Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 106.694630] ================================================================== [ 106.695573] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc4/0x180 [ 106.696425] Read of size 1 at addr ffff800008ac7daa by task kunit_try_catch/238 [ 106.697178] [ 106.697438] CPU: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 106.698197] Hardware name: linux,dummy-virt (DT) [ 106.698653] Call trace: [ 106.698981] dump_backtrace+0xe0/0x134 [ 106.699366] show_stack+0x20/0x2c [ 106.699828] dump_stack_lvl+0x88/0xb4 [ 106.700346] print_report+0x158/0x44c [ 106.700837] kasan_report+0xc8/0x180 [ 106.701300] __asan_load1+0x68/0x74 [ 106.701796] kasan_stack_oob+0xc4/0x180 [ 106.702298] kunit_try_run_case+0x8c/0x124 [ 106.702813] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 106.703380] kthread+0x15c/0x170 [ 106.703870] ret_from_fork+0x10/0x20 [ 106.704388] [ 106.704716] The buggy address belongs to stack of task kunit_try_catch/238 [ 106.705335] and is located at offset 138 in frame: [ 106.706184] kasan_stack_oob+0x0/0x180 [ 106.706879] [ 106.707143] This frame has 4 objects: [ 106.707650] [48, 49) '__assertion' [ 106.707763] [64, 72) 'array' [ 106.708099] [96, 112) '__assertion' [ 106.708535] [128, 138) 'stack_array' [ 106.708960] [ 106.709532] The buggy address ffff800008ac7daa belongs to a vmalloc virtual mapping [ 106.710934] The buggy address belongs to the physical page: [ 106.711453] page:00000000baa18535 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b [ 106.712278] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 106.712976] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 106.714032] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 106.714654] page dumped because: kasan: bad access detected [ 106.715182] [ 106.715416] Memory state around the buggy address: [ 106.715872] ffff800008ac7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.717332] ffff800008ac7d00: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 106.718003] >ffff800008ac7d80: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 106.718621] ^ [ 106.719101] ffff800008ac7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.719761] ffff800008ac7e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.720389] ==================================================================
[ 74.044968] ================================================================== [ 74.045892] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xb4/0x170 [ 74.046870] Read of size 1 at addr ffff8000087b7d9a by task kunit_try_catch/154 [ 74.047418] [ 74.047670] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.048354] Hardware name: linux,dummy-virt (DT) [ 74.048775] Call trace: [ 74.049070] dump_backtrace.part.0+0xdc/0xf0 [ 74.049577] show_stack+0x18/0x30 [ 74.050139] dump_stack_lvl+0x64/0x80 [ 74.050575] print_report+0x158/0x438 [ 74.050980] kasan_report+0xb4/0xf4 [ 74.051335] __asan_load1+0x68/0x74 [ 74.051755] kasan_stack_oob+0xb4/0x170 [ 74.052184] kunit_try_run_case+0x84/0x120 [ 74.052660] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.053211] kthread+0x180/0x190 [ 74.053600] ret_from_fork+0x10/0x20 [ 74.054186] [ 74.054446] The buggy address belongs to stack of task kunit_try_catch/154 [ 74.055101] and is located at offset 138 in frame: [ 74.055547] kasan_stack_oob+0x0/0x170 [ 74.056076] [ 74.056289] This frame has 4 objects: [ 74.056732] [48, 49) '__assertion' [ 74.056822] [64, 72) 'array' [ 74.057157] [96, 112) '__assertion' [ 74.057503] [128, 138) 'stack_array' [ 74.058020] [ 74.058496] The buggy address ffff8000087b7d9a belongs to a vmalloc virtual mapping [ 74.059104] The buggy address belongs to the physical page: [ 74.059576] page:00000000b2a89bce refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105956 [ 74.060346] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 74.060963] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 74.061619] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.062372] page dumped because: kasan: bad access detected [ 74.062848] [ 74.063035] Memory state around the buggy address: [ 74.063481] ffff8000087b7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.064045] ffff8000087b7d00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 [ 74.064671] >ffff8000087b7d80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00 [ 74.065217] ^ [ 74.065601] ffff8000087b7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.066815] ffff8000087b7e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.067413] ==================================================================
[ 65.539336] ================================================================== [ 65.540390] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc8/0x178 [ 65.541237] Read of size 1 at addr ffff800008777dca by task kunit_try_catch/152 [ 65.541778] [ 65.541989] CPU: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 65.542675] Hardware name: linux,dummy-virt (DT) [ 65.543047] Call trace: [ 65.543320] dump_backtrace+0x110/0x120 [ 65.543770] show_stack+0x18/0x28 [ 65.544161] dump_stack_lvl+0x68/0x84 [ 65.544551] print_report+0x158/0x484 [ 65.544940] kasan_report+0x98/0xe0 [ 65.545328] __asan_load1+0x68/0x78 [ 65.545838] kasan_stack_oob+0xc8/0x178 [ 65.546209] kunit_try_run_case+0x7c/0x120 [ 65.546731] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 65.547220] kthread+0x1a4/0x1b8 [ 65.547601] ret_from_fork+0x10/0x20 [ 65.547967] [ 65.548202] The buggy address belongs to stack of task kunit_try_catch/152 [ 65.548791] and is located at offset 234 in frame: [ 65.549242] kasan_stack_oob+0x0/0x178 [ 65.549812] [ 65.550074] This frame has 4 objects: [ 65.550458] [32, 33) '__assertion' [ 65.550552] [96, 104) 'array' [ 65.550956] [160, 176) '__assertion' [ 65.551264] [224, 234) 'stack_array' [ 65.551588] [ 65.552045] The buggy address ffff800008777dca belongs to a vmalloc virtual mapping [ 65.552582] The buggy address belongs to the physical page: [ 65.552984] page:00000000596b461c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105820 [ 65.553717] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 65.554397] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 65.554986] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 65.555712] page dumped because: kasan: bad access detected [ 65.556134] [ 65.556353] Memory state around the buggy address: [ 65.556730] ffff800008777c80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 [ 65.557297] ffff800008777d00: 01 f2 f2 f2 f2 f2 f2 f2 00 f2 f2 f2 f2 f2 f2 f2 [ 65.558001] >ffff800008777d80: 00 00 f2 f2 f2 f2 f2 f2 00 02 f2 f2 00 00 00 00 [ 65.558730] ^ [ 65.559159] ffff800008777e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.559717] ffff800008777e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.560237] ==================================================================
[ 31.744704] ================================================================== [ 31.745698] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc6/0x190 [ 31.746056] Read of size 1 at addr ffff888103587e6a by task kunit_try_catch/258 [ 31.746363] [ 31.746839] CPU: 1 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 31.747311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.747795] Call Trace: [ 31.748138] <TASK> [ 31.748428] dump_stack_lvl+0x49/0x62 [ 31.748688] print_report+0x189/0x492 [ 31.748956] ? kasan_addr_to_slab+0xd/0xb0 [ 31.749222] ? kasan_stack_oob+0xc6/0x190 [ 31.749513] kasan_report+0x10c/0x190 [ 31.749767] ? kasan_stack_oob+0xc6/0x190 [ 31.750175] __asan_load1+0x62/0x70 [ 31.750478] kasan_stack_oob+0xc6/0x190 [ 31.750813] ? match_all_mem_tag+0x20/0x20 [ 31.751059] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 31.751636] ? kmalloc_oob_16+0x23e/0x250 [ 31.752145] ? kunit_try_run_case+0x84/0xd0 [ 31.752481] ? __kunit_add_resource+0xd1/0x100 [ 31.752743] kunit_try_run_case+0x8f/0xd0 [ 31.752982] ? kunit_catch_run_case+0x80/0x80 [ 31.753231] ? kunit_try_catch_throw+0x40/0x40 [ 31.753641] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.753966] kthread+0x17b/0x1b0 [ 31.754225] ? kthread_complete_and_exit+0x30/0x30 [ 31.754489] ret_from_fork+0x22/0x30 [ 31.754894] </TASK> [ 31.755045] [ 31.755234] The buggy address belongs to stack of task kunit_try_catch/258 [ 31.755886] and is located at offset 138 in frame: [ 31.756173] kasan_stack_oob+0x0/0x190 [ 31.756596] [ 31.756866] This frame has 4 objects: [ 31.757192] [48, 49) '__assertion' [ 31.757234] [64, 72) 'array' [ 31.757571] [96, 112) '__assertion' [ 31.757775] [128, 138) 'stack_array' [ 31.758020] [ 31.758308] The buggy address belongs to the physical page: [ 31.758666] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103587 [ 31.759108] flags: 0x200000000000000(node=0|zone=2) [ 31.759412] raw: 0200000000000000 ffffea00040d61c8 ffffea00040d61c8 0000000000000000 [ 31.759979] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 31.760338] page dumped because: kasan: bad access detected [ 31.760834] [ 31.760942] Memory state around the buggy address: [ 31.761210] ffff888103587d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.761615] ffff888103587d80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 [ 31.761923] >ffff888103587e00: f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02 f3 f3 [ 31.762238] ^ [ 31.762739] ffff888103587e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.763112] ffff888103587f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.763744] ==================================================================