Date
July 11, 2025, 10:11 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 56.331217] ================================================================== [ 56.345656] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 56.352508] Read of size 1 at addr ffff800089647c2a by task kunit_try_catch/333 [ 56.359797] [ 56.361283] CPU: 7 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 56.361346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.361361] Hardware name: WinLink E850-96 board (DT) [ 56.361386] Call trace: [ 56.361403] show_stack+0x20/0x38 (C) [ 56.361445] dump_stack_lvl+0x8c/0xd0 [ 56.361478] print_report+0x310/0x5d0 [ 56.361509] kasan_report+0xdc/0x128 [ 56.361536] __asan_report_load1_noabort+0x20/0x30 [ 56.361570] kasan_stack_oob+0x238/0x270 [ 56.361601] kunit_try_run_case+0x170/0x3f0 [ 56.361642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.361676] kthread+0x328/0x630 [ 56.361704] ret_from_fork+0x10/0x20 [ 56.361741] [ 56.425076] The buggy address belongs to stack of task kunit_try_catch/333 [ 56.431932] and is located at offset 138 in frame: [ 56.436792] kasan_stack_oob+0x0/0x270 [ 56.440530] [ 56.441999] This frame has 4 objects: [ 56.445652] [48, 49) '__assertion' [ 56.445678] [64, 72) 'array' [ 56.449121] [96, 112) '__assertion' [ 56.452071] [128, 138) 'stack_array' [ 56.455628] [ 56.460751] The buggy address ffff800089647c2a belongs to a vmalloc virtual mapping [ 56.468393] The buggy address belongs to the physical page: [ 56.473948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888812 [ 56.481933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.488452] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 56.496172] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.503893] page dumped because: kasan: bad access detected [ 56.509446] [ 56.510922] Memory state around the buggy address: [ 56.515702] ffff800089647b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.522905] ffff800089647b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 56.530111] >ffff800089647c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 56.537311] ^ [ 56.541829] ffff800089647c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 56.549032] ffff800089647d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 56.556234] ==================================================================
[ 32.595252] ================================================================== [ 32.595500] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 32.595725] Read of size 1 at addr ffff800080b47c2a by task kunit_try_catch/280 [ 32.595788] [ 32.595849] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.595948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.595976] Hardware name: linux,dummy-virt (DT) [ 32.596011] Call trace: [ 32.596040] show_stack+0x20/0x38 (C) [ 32.596150] dump_stack_lvl+0x8c/0xd0 [ 32.596206] print_report+0x310/0x5d0 [ 32.596250] kasan_report+0xdc/0x128 [ 32.596295] __asan_report_load1_noabort+0x20/0x30 [ 32.596538] kasan_stack_oob+0x238/0x270 [ 32.596669] kunit_try_run_case+0x170/0x3f0 [ 32.596757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.596812] kthread+0x328/0x630 [ 32.596924] ret_from_fork+0x10/0x20 [ 32.596979] [ 32.597141] The buggy address belongs to stack of task kunit_try_catch/280 [ 32.597510] and is located at offset 138 in frame: [ 32.597605] kasan_stack_oob+0x0/0x270 [ 32.597970] [ 32.598014] This frame has 4 objects: [ 32.598472] [48, 49) '__assertion' [ 32.598671] [64, 72) 'array' [ 32.598742] [96, 112) '__assertion' [ 32.598989] [128, 138) 'stack_array' [ 32.599275] [ 32.599318] The buggy address ffff800080b47c2a belongs to a vmalloc virtual mapping [ 32.599569] The buggy address belongs to the physical page: [ 32.599635] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad7 [ 32.599785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.599868] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.599997] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.600087] page dumped because: kasan: bad access detected [ 32.600167] [ 32.600193] Memory state around the buggy address: [ 32.600616] ffff800080b47b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.600671] ffff800080b47b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 32.600749] >ffff800080b47c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 32.600829] ^ [ 32.600954] ffff800080b47c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 32.601005] ffff800080b47d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.601242] ==================================================================
[ 25.657051] ================================================================== [ 25.657968] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 25.658249] Read of size 1 at addr ffff888106247d02 by task kunit_try_catch/299 [ 25.658595] [ 25.658683] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT(voluntary) [ 25.659343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.659367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.659476] Call Trace: [ 25.659494] <TASK> [ 25.659512] dump_stack_lvl+0x73/0xb0 [ 25.659549] print_report+0xd1/0x610 [ 25.659573] ? __virt_addr_valid+0x1db/0x2d0 [ 25.659598] ? kasan_stack_oob+0x2b5/0x300 [ 25.659622] ? kasan_addr_to_slab+0x11/0xa0 [ 25.659642] ? kasan_stack_oob+0x2b5/0x300 [ 25.659667] kasan_report+0x141/0x180 [ 25.659688] ? kasan_stack_oob+0x2b5/0x300 [ 25.659716] __asan_report_load1_noabort+0x18/0x20 [ 25.659755] kasan_stack_oob+0x2b5/0x300 [ 25.659778] ? __pfx_kasan_stack_oob+0x10/0x10 [ 25.659802] ? finish_task_switch.isra.0+0x153/0x700 [ 25.659826] ? __switch_to+0x47/0xf80 [ 25.659854] ? __schedule+0x10cc/0x2b60 [ 25.659877] ? __pfx_read_tsc+0x10/0x10 [ 25.659900] ? ktime_get_ts64+0x86/0x230 [ 25.659925] kunit_try_run_case+0x1a5/0x480 [ 25.659948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.659969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.659992] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.660016] ? __kthread_parkme+0x82/0x180 [ 25.660037] ? preempt_count_sub+0x50/0x80 [ 25.660060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.660082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.660107] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.660132] kthread+0x337/0x6f0 [ 25.660152] ? trace_preempt_on+0x20/0xc0 [ 25.660175] ? __pfx_kthread+0x10/0x10 [ 25.660196] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.660218] ? calculate_sigpending+0x7b/0xa0 [ 25.660243] ? __pfx_kthread+0x10/0x10 [ 25.660264] ret_from_fork+0x116/0x1d0 [ 25.660283] ? __pfx_kthread+0x10/0x10 [ 25.661478] ret_from_fork_asm+0x1a/0x30 [ 25.661514] </TASK> [ 25.661528] [ 25.672900] The buggy address belongs to stack of task kunit_try_catch/299 [ 25.673494] and is located at offset 138 in frame: [ 25.673791] kasan_stack_oob+0x0/0x300 [ 25.674107] [ 25.674212] This frame has 4 objects: [ 25.674628] [48, 49) '__assertion' [ 25.674656] [64, 72) 'array' [ 25.674828] [96, 112) '__assertion' [ 25.674951] [128, 138) 'stack_array' [ 25.675153] [ 25.675545] The buggy address belongs to the physical page: [ 25.675757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106247 [ 25.676090] flags: 0x200000000000000(node=0|zone=2) [ 25.676358] raw: 0200000000000000 ffffea00041891c8 ffffea00041891c8 0000000000000000 [ 25.676659] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 25.677151] page dumped because: kasan: bad access detected [ 25.677418] [ 25.677750] Memory state around the buggy address: [ 25.677932] ffff888106247c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 25.678229] ffff888106247c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 25.678662] >ffff888106247d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 25.678955] ^ [ 25.679170] ffff888106247d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 25.679619] ffff888106247e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.679971] ==================================================================