Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 66.785125] ================================================================== [ 66.796081] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x304/0x33c [ 66.803619] Read of size 1 at addr f268bc7f by task kunit_try_catch/307 [ 66.810302] [ 66.811798] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 66.811828] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.811828] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.811859] Call trace: [ 66.811859] unwind_backtrace from show_stack+0x18/0x1c [ 66.811889] show_stack from dump_stack_lvl+0x70/0x90 [ 66.811920] dump_stack_lvl from print_report+0x158/0x528 [ 66.811950] print_report from kasan_report+0xdc/0x118 [ 66.811950] kasan_report from kasan_alloca_oob_left+0x304/0x33c [ 66.811981] kasan_alloca_oob_left from kunit_try_run_case+0x22c/0x5a8 [ 66.812011] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.812042] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.812072] kthread from ret_from_fork+0x14/0x20 [ 66.812103] Exception stack(0xf268bfb0 to 0xf268bff8) [ 66.812103] bfa0: 00000000 00000000 00000000 00000000 [ 66.812133] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.812133] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.812164] [ 66.917755] The buggy address belongs to stack of task kunit_try_catch/307 [ 66.924652] [ 66.926177] The buggy address belongs to the virtual mapping at [ 66.926177] [f2688000, f268d000) created by: [ 66.926177] kernel_clone+0x174/0x794 [ 66.940185] [ 66.941680] The buggy address belongs to the physical page: [ 66.947296] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d76 [ 66.954559] flags: 0x80000000(zone=2) [ 66.958251] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 66.966400] raw: 00000000 [ 66.969055] page dumped because: kasan: bad access detected [ 66.974670] [ 66.976165] Memory state around the buggy address: [ 66.980987] f268bb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.987548] f268bb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.994140] >f268bc00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca [ 67.000701] ^ [ 67.007202] f268bc80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00 [ 67.013763] f268bd00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3 [ 67.020324] ==================================================================
[ 40.774577] ================================================================== [ 40.785458] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 40.792944] Read of size 1 at addr ffff888107f5fc3f by task kunit_try_catch/294 [ 40.800251] [ 40.801751] CPU: 2 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 40.801760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.801762] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.801765] Call Trace: [ 40.801767] <TASK> [ 40.801769] dump_stack_lvl+0x73/0xb0 [ 40.801773] print_report+0xd1/0x650 [ 40.801777] ? __virt_addr_valid+0x1db/0x2d0 [ 40.801781] ? kasan_alloca_oob_left+0x320/0x380 [ 40.801785] ? kasan_addr_to_slab+0x11/0xa0 [ 40.801789] ? kasan_alloca_oob_left+0x320/0x380 [ 40.801794] kasan_report+0x141/0x180 [ 40.801798] ? kasan_alloca_oob_left+0x320/0x380 [ 40.801803] __asan_report_load1_noabort+0x18/0x20 [ 40.801807] kasan_alloca_oob_left+0x320/0x380 [ 40.801811] ? finish_task_switch.isra.0+0x153/0x700 [ 40.801816] ? rwsem_down_read_slowpath+0x64e/0xb90 [ 40.801820] ? trace_hardirqs_on+0x37/0xe0 [ 40.801824] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 40.801829] ? __schedule+0x10cc/0x2b30 [ 40.801834] ? ktime_get_ts64+0x83/0x230 [ 40.801838] kunit_try_run_case+0x1a2/0x480 [ 40.801843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.801847] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.801851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.801856] ? __kthread_parkme+0x82/0x180 [ 40.801860] ? preempt_count_sub+0x50/0x80 [ 40.801864] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.801869] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.801873] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.801877] kthread+0x334/0x6f0 [ 40.801881] ? trace_preempt_on+0x20/0xc0 [ 40.801885] ? __pfx_kthread+0x10/0x10 [ 40.801889] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.801894] ? calculate_sigpending+0x7b/0xa0 [ 40.801897] ? __pfx_kthread+0x10/0x10 [ 40.801902] ret_from_fork+0x3e/0x80 [ 40.801906] ? __pfx_kthread+0x10/0x10 [ 40.801910] ret_from_fork_asm+0x1a/0x30 [ 40.801916] </TASK> [ 40.801917] [ 40.979105] The buggy address belongs to stack of task kunit_try_catch/294 [ 40.985980] [ 40.987476] The buggy address belongs to the physical page: [ 40.993049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107f5f [ 41.001055] flags: 0x200000000000000(node=0|zone=2) [ 41.005938] raw: 0200000000000000 ffffea00041fd7c8 ffffea00041fd7c8 0000000000000000 [ 41.013718] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 41.021465] page dumped because: kasan: bad access detected [ 41.027040] [ 41.028536] Memory state around the buggy address: [ 41.033330] ffff888107f5fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.040549] ffff888107f5fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.047769] >ffff888107f5fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 41.054996] ^ [ 41.060048] ffff888107f5fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 41.067269] ffff888107f5fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 41.074496] ==================================================================