Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  106.694630] ==================================================================
[  106.695573] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc4/0x180
[  106.696425] Read of size 1 at addr ffff800008ac7daa by task kunit_try_catch/238
[  106.697178] 
[  106.697438] CPU: 0 PID: 238 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  106.698197] Hardware name: linux,dummy-virt (DT)
[  106.698653] Call trace:
[  106.698981]  dump_backtrace+0xe0/0x134
[  106.699366]  show_stack+0x20/0x2c
[  106.699828]  dump_stack_lvl+0x88/0xb4
[  106.700346]  print_report+0x158/0x44c
[  106.700837]  kasan_report+0xc8/0x180
[  106.701300]  __asan_load1+0x68/0x74
[  106.701796]  kasan_stack_oob+0xc4/0x180
[  106.702298]  kunit_try_run_case+0x8c/0x124
[  106.702813]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  106.703380]  kthread+0x15c/0x170
[  106.703870]  ret_from_fork+0x10/0x20
[  106.704388] 
[  106.704716] The buggy address belongs to stack of task kunit_try_catch/238
[  106.705335]  and is located at offset 138 in frame:
[  106.706184]  kasan_stack_oob+0x0/0x180
[  106.706879] 
[  106.707143] This frame has 4 objects:
[  106.707650]  [48, 49) '__assertion'
[  106.707763]  [64, 72) 'array'
[  106.708099]  [96, 112) '__assertion'
[  106.708535]  [128, 138) 'stack_array'
[  106.708960] 
[  106.709532] The buggy address ffff800008ac7daa belongs to a vmalloc virtual mapping
[  106.710934] The buggy address belongs to the physical page:
[  106.711453] page:00000000baa18535 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10667b
[  106.712278] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  106.712976] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  106.714032] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  106.714654] page dumped because: kasan: bad access detected
[  106.715182] 
[  106.715416] Memory state around the buggy address:
[  106.715872]  ffff800008ac7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  106.717332]  ffff800008ac7d00: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[  106.718003] >ffff800008ac7d80: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[  106.718621]                                   ^
[  106.719101]  ffff800008ac7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  106.719761]  ffff800008ac7e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  106.720389] ==================================================================

[   74.044968] ==================================================================
[   74.045892] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xb4/0x170
[   74.046870] Read of size 1 at addr ffff8000087b7d9a by task kunit_try_catch/154
[   74.047418] 
[   74.047670] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.048354] Hardware name: linux,dummy-virt (DT)
[   74.048775] Call trace:
[   74.049070]  dump_backtrace.part.0+0xdc/0xf0
[   74.049577]  show_stack+0x18/0x30
[   74.050139]  dump_stack_lvl+0x64/0x80
[   74.050575]  print_report+0x158/0x438
[   74.050980]  kasan_report+0xb4/0xf4
[   74.051335]  __asan_load1+0x68/0x74
[   74.051755]  kasan_stack_oob+0xb4/0x170
[   74.052184]  kunit_try_run_case+0x84/0x120
[   74.052660]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.053211]  kthread+0x180/0x190
[   74.053600]  ret_from_fork+0x10/0x20
[   74.054186] 
[   74.054446] The buggy address belongs to stack of task kunit_try_catch/154
[   74.055101]  and is located at offset 138 in frame:
[   74.055547]  kasan_stack_oob+0x0/0x170
[   74.056076] 
[   74.056289] This frame has 4 objects:
[   74.056732]  [48, 49) '__assertion'
[   74.056822]  [64, 72) 'array'
[   74.057157]  [96, 112) '__assertion'
[   74.057503]  [128, 138) 'stack_array'
[   74.058020] 
[   74.058496] The buggy address ffff8000087b7d9a belongs to a vmalloc virtual mapping
[   74.059104] The buggy address belongs to the physical page:
[   74.059576] page:00000000b2a89bce refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105956
[   74.060346] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   74.060963] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   74.061619] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.062372] page dumped because: kasan: bad access detected
[   74.062848] 
[   74.063035] Memory state around the buggy address:
[   74.063481]  ffff8000087b7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.064045]  ffff8000087b7d00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00
[   74.064671] >ffff8000087b7d80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00
[   74.065217]                             ^
[   74.065601]  ffff8000087b7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.066815]  ffff8000087b7e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.067413] ==================================================================

[   65.539336] ==================================================================
[   65.540390] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc8/0x178
[   65.541237] Read of size 1 at addr ffff800008777dca by task kunit_try_catch/152
[   65.541778] 
[   65.541989] CPU: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.542675] Hardware name: linux,dummy-virt (DT)
[   65.543047] Call trace:
[   65.543320]  dump_backtrace+0x110/0x120
[   65.543770]  show_stack+0x18/0x28
[   65.544161]  dump_stack_lvl+0x68/0x84
[   65.544551]  print_report+0x158/0x484
[   65.544940]  kasan_report+0x98/0xe0
[   65.545328]  __asan_load1+0x68/0x78
[   65.545838]  kasan_stack_oob+0xc8/0x178
[   65.546209]  kunit_try_run_case+0x7c/0x120
[   65.546731]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.547220]  kthread+0x1a4/0x1b8
[   65.547601]  ret_from_fork+0x10/0x20
[   65.547967] 
[   65.548202] The buggy address belongs to stack of task kunit_try_catch/152
[   65.548791]  and is located at offset 234 in frame:
[   65.549242]  kasan_stack_oob+0x0/0x178
[   65.549812] 
[   65.550074] This frame has 4 objects:
[   65.550458]  [32, 33) '__assertion'
[   65.550552]  [96, 104) 'array'
[   65.550956]  [160, 176) '__assertion'
[   65.551264]  [224, 234) 'stack_array'
[   65.551588] 
[   65.552045] The buggy address ffff800008777dca belongs to a vmalloc virtual mapping
[   65.552582] The buggy address belongs to the physical page:
[   65.552984] page:00000000596b461c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105820
[   65.553717] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   65.554397] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   65.554986] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   65.555712] page dumped because: kasan: bad access detected
[   65.556134] 
[   65.556353] Memory state around the buggy address:
[   65.556730]  ffff800008777c80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[   65.557297]  ffff800008777d00: 01 f2 f2 f2 f2 f2 f2 f2 00 f2 f2 f2 f2 f2 f2 f2
[   65.558001] >ffff800008777d80: 00 00 f2 f2 f2 f2 f2 f2 00 02 f2 f2 00 00 00 00
[   65.558730]                                               ^
[   65.559159]  ffff800008777e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.559717]  ffff800008777e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.560237] ==================================================================

[   31.744704] ==================================================================
[   31.745698] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc6/0x190
[   31.746056] Read of size 1 at addr ffff888103587e6a by task kunit_try_catch/258
[   31.746363] 
[   31.746839] CPU: 1 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.747311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.747795] Call Trace:
[   31.748138]  <TASK>
[   31.748428]  dump_stack_lvl+0x49/0x62
[   31.748688]  print_report+0x189/0x492
[   31.748956]  ? kasan_addr_to_slab+0xd/0xb0
[   31.749222]  ? kasan_stack_oob+0xc6/0x190
[   31.749513]  kasan_report+0x10c/0x190
[   31.749767]  ? kasan_stack_oob+0xc6/0x190
[   31.750175]  __asan_load1+0x62/0x70
[   31.750478]  kasan_stack_oob+0xc6/0x190
[   31.750813]  ? match_all_mem_tag+0x20/0x20
[   31.751059]  ? asm_sysvec_apic_timer_interrupt+0x1b/0x20
[   31.751636]  ? kmalloc_oob_16+0x23e/0x250
[   31.752145]  ? kunit_try_run_case+0x84/0xd0
[   31.752481]  ? __kunit_add_resource+0xd1/0x100
[   31.752743]  kunit_try_run_case+0x8f/0xd0
[   31.752982]  ? kunit_catch_run_case+0x80/0x80
[   31.753231]  ? kunit_try_catch_throw+0x40/0x40
[   31.753641]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.753966]  kthread+0x17b/0x1b0
[   31.754225]  ? kthread_complete_and_exit+0x30/0x30
[   31.754489]  ret_from_fork+0x22/0x30
[   31.754894]  </TASK>
[   31.755045] 
[   31.755234] The buggy address belongs to stack of task kunit_try_catch/258
[   31.755886]  and is located at offset 138 in frame:
[   31.756173]  kasan_stack_oob+0x0/0x190
[   31.756596] 
[   31.756866] This frame has 4 objects:
[   31.757192]  [48, 49) '__assertion'
[   31.757234]  [64, 72) 'array'
[   31.757571]  [96, 112) '__assertion'
[   31.757775]  [128, 138) 'stack_array'
[   31.758020] 
[   31.758308] The buggy address belongs to the physical page:
[   31.758666] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103587
[   31.759108] flags: 0x200000000000000(node=0|zone=2)
[   31.759412] raw: 0200000000000000 ffffea00040d61c8 ffffea00040d61c8 0000000000000000
[   31.759979] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   31.760338] page dumped because: kasan: bad access detected
[   31.760834] 
[   31.760942] Memory state around the buggy address:
[   31.761210]  ffff888103587d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.761615]  ffff888103587d80: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[   31.761923] >ffff888103587e00: f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02 f3 f3
[   31.762238]                                                           ^
[   31.762739]  ffff888103587e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.763112]  ffff888103587f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.763744] ==================================================================