Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.028496] ================================================================== [ 18.028559] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 18.028607] Read of size 1 at addr ffff9fe24554f58d by task kunit_try_catch/246 [ 18.028658] [ 18.028692] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.028773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.028800] Hardware name: linux,dummy-virt (DT) [ 18.028830] Call trace: [ 18.028851] show_stack+0x20/0x38 (C) [ 18.029307] dump_stack_lvl+0x8c/0xd0 [ 18.029681] print_report+0x310/0x5d0 [ 18.029871] kasan_report+0xdc/0x128 [ 18.029916] __asan_report_load1_noabort+0x20/0x30 [ 18.030467] kasan_global_oob_right+0x230/0x270 [ 18.030620] kunit_try_run_case+0x170/0x3f0 [ 18.030762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.030879] kthread+0x328/0x630 [ 18.030953] ret_from_fork+0x10/0x20 [ 18.031085] [ 18.031213] The buggy address belongs to the variable: [ 18.031246] global_array+0xd/0x40 [ 18.031295] [ 18.031348] The buggy address ffff9fe24554f58d belongs to a vmalloc virtual mapping [ 18.031641] The buggy address belongs to the physical page: [ 18.031697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 18.031754] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 18.032048] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 18.032280] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.032405] page dumped because: kasan: bad access detected [ 18.032463] [ 18.032482] Memory state around the buggy address: [ 18.032515] ffff9fe24554f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.032559] ffff9fe24554f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 18.032603] >ffff9fe24554f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 18.032641] ^ [ 18.032670] ffff9fe24554f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 18.032715] ffff9fe24554f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.032755] ==================================================================
[ 18.790381] ================================================================== [ 18.790576] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 18.790958] Read of size 1 at addr ffff94699bf4f58d by task kunit_try_catch/246 [ 18.791174] [ 18.791232] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.791623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.791672] Hardware name: linux,dummy-virt (DT) [ 18.791735] Call trace: [ 18.791847] show_stack+0x20/0x38 (C) [ 18.791945] dump_stack_lvl+0x8c/0xd0 [ 18.792049] print_report+0x310/0x5d0 [ 18.792097] kasan_report+0xdc/0x128 [ 18.792143] __asan_report_load1_noabort+0x20/0x30 [ 18.792231] kasan_global_oob_right+0x230/0x270 [ 18.792279] kunit_try_run_case+0x170/0x3f0 [ 18.792349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.792780] kthread+0x328/0x630 [ 18.792833] ret_from_fork+0x10/0x20 [ 18.792988] [ 18.793082] The buggy address belongs to the variable: [ 18.793227] global_array+0xd/0x40 [ 18.793279] [ 18.793370] The buggy address ffff94699bf4f58d belongs to a vmalloc virtual mapping [ 18.793619] The buggy address belongs to the physical page: [ 18.793745] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 18.793800] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 18.793866] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 18.793916] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.793956] page dumped because: kasan: bad access detected [ 18.793986] [ 18.794008] Memory state around the buggy address: [ 18.794040] ffff94699bf4f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.794084] ffff94699bf4f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 18.794192] >ffff94699bf4f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 18.794233] ^ [ 18.794262] ffff94699bf4f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 18.794340] ffff94699bf4f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.794380] ==================================================================
[ 14.418726] ================================================================== [ 14.419256] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 14.419648] Read of size 1 at addr ffffffffa3263e8d by task kunit_try_catch/263 [ 14.419919] [ 14.420049] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.420097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.420109] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.420131] Call Trace: [ 14.420144] <TASK> [ 14.420160] dump_stack_lvl+0x73/0xb0 [ 14.420191] print_report+0xd1/0x610 [ 14.420214] ? __virt_addr_valid+0x1db/0x2d0 [ 14.420238] ? kasan_global_oob_right+0x286/0x2d0 [ 14.420261] ? kasan_addr_to_slab+0x11/0xa0 [ 14.420288] ? kasan_global_oob_right+0x286/0x2d0 [ 14.420311] kasan_report+0x141/0x180 [ 14.420333] ? kasan_global_oob_right+0x286/0x2d0 [ 14.420361] __asan_report_load1_noabort+0x18/0x20 [ 14.420386] kasan_global_oob_right+0x286/0x2d0 [ 14.420409] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 14.420437] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 14.420478] kunit_try_run_case+0x1a5/0x480 [ 14.420503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.420527] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.420698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.420728] ? __kthread_parkme+0x82/0x180 [ 14.420753] ? preempt_count_sub+0x50/0x80 [ 14.420777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.420803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.420830] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.420856] kthread+0x337/0x6f0 [ 14.420876] ? trace_preempt_on+0x20/0xc0 [ 14.420902] ? __pfx_kthread+0x10/0x10 [ 14.420923] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.420945] ? calculate_sigpending+0x7b/0xa0 [ 14.420971] ? __pfx_kthread+0x10/0x10 [ 14.420993] ret_from_fork+0x116/0x1d0 [ 14.421014] ? __pfx_kthread+0x10/0x10 [ 14.421035] ret_from_fork_asm+0x1a/0x30 [ 14.421067] </TASK> [ 14.421077] [ 14.428561] The buggy address belongs to the variable: [ 14.428877] global_array+0xd/0x40 [ 14.429042] [ 14.429156] The buggy address belongs to the physical page: [ 14.429368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11463 [ 14.429708] flags: 0x100000000002000(reserved|node=0|zone=1) [ 14.430041] raw: 0100000000002000 ffffea00004518c8 ffffea00004518c8 0000000000000000 [ 14.430363] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.430664] page dumped because: kasan: bad access detected [ 14.430914] [ 14.431006] Memory state around the buggy address: [ 14.431274] ffffffffa3263d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.431799] ffffffffa3263e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.432119] >ffffffffa3263e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 14.432336] ^ [ 14.432499] ffffffffa3263f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 14.432889] ffffffffa3263f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 14.433238] ==================================================================
[ 14.641551] ================================================================== [ 14.642111] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 14.642422] Read of size 1 at addr ffffffffb4463e8d by task kunit_try_catch/263 [ 14.642725] [ 14.642842] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.642890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.642902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.642925] Call Trace: [ 14.642939] <TASK> [ 14.642956] dump_stack_lvl+0x73/0xb0 [ 14.642987] print_report+0xd1/0x610 [ 14.643009] ? __virt_addr_valid+0x1db/0x2d0 [ 14.643034] ? kasan_global_oob_right+0x286/0x2d0 [ 14.643101] ? kasan_addr_to_slab+0x11/0xa0 [ 14.643144] ? kasan_global_oob_right+0x286/0x2d0 [ 14.643190] kasan_report+0x141/0x180 [ 14.643213] ? kasan_global_oob_right+0x286/0x2d0 [ 14.643240] __asan_report_load1_noabort+0x18/0x20 [ 14.643267] kasan_global_oob_right+0x286/0x2d0 [ 14.643290] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 14.643316] ? __schedule+0x10cc/0x2b60 [ 14.643340] ? __pfx_read_tsc+0x10/0x10 [ 14.643364] ? ktime_get_ts64+0x86/0x230 [ 14.643406] kunit_try_run_case+0x1a5/0x480 [ 14.643434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.643458] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.643496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.643521] ? __kthread_parkme+0x82/0x180 [ 14.643543] ? preempt_count_sub+0x50/0x80 [ 14.643576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.643601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.643649] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.643676] kthread+0x337/0x6f0 [ 14.643708] ? trace_preempt_on+0x20/0xc0 [ 14.643742] ? __pfx_kthread+0x10/0x10 [ 14.643763] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.643786] ? calculate_sigpending+0x7b/0xa0 [ 14.643812] ? __pfx_kthread+0x10/0x10 [ 14.643834] ret_from_fork+0x116/0x1d0 [ 14.643855] ? __pfx_kthread+0x10/0x10 [ 14.643876] ret_from_fork_asm+0x1a/0x30 [ 14.643909] </TASK> [ 14.643919] [ 14.657929] The buggy address belongs to the variable: [ 14.658333] global_array+0xd/0x40 [ 14.658998] [ 14.659124] The buggy address belongs to the physical page: [ 14.659306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x16b063 [ 14.659555] flags: 0x200000000002000(reserved|node=0|zone=2) [ 14.660710] raw: 0200000000002000 ffffea0005ac18c8 ffffea0005ac18c8 0000000000000000 [ 14.662114] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.662980] page dumped because: kasan: bad access detected [ 14.663983] [ 14.664389] Memory state around the buggy address: [ 14.664580] ffffffffb4463d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.664911] ffffffffb4463e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.665179] >ffffffffb4463e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 14.665481] ^ [ 14.665652] ffffffffb4463f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 14.665936] ffffffffb4463f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 14.666296] ==================================================================