Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   66.785125] ==================================================================
[   66.796081] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x304/0x33c
[   66.803619] Read of size 1 at addr f268bc7f by task kunit_try_catch/307
[   66.810302] 
[   66.811798] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   66.811828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   66.811828] Hardware name: Generic DRA74X (Flattened Device Tree)
[   66.811859] Call trace: 
[   66.811859]  unwind_backtrace from show_stack+0x18/0x1c
[   66.811889]  show_stack from dump_stack_lvl+0x70/0x90
[   66.811920]  dump_stack_lvl from print_report+0x158/0x528
[   66.811950]  print_report from kasan_report+0xdc/0x118
[   66.811950]  kasan_report from kasan_alloca_oob_left+0x304/0x33c
[   66.811981]  kasan_alloca_oob_left from kunit_try_run_case+0x22c/0x5a8
[   66.812011]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   66.812042]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   66.812072]  kthread from ret_from_fork+0x14/0x20
[   66.812103] Exception stack(0xf268bfb0 to 0xf268bff8)
[   66.812103] bfa0:                                     00000000 00000000 00000000 00000000
[   66.812133] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   66.812133] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   66.812164] 
[   66.917755] The buggy address belongs to stack of task kunit_try_catch/307
[   66.924652] 
[   66.926177] The buggy address belongs to the virtual mapping at
[   66.926177]  [f2688000, f268d000) created by:
[   66.926177]  kernel_clone+0x174/0x794
[   66.940185] 
[   66.941680] The buggy address belongs to the physical page:
[   66.947296] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d76
[   66.954559] flags: 0x80000000(zone=2)
[   66.958251] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   66.966400] raw: 00000000
[   66.969055] page dumped because: kasan: bad access detected
[   66.974670] 
[   66.976165] Memory state around the buggy address:
[   66.980987]  f268bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.987548]  f268bb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.994140] >f268bc00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca
[   67.000701]                                                         ^
[   67.007202]  f268bc80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00
[   67.013763]  f268bd00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3
[   67.020324] ==================================================================

[   40.774577] ==================================================================
[   40.785458] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380
[   40.792944] Read of size 1 at addr ffff888107f5fc3f by task kunit_try_catch/294
[   40.800251] 
[   40.801751] CPU: 2 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   40.801760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.801762] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   40.801765] Call Trace:
[   40.801767]  <TASK>
[   40.801769]  dump_stack_lvl+0x73/0xb0
[   40.801773]  print_report+0xd1/0x650
[   40.801777]  ? __virt_addr_valid+0x1db/0x2d0
[   40.801781]  ? kasan_alloca_oob_left+0x320/0x380
[   40.801785]  ? kasan_addr_to_slab+0x11/0xa0
[   40.801789]  ? kasan_alloca_oob_left+0x320/0x380
[   40.801794]  kasan_report+0x141/0x180
[   40.801798]  ? kasan_alloca_oob_left+0x320/0x380
[   40.801803]  __asan_report_load1_noabort+0x18/0x20
[   40.801807]  kasan_alloca_oob_left+0x320/0x380
[   40.801811]  ? finish_task_switch.isra.0+0x153/0x700
[   40.801816]  ? rwsem_down_read_slowpath+0x64e/0xb90
[   40.801820]  ? trace_hardirqs_on+0x37/0xe0
[   40.801824]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   40.801829]  ? __schedule+0x10cc/0x2b30
[   40.801834]  ? ktime_get_ts64+0x83/0x230
[   40.801838]  kunit_try_run_case+0x1a2/0x480
[   40.801843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.801847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   40.801851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   40.801856]  ? __kthread_parkme+0x82/0x180
[   40.801860]  ? preempt_count_sub+0x50/0x80
[   40.801864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.801869]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   40.801873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   40.801877]  kthread+0x334/0x6f0
[   40.801881]  ? trace_preempt_on+0x20/0xc0
[   40.801885]  ? __pfx_kthread+0x10/0x10
[   40.801889]  ? _raw_spin_unlock_irq+0x47/0x80
[   40.801894]  ? calculate_sigpending+0x7b/0xa0
[   40.801897]  ? __pfx_kthread+0x10/0x10
[   40.801902]  ret_from_fork+0x3e/0x80
[   40.801906]  ? __pfx_kthread+0x10/0x10
[   40.801910]  ret_from_fork_asm+0x1a/0x30
[   40.801916]  </TASK>
[   40.801917] 
[   40.979105] The buggy address belongs to stack of task kunit_try_catch/294
[   40.985980] 
[   40.987476] The buggy address belongs to the physical page:
[   40.993049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f5f
[   41.001055] flags: 0x200000000000000(node=0|zone=2)
[   41.005938] raw: 0200000000000000 ffffea00041fd7c8 ffffea00041fd7c8 0000000000000000
[   41.013718] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   41.021465] page dumped because: kasan: bad access detected
[   41.027040] 
[   41.028536] Memory state around the buggy address:
[   41.033330]  ffff888107f5fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.040549]  ffff888107f5fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.047769] >ffff888107f5fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   41.054996]                                         ^
[   41.060048]  ffff888107f5fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   41.067269]  ffff888107f5fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   41.074496] ==================================================================