Date
July 18, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.553068] ================================================================== [ 17.553696] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 17.554013] Read of size 1 at addr ffffa1421b54f58d by task kunit_try_catch/245 [ 17.554119] [ 17.554239] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.554368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.554404] Hardware name: linux,dummy-virt (DT) [ 17.554435] Call trace: [ 17.554458] show_stack+0x20/0x38 (C) [ 17.554780] dump_stack_lvl+0x8c/0xd0 [ 17.554911] print_report+0x310/0x5d0 [ 17.554989] kasan_report+0xdc/0x128 [ 17.555324] __asan_report_load1_noabort+0x20/0x30 [ 17.555399] kasan_global_oob_right+0x230/0x270 [ 17.555695] kunit_try_run_case+0x170/0x3f0 [ 17.555833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.555909] kthread+0x328/0x630 [ 17.555952] ret_from_fork+0x10/0x20 [ 17.556031] [ 17.556099] The buggy address belongs to the variable: [ 17.556138] global_array+0xd/0x40 [ 17.556218] [ 17.556289] The buggy address ffffa1421b54f58d belongs to a vmalloc virtual mapping [ 17.556412] The buggy address belongs to the physical page: [ 17.556460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 17.556524] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 17.556593] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 17.556644] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.556683] page dumped because: kasan: bad access detected [ 17.556715] [ 17.556735] Memory state around the buggy address: [ 17.556779] ffffa1421b54f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.556822] ffffa1421b54f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 17.556875] >ffffa1421b54f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 17.556928] ^ [ 17.556972] ffffa1421b54f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 17.557023] ffffa1421b54f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.557072] ==================================================================
[ 13.949361] ================================================================== [ 13.949989] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 13.951619] Read of size 1 at addr ffffffff88263e8d by task kunit_try_catch/264 [ 13.952672] [ 13.952804] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.952852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.952865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.952887] Call Trace: [ 13.952900] <TASK> [ 13.952915] dump_stack_lvl+0x73/0xb0 [ 13.952953] print_report+0xd1/0x610 [ 13.952976] ? __virt_addr_valid+0x1db/0x2d0 [ 13.952999] ? kasan_global_oob_right+0x286/0x2d0 [ 13.953021] ? kasan_addr_to_slab+0x11/0xa0 [ 13.953386] ? kasan_global_oob_right+0x286/0x2d0 [ 13.953413] kasan_report+0x141/0x180 [ 13.953436] ? kasan_global_oob_right+0x286/0x2d0 [ 13.953463] __asan_report_load1_noabort+0x18/0x20 [ 13.953594] kasan_global_oob_right+0x286/0x2d0 [ 13.953617] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 13.953642] ? __schedule+0x10cc/0x2b60 [ 13.953665] ? __pfx_read_tsc+0x10/0x10 [ 13.953686] ? ktime_get_ts64+0x86/0x230 [ 13.953710] kunit_try_run_case+0x1a5/0x480 [ 13.953735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.953757] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.953782] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.953805] ? __kthread_parkme+0x82/0x180 [ 13.953825] ? preempt_count_sub+0x50/0x80 [ 13.953848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.953872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.953895] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.953920] kthread+0x337/0x6f0 [ 13.953939] ? trace_preempt_on+0x20/0xc0 [ 13.953962] ? __pfx_kthread+0x10/0x10 [ 13.953982] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.954003] ? calculate_sigpending+0x7b/0xa0 [ 13.954041] ? __pfx_kthread+0x10/0x10 [ 13.954062] ret_from_fork+0x116/0x1d0 [ 13.954081] ? __pfx_kthread+0x10/0x10 [ 13.954101] ret_from_fork_asm+0x1a/0x30 [ 13.954131] </TASK> [ 13.954141] [ 13.967321] The buggy address belongs to the variable: [ 13.967899] global_array+0xd/0x40 [ 13.968247] [ 13.968542] The buggy address belongs to the physical page: [ 13.968881] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x55663 [ 13.969316] flags: 0x100000000002000(reserved|node=0|zone=1) [ 13.969866] raw: 0100000000002000 ffffea00015598c8 ffffea00015598c8 0000000000000000 [ 13.970370] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.970864] page dumped because: kasan: bad access detected [ 13.971270] [ 13.971382] Memory state around the buggy address: [ 13.971932] ffffffff88263d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.972383] ffffffff88263e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.973007] >ffffffff88263e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 13.973360] ^ [ 13.973559] ffffffff88263f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 13.973983] ffffffff88263f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 13.974362] ==================================================================