Hay
Date
Feb. 5, 2025, 2:09 p.m.

Environment
qemu-armv7
qemu-x86_64

[  146.544511] ==================================================================
[  146.545430] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xf4/0x1d0
[  146.546733] Read of size 1 at addr fa053d3f by task kunit_try_catch/181
[  146.547379] 
[  146.547727] CPU: 1 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[  146.548628] Hardware name: Generic DT based system
[  146.549280]  unwind_backtrace from show_stack+0x18/0x1c
[  146.550025]  show_stack from dump_stack_lvl+0x58/0x70
[  146.550927]  dump_stack_lvl from print_report+0x164/0x51c
[  146.551613]  print_report from kasan_report+0xc8/0x104
[  146.552441]  kasan_report from kasan_alloca_oob_left+0xf4/0x1d0
[  146.553077]  kasan_alloca_oob_left from kunit_try_run_case+0x11c/0x2e4
[  146.553909]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48
[  146.554944]  kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8
[  146.556165]  kthread from ret_from_fork+0x14/0x30
[  146.556888] Exception stack(0xfa053fb0 to 0xfa053ff8)
[  146.557832] 3fa0:                                     00000000 00000000 00000000 00000000
[  146.558742] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  146.559492] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  146.560264] 
[  146.560599] The buggy address belongs to stack of task kunit_try_catch/181
[  146.561369] 
[  146.561644] The buggy address belongs to the virtual mapping at
[  146.561644]  [fa050000, fa055000) created by:
[  146.561644]  kernel_clone+0xcc/0x4b0
[  146.563100] 
[  146.563352] The buggy address belongs to the physical page:
[  146.564099] page:1551d90b refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x13fc65
[  146.565095] flags: 0x80000000(zone=2)
[  146.565621] page_type: 0xffffffff()
[  146.566453] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  146.567048] raw: 00000000
[  146.567323] page dumped because: kasan: bad access detected
[  146.567732] 
[  146.567913] Memory state around the buggy address:
[  146.570176]  fa053c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  146.571768]  fa053c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  146.573758] >fa053d00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[  146.574553]                                 ^
[  146.575324]  fa053d80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 04 f2 04 f2
[  146.576630]  fa053e00: 00 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  146.578122] ==================================================================


[   49.432364] ==================================================================
[   49.433439] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xfe/0x1f0
[   49.434467] Read of size 1 at addr ffff888102ac7cbf by task kunit_try_catch/204
[   49.435109] 
[   49.435489] CPU: 1 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.6.76-rc1 #1
[   49.436847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   49.437655] Call Trace:
[   49.438645]  <TASK>
[   49.439138]  dump_stack_lvl+0x4e/0x90
[   49.439695]  print_report+0xd2/0x660
[   49.440234]  ? __virt_addr_valid+0x156/0x1e0
[   49.441159]  ? kasan_addr_to_slab+0x11/0xb0
[   49.441777]  kasan_report+0xff/0x140
[   49.442800]  ? kasan_alloca_oob_left+0xfe/0x1f0
[   49.443601]  ? kasan_alloca_oob_left+0xfe/0x1f0
[   49.444390]  __asan_load1+0x66/0x70
[   49.445036]  kasan_alloca_oob_left+0xfe/0x1f0
[   49.445839]  ? irqentry_exit+0x29/0x60
[   49.446382]  ? inat_get_escape_attribute+0x10/0xb0
[   49.447158]  ? trace_hardirqs_on+0x37/0xd0
[   49.447644]  ? irqentry_exit+0x29/0x60
[   49.448491]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   49.449347]  ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   49.450261]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   49.451214]  ? kunit_try_run_case+0x11b/0x290
[   49.451836]  kunit_try_run_case+0x126/0x290
[   49.452775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.453345]  ? __kasan_check_write+0x18/0x20
[   49.453863]  ? trace_preempt_on+0x20/0xa0
[   49.454313]  ? __kthread_parkme+0x4f/0xd0
[   49.455549]  ? preempt_count_sub+0x50/0x80
[   49.456291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   49.457011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   49.458167]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   49.458493]  kthread+0x19e/0x1e0
[   49.458757]  ? __pfx_kthread+0x10/0x10
[   49.459830]  ret_from_fork+0x41/0x70
[   49.460818]  ? __pfx_kthread+0x10/0x10
[   49.461576]  ret_from_fork_asm+0x1b/0x30
[   49.462388]  </TASK>
[   49.462812] 
[   49.463350] The buggy address belongs to stack of task kunit_try_catch/204
[   49.464126] 
[   49.464329] The buggy address belongs to the physical page:
[   49.464880] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ac7
[   49.465897] flags: 0x200000000000000(node=0|zone=2)
[   49.466901] page_type: 0xffffffff()
[   49.467881] raw: 0200000000000000 ffffea00040ab1c8 ffffea00040ab1c8 0000000000000000
[   49.468834] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   49.469843] page dumped because: kasan: bad access detected
[   49.470540] 
[   49.470839] Memory state around the buggy address:
[   49.471719]  ffff888102ac7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.472807]  ffff888102ac7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.473588] >ffff888102ac7c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   49.474611]                                         ^
[   49.475490]  ffff888102ac7d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[   49.476210]  ffff888102ac7d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[   49.477336] ==================================================================