Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.230957] ================================================================== [ 19.231293] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 19.231641] Read of size 1 at addr ffff800080b37c2a by task kunit_try_catch/249 [ 19.231698] [ 19.231931] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.232247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.232379] Hardware name: linux,dummy-virt (DT) [ 19.232535] Call trace: [ 19.232606] show_stack+0x20/0x38 (C) [ 19.232777] dump_stack_lvl+0x8c/0xd0 [ 19.232972] print_report+0x310/0x5d0 [ 19.233067] kasan_report+0xdc/0x128 [ 19.233141] __asan_report_load1_noabort+0x20/0x30 [ 19.233408] kasan_stack_oob+0x238/0x270 [ 19.233638] kunit_try_run_case+0x170/0x3f0 [ 19.233794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.233872] kthread+0x328/0x630 [ 19.234229] ret_from_fork+0x10/0x20 [ 19.234458] [ 19.234618] The buggy address belongs to stack of task kunit_try_catch/249 [ 19.235215] and is located at offset 138 in frame: [ 19.235398] kasan_stack_oob+0x0/0x270 [ 19.235922] [ 19.235963] This frame has 4 objects: [ 19.236754] [48, 49) '__assertion' [ 19.236831] [64, 72) 'array' [ 19.236880] [96, 112) '__assertion' [ 19.237043] [128, 138) 'stack_array' [ 19.237095] [ 19.237146] The buggy address ffff800080b37c2a belongs to a vmalloc virtual mapping [ 19.237461] The buggy address belongs to the physical page: [ 19.237634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d9 [ 19.237877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.238063] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.238229] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.238371] page dumped because: kasan: bad access detected [ 19.238544] [ 19.238565] Memory state around the buggy address: [ 19.238618] ffff800080b37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.238890] ffff800080b37b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 19.239071] >ffff800080b37c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 19.239150] ^ [ 19.239336] ffff800080b37c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 19.239406] ffff800080b37d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 19.239494] ==================================================================
[ 18.847954] ================================================================== [ 18.848058] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 18.848114] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/249 [ 18.848170] [ 18.848206] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.848289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.848937] Hardware name: linux,dummy-virt (DT) [ 18.848977] Call trace: [ 18.849001] show_stack+0x20/0x38 (C) [ 18.849050] dump_stack_lvl+0x8c/0xd0 [ 18.849117] print_report+0x310/0x5d0 [ 18.849302] kasan_report+0xdc/0x128 [ 18.849419] __asan_report_load1_noabort+0x20/0x30 [ 18.849607] kasan_stack_oob+0x238/0x270 [ 18.849721] kunit_try_run_case+0x170/0x3f0 [ 18.849978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.850036] kthread+0x328/0x630 [ 18.850101] ret_from_fork+0x10/0x20 [ 18.850282] [ 18.850353] The buggy address belongs to stack of task kunit_try_catch/249 [ 18.850670] and is located at offset 138 in frame: [ 18.850813] kasan_stack_oob+0x0/0x270 [ 18.851297] [ 18.851409] This frame has 4 objects: [ 18.851688] [48, 49) '__assertion' [ 18.851732] [64, 72) 'array' [ 18.851767] [96, 112) '__assertion' [ 18.851871] [128, 138) 'stack_array' [ 18.852089] [ 18.852160] The buggy address ffff800080ac7c2a belongs to a vmalloc virtual mapping [ 18.852287] The buggy address belongs to the physical page: [ 18.852363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b [ 18.852451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.852865] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.852919] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.852983] page dumped because: kasan: bad access detected [ 18.853018] [ 18.853039] Memory state around the buggy address: [ 18.853074] ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.853274] ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 18.853332] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 18.853370] ^ [ 18.853552] ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 18.853646] ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 18.853732] ==================================================================
[ 18.733116] ================================================================== [ 18.733234] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 18.733354] Read of size 1 at addr ffff800080a87c2a by task kunit_try_catch/249 [ 18.733405] [ 18.733441] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.733562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.733639] Hardware name: linux,dummy-virt (DT) [ 18.733673] Call trace: [ 18.733764] show_stack+0x20/0x38 (C) [ 18.733816] dump_stack_lvl+0x8c/0xd0 [ 18.733863] print_report+0x310/0x5d0 [ 18.733910] kasan_report+0xdc/0x128 [ 18.733976] __asan_report_load1_noabort+0x20/0x30 [ 18.734029] kasan_stack_oob+0x238/0x270 [ 18.734198] kunit_try_run_case+0x170/0x3f0 [ 18.734251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.734564] kthread+0x328/0x630 [ 18.734633] ret_from_fork+0x10/0x20 [ 18.734690] [ 18.734803] The buggy address belongs to stack of task kunit_try_catch/249 [ 18.735013] and is located at offset 138 in frame: [ 18.735070] kasan_stack_oob+0x0/0x270 [ 18.735612] [ 18.735727] This frame has 4 objects: [ 18.735977] [48, 49) '__assertion' [ 18.736331] [64, 72) 'array' [ 18.736554] [96, 112) '__assertion' [ 18.736610] [128, 138) 'stack_array' [ 18.736885] [ 18.736961] The buggy address ffff800080a87c2a belongs to a vmalloc virtual mapping [ 18.737049] The buggy address belongs to the physical page: [ 18.737125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106402 [ 18.737185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.737508] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.737633] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.737702] page dumped because: kasan: bad access detected [ 18.737791] [ 18.737842] Memory state around the buggy address: [ 18.737878] ffff800080a87b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.738056] ffff800080a87b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 18.738202] >ffff800080a87c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 18.738290] ^ [ 18.738360] ffff800080a87c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 18.738489] ffff800080a87d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 18.738531] ==================================================================
[ 13.996494] ================================================================== [ 13.997414] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 13.997861] Read of size 1 at addr ffff888103b0fd02 by task kunit_try_catch/266 [ 13.998106] [ 13.998236] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.998285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.998308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.998331] Call Trace: [ 13.998343] <TASK> [ 13.998361] dump_stack_lvl+0x73/0xb0 [ 13.998394] print_report+0xd1/0x610 [ 13.998417] ? __virt_addr_valid+0x1db/0x2d0 [ 13.998442] ? kasan_stack_oob+0x2b5/0x300 [ 13.998462] ? kasan_addr_to_slab+0x11/0xa0 [ 13.998483] ? kasan_stack_oob+0x2b5/0x300 [ 13.998512] kasan_report+0x141/0x180 [ 13.998606] ? kasan_stack_oob+0x2b5/0x300 [ 13.998635] __asan_report_load1_noabort+0x18/0x20 [ 13.998661] kasan_stack_oob+0x2b5/0x300 [ 13.998681] ? __pfx_kasan_stack_oob+0x10/0x10 [ 13.998701] ? finish_task_switch.isra.0+0x153/0x700 [ 13.998742] ? __switch_to+0x47/0xf50 [ 13.998777] ? __schedule+0x10cc/0x2b60 [ 13.998812] ? __pfx_read_tsc+0x10/0x10 [ 13.998834] ? ktime_get_ts64+0x86/0x230 [ 13.998860] kunit_try_run_case+0x1a5/0x480 [ 13.998886] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.998918] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.998943] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.998967] ? __kthread_parkme+0x82/0x180 [ 13.998998] ? preempt_count_sub+0x50/0x80 [ 13.999023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.999046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.999070] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.999095] kthread+0x337/0x6f0 [ 13.999114] ? trace_preempt_on+0x20/0xc0 [ 13.999138] ? __pfx_kthread+0x10/0x10 [ 13.999158] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.999180] ? calculate_sigpending+0x7b/0xa0 [ 13.999205] ? __pfx_kthread+0x10/0x10 [ 13.999226] ret_from_fork+0x116/0x1d0 [ 13.999245] ? __pfx_kthread+0x10/0x10 [ 13.999265] ret_from_fork_asm+0x1a/0x30 [ 13.999298] </TASK> [ 13.999309] [ 14.007557] The buggy address belongs to stack of task kunit_try_catch/266 [ 14.008228] and is located at offset 138 in frame: [ 14.008461] kasan_stack_oob+0x0/0x300 [ 14.008823] [ 14.009023] This frame has 4 objects: [ 14.009358] [48, 49) '__assertion' [ 14.009382] [64, 72) 'array' [ 14.009598] [96, 112) '__assertion' [ 14.009768] [128, 138) 'stack_array' [ 14.009932] [ 14.010220] The buggy address belongs to the physical page: [ 14.010478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b0f [ 14.010927] flags: 0x200000000000000(node=0|zone=2) [ 14.011188] raw: 0200000000000000 ffffea00040ec3c8 ffffea00040ec3c8 0000000000000000 [ 14.011477] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 14.011704] page dumped because: kasan: bad access detected [ 14.011876] [ 14.011971] Memory state around the buggy address: [ 14.012195] ffff888103b0fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 14.012778] ffff888103b0fc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 14.013212] >ffff888103b0fd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 14.013430] ^ [ 14.013703] ffff888103b0fd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 14.014090] ffff888103b0fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.014418] ==================================================================
[ 13.875547] ================================================================== [ 13.876380] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 13.877161] Read of size 1 at addr ffff888103b47d02 by task kunit_try_catch/267 [ 13.877929] [ 13.878163] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.878229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.878240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.878263] Call Trace: [ 13.878275] <TASK> [ 13.878292] dump_stack_lvl+0x73/0xb0 [ 13.878323] print_report+0xd1/0x610 [ 13.878346] ? __virt_addr_valid+0x1db/0x2d0 [ 13.878370] ? kasan_stack_oob+0x2b5/0x300 [ 13.878390] ? kasan_addr_to_slab+0x11/0xa0 [ 13.878424] ? kasan_stack_oob+0x2b5/0x300 [ 13.878456] kasan_report+0x141/0x180 [ 13.878478] ? kasan_stack_oob+0x2b5/0x300 [ 13.878504] __asan_report_load1_noabort+0x18/0x20 [ 13.878529] kasan_stack_oob+0x2b5/0x300 [ 13.878551] ? __pfx_kasan_stack_oob+0x10/0x10 [ 13.878570] ? finish_task_switch.isra.0+0x153/0x700 [ 13.878623] ? __switch_to+0x47/0xf50 [ 13.878651] ? __schedule+0x10cc/0x2b60 [ 13.878674] ? __pfx_read_tsc+0x10/0x10 [ 13.878695] ? ktime_get_ts64+0x86/0x230 [ 13.878720] kunit_try_run_case+0x1a5/0x480 [ 13.878745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.878768] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.878793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.878817] ? __kthread_parkme+0x82/0x180 [ 13.878839] ? preempt_count_sub+0x50/0x80 [ 13.878862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.878886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.878910] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.878933] kthread+0x337/0x6f0 [ 13.878953] ? trace_preempt_on+0x20/0xc0 [ 13.878977] ? __pfx_kthread+0x10/0x10 [ 13.878997] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.879018] ? calculate_sigpending+0x7b/0xa0 [ 13.879042] ? __pfx_kthread+0x10/0x10 [ 13.879064] ret_from_fork+0x116/0x1d0 [ 13.879082] ? __pfx_kthread+0x10/0x10 [ 13.879102] ret_from_fork_asm+0x1a/0x30 [ 13.879135] </TASK> [ 13.879144] [ 13.891219] The buggy address belongs to stack of task kunit_try_catch/267 [ 13.892107] and is located at offset 138 in frame: [ 13.892716] kasan_stack_oob+0x0/0x300 [ 13.893581] [ 13.893840] This frame has 4 objects: [ 13.894372] [48, 49) '__assertion' [ 13.894399] [64, 72) 'array' [ 13.894950] [96, 112) '__assertion' [ 13.895592] [128, 138) 'stack_array' [ 13.895918] [ 13.896121] The buggy address belongs to the physical page: [ 13.896304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b47 [ 13.897200] flags: 0x200000000000000(node=0|zone=2) [ 13.897723] raw: 0200000000000000 ffffea00040ed1c8 ffffea00040ed1c8 0000000000000000 [ 13.897965] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 13.898193] page dumped because: kasan: bad access detected [ 13.898366] [ 13.898449] Memory state around the buggy address: [ 13.898636] ffff888103b47c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 13.898852] ffff888103b47c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 13.899388] >ffff888103b47d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 13.899744] ^ [ 13.899941] ffff888103b47d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 13.900170] ffff888103b47e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.900542] ==================================================================
[ 14.136459] ================================================================== [ 14.137517] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300 [ 14.137936] Read of size 1 at addr ffff888103a97d02 by task kunit_try_catch/266 [ 14.138303] [ 14.138421] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.138471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.138483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.138508] Call Trace: [ 14.138522] <TASK> [ 14.138542] dump_stack_lvl+0x73/0xb0 [ 14.138577] print_report+0xd1/0x610 [ 14.138678] ? __virt_addr_valid+0x1db/0x2d0 [ 14.138704] ? kasan_stack_oob+0x2b5/0x300 [ 14.138724] ? kasan_addr_to_slab+0x11/0xa0 [ 14.138745] ? kasan_stack_oob+0x2b5/0x300 [ 14.138765] kasan_report+0x141/0x180 [ 14.138787] ? kasan_stack_oob+0x2b5/0x300 [ 14.138813] __asan_report_load1_noabort+0x18/0x20 [ 14.138838] kasan_stack_oob+0x2b5/0x300 [ 14.138857] ? __pfx_kasan_stack_oob+0x10/0x10 [ 14.138879] ? __kasan_check_write+0x18/0x20 [ 14.138898] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.138923] ? irqentry_exit+0x2a/0x60 [ 14.138945] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 14.138971] ? __pfx_read_tsc+0x10/0x10 [ 14.138991] ? ktime_get_ts64+0x86/0x230 [ 14.139027] kunit_try_run_case+0x1a5/0x480 [ 14.139053] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.139076] ? queued_spin_lock_slowpath+0x116/0xb40 [ 14.139099] ? __kthread_parkme+0x82/0x180 [ 14.139170] ? preempt_count_sub+0x50/0x80 [ 14.139194] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.139218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.139242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.139266] kthread+0x337/0x6f0 [ 14.139285] ? trace_preempt_on+0x20/0xc0 [ 14.139308] ? __pfx_kthread+0x10/0x10 [ 14.139328] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.139351] ? calculate_sigpending+0x7b/0xa0 [ 14.139376] ? __pfx_kthread+0x10/0x10 [ 14.139397] ret_from_fork+0x116/0x1d0 [ 14.139416] ? __pfx_kthread+0x10/0x10 [ 14.139435] ret_from_fork_asm+0x1a/0x30 [ 14.139466] </TASK> [ 14.139478] [ 14.148000] The buggy address belongs to stack of task kunit_try_catch/266 [ 14.148473] and is located at offset 138 in frame: [ 14.148687] kasan_stack_oob+0x0/0x300 [ 14.148966] [ 14.149091] This frame has 4 objects: [ 14.149380] [48, 49) '__assertion' [ 14.149404] [64, 72) 'array' [ 14.149726] [96, 112) '__assertion' [ 14.149848] [128, 138) 'stack_array' [ 14.149985] [ 14.150387] The buggy address belongs to the physical page: [ 14.150857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a97 [ 14.151273] flags: 0x200000000000000(node=0|zone=2) [ 14.151580] raw: 0200000000000000 ffffea00040ea5c8 ffffea00040ea5c8 0000000000000000 [ 14.151899] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 14.152238] page dumped because: kasan: bad access detected [ 14.152569] [ 14.152657] Memory state around the buggy address: [ 14.152862] ffff888103a97c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 14.153095] ffff888103a97c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 [ 14.153313] >ffff888103a97d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 [ 14.153527] ^ [ 14.153656] ffff888103a97d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00 [ 14.154028] ffff888103a97e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.154341] ==================================================================