Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  106.726484] ==================================================================
[  106.727797] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x108/0x1e4
[  106.728897] Read of size 1 at addr ffff800008a97cdf by task kunit_try_catch/239
[  106.730037] 
[  106.730605] CPU: 1 PID: 239 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  106.731791] Hardware name: linux,dummy-virt (DT)
[  106.732660] Call trace:
[  106.733239]  dump_backtrace+0xe0/0x134
[  106.734019]  show_stack+0x20/0x2c
[  106.734771]  dump_stack_lvl+0x88/0xb4
[  106.735572]  print_report+0x158/0x44c
[  106.736317]  kasan_report+0xc8/0x180
[  106.737164]  __asan_load1+0x68/0x74
[  106.738031]  kasan_alloca_oob_left+0x108/0x1e4
[  106.738608]  kunit_try_run_case+0x8c/0x124
[  106.739050]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  106.739546]  kthread+0x15c/0x170
[  106.740198]  ret_from_fork+0x10/0x20
[  106.741088] 
[  106.741526] The buggy address belongs to stack of task kunit_try_catch/239
[  106.742734] 
[  106.743038] The buggy address ffff800008a97cdf belongs to a vmalloc virtual mapping
[  106.743985] The buggy address belongs to the physical page:
[  106.744381] page:00000000a9d5ccdc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c1
[  106.746049] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  106.747124] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  106.748513] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  106.749697] page dumped because: kasan: bad access detected
[  106.750484] 
[  106.750675] Memory state around the buggy address:
[  106.751601]  ffff800008a97b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  106.752866]  ffff800008a97c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  106.754070] >ffff800008a97c80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[  106.754791]                                                     ^
[  106.755223]  ffff800008a97d00: cb cb cb cb f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[  106.755711]  ffff800008a97d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
[  106.756845] ==================================================================

[   74.071545] ==================================================================
[   74.072272] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x100/0x1dc
[   74.072877] Read of size 1 at addr ffff8000087b7cbf by task kunit_try_catch/155
[   74.073341] 
[   74.074336] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.075701] Hardware name: linux,dummy-virt (DT)
[   74.076702] Call trace:
[   74.077167]  dump_backtrace.part.0+0xdc/0xf0
[   74.078215]  show_stack+0x18/0x30
[   74.079075]  dump_stack_lvl+0x64/0x80
[   74.079931]  print_report+0x158/0x438
[   74.080794]  kasan_report+0xb4/0xf4
[   74.081607]  __asan_load1+0x68/0x74
[   74.082511]  kasan_alloca_oob_left+0x100/0x1dc
[   74.083435]  kunit_try_run_case+0x84/0x120
[   74.084345]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.085436]  kthread+0x180/0x190
[   74.086320]  ret_from_fork+0x10/0x20
[   74.087173] 
[   74.087809] The buggy address belongs to stack of task kunit_try_catch/155
[   74.088809] 
[   74.089359] The buggy address ffff8000087b7cbf belongs to a vmalloc virtual mapping
[   74.090616] The buggy address belongs to the physical page:
[   74.091218] page:00000000b2a89bce refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105956
[   74.091820] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   74.092321] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   74.093947] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.094614] page dumped because: kasan: bad access detected
[   74.095048] 
[   74.095266] Memory state around the buggy address:
[   74.095904]  ffff8000087b7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.096598]  ffff8000087b7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.097194] >ffff8000087b7c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   74.098140]                                         ^
[   74.098600]  ffff8000087b7d00: 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00
[   74.099187]  ffff8000087b7d80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.099760] ==================================================================

[   65.564092] ==================================================================
[   65.564788] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x104/0x1e0
[   65.565340] Read of size 1 at addr ffff800008787c3f by task kunit_try_catch/153
[   65.567108] 
[   65.567558] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.568689] Hardware name: linux,dummy-virt (DT)
[   65.569426] Call trace:
[   65.570004]  dump_backtrace+0x110/0x120
[   65.570668]  show_stack+0x18/0x28
[   65.571238]  dump_stack_lvl+0x68/0x84
[   65.571827]  print_report+0x158/0x484
[   65.572392]  kasan_report+0x98/0xe0
[   65.572940]  __asan_load1+0x68/0x78
[   65.573521]  kasan_alloca_oob_left+0x104/0x1e0
[   65.574288]  kunit_try_run_case+0x7c/0x120
[   65.574923]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.575684]  kthread+0x1a4/0x1b8
[   65.575986]  ret_from_fork+0x10/0x20
[   65.576321] 
[   65.576533] The buggy address belongs to stack of task kunit_try_catch/153
[   65.577054] 
[   65.577288] The buggy address ffff800008787c3f belongs to a vmalloc virtual mapping
[   65.577954] The buggy address belongs to the physical page:
[   65.578563] page:00000000ad08535f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a9
[   65.579362] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   65.579819] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   65.580299] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   65.581144] page dumped because: kasan: bad access detected
[   65.581878] 
[   65.582129] Memory state around the buggy address:
[   65.582788]  ffff800008787b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.583626]  ffff800008787b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.584456] >ffff800008787c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   65.585250]                                         ^
[   65.586449]  ffff800008787c80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[   65.587299]  ffff800008787d00: 01 f2 f2 f2 f2 f2 f2 f2 04 f2 f2 f2 f2 f2 f2 f2
[   65.587724] ==================================================================

[   31.766805] ==================================================================
[   31.767532] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xfd/0x1e0
[   31.767956] Read of size 1 at addr ffff888103597d9f by task kunit_try_catch/259
[   31.768635] 
[   31.768870] CPU: 1 PID: 259 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.769413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.769937] Call Trace:
[   31.770206]  <TASK>
[   31.770480]  dump_stack_lvl+0x49/0x62
[   31.770748]  print_report+0x189/0x492
[   31.771176]  ? kasan_addr_to_slab+0xd/0xb0
[   31.771546]  ? kasan_alloca_oob_left+0xfd/0x1e0
[   31.771989]  kasan_report+0x10c/0x190
[   31.772533]  ? kasan_alloca_oob_left+0xfd/0x1e0
[   31.773045]  __asan_load1+0x62/0x70
[   31.773470]  kasan_alloca_oob_left+0xfd/0x1e0
[   31.773927]  ? __kunit_add_resource+0x7c/0x100
[   31.774423]  ? irqentry_exit+0x25/0x60
[   31.774835]  ? sysvec_apic_timer_interrupt+0x90/0xa0
[   31.775360]  ? trace_hardirqs_on+0x38/0x110
[   31.775814]  ? irqentry_exit+0x25/0x60
[   31.776237]  ? kasan_alloca_oob_right+0x1f0/0x1f0
[   31.776714]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[   31.777072]  ? kasan_alloca_oob_right+0x1f0/0x1f0
[   31.777433]  ? kunit_try_run_case+0x84/0xd0
[   31.777864]  ? __kunit_add_resource+0xd1/0x100
[   31.778363]  kunit_try_run_case+0x8f/0xd0
[   31.778788]  ? kunit_catch_run_case+0x80/0x80
[   31.779091]  ? kunit_try_catch_throw+0x40/0x40
[   31.779474]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.780008]  kthread+0x17b/0x1b0
[   31.780398]  ? kthread_complete_and_exit+0x30/0x30
[   31.780738]  ret_from_fork+0x22/0x30
[   31.780930]  </TASK>
[   31.781049] 
[   31.781138] The buggy address belongs to stack of task kunit_try_catch/259
[   31.781451] 
[   31.781568] The buggy address belongs to the physical page:
[   31.781830] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103597
[   31.782286] flags: 0x200000000000000(node=0|zone=2)
[   31.782563] raw: 0200000000000000 ffffea00040d65c8 ffffea00040d65c8 0000000000000000
[   31.782875] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   31.783289] page dumped because: kasan: bad access detected
[   31.783542] 
[   31.783655] Memory state around the buggy address:
[   31.783856]  ffff888103597c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.784236]  ffff888103597d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.784553] >ffff888103597d80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 f1 f1
[   31.784869]                             ^
[   31.785095]  ffff888103597e00: f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00
[   31.785457]  ffff888103597e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.785755] ==================================================================