Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 19.261928] ================================================================== [ 19.262025] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 19.262774] Read of size 1 at addr ffff800080997b5f by task kunit_try_catch/252 [ 19.262877] [ 19.263005] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.263104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.263134] Hardware name: linux,dummy-virt (DT) [ 19.263168] Call trace: [ 19.263194] show_stack+0x20/0x38 (C) [ 19.263248] dump_stack_lvl+0x8c/0xd0 [ 19.263301] print_report+0x310/0x608 [ 19.263348] kasan_report+0xdc/0x128 [ 19.263639] __asan_report_load1_noabort+0x20/0x30 [ 19.263746] kasan_alloca_oob_left+0x2b8/0x310 [ 19.263816] kunit_try_run_case+0x170/0x3f0 [ 19.263899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.264091] kthread+0x328/0x630 [ 19.264221] ret_from_fork+0x10/0x20 [ 19.264274] [ 19.264296] The buggy address belongs to stack of task kunit_try_catch/252 [ 19.265276] [ 19.265314] The buggy address belongs to the virtual mapping at [ 19.265314] [ffff800080990000, ffff800080999000) created by: [ 19.265314] kernel_clone+0x150/0x7a8 [ 19.265402] [ 19.265427] The buggy address belongs to the physical page: [ 19.265460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077af [ 19.265517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.265581] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.265640] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.265682] page dumped because: kasan: bad access detected [ 19.265716] [ 19.265735] Memory state around the buggy address: [ 19.265771] ffff800080997a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.265817] ffff800080997a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.265862] >ffff800080997b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 19.265902] ^ [ 19.265941] ffff800080997b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 19.267499] ffff800080997c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 19.267564] ==================================================================
[ 18.896015] ================================================================== [ 18.896125] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 18.896338] Read of size 1 at addr ffff800080a67b5f by task kunit_try_catch/252 [ 18.896543] [ 18.896749] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.896968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.897034] Hardware name: linux,dummy-virt (DT) [ 18.897074] Call trace: [ 18.897122] show_stack+0x20/0x38 (C) [ 18.897234] dump_stack_lvl+0x8c/0xd0 [ 18.897312] print_report+0x310/0x608 [ 18.897367] kasan_report+0xdc/0x128 [ 18.897447] __asan_report_load1_noabort+0x20/0x30 [ 18.897501] kasan_alloca_oob_left+0x2b8/0x310 [ 18.897586] kunit_try_run_case+0x170/0x3f0 [ 18.897641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.897694] kthread+0x328/0x630 [ 18.897887] ret_from_fork+0x10/0x20 [ 18.897969] [ 18.897993] The buggy address belongs to stack of task kunit_try_catch/252 [ 18.898227] [ 18.898264] The buggy address belongs to the virtual mapping at [ 18.898264] [ffff800080a60000, ffff800080a69000) created by: [ 18.898264] kernel_clone+0x150/0x7a8 [ 18.898690] [ 18.898782] The buggy address belongs to the physical page: [ 18.898943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e [ 18.899017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.899206] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.899266] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.899310] page dumped because: kasan: bad access detected [ 18.899698] [ 18.900009] Memory state around the buggy address: [ 18.900101] ffff800080a67a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.900153] ffff800080a67a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.900532] >ffff800080a67b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 18.900637] ^ [ 18.900977] ffff800080a67b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 18.901201] ffff800080a67c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 18.901289] ==================================================================
[ 15.380012] ================================================================== [ 15.380732] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 15.381265] Read of size 1 at addr ffff8881039afc3f by task kunit_try_catch/269 [ 15.382379] [ 15.382664] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.383003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.383037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.383063] Call Trace: [ 15.383078] <TASK> [ 15.383095] dump_stack_lvl+0x73/0xb0 [ 15.383149] print_report+0xd1/0x650 [ 15.383170] ? __virt_addr_valid+0x1db/0x2d0 [ 15.383190] ? kasan_alloca_oob_left+0x320/0x380 [ 15.383210] ? kasan_addr_to_slab+0x11/0xa0 [ 15.383228] ? kasan_alloca_oob_left+0x320/0x380 [ 15.383246] kasan_report+0x141/0x180 [ 15.383265] ? kasan_alloca_oob_left+0x320/0x380 [ 15.383290] __asan_report_load1_noabort+0x18/0x20 [ 15.383311] kasan_alloca_oob_left+0x320/0x380 [ 15.383331] ? __pfx_sched_clock_cpu+0x10/0x10 [ 15.383351] ? finish_task_switch.isra.0+0x153/0x700 [ 15.383370] ? __ww_mutex_lock.constprop.0+0x1dbe/0x1e90 [ 15.383393] ? trace_hardirqs_on+0x37/0xe0 [ 15.383416] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 15.383438] ? __schedule+0x10cc/0x2b60 [ 15.383457] ? __pfx_read_tsc+0x10/0x10 [ 15.383474] ? ktime_get_ts64+0x86/0x230 [ 15.383496] kunit_try_run_case+0x1a5/0x480 [ 15.383560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.383595] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.383643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.383666] ? __kthread_parkme+0x82/0x180 [ 15.383685] ? preempt_count_sub+0x50/0x80 [ 15.383705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.383725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.383747] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.383767] kthread+0x337/0x6f0 [ 15.383784] ? trace_preempt_on+0x20/0xc0 [ 15.383804] ? __pfx_kthread+0x10/0x10 [ 15.383822] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.383841] ? calculate_sigpending+0x7b/0xa0 [ 15.383862] ? __pfx_kthread+0x10/0x10 [ 15.383881] ret_from_fork+0x116/0x1d0 [ 15.383898] ? __pfx_kthread+0x10/0x10 [ 15.383915] ret_from_fork_asm+0x1a/0x30 [ 15.383943] </TASK> [ 15.383954] [ 15.396611] The buggy address belongs to stack of task kunit_try_catch/269 [ 15.397098] [ 15.397212] The buggy address belongs to the physical page: [ 15.397400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039af [ 15.398330] flags: 0x200000000000000(node=0|zone=2) [ 15.398759] raw: 0200000000000000 ffffea00040e6bc8 ffffea00040e6bc8 0000000000000000 [ 15.399566] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 15.400014] page dumped because: kasan: bad access detected [ 15.400769] [ 15.400958] Memory state around the buggy address: [ 15.401191] ffff8881039afb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.402034] ffff8881039afb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.402450] >ffff8881039afc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 15.403023] ^ [ 15.403689] ffff8881039afc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 15.403904] ffff8881039afd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 15.404540] ==================================================================
[ 15.420710] ================================================================== [ 15.421421] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 15.422084] Read of size 1 at addr ffff8881039c7c3f by task kunit_try_catch/268 [ 15.422436] [ 15.422543] CPU: 1 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.422590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.422603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.422624] Call Trace: [ 15.422638] <TASK> [ 15.422653] dump_stack_lvl+0x73/0xb0 [ 15.422684] print_report+0xd1/0x650 [ 15.422707] ? __virt_addr_valid+0x1db/0x2d0 [ 15.422745] ? kasan_alloca_oob_left+0x320/0x380 [ 15.422770] ? kasan_addr_to_slab+0x11/0xa0 [ 15.422790] ? kasan_alloca_oob_left+0x320/0x380 [ 15.422814] kasan_report+0x141/0x180 [ 15.422837] ? kasan_alloca_oob_left+0x320/0x380 [ 15.422866] __asan_report_load1_noabort+0x18/0x20 [ 15.422890] kasan_alloca_oob_left+0x320/0x380 [ 15.422915] ? finish_task_switch.isra.0+0x153/0x700 [ 15.422939] ? __ww_mutex_lock.constprop.0+0x1dbe/0x1e90 [ 15.422965] ? trace_hardirqs_on+0x37/0xe0 [ 15.422992] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 15.423020] ? __schedule+0x10cc/0x2b60 [ 15.423045] ? __pfx_read_tsc+0x10/0x10 [ 15.423077] ? ktime_get_ts64+0x86/0x230 [ 15.423102] kunit_try_run_case+0x1a5/0x480 [ 15.423128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.423151] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.423174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.423198] ? __kthread_parkme+0x82/0x180 [ 15.423218] ? preempt_count_sub+0x50/0x80 [ 15.423242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.423266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.423289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.423314] kthread+0x337/0x6f0 [ 15.423333] ? trace_preempt_on+0x20/0xc0 [ 15.423357] ? __pfx_kthread+0x10/0x10 [ 15.423391] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.423413] ? calculate_sigpending+0x7b/0xa0 [ 15.423438] ? __pfx_kthread+0x10/0x10 [ 15.423460] ret_from_fork+0x116/0x1d0 [ 15.423479] ? __pfx_kthread+0x10/0x10 [ 15.423501] ret_from_fork_asm+0x1a/0x30 [ 15.423534] </TASK> [ 15.423545] [ 15.433392] The buggy address belongs to stack of task kunit_try_catch/268 [ 15.433955] [ 15.434099] The buggy address belongs to the physical page: [ 15.434343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039c7 [ 15.434670] flags: 0x200000000000000(node=0|zone=2) [ 15.435482] raw: 0200000000000000 ffffea00040e71c8 ffffea00040e71c8 0000000000000000 [ 15.436233] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 15.436683] page dumped because: kasan: bad access detected [ 15.437111] [ 15.437213] Memory state around the buggy address: [ 15.437435] ffff8881039c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.438094] ffff8881039c7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.438547] >ffff8881039c7c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 15.439385] ^ [ 15.439698] ffff8881039c7c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 15.440379] ffff8881039c7d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 15.441044] ==================================================================
[ 41.023303] ================================================================== [ 41.034195] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380 [ 41.041674] Read of size 1 at addr ffff888108327c3f by task kunit_try_catch/292 [ 41.048979] [ 41.050474] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 41.050482] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 41.050485] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 41.050488] Call Trace: [ 41.050490] <TASK> [ 41.050492] dump_stack_lvl+0x73/0xb0 [ 41.050496] print_report+0xd1/0x650 [ 41.050500] ? __virt_addr_valid+0x1db/0x2d0 [ 41.050504] ? kasan_alloca_oob_left+0x320/0x380 [ 41.050508] ? kasan_addr_to_slab+0x11/0xa0 [ 41.050512] ? kasan_alloca_oob_left+0x320/0x380 [ 41.050516] kasan_report+0x141/0x180 [ 41.050520] ? kasan_alloca_oob_left+0x320/0x380 [ 41.050525] __asan_report_load1_noabort+0x18/0x20 [ 41.050530] kasan_alloca_oob_left+0x320/0x380 [ 41.050533] ? __kasan_check_write+0x18/0x20 [ 41.050537] ? __pfx_sched_clock_cpu+0x10/0x10 [ 41.050541] ? finish_task_switch.isra.0+0x153/0x700 [ 41.050545] ? __ww_mutex_lock.constprop.0+0x1dbe/0x1e90 [ 41.050550] ? trace_hardirqs_on+0x37/0xe0 [ 41.050554] ? __pfx_kasan_alloca_oob_left+0x10/0x10 [ 41.050559] ? __schedule+0x10cc/0x2b60 [ 41.050563] ? ktime_get_ts64+0x83/0x230 [ 41.050567] kunit_try_run_case+0x1a2/0x480 [ 41.050572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.050576] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 41.050580] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 41.050584] ? __kthread_parkme+0x82/0x180 [ 41.050588] ? preempt_count_sub+0x50/0x80 [ 41.050592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 41.050596] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 41.050600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 41.050605] kthread+0x334/0x6f0 [ 41.050608] ? trace_preempt_on+0x20/0xc0 [ 41.050612] ? __pfx_kthread+0x10/0x10 [ 41.050616] ? _raw_spin_unlock_irq+0x47/0x80 [ 41.050620] ? calculate_sigpending+0x7b/0xa0 [ 41.050624] ? __pfx_kthread+0x10/0x10 [ 41.050628] ret_from_fork+0x113/0x1d0 [ 41.050631] ? __pfx_kthread+0x10/0x10 [ 41.050635] ret_from_fork_asm+0x1a/0x30 [ 41.050641] </TASK> [ 41.050643] [ 41.239049] The buggy address belongs to stack of task kunit_try_catch/292 [ 41.245923] [ 41.247421] The buggy address belongs to the physical page: [ 41.252993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108327 [ 41.261001] flags: 0x200000000000000(node=0|zone=2) [ 41.265883] raw: 0200000000000000 ffffea000420c9c8 ffffea000420c9c8 0000000000000000 [ 41.273628] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 41.281369] page dumped because: kasan: bad access detected [ 41.286967] [ 41.288464] Memory state around the buggy address: [ 41.293258] ffff888108327b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.300479] ffff888108327b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.307705] >ffff888108327c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 41.314926] ^ [ 41.319978] ffff888108327c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 [ 41.327197] ffff888108327d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 41.334416] ==================================================================