Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 38.542376] ================================================================== [ 38.543180] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 38.543806] Write of size 1 at addr fff00000c596cb78 by task kunit_try_catch/274 [ 38.545107] [ 38.545556] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.546816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.547310] Hardware name: linux,dummy-virt (DT) [ 38.547987] Call trace: [ 38.548415] show_stack+0x20/0x38 (C) [ 38.549084] dump_stack_lvl+0x8c/0xd0 [ 38.549720] print_report+0x118/0x5e0 [ 38.550387] kasan_report+0xc8/0x118 [ 38.550996] __asan_report_store1_noabort+0x20/0x30 [ 38.551674] strncpy_from_user+0x270/0x2a0 [ 38.552320] copy_user_test_oob+0x5c0/0xec0 [ 38.552962] kunit_try_run_case+0x14c/0x3d0 [ 38.553519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.554339] kthread+0x24c/0x2d0 [ 38.554916] ret_from_fork+0x10/0x20 [ 38.555545] [ 38.555878] Allocated by task 274: [ 38.556458] kasan_save_stack+0x3c/0x68 [ 38.557099] kasan_save_track+0x20/0x40 [ 38.557656] kasan_save_alloc_info+0x40/0x58 [ 38.558329] __kasan_kmalloc+0xd4/0xd8 [ 38.558846] __kmalloc_noprof+0x188/0x4c8 [ 38.559649] kunit_kmalloc_array+0x34/0x88 [ 38.560282] copy_user_test_oob+0xac/0xec0 [ 38.561078] kunit_try_run_case+0x14c/0x3d0 [ 38.561930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.562975] kthread+0x24c/0x2d0 [ 38.563689] ret_from_fork+0x10/0x20 [ 38.564458] [ 38.564928] The buggy address belongs to the object at fff00000c596cb00 [ 38.564928] which belongs to the cache kmalloc-128 of size 128 [ 38.566162] The buggy address is located 0 bytes to the right of [ 38.566162] allocated 120-byte region [fff00000c596cb00, fff00000c596cb78) [ 38.567347] [ 38.567659] The buggy address belongs to the physical page: [ 38.568935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 38.570050] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.571049] page_type: f5(slab) [ 38.571803] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.572844] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.573649] page dumped because: kasan: bad access detected [ 38.574632] [ 38.575188] Memory state around the buggy address: [ 38.575973] fff00000c596ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.577022] fff00000c596ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.578071] >fff00000c596cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.579105] ^ [ 38.580137] fff00000c596cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.581171] fff00000c596cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.581960] ================================================================== [ 38.503499] ================================================================== [ 38.504405] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 38.505445] Write of size 121 at addr fff00000c596cb00 by task kunit_try_catch/274 [ 38.506300] [ 38.507095] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.508380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.509029] Hardware name: linux,dummy-virt (DT) [ 38.510204] Call trace: [ 38.510808] show_stack+0x20/0x38 (C) [ 38.511469] dump_stack_lvl+0x8c/0xd0 [ 38.512086] print_report+0x118/0x5e0 [ 38.512667] kasan_report+0xc8/0x118 [ 38.513208] kasan_check_range+0x100/0x1a8 [ 38.513724] __kasan_check_write+0x20/0x30 [ 38.514282] strncpy_from_user+0x3c/0x2a0 [ 38.514960] copy_user_test_oob+0x5c0/0xec0 [ 38.515569] kunit_try_run_case+0x14c/0x3d0 [ 38.516237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.516951] kthread+0x24c/0x2d0 [ 38.517491] ret_from_fork+0x10/0x20 [ 38.518064] [ 38.518433] Allocated by task 274: [ 38.518865] kasan_save_stack+0x3c/0x68 [ 38.519520] kasan_save_track+0x20/0x40 [ 38.520143] kasan_save_alloc_info+0x40/0x58 [ 38.520821] __kasan_kmalloc+0xd4/0xd8 [ 38.521444] __kmalloc_noprof+0x188/0x4c8 [ 38.522051] kunit_kmalloc_array+0x34/0x88 [ 38.522696] copy_user_test_oob+0xac/0xec0 [ 38.523360] kunit_try_run_case+0x14c/0x3d0 [ 38.523927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.524638] kthread+0x24c/0x2d0 [ 38.525225] ret_from_fork+0x10/0x20 [ 38.525791] [ 38.526110] The buggy address belongs to the object at fff00000c596cb00 [ 38.526110] which belongs to the cache kmalloc-128 of size 128 [ 38.527512] The buggy address is located 0 bytes inside of [ 38.527512] allocated 120-byte region [fff00000c596cb00, fff00000c596cb78) [ 38.528781] [ 38.529172] The buggy address belongs to the physical page: [ 38.529706] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 38.530712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.531467] page_type: f5(slab) [ 38.531925] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.532874] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.533775] page dumped because: kasan: bad access detected [ 38.534529] [ 38.534892] Memory state around the buggy address: [ 38.535620] fff00000c596ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.536361] fff00000c596ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.537191] >fff00000c596cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.537962] ^ [ 38.538786] fff00000c596cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.539600] fff00000c596cc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.540388] ==================================================================
[ 38.579969] ================================================================== [ 38.580794] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 38.582079] Write of size 121 at addr fff00000c5f1be00 by task kunit_try_catch/274 [ 38.582976] [ 38.583392] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.584704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.585455] Hardware name: linux,dummy-virt (DT) [ 38.586091] Call trace: [ 38.586500] show_stack+0x20/0x38 (C) [ 38.587481] dump_stack_lvl+0x8c/0xd0 [ 38.588342] print_report+0x118/0x5e0 [ 38.588888] kasan_report+0xc8/0x118 [ 38.589456] kasan_check_range+0x100/0x1a8 [ 38.590212] __kasan_check_write+0x20/0x30 [ 38.590899] strncpy_from_user+0x3c/0x2a0 [ 38.591562] copy_user_test_oob+0x5c0/0xec0 [ 38.592230] kunit_try_run_case+0x14c/0x3d0 [ 38.592925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.593708] kthread+0x24c/0x2d0 [ 38.594284] ret_from_fork+0x10/0x20 [ 38.594875] [ 38.595293] Allocated by task 274: [ 38.596010] kasan_save_stack+0x3c/0x68 [ 38.596729] kasan_save_track+0x20/0x40 [ 38.597417] kasan_save_alloc_info+0x40/0x58 [ 38.598074] __kasan_kmalloc+0xd4/0xd8 [ 38.598689] __kmalloc_noprof+0x188/0x4c8 [ 38.599294] kunit_kmalloc_array+0x34/0x88 [ 38.599940] copy_user_test_oob+0xac/0xec0 [ 38.600626] kunit_try_run_case+0x14c/0x3d0 [ 38.601227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.601964] kthread+0x24c/0x2d0 [ 38.602429] ret_from_fork+0x10/0x20 [ 38.603132] [ 38.603452] The buggy address belongs to the object at fff00000c5f1be00 [ 38.603452] which belongs to the cache kmalloc-128 of size 128 [ 38.604738] The buggy address is located 0 bytes inside of [ 38.604738] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.606192] [ 38.606548] The buggy address belongs to the physical page: [ 38.607321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.608332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.609282] page_type: f5(slab) [ 38.609939] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.610842] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.611660] page dumped because: kasan: bad access detected [ 38.612470] [ 38.612864] Memory state around the buggy address: [ 38.613487] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.614518] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.615285] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.616220] ^ [ 38.617064] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.617931] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.618797] ================================================================== [ 38.620791] ================================================================== [ 38.622372] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 38.623205] Write of size 1 at addr fff00000c5f1be78 by task kunit_try_catch/274 [ 38.623929] [ 38.624317] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.625389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.626374] Hardware name: linux,dummy-virt (DT) [ 38.627122] Call trace: [ 38.627603] show_stack+0x20/0x38 (C) [ 38.628183] dump_stack_lvl+0x8c/0xd0 [ 38.628855] print_report+0x118/0x5e0 [ 38.629381] kasan_report+0xc8/0x118 [ 38.630040] __asan_report_store1_noabort+0x20/0x30 [ 38.630684] strncpy_from_user+0x270/0x2a0 [ 38.631361] copy_user_test_oob+0x5c0/0xec0 [ 38.632004] kunit_try_run_case+0x14c/0x3d0 [ 38.632596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.633420] kthread+0x24c/0x2d0 [ 38.633980] ret_from_fork+0x10/0x20 [ 38.634637] [ 38.634996] Allocated by task 274: [ 38.635577] kasan_save_stack+0x3c/0x68 [ 38.636139] kasan_save_track+0x20/0x40 [ 38.636692] kasan_save_alloc_info+0x40/0x58 [ 38.637380] __kasan_kmalloc+0xd4/0xd8 [ 38.637871] __kmalloc_noprof+0x188/0x4c8 [ 38.638520] kunit_kmalloc_array+0x34/0x88 [ 38.639178] copy_user_test_oob+0xac/0xec0 [ 38.639854] kunit_try_run_case+0x14c/0x3d0 [ 38.640442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.641257] kthread+0x24c/0x2d0 [ 38.641832] ret_from_fork+0x10/0x20 [ 38.642441] [ 38.642791] The buggy address belongs to the object at fff00000c5f1be00 [ 38.642791] which belongs to the cache kmalloc-128 of size 128 [ 38.644072] The buggy address is located 0 bytes to the right of [ 38.644072] allocated 120-byte region [fff00000c5f1be00, fff00000c5f1be78) [ 38.645427] [ 38.645830] The buggy address belongs to the physical page: [ 38.646594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f1b [ 38.647434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.648262] page_type: f5(slab) [ 38.648861] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 38.649692] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 38.650570] page dumped because: kasan: bad access detected [ 38.651166] [ 38.651571] Memory state around the buggy address: [ 38.652270] fff00000c5f1bd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.653143] fff00000c5f1bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.654105] >fff00000c5f1be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.654998] ^ [ 38.655949] fff00000c5f1be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.656752] fff00000c5f1bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.657679] ==================================================================
[ 32.951293] ================================================================== [ 32.951902] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a7/0x1e0 [ 32.952167] Write of size 1 at addr ffff8881028f6c78 by task kunit_try_catch/294 [ 32.952167] [ 32.952167] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.952167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.952167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.952167] Call Trace: [ 32.952167] <TASK> [ 32.952167] dump_stack_lvl+0x73/0xb0 [ 32.952167] print_report+0xd1/0x640 [ 32.952167] ? __virt_addr_valid+0x1db/0x2d0 [ 32.952167] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.952167] kasan_report+0x102/0x140 [ 32.952167] ? strncpy_from_user+0x1a7/0x1e0 [ 32.952167] ? strncpy_from_user+0x1a7/0x1e0 [ 32.952167] __asan_report_store1_noabort+0x1b/0x30 [ 32.952167] strncpy_from_user+0x1a7/0x1e0 [ 32.952167] copy_user_test_oob+0x761/0x10f0 [ 32.952167] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.952167] ? __switch_to+0x5d9/0xf60 [ 32.952167] ? __schedule+0xc3e/0x2790 [ 32.952167] ? ktime_get_ts64+0x84/0x230 [ 32.952167] kunit_try_run_case+0x1b3/0x490 [ 32.952167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.952167] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.952167] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.952167] ? __kthread_parkme+0x82/0x160 [ 32.952167] ? preempt_count_sub+0x50/0x80 [ 32.952167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.952167] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.952167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.952167] kthread+0x257/0x310 [ 32.952167] ? __pfx_kthread+0x10/0x10 [ 32.952167] ret_from_fork+0x41/0x80 [ 32.952167] ? __pfx_kthread+0x10/0x10 [ 32.952167] ret_from_fork_asm+0x1a/0x30 [ 32.952167] </TASK> [ 32.952167] [ 32.952167] Allocated by task 294: [ 32.952167] kasan_save_stack+0x3d/0x60 [ 32.952167] kasan_save_track+0x18/0x40 [ 32.952167] kasan_save_alloc_info+0x3b/0x50 [ 32.952167] __kasan_kmalloc+0xb7/0xc0 [ 32.952167] __kmalloc_noprof+0x1c4/0x500 [ 32.952167] kunit_kmalloc_array+0x25/0x60 [ 32.952167] copy_user_test_oob+0xac/0x10f0 [ 32.952167] kunit_try_run_case+0x1b3/0x490 [ 32.952167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.952167] kthread+0x257/0x310 [ 32.952167] ret_from_fork+0x41/0x80 [ 32.952167] ret_from_fork_asm+0x1a/0x30 [ 32.952167] [ 32.952167] The buggy address belongs to the object at ffff8881028f6c00 [ 32.952167] which belongs to the cache kmalloc-128 of size 128 [ 32.952167] The buggy address is located 0 bytes to the right of [ 32.952167] allocated 120-byte region [ffff8881028f6c00, ffff8881028f6c78) [ 32.952167] [ 32.952167] The buggy address belongs to the physical page: [ 32.952167] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028f6 [ 32.952167] flags: 0x200000000000000(node=0|zone=2) [ 32.952167] page_type: f5(slab) [ 32.952167] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.952167] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.952167] page dumped because: kasan: bad access detected [ 32.952167] [ 32.952167] Memory state around the buggy address: [ 32.952167] ffff8881028f6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.952167] ffff8881028f6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.952167] >ffff8881028f6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.952167] ^ [ 32.952167] ffff8881028f6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.952167] ffff8881028f6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.952167] ================================================================== [ 32.909163] ================================================================== [ 32.909263] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1e0 [ 32.909263] Write of size 121 at addr ffff8881028f6c00 by task kunit_try_catch/294 [ 32.909263] [ 32.910304] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.913537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.913537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.913537] Call Trace: [ 32.913537] <TASK> [ 32.913537] dump_stack_lvl+0x73/0xb0 [ 32.913537] print_report+0xd1/0x640 [ 32.913537] ? __virt_addr_valid+0x1db/0x2d0 [ 32.913537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.913537] kasan_report+0x102/0x140 [ 32.913537] ? strncpy_from_user+0x2e/0x1e0 [ 32.913537] ? strncpy_from_user+0x2e/0x1e0 [ 32.913537] kasan_check_range+0x10c/0x1c0 [ 32.913537] __kasan_check_write+0x18/0x20 [ 32.913537] strncpy_from_user+0x2e/0x1e0 [ 32.913537] ? __kasan_check_read+0x15/0x20 [ 32.913537] copy_user_test_oob+0x761/0x10f0 [ 32.913537] ? __pfx_copy_user_test_oob+0x10/0x10 [ 32.913537] ? __switch_to+0x5d9/0xf60 [ 32.913537] ? __schedule+0xc3e/0x2790 [ 32.913537] ? ktime_get_ts64+0x84/0x230 [ 32.913537] kunit_try_run_case+0x1b3/0x490 [ 32.913537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.913537] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.913537] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.913537] ? __kthread_parkme+0x82/0x160 [ 32.913537] ? preempt_count_sub+0x50/0x80 [ 32.913537] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.913537] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.913537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.913537] kthread+0x257/0x310 [ 32.913537] ? __pfx_kthread+0x10/0x10 [ 32.913537] ret_from_fork+0x41/0x80 [ 32.913537] ? __pfx_kthread+0x10/0x10 [ 32.913537] ret_from_fork_asm+0x1a/0x30 [ 32.913537] </TASK> [ 32.913537] [ 32.913537] Allocated by task 294: [ 32.913537] kasan_save_stack+0x3d/0x60 [ 32.913537] kasan_save_track+0x18/0x40 [ 32.913537] kasan_save_alloc_info+0x3b/0x50 [ 32.913537] __kasan_kmalloc+0xb7/0xc0 [ 32.913537] __kmalloc_noprof+0x1c4/0x500 [ 32.913537] kunit_kmalloc_array+0x25/0x60 [ 32.913537] copy_user_test_oob+0xac/0x10f0 [ 32.913537] kunit_try_run_case+0x1b3/0x490 [ 32.913537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.913537] kthread+0x257/0x310 [ 32.913537] ret_from_fork+0x41/0x80 [ 32.913537] ret_from_fork_asm+0x1a/0x30 [ 32.913537] [ 32.913537] The buggy address belongs to the object at ffff8881028f6c00 [ 32.913537] which belongs to the cache kmalloc-128 of size 128 [ 32.913537] The buggy address is located 0 bytes inside of [ 32.913537] allocated 120-byte region [ffff8881028f6c00, ffff8881028f6c78) [ 32.913537] [ 32.913537] The buggy address belongs to the physical page: [ 32.913537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028f6 [ 32.913537] flags: 0x200000000000000(node=0|zone=2) [ 32.913537] page_type: f5(slab) [ 32.913537] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 32.913537] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 32.913537] page dumped because: kasan: bad access detected [ 32.913537] [ 32.913537] Memory state around the buggy address: [ 32.913537] ffff8881028f6b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.913537] ffff8881028f6b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.913537] >ffff8881028f6c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.913537] ^ [ 32.913537] ffff8881028f6c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.913537] ffff8881028f6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.913537] ==================================================================
[ 27.643820] ================================================================== [ 27.644758] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1e0 [ 27.645370] Write of size 121 at addr ffff8881028cc000 by task kunit_try_catch/292 [ 27.646896] [ 27.647619] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.649286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.649723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.651271] Call Trace: [ 27.651522] <TASK> [ 27.652391] dump_stack_lvl+0x73/0xb0 [ 27.652943] print_report+0xd1/0x640 [ 27.653518] ? __virt_addr_valid+0x1db/0x2d0 [ 27.653967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.654543] kasan_report+0x102/0x140 [ 27.654928] ? strncpy_from_user+0x2e/0x1e0 [ 27.655317] ? strncpy_from_user+0x2e/0x1e0 [ 27.656658] kasan_check_range+0x10c/0x1c0 [ 27.656961] __kasan_check_write+0x18/0x20 [ 27.657415] strncpy_from_user+0x2e/0x1e0 [ 27.657945] ? __kasan_check_read+0x15/0x20 [ 27.658399] copy_user_test_oob+0x761/0x10f0 [ 27.659429] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.660041] ? finish_task_switch.isra.0+0x153/0x700 [ 27.660565] ? __switch_to+0x5d9/0xf60 [ 27.661368] ? __schedule+0xc3e/0x2790 [ 27.661869] ? __pfx_read_tsc+0x10/0x10 [ 27.662617] ? ktime_get_ts64+0x84/0x230 [ 27.663105] kunit_try_run_case+0x1b3/0x490 [ 27.663911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.664311] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.665067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.665559] ? __kthread_parkme+0x82/0x160 [ 27.666349] ? preempt_count_sub+0x50/0x80 [ 27.666978] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.667410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.668257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.669028] kthread+0x257/0x310 [ 27.669452] ? __pfx_kthread+0x10/0x10 [ 27.670248] ret_from_fork+0x41/0x80 [ 27.671014] ? __pfx_kthread+0x10/0x10 [ 27.671387] ret_from_fork_asm+0x1a/0x30 [ 27.671821] </TASK> [ 27.672078] [ 27.672254] Allocated by task 292: [ 27.673257] kasan_save_stack+0x3d/0x60 [ 27.673526] kasan_save_track+0x18/0x40 [ 27.674202] kasan_save_alloc_info+0x3b/0x50 [ 27.674921] __kasan_kmalloc+0xb7/0xc0 [ 27.675257] __kmalloc_noprof+0x1c4/0x500 [ 27.675583] kunit_kmalloc_array+0x25/0x60 [ 27.676466] copy_user_test_oob+0xac/0x10f0 [ 27.676924] kunit_try_run_case+0x1b3/0x490 [ 27.677384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.678313] kthread+0x257/0x310 [ 27.678958] ret_from_fork+0x41/0x80 [ 27.679387] ret_from_fork_asm+0x1a/0x30 [ 27.679719] [ 27.680474] The buggy address belongs to the object at ffff8881028cc000 [ 27.680474] which belongs to the cache kmalloc-128 of size 128 [ 27.681339] The buggy address is located 0 bytes inside of [ 27.681339] allocated 120-byte region [ffff8881028cc000, ffff8881028cc078) [ 27.682849] [ 27.683169] The buggy address belongs to the physical page: [ 27.684109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028cc [ 27.684719] flags: 0x200000000000000(node=0|zone=2) [ 27.685310] page_type: f5(slab) [ 27.686107] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.686939] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.687736] page dumped because: kasan: bad access detected [ 27.688032] [ 27.688794] Memory state around the buggy address: [ 27.689129] ffff8881028cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.689655] ffff8881028cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.690589] >ffff8881028cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.691214] ^ [ 27.692151] ffff8881028cc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.692861] ffff8881028cc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.693403] ================================================================== [ 27.695614] ================================================================== [ 27.696850] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a7/0x1e0 [ 27.697869] Write of size 1 at addr ffff8881028cc078 by task kunit_try_catch/292 [ 27.698396] [ 27.699024] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.700317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.700709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.701377] Call Trace: [ 27.702130] <TASK> [ 27.702497] dump_stack_lvl+0x73/0xb0 [ 27.703365] print_report+0xd1/0x640 [ 27.704188] ? __virt_addr_valid+0x1db/0x2d0 [ 27.705215] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.705674] kasan_report+0x102/0x140 [ 27.706289] ? strncpy_from_user+0x1a7/0x1e0 [ 27.706883] ? strncpy_from_user+0x1a7/0x1e0 [ 27.707383] __asan_report_store1_noabort+0x1b/0x30 [ 27.707923] strncpy_from_user+0x1a7/0x1e0 [ 27.708640] copy_user_test_oob+0x761/0x10f0 [ 27.709087] ? __pfx_copy_user_test_oob+0x10/0x10 [ 27.709462] ? finish_task_switch.isra.0+0x153/0x700 [ 27.709810] ? __switch_to+0x5d9/0xf60 [ 27.710137] ? __schedule+0xc3e/0x2790 [ 27.711079] ? __pfx_read_tsc+0x10/0x10 [ 27.711570] ? ktime_get_ts64+0x84/0x230 [ 27.712047] kunit_try_run_case+0x1b3/0x490 [ 27.712542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.713305] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.713936] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.714453] ? __kthread_parkme+0x82/0x160 [ 27.715366] ? preempt_count_sub+0x50/0x80 [ 27.716052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.716528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.717223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.717825] kthread+0x257/0x310 [ 27.718171] ? __pfx_kthread+0x10/0x10 [ 27.719382] ret_from_fork+0x41/0x80 [ 27.720124] ? __pfx_kthread+0x10/0x10 [ 27.720503] ret_from_fork_asm+0x1a/0x30 [ 27.720842] </TASK> [ 27.721133] [ 27.721347] Allocated by task 292: [ 27.721733] kasan_save_stack+0x3d/0x60 [ 27.722128] kasan_save_track+0x18/0x40 [ 27.722517] kasan_save_alloc_info+0x3b/0x50 [ 27.722833] __kasan_kmalloc+0xb7/0xc0 [ 27.723107] __kmalloc_noprof+0x1c4/0x500 [ 27.724626] kunit_kmalloc_array+0x25/0x60 [ 27.725085] copy_user_test_oob+0xac/0x10f0 [ 27.725701] kunit_try_run_case+0x1b3/0x490 [ 27.725970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.726836] kthread+0x257/0x310 [ 27.727175] ret_from_fork+0x41/0x80 [ 27.727645] ret_from_fork_asm+0x1a/0x30 [ 27.728034] [ 27.728271] The buggy address belongs to the object at ffff8881028cc000 [ 27.728271] which belongs to the cache kmalloc-128 of size 128 [ 27.729210] The buggy address is located 0 bytes to the right of [ 27.729210] allocated 120-byte region [ffff8881028cc000, ffff8881028cc078) [ 27.730345] [ 27.730538] The buggy address belongs to the physical page: [ 27.731233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028cc [ 27.731952] flags: 0x200000000000000(node=0|zone=2) [ 27.732394] page_type: f5(slab) [ 27.733003] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 27.733689] raw: 0000000000000000 0000000080100010 00000001f5000000 0000000000000000 [ 27.734332] page dumped because: kasan: bad access detected [ 27.734930] [ 27.735099] Memory state around the buggy address: [ 27.735423] ffff8881028cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.736263] ffff8881028cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.737219] >ffff8881028cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 27.737871] ^ [ 27.738428] ffff8881028cc080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.739341] ffff8881028cc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.740308] ==================================================================