Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 31.274878] ================================================================== [ 31.275618] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 31.276585] Write of size 1 at addr fff00000c6414878 by task kunit_try_catch/274 [ 31.277399] [ 31.277800] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 31.278066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.278154] Hardware name: linux,dummy-virt (DT) [ 31.278259] Call trace: [ 31.278351] show_stack+0x20/0x38 (C) [ 31.278510] dump_stack_lvl+0x8c/0xd0 [ 31.278578] print_report+0x118/0x608 [ 31.278663] kasan_report+0xdc/0x128 [ 31.278829] __asan_report_store1_noabort+0x20/0x30 [ 31.279015] strncpy_from_user+0x270/0x2a0 [ 31.279182] copy_user_test_oob+0x5c0/0xec0 [ 31.279353] kunit_try_run_case+0x170/0x3f0 [ 31.279432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.279500] kthread+0x318/0x620 [ 31.279557] ret_from_fork+0x10/0x20 [ 31.279624] [ 31.286121] Allocated by task 274: [ 31.286602] kasan_save_stack+0x3c/0x68 [ 31.287262] kasan_save_track+0x20/0x40 [ 31.287940] kasan_save_alloc_info+0x40/0x58 [ 31.288424] __kasan_kmalloc+0xd4/0xd8 [ 31.289048] __kmalloc_noprof+0x198/0x4c8 [ 31.289687] kunit_kmalloc_array+0x34/0x88 [ 31.290217] copy_user_test_oob+0xac/0xec0 [ 31.290798] kunit_try_run_case+0x170/0x3f0 [ 31.291503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.292170] kthread+0x318/0x620 [ 31.292785] ret_from_fork+0x10/0x20 [ 31.293334] [ 31.293725] The buggy address belongs to the object at fff00000c6414800 [ 31.293725] which belongs to the cache kmalloc-128 of size 128 [ 31.294976] The buggy address is located 0 bytes to the right of [ 31.294976] allocated 120-byte region [fff00000c6414800, fff00000c6414878) [ 31.296244] [ 31.296618] The buggy address belongs to the physical page: [ 31.297270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 31.298185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.298932] page_type: f5(slab) [ 31.299445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.300317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.301125] page dumped because: kasan: bad access detected [ 31.301740] [ 31.302080] Memory state around the buggy address: [ 31.302674] fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.303522] fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.304333] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.305105] ^ [ 31.305853] fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.306695] fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.307458] ================================================================== [ 31.239659] ================================================================== [ 31.240454] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 31.240789] Write of size 121 at addr fff00000c6414800 by task kunit_try_catch/274 [ 31.241450] [ 31.241675] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 31.241780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.241817] Hardware name: linux,dummy-virt (DT) [ 31.241856] Call trace: [ 31.242210] show_stack+0x20/0x38 (C) [ 31.242503] dump_stack_lvl+0x8c/0xd0 [ 31.242715] print_report+0x118/0x608 [ 31.242979] kasan_report+0xdc/0x128 [ 31.243124] kasan_check_range+0x100/0x1a8 [ 31.243261] __kasan_check_write+0x20/0x30 [ 31.243403] strncpy_from_user+0x3c/0x2a0 [ 31.243480] copy_user_test_oob+0x5c0/0xec0 [ 31.243542] kunit_try_run_case+0x170/0x3f0 [ 31.243600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.243665] kthread+0x318/0x620 [ 31.243723] ret_from_fork+0x10/0x20 [ 31.243784] [ 31.250951] Allocated by task 274: [ 31.251419] kasan_save_stack+0x3c/0x68 [ 31.252013] kasan_save_track+0x20/0x40 [ 31.252585] kasan_save_alloc_info+0x40/0x58 [ 31.253258] __kasan_kmalloc+0xd4/0xd8 [ 31.253865] __kmalloc_noprof+0x198/0x4c8 [ 31.254506] kunit_kmalloc_array+0x34/0x88 [ 31.255098] copy_user_test_oob+0xac/0xec0 [ 31.255759] kunit_try_run_case+0x170/0x3f0 [ 31.256376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.257121] kthread+0x318/0x620 [ 31.257694] ret_from_fork+0x10/0x20 [ 31.258284] [ 31.258635] The buggy address belongs to the object at fff00000c6414800 [ 31.258635] which belongs to the cache kmalloc-128 of size 128 [ 31.259942] The buggy address is located 0 bytes inside of [ 31.259942] allocated 120-byte region [fff00000c6414800, fff00000c6414878) [ 31.261115] [ 31.261423] The buggy address belongs to the physical page: [ 31.262138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414 [ 31.263078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.263871] page_type: f5(slab) [ 31.264431] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.265287] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.266078] page dumped because: kasan: bad access detected [ 31.266714] [ 31.267090] Memory state around the buggy address: [ 31.267680] fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.268520] fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.269391] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.270256] ^ [ 31.271039] fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.271802] fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.272691] ==================================================================
[ 23.912051] ================================================================== [ 23.912510] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 23.912914] Write of size 121 at addr ffff888102c74500 by task kunit_try_catch/293 [ 23.913273] [ 23.913445] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.913576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.913611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.913661] Call Trace: [ 23.913708] <TASK> [ 23.913752] dump_stack_lvl+0x73/0xb0 [ 23.913827] print_report+0xd1/0x650 [ 23.913901] ? __virt_addr_valid+0x1db/0x2d0 [ 23.913962] ? strncpy_from_user+0x2e/0x1d0 [ 23.914021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.914094] ? strncpy_from_user+0x2e/0x1d0 [ 23.914153] kasan_report+0x140/0x180 [ 23.914217] ? strncpy_from_user+0x2e/0x1d0 [ 23.914288] kasan_check_range+0x10c/0x1c0 [ 23.914353] __kasan_check_write+0x18/0x20 [ 23.914417] strncpy_from_user+0x2e/0x1d0 [ 23.914474] ? __kasan_check_read+0x15/0x20 [ 23.914543] copy_user_test_oob+0x761/0x10f0 [ 23.914615] ? __pfx_copy_user_test_oob+0x10/0x10 [ 23.914677] ? finish_task_switch.isra.0+0x153/0x700 [ 23.914742] ? __switch_to+0x5d9/0xf60 [ 23.914813] ? __schedule+0xce8/0x2840 [ 23.914889] ? __pfx_read_tsc+0x10/0x10 [ 23.914950] ? ktime_get_ts64+0x86/0x230 [ 23.915016] kunit_try_run_case+0x1a6/0x480 [ 23.915085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.915146] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.915210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.915277] ? __kthread_parkme+0x82/0x160 [ 23.915340] ? preempt_count_sub+0x50/0x80 [ 23.915410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.915475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.915547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.915620] kthread+0x324/0x6e0 [ 23.915690] ? trace_preempt_on+0x20/0xc0 [ 23.915759] ? __pfx_kthread+0x10/0x10 [ 23.915823] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.915903] ? calculate_sigpending+0x7b/0xa0 [ 23.915960] ? __pfx_kthread+0x10/0x10 [ 23.916024] ret_from_fork+0x41/0x80 [ 23.916079] ? __pfx_kthread+0x10/0x10 [ 23.916140] ret_from_fork_asm+0x1a/0x30 [ 23.916227] </TASK> [ 23.916261] [ 23.932522] Allocated by task 293: [ 23.932833] kasan_save_stack+0x45/0x70 [ 23.933315] kasan_save_track+0x18/0x40 [ 23.933874] kasan_save_alloc_info+0x3b/0x50 [ 23.934326] __kasan_kmalloc+0xb7/0xc0 [ 23.934721] __kmalloc_noprof+0x1ca/0x500 [ 23.935142] kunit_kmalloc_array+0x25/0x60 [ 23.935606] copy_user_test_oob+0xac/0x10f0 [ 23.935940] kunit_try_run_case+0x1a6/0x480 [ 23.936245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.936618] kthread+0x324/0x6e0 [ 23.936888] ret_from_fork+0x41/0x80 [ 23.937204] ret_from_fork_asm+0x1a/0x30 [ 23.937725] [ 23.937890] The buggy address belongs to the object at ffff888102c74500 [ 23.937890] which belongs to the cache kmalloc-128 of size 128 [ 23.938548] The buggy address is located 0 bytes inside of [ 23.938548] allocated 120-byte region [ffff888102c74500, ffff888102c74578) [ 23.939275] [ 23.939436] The buggy address belongs to the physical page: [ 23.939718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c74 [ 23.940374] flags: 0x200000000000000(node=0|zone=2) [ 23.940988] page_type: f5(slab) [ 23.941348] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.942005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.942883] page dumped because: kasan: bad access detected [ 23.943381] [ 23.943576] Memory state around the buggy address: [ 23.943874] ffff888102c74400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.944222] ffff888102c74480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.944861] >ffff888102c74500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.945621] ^ [ 23.946051] ffff888102c74580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.946449] ffff888102c74600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.947146] ================================================================== [ 23.948883] ================================================================== [ 23.949609] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 23.950598] Write of size 1 at addr ffff888102c74578 by task kunit_try_catch/293 [ 23.951262] [ 23.952446] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 23.952575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.952612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.952669] Call Trace: [ 23.952727] <TASK> [ 23.952779] dump_stack_lvl+0x73/0xb0 [ 23.952905] print_report+0xd1/0x650 [ 23.952973] ? __virt_addr_valid+0x1db/0x2d0 [ 23.953038] ? strncpy_from_user+0x1a5/0x1d0 [ 23.953098] ? kasan_complete_mode_report_info+0x2a/0x200 [ 23.953171] ? strncpy_from_user+0x1a5/0x1d0 [ 23.953229] kasan_report+0x140/0x180 [ 23.953305] ? strncpy_from_user+0x1a5/0x1d0 [ 23.953378] __asan_report_store1_noabort+0x1b/0x30 [ 23.953447] strncpy_from_user+0x1a5/0x1d0 [ 23.953513] copy_user_test_oob+0x761/0x10f0 [ 23.953584] ? __pfx_copy_user_test_oob+0x10/0x10 [ 23.953647] ? finish_task_switch.isra.0+0x153/0x700 [ 23.953712] ? __switch_to+0x5d9/0xf60 [ 23.953782] ? __schedule+0xce8/0x2840 [ 23.954217] ? __pfx_read_tsc+0x10/0x10 [ 23.954364] ? ktime_get_ts64+0x86/0x230 [ 23.954454] kunit_try_run_case+0x1a6/0x480 [ 23.954527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.954608] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.954689] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.954753] ? __kthread_parkme+0x82/0x160 [ 23.954835] ? preempt_count_sub+0x50/0x80 [ 23.954916] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.954969] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.955028] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.955091] kthread+0x324/0x6e0 [ 23.955151] ? trace_preempt_on+0x20/0xc0 [ 23.955218] ? __pfx_kthread+0x10/0x10 [ 23.955279] ? _raw_spin_unlock_irq+0x47/0x80 [ 23.955389] ? calculate_sigpending+0x7b/0xa0 [ 23.955452] ? __pfx_kthread+0x10/0x10 [ 23.955517] ret_from_fork+0x41/0x80 [ 23.955573] ? __pfx_kthread+0x10/0x10 [ 23.955635] ret_from_fork_asm+0x1a/0x30 [ 23.955734] </TASK> [ 23.955771] [ 23.970214] Allocated by task 293: [ 23.970671] kasan_save_stack+0x45/0x70 [ 23.971119] kasan_save_track+0x18/0x40 [ 23.971366] kasan_save_alloc_info+0x3b/0x50 [ 23.971611] __kasan_kmalloc+0xb7/0xc0 [ 23.972587] __kmalloc_noprof+0x1ca/0x500 [ 23.973574] kunit_kmalloc_array+0x25/0x60 [ 23.974000] copy_user_test_oob+0xac/0x10f0 [ 23.974363] kunit_try_run_case+0x1a6/0x480 [ 23.974910] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.975249] kthread+0x324/0x6e0 [ 23.975622] ret_from_fork+0x41/0x80 [ 23.975914] ret_from_fork_asm+0x1a/0x30 [ 23.976356] [ 23.976561] The buggy address belongs to the object at ffff888102c74500 [ 23.976561] which belongs to the cache kmalloc-128 of size 128 [ 23.977459] The buggy address is located 0 bytes to the right of [ 23.977459] allocated 120-byte region [ffff888102c74500, ffff888102c74578) [ 23.978624] [ 23.978719] The buggy address belongs to the physical page: [ 23.978882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c74 [ 23.979737] flags: 0x200000000000000(node=0|zone=2) [ 23.980701] page_type: f5(slab) [ 23.980936] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 23.981601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.982194] page dumped because: kasan: bad access detected [ 23.982517] [ 23.982663] Memory state around the buggy address: [ 23.982829] ffff888102c74400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.983815] ffff888102c74480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.984276] >ffff888102c74500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 23.984696] ^ [ 23.985112] ffff888102c74580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.986093] ffff888102c74600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.986943] ==================================================================