Date
June 16, 2025, 7:07 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.099541] ================================================================== [ 22.099640] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 22.099730] Read of size 1 at addr ffffb1010d3b664d by task kunit_try_catch/254 [ 22.099793] [ 22.099873] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT [ 22.099982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.100018] Hardware name: linux,dummy-virt (DT) [ 22.100059] Call trace: [ 22.100947] show_stack+0x20/0x38 (C) [ 22.101159] dump_stack_lvl+0x8c/0xd0 [ 22.101222] print_report+0x310/0x608 [ 22.101499] kasan_report+0xdc/0x128 [ 22.101622] __asan_report_load1_noabort+0x20/0x30 [ 22.101700] kasan_global_oob_right+0x230/0x270 [ 22.102035] kunit_try_run_case+0x170/0x3f0 [ 22.102125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.102410] kthread+0x328/0x630 [ 22.102485] ret_from_fork+0x10/0x20 [ 22.102797] [ 22.102920] The buggy address belongs to the variable: [ 22.102964] global_array+0xd/0x40 [ 22.103304] [ 22.103484] The buggy address belongs to the virtual mapping at [ 22.103484] [ffffb1010b550000, ffffb1010d471000) created by: [ 22.103484] paging_init+0x66c/0x7d0 [ 22.103925] [ 22.104044] The buggy address belongs to the physical page: [ 22.104109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db6 [ 22.104427] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 22.104761] raw: 03fffe0000002000 ffffc1ffc01f6d88 ffffc1ffc01f6d88 0000000000000000 [ 22.104892] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.105027] page dumped because: kasan: bad access detected [ 22.105074] [ 22.105097] Memory state around the buggy address: [ 22.105176] ffffb1010d3b6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.105236] ffffb1010d3b6580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.105290] >ffffb1010d3b6600: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 22.105338] ^ [ 22.105385] ffffb1010d3b6680: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 22.105672] ffffb1010d3b6700: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 22.105749] ==================================================================
[ 13.279381] ================================================================== [ 13.280177] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 13.280491] Read of size 1 at addr ffffffffb7e6ee8d by task kunit_try_catch/270 [ 13.280771] [ 13.280908] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) [ 13.280974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.280985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.281006] Call Trace: [ 13.281019] <TASK> [ 13.281038] dump_stack_lvl+0x73/0xb0 [ 13.281067] print_report+0xd1/0x650 [ 13.281089] ? __virt_addr_valid+0x1db/0x2d0 [ 13.281112] ? kasan_global_oob_right+0x286/0x2d0 [ 13.281132] ? kasan_addr_to_slab+0x11/0xa0 [ 13.281152] ? kasan_global_oob_right+0x286/0x2d0 [ 13.281173] kasan_report+0x141/0x180 [ 13.281194] ? kasan_global_oob_right+0x286/0x2d0 [ 13.281219] __asan_report_load1_noabort+0x18/0x20 [ 13.281244] kasan_global_oob_right+0x286/0x2d0 [ 13.281265] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 13.281289] ? __schedule+0x10cc/0x2b60 [ 13.281310] ? __pfx_read_tsc+0x10/0x10 [ 13.281333] ? ktime_get_ts64+0x86/0x230 [ 13.281359] kunit_try_run_case+0x1a5/0x480 [ 13.281383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.281405] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.281426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.281448] ? __kthread_parkme+0x82/0x180 [ 13.281542] ? preempt_count_sub+0x50/0x80 [ 13.281567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.281591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.281612] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.281634] kthread+0x337/0x6f0 [ 13.281653] ? trace_preempt_on+0x20/0xc0 [ 13.281676] ? __pfx_kthread+0x10/0x10 [ 13.281703] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.281724] ? calculate_sigpending+0x7b/0xa0 [ 13.281747] ? __pfx_kthread+0x10/0x10 [ 13.281768] ret_from_fork+0x116/0x1d0 [ 13.281786] ? __pfx_kthread+0x10/0x10 [ 13.281805] ret_from_fork_asm+0x1a/0x30 [ 13.281835] </TASK> [ 13.281847] [ 13.289126] The buggy address belongs to the variable: [ 13.289379] global_array+0xd/0x40 [ 13.289689] [ 13.289804] The buggy address belongs to the physical page: [ 13.290095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x17326e [ 13.290486] flags: 0x200000000002000(reserved|node=0|zone=2) [ 13.290891] raw: 0200000000002000 ffffea0005cc9b88 ffffea0005cc9b88 0000000000000000 [ 13.291208] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.291571] page dumped because: kasan: bad access detected [ 13.291741] [ 13.291804] Memory state around the buggy address: [ 13.291987] ffffffffb7e6ed80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.292304] ffffffffb7e6ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.292998] >ffffffffb7e6ee80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 13.293220] ^ [ 13.293369] ffffffffb7e6ef00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 13.293743] ffffffffb7e6ef80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 13.294328] ==================================================================