Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.195805] ==================================================================
[   19.195917] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   19.195989] Read of size 1 at addr ffff971ff894f58d by task kunit_try_catch/245
[   19.196040] 
[   19.196086] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.196174] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.196202] Hardware name: linux,dummy-virt (DT)
[   19.196236] Call trace:
[   19.196260]  show_stack+0x20/0x38 (C)
[   19.197864]  dump_stack_lvl+0x8c/0xd0
[   19.199016]  print_report+0x310/0x5d0
[   19.199067]  kasan_report+0xdc/0x128
[   19.199142]  __asan_report_load1_noabort+0x20/0x30
[   19.199206]  kasan_global_oob_right+0x230/0x270
[   19.199256]  kunit_try_run_case+0x170/0x3f0
[   19.199318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.199370]  kthread+0x328/0x630
[   19.199417]  ret_from_fork+0x10/0x20
[   19.199485] 
[   19.199543] The buggy address belongs to the variable:
[   19.199575]  global_array+0xd/0x40
[   19.199625] 
[   19.199682] The buggy address ffff971ff894f58d belongs to a vmalloc virtual mapping
[   19.199766] The buggy address belongs to the physical page:
[   19.199802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f
[   19.199921] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   19.200021] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000
[   19.200072] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.200308] page dumped because: kasan: bad access detected
[   19.200343] 
[   19.200390] Memory state around the buggy address:
[   19.200427]  ffff971ff894f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.200532]  ffff971ff894f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   19.200730] >ffff971ff894f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   19.200866]                       ^
[   19.201000]  ffff971ff894f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   19.201091]  ffff971ff894f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.201225] ==================================================================

[   18.834414] ==================================================================
[   18.834479] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   18.834536] Read of size 1 at addr ffffaeee5cb4f58d by task kunit_try_catch/245
[   18.834599] 
[   18.834726] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.834809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.834836] Hardware name: linux,dummy-virt (DT)
[   18.834868] Call trace:
[   18.834910]  show_stack+0x20/0x38 (C)
[   18.834962]  dump_stack_lvl+0x8c/0xd0
[   18.835511]  print_report+0x310/0x5d0
[   18.835569]  kasan_report+0xdc/0x128
[   18.835669]  __asan_report_load1_noabort+0x20/0x30
[   18.835799]  kasan_global_oob_right+0x230/0x270
[   18.835847]  kunit_try_run_case+0x170/0x3f0
[   18.835904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.836011]  kthread+0x328/0x630
[   18.836112]  ret_from_fork+0x10/0x20
[   18.836176] 
[   18.836226] The buggy address belongs to the variable:
[   18.836268]  global_array+0xd/0x40
[   18.836446] 
[   18.836528] The buggy address ffffaeee5cb4f58d belongs to a vmalloc virtual mapping
[   18.836677] The buggy address belongs to the physical page:
[   18.836721] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f
[   18.836777] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   18.837104] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000
[   18.837202] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.837242] page dumped because: kasan: bad access detected
[   18.837294] 
[   18.837312] Memory state around the buggy address:
[   18.837354]  ffffaeee5cb4f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.837398]  ffffaeee5cb4f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   18.837475] >ffffaeee5cb4f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   18.837534]                       ^
[   18.837562]  ffffaeee5cb4f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   18.837604]  ffffaeee5cb4f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.837643] ==================================================================

[   18.719558] ==================================================================
[   18.719684] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   18.719753] Read of size 1 at addr ffffb057bbd4f58d by task kunit_try_catch/245
[   18.719824] 
[   18.720177] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.720308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.720373] Hardware name: linux,dummy-virt (DT)
[   18.720408] Call trace:
[   18.720479]  show_stack+0x20/0x38 (C)
[   18.720550]  dump_stack_lvl+0x8c/0xd0
[   18.720598]  print_report+0x310/0x5d0
[   18.720644]  kasan_report+0xdc/0x128
[   18.720689]  __asan_report_load1_noabort+0x20/0x30
[   18.720766]  kasan_global_oob_right+0x230/0x270
[   18.720814]  kunit_try_run_case+0x170/0x3f0
[   18.721097]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.721173]  kthread+0x328/0x630
[   18.721217]  ret_from_fork+0x10/0x20
[   18.721380] 
[   18.721534] The buggy address belongs to the variable:
[   18.721658]  global_array+0xd/0x40
[   18.721730] 
[   18.721844] The buggy address ffffb057bbd4f58d belongs to a vmalloc virtual mapping
[   18.721931] The buggy address belongs to the physical page:
[   18.721964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f
[   18.722017] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   18.722084] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000
[   18.722134] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.722195] page dumped because: kasan: bad access detected
[   18.722227] 
[   18.722245] Memory state around the buggy address:
[   18.722277]  ffffb057bbd4f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.722320]  ffffb057bbd4f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   18.722363] >ffffb057bbd4f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   18.722400]                       ^
[   18.722438]  ffffb057bbd4f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   18.722481]  ffffb057bbd4f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.722527] ==================================================================

[   13.974514] ==================================================================
[   13.975138] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   13.975509] Read of size 1 at addr ffffffff9c063e8d by task kunit_try_catch/262
[   13.975811] 
[   13.975971] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.976017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.976029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.976051] Call Trace:
[   13.976064]  <TASK>
[   13.976079]  dump_stack_lvl+0x73/0xb0
[   13.976110]  print_report+0xd1/0x610
[   13.976132]  ? __virt_addr_valid+0x1db/0x2d0
[   13.976155]  ? kasan_global_oob_right+0x286/0x2d0
[   13.976191]  ? kasan_addr_to_slab+0x11/0xa0
[   13.976212]  ? kasan_global_oob_right+0x286/0x2d0
[   13.976246]  kasan_report+0x141/0x180
[   13.976268]  ? kasan_global_oob_right+0x286/0x2d0
[   13.976296]  __asan_report_load1_noabort+0x18/0x20
[   13.976321]  kasan_global_oob_right+0x286/0x2d0
[   13.976343]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   13.976369]  ? __schedule+0x10cc/0x2b60
[   13.976392]  ? __pfx_read_tsc+0x10/0x10
[   13.976422]  ? ktime_get_ts64+0x86/0x230
[   13.976447]  kunit_try_run_case+0x1a5/0x480
[   13.976473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.976506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.976531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.976556]  ? __kthread_parkme+0x82/0x180
[   13.976577]  ? preempt_count_sub+0x50/0x80
[   13.976601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.976633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.976657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.976682]  kthread+0x337/0x6f0
[   13.976712]  ? trace_preempt_on+0x20/0xc0
[   13.976735]  ? __pfx_kthread+0x10/0x10
[   13.976756]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.976777]  ? calculate_sigpending+0x7b/0xa0
[   13.976802]  ? __pfx_kthread+0x10/0x10
[   13.976823]  ret_from_fork+0x116/0x1d0
[   13.976841]  ? __pfx_kthread+0x10/0x10
[   13.976860]  ret_from_fork_asm+0x1a/0x30
[   13.976903]  </TASK>
[   13.976913] 
[   13.984063] The buggy address belongs to the variable:
[   13.984289]  global_array+0xd/0x40
[   13.984434] 
[   13.984521] The buggy address belongs to the physical page:
[   13.984699] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x148263
[   13.985005] flags: 0x200000000002000(reserved|node=0|zone=2)
[   13.985345] raw: 0200000000002000 ffffea00052098c8 ffffea00052098c8 0000000000000000
[   13.985696] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.986109] page dumped because: kasan: bad access detected
[   13.986282] 
[   13.986352] Memory state around the buggy address:
[   13.986508]  ffffffff9c063d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.986749]  ffffffff9c063e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.987208] >ffffffff9c063e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   13.987558]                       ^
[   13.987737]  ffffffff9c063f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   13.988182]  ffffffff9c063f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   13.988450] ==================================================================

[   13.848139] ==================================================================
[   13.848977] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   13.849505] Read of size 1 at addr ffffffffaa863e8d by task kunit_try_catch/263
[   13.850260] 
[   13.850746] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   13.850815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.850828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.850851] Call Trace:
[   13.850864]  <TASK>
[   13.850882]  dump_stack_lvl+0x73/0xb0
[   13.850915]  print_report+0xd1/0x610
[   13.850937]  ? __virt_addr_valid+0x1db/0x2d0
[   13.850961]  ? kasan_global_oob_right+0x286/0x2d0
[   13.850983]  ? kasan_addr_to_slab+0x11/0xa0
[   13.851003]  ? kasan_global_oob_right+0x286/0x2d0
[   13.851025]  kasan_report+0x141/0x180
[   13.851047]  ? kasan_global_oob_right+0x286/0x2d0
[   13.851074]  __asan_report_load1_noabort+0x18/0x20
[   13.851098]  kasan_global_oob_right+0x286/0x2d0
[   13.851119]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   13.851145]  ? __schedule+0x10cc/0x2b60
[   13.851167]  ? __pfx_read_tsc+0x10/0x10
[   13.851187]  ? ktime_get_ts64+0x86/0x230
[   13.851212]  kunit_try_run_case+0x1a5/0x480
[   13.851237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.851259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.851283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.851307]  ? __kthread_parkme+0x82/0x180
[   13.851327]  ? preempt_count_sub+0x50/0x80
[   13.851351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.851375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.851399]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.851423]  kthread+0x337/0x6f0
[   13.851453]  ? trace_preempt_on+0x20/0xc0
[   13.851476]  ? __pfx_kthread+0x10/0x10
[   13.851497]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.851517]  ? calculate_sigpending+0x7b/0xa0
[   13.851541]  ? __pfx_kthread+0x10/0x10
[   13.851562]  ret_from_fork+0x116/0x1d0
[   13.851580]  ? __pfx_kthread+0x10/0x10
[   13.851600]  ret_from_fork_asm+0x1a/0x30
[   13.851632]  </TASK>
[   13.851642] 
[   13.863185] The buggy address belongs to the variable:
[   13.863822]  global_array+0xd/0x40
[   13.864192] 
[   13.864524] The buggy address belongs to the physical page:
[   13.864950] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15fc63
[   13.865566] flags: 0x200000000002000(reserved|node=0|zone=2)
[   13.865843] raw: 0200000000002000 ffffea00057f18c8 ffffea00057f18c8 0000000000000000
[   13.866175] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.866927] page dumped because: kasan: bad access detected
[   13.867173] 
[   13.867245] Memory state around the buggy address:
[   13.867771]  ffffffffaa863d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.868178]  ffffffffaa863e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.868746] >ffffffffaa863e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   13.869246]                       ^
[   13.869592]  ffffffffaa863f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   13.869913]  ffffffffaa863f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   13.870222] ==================================================================

[   14.113498] ==================================================================
[   14.114554] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   14.114952] Read of size 1 at addr ffffffffbc263e8d by task kunit_try_catch/262
[   14.115615] 
[   14.115884] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.115939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.115952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.115975] Call Trace:
[   14.115992]  <TASK>
[   14.116025]  dump_stack_lvl+0x73/0xb0
[   14.116063]  print_report+0xd1/0x610
[   14.116087]  ? __virt_addr_valid+0x1db/0x2d0
[   14.116113]  ? kasan_global_oob_right+0x286/0x2d0
[   14.116135]  ? kasan_addr_to_slab+0x11/0xa0
[   14.116155]  ? kasan_global_oob_right+0x286/0x2d0
[   14.116178]  kasan_report+0x141/0x180
[   14.116201]  ? kasan_global_oob_right+0x286/0x2d0
[   14.116228]  __asan_report_load1_noabort+0x18/0x20
[   14.116252]  kasan_global_oob_right+0x286/0x2d0
[   14.116275]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   14.116300]  ? __schedule+0x10cc/0x2b60
[   14.116323]  ? __pfx_read_tsc+0x10/0x10
[   14.116345]  ? ktime_get_ts64+0x86/0x230
[   14.116371]  kunit_try_run_case+0x1a5/0x480
[   14.116398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.116420]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.116445]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.116468]  ? __kthread_parkme+0x82/0x180
[   14.116490]  ? preempt_count_sub+0x50/0x80
[   14.116515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.116539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.116563]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.116587]  kthread+0x337/0x6f0
[   14.116605]  ? trace_preempt_on+0x20/0xc0
[   14.116629]  ? __pfx_kthread+0x10/0x10
[   14.116649]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.116670]  ? calculate_sigpending+0x7b/0xa0
[   14.116695]  ? __pfx_kthread+0x10/0x10
[   14.116716]  ret_from_fork+0x116/0x1d0
[   14.116734]  ? __pfx_kthread+0x10/0x10
[   14.116754]  ret_from_fork_asm+0x1a/0x30
[   14.116786]  </TASK>
[   14.116797] 
[   14.124779] The buggy address belongs to the variable:
[   14.125170]  global_array+0xd/0x40
[   14.125376] 
[   14.125488] The buggy address belongs to the physical page:
[   14.125745] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4fa63
[   14.126067] flags: 0x100000000002000(reserved|node=0|zone=1)
[   14.126278] raw: 0100000000002000 ffffea00013e98c8 ffffea00013e98c8 0000000000000000
[   14.126683] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.127069] page dumped because: kasan: bad access detected
[   14.127241] 
[   14.127312] Memory state around the buggy address:
[   14.127713]  ffffffffbc263d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.128090]  ffffffffbc263e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.128399] >ffffffffbc263e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   14.128709]                       ^
[   14.128834]  ffffffffbc263f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   14.129068]  ffffffffbc263f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   14.129300] ==================================================================