Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   67.028442] ==================================================================
[   67.039916] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x314/0x34c
[   67.047546] Read of size 1 at addr f2693c8a by task kunit_try_catch/309
[   67.054199] 
[   67.055694] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   67.055725] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   67.055755] Hardware name: Generic DRA74X (Flattened Device Tree)
[   67.055755] Call trace: 
[   67.055755]  unwind_backtrace from show_stack+0x18/0x1c
[   67.055786]  show_stack from dump_stack_lvl+0x70/0x90
[   67.055816]  dump_stack_lvl from print_report+0x158/0x528
[   67.055847]  print_report from kasan_report+0xdc/0x118
[   67.055877]  kasan_report from kasan_alloca_oob_right+0x314/0x34c
[   67.055877]  kasan_alloca_oob_right from kunit_try_run_case+0x22c/0x5a8
[   67.055908]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   67.055938]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   67.055969]  kthread from ret_from_fork+0x14/0x20
[   67.055999] Exception stack(0xf2693fb0 to 0xf2693ff8)
[   67.055999] 3fa0:                                     00000000 00000000 00000000 00000000
[   67.056030] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   67.056030] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   67.056060] 
[   67.161804] The buggy address belongs to stack of task kunit_try_catch/309
[   67.168731] 
[   67.170227] The buggy address belongs to the virtual mapping at
[   67.170227]  [f2690000, f2695000) created by:
[   67.170227]  kernel_clone+0x174/0x794
[   67.184234] 
[   67.185729] The buggy address belongs to the physical page:
[   67.191345] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0d7a
[   67.198638] flags: 0x80000000(zone=2)
[   67.202331] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   67.210479] raw: 00000000
[   67.213104] page dumped because: kasan: bad access detected
[   67.218719] 
[   67.220214] Memory state around the buggy address:
[   67.225036]  f2693b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.231628]  f2693c00: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca
[   67.238189] >f2693c80: 00 02 cb cb cb cb cb cb 00 00 00 00 00 00 00 00
[   67.244750]               ^
[   67.247589]  f2693d00: f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2 00 f3 f3 f3
[   67.254150]  f2693d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   67.260711] ==================================================================

[   41.082091] ==================================================================
[   41.093499] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390
[   41.101075] Read of size 1 at addr ffff88810527fc4a by task kunit_try_catch/296
[   41.108390] 
[   41.109888] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   41.109896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   41.109898] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   41.109902] Call Trace:
[   41.109904]  <TASK>
[   41.109905]  dump_stack_lvl+0x73/0xb0
[   41.109909]  print_report+0xd1/0x650
[   41.109914]  ? __virt_addr_valid+0x1db/0x2d0
[   41.109918]  ? kasan_alloca_oob_right+0x329/0x390
[   41.109922]  ? kasan_addr_to_slab+0x11/0xa0
[   41.109926]  ? kasan_alloca_oob_right+0x329/0x390
[   41.109931]  kasan_report+0x141/0x180
[   41.109935]  ? kasan_alloca_oob_right+0x329/0x390
[   41.109940]  __asan_report_load1_noabort+0x18/0x20
[   41.109944]  kasan_alloca_oob_right+0x329/0x390
[   41.109949]  ? finish_task_switch.isra.0+0x153/0x700
[   41.109953]  ? rwsem_down_read_slowpath+0x64e/0xb90
[   41.109957]  ? trace_hardirqs_on+0x37/0xe0
[   41.109962]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   41.109967]  ? __schedule+0x10cc/0x2b30
[   41.109972]  ? ktime_get_ts64+0x83/0x230
[   41.109976]  kunit_try_run_case+0x1a2/0x480
[   41.109981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.109985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   41.109990]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   41.109994]  ? __kthread_parkme+0x82/0x180
[   41.109999]  ? preempt_count_sub+0x50/0x80
[   41.110003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   41.110008]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   41.110012]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   41.110016]  kthread+0x334/0x6f0
[   41.110020]  ? trace_preempt_on+0x20/0xc0
[   41.110025]  ? __pfx_kthread+0x10/0x10
[   41.110029]  ? _raw_spin_unlock_irq+0x47/0x80
[   41.110033]  ? calculate_sigpending+0x7b/0xa0
[   41.110037]  ? __pfx_kthread+0x10/0x10
[   41.110041]  ret_from_fork+0x3e/0x80
[   41.110046]  ? __pfx_kthread+0x10/0x10
[   41.110050]  ret_from_fork_asm+0x1a/0x30
[   41.110056]  </TASK>
[   41.110057] 
[   41.287781] The buggy address belongs to stack of task kunit_try_catch/296
[   41.294654] 
[   41.296150] The buggy address belongs to the physical page:
[   41.301736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10527f
[   41.309743] flags: 0x200000000000000(node=0|zone=2)
[   41.314630] raw: 0200000000000000 dead000000000100 dead000000000122 0000000000000000
[   41.322376] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   41.330114] page dumped because: kasan: bad access detected
[   41.335704] 
[   41.337222] Memory state around the buggy address:
[   41.342013]  ffff88810527fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.349232]  ffff88810527fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   41.356452] >ffff88810527fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   41.363686]                                               ^
[   41.369288]  ffff88810527fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   41.376515]  ffff88810527fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   41.383741] ==================================================================