Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   93.926004] ==================================================================
[   93.926817] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x114/0x200
[   93.928003] Read of size 1 at addr ffff800080897c0a by task kunit_try_catch/189
[   93.928773] 
[   93.929106] CPU: 1 PID: 189 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   93.929952] Hardware name: linux,dummy-virt (DT)
[   93.930396] Call trace:
[   93.930873]  dump_backtrace+0x9c/0x128
[   93.931397]  show_stack+0x20/0x38
[   93.931880]  dump_stack_lvl+0x60/0xb0
[   93.932382]  print_report+0x328/0x5e8
[   93.932862]  kasan_report+0xdc/0x128
[   93.933370]  __asan_load1+0x60/0x70
[   93.933825]  kasan_alloca_oob_right+0x114/0x200
[   93.934358]  kunit_try_run_case+0x114/0x298
[   93.935067]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   93.935769]  kthread+0x18c/0x1a8
[   93.936207]  ret_from_fork+0x10/0x20
[   93.936726] 
[   93.937066] The buggy address belongs to stack of task kunit_try_catch/189
[   93.937590] 
[   93.937796] The buggy address belongs to the virtual mapping at
[   93.937796]  [ffff800080890000, ffff800080899000) created by:
[   93.937796]  kernel_clone+0x108/0x550
[   93.939265] 
[   93.939606] The buggy address belongs to the physical page:
[   93.940235] page:000000005a75b1e9 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106088
[   93.940960] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   93.941419] page_type: 0xffffffff()
[   93.941746] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   93.942228] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   93.943132] page dumped because: kasan: bad access detected
[   93.943732] 
[   93.944013] Memory state around the buggy address:
[   93.944498]  ffff800080897b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   93.945218]  ffff800080897b80: 00 00 00 00 00 00 00 00 00 00 00 00 ca ca ca ca
[   93.945919] >ffff800080897c00: 00 02 cb cb cb cb cb cb 00 00 f1 f1 f1 f1 01 f2
[   93.946601]                       ^
[   93.948273]  ffff800080897c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   93.948982]  ffff800080897d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   93.949676] ==================================================================


[   35.016126] ==================================================================
[   35.016815] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x10a/0x200
[   35.017331] Read of size 1 at addr ffff888102a87cca by task kunit_try_catch/204
[   35.017771] 
[   35.017917] CPU: 1 PID: 204 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   35.018445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   35.019226] Call Trace:
[   35.019650]  <TASK>
[   35.019871]  dump_stack_lvl+0x4e/0x90
[   35.020189]  print_report+0xd2/0x650
[   35.020469]  ? __virt_addr_valid+0x156/0x1e0
[   35.020820]  ? kasan_alloca_oob_right+0x10a/0x200
[   35.021193]  ? kasan_addr_to_slab+0x11/0xb0
[   35.021451]  ? kasan_alloca_oob_right+0x10a/0x200
[   35.021822]  kasan_report+0x147/0x180
[   35.022122]  ? kasan_alloca_oob_right+0x10a/0x200
[   35.022466]  __asan_load1+0x66/0x70
[   35.023146]  kasan_alloca_oob_right+0x10a/0x200
[   35.023490]  ? set_user_nice+0x30e/0x420
[   35.023789]  ? __schedule+0x715/0x11a0
[   35.024093]  ? trace_hardirqs_on+0x37/0xd0
[   35.024391]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   35.024735]  ? __schedule+0x715/0x11a0
[   35.025035]  ? ktime_get_ts64+0x118/0x140
[   35.025317]  kunit_try_run_case+0x120/0x290
[   35.025635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.026046]  ? __kasan_check_write+0x18/0x20
[   35.026340]  ? trace_preempt_on+0x20/0xa0
[   35.026643]  ? __kthread_parkme+0x4f/0xd0
[   35.027490]  ? preempt_count_sub+0x50/0x80
[   35.027774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   35.028117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   35.028523]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   35.028927]  kthread+0x19e/0x1e0
[   35.029198]  ? __pfx_kthread+0x10/0x10
[   35.029451]  ret_from_fork+0x41/0x70
[   35.029726]  ? __pfx_kthread+0x10/0x10
[   35.029999]  ret_from_fork_asm+0x1b/0x30
[   35.030334]  </TASK>
[   35.030508] 
[   35.030644] The buggy address belongs to stack of task kunit_try_catch/204
[   35.031610] 
[   35.031772] The buggy address belongs to the physical page:
[   35.032103] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a87
[   35.032622] flags: 0x200000000000000(node=0|zone=2)
[   35.033015] page_type: 0xffffffff()
[   35.033256] raw: 0200000000000000 ffffea00040aa1c8 ffffea00040aa1c8 0000000000000000
[   35.033718] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   35.034155] page dumped because: kasan: bad access detected
[   35.034521] 
[   35.034658] Memory state around the buggy address:
[   35.035536]  ffff888102a87b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.036202]  ffff888102a87c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.036676] >ffff888102a87c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   35.037115]                                               ^
[   35.037437]  ffff888102a87d00: 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2
[   35.037887]  ffff888102a87d80: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 f1
[   35.038277] ==================================================================