Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   39.394852] ==================================================================
[   39.404080] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   39.411544] Read of size 1 at addr ffff800089527b5f by task kunit_try_catch/298
[   39.418836] 
[   39.420321] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   39.420378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   39.420397] Hardware name: WinLink E850-96 board (DT)
[   39.420421] Call trace:
[   39.420438]  show_stack+0x20/0x38 (C)
[   39.420477]  dump_stack_lvl+0x8c/0xd0
[   39.420514]  print_report+0x310/0x608
[   39.420551]  kasan_report+0xdc/0x128
[   39.420587]  __asan_report_load1_noabort+0x20/0x30
[   39.420628]  kasan_alloca_oob_left+0x2b8/0x310
[   39.420659]  kunit_try_run_case+0x170/0x3f0
[   39.420697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   39.420733]  kthread+0x328/0x630
[   39.420764]  ret_from_fork+0x10/0x20
[   39.420798] 
[   39.483420] The buggy address belongs to stack of task kunit_try_catch/298
[   39.490296] 
[   39.491757] The buggy address belongs to the virtual mapping at
[   39.491757]  [ffff800089520000, ffff800089529000) created by:
[   39.491757]  kernel_clone+0x150/0x7a8
[   39.507027] 
[   39.508507] The buggy address belongs to the physical page:
[   39.514063] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886482
[   39.522046] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   39.528567] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   39.536287] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.544007] page dumped because: kasan: bad access detected
[   39.549561] 
[   39.551037] Memory state around the buggy address:
[   39.555817]  ffff800089527a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.563020]  ffff800089527a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.570226] >ffff800089527b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   39.577425]                                                     ^
[   39.583505]  ffff800089527b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   39.590710]  ffff800089527c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   39.597913] ==================================================================

[   28.830842] ==================================================================
[   28.831056] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   28.831963] Read of size 1 at addr ffff800080867b5f by task kunit_try_catch/251
[   28.833182] 
[   28.833742] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.835390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.835477] Hardware name: linux,dummy-virt (DT)
[   28.835567] Call trace:
[   28.836409]  show_stack+0x20/0x38 (C)
[   28.836690]  dump_stack_lvl+0x8c/0xd0
[   28.836838]  print_report+0x310/0x608
[   28.837455]  kasan_report+0xdc/0x128
[   28.839597]  __asan_report_load1_noabort+0x20/0x30
[   28.839758]  kasan_alloca_oob_left+0x2b8/0x310
[   28.839884]  kunit_try_run_case+0x170/0x3f0
[   28.840041]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.840173]  kthread+0x328/0x630
[   28.840284]  ret_from_fork+0x10/0x20
[   28.840406] 
[   28.840459] The buggy address belongs to stack of task kunit_try_catch/251
[   28.840617] 
[   28.840682] The buggy address belongs to the virtual mapping at
[   28.840682]  [ffff800080860000, ffff800080869000) created by:
[   28.840682]  kernel_clone+0x150/0x7a8
[   28.840885] 
[   28.840983] The buggy address belongs to the physical page:
[   28.841086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab9
[   28.841302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.841902] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.842059] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.842173] page dumped because: kasan: bad access detected
[   28.842260] 
[   28.842307] Memory state around the buggy address:
[   28.842389]  ffff800080867a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.842504]  ffff800080867a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.845013] >ffff800080867b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   28.845625]                                                     ^
[   28.845739]  ffff800080867b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   28.845875]  ffff800080867c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.846033] ==================================================================

[   28.938951] ==================================================================
[   28.939278] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   28.939455] Read of size 1 at addr ffff800080a97b5f by task kunit_try_catch/251
[   28.939753] 
[   28.939868] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.940331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.940406] Hardware name: linux,dummy-virt (DT)
[   28.940486] Call trace:
[   28.940552]  show_stack+0x20/0x38 (C)
[   28.940736]  dump_stack_lvl+0x8c/0xd0
[   28.940965]  print_report+0x310/0x608
[   28.941164]  kasan_report+0xdc/0x128
[   28.941352]  __asan_report_load1_noabort+0x20/0x30
[   28.941508]  kasan_alloca_oob_left+0x2b8/0x310
[   28.941714]  kunit_try_run_case+0x170/0x3f0
[   28.941878]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.942025]  kthread+0x328/0x630
[   28.942152]  ret_from_fork+0x10/0x20
[   28.942347] 
[   28.942438] The buggy address belongs to stack of task kunit_try_catch/251
[   28.942643] 
[   28.942717] The buggy address belongs to the virtual mapping at
[   28.942717]  [ffff800080a90000, ffff800080a99000) created by:
[   28.942717]  kernel_clone+0x150/0x7a8
[   28.943086] 
[   28.943275] The buggy address belongs to the physical page:
[   28.943506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10776f
[   28.943652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.943825] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   28.943976] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.944084] page dumped because: kasan: bad access detected
[   28.944177] 
[   28.944323] Memory state around the buggy address:
[   28.944587]  ffff800080a97a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.944733]  ffff800080a97a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.944870] >ffff800080a97b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   28.944985]                                                     ^
[   28.945146]  ffff800080a97b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   28.945300]  ffff800080a97c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   28.945446] ==================================================================

[   21.932366] ==================================================================
[   21.933253] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380
[   21.934063] Read of size 1 at addr ffff888103b17c3f by task kunit_try_catch/269
[   21.935086] 
[   21.935403] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.935556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.935595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.935765] Call Trace:
[   21.935809]  <TASK>
[   21.935864]  dump_stack_lvl+0x73/0xb0
[   21.935958]  print_report+0xd1/0x650
[   21.936040]  ? __virt_addr_valid+0x1db/0x2d0
[   21.936123]  ? kasan_alloca_oob_left+0x320/0x380
[   21.936195]  ? kasan_addr_to_slab+0x11/0xa0
[   21.936271]  ? kasan_alloca_oob_left+0x320/0x380
[   21.936347]  kasan_report+0x141/0x180
[   21.936430]  ? kasan_alloca_oob_left+0x320/0x380
[   21.936535]  __asan_report_load1_noabort+0x18/0x20
[   21.936643]  kasan_alloca_oob_left+0x320/0x380
[   21.936714]  ? __kasan_check_write+0x18/0x20
[   21.936786]  ? __pfx_sched_clock_cpu+0x10/0x10
[   21.936862]  ? finish_task_switch.isra.0+0x153/0x700
[   21.936936]  ? __mutex_lock.constprop.0+0x93e/0x1280
[   21.937024]  ? trace_hardirqs_on+0x37/0xe0
[   21.937111]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   21.937195]  ? __schedule+0x10cc/0x2b60
[   21.937365]  ? __pfx_read_tsc+0x10/0x10
[   21.937426]  ? ktime_get_ts64+0x86/0x230
[   21.937464]  kunit_try_run_case+0x1a5/0x480
[   21.937530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.937666]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.937741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.937810]  ? __kthread_parkme+0x82/0x180
[   21.937870]  ? preempt_count_sub+0x50/0x80
[   21.937938]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.938008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.938075]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.938146]  kthread+0x337/0x6f0
[   21.938180]  ? trace_preempt_on+0x20/0xc0
[   21.938215]  ? __pfx_kthread+0x10/0x10
[   21.938296]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.938332]  ? calculate_sigpending+0x7b/0xa0
[   21.938370]  ? __pfx_kthread+0x10/0x10
[   21.938400]  ret_from_fork+0x116/0x1d0
[   21.938427]  ? __pfx_kthread+0x10/0x10
[   21.938455]  ret_from_fork_asm+0x1a/0x30
[   21.938523]  </TASK>
[   21.938555] 
[   21.962430] The buggy address belongs to stack of task kunit_try_catch/269
[   21.963189] 
[   21.963906] The buggy address belongs to the physical page:
[   21.964415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b17
[   21.965083] flags: 0x200000000000000(node=0|zone=2)
[   21.966076] raw: 0200000000000000 ffffea00040ec5c8 ffffea00040ec5c8 0000000000000000
[   21.967052] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.968075] page dumped because: kasan: bad access detected
[   21.969198] 
[   21.969563] Memory state around the buggy address:
[   21.970439]  ffff888103b17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.971313]  ffff888103b17b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.972220] >ffff888103b17c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   21.972991]                                         ^
[   21.974245]  ffff888103b17c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   21.974931]  ffff888103b17d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   21.975196] ==================================================================

[   20.712277] ==================================================================
[   20.713606] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x320/0x380
[   20.715064] Read of size 1 at addr ffff8881038c7c3f by task kunit_try_catch/269
[   20.716008] 
[   20.716319] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   20.716418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.716460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.716521] Call Trace:
[   20.716558]  <TASK>
[   20.716812]  dump_stack_lvl+0x73/0xb0
[   20.716871]  print_report+0xd1/0x650
[   20.716939]  ? __virt_addr_valid+0x1db/0x2d0
[   20.716974]  ? kasan_alloca_oob_left+0x320/0x380
[   20.717006]  ? kasan_addr_to_slab+0x11/0xa0
[   20.717037]  ? kasan_alloca_oob_left+0x320/0x380
[   20.717068]  kasan_report+0x141/0x180
[   20.717106]  ? kasan_alloca_oob_left+0x320/0x380
[   20.717277]  __asan_report_load1_noabort+0x18/0x20
[   20.717317]  kasan_alloca_oob_left+0x320/0x380
[   20.717352]  ? __pfx_sched_clock_cpu+0x10/0x10
[   20.717386]  ? finish_task_switch.isra.0+0x153/0x700
[   20.717418]  ? __mutex_lock.constprop.0+0x93e/0x1280
[   20.717456]  ? trace_hardirqs_on+0x37/0xe0
[   20.717490]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   20.717564]  ? __schedule+0x10cc/0x2b60
[   20.717646]  ? __pfx_read_tsc+0x10/0x10
[   20.717681]  ? ktime_get_ts64+0x86/0x230
[   20.717716]  kunit_try_run_case+0x1a5/0x480
[   20.717754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.717789]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.717826]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.717860]  ? __kthread_parkme+0x82/0x180
[   20.717916]  ? preempt_count_sub+0x50/0x80
[   20.717950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.717987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.718022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.718058]  kthread+0x337/0x6f0
[   20.718086]  ? trace_preempt_on+0x20/0xc0
[   20.718155]  ? __pfx_kthread+0x10/0x10
[   20.718188]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.718220]  ? calculate_sigpending+0x7b/0xa0
[   20.718265]  ? __pfx_kthread+0x10/0x10
[   20.718296]  ret_from_fork+0x116/0x1d0
[   20.718323]  ? __pfx_kthread+0x10/0x10
[   20.718352]  ret_from_fork_asm+0x1a/0x30
[   20.718394]  </TASK>
[   20.718409] 
[   20.743971] The buggy address belongs to stack of task kunit_try_catch/269
[   20.744849] 
[   20.745264] The buggy address belongs to the physical page:
[   20.746190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038c7
[   20.747039] flags: 0x200000000000000(node=0|zone=2)
[   20.747717] raw: 0200000000000000 ffffea00040e31c8 ffffea00040e31c8 0000000000000000
[   20.748785] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   20.749821] page dumped because: kasan: bad access detected
[   20.750380] 
[   20.750916] Memory state around the buggy address:
[   20.751391]  ffff8881038c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.752578]  ffff8881038c7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.753305] >ffff8881038c7c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   20.754371]                                         ^
[   20.754967]  ffff8881038c7c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   20.756066]  ffff8881038c7d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   20.756967] ==================================================================

[   22.470069] ==================================================================
[   22.471109] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   22.471817] Read of size 1 at addr ffff800089717b5f by task kunit_try_catch/304
[   22.472496] 
[   22.472660] CPU: 3 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.472713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.472728] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.472747] Call trace:
[   22.472759]  show_stack+0x20/0x38 (C)
[   22.472795]  dump_stack_lvl+0x8c/0xd0
[   22.472832]  print_report+0x310/0x608
[   22.472867]  kasan_report+0xdc/0x128
[   22.472899]  __asan_report_load1_noabort+0x20/0x30
[   22.472938]  kasan_alloca_oob_left+0x2b8/0x310
[   22.472970]  kunit_try_run_case+0x170/0x3f0
[   22.473006]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.473045]  kthread+0x328/0x630
[   22.473072]  ret_from_fork+0x10/0x20
[   22.473104] 
[   22.478709] The buggy address belongs to stack of task kunit_try_catch/304
[   22.479360] 
[   22.479520] The buggy address belongs to the virtual mapping at
[   22.479520]  [ffff800089710000, ffff800089719000) created by:
[   22.479520]  kernel_clone+0x150/0x7a8
[   22.480913] 
[   22.481069] The buggy address belongs to the physical page:
[   22.481585] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe36a
[   22.482310] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   22.482934] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   22.483650] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.484358] page dumped because: kasan: bad access detected
[   22.484873] 
[   22.485026] Memory state around the buggy address:
[   22.485475]  ffff800089717a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.486142]  ffff800089717a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.486809] >ffff800089717b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   22.487470]                                                     ^
[   22.488036]  ffff800089717b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   22.488703]  ffff800089717c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   22.489366] ==================================================================