Date
June 7, 2025, 10:40 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 25.754660] ================================================================== [ 25.759629] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 25.760781] Read of size 1 at addr ffff800080b87c2a by task kunit_try_catch/238 [ 25.763908] [ 25.764357] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 25.764553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.764614] Hardware name: linux,dummy-virt (DT) [ 25.764690] Call trace: [ 25.764743] show_stack+0x20/0x38 (C) [ 25.765477] dump_stack_lvl+0x8c/0xd0 [ 25.765619] print_report+0x310/0x608 [ 25.765730] kasan_report+0xdc/0x128 [ 25.765842] __asan_report_load1_noabort+0x20/0x30 [ 25.765976] kasan_stack_oob+0x238/0x270 [ 25.766086] kunit_try_run_case+0x170/0x3f0 [ 25.766212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.766339] kthread+0x318/0x620 [ 25.766442] ret_from_fork+0x10/0x20 [ 25.766557] [ 25.779196] The buggy address belongs to stack of task kunit_try_catch/238 [ 25.779847] and is located at offset 138 in frame: [ 25.780621] kasan_stack_oob+0x0/0x270 [ 25.783041] [ 25.783864] This frame has 4 objects: [ 25.784546] [48, 49) '__assertion' [ 25.784681] [64, 72) 'array' [ 25.786504] [96, 112) '__assertion' [ 25.787604] [128, 138) 'stack_array' [ 25.788781] [ 25.791098] The buggy address belongs to the virtual mapping at [ 25.791098] [ffff800080b80000, ffff800080b89000) created by: [ 25.791098] kernel_clone+0x150/0x7a8 [ 25.793781] [ 25.794045] The buggy address belongs to the physical page: [ 25.794492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065dc [ 25.795103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.795655] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.799309] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.800920] page dumped because: kasan: bad access detected [ 25.802999] [ 25.803880] Memory state around the buggy address: [ 25.804775] ffff800080b87b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.805580] ffff800080b87b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 25.807254] >ffff800080b87c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 25.808361] ^ [ 25.810388] ffff800080b87c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 25.811594] ffff800080b87d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 25.812184] ==================================================================
[ 20.027385] ================================================================== [ 20.028515] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b7/0x300 [ 20.029043] Read of size 1 at addr ffff888102dbfd02 by task kunit_try_catch/257 [ 20.029548] [ 20.029763] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.14.11-rc1 #1 [ 20.029880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.029918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.029966] Call Trace: [ 20.030011] <TASK> [ 20.030049] dump_stack_lvl+0x73/0xb0 [ 20.030118] print_report+0xd1/0x650 [ 20.030171] ? __virt_addr_valid+0x1db/0x2d0 [ 20.030229] ? kasan_stack_oob+0x2b7/0x300 [ 20.030281] ? kasan_addr_to_slab+0x11/0xa0 [ 20.030331] ? kasan_stack_oob+0x2b7/0x300 [ 20.030385] kasan_report+0x140/0x180 [ 20.030443] ? kasan_stack_oob+0x2b7/0x300 [ 20.030509] __asan_report_load1_noabort+0x18/0x20 [ 20.030573] kasan_stack_oob+0x2b7/0x300 [ 20.030628] ? __pfx_kasan_stack_oob+0x10/0x10 [ 20.030672] ? finish_task_switch.isra.0+0x153/0x700 [ 20.030727] ? __switch_to+0x5d9/0xf60 [ 20.030793] ? __schedule+0xce8/0x2840 [ 20.030850] ? __pfx_read_tsc+0x10/0x10 [ 20.030926] ? ktime_get_ts64+0x86/0x230 [ 20.030985] kunit_try_run_case+0x1a6/0x480 [ 20.031041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.031088] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 20.031139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.031193] ? __kthread_parkme+0x82/0x160 [ 20.031248] ? preempt_count_sub+0x50/0x80 [ 20.031302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.031357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.031424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.031482] kthread+0x324/0x6e0 [ 20.031530] ? trace_preempt_on+0x20/0xc0 [ 20.031589] ? __pfx_kthread+0x10/0x10 [ 20.031631] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.031664] ? calculate_sigpending+0x7b/0xa0 [ 20.031707] ? __pfx_kthread+0x10/0x10 [ 20.031736] ret_from_fork+0x41/0x80 [ 20.031762] ? __pfx_kthread+0x10/0x10 [ 20.031790] ret_from_fork_asm+0x1a/0x30 [ 20.031831] </TASK> [ 20.031848] [ 20.046304] The buggy address belongs to stack of task kunit_try_catch/257 [ 20.047162] and is located at offset 138 in frame: [ 20.047650] kasan_stack_oob+0x0/0x300 [ 20.049135] [ 20.049243] This frame has 4 objects: [ 20.049939] [48, 49) '__assertion' [ 20.050091] [64, 72) 'array' [ 20.050490] [96, 112) '__assertion' [ 20.050767] [128, 138) 'stack_array' [ 20.051053] [ 20.052203] The buggy address belongs to the physical page: [ 20.052527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102dbf [ 20.053175] flags: 0x200000000000000(node=0|zone=2) [ 20.053495] raw: 0200000000000000 ffffea00040b6fc8 ffffea00040b6fc8 0000000000000000 [ 20.054072] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 20.054950] page dumped because: kasan: bad access detected [ 20.056117] [ 20.056594] Memory state around the buggy address: [ 20.057297] ffff888102dbfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 20.058018] ffff888102dbfc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 20.058754] >ffff888102dbfd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 20.059340] ^ [ 20.059678] ffff888102dbfd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 20.060256] ffff888102dbfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.061085] ==================================================================