Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.043858] ==================================================================
[   18.043931] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   18.043981] Read of size 1 at addr ffff800080a77c2a by task kunit_try_catch/250
[   18.044041] 
[   18.044086] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.044214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.044241] Hardware name: linux,dummy-virt (DT)
[   18.044631] Call trace:
[   18.044660]  show_stack+0x20/0x38 (C)
[   18.044740]  dump_stack_lvl+0x8c/0xd0
[   18.044790]  print_report+0x310/0x5d0
[   18.044836]  kasan_report+0xdc/0x128
[   18.044925]  __asan_report_load1_noabort+0x20/0x30
[   18.045123]  kasan_stack_oob+0x238/0x270
[   18.045272]  kunit_try_run_case+0x170/0x3f0
[   18.045378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.045495]  kthread+0x328/0x630
[   18.045549]  ret_from_fork+0x10/0x20
[   18.045596] 
[   18.045780] The buggy address belongs to stack of task kunit_try_catch/250
[   18.046079]  and is located at offset 138 in frame:
[   18.046156]  kasan_stack_oob+0x0/0x270
[   18.046469] 
[   18.046499] This frame has 4 objects:
[   18.047166]  [48, 49) '__assertion'
[   18.047295]  [64, 72) 'array'
[   18.047430]  [96, 112) '__assertion'
[   18.047925]  [128, 138) 'stack_array'
[   18.048047] 
[   18.048211] The buggy address ffff800080a77c2a belongs to a vmalloc virtual mapping
[   18.048265] The buggy address belongs to the physical page:
[   18.048706] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058af
[   18.048834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.048920] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.048973] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.049034] page dumped because: kasan: bad access detected
[   18.049217] 
[   18.049389] Memory state around the buggy address:
[   18.049478]  ffff800080a77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.049526]  ffff800080a77b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   18.049799] >ffff800080a77c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   18.049959]                                   ^
[   18.050036]  ffff800080a77c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   18.050102]  ffff800080a77d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.050145] ==================================================================

[   18.809047] ==================================================================
[   18.809259] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   18.809436] Read of size 1 at addr ffff800080a97c2a by task kunit_try_catch/250
[   18.809564] 
[   18.809717] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.809852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.809877] Hardware name: linux,dummy-virt (DT)
[   18.809910] Call trace:
[   18.809931]  show_stack+0x20/0x38 (C)
[   18.809977]  dump_stack_lvl+0x8c/0xd0
[   18.810030]  print_report+0x310/0x5d0
[   18.810075]  kasan_report+0xdc/0x128
[   18.810128]  __asan_report_load1_noabort+0x20/0x30
[   18.810282]  kasan_stack_oob+0x238/0x270
[   18.810498]  kunit_try_run_case+0x170/0x3f0
[   18.810953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.811135]  kthread+0x328/0x630
[   18.811287]  ret_from_fork+0x10/0x20
[   18.811528] 
[   18.811596] The buggy address belongs to stack of task kunit_try_catch/250
[   18.812005]  and is located at offset 138 in frame:
[   18.812049]  kasan_stack_oob+0x0/0x270
[   18.812292] 
[   18.812325] This frame has 4 objects:
[   18.812873]  [48, 49) '__assertion'
[   18.812942]  [64, 72) 'array'
[   18.812975]  [96, 112) '__assertion'
[   18.813058]  [128, 138) 'stack_array'
[   18.813115] 
[   18.813141] The buggy address ffff800080a97c2a belongs to a vmalloc virtual mapping
[   18.813291] The buggy address belongs to the physical page:
[   18.813491] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9f
[   18.813589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.813665] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.813718] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.814001] page dumped because: kasan: bad access detected
[   18.814114] 
[   18.814133] Memory state around the buggy address:
[   18.814202]  ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.814356]  ffff800080a97b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   18.814785] >ffff800080a97c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   18.814973]                                   ^
[   18.815011]  ffff800080a97c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   18.815118]  ffff800080a97d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.815161] ==================================================================

[   14.445190] ==================================================================
[   14.446217] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   14.446471] Read of size 1 at addr ffff8881039f7d02 by task kunit_try_catch/267
[   14.447216] 
[   14.447325] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.447373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.447385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.447408] Call Trace:
[   14.447422]  <TASK>
[   14.447438]  dump_stack_lvl+0x73/0xb0
[   14.447484]  print_report+0xd1/0x610
[   14.447507]  ? __virt_addr_valid+0x1db/0x2d0
[   14.447532]  ? kasan_stack_oob+0x2b5/0x300
[   14.447552]  ? kasan_addr_to_slab+0x11/0xa0
[   14.447575]  ? kasan_stack_oob+0x2b5/0x300
[   14.447596]  kasan_report+0x141/0x180
[   14.447617]  ? kasan_stack_oob+0x2b5/0x300
[   14.447643]  __asan_report_load1_noabort+0x18/0x20
[   14.447669]  kasan_stack_oob+0x2b5/0x300
[   14.447690]  ? __pfx_kasan_stack_oob+0x10/0x10
[   14.447711]  ? finish_task_switch.isra.0+0x153/0x700
[   14.447736]  ? __switch_to+0x47/0xf50
[   14.447763]  ? __schedule+0x10cc/0x2b60
[   14.447786]  ? __pfx_read_tsc+0x10/0x10
[   14.447808]  ? ktime_get_ts64+0x86/0x230
[   14.447834]  kunit_try_run_case+0x1a5/0x480
[   14.447859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.447882]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.447908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.447932]  ? __kthread_parkme+0x82/0x180
[   14.447954]  ? preempt_count_sub+0x50/0x80
[   14.447978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.448004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.448029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.448056]  kthread+0x337/0x6f0
[   14.448074]  ? trace_preempt_on+0x20/0xc0
[   14.448099]  ? __pfx_kthread+0x10/0x10
[   14.448120]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.448142]  ? calculate_sigpending+0x7b/0xa0
[   14.448168]  ? __pfx_kthread+0x10/0x10
[   14.448189]  ret_from_fork+0x116/0x1d0
[   14.448208]  ? __pfx_kthread+0x10/0x10
[   14.448229]  ret_from_fork_asm+0x1a/0x30
[   14.448261]  </TASK>
[   14.448272] 
[   14.456128] The buggy address belongs to stack of task kunit_try_catch/267
[   14.456487]  and is located at offset 138 in frame:
[   14.456872]  kasan_stack_oob+0x0/0x300
[   14.457156] 
[   14.457269] This frame has 4 objects:
[   14.457558]  [48, 49) '__assertion'
[   14.457581]  [64, 72) 'array'
[   14.457795]  [96, 112) '__assertion'
[   14.457953]  [128, 138) 'stack_array'
[   14.458092] 
[   14.458345] The buggy address belongs to the physical page:
[   14.458618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039f7
[   14.458960] flags: 0x200000000000000(node=0|zone=2)
[   14.459159] raw: 0200000000000000 ffffea00040e7dc8 ffffea00040e7dc8 0000000000000000
[   14.459735] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   14.460094] page dumped because: kasan: bad access detected
[   14.460294] 
[   14.460364] Memory state around the buggy address:
[   14.460534]  ffff8881039f7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.460794]  ffff8881039f7c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   14.461109] >ffff8881039f7d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.461536]                    ^
[   14.461750]  ffff8881039f7d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   14.461983]  ffff8881039f7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.462197] ==================================================================

[   14.672150] ==================================================================
[   14.672928] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   14.673750] Read of size 1 at addr ffff888103b67d02 by task kunit_try_catch/267
[   14.674849] 
[   14.675322] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.675375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.675387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.675408] Call Trace:
[   14.675422]  <TASK>
[   14.675440]  dump_stack_lvl+0x73/0xb0
[   14.675473]  print_report+0xd1/0x610
[   14.675498]  ? __virt_addr_valid+0x1db/0x2d0
[   14.675523]  ? kasan_stack_oob+0x2b5/0x300
[   14.675543]  ? kasan_addr_to_slab+0x11/0xa0
[   14.675564]  ? kasan_stack_oob+0x2b5/0x300
[   14.675584]  kasan_report+0x141/0x180
[   14.675607]  ? kasan_stack_oob+0x2b5/0x300
[   14.675632]  __asan_report_load1_noabort+0x18/0x20
[   14.675948]  kasan_stack_oob+0x2b5/0x300
[   14.675973]  ? __pfx_kasan_stack_oob+0x10/0x10
[   14.675995]  ? finish_task_switch.isra.0+0x153/0x700
[   14.676024]  ? __switch_to+0x47/0xf50
[   14.676062]  ? __schedule+0x10cc/0x2b60
[   14.676085]  ? __pfx_read_tsc+0x10/0x10
[   14.676108]  ? ktime_get_ts64+0x86/0x230
[   14.676134]  kunit_try_run_case+0x1a5/0x480
[   14.676161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.676185]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.676211]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.676236]  ? __kthread_parkme+0x82/0x180
[   14.676258]  ? preempt_count_sub+0x50/0x80
[   14.676281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.676307]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.676332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.676358]  kthread+0x337/0x6f0
[   14.676378]  ? trace_preempt_on+0x20/0xc0
[   14.676404]  ? __pfx_kthread+0x10/0x10
[   14.676425]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.676448]  ? calculate_sigpending+0x7b/0xa0
[   14.676474]  ? __pfx_kthread+0x10/0x10
[   14.676496]  ret_from_fork+0x116/0x1d0
[   14.676515]  ? __pfx_kthread+0x10/0x10
[   14.676536]  ret_from_fork_asm+0x1a/0x30
[   14.676569]  </TASK>
[   14.676579] 
[   14.685371] The buggy address belongs to stack of task kunit_try_catch/267
[   14.685843]  and is located at offset 138 in frame:
[   14.686072]  kasan_stack_oob+0x0/0x300
[   14.686413] 
[   14.686513] This frame has 4 objects:
[   14.686862]  [48, 49) '__assertion'
[   14.686887]  [64, 72) 'array'
[   14.687067]  [96, 112) '__assertion'
[   14.687270]  [128, 138) 'stack_array'
[   14.687428] 
[   14.687712] The buggy address belongs to the physical page:
[   14.687890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b67
[   14.688260] flags: 0x200000000000000(node=0|zone=2)
[   14.688475] raw: 0200000000000000 ffffea00040ed9c8 ffffea00040ed9c8 0000000000000000
[   14.688709] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   14.688990] page dumped because: kasan: bad access detected
[   14.689339] 
[   14.689439] Memory state around the buggy address:
[   14.689721]  ffff888103b67c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.690042]  ffff888103b67c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   14.690366] >ffff888103b67d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.690925]                    ^
[   14.691115]  ffff888103b67d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   14.691431]  ffff888103b67e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.691795] ==================================================================