Hay
Date
June 7, 2025, 10:40 a.m.

Environment
qemu-arm64
qemu-x86_64

[   23.844039] ==================================================================
[   23.845263] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348
[   23.846023] Read of size 1 at addr ffff800080bd7bea by task kunit_try_catch/241
[   23.846694] 
[   23.847054] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   23.847260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.847337] Hardware name: linux,dummy-virt (DT)
[   23.847572] Call trace:
[   23.847648]  dump_backtrace+0x9c/0x128
[   23.847768]  show_stack+0x20/0x38
[   23.847877]  dump_stack_lvl+0x8c/0xd0
[   23.848012]  print_report+0x310/0x5f0
[   23.848127]  kasan_report+0xdc/0x128
[   23.848190]  __asan_report_load1_noabort+0x20/0x30
[   23.848243]  kasan_alloca_oob_right+0x2e4/0x348
[   23.848295]  kunit_try_run_case+0x170/0x3f0
[   23.848343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.848396]  kthread+0x24c/0x2d0
[   23.848443]  ret_from_fork+0x10/0x20
[   23.848489] 
[   23.856640] The buggy address belongs to stack of task kunit_try_catch/241
[   23.857434] 
[   23.857823] The buggy address belongs to the virtual mapping at
[   23.857823]  [ffff800080bd0000, ffff800080bd9000) created by:
[   23.857823]  kernel_clone+0x150/0x7a8
[   23.858861] 
[   23.859074] The buggy address belongs to the physical page:
[   23.860306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1041e7
[   23.861272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.862073] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.863035] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.863981] page dumped because: kasan: bad access detected
[   23.864853] 
[   23.865178] Memory state around the buggy address:
[   23.865726]  ffff800080bd7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.866548]  ffff800080bd7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.867408] >ffff800080bd7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   23.868256]                                                           ^
[   23.869419]  ffff800080bd7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2
[   23.870299]  ffff800080bd7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   23.871073] ==================================================================

[   20.507592] ==================================================================
[   20.508461] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x32b/0x390
[   20.509143] Read of size 1 at addr ffff888102ce7caa by task kunit_try_catch/258
[   20.509706] 
[   20.510039] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G    B            N 6.12.33-rc1 #1
[   20.510159] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.510195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.510274] Call Trace:
[   20.510311]  <TASK>
[   20.510354]  dump_stack_lvl+0x73/0xb0
[   20.510442]  print_report+0xd1/0x640
[   20.510519]  ? __virt_addr_valid+0x1db/0x2d0
[   20.510642]  ? kasan_alloca_oob_right+0x32b/0x390
[   20.510725]  ? kasan_addr_to_slab+0x11/0xa0
[   20.510827]  ? kasan_alloca_oob_right+0x32b/0x390
[   20.510939]  kasan_report+0x140/0x180
[   20.511027]  ? kasan_alloca_oob_right+0x32b/0x390
[   20.511155]  __asan_report_load1_noabort+0x18/0x20
[   20.511250]  kasan_alloca_oob_right+0x32b/0x390
[   20.511346]  ? dup_user_cpus_ptr+0x11e/0x260
[   20.511420]  ? __schedule+0xc49/0x27a0
[   20.511492]  ? trace_hardirqs_on+0x37/0xe0
[   20.511576]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   20.511667]  ? __schedule+0xc49/0x27a0
[   20.511718]  ? __pfx_read_tsc+0x10/0x10
[   20.511751]  ? ktime_get_ts64+0x84/0x230
[   20.511788]  kunit_try_run_case+0x1a6/0x480
[   20.511844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.511882]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   20.511912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.511947]  ? __kthread_parkme+0x82/0x160
[   20.511975]  ? preempt_count_sub+0x50/0x80
[   20.512004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.512032]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.512069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.512105]  kthread+0x257/0x310
[   20.512130]  ? __pfx_kthread+0x10/0x10
[   20.512157]  ret_from_fork+0x41/0x80
[   20.512185]  ? __pfx_kthread+0x10/0x10
[   20.512210]  ret_from_fork_asm+0x1a/0x30
[   20.512280]  </TASK>
[   20.512294] 
[   20.530965] The buggy address belongs to stack of task kunit_try_catch/258
[   20.531746] 
[   20.532004] The buggy address belongs to the physical page:
[   20.532494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ce7
[   20.533080] flags: 0x200000000000000(node=0|zone=2)
[   20.534091] raw: 0200000000000000 ffffea00040b39c8 ffffea00040b39c8 0000000000000000
[   20.534919] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   20.535706] page dumped because: kasan: bad access detected
[   20.536266] 
[   20.536644] Memory state around the buggy address:
[   20.537161]  ffff888102ce7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.537787]  ffff888102ce7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.538836] >ffff888102ce7c80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 00 00 00
[   20.539614]                                   ^
[   20.540082]  ffff888102ce7d00: 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3
[   20.541378]  ffff888102ce7d80: f3 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1
[   20.541796] ==================================================================