Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   93.854088] ==================================================================
[   93.855513] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xc4/0x188
[   93.856163] Read of size 1 at addr ffff800080837cea by task kunit_try_catch/185
[   93.856804] 
[   93.857020] CPU: 0 PID: 185 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   93.857979] Hardware name: linux,dummy-virt (DT)
[   93.858538] Call trace:
[   93.859034]  dump_backtrace+0x9c/0x128
[   93.859444]  show_stack+0x20/0x38
[   93.859956]  dump_stack_lvl+0x60/0xb0
[   93.860588]  print_report+0x328/0x5e8
[   93.861161]  kasan_report+0xdc/0x128
[   93.861665]  __asan_load1+0x60/0x70
[   93.862102]  kasan_stack_oob+0xc4/0x188
[   93.862586]  kunit_try_run_case+0x114/0x298
[   93.863118]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   93.864058]  kthread+0x18c/0x1a8
[   93.864391]  ret_from_fork+0x10/0x20
[   93.864957] 
[   93.865313] The buggy address belongs to stack of task kunit_try_catch/185
[   93.866013]  and is located at offset 138 in frame:
[   93.866422]  kasan_stack_oob+0x0/0x188
[   93.867301] 
[   93.867568] This frame has 4 objects:
[   93.868043]  [48, 49) '__assertion'
[   93.868178]  [64, 72) 'array'
[   93.868502]  [96, 112) '__assertion'
[   93.868947]  [128, 138) 'stack_array'
[   93.869386] 
[   93.869856] The buggy address belongs to the virtual mapping at
[   93.869856]  [ffff800080830000, ffff800080839000) created by:
[   93.869856]  kernel_clone+0x108/0x550
[   93.871355] 
[   93.871571] The buggy address belongs to the physical page:
[   93.871951] page:000000000e3c1875 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1060d7
[   93.872648] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   93.873166] page_type: 0xffffffff()
[   93.873996] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   93.874739] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   93.875498] page dumped because: kasan: bad access detected
[   93.876303] 
[   93.876524] Memory state around the buggy address:
[   93.877060]  ffff800080837b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   93.877697]  ffff800080837c00: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
[   93.878335] >ffff800080837c80: f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02 f3 f3
[   93.878918]                                                           ^
[   93.879507]  ffff800080837d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00
[   93.880227]  ffff800080837d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00
[   93.881157] ==================================================================


[   34.948531] ==================================================================
[   34.949823] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xca/0x190
[   34.950284] Read of size 1 at addr ffff888102aefd9a by task kunit_try_catch/200
[   34.950906] 
[   34.951165] CPU: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   34.951898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.952554] Call Trace:
[   34.952710]  <TASK>
[   34.952853]  dump_stack_lvl+0x4e/0x90
[   34.953394]  print_report+0xd2/0x650
[   34.953885]  ? __virt_addr_valid+0x156/0x1e0
[   34.954210]  ? kasan_stack_oob+0xca/0x190
[   34.954653]  ? kasan_addr_to_slab+0x11/0xb0
[   34.955109]  ? kasan_stack_oob+0xca/0x190
[   34.955501]  kasan_report+0x147/0x180
[   34.955883]  ? kasan_stack_oob+0xca/0x190
[   34.956183]  __asan_load1+0x66/0x70
[   34.956953]  kasan_stack_oob+0xca/0x190
[   34.957353]  ? __pfx_kasan_stack_oob+0x10/0x10
[   34.957674]  ? asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   34.958261]  ? kasan_record_aux_stack_noalloc+0xf/0x20
[   34.958870]  ? kmem_cache_bulk+0x18e/0x280
[   34.959177]  ? kunit_try_run_case+0x115/0x290
[   34.959652]  kunit_try_run_case+0x120/0x290
[   34.959943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.960235]  ? __kasan_check_write+0x18/0x20
[   34.960493]  ? trace_preempt_on+0x20/0xa0
[   34.961578]  ? __kthread_parkme+0x4f/0xd0
[   34.961945]  ? preempt_count_sub+0x50/0x80
[   34.962559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.962930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.963537]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   34.964070]  kthread+0x19e/0x1e0
[   34.964528]  ? __pfx_kthread+0x10/0x10
[   34.965188]  ret_from_fork+0x41/0x70
[   34.965736]  ? __pfx_kthread+0x10/0x10
[   34.966033]  ret_from_fork_asm+0x1b/0x30
[   34.966702]  </TASK>
[   34.966916] 
[   34.967291] The buggy address belongs to stack of task kunit_try_catch/200
[   34.967986]  and is located at offset 138 in frame:
[   34.968283]  kasan_stack_oob+0x0/0x190
[   34.969361] 
[   34.969536] This frame has 4 objects:
[   34.970061]  [48, 49) '__assertion'
[   34.970110]  [64, 72) 'array'
[   34.970577]  [96, 112) '__assertion'
[   34.970949]  [128, 138) 'stack_array'
[   34.971308] 
[   34.971950] The buggy address belongs to the physical page:
[   34.972499] page:(____ptrval____) refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aef
[   34.973547] flags: 0x200000000000000(node=0|zone=2)
[   34.974171] page_type: 0xffffffff()
[   34.974703] raw: 0200000000000000 ffffea00040abbc8 ffffea00040abbc8 0000000000000000
[   34.975240] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   34.975887] page dumped because: kasan: bad access detected
[   34.976215] 
[   34.976335] Memory state around the buggy address:
[   34.977234]  ffff888102aefc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.977953]  ffff888102aefd00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00
[   34.978342] >ffff888102aefd80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 f1
[   34.978919]                             ^
[   34.979196]  ffff888102aefe00: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   34.979836]  ffff888102aefe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.980324] ==================================================================