Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 39.606911] ================================================================== [ 39.616490] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 39.624040] Read of size 1 at addr ffff800089547b4a by task kunit_try_catch/300 [ 39.631331] [ 39.632817] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 39.632884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.632900] Hardware name: WinLink E850-96 board (DT) [ 39.632923] Call trace: [ 39.632939] show_stack+0x20/0x38 (C) [ 39.632978] dump_stack_lvl+0x8c/0xd0 [ 39.633016] print_report+0x310/0x608 [ 39.633052] kasan_report+0xdc/0x128 [ 39.633089] __asan_report_load1_noabort+0x20/0x30 [ 39.633130] kasan_alloca_oob_right+0x2dc/0x340 [ 39.633163] kunit_try_run_case+0x170/0x3f0 [ 39.633204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.633245] kthread+0x328/0x630 [ 39.633275] ret_from_fork+0x10/0x20 [ 39.633312] [ 39.696003] The buggy address belongs to stack of task kunit_try_catch/300 [ 39.702878] [ 39.704338] The buggy address belongs to the virtual mapping at [ 39.704338] [ffff800089540000, ffff800089549000) created by: [ 39.704338] kernel_clone+0x150/0x7a8 [ 39.719611] [ 39.721089] The buggy address belongs to the physical page: [ 39.726647] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886496 [ 39.734630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.741151] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 39.748872] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.756591] page dumped because: kasan: bad access detected [ 39.762145] [ 39.763620] Memory state around the buggy address: [ 39.768404] ffff800089547a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.775604] ffff800089547a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.782808] >ffff800089547b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 39.790009] ^ [ 39.795569] ffff800089547b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 39.802773] ffff800089547c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 39.809977] ==================================================================
[ 28.866797] ================================================================== [ 28.866961] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 28.867112] Read of size 1 at addr ffff800080a07b4a by task kunit_try_catch/253 [ 28.867469] [ 28.867579] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.867880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.867976] Hardware name: linux,dummy-virt (DT) [ 28.868066] Call trace: [ 28.868409] show_stack+0x20/0x38 (C) [ 28.868705] dump_stack_lvl+0x8c/0xd0 [ 28.868954] print_report+0x310/0x608 [ 28.869180] kasan_report+0xdc/0x128 [ 28.869312] __asan_report_load1_noabort+0x20/0x30 [ 28.869452] kasan_alloca_oob_right+0x2dc/0x340 [ 28.869595] kunit_try_run_case+0x170/0x3f0 [ 28.869752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.869981] kthread+0x328/0x630 [ 28.870489] ret_from_fork+0x10/0x20 [ 28.870768] [ 28.870830] The buggy address belongs to stack of task kunit_try_catch/253 [ 28.871138] [ 28.871211] The buggy address belongs to the virtual mapping at [ 28.871211] [ffff800080a00000, ffff800080a09000) created by: [ 28.871211] kernel_clone+0x150/0x7a8 [ 28.871486] [ 28.871775] The buggy address belongs to the physical page: [ 28.871886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f6 [ 28.872048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.872216] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.872376] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.872527] page dumped because: kasan: bad access detected [ 28.872651] [ 28.872981] Memory state around the buggy address: [ 28.873275] ffff800080a07a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.873448] ffff800080a07a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.873566] >ffff800080a07b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 28.873680] ^ [ 28.874052] ffff800080a07b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.874180] ffff800080a07c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.874282] ==================================================================
[ 28.956464] ================================================================== [ 28.956587] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 28.956729] Read of size 1 at addr ffff800080a97b4a by task kunit_try_catch/253 [ 28.957124] [ 28.957261] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.957587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.957701] Hardware name: linux,dummy-virt (DT) [ 28.957796] Call trace: [ 28.957969] show_stack+0x20/0x38 (C) [ 28.958233] dump_stack_lvl+0x8c/0xd0 [ 28.958425] print_report+0x310/0x608 [ 28.958785] kasan_report+0xdc/0x128 [ 28.958937] __asan_report_load1_noabort+0x20/0x30 [ 28.959116] kasan_alloca_oob_right+0x2dc/0x340 [ 28.959461] kunit_try_run_case+0x170/0x3f0 [ 28.959808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.959977] kthread+0x328/0x630 [ 28.960208] ret_from_fork+0x10/0x20 [ 28.960378] [ 28.960529] The buggy address belongs to stack of task kunit_try_catch/253 [ 28.960680] [ 28.960778] The buggy address belongs to the virtual mapping at [ 28.960778] [ffff800080a90000, ffff800080a99000) created by: [ 28.960778] kernel_clone+0x150/0x7a8 [ 28.961104] [ 28.961142] The buggy address belongs to the physical page: [ 28.961186] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776f [ 28.961402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.961584] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.961718] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.962325] page dumped because: kasan: bad access detected [ 28.962516] [ 28.962579] Memory state around the buggy address: [ 28.962681] ffff800080a97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.962792] ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.962938] >ffff800080a97b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 28.963039] ^ [ 28.963160] ffff800080a97b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.963271] ffff800080a97c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.963370] ==================================================================
[ 21.982410] ================================================================== [ 21.983369] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390 [ 21.984344] Read of size 1 at addr ffff888103b0fc4a by task kunit_try_catch/271 [ 21.985829] [ 21.986280] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.986402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.986439] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.986595] Call Trace: [ 21.986666] <TASK> [ 21.986716] dump_stack_lvl+0x73/0xb0 [ 21.986811] print_report+0xd1/0x650 [ 21.986884] ? __virt_addr_valid+0x1db/0x2d0 [ 21.986962] ? kasan_alloca_oob_right+0x329/0x390 [ 21.987037] ? kasan_addr_to_slab+0x11/0xa0 [ 21.987111] ? kasan_alloca_oob_right+0x329/0x390 [ 21.987200] kasan_report+0x141/0x180 [ 21.987405] ? kasan_alloca_oob_right+0x329/0x390 [ 21.987515] __asan_report_load1_noabort+0x18/0x20 [ 21.987692] kasan_alloca_oob_right+0x329/0x390 [ 21.987729] ? __kasan_check_write+0x18/0x20 [ 21.987762] ? __pfx_sched_clock_cpu+0x10/0x10 [ 21.987796] ? finish_task_switch.isra.0+0x153/0x700 [ 21.987829] ? __mutex_lock.constprop.0+0x93e/0x1280 [ 21.987867] ? trace_hardirqs_on+0x37/0xe0 [ 21.987902] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [ 21.987938] ? __schedule+0x10cc/0x2b60 [ 21.987969] ? __pfx_read_tsc+0x10/0x10 [ 21.987998] ? ktime_get_ts64+0x86/0x230 [ 21.988031] kunit_try_run_case+0x1a5/0x480 [ 21.988068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.988102] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.988135] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.988169] ? __kthread_parkme+0x82/0x180 [ 21.988197] ? preempt_count_sub+0x50/0x80 [ 21.988236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.988312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.988350] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.988386] kthread+0x337/0x6f0 [ 21.988413] ? trace_preempt_on+0x20/0xc0 [ 21.988446] ? __pfx_kthread+0x10/0x10 [ 21.988475] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.988531] ? calculate_sigpending+0x7b/0xa0 [ 21.988616] ? __pfx_kthread+0x10/0x10 [ 21.988650] ret_from_fork+0x116/0x1d0 [ 21.988677] ? __pfx_kthread+0x10/0x10 [ 21.988708] ret_from_fork_asm+0x1a/0x30 [ 21.988751] </TASK> [ 21.988768] [ 22.013161] The buggy address belongs to stack of task kunit_try_catch/271 [ 22.014383] [ 22.015103] The buggy address belongs to the physical page: [ 22.015905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b0f [ 22.016569] flags: 0x200000000000000(node=0|zone=2) [ 22.017008] raw: 0200000000000000 ffffea00040ec3c8 ffffea00040ec3c8 0000000000000000 [ 22.017840] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 22.018489] page dumped because: kasan: bad access detected [ 22.019519] [ 22.019702] Memory state around the buggy address: [ 22.020191] ffff888103b0fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.021096] ffff888103b0fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.022065] >ffff888103b0fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 22.022607] ^ [ 22.023240] ffff888103b0fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 22.023904] ffff888103b0fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 22.024437] ==================================================================
[ 20.762983] ================================================================== [ 20.764348] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390 [ 20.764987] Read of size 1 at addr ffff888103977c4a by task kunit_try_catch/271 [ 20.765515] [ 20.766310] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.766407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.766448] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.766507] Call Trace: [ 20.766686] <TASK> [ 20.766716] dump_stack_lvl+0x73/0xb0 [ 20.766799] print_report+0xd1/0x650 [ 20.766836] ? __virt_addr_valid+0x1db/0x2d0 [ 20.766870] ? kasan_alloca_oob_right+0x329/0x390 [ 20.766926] ? kasan_addr_to_slab+0x11/0xa0 [ 20.766960] ? kasan_alloca_oob_right+0x329/0x390 [ 20.766995] kasan_report+0x141/0x180 [ 20.767026] ? kasan_alloca_oob_right+0x329/0x390 [ 20.767066] __asan_report_load1_noabort+0x18/0x20 [ 20.767112] kasan_alloca_oob_right+0x329/0x390 [ 20.767169] ? irqentry_exit+0x2a/0x60 [ 20.767206] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 20.767242] ? trace_hardirqs_on+0x37/0xe0 [ 20.767278] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [ 20.767316] ? __pfx_kasan_alloca_oob_right+0x10/0x10 [ 20.767354] kunit_try_run_case+0x1a5/0x480 [ 20.767391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.767424] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.767459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.767493] ? __kthread_parkme+0x82/0x180 [ 20.767521] ? preempt_count_sub+0x50/0x80 [ 20.767552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.767588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.767622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.767658] kthread+0x337/0x6f0 [ 20.767685] ? trace_preempt_on+0x20/0xc0 [ 20.767716] ? __pfx_kthread+0x10/0x10 [ 20.767745] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.767776] ? calculate_sigpending+0x7b/0xa0 [ 20.767812] ? __pfx_kthread+0x10/0x10 [ 20.767844] ret_from_fork+0x116/0x1d0 [ 20.767870] ? __pfx_kthread+0x10/0x10 [ 20.767924] ret_from_fork_asm+0x1a/0x30 [ 20.767967] </TASK> [ 20.767983] [ 20.787722] The buggy address belongs to stack of task kunit_try_catch/271 [ 20.788777] [ 20.788958] The buggy address belongs to the physical page: [ 20.789659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103977 [ 20.790485] flags: 0x200000000000000(node=0|zone=2) [ 20.790839] raw: 0200000000000000 ffffea00040e5dc8 ffffea00040e5dc8 0000000000000000 [ 20.792046] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 20.792806] page dumped because: kasan: bad access detected [ 20.793507] [ 20.793701] Memory state around the buggy address: [ 20.794221] ffff888103977b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.794978] ffff888103977b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.795992] >ffff888103977c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 20.796689] ^ [ 20.797612] ffff888103977c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 20.798126] ffff888103977d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 20.798982] ==================================================================
[ 22.492650] ================================================================== [ 22.493737] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 22.494454] Read of size 1 at addr ffff800089737b4a by task kunit_try_catch/306 [ 22.495131] [ 22.495296] CPU: 3 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.495347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.495362] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.495380] Call trace: [ 22.495392] show_stack+0x20/0x38 (C) [ 22.495427] dump_stack_lvl+0x8c/0xd0 [ 22.495463] print_report+0x310/0x608 [ 22.495497] kasan_report+0xdc/0x128 [ 22.495529] __asan_report_load1_noabort+0x20/0x30 [ 22.495568] kasan_alloca_oob_right+0x2dc/0x340 [ 22.495600] kunit_try_run_case+0x170/0x3f0 [ 22.495636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.495676] kthread+0x328/0x630 [ 22.495703] ret_from_fork+0x10/0x20 [ 22.495736] [ 22.501350] The buggy address belongs to stack of task kunit_try_catch/306 [ 22.502006] [ 22.502166] The buggy address belongs to the virtual mapping at [ 22.502166] [ffff800089730000, ffff800089739000) created by: [ 22.502166] kernel_clone+0x150/0x7a8 [ 22.503562] [ 22.503717] The buggy address belongs to the physical page: [ 22.504234] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe37e [ 22.504960] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 22.505585] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.506302] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.507013] page dumped because: kasan: bad access detected [ 22.507529] [ 22.507682] Memory state around the buggy address: [ 22.508132] ffff800089737a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.508798] ffff800089737a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.509465] >ffff800089737b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 22.510126] ^ [ 22.510646] ffff800089737b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 22.511312] ffff800089737c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 22.511975] ==================================================================