Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.266769] ==================================================================
[   19.266883] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   19.267053] Read of size 1 at addr ffff800080b37b4a by task kunit_try_catch/253
[   19.267343] 
[   19.267428] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.267637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.267780] Hardware name: linux,dummy-virt (DT)
[   19.267856] Call trace:
[   19.267987]  show_stack+0x20/0x38 (C)
[   19.268193]  dump_stack_lvl+0x8c/0xd0
[   19.268255]  print_report+0x310/0x5d0
[   19.268307]  kasan_report+0xdc/0x128
[   19.268505]  __asan_report_load1_noabort+0x20/0x30
[   19.268856]  kasan_alloca_oob_right+0x2dc/0x340
[   19.269101]  kunit_try_run_case+0x170/0x3f0
[   19.269176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.269595]  kthread+0x328/0x630
[   19.269685]  ret_from_fork+0x10/0x20
[   19.269790] 
[   19.269826] The buggy address belongs to stack of task kunit_try_catch/253
[   19.270009] 
[   19.270088] The buggy address ffff800080b37b4a belongs to a vmalloc virtual mapping
[   19.270212] The buggy address belongs to the physical page:
[   19.270250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d9
[   19.270578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.270807] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.271172] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.271232] page dumped because: kasan: bad access detected
[   19.271268] 
[   19.271443] Memory state around the buggy address:
[   19.271600]  ffff800080b37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.272230]  ffff800080b37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.272384] >ffff800080b37b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   19.272433]                                               ^
[   19.272476]  ffff800080b37b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   19.272674]  ffff800080b37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   19.272749] ==================================================================

[   18.866969] ==================================================================
[   18.867029] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   18.867082] Read of size 1 at addr ffff800080b27b4a by task kunit_try_catch/253
[   18.867133] 
[   18.867167] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.867251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.867280] Hardware name: linux,dummy-virt (DT)
[   18.867313] Call trace:
[   18.867360]  show_stack+0x20/0x38 (C)
[   18.867411]  dump_stack_lvl+0x8c/0xd0
[   18.867476]  print_report+0x310/0x5d0
[   18.867526]  kasan_report+0xdc/0x128
[   18.867572]  __asan_report_load1_noabort+0x20/0x30
[   18.867627]  kasan_alloca_oob_right+0x2dc/0x340
[   18.867697]  kunit_try_run_case+0x170/0x3f0
[   18.867748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.867802]  kthread+0x328/0x630
[   18.867847]  ret_from_fork+0x10/0x20
[   18.867897] 
[   18.867922] The buggy address belongs to stack of task kunit_try_catch/253
[   18.867975] 
[   18.867997] The buggy address ffff800080b27b4a belongs to a vmalloc virtual mapping
[   18.868039] The buggy address belongs to the physical page:
[   18.868077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a58
[   18.868134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.868208] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.868261] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.868303] page dumped because: kasan: bad access detected
[   18.868347] 
[   18.868375] Memory state around the buggy address:
[   18.868419]  ffff800080b27a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.868481]  ffff800080b27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.868525] >ffff800080b27b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   18.868565]                                               ^
[   18.868604]  ffff800080b27b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   18.868647]  ffff800080b27c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.868688] ==================================================================

[   13.932765] ==================================================================
[   13.933255] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390
[   13.933589] Read of size 1 at addr ffff888103b4fc4a by task kunit_try_catch/271
[   13.934164] 
[   13.934399] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.934515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.934528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.934560] Call Trace:
[   13.934572]  <TASK>
[   13.934588]  dump_stack_lvl+0x73/0xb0
[   13.934631]  print_report+0xd1/0x610
[   13.934656]  ? __virt_addr_valid+0x1db/0x2d0
[   13.934680]  ? kasan_alloca_oob_right+0x329/0x390
[   13.934702]  ? kasan_addr_to_slab+0x11/0xa0
[   13.934723]  ? kasan_alloca_oob_right+0x329/0x390
[   13.934746]  kasan_report+0x141/0x180
[   13.934769]  ? kasan_alloca_oob_right+0x329/0x390
[   13.934807]  __asan_report_load1_noabort+0x18/0x20
[   13.934831]  kasan_alloca_oob_right+0x329/0x390
[   13.934853]  ? __kasan_check_write+0x18/0x20
[   13.934883]  ? __pfx_sched_clock_cpu+0x10/0x10
[   13.934906]  ? finish_task_switch.isra.0+0x153/0x700
[   13.934929]  ? __schedule+0x100e/0x2b60
[   13.934951]  ? trace_hardirqs_on+0x37/0xe0
[   13.934976]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   13.935008]  ? __kasan_check_write+0x18/0x20
[   13.935028]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.935055]  ? trace_hardirqs_on+0x37/0xe0
[   13.935087]  ? __pfx_read_tsc+0x10/0x10
[   13.935109]  ? ktime_get_ts64+0x86/0x230
[   13.935134]  kunit_try_run_case+0x1a5/0x480
[   13.935160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.935185]  ? queued_spin_lock_slowpath+0x116/0xb40
[   13.935208]  ? __kthread_parkme+0x82/0x180
[   13.935230]  ? preempt_count_sub+0x50/0x80
[   13.935254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.935278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.935302]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.935326]  kthread+0x337/0x6f0
[   13.935345]  ? trace_preempt_on+0x20/0xc0
[   13.935368]  ? __pfx_kthread+0x10/0x10
[   13.935388]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.935466]  ? calculate_sigpending+0x7b/0xa0
[   13.935492]  ? __pfx_kthread+0x10/0x10
[   13.935514]  ret_from_fork+0x116/0x1d0
[   13.935532]  ? __pfx_kthread+0x10/0x10
[   13.935552]  ret_from_fork_asm+0x1a/0x30
[   13.935585]  </TASK>
[   13.935596] 
[   13.944425] The buggy address belongs to stack of task kunit_try_catch/271
[   13.944994] 
[   13.945118] The buggy address belongs to the physical page:
[   13.945306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b4f
[   13.945920] flags: 0x200000000000000(node=0|zone=2)
[   13.946184] raw: 0200000000000000 ffffea00040ed3c8 ffffea00040ed3c8 0000000000000000
[   13.946612] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   13.946947] page dumped because: kasan: bad access detected
[   13.947187] 
[   13.947296] Memory state around the buggy address:
[   13.947618]  ffff888103b4fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.947933]  ffff888103b4fb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.948250] >ffff888103b4fc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   13.948569]                                               ^
[   13.948812]  ffff888103b4fc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   13.949308]  ffff888103b4fd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   13.949776] ==================================================================

[   14.192692] ==================================================================
[   14.193518] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390
[   14.194343] Read of size 1 at addr ffff888103a87c4a by task kunit_try_catch/270
[   14.194922] 
[   14.195425] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.195495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.195507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.195532] Call Trace:
[   14.195549]  <TASK>
[   14.195578]  dump_stack_lvl+0x73/0xb0
[   14.195616]  print_report+0xd1/0x610
[   14.195651]  ? __virt_addr_valid+0x1db/0x2d0
[   14.195675]  ? kasan_alloca_oob_right+0x329/0x390
[   14.195698]  ? kasan_addr_to_slab+0x11/0xa0
[   14.195730]  ? kasan_alloca_oob_right+0x329/0x390
[   14.195753]  kasan_report+0x141/0x180
[   14.195773]  ? kasan_alloca_oob_right+0x329/0x390
[   14.195800]  __asan_report_load1_noabort+0x18/0x20
[   14.195825]  kasan_alloca_oob_right+0x329/0x390
[   14.195845]  ? __kasan_check_write+0x18/0x20
[   14.195865]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.195888]  ? finish_task_switch.isra.0+0x153/0x700
[   14.195911]  ? __schedule+0x100e/0x2b60
[   14.195932]  ? trace_hardirqs_on+0x37/0xe0
[   14.195958]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   14.195984]  ? __schedule+0x10cc/0x2b60
[   14.196004]  ? __pfx_read_tsc+0x10/0x10
[   14.196114]  ? ktime_get_ts64+0x86/0x230
[   14.196142]  kunit_try_run_case+0x1a5/0x480
[   14.196170]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.196192]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.196218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.196242]  ? __kthread_parkme+0x82/0x180
[   14.196264]  ? preempt_count_sub+0x50/0x80
[   14.196286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.196310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.196334]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.196358]  kthread+0x337/0x6f0
[   14.196377]  ? trace_preempt_on+0x20/0xc0
[   14.196399]  ? __pfx_kthread+0x10/0x10
[   14.196419]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.196440]  ? calculate_sigpending+0x7b/0xa0
[   14.196465]  ? __pfx_kthread+0x10/0x10
[   14.196485]  ret_from_fork+0x116/0x1d0
[   14.196503]  ? __pfx_kthread+0x10/0x10
[   14.196523]  ret_from_fork_asm+0x1a/0x30
[   14.196555]  </TASK>
[   14.196567] 
[   14.211370] The buggy address belongs to stack of task kunit_try_catch/270
[   14.212241] 
[   14.212420] The buggy address belongs to the physical page:
[   14.212953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a87
[   14.213819] flags: 0x200000000000000(node=0|zone=2)
[   14.214270] raw: 0200000000000000 ffffea00040ea1c8 ffffea00040ea1c8 0000000000000000
[   14.215089] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   14.216252] page dumped because: kasan: bad access detected
[   14.216827] 
[   14.217124] Memory state around the buggy address:
[   14.217288]  ffff888103a87b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.217607]  ffff888103a87b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.218428] >ffff888103a87c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   14.219318]                                               ^
[   14.219993]  ffff888103a87c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   14.220228]  ffff888103a87d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.220601] ==================================================================

[   14.038825] ==================================================================
[   14.039391] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x329/0x390
[   14.039762] Read of size 1 at addr ffff888103a67c4a by task kunit_try_catch/270
[   14.040194] 
[   14.040320] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.040377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.040389] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.040420] Call Trace:
[   14.040433]  <TASK>
[   14.040448]  dump_stack_lvl+0x73/0xb0
[   14.040478]  print_report+0xd1/0x610
[   14.040512]  ? __virt_addr_valid+0x1db/0x2d0
[   14.040536]  ? kasan_alloca_oob_right+0x329/0x390
[   14.040559]  ? kasan_addr_to_slab+0x11/0xa0
[   14.040580]  ? kasan_alloca_oob_right+0x329/0x390
[   14.040645]  kasan_report+0x141/0x180
[   14.040667]  ? kasan_alloca_oob_right+0x329/0x390
[   14.040726]  __asan_report_load1_noabort+0x18/0x20
[   14.040753]  kasan_alloca_oob_right+0x329/0x390
[   14.040778]  ? finish_task_switch.isra.0+0x153/0x700
[   14.040803]  ? __schedule+0x100e/0x2b60
[   14.040825]  ? trace_hardirqs_on+0x37/0xe0
[   14.040851]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   14.040878]  ? __schedule+0x10cc/0x2b60
[   14.040909]  ? __pfx_read_tsc+0x10/0x10
[   14.040931]  ? ktime_get_ts64+0x86/0x230
[   14.040968]  kunit_try_run_case+0x1a5/0x480
[   14.040995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.041017]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.041055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.041079]  ? __kthread_parkme+0x82/0x180
[   14.041111]  ? preempt_count_sub+0x50/0x80
[   14.041135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.041158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.041183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.041208]  kthread+0x337/0x6f0
[   14.041227]  ? trace_preempt_on+0x20/0xc0
[   14.041249]  ? __pfx_kthread+0x10/0x10
[   14.041269]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.041290]  ? calculate_sigpending+0x7b/0xa0
[   14.041315]  ? __pfx_kthread+0x10/0x10
[   14.041337]  ret_from_fork+0x116/0x1d0
[   14.041357]  ? __pfx_kthread+0x10/0x10
[   14.041376]  ret_from_fork_asm+0x1a/0x30
[   14.041409]  </TASK>
[   14.041420] 
[   14.050052] The buggy address belongs to stack of task kunit_try_catch/270
[   14.050401] 
[   14.050497] The buggy address belongs to the physical page:
[   14.050754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a67
[   14.051187] flags: 0x200000000000000(node=0|zone=2)
[   14.051443] raw: 0200000000000000 ffffea00040e99c8 ffffea00040e99c8 0000000000000000
[   14.051942] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   14.052394] page dumped because: kasan: bad access detected
[   14.052689] 
[   14.052806] Memory state around the buggy address:
[   14.053016]  ffff888103a67b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.053330]  ffff888103a67b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.053807] >ffff888103a67c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   14.054205]                                               ^
[   14.054391]  ffff888103a67c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   14.054627]  ffff888103a67d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.055052] ==================================================================