Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.230957] ==================================================================
[   19.231293] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   19.231641] Read of size 1 at addr ffff800080b37c2a by task kunit_try_catch/249
[   19.231698] 
[   19.231931] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.232247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.232379] Hardware name: linux,dummy-virt (DT)
[   19.232535] Call trace:
[   19.232606]  show_stack+0x20/0x38 (C)
[   19.232777]  dump_stack_lvl+0x8c/0xd0
[   19.232972]  print_report+0x310/0x5d0
[   19.233067]  kasan_report+0xdc/0x128
[   19.233141]  __asan_report_load1_noabort+0x20/0x30
[   19.233408]  kasan_stack_oob+0x238/0x270
[   19.233638]  kunit_try_run_case+0x170/0x3f0
[   19.233794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.233872]  kthread+0x328/0x630
[   19.234229]  ret_from_fork+0x10/0x20
[   19.234458] 
[   19.234618] The buggy address belongs to stack of task kunit_try_catch/249
[   19.235215]  and is located at offset 138 in frame:
[   19.235398]  kasan_stack_oob+0x0/0x270
[   19.235922] 
[   19.235963] This frame has 4 objects:
[   19.236754]  [48, 49) '__assertion'
[   19.236831]  [64, 72) 'array'
[   19.236880]  [96, 112) '__assertion'
[   19.237043]  [128, 138) 'stack_array'
[   19.237095] 
[   19.237146] The buggy address ffff800080b37c2a belongs to a vmalloc virtual mapping
[   19.237461] The buggy address belongs to the physical page:
[   19.237634] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079d9
[   19.237877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.238063] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.238229] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.238371] page dumped because: kasan: bad access detected
[   19.238544] 
[   19.238565] Memory state around the buggy address:
[   19.238618]  ffff800080b37b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.238890]  ffff800080b37b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   19.239071] >ffff800080b37c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   19.239150]                                   ^
[   19.239336]  ffff800080b37c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   19.239406]  ffff800080b37d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   19.239494] ==================================================================

[   18.847954] ==================================================================
[   18.848058] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   18.848114] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/249
[   18.848170] 
[   18.848206] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.848289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.848937] Hardware name: linux,dummy-virt (DT)
[   18.848977] Call trace:
[   18.849001]  show_stack+0x20/0x38 (C)
[   18.849050]  dump_stack_lvl+0x8c/0xd0
[   18.849117]  print_report+0x310/0x5d0
[   18.849302]  kasan_report+0xdc/0x128
[   18.849419]  __asan_report_load1_noabort+0x20/0x30
[   18.849607]  kasan_stack_oob+0x238/0x270
[   18.849721]  kunit_try_run_case+0x170/0x3f0
[   18.849978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.850036]  kthread+0x328/0x630
[   18.850101]  ret_from_fork+0x10/0x20
[   18.850282] 
[   18.850353] The buggy address belongs to stack of task kunit_try_catch/249
[   18.850670]  and is located at offset 138 in frame:
[   18.850813]  kasan_stack_oob+0x0/0x270
[   18.851297] 
[   18.851409] This frame has 4 objects:
[   18.851688]  [48, 49) '__assertion'
[   18.851732]  [64, 72) 'array'
[   18.851767]  [96, 112) '__assertion'
[   18.851871]  [128, 138) 'stack_array'
[   18.852089] 
[   18.852160] The buggy address ffff800080ac7c2a belongs to a vmalloc virtual mapping
[   18.852287] The buggy address belongs to the physical page:
[   18.852363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   18.852451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.852865] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.852919] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.852983] page dumped because: kasan: bad access detected
[   18.853018] 
[   18.853039] Memory state around the buggy address:
[   18.853074]  ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.853274]  ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   18.853332] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   18.853370]                                   ^
[   18.853552]  ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   18.853646]  ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.853732] ==================================================================

[   18.733116] ==================================================================
[   18.733234] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   18.733354] Read of size 1 at addr ffff800080a87c2a by task kunit_try_catch/249
[   18.733405] 
[   18.733441] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.733562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.733639] Hardware name: linux,dummy-virt (DT)
[   18.733673] Call trace:
[   18.733764]  show_stack+0x20/0x38 (C)
[   18.733816]  dump_stack_lvl+0x8c/0xd0
[   18.733863]  print_report+0x310/0x5d0
[   18.733910]  kasan_report+0xdc/0x128
[   18.733976]  __asan_report_load1_noabort+0x20/0x30
[   18.734029]  kasan_stack_oob+0x238/0x270
[   18.734198]  kunit_try_run_case+0x170/0x3f0
[   18.734251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.734564]  kthread+0x328/0x630
[   18.734633]  ret_from_fork+0x10/0x20
[   18.734690] 
[   18.734803] The buggy address belongs to stack of task kunit_try_catch/249
[   18.735013]  and is located at offset 138 in frame:
[   18.735070]  kasan_stack_oob+0x0/0x270
[   18.735612] 
[   18.735727] This frame has 4 objects:
[   18.735977]  [48, 49) '__assertion'
[   18.736331]  [64, 72) 'array'
[   18.736554]  [96, 112) '__assertion'
[   18.736610]  [128, 138) 'stack_array'
[   18.736885] 
[   18.736961] The buggy address ffff800080a87c2a belongs to a vmalloc virtual mapping
[   18.737049] The buggy address belongs to the physical page:
[   18.737125] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106402
[   18.737185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.737508] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.737633] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.737702] page dumped because: kasan: bad access detected
[   18.737791] 
[   18.737842] Memory state around the buggy address:
[   18.737878]  ffff800080a87b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.738056]  ffff800080a87b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   18.738202] >ffff800080a87c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   18.738290]                                   ^
[   18.738360]  ffff800080a87c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   18.738489]  ffff800080a87d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.738531] ==================================================================

[   13.996494] ==================================================================
[   13.997414] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   13.997861] Read of size 1 at addr ffff888103b0fd02 by task kunit_try_catch/266
[   13.998106] 
[   13.998236] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.998285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.998308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.998331] Call Trace:
[   13.998343]  <TASK>
[   13.998361]  dump_stack_lvl+0x73/0xb0
[   13.998394]  print_report+0xd1/0x610
[   13.998417]  ? __virt_addr_valid+0x1db/0x2d0
[   13.998442]  ? kasan_stack_oob+0x2b5/0x300
[   13.998462]  ? kasan_addr_to_slab+0x11/0xa0
[   13.998483]  ? kasan_stack_oob+0x2b5/0x300
[   13.998512]  kasan_report+0x141/0x180
[   13.998606]  ? kasan_stack_oob+0x2b5/0x300
[   13.998635]  __asan_report_load1_noabort+0x18/0x20
[   13.998661]  kasan_stack_oob+0x2b5/0x300
[   13.998681]  ? __pfx_kasan_stack_oob+0x10/0x10
[   13.998701]  ? finish_task_switch.isra.0+0x153/0x700
[   13.998742]  ? __switch_to+0x47/0xf50
[   13.998777]  ? __schedule+0x10cc/0x2b60
[   13.998812]  ? __pfx_read_tsc+0x10/0x10
[   13.998834]  ? ktime_get_ts64+0x86/0x230
[   13.998860]  kunit_try_run_case+0x1a5/0x480
[   13.998886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.998918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.998943]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.998967]  ? __kthread_parkme+0x82/0x180
[   13.998998]  ? preempt_count_sub+0x50/0x80
[   13.999023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.999046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.999070]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.999095]  kthread+0x337/0x6f0
[   13.999114]  ? trace_preempt_on+0x20/0xc0
[   13.999138]  ? __pfx_kthread+0x10/0x10
[   13.999158]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.999180]  ? calculate_sigpending+0x7b/0xa0
[   13.999205]  ? __pfx_kthread+0x10/0x10
[   13.999226]  ret_from_fork+0x116/0x1d0
[   13.999245]  ? __pfx_kthread+0x10/0x10
[   13.999265]  ret_from_fork_asm+0x1a/0x30
[   13.999298]  </TASK>
[   13.999309] 
[   14.007557] The buggy address belongs to stack of task kunit_try_catch/266
[   14.008228]  and is located at offset 138 in frame:
[   14.008461]  kasan_stack_oob+0x0/0x300
[   14.008823] 
[   14.009023] This frame has 4 objects:
[   14.009358]  [48, 49) '__assertion'
[   14.009382]  [64, 72) 'array'
[   14.009598]  [96, 112) '__assertion'
[   14.009768]  [128, 138) 'stack_array'
[   14.009932] 
[   14.010220] The buggy address belongs to the physical page:
[   14.010478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b0f
[   14.010927] flags: 0x200000000000000(node=0|zone=2)
[   14.011188] raw: 0200000000000000 ffffea00040ec3c8 ffffea00040ec3c8 0000000000000000
[   14.011477] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   14.011704] page dumped because: kasan: bad access detected
[   14.011876] 
[   14.011971] Memory state around the buggy address:
[   14.012195]  ffff888103b0fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.012778]  ffff888103b0fc80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   14.013212] >ffff888103b0fd00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.013430]                    ^
[   14.013703]  ffff888103b0fd80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   14.014090]  ffff888103b0fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.014418] ==================================================================

[   13.875547] ==================================================================
[   13.876380] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   13.877161] Read of size 1 at addr ffff888103b47d02 by task kunit_try_catch/267
[   13.877929] 
[   13.878163] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.878229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.878240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.878263] Call Trace:
[   13.878275]  <TASK>
[   13.878292]  dump_stack_lvl+0x73/0xb0
[   13.878323]  print_report+0xd1/0x610
[   13.878346]  ? __virt_addr_valid+0x1db/0x2d0
[   13.878370]  ? kasan_stack_oob+0x2b5/0x300
[   13.878390]  ? kasan_addr_to_slab+0x11/0xa0
[   13.878424]  ? kasan_stack_oob+0x2b5/0x300
[   13.878456]  kasan_report+0x141/0x180
[   13.878478]  ? kasan_stack_oob+0x2b5/0x300
[   13.878504]  __asan_report_load1_noabort+0x18/0x20
[   13.878529]  kasan_stack_oob+0x2b5/0x300
[   13.878551]  ? __pfx_kasan_stack_oob+0x10/0x10
[   13.878570]  ? finish_task_switch.isra.0+0x153/0x700
[   13.878623]  ? __switch_to+0x47/0xf50
[   13.878651]  ? __schedule+0x10cc/0x2b60
[   13.878674]  ? __pfx_read_tsc+0x10/0x10
[   13.878695]  ? ktime_get_ts64+0x86/0x230
[   13.878720]  kunit_try_run_case+0x1a5/0x480
[   13.878745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.878768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.878793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.878817]  ? __kthread_parkme+0x82/0x180
[   13.878839]  ? preempt_count_sub+0x50/0x80
[   13.878862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.878886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.878910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.878933]  kthread+0x337/0x6f0
[   13.878953]  ? trace_preempt_on+0x20/0xc0
[   13.878977]  ? __pfx_kthread+0x10/0x10
[   13.878997]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.879018]  ? calculate_sigpending+0x7b/0xa0
[   13.879042]  ? __pfx_kthread+0x10/0x10
[   13.879064]  ret_from_fork+0x116/0x1d0
[   13.879082]  ? __pfx_kthread+0x10/0x10
[   13.879102]  ret_from_fork_asm+0x1a/0x30
[   13.879135]  </TASK>
[   13.879144] 
[   13.891219] The buggy address belongs to stack of task kunit_try_catch/267
[   13.892107]  and is located at offset 138 in frame:
[   13.892716]  kasan_stack_oob+0x0/0x300
[   13.893581] 
[   13.893840] This frame has 4 objects:
[   13.894372]  [48, 49) '__assertion'
[   13.894399]  [64, 72) 'array'
[   13.894950]  [96, 112) '__assertion'
[   13.895592]  [128, 138) 'stack_array'
[   13.895918] 
[   13.896121] The buggy address belongs to the physical page:
[   13.896304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b47
[   13.897200] flags: 0x200000000000000(node=0|zone=2)
[   13.897723] raw: 0200000000000000 ffffea00040ed1c8 ffffea00040ed1c8 0000000000000000
[   13.897965] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   13.898193] page dumped because: kasan: bad access detected
[   13.898366] 
[   13.898449] Memory state around the buggy address:
[   13.898636]  ffff888103b47c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   13.898852]  ffff888103b47c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   13.899388] >ffff888103b47d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   13.899744]                    ^
[   13.899941]  ffff888103b47d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   13.900170]  ffff888103b47e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.900542] ==================================================================

[   14.136459] ==================================================================
[   14.137517] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x2b5/0x300
[   14.137936] Read of size 1 at addr ffff888103a97d02 by task kunit_try_catch/266
[   14.138303] 
[   14.138421] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.138471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.138483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.138508] Call Trace:
[   14.138522]  <TASK>
[   14.138542]  dump_stack_lvl+0x73/0xb0
[   14.138577]  print_report+0xd1/0x610
[   14.138678]  ? __virt_addr_valid+0x1db/0x2d0
[   14.138704]  ? kasan_stack_oob+0x2b5/0x300
[   14.138724]  ? kasan_addr_to_slab+0x11/0xa0
[   14.138745]  ? kasan_stack_oob+0x2b5/0x300
[   14.138765]  kasan_report+0x141/0x180
[   14.138787]  ? kasan_stack_oob+0x2b5/0x300
[   14.138813]  __asan_report_load1_noabort+0x18/0x20
[   14.138838]  kasan_stack_oob+0x2b5/0x300
[   14.138857]  ? __pfx_kasan_stack_oob+0x10/0x10
[   14.138879]  ? __kasan_check_write+0x18/0x20
[   14.138898]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.138923]  ? irqentry_exit+0x2a/0x60
[   14.138945]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.138971]  ? __pfx_read_tsc+0x10/0x10
[   14.138991]  ? ktime_get_ts64+0x86/0x230
[   14.139027]  kunit_try_run_case+0x1a5/0x480
[   14.139053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.139076]  ? queued_spin_lock_slowpath+0x116/0xb40
[   14.139099]  ? __kthread_parkme+0x82/0x180
[   14.139170]  ? preempt_count_sub+0x50/0x80
[   14.139194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.139218]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.139242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.139266]  kthread+0x337/0x6f0
[   14.139285]  ? trace_preempt_on+0x20/0xc0
[   14.139308]  ? __pfx_kthread+0x10/0x10
[   14.139328]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.139351]  ? calculate_sigpending+0x7b/0xa0
[   14.139376]  ? __pfx_kthread+0x10/0x10
[   14.139397]  ret_from_fork+0x116/0x1d0
[   14.139416]  ? __pfx_kthread+0x10/0x10
[   14.139435]  ret_from_fork_asm+0x1a/0x30
[   14.139466]  </TASK>
[   14.139478] 
[   14.148000] The buggy address belongs to stack of task kunit_try_catch/266
[   14.148473]  and is located at offset 138 in frame:
[   14.148687]  kasan_stack_oob+0x0/0x300
[   14.148966] 
[   14.149091] This frame has 4 objects:
[   14.149380]  [48, 49) '__assertion'
[   14.149404]  [64, 72) 'array'
[   14.149726]  [96, 112) '__assertion'
[   14.149848]  [128, 138) 'stack_array'
[   14.149985] 
[   14.150387] The buggy address belongs to the physical page:
[   14.150857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103a97
[   14.151273] flags: 0x200000000000000(node=0|zone=2)
[   14.151580] raw: 0200000000000000 ffffea00040ea5c8 ffffea00040ea5c8 0000000000000000
[   14.151899] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   14.152238] page dumped because: kasan: bad access detected
[   14.152569] 
[   14.152657] Memory state around the buggy address:
[   14.152862]  ffff888103a97c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.153095]  ffff888103a97c80: f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00
[   14.153313] >ffff888103a97d00: 02 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   14.153527]                    ^
[   14.153656]  ffff888103a97d80: f1 f1 f1 00 00 f2 f2 00 00 f2 f2 00 00 f3 f3 00
[   14.154028]  ffff888103a97e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.154341] ==================================================================