x10 [ 16.932723] ret_from_fork+0x116/0x1d0 [ 16.932742] ? __pfx_kthread+0x10/0x10 [ 16.932771] ret_from_fork_asm+0x1a/0x30 [ 16.932803] </TASK> [ 16.932815] [ 16.939906] Allocated by task 303: [ 16.940084] kasan_save_stack+0x45/0x70 [ 16.940276] kasan_save_track+0x18/0x40 [ 16.940463] kasan_save_alloc_info+0x3b/0x50 [ 16.940692] __kasan_kmalloc+0xb7/0xc0 [ 16.940881] __kmalloc_noprof+0x1c9/0x500 [ 16.941057] kunit_kmalloc_array+0x25/0x60 [ 16.941199] copy_user_test_oob+0xab/0x10f0 [ 16.941343] kunit_try_run_case+0x1a5/0x480 [ 16.941486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.941729] kthread+0x337/0x6f0 [ 16.941912] ret_from_fork+0x116/0x1d0 [ 16.942092] ret_from_fork_asm+0x1a/0x30 [ 16.942293] [ 16.942391] The buggy address belongs to the object at ffff888103ad9000 [ 16.942391] which belongs to the cache kmalloc-128 of size 128 [ 16.942846] The buggy address is located 0 bytes inside of [ 16.942846] allocated 120-byte region [ffff888103ad9000, ffff888103ad9078) [ 16.943190] [ 16.943275] The buggy address belongs to the physical page: [ 16.943518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad9 [ 16.943895] flags: 0x200000000000000(node=0|zone=2) [ 16.944123] page_type: f5(slab) [ 16.944291] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.944626] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.944879] page dumped because: kasan: bad access detected [ 16.945049] [ 16.945116] Memory state around the buggy address: [ 16.945313] ffff888103ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.945628] ffff888103ad8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.945976] >ffff888103ad9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.946296] ^ [ 16.946599] ffff888103ad9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.946867] ffff888103ad9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.947086] ================================================================== [ 16.947736] ================================================================== [ 16.948088] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 16.948474] Write of size 1 at addr ffff888103ad9078 by task kunit_try_catch/303 [ 16.948854] [ 16.948950] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 16.948991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.949003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.949024] Call Trace: [ 16.949040] <TASK> [ 16.949056] dump_stack_lvl+0x73/0xb0 [ 16.949084] print_report+0xd1/0x650 [ 16.949107] ? __virt_addr_valid+0x1db/0x2d0 [ 16.949133] ? strncpy_from_user+0x1a5/0x1d0 [ 16.949158] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.949182] ? strncpy_from_user+0x1a5/0x1d0 [ 16.949207] kasan_report+0x141/0x180 [ 16.949230] ? strncpy_from_user+0x1a5/0x1d0 [ 16.949259] __asan_report_store1_noabort+0x1b/0x30 [ 16.949285] strncpy_from_user+0x1a5/0x1d0 [ 16.949312] copy_user_test_oob+0x760/0x10f0 [ 16.949339] ? __pfx_copy_user_test_oob+0x10/0x10 [ 16.949364] ? finish_task_switch.isra.0+0x153/0x700 [ 16.949388] ? __switch_to+0x47/0xf50 [ 16.949414] ? __schedule+0x10cc/0x2b60 [ 16.949437] ? __pfx_read_tsc+0x10/0x10 [ 16.949458] ? ktime_get_ts64+0x86/0x230 [ 16.949483] kunit_try_run_case+0x1a5/0x480 [ 16.949509] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.949533] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.949559] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.949584] ? __kthread_parkme+0x82/0x180 [ 16.949605] ? preempt_count_sub+0x50/0x80 [ 16.949630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.949679] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.949705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.949732] kthread+0x337/0x6f0 [ 16.949762] ? trace_preempt_on+0x20/0xc0 [ 16.949787] ? __pfx_kthread+0x10/0x10 [ 16.949809] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.949832] ? calculate_sigpending+0x7b/0xa0 [ 16.949857] ? __pfx_kthread+0x10/0x10 [ 16.949879] ret_from_fork+0x116/0x1d0 [ 16.949899] ? __pfx_kthread+0x10/0x10 [ 16.949920] ret_from_fork_asm+0x1a/0x30 [ 16.949952] </TASK> [ 16.949963] [ 16.956825] Allocated by task 303: [ 16.956952] kasan_save_stack+0x45/0x70 [ 16.957093] kasan_save_track+0x18/0x40 [ 16.957227] kasan_save_alloc_info+0x3b/0x50 [ 16.957374] __kasan_kmalloc+0xb7/0xc0 [ 16.957505] __kmalloc_noprof+0x1c9/0x500 [ 16.957663] kunit_kmalloc_array+0x25/0x60 [ 16.957913] copy_user_test_oob+0xab/0x10f0 [ 16.958114] kunit_try_run_case+0x1a5/0x480 [ 16.958308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.958548] kthread+0x337/0x6f0 [ 16.958735] ret_from_fork+0x116/0x1d0 [ 16.958926] ret_from_fork_asm+0x1a/0x30 [ 16.959113] [ 16.959209] The buggy address belongs to the object at ffff888103ad9000 [ 16.959209] which belongs to the cache kmalloc-128 of size 128 [ 16.959756] The buggy address is located 0 bytes to the right of [ 16.959756] allocated 120-byte region [ffff888103ad9000, ffff888103ad9078) [ 16.960307] [ 16.960400] The buggy address belongs to the physical page: [ 16.960674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ad9 [ 16.961068] flags: 0x200000000000000(node=0|zone=2) [ 16.961302] page_type: f5(slab) [ 16.961472] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.961696] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.961918] page dumped because: kasan: bad access detected [ 16.962078] [ 16.962143] Memory state around the buggy address: [ 16.962286] ffff888103ad8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.962512] ffff888103ad8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.962869] >ffff888103ad9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 16.963211] ^ [ 16.963559] ffff888103ad9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.963933] ffff888103ad9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.964284] ==================================================================