Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 106.726484] ================================================================== [ 106.727797] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x108/0x1e4 [ 106.728897] Read of size 1 at addr ffff800008a97cdf by task kunit_try_catch/239 [ 106.730037] [ 106.730605] CPU: 1 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 106.731791] Hardware name: linux,dummy-virt (DT) [ 106.732660] Call trace: [ 106.733239] dump_backtrace+0xe0/0x134 [ 106.734019] show_stack+0x20/0x2c [ 106.734771] dump_stack_lvl+0x88/0xb4 [ 106.735572] print_report+0x158/0x44c [ 106.736317] kasan_report+0xc8/0x180 [ 106.737164] __asan_load1+0x68/0x74 [ 106.738031] kasan_alloca_oob_left+0x108/0x1e4 [ 106.738608] kunit_try_run_case+0x8c/0x124 [ 106.739050] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 106.739546] kthread+0x15c/0x170 [ 106.740198] ret_from_fork+0x10/0x20 [ 106.741088] [ 106.741526] The buggy address belongs to stack of task kunit_try_catch/239 [ 106.742734] [ 106.743038] The buggy address ffff800008a97cdf belongs to a vmalloc virtual mapping [ 106.743985] The buggy address belongs to the physical page: [ 106.744381] page:00000000a9d5ccdc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c1 [ 106.746049] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 106.747124] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 106.748513] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 106.749697] page dumped because: kasan: bad access detected [ 106.750484] [ 106.750675] Memory state around the buggy address: [ 106.751601] ffff800008a97b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.752866] ffff800008a97c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.754070] >ffff800008a97c80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 106.754791] ^ [ 106.755223] ffff800008a97d00: cb cb cb cb f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 [ 106.755711] ffff800008a97d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.756845] ==================================================================
[ 74.071545] ================================================================== [ 74.072272] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x100/0x1dc [ 74.072877] Read of size 1 at addr ffff8000087b7cbf by task kunit_try_catch/155 [ 74.073341] [ 74.074336] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.075701] Hardware name: linux,dummy-virt (DT) [ 74.076702] Call trace: [ 74.077167] dump_backtrace.part.0+0xdc/0xf0 [ 74.078215] show_stack+0x18/0x30 [ 74.079075] dump_stack_lvl+0x64/0x80 [ 74.079931] print_report+0x158/0x438 [ 74.080794] kasan_report+0xb4/0xf4 [ 74.081607] __asan_load1+0x68/0x74 [ 74.082511] kasan_alloca_oob_left+0x100/0x1dc [ 74.083435] kunit_try_run_case+0x84/0x120 [ 74.084345] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.085436] kthread+0x180/0x190 [ 74.086320] ret_from_fork+0x10/0x20 [ 74.087173] [ 74.087809] The buggy address belongs to stack of task kunit_try_catch/155 [ 74.088809] [ 74.089359] The buggy address ffff8000087b7cbf belongs to a vmalloc virtual mapping [ 74.090616] The buggy address belongs to the physical page: [ 74.091218] page:00000000b2a89bce refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105956 [ 74.091820] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 74.092321] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 74.093947] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.094614] page dumped because: kasan: bad access detected [ 74.095048] [ 74.095266] Memory state around the buggy address: [ 74.095904] ffff8000087b7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.096598] ffff8000087b7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.097194] >ffff8000087b7c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 74.098140] ^ [ 74.098600] ffff8000087b7d00: 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 [ 74.099187] ffff8000087b7d80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.099760] ==================================================================
[ 65.564092] ================================================================== [ 65.564788] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x104/0x1e0 [ 65.565340] Read of size 1 at addr ffff800008787c3f by task kunit_try_catch/153 [ 65.567108] [ 65.567558] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 65.568689] Hardware name: linux,dummy-virt (DT) [ 65.569426] Call trace: [ 65.570004] dump_backtrace+0x110/0x120 [ 65.570668] show_stack+0x18/0x28 [ 65.571238] dump_stack_lvl+0x68/0x84 [ 65.571827] print_report+0x158/0x484 [ 65.572392] kasan_report+0x98/0xe0 [ 65.572940] __asan_load1+0x68/0x78 [ 65.573521] kasan_alloca_oob_left+0x104/0x1e0 [ 65.574288] kunit_try_run_case+0x7c/0x120 [ 65.574923] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 65.575684] kthread+0x1a4/0x1b8 [ 65.575986] ret_from_fork+0x10/0x20 [ 65.576321] [ 65.576533] The buggy address belongs to stack of task kunit_try_catch/153 [ 65.577054] [ 65.577288] The buggy address ffff800008787c3f belongs to a vmalloc virtual mapping [ 65.577954] The buggy address belongs to the physical page: [ 65.578563] page:00000000ad08535f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a9 [ 65.579362] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 65.579819] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 65.580299] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 65.581144] page dumped because: kasan: bad access detected [ 65.581878] [ 65.582129] Memory state around the buggy address: [ 65.582788] ffff800008787b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.583626] ffff800008787b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.584456] >ffff800008787c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 65.585250] ^ [ 65.586449] ffff800008787c80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 [ 65.587299] ffff800008787d00: 01 f2 f2 f2 f2 f2 f2 f2 04 f2 f2 f2 f2 f2 f2 f2 [ 65.587724] ==================================================================
[ 31.766805] ================================================================== [ 31.767532] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xfd/0x1e0 [ 31.767956] Read of size 1 at addr ffff888103597d9f by task kunit_try_catch/259 [ 31.768635] [ 31.768870] CPU: 1 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 31.769413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.769937] Call Trace: [ 31.770206] <TASK> [ 31.770480] dump_stack_lvl+0x49/0x62 [ 31.770748] print_report+0x189/0x492 [ 31.771176] ? kasan_addr_to_slab+0xd/0xb0 [ 31.771546] ? kasan_alloca_oob_left+0xfd/0x1e0 [ 31.771989] kasan_report+0x10c/0x190 [ 31.772533] ? kasan_alloca_oob_left+0xfd/0x1e0 [ 31.773045] __asan_load1+0x62/0x70 [ 31.773470] kasan_alloca_oob_left+0xfd/0x1e0 [ 31.773927] ? __kunit_add_resource+0x7c/0x100 [ 31.774423] ? irqentry_exit+0x25/0x60 [ 31.774835] ? sysvec_apic_timer_interrupt+0x90/0xa0 [ 31.775360] ? trace_hardirqs_on+0x38/0x110 [ 31.775814] ? irqentry_exit+0x25/0x60 [ 31.776237] ? kasan_alloca_oob_right+0x1f0/0x1f0 [ 31.776714] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 31.777072] ? kasan_alloca_oob_right+0x1f0/0x1f0 [ 31.777433] ? kunit_try_run_case+0x84/0xd0 [ 31.777864] ? __kunit_add_resource+0xd1/0x100 [ 31.778363] kunit_try_run_case+0x8f/0xd0 [ 31.778788] ? kunit_catch_run_case+0x80/0x80 [ 31.779091] ? kunit_try_catch_throw+0x40/0x40 [ 31.779474] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.780008] kthread+0x17b/0x1b0 [ 31.780398] ? kthread_complete_and_exit+0x30/0x30 [ 31.780738] ret_from_fork+0x22/0x30 [ 31.780930] </TASK> [ 31.781049] [ 31.781138] The buggy address belongs to stack of task kunit_try_catch/259 [ 31.781451] [ 31.781568] The buggy address belongs to the physical page: [ 31.781830] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103597 [ 31.782286] flags: 0x200000000000000(node=0|zone=2) [ 31.782563] raw: 0200000000000000 ffffea00040d65c8 ffffea00040d65c8 0000000000000000 [ 31.782875] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 31.783289] page dumped because: kasan: bad access detected [ 31.783542] [ 31.783655] Memory state around the buggy address: [ 31.783856] ffff888103597c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.784236] ffff888103597d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.784553] >ffff888103597d80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 f1 f1 [ 31.784869] ^ [ 31.785095] ffff888103597e00: f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 [ 31.785457] ffff888103597e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.785755] ==================================================================