Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   38.934662] ==================================================================
[   38.945321] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   38.952870] Read of size 1 at addr ffff800087baf5cd by task kunit_try_catch/292
[   38.960161] 
[   38.961647] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   38.961702] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.961721] Hardware name: WinLink E850-96 board (DT)
[   38.961745] Call trace:
[   38.961764]  show_stack+0x20/0x38 (C)
[   38.961802]  dump_stack_lvl+0x8c/0xd0
[   38.961841]  print_report+0x310/0x608
[   38.961880]  kasan_report+0xdc/0x128
[   38.961914]  __asan_report_load1_noabort+0x20/0x30
[   38.961954]  kasan_global_oob_right+0x230/0x270
[   38.961984]  kunit_try_run_case+0x170/0x3f0
[   38.962022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.962062]  kthread+0x328/0x630
[   38.962091]  ret_from_fork+0x10/0x20
[   38.962129] 
[   39.024831] The buggy address belongs to the variable:
[   39.029951]  global_array+0xd/0x40
[   39.033336] 
[   39.034826] The buggy address belongs to the virtual mapping at
[   39.034826]  [ffff800085d50000, ffff800087c61000) created by:
[   39.034826]  paging_init+0x66c/0x7d0
[   39.050003] 
[   39.051483] The buggy address belongs to the physical page:
[   39.057039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87baf
[   39.064936] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   39.072237] raw: 03fffe0000002000 fffffdffc01eebc8 fffffdffc01eebc8 0000000000000000
[   39.079957] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   39.087677] page dumped because: kasan: bad access detected
[   39.093231] 
[   39.094707] Memory state around the buggy address:
[   39.099488]  ffff800087baf480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.106690]  ffff800087baf500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   39.113896] >ffff800087baf580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   39.121096]                                               ^
[   39.126655]  ffff800087baf600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   39.133859]  ffff800087baf680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   39.141063] ==================================================================

[   28.731094] ==================================================================
[   28.731310] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   28.731566] Read of size 1 at addr ffffa6ed585af5cd by task kunit_try_catch/245
[   28.731874] 
[   28.732095] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.732574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.732656] Hardware name: linux,dummy-virt (DT)
[   28.732752] Call trace:
[   28.732821]  show_stack+0x20/0x38 (C)
[   28.732976]  dump_stack_lvl+0x8c/0xd0
[   28.733138]  print_report+0x310/0x608
[   28.733268]  kasan_report+0xdc/0x128
[   28.733416]  __asan_report_load1_noabort+0x20/0x30
[   28.733856]  kasan_global_oob_right+0x230/0x270
[   28.734187]  kunit_try_run_case+0x170/0x3f0
[   28.734534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.734720]  kthread+0x328/0x630
[   28.734880]  ret_from_fork+0x10/0x20
[   28.735200] 
[   28.735404] The buggy address belongs to the variable:
[   28.735513]  global_array+0xd/0x40
[   28.736770] 
[   28.737043] The buggy address belongs to the virtual mapping at
[   28.737043]  [ffffa6ed56750000, ffffa6ed58661000) created by:
[   28.737043]  paging_init+0x66c/0x7d0
[   28.737251] 
[   28.737411] The buggy address belongs to the physical page:
[   28.737547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47daf
[   28.737779] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   28.737974] raw: 03fffe0000002000 ffffc1ffc01f6bc8 ffffc1ffc01f6bc8 0000000000000000
[   28.738201] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.738486] page dumped because: kasan: bad access detected
[   28.738627] 
[   28.738676] Memory state around the buggy address:
[   28.738852]  ffffa6ed585af480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.740118]  ffffa6ed585af500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.740318] >ffffa6ed585af580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   28.740555]                                               ^
[   28.740649]  ffffa6ed585af600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   28.740965]  ffffa6ed585af680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   28.742519] ==================================================================

[   28.848504] ==================================================================
[   28.848644] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   28.848775] Read of size 1 at addr ffffa63992daf5cd by task kunit_try_catch/245
[   28.849414] 
[   28.849678] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.850221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.850461] Hardware name: linux,dummy-virt (DT)
[   28.850645] Call trace:
[   28.850723]  show_stack+0x20/0x38 (C)
[   28.850869]  dump_stack_lvl+0x8c/0xd0
[   28.850996]  print_report+0x310/0x608
[   28.851115]  kasan_report+0xdc/0x128
[   28.851678]  __asan_report_load1_noabort+0x20/0x30
[   28.852357]  kasan_global_oob_right+0x230/0x270
[   28.852831]  kunit_try_run_case+0x170/0x3f0
[   28.853010]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.853159]  kthread+0x328/0x630
[   28.853274]  ret_from_fork+0x10/0x20
[   28.853412] 
[   28.853739] The buggy address belongs to the variable:
[   28.853873]  global_array+0xd/0x40
[   28.854005] 
[   28.854209] The buggy address belongs to the virtual mapping at
[   28.854209]  [ffffa63990f50000, ffffa63992e61000) created by:
[   28.854209]  paging_init+0x66c/0x7d0
[   28.854416] 
[   28.854541] The buggy address belongs to the physical page:
[   28.854686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47daf
[   28.855300] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   28.856229] raw: 03fffe0000002000 ffffc1ffc01f6bc8 ffffc1ffc01f6bc8 0000000000000000
[   28.856789] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   28.857370] page dumped because: kasan: bad access detected
[   28.857660] 
[   28.857735] Memory state around the buggy address:
[   28.857921]  ffffa63992daf480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.858978]  ffffa63992daf500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.859329] >ffffa63992daf580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   28.860023]                                               ^
[   28.860127]  ffffa63992daf600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   28.860234]  ffffa63992daf680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   28.860434] ==================================================================

[   21.819388] ==================================================================
[   21.820385] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   21.822074] Read of size 1 at addr ffffffffb5276e8d by task kunit_try_catch/263
[   21.823292] 
[   21.824043] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   21.824194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.824236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.824326] Call Trace:
[   21.824354]  <TASK>
[   21.824380]  dump_stack_lvl+0x73/0xb0
[   21.824434]  print_report+0xd1/0x650
[   21.824467]  ? __virt_addr_valid+0x1db/0x2d0
[   21.824525]  ? kasan_global_oob_right+0x286/0x2d0
[   21.824610]  ? kasan_addr_to_slab+0x11/0xa0
[   21.824678]  ? kasan_global_oob_right+0x286/0x2d0
[   21.824742]  kasan_report+0x141/0x180
[   21.824805]  ? kasan_global_oob_right+0x286/0x2d0
[   21.824872]  __asan_report_load1_noabort+0x18/0x20
[   21.824937]  kasan_global_oob_right+0x286/0x2d0
[   21.825001]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   21.825065]  ? __schedule+0x10cc/0x2b60
[   21.825132]  ? __pfx_read_tsc+0x10/0x10
[   21.825200]  ? ktime_get_ts64+0x86/0x230
[   21.825258]  kunit_try_run_case+0x1a5/0x480
[   21.825308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.825343]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.825380]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.825415]  ? __kthread_parkme+0x82/0x180
[   21.825445]  ? preempt_count_sub+0x50/0x80
[   21.825477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.825549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.825652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.825704]  kthread+0x337/0x6f0
[   21.825734]  ? trace_preempt_on+0x20/0xc0
[   21.825770]  ? __pfx_kthread+0x10/0x10
[   21.825800]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.825831]  ? calculate_sigpending+0x7b/0xa0
[   21.825866]  ? __pfx_kthread+0x10/0x10
[   21.825896]  ret_from_fork+0x116/0x1d0
[   21.825922]  ? __pfx_kthread+0x10/0x10
[   21.825950]  ret_from_fork_asm+0x1a/0x30
[   21.825993]  </TASK>
[   21.826008] 
[   21.847230] The buggy address belongs to the variable:
[   21.848313]  global_array+0xd/0x40
[   21.848752] 
[   21.849036] The buggy address belongs to the physical page:
[   21.849542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40876
[   21.850140] flags: 0x100000000002000(reserved|node=0|zone=1)
[   21.851219] raw: 0100000000002000 ffffea0001021d88 ffffea0001021d88 0000000000000000
[   21.851836] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.852750] page dumped because: kasan: bad access detected
[   21.853427] 
[   21.853803] Memory state around the buggy address:
[   21.854632]  ffffffffb5276d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.856074]  ffffffffb5276e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.856896] >ffffffffb5276e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   21.857901]                       ^
[   21.858275]  ffffffffb5276f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   21.859173]  ffffffffb5276f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   21.859975] ==================================================================

[   20.612305] ==================================================================
[   20.613114] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   20.613412] Read of size 1 at addr ffffffffbf276e8d by task kunit_try_catch/263
[   20.614250] 
[   20.615385] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   20.615459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.615480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.615522] Call Trace:
[   20.615581]  <TASK>
[   20.615635]  dump_stack_lvl+0x73/0xb0
[   20.615690]  print_report+0xd1/0x650
[   20.615724]  ? __virt_addr_valid+0x1db/0x2d0
[   20.615758]  ? kasan_global_oob_right+0x286/0x2d0
[   20.615788]  ? kasan_addr_to_slab+0x11/0xa0
[   20.615817]  ? kasan_global_oob_right+0x286/0x2d0
[   20.615847]  kasan_report+0x141/0x180
[   20.615901]  ? kasan_global_oob_right+0x286/0x2d0
[   20.615943]  __asan_report_load1_noabort+0x18/0x20
[   20.615980]  kasan_global_oob_right+0x286/0x2d0
[   20.616011]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   20.616044]  ? __schedule+0x10cc/0x2b60
[   20.616076]  ? __pfx_read_tsc+0x10/0x10
[   20.616119]  ? ktime_get_ts64+0x86/0x230
[   20.616170]  kunit_try_run_case+0x1a5/0x480
[   20.616211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.616245]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.616279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.616313]  ? __kthread_parkme+0x82/0x180
[   20.616341]  ? preempt_count_sub+0x50/0x80
[   20.616374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.616409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.616443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.616478]  kthread+0x337/0x6f0
[   20.616507]  ? trace_preempt_on+0x20/0xc0
[   20.616586]  ? __pfx_kthread+0x10/0x10
[   20.616667]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.616750]  ? calculate_sigpending+0x7b/0xa0
[   20.616830]  ? __pfx_kthread+0x10/0x10
[   20.616865]  ret_from_fork+0x116/0x1d0
[   20.616921]  ? __pfx_kthread+0x10/0x10
[   20.616953]  ret_from_fork_asm+0x1a/0x30
[   20.616997]  </TASK>
[   20.617013] 
[   20.638927] The buggy address belongs to the variable:
[   20.639425]  global_array+0xd/0x40
[   20.640166] 
[   20.640689] The buggy address belongs to the physical page:
[   20.641413] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2b876
[   20.642600] flags: 0x100000000002000(reserved|node=0|zone=1)
[   20.643073] raw: 0100000000002000 ffffea0000ae1d88 ffffea0000ae1d88 0000000000000000
[   20.643911] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.644780] page dumped because: kasan: bad access detected
[   20.645729] 
[   20.646310] Memory state around the buggy address:
[   20.647066]  ffffffffbf276d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.648212]  ffffffffbf276e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.648893] >ffffffffbf276e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   20.649600]                       ^
[   20.650001]  ffffffffbf276f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   20.650779]  ffffffffbf276f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   20.651681] ==================================================================

[   22.419379] ==================================================================
[   22.420564] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   22.421292] Read of size 1 at addr ffff800087baf5cd by task kunit_try_catch/298
[   22.421972] 
[   22.422136] CPU: 2 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   22.422189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.422203] Hardware name: Radxa ROCK Pi 4B (DT)
[   22.422222] Call trace:
[   22.422234]  show_stack+0x20/0x38 (C)
[   22.422271]  dump_stack_lvl+0x8c/0xd0
[   22.422308]  print_report+0x310/0x608
[   22.422342]  kasan_report+0xdc/0x128
[   22.422375]  __asan_report_load1_noabort+0x20/0x30
[   22.422413]  kasan_global_oob_right+0x230/0x270
[   22.422444]  kunit_try_run_case+0x170/0x3f0
[   22.422481]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.422520]  kthread+0x328/0x630
[   22.422548]  ret_from_fork+0x10/0x20
[   22.422581] 
[   22.428191] The buggy address belongs to the variable:
[   22.428667]  global_array+0xd/0x40
[   22.429010] 
[   22.429177] The buggy address belongs to the virtual mapping at
[   22.429177]  [ffff800085d50000, ffff800087c61000) created by:
[   22.429177]  paging_init+0x66c/0x7d0
[   22.430564] 
[   22.430720] The buggy address belongs to the physical page:
[   22.431237] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa3af
[   22.431962] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   22.432659] raw: 03fffe0000002000 fffffdffc028ebc8 fffffdffc028ebc8 0000000000000000
[   22.433377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   22.434085] page dumped because: kasan: bad access detected
[   22.434601] 
[   22.434754] Memory state around the buggy address:
[   22.435204]  ffff800087baf480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.435872]  ffff800087baf500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.436539] >ffff800087baf580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   22.437202]                                               ^
[   22.437722]  ffff800087baf600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   22.438389]  ffff800087baf680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   22.439052] ==================================================================