Date
July 16, 2025, 12:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 32.884962] ================================================================== [ 32.885037] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 32.885092] Read of size 1 at addr ffff800080b27c2a by task kunit_try_catch/280 [ 32.885144] [ 32.885174] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 32.885267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.885297] Hardware name: linux,dummy-virt (DT) [ 32.885330] Call trace: [ 32.885356] show_stack+0x20/0x38 (C) [ 32.885405] dump_stack_lvl+0x8c/0xd0 [ 32.885455] print_report+0x310/0x5d0 [ 32.885501] kasan_report+0xdc/0x128 [ 32.885683] __asan_report_load1_noabort+0x20/0x30 [ 32.885925] kasan_stack_oob+0x238/0x270 [ 32.886203] kunit_try_run_case+0x170/0x3f0 [ 32.886336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.886417] kthread+0x328/0x630 [ 32.886543] ret_from_fork+0x10/0x20 [ 32.886882] [ 32.886971] The buggy address belongs to stack of task kunit_try_catch/280 [ 32.887801] and is located at offset 138 in frame: [ 32.888001] kasan_stack_oob+0x0/0x270 [ 32.888814] [ 32.889195] This frame has 4 objects: [ 32.889740] [48, 49) '__assertion' [ 32.889883] [64, 72) 'array' [ 32.889930] [96, 112) '__assertion' [ 32.889978] [128, 138) 'stack_array' [ 32.890110] [ 32.890142] The buggy address ffff800080b27c2a belongs to a vmalloc virtual mapping [ 32.890213] The buggy address belongs to the physical page: [ 32.890265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1a [ 32.890322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.890400] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.890455] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.890499] page dumped because: kasan: bad access detected [ 32.891205] [ 32.891286] Memory state around the buggy address: [ 32.891482] ffff800080b27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.891725] ffff800080b27b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 32.891779] >ffff800080b27c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 32.891934] ^ [ 32.892119] ffff800080b27c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 32.892230] ffff800080b27d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.892301] ==================================================================
[ 25.115897] ================================================================== [ 25.116717] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 25.117053] Read of size 1 at addr ffff888106207d02 by task kunit_try_catch/298 [ 25.117443] [ 25.117633] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT(voluntary) [ 25.117687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.117701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.117723] Call Trace: [ 25.117737] <TASK> [ 25.117758] dump_stack_lvl+0x73/0xb0 [ 25.117791] print_report+0xd1/0x610 [ 25.117816] ? __virt_addr_valid+0x1db/0x2d0 [ 25.117840] ? kasan_stack_oob+0x2b5/0x300 [ 25.117860] ? kasan_addr_to_slab+0x11/0xa0 [ 25.117880] ? kasan_stack_oob+0x2b5/0x300 [ 25.117899] kasan_report+0x141/0x180 [ 25.117922] ? kasan_stack_oob+0x2b5/0x300 [ 25.117947] __asan_report_load1_noabort+0x18/0x20 [ 25.117971] kasan_stack_oob+0x2b5/0x300 [ 25.117991] ? __pfx_kasan_stack_oob+0x10/0x10 [ 25.118012] ? __kasan_check_write+0x18/0x20 [ 25.118035] ? queued_spin_lock_slowpath+0x116/0xb40 [ 25.118061] ? __pfx_queued_spin_lock_slowpath+0x10/0x10 [ 25.118084] ? __pfx_read_tsc+0x10/0x10 [ 25.118107] ? ktime_get_ts64+0x86/0x230 [ 25.118132] kunit_try_run_case+0x1a5/0x480 [ 25.118157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.118179] ? _raw_spin_lock_irqsave+0xf9/0x100 [ 25.118201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.118224] ? __kthread_parkme+0x82/0x180 [ 25.118244] ? preempt_count_sub+0x50/0x80 [ 25.118267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.118291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.118330] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.118357] kthread+0x337/0x6f0 [ 25.118377] ? trace_preempt_on+0x20/0xc0 [ 25.118403] ? __pfx_kthread+0x10/0x10 [ 25.118423] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.118444] ? calculate_sigpending+0x7b/0xa0 [ 25.118468] ? __pfx_kthread+0x10/0x10 [ 25.118490] ret_from_fork+0x116/0x1d0 [ 25.118509] ? __pfx_kthread+0x10/0x10 [ 25.118530] ret_from_fork_asm+0x1a/0x30 [ 25.118562] </TASK> [ 25.118573] [ 25.125726] The buggy address belongs to stack of task kunit_try_catch/298 [ 25.126107] and is located at offset 138 in frame: [ 25.126403] kasan_stack_oob+0x0/0x300 [ 25.126736] [ 25.126840] This frame has 4 objects: [ 25.127162] [48, 49) '__assertion' [ 25.127189] [64, 72) 'array' [ 25.127326] [96, 112) '__assertion' [ 25.127462] [128, 138) 'stack_array' [ 25.127727] [ 25.127988] The buggy address belongs to the physical page: [ 25.128272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106207 [ 25.128553] flags: 0x200000000000000(node=0|zone=2) [ 25.128728] raw: 0200000000000000 ffffea00041881c8 ffffea00041881c8 0000000000000000 [ 25.128950] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 25.129570] page dumped because: kasan: bad access detected [ 25.130249] [ 25.130360] Memory state around the buggy address: [ 25.130629] ffff888106207c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 25.130993] ffff888106207c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 25.131211] >ffff888106207d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 25.131430] ^ [ 25.131606] ffff888106207d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 25.131926] ffff888106207e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.132242] ==================================================================