Hay
Date
July 19, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.464665] ==================================================================
[   17.464778] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   17.464837] Read of size 1 at addr ffff800080b57b4a by task kunit_try_catch/253
[   17.464888] 
[   17.464920] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.465152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.465222] Hardware name: linux,dummy-virt (DT)
[   17.465411] Call trace:
[   17.465444]  show_stack+0x20/0x38 (C)
[   17.465523]  dump_stack_lvl+0x8c/0xd0
[   17.465596]  print_report+0x310/0x5d0
[   17.465677]  kasan_report+0xdc/0x128
[   17.465762]  __asan_report_load1_noabort+0x20/0x30
[   17.465843]  kasan_alloca_oob_right+0x2dc/0x340
[   17.465944]  kunit_try_run_case+0x170/0x3f0
[   17.465995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.466051]  kthread+0x328/0x630
[   17.466093]  ret_from_fork+0x10/0x20
[   17.466211] 
[   17.466237] The buggy address belongs to stack of task kunit_try_catch/253
[   17.466292] 
[   17.466332] The buggy address ffff800080b57b4a belongs to a vmalloc virtual mapping
[   17.466397] The buggy address belongs to the physical page:
[   17.466702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c7
[   17.466798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.466931] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   17.467005] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.467050] page dumped because: kasan: bad access detected
[   17.467104] 
[   17.467142] Memory state around the buggy address:
[   17.467199]  ffff800080b57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.467264]  ffff800080b57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.467339] >ffff800080b57b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   17.467382]                                               ^
[   17.467420]  ffff800080b57b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   17.473762]     # kasan_memchr: EXPECTATION FAILED at mm/kasan/kasan_test_c.c:1535
[   17.473762]     KASAN failure expected in \"kasan_ptr_result = memchr(ptr, '1', size + 1)\", but none occurred
[   17.483144]  fff00000c7914000: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   17.491387] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   17.492606] Allocated by task 259:
[   17.492799]  __kasan_kmalloc+0xd4/0xd8
[   17.493481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.493891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107914
[   17.494551]  fff00000c7914300: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   17.496855]  kthread+0x328/0x630
[   17.498228]  kasan_save_track+0x20/0x40
[   17.499723] The buggy address is located 16 bytes inside of
[   17.499723]  freed 32-byte region [fff00000c7914240, fff00000c7914260)
[   17.504866] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   17.505540]  dump_stack_lvl+0x8c/0xd0
[   17.507161]  kunit_try_run_case+0x170/0x3f0
[   17.507788]  kasan_save_free_info+0x4c/0x78
[   17.508623] 
[   17.509573] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   17.512461]  kasan_report+0xdc/0x128
[   17.513203]  kasan_save_stack+0x3c/0x68
[   17.514641] The buggy address is located 16 bytes inside of
[   17.514641]  freed 32-byte region [fff00000c7914240, fff00000c7914260)
[   17.521248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.521739]  kasan_bitops_generic+0x110/0x1c8
[   17.522621] 
[   17.523515] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.523971]  fff00000c61b2700: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.526207] Call trace:
[   17.526849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.527861] The buggy address is located 8 bytes inside of
[   17.527861]  allocated 9-byte region [fff00000c61b27a0, fff00000c61b27a9)
[   17.530224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   17.531413]  kasan_bitops_generic+0x110/0x1c8
[   17.534791]  ret_from_fork+0x10/0x20
[   17.536184] page dumped because: kasan: bad access detected
[   17.537467]  fff00000c61b2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.541044]  __asan_report_load8_noabort+0x20/0x30
[   17.542949] The buggy address is located 8 bytes inside of
[   17.542949]  allocated 9-byte region [fff00000c61b27a0, fff00000c61b27a9)
[   17.544817] Write of size 8 at addr fff00000c61b27a8 by task kunit_try_catch/261
[   17.548336]  kunit_try_run_case+0x170/0x3f0
[   17.550542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.552533]  fff00000c61b2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.555774]  dump_stack_lvl+0x8c/0xd0
[   17.558000] 
[   17.558797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.559501] 
[   17.559565]  fff00000c61b2680: 00 05 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc
[   17.562194] Read of size 8 at addr fff00000c61b27a8 by task kunit_try_catch/261
[   17.566495] The buggy address is located 8 bytes inside of
[   17.566495]  allocated 9-byte region [fff00000c61b27a0, fff00000c61b27a9)
[   17.569836] 
[   17.570980]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   17.573483] 
[   17.574265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.574867]  fff00000c61b2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.576115]  __kasan_check_write+0x20/0x30
[   17.581353] page_type: f5(slab)
[   17.582724] >fff00000c61b2780: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.585418] Read of size 8 at addr fff00000c61b27a8 by task kunit_try_catch/261
[   17.587422]  kasan_bitops_generic+0x110/0x1c8
[   17.592219] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.594789] Hardware name: linux,dummy-virt (DT)
[   17.598545] The buggy address is located 8 bytes inside of
[   17.598545]  allocated 9-byte region [fff00000c61b27a0, fff00000c61b27a9)
[   17.602471] Read of size 8 at addr fff00000c61b27a8 by task kunit_try_catch/261
[   17.604492]  kthread+0x328/0x630
[   17.609207]  fff00000c61b2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.611730]  dump_stack_lvl+0x8c/0xd0
[   17.615017]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.617077] >fff00000c61b2780: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc
[   17.620714]  show_stack+0x20/0x38 (C)
[   17.624103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.625354] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.626915] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   17.632900] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.634647]  fff00000c61b2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.638649]  kthread+0x328/0x630
[   17.640836] The buggy address belongs to the object at fff00000c61b27a0
[   17.640836]  which belongs to the cache kmalloc-16 of size 16
[   17.643570]  fff00000c61b2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.646518] 
[   17.647496] 
[   17.647695]                                   ^
[   17.649914] Read of size 8 at addr fff00000c61b27a8 by task kunit_try_catch/261
[   17.654856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061b2
[   17.656707]                                   ^
[   17.658404] Read of size 8 at addr fff00000c61b27a8 by task kunit_try_catch/261
[   17.661509]  ret_from_fork+0x10/0x20
[   17.663737]                                   ^
[   17.675280]     ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   17.681857]  kasan_atomics_helper+0x40a8/0x4858
[   17.685235] page_type: f5(slab)
[   17.686286]  fff00000c7915580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.687601] 
[   17.688697]  kasan_atomics_helper+0x3f7c/0x4858
[   17.690788]  kunit_try_run_case+0x170/0x3f0
[   17.691710] The buggy address belongs to the physical page:
[   17.693117]  fff00000c7915480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.694591] ==================================================================

[   13.840460] ==================================================================
[   13.842111] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390
[   13.843217] Read of size 1 at addr ffff888103aafc4a by task kunit_try_catch/270
[   13.844075] 
[   13.844189] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.844339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.844355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.844430] Call Trace:
[   13.844444]  <TASK>
[   13.844458]  dump_stack_lvl+0x73/0xb0
[   13.844490]  print_report+0xd1/0x610
[   13.844511]  ? __virt_addr_valid+0x1db/0x2d0
[   13.844532]  ? kasan_alloca_oob_right+0x329/0x390
[   13.844553]  ? kasan_addr_to_slab+0x11/0xa0
[   13.844573]  ? kasan_alloca_oob_right+0x329/0x390
[   13.844595]  kasan_report+0x141/0x180
[   13.844616]  ? kasan_alloca_oob_right+0x329/0x390
[   13.844642]  __asan_report_load1_noabort+0x18/0x20
[   13.844665]  kasan_alloca_oob_right+0x329/0x390
[   13.844685]  ? __kasan_check_write+0x18/0x20
[   13.844704]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.844725]  ? finish_task_switch.isra.0+0x153/0x700
[   13.844746]  ? rt_mutex_adjust_prio_chain+0x195e/0x20e0
[   13.844768]  ? trace_hardirqs_on+0x37/0xe0
[   13.844792]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   13.844815]  ? __schedule+0x10cc/0x2b60
[   13.844836]  ? __pfx_read_tsc+0x10/0x10
[   13.844856]  ? ktime_get_ts64+0x86/0x230
[   13.844878]  kunit_try_run_case+0x1a5/0x480
[   13.844902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.844923]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.844945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.844973]  ? __kthread_parkme+0x82/0x180
[   13.844993]  ? preempt_count_sub+0x50/0x80
[   13.845027]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.845050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.845072]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.845095]  kthread+0x337/0x6f0
[   13.845113]  ? trace_preempt_on+0x20/0xc0
[   13.845134]  ? __pfx_kthread+0x10/0x10
[   13.845154]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.845175]  ? calculate_sigpending+0x7b/0xa0
[   13.845197]  ? __pfx_kthread+0x10/0x10
[   13.845218]  ret_from_fork+0x116/0x1d0
[   13.845235]  ? __pfx_kthread+0x10/0x10
[   13.845255]  ret_from_fork_asm+0x1a/0x30
[   13.845284]  </TASK>
[   13.845294] 
[   13.854643] The buggy address belongs to stack of task kunit_try_catch/270
[   13.855119] 
[   13.855194] The buggy address belongs to the physical page:
[   13.855367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103aaf
[   13.855725] flags: 0x200000000000000(node=0|zone=2)
[   13.856047] raw: 0200000000000000 ffffea00040eabc8 ffffea00040eabc8 0000000000000000
[   13.856435] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   13.856689] page dumped because: kasan: bad access detected
[   13.856861] 
[   13.856933] Memory state around the buggy address:
[   13.857201]  ffff888103aafb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.857659]  ffff888103aafb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.857980] >ffff888103aafc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   13.858242]                                               ^
[   13.858525]  ffff888103aafc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   13.859115]  ffff888103aafd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   13.859435] ==================================================================