Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   31.274878] ==================================================================
[   31.275618] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   31.276585] Write of size 1 at addr fff00000c6414878 by task kunit_try_catch/274
[   31.277399] 
[   31.277800] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   31.278066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.278154] Hardware name: linux,dummy-virt (DT)
[   31.278259] Call trace:
[   31.278351]  show_stack+0x20/0x38 (C)
[   31.278510]  dump_stack_lvl+0x8c/0xd0
[   31.278578]  print_report+0x118/0x608
[   31.278663]  kasan_report+0xdc/0x128
[   31.278829]  __asan_report_store1_noabort+0x20/0x30
[   31.279015]  strncpy_from_user+0x270/0x2a0
[   31.279182]  copy_user_test_oob+0x5c0/0xec0
[   31.279353]  kunit_try_run_case+0x170/0x3f0
[   31.279432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.279500]  kthread+0x318/0x620
[   31.279557]  ret_from_fork+0x10/0x20
[   31.279624] 
[   31.286121] Allocated by task 274:
[   31.286602]  kasan_save_stack+0x3c/0x68
[   31.287262]  kasan_save_track+0x20/0x40
[   31.287940]  kasan_save_alloc_info+0x40/0x58
[   31.288424]  __kasan_kmalloc+0xd4/0xd8
[   31.289048]  __kmalloc_noprof+0x198/0x4c8
[   31.289687]  kunit_kmalloc_array+0x34/0x88
[   31.290217]  copy_user_test_oob+0xac/0xec0
[   31.290798]  kunit_try_run_case+0x170/0x3f0
[   31.291503]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.292170]  kthread+0x318/0x620
[   31.292785]  ret_from_fork+0x10/0x20
[   31.293334] 
[   31.293725] The buggy address belongs to the object at fff00000c6414800
[   31.293725]  which belongs to the cache kmalloc-128 of size 128
[   31.294976] The buggy address is located 0 bytes to the right of
[   31.294976]  allocated 120-byte region [fff00000c6414800, fff00000c6414878)
[   31.296244] 
[   31.296618] The buggy address belongs to the physical page:
[   31.297270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414
[   31.298185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.298932] page_type: f5(slab)
[   31.299445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.300317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.301125] page dumped because: kasan: bad access detected
[   31.301740] 
[   31.302080] Memory state around the buggy address:
[   31.302674]  fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.303522]  fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.304333] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.305105]                                                                 ^
[   31.305853]  fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.306695]  fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.307458] ==================================================================
[   31.239659] ==================================================================
[   31.240454] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   31.240789] Write of size 121 at addr fff00000c6414800 by task kunit_try_catch/274
[   31.241450] 
[   31.241675] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   31.241780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.241817] Hardware name: linux,dummy-virt (DT)
[   31.241856] Call trace:
[   31.242210]  show_stack+0x20/0x38 (C)
[   31.242503]  dump_stack_lvl+0x8c/0xd0
[   31.242715]  print_report+0x118/0x608
[   31.242979]  kasan_report+0xdc/0x128
[   31.243124]  kasan_check_range+0x100/0x1a8
[   31.243261]  __kasan_check_write+0x20/0x30
[   31.243403]  strncpy_from_user+0x3c/0x2a0
[   31.243480]  copy_user_test_oob+0x5c0/0xec0
[   31.243542]  kunit_try_run_case+0x170/0x3f0
[   31.243600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.243665]  kthread+0x318/0x620
[   31.243723]  ret_from_fork+0x10/0x20
[   31.243784] 
[   31.250951] Allocated by task 274:
[   31.251419]  kasan_save_stack+0x3c/0x68
[   31.252013]  kasan_save_track+0x20/0x40
[   31.252585]  kasan_save_alloc_info+0x40/0x58
[   31.253258]  __kasan_kmalloc+0xd4/0xd8
[   31.253865]  __kmalloc_noprof+0x198/0x4c8
[   31.254506]  kunit_kmalloc_array+0x34/0x88
[   31.255098]  copy_user_test_oob+0xac/0xec0
[   31.255759]  kunit_try_run_case+0x170/0x3f0
[   31.256376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   31.257121]  kthread+0x318/0x620
[   31.257694]  ret_from_fork+0x10/0x20
[   31.258284] 
[   31.258635] The buggy address belongs to the object at fff00000c6414800
[   31.258635]  which belongs to the cache kmalloc-128 of size 128
[   31.259942] The buggy address is located 0 bytes inside of
[   31.259942]  allocated 120-byte region [fff00000c6414800, fff00000c6414878)
[   31.261115] 
[   31.261423] The buggy address belongs to the physical page:
[   31.262138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106414
[   31.263078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   31.263871] page_type: f5(slab)
[   31.264431] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   31.265287] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.266078] page dumped because: kasan: bad access detected
[   31.266714] 
[   31.267090] Memory state around the buggy address:
[   31.267680]  fff00000c6414700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.268520]  fff00000c6414780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.269391] >fff00000c6414800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   31.270256]                                                                 ^
[   31.271039]  fff00000c6414880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.271802]  fff00000c6414900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.272691] ==================================================================

[   23.912051] ==================================================================
[   23.912510] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   23.912914] Write of size 121 at addr ffff888102c74500 by task kunit_try_catch/293
[   23.913273] 
[   23.913445] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.913576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.913611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.913661] Call Trace:
[   23.913708]  <TASK>
[   23.913752]  dump_stack_lvl+0x73/0xb0
[   23.913827]  print_report+0xd1/0x650
[   23.913901]  ? __virt_addr_valid+0x1db/0x2d0
[   23.913962]  ? strncpy_from_user+0x2e/0x1d0
[   23.914021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.914094]  ? strncpy_from_user+0x2e/0x1d0
[   23.914153]  kasan_report+0x140/0x180
[   23.914217]  ? strncpy_from_user+0x2e/0x1d0
[   23.914288]  kasan_check_range+0x10c/0x1c0
[   23.914353]  __kasan_check_write+0x18/0x20
[   23.914417]  strncpy_from_user+0x2e/0x1d0
[   23.914474]  ? __kasan_check_read+0x15/0x20
[   23.914543]  copy_user_test_oob+0x761/0x10f0
[   23.914615]  ? __pfx_copy_user_test_oob+0x10/0x10
[   23.914677]  ? finish_task_switch.isra.0+0x153/0x700
[   23.914742]  ? __switch_to+0x5d9/0xf60
[   23.914813]  ? __schedule+0xce8/0x2840
[   23.914889]  ? __pfx_read_tsc+0x10/0x10
[   23.914950]  ? ktime_get_ts64+0x86/0x230
[   23.915016]  kunit_try_run_case+0x1a6/0x480
[   23.915085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.915146]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.915210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.915277]  ? __kthread_parkme+0x82/0x160
[   23.915340]  ? preempt_count_sub+0x50/0x80
[   23.915410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.915475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.915547]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.915620]  kthread+0x324/0x6e0
[   23.915690]  ? trace_preempt_on+0x20/0xc0
[   23.915759]  ? __pfx_kthread+0x10/0x10
[   23.915823]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.915903]  ? calculate_sigpending+0x7b/0xa0
[   23.915960]  ? __pfx_kthread+0x10/0x10
[   23.916024]  ret_from_fork+0x41/0x80
[   23.916079]  ? __pfx_kthread+0x10/0x10
[   23.916140]  ret_from_fork_asm+0x1a/0x30
[   23.916227]  </TASK>
[   23.916261] 
[   23.932522] Allocated by task 293:
[   23.932833]  kasan_save_stack+0x45/0x70
[   23.933315]  kasan_save_track+0x18/0x40
[   23.933874]  kasan_save_alloc_info+0x3b/0x50
[   23.934326]  __kasan_kmalloc+0xb7/0xc0
[   23.934721]  __kmalloc_noprof+0x1ca/0x500
[   23.935142]  kunit_kmalloc_array+0x25/0x60
[   23.935606]  copy_user_test_oob+0xac/0x10f0
[   23.935940]  kunit_try_run_case+0x1a6/0x480
[   23.936245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.936618]  kthread+0x324/0x6e0
[   23.936888]  ret_from_fork+0x41/0x80
[   23.937204]  ret_from_fork_asm+0x1a/0x30
[   23.937725] 
[   23.937890] The buggy address belongs to the object at ffff888102c74500
[   23.937890]  which belongs to the cache kmalloc-128 of size 128
[   23.938548] The buggy address is located 0 bytes inside of
[   23.938548]  allocated 120-byte region [ffff888102c74500, ffff888102c74578)
[   23.939275] 
[   23.939436] The buggy address belongs to the physical page:
[   23.939718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c74
[   23.940374] flags: 0x200000000000000(node=0|zone=2)
[   23.940988] page_type: f5(slab)
[   23.941348] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.942005] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.942883] page dumped because: kasan: bad access detected
[   23.943381] 
[   23.943576] Memory state around the buggy address:
[   23.943874]  ffff888102c74400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.944222]  ffff888102c74480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.944861] >ffff888102c74500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.945621]                                                                 ^
[   23.946051]  ffff888102c74580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.946449]  ffff888102c74600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.947146] ==================================================================
[   23.948883] ==================================================================
[   23.949609] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0
[   23.950598] Write of size 1 at addr ffff888102c74578 by task kunit_try_catch/293
[   23.951262] 
[   23.952446] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.14.11-rc1 #1
[   23.952575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.952612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.952669] Call Trace:
[   23.952727]  <TASK>
[   23.952779]  dump_stack_lvl+0x73/0xb0
[   23.952905]  print_report+0xd1/0x650
[   23.952973]  ? __virt_addr_valid+0x1db/0x2d0
[   23.953038]  ? strncpy_from_user+0x1a5/0x1d0
[   23.953098]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.953171]  ? strncpy_from_user+0x1a5/0x1d0
[   23.953229]  kasan_report+0x140/0x180
[   23.953305]  ? strncpy_from_user+0x1a5/0x1d0
[   23.953378]  __asan_report_store1_noabort+0x1b/0x30
[   23.953447]  strncpy_from_user+0x1a5/0x1d0
[   23.953513]  copy_user_test_oob+0x761/0x10f0
[   23.953584]  ? __pfx_copy_user_test_oob+0x10/0x10
[   23.953647]  ? finish_task_switch.isra.0+0x153/0x700
[   23.953712]  ? __switch_to+0x5d9/0xf60
[   23.953782]  ? __schedule+0xce8/0x2840
[   23.954217]  ? __pfx_read_tsc+0x10/0x10
[   23.954364]  ? ktime_get_ts64+0x86/0x230
[   23.954454]  kunit_try_run_case+0x1a6/0x480
[   23.954527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.954608]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.954689]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.954753]  ? __kthread_parkme+0x82/0x160
[   23.954835]  ? preempt_count_sub+0x50/0x80
[   23.954916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.954969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.955028]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.955091]  kthread+0x324/0x6e0
[   23.955151]  ? trace_preempt_on+0x20/0xc0
[   23.955218]  ? __pfx_kthread+0x10/0x10
[   23.955279]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.955389]  ? calculate_sigpending+0x7b/0xa0
[   23.955452]  ? __pfx_kthread+0x10/0x10
[   23.955517]  ret_from_fork+0x41/0x80
[   23.955573]  ? __pfx_kthread+0x10/0x10
[   23.955635]  ret_from_fork_asm+0x1a/0x30
[   23.955734]  </TASK>
[   23.955771] 
[   23.970214] Allocated by task 293:
[   23.970671]  kasan_save_stack+0x45/0x70
[   23.971119]  kasan_save_track+0x18/0x40
[   23.971366]  kasan_save_alloc_info+0x3b/0x50
[   23.971611]  __kasan_kmalloc+0xb7/0xc0
[   23.972587]  __kmalloc_noprof+0x1ca/0x500
[   23.973574]  kunit_kmalloc_array+0x25/0x60
[   23.974000]  copy_user_test_oob+0xac/0x10f0
[   23.974363]  kunit_try_run_case+0x1a6/0x480
[   23.974910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.975249]  kthread+0x324/0x6e0
[   23.975622]  ret_from_fork+0x41/0x80
[   23.975914]  ret_from_fork_asm+0x1a/0x30
[   23.976356] 
[   23.976561] The buggy address belongs to the object at ffff888102c74500
[   23.976561]  which belongs to the cache kmalloc-128 of size 128
[   23.977459] The buggy address is located 0 bytes to the right of
[   23.977459]  allocated 120-byte region [ffff888102c74500, ffff888102c74578)
[   23.978624] 
[   23.978719] The buggy address belongs to the physical page:
[   23.978882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c74
[   23.979737] flags: 0x200000000000000(node=0|zone=2)
[   23.980701] page_type: f5(slab)
[   23.980936] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.981601] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.982194] page dumped because: kasan: bad access detected
[   23.982517] 
[   23.982663] Memory state around the buggy address:
[   23.982829]  ffff888102c74400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.983815]  ffff888102c74480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.984276] >ffff888102c74500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   23.984696]                                                                 ^
[   23.985112]  ffff888102c74580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.986093]  ffff888102c74600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.986943] ==================================================================