Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 39.394852] ================================================================== [ 39.404080] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 39.411544] Read of size 1 at addr ffff800089527b5f by task kunit_try_catch/298 [ 39.418836] [ 39.420321] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 39.420378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.420397] Hardware name: WinLink E850-96 board (DT) [ 39.420421] Call trace: [ 39.420438] show_stack+0x20/0x38 (C) [ 39.420477] dump_stack_lvl+0x8c/0xd0 [ 39.420514] print_report+0x310/0x608 [ 39.420551] kasan_report+0xdc/0x128 [ 39.420587] __asan_report_load1_noabort+0x20/0x30 [ 39.420628] kasan_alloca_oob_left+0x2b8/0x310 [ 39.420659] kunit_try_run_case+0x170/0x3f0 [ 39.420697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.420733] kthread+0x328/0x630 [ 39.420764] ret_from_fork+0x10/0x20 [ 39.420798] [ 39.483420] The buggy address belongs to stack of task kunit_try_catch/298 [ 39.490296] [ 39.491757] The buggy address belongs to the virtual mapping at [ 39.491757] [ffff800089520000, ffff800089529000) created by: [ 39.491757] kernel_clone+0x150/0x7a8 [ 39.507027] [ 39.508507] The buggy address belongs to the physical page: [ 39.514063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886482 [ 39.522046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.528567] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.536287] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.544007] page dumped because: kasan: bad access detected [ 39.549561] [ 39.551037] Memory state around the buggy address: [ 39.555817] ffff800089527a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.563020] ffff800089527a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.570226] >ffff800089527b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 39.577425] ^ [ 39.583505] ffff800089527b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.590710] ffff800089527c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.597913] ==================================================================
[ 28.830842] ================================================================== [ 28.831056] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 28.831963] Read of size 1 at addr ffff800080867b5f by task kunit_try_catch/251 [ 28.833182] [ 28.833742] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.835390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.835477] Hardware name: linux,dummy-virt (DT) [ 28.835567] Call trace: [ 28.836409] show_stack+0x20/0x38 (C) [ 28.836690] dump_stack_lvl+0x8c/0xd0 [ 28.836838] print_report+0x310/0x608 [ 28.837455] kasan_report+0xdc/0x128 [ 28.839597] __asan_report_load1_noabort+0x20/0x30 [ 28.839758] kasan_alloca_oob_left+0x2b8/0x310 [ 28.839884] kunit_try_run_case+0x170/0x3f0 [ 28.840041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.840173] kthread+0x328/0x630 [ 28.840284] ret_from_fork+0x10/0x20 [ 28.840406] [ 28.840459] The buggy address belongs to stack of task kunit_try_catch/251 [ 28.840617] [ 28.840682] The buggy address belongs to the virtual mapping at [ 28.840682] [ffff800080860000, ffff800080869000) created by: [ 28.840682] kernel_clone+0x150/0x7a8 [ 28.840885] [ 28.840983] The buggy address belongs to the physical page: [ 28.841086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab9 [ 28.841302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.841902] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.842059] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.842173] page dumped because: kasan: bad access detected [ 28.842260] [ 28.842307] Memory state around the buggy address: [ 28.842389] ffff800080867a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.842504] ffff800080867a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.845013] >ffff800080867b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 28.845625] ^ [ 28.845739] ffff800080867b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.845875] ffff800080867c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.846033] ==================================================================
[ 28.938951] ================================================================== [ 28.939278] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 28.939455] Read of size 1 at addr ffff800080a97b5f by task kunit_try_catch/251 [ 28.939753] [ 28.939868] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.940331] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.940406] Hardware name: linux,dummy-virt (DT) [ 28.940486] Call trace: [ 28.940552] show_stack+0x20/0x38 (C) [ 28.940736] dump_stack_lvl+0x8c/0xd0 [ 28.940965] print_report+0x310/0x608 [ 28.941164] kasan_report+0xdc/0x128 [ 28.941352] __asan_report_load1_noabort+0x20/0x30 [ 28.941508] kasan_alloca_oob_left+0x2b8/0x310 [ 28.941714] kunit_try_run_case+0x170/0x3f0 [ 28.941878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.942025] kthread+0x328/0x630 [ 28.942152] ret_from_fork+0x10/0x20 [ 28.942347] [ 28.942438] The buggy address belongs to stack of task kunit_try_catch/251 [ 28.942643] [ 28.942717] The buggy address belongs to the virtual mapping at [ 28.942717] [ffff800080a90000, ffff800080a99000) created by: [ 28.942717] kernel_clone+0x150/0x7a8 [ 28.943086] [ 28.943275] The buggy address belongs to the physical page: [ 28.943506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776f [ 28.943652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.943825] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.943976] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.944084] page dumped because: kasan: bad access detected [ 28.944177] [ 28.944323] Memory state around the buggy address: [ 28.944587] ffff800080a97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.944733] ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.944870] >ffff800080a97b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 28.944985] ^ [ 28.945146] ffff800080a97b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.945300] ffff800080a97c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.945446] ==================================================================
[ 21.932366] ================================================================== [ 21.933253] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 21.934063] Read of size 1 at addr ffff888103b17c3f by task kunit_try_catch/269 [ 21.935086] [ 21.935403] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.935556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.935595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.935765] Call Trace: [ 21.935809] <TASK> [ 21.935864] dump_stack_lvl+0x73/0xb0 [ 21.935958] print_report+0xd1/0x650 [ 21.936040] ? __virt_addr_valid+0x1db/0x2d0 [ 21.936123] ? kasan_alloca_oob_left+0x320/0x380 [ 21.936195] ? kasan_addr_to_slab+0x11/0xa0 [ 21.936271] ? kasan_alloca_oob_left+0x320/0x380 [ 21.936347] kasan_report+0x141/0x180 [ 21.936430] ? kasan_alloca_oob_left+0x320/0x380 [ 21.936535] __asan_report_load1_noabort+0x18/0x20 [ 21.936643] kasan_alloca_oob_left+0x320/0x380 [ 21.936714] ? __kasan_check_write+0x18/0x20 [ 21.936786] ? __pfx_sched_clock_cpu+0x10/0x10 [ 21.936862] ? finish_task_switch.isra.0+0x153/0x700 [ 21.936936] ? __mutex_lock.constprop.0+0x93e/0x1280 [ 21.937024] ? trace_hardirqs_on+0x37/0xe0 [ 21.937111] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 21.937195] ? __schedule+0x10cc/0x2b60 [ 21.937365] ? __pfx_read_tsc+0x10/0x10 [ 21.937426] ? ktime_get_ts64+0x86/0x230 [ 21.937464] kunit_try_run_case+0x1a5/0x480 [ 21.937530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.937666] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.937741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.937810] ? __kthread_parkme+0x82/0x180 [ 21.937870] ? preempt_count_sub+0x50/0x80 [ 21.937938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.938008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.938075] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.938146] kthread+0x337/0x6f0 [ 21.938180] ? trace_preempt_on+0x20/0xc0 [ 21.938215] ? __pfx_kthread+0x10/0x10 [ 21.938296] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.938332] ? calculate_sigpending+0x7b/0xa0 [ 21.938370] ? __pfx_kthread+0x10/0x10 [ 21.938400] ret_from_fork+0x116/0x1d0 [ 21.938427] ? __pfx_kthread+0x10/0x10 [ 21.938455] ret_from_fork_asm+0x1a/0x30 [ 21.938523] </TASK> [ 21.938555] [ 21.962430] The buggy address belongs to stack of task kunit_try_catch/269 [ 21.963189] [ 21.963906] The buggy address belongs to the physical page: [ 21.964415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b17 [ 21.965083] flags: 0x200000000000000(node=0|zone=2) [ 21.966076] raw: 0200000000000000 ffffea00040ec5c8 ffffea00040ec5c8 0000000000000000 [ 21.967052] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.968075] page dumped because: kasan: bad access detected [ 21.969198] [ 21.969563] Memory state around the buggy address: [ 21.970439] ffff888103b17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.971313] ffff888103b17b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.972220] >ffff888103b17c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 21.972991] ^ [ 21.974245] ffff888103b17c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 21.974931] ffff888103b17d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 21.975196] ==================================================================
[ 20.712277] ================================================================== [ 20.713606] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 20.715064] Read of size 1 at addr ffff8881038c7c3f by task kunit_try_catch/269 [ 20.716008] [ 20.716319] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.716418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.716460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.716521] Call Trace: [ 20.716558] <TASK> [ 20.716812] dump_stack_lvl+0x73/0xb0 [ 20.716871] print_report+0xd1/0x650 [ 20.716939] ? __virt_addr_valid+0x1db/0x2d0 [ 20.716974] ? kasan_alloca_oob_left+0x320/0x380 [ 20.717006] ? kasan_addr_to_slab+0x11/0xa0 [ 20.717037] ? kasan_alloca_oob_left+0x320/0x380 [ 20.717068] kasan_report+0x141/0x180 [ 20.717106] ? kasan_alloca_oob_left+0x320/0x380 [ 20.717277] __asan_report_load1_noabort+0x18/0x20 [ 20.717317] kasan_alloca_oob_left+0x320/0x380 [ 20.717352] ? __pfx_sched_clock_cpu+0x10/0x10 [ 20.717386] ? finish_task_switch.isra.0+0x153/0x700 [ 20.717418] ? __mutex_lock.constprop.0+0x93e/0x1280 [ 20.717456] ? trace_hardirqs_on+0x37/0xe0 [ 20.717490] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 20.717564] ? __schedule+0x10cc/0x2b60 [ 20.717646] ? __pfx_read_tsc+0x10/0x10 [ 20.717681] ? ktime_get_ts64+0x86/0x230 [ 20.717716] kunit_try_run_case+0x1a5/0x480 [ 20.717754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.717789] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.717826] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.717860] ? __kthread_parkme+0x82/0x180 [ 20.717916] ? preempt_count_sub+0x50/0x80 [ 20.717950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.717987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.718022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.718058] kthread+0x337/0x6f0 [ 20.718086] ? trace_preempt_on+0x20/0xc0 [ 20.718155] ? __pfx_kthread+0x10/0x10 [ 20.718188] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.718220] ? calculate_sigpending+0x7b/0xa0 [ 20.718265] ? __pfx_kthread+0x10/0x10 [ 20.718296] ret_from_fork+0x116/0x1d0 [ 20.718323] ? __pfx_kthread+0x10/0x10 [ 20.718352] ret_from_fork_asm+0x1a/0x30 [ 20.718394] </TASK> [ 20.718409] [ 20.743971] The buggy address belongs to stack of task kunit_try_catch/269 [ 20.744849] [ 20.745264] The buggy address belongs to the physical page: [ 20.746190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038c7 [ 20.747039] flags: 0x200000000000000(node=0|zone=2) [ 20.747717] raw: 0200000000000000 ffffea00040e31c8 ffffea00040e31c8 0000000000000000 [ 20.748785] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 20.749821] page dumped because: kasan: bad access detected [ 20.750380] [ 20.750916] Memory state around the buggy address: [ 20.751391] ffff8881038c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.752578] ffff8881038c7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.753305] >ffff8881038c7c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 20.754371] ^ [ 20.754967] ffff8881038c7c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 20.756066] ffff8881038c7d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 20.756967] ==================================================================
[ 22.470069] ================================================================== [ 22.471109] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 22.471817] Read of size 1 at addr ffff800089717b5f by task kunit_try_catch/304 [ 22.472496] [ 22.472660] CPU: 3 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.472713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.472728] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.472747] Call trace: [ 22.472759] show_stack+0x20/0x38 (C) [ 22.472795] dump_stack_lvl+0x8c/0xd0 [ 22.472832] print_report+0x310/0x608 [ 22.472867] kasan_report+0xdc/0x128 [ 22.472899] __asan_report_load1_noabort+0x20/0x30 [ 22.472938] kasan_alloca_oob_left+0x2b8/0x310 [ 22.472970] kunit_try_run_case+0x170/0x3f0 [ 22.473006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.473045] kthread+0x328/0x630 [ 22.473072] ret_from_fork+0x10/0x20 [ 22.473104] [ 22.478709] The buggy address belongs to stack of task kunit_try_catch/304 [ 22.479360] [ 22.479520] The buggy address belongs to the virtual mapping at [ 22.479520] [ffff800089710000, ffff800089719000) created by: [ 22.479520] kernel_clone+0x150/0x7a8 [ 22.480913] [ 22.481069] The buggy address belongs to the physical page: [ 22.481585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe36a [ 22.482310] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.482934] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.483650] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.484358] page dumped because: kasan: bad access detected [ 22.484873] [ 22.485026] Memory state around the buggy address: [ 22.485475] ffff800089717a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.486142] ffff800089717a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.486809] >ffff800089717b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 22.487470] ^ [ 22.488036] ffff800089717b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 22.488703] ffff800089717c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 22.489366] ==================================================================