Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 19.218266] ================================================================== [ 19.218340] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 19.218396] Read of size 1 at addr ffff91dea554f58d by task kunit_try_catch/246 [ 19.219698] [ 19.219758] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.219845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.219884] Hardware name: linux,dummy-virt (DT) [ 19.219917] Call trace: [ 19.220190] show_stack+0x20/0x38 (C) [ 19.220251] dump_stack_lvl+0x8c/0xd0 [ 19.220298] print_report+0x310/0x608 [ 19.220345] kasan_report+0xdc/0x128 [ 19.221948] __asan_report_load1_noabort+0x20/0x30 [ 19.222586] kasan_global_oob_right+0x230/0x270 [ 19.222646] kunit_try_run_case+0x170/0x3f0 [ 19.223538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.224433] kthread+0x328/0x630 [ 19.224919] ret_from_fork+0x10/0x20 [ 19.225230] [ 19.225581] The buggy address belongs to the variable: [ 19.225666] global_array+0xd/0x40 [ 19.225720] [ 19.226453] The buggy address belongs to the virtual mapping at [ 19.226453] [ffff91dea3700000, ffff91dea5601000) created by: [ 19.226453] paging_init+0x66c/0x7d0 [ 19.226953] [ 19.227228] The buggy address belongs to the physical page: [ 19.227267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 19.228127] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 19.228298] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 19.228600] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.228781] page dumped because: kasan: bad access detected [ 19.228817] [ 19.229214] Memory state around the buggy address: [ 19.229260] ffff91dea554f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.229520] ffff91dea554f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 19.229579] >ffff91dea554f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 19.230790] ^ [ 19.230827] ffff91dea554f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 19.230872] ffff91dea554f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.231803] ==================================================================
[ 18.847165] ================================================================== [ 18.847613] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 18.847684] Read of size 1 at addr ffff9c72c874f58d by task kunit_try_catch/246 [ 18.847793] [ 18.847871] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 18.847976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.848268] Hardware name: linux,dummy-virt (DT) [ 18.848339] Call trace: [ 18.848389] show_stack+0x20/0x38 (C) [ 18.848452] dump_stack_lvl+0x8c/0xd0 [ 18.848571] print_report+0x310/0x608 [ 18.848638] kasan_report+0xdc/0x128 [ 18.848684] __asan_report_load1_noabort+0x20/0x30 [ 18.849023] kasan_global_oob_right+0x230/0x270 [ 18.849125] kunit_try_run_case+0x170/0x3f0 [ 18.849179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.849231] kthread+0x328/0x630 [ 18.849273] ret_from_fork+0x10/0x20 [ 18.849635] [ 18.849713] The buggy address belongs to the variable: [ 18.849857] global_array+0xd/0x40 [ 18.849929] [ 18.850331] The buggy address belongs to the virtual mapping at [ 18.850331] [ffff9c72c6900000, ffff9c72c8801000) created by: [ 18.850331] paging_init+0x66c/0x7d0 [ 18.850740] [ 18.851042] The buggy address belongs to the physical page: [ 18.851096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 18.851335] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 18.851759] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 18.851827] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.851954] page dumped because: kasan: bad access detected [ 18.852305] [ 18.852420] Memory state around the buggy address: [ 18.852525] ffff9c72c874f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.852670] ffff9c72c874f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 18.852852] >ffff9c72c874f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 18.853001] ^ [ 18.853092] ffff9c72c874f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 18.853213] ffff9c72c874f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.853454] ==================================================================
[ 15.327390] ================================================================== [ 15.328203] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 15.328830] Read of size 1 at addr ffffffffa6861e8d by task kunit_try_catch/263 [ 15.329455] [ 15.329749] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.329849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.329872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.329907] Call Trace: [ 15.329939] <TASK> [ 15.329970] dump_stack_lvl+0x73/0xb0 [ 15.330029] print_report+0xd1/0x650 [ 15.330068] ? __virt_addr_valid+0x1db/0x2d0 [ 15.330104] ? kasan_global_oob_right+0x286/0x2d0 [ 15.330144] ? kasan_addr_to_slab+0x11/0xa0 [ 15.330162] ? kasan_global_oob_right+0x286/0x2d0 [ 15.330182] kasan_report+0x141/0x180 [ 15.330202] ? kasan_global_oob_right+0x286/0x2d0 [ 15.330226] __asan_report_load1_noabort+0x18/0x20 [ 15.330246] kasan_global_oob_right+0x286/0x2d0 [ 15.330265] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 15.330286] ? __schedule+0x10cc/0x2b60 [ 15.330306] ? __pfx_read_tsc+0x10/0x10 [ 15.330326] ? ktime_get_ts64+0x86/0x230 [ 15.330348] kunit_try_run_case+0x1a5/0x480 [ 15.330370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.330389] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.330410] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.330430] ? __kthread_parkme+0x82/0x180 [ 15.330449] ? preempt_count_sub+0x50/0x80 [ 15.330471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.330492] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.330514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.330533] kthread+0x337/0x6f0 [ 15.330550] ? trace_preempt_on+0x20/0xc0 [ 15.330572] ? __pfx_kthread+0x10/0x10 [ 15.330591] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.330609] ? calculate_sigpending+0x7b/0xa0 [ 15.330650] ? __pfx_kthread+0x10/0x10 [ 15.330671] ret_from_fork+0x116/0x1d0 [ 15.330688] ? __pfx_kthread+0x10/0x10 [ 15.330707] ret_from_fork_asm+0x1a/0x30 [ 15.330736] </TASK> [ 15.330748] [ 15.339445] The buggy address belongs to the variable: [ 15.339830] global_array+0xd/0x40 [ 15.340205] [ 15.340459] The buggy address belongs to the physical page: [ 15.340725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x25e61 [ 15.341295] flags: 0x100000000002000(reserved|node=0|zone=1) [ 15.341662] raw: 0100000000002000 ffffea0000979848 ffffea0000979848 0000000000000000 [ 15.342136] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 15.342544] page dumped because: kasan: bad access detected [ 15.342894] [ 15.343010] Memory state around the buggy address: [ 15.343353] ffffffffa6861d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.343626] ffffffffa6861e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.343864] >ffffffffa6861e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 15.344087] ^ [ 15.344659] ffffffffa6861f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 15.345025] ffffffffa6861f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 15.345481] ==================================================================
[ 15.374002] ================================================================== [ 15.375339] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 15.376527] Read of size 1 at addr ffffffffbd061e8d by task kunit_try_catch/262 [ 15.377004] [ 15.377176] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 15.377225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.377237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.377259] Call Trace: [ 15.377271] <TASK> [ 15.377286] dump_stack_lvl+0x73/0xb0 [ 15.377316] print_report+0xd1/0x650 [ 15.377338] ? __virt_addr_valid+0x1db/0x2d0 [ 15.377362] ? kasan_global_oob_right+0x286/0x2d0 [ 15.377385] ? kasan_addr_to_slab+0x11/0xa0 [ 15.377406] ? kasan_global_oob_right+0x286/0x2d0 [ 15.377429] kasan_report+0x141/0x180 [ 15.377451] ? kasan_global_oob_right+0x286/0x2d0 [ 15.377479] __asan_report_load1_noabort+0x18/0x20 [ 15.377506] kasan_global_oob_right+0x286/0x2d0 [ 15.377534] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 15.377556] ? trace_hardirqs_on+0x37/0xe0 [ 15.377581] ? __schedule+0x207f/0x2b60 [ 15.377604] ? __pfx_read_tsc+0x10/0x10 [ 15.377625] ? ktime_get_ts64+0x86/0x230 [ 15.377650] kunit_try_run_case+0x1a5/0x480 [ 15.377675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.377698] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 15.377721] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.377744] ? __kthread_parkme+0x82/0x180 [ 15.377765] ? preempt_count_sub+0x50/0x80 [ 15.377789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.377813] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.377836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.377859] kthread+0x337/0x6f0 [ 15.377880] ? trace_preempt_on+0x20/0xc0 [ 15.377902] ? __pfx_kthread+0x10/0x10 [ 15.377924] ? _raw_spin_unlock_irq+0x47/0x80 [ 15.377946] ? calculate_sigpending+0x7b/0xa0 [ 15.377969] ? __pfx_kthread+0x10/0x10 [ 15.377992] ret_from_fork+0x116/0x1d0 [ 15.378010] ? __pfx_kthread+0x10/0x10 [ 15.378031] ret_from_fork_asm+0x1a/0x30 [ 15.378076] </TASK> [ 15.378088] [ 15.386393] The buggy address belongs to the variable: [ 15.386647] global_array+0xd/0x40 [ 15.386960] [ 15.387089] The buggy address belongs to the physical page: [ 15.387273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x148861 [ 15.387613] flags: 0x200000000002000(reserved|node=0|zone=2) [ 15.387891] raw: 0200000000002000 ffffea0005221848 ffffea0005221848 0000000000000000 [ 15.388353] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 15.388590] page dumped because: kasan: bad access detected [ 15.389076] [ 15.389180] Memory state around the buggy address: [ 15.389416] ffffffffbd061d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.389725] ffffffffbd061e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 15.389991] >ffffffffbd061e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 15.390334] ^ [ 15.390483] ffffffffbd061f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 15.390952] ffffffffbd061f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 15.391279] ==================================================================
[ 40.389062] ================================================================== [ 40.401619] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 40.409193] Read of size 1 at addr ffffffffaaa61e8d by task kunit_try_catch/286 [ 40.416507] [ 40.418009] CPU: 3 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 40.418018] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 40.418021] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.418024] Call Trace: [ 40.418026] <TASK> [ 40.418028] dump_stack_lvl+0x73/0xb0 [ 40.418033] print_report+0xd1/0x650 [ 40.418037] ? __virt_addr_valid+0x1db/0x2d0 [ 40.418041] ? kasan_global_oob_right+0x286/0x2d0 [ 40.418045] ? kasan_addr_to_slab+0x11/0xa0 [ 40.418048] ? kasan_global_oob_right+0x286/0x2d0 [ 40.418052] kasan_report+0x141/0x180 [ 40.418056] ? kasan_global_oob_right+0x286/0x2d0 [ 40.418061] __asan_report_load1_noabort+0x18/0x20 [ 40.418065] kasan_global_oob_right+0x286/0x2d0 [ 40.418069] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 40.418074] ? __schedule+0x10cc/0x2b60 [ 40.418078] ? ktime_get_ts64+0x83/0x230 [ 40.418082] kunit_try_run_case+0x1a2/0x480 [ 40.418087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.418091] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.418096] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.418100] ? __kthread_parkme+0x82/0x180 [ 40.418104] ? preempt_count_sub+0x50/0x80 [ 40.418108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.418112] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.418116] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.418121] kthread+0x334/0x6f0 [ 40.418124] ? trace_preempt_on+0x20/0xc0 [ 40.418129] ? __pfx_kthread+0x10/0x10 [ 40.418132] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.418136] ? calculate_sigpending+0x7b/0xa0 [ 40.418141] ? __pfx_kthread+0x10/0x10 [ 40.418145] ret_from_fork+0x113/0x1d0 [ 40.418148] ? __pfx_kthread+0x10/0x10 [ 40.418152] ret_from_fork_asm+0x1a/0x30 [ 40.418158] </TASK> [ 40.418159] [ 40.583913] The buggy address belongs to the variable: [ 40.589052] global_array+0xd/0x40 [ 40.592467] [ 40.593965] The buggy address belongs to the physical page: [ 40.599537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3a9861 [ 40.607538] flags: 0x200000000002000(reserved|node=0|zone=2) [ 40.613207] raw: 0200000000002000 ffffea000ea61848 ffffea000ea61848 0000000000000000 [ 40.620953] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 40.628693] page dumped because: kasan: bad access detected [ 40.634264] [ 40.635764] Memory state around the buggy address: [ 40.640556] ffffffffaaa61d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.647778] ffffffffaaa61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.655004] >ffffffffaaa61e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 40.662223] ^ [ 40.665718] ffffffffaaa61f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 40.672936] ffffffffaaa61f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 40.680155] ==================================================================