Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 19.195805] ================================================================== [ 19.195917] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 19.195989] Read of size 1 at addr ffff971ff894f58d by task kunit_try_catch/245 [ 19.196040] [ 19.196086] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.196174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.196202] Hardware name: linux,dummy-virt (DT) [ 19.196236] Call trace: [ 19.196260] show_stack+0x20/0x38 (C) [ 19.197864] dump_stack_lvl+0x8c/0xd0 [ 19.199016] print_report+0x310/0x5d0 [ 19.199067] kasan_report+0xdc/0x128 [ 19.199142] __asan_report_load1_noabort+0x20/0x30 [ 19.199206] kasan_global_oob_right+0x230/0x270 [ 19.199256] kunit_try_run_case+0x170/0x3f0 [ 19.199318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.199370] kthread+0x328/0x630 [ 19.199417] ret_from_fork+0x10/0x20 [ 19.199485] [ 19.199543] The buggy address belongs to the variable: [ 19.199575] global_array+0xd/0x40 [ 19.199625] [ 19.199682] The buggy address ffff971ff894f58d belongs to a vmalloc virtual mapping [ 19.199766] The buggy address belongs to the physical page: [ 19.199802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 19.199921] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 19.200021] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 19.200072] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.200308] page dumped because: kasan: bad access detected [ 19.200343] [ 19.200390] Memory state around the buggy address: [ 19.200427] ffff971ff894f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.200532] ffff971ff894f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 19.200730] >ffff971ff894f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 19.200866] ^ [ 19.201000] ffff971ff894f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 19.201091] ffff971ff894f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.201225] ==================================================================
[ 18.834414] ================================================================== [ 18.834479] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 18.834536] Read of size 1 at addr ffffaeee5cb4f58d by task kunit_try_catch/245 [ 18.834599] [ 18.834726] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.834809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.834836] Hardware name: linux,dummy-virt (DT) [ 18.834868] Call trace: [ 18.834910] show_stack+0x20/0x38 (C) [ 18.834962] dump_stack_lvl+0x8c/0xd0 [ 18.835511] print_report+0x310/0x5d0 [ 18.835569] kasan_report+0xdc/0x128 [ 18.835669] __asan_report_load1_noabort+0x20/0x30 [ 18.835799] kasan_global_oob_right+0x230/0x270 [ 18.835847] kunit_try_run_case+0x170/0x3f0 [ 18.835904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.836011] kthread+0x328/0x630 [ 18.836112] ret_from_fork+0x10/0x20 [ 18.836176] [ 18.836226] The buggy address belongs to the variable: [ 18.836268] global_array+0xd/0x40 [ 18.836446] [ 18.836528] The buggy address ffffaeee5cb4f58d belongs to a vmalloc virtual mapping [ 18.836677] The buggy address belongs to the physical page: [ 18.836721] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 18.836777] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 18.837104] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 18.837202] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.837242] page dumped because: kasan: bad access detected [ 18.837294] [ 18.837312] Memory state around the buggy address: [ 18.837354] ffffaeee5cb4f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.837398] ffffaeee5cb4f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 18.837475] >ffffaeee5cb4f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 18.837534] ^ [ 18.837562] ffffaeee5cb4f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 18.837604] ffffaeee5cb4f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.837643] ==================================================================
[ 18.719558] ================================================================== [ 18.719684] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 18.719753] Read of size 1 at addr ffffb057bbd4f58d by task kunit_try_catch/245 [ 18.719824] [ 18.720177] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.720308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.720373] Hardware name: linux,dummy-virt (DT) [ 18.720408] Call trace: [ 18.720479] show_stack+0x20/0x38 (C) [ 18.720550] dump_stack_lvl+0x8c/0xd0 [ 18.720598] print_report+0x310/0x5d0 [ 18.720644] kasan_report+0xdc/0x128 [ 18.720689] __asan_report_load1_noabort+0x20/0x30 [ 18.720766] kasan_global_oob_right+0x230/0x270 [ 18.720814] kunit_try_run_case+0x170/0x3f0 [ 18.721097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.721173] kthread+0x328/0x630 [ 18.721217] ret_from_fork+0x10/0x20 [ 18.721380] [ 18.721534] The buggy address belongs to the variable: [ 18.721658] global_array+0xd/0x40 [ 18.721730] [ 18.721844] The buggy address ffffb057bbd4f58d belongs to a vmalloc virtual mapping [ 18.721931] The buggy address belongs to the physical page: [ 18.721964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f [ 18.722017] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 18.722084] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000 [ 18.722134] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.722195] page dumped because: kasan: bad access detected [ 18.722227] [ 18.722245] Memory state around the buggy address: [ 18.722277] ffffb057bbd4f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.722320] ffffb057bbd4f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 18.722363] >ffffb057bbd4f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 18.722400] ^ [ 18.722438] ffffb057bbd4f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 18.722481] ffffb057bbd4f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.722527] ==================================================================
[ 13.974514] ================================================================== [ 13.975138] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 13.975509] Read of size 1 at addr ffffffff9c063e8d by task kunit_try_catch/262 [ 13.975811] [ 13.975971] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.976017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.976029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.976051] Call Trace: [ 13.976064] <TASK> [ 13.976079] dump_stack_lvl+0x73/0xb0 [ 13.976110] print_report+0xd1/0x610 [ 13.976132] ? __virt_addr_valid+0x1db/0x2d0 [ 13.976155] ? kasan_global_oob_right+0x286/0x2d0 [ 13.976191] ? kasan_addr_to_slab+0x11/0xa0 [ 13.976212] ? kasan_global_oob_right+0x286/0x2d0 [ 13.976246] kasan_report+0x141/0x180 [ 13.976268] ? kasan_global_oob_right+0x286/0x2d0 [ 13.976296] __asan_report_load1_noabort+0x18/0x20 [ 13.976321] kasan_global_oob_right+0x286/0x2d0 [ 13.976343] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 13.976369] ? __schedule+0x10cc/0x2b60 [ 13.976392] ? __pfx_read_tsc+0x10/0x10 [ 13.976422] ? ktime_get_ts64+0x86/0x230 [ 13.976447] kunit_try_run_case+0x1a5/0x480 [ 13.976473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.976506] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.976531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.976556] ? __kthread_parkme+0x82/0x180 [ 13.976577] ? preempt_count_sub+0x50/0x80 [ 13.976601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.976633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.976657] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.976682] kthread+0x337/0x6f0 [ 13.976712] ? trace_preempt_on+0x20/0xc0 [ 13.976735] ? __pfx_kthread+0x10/0x10 [ 13.976756] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.976777] ? calculate_sigpending+0x7b/0xa0 [ 13.976802] ? __pfx_kthread+0x10/0x10 [ 13.976823] ret_from_fork+0x116/0x1d0 [ 13.976841] ? __pfx_kthread+0x10/0x10 [ 13.976860] ret_from_fork_asm+0x1a/0x30 [ 13.976903] </TASK> [ 13.976913] [ 13.984063] The buggy address belongs to the variable: [ 13.984289] global_array+0xd/0x40 [ 13.984434] [ 13.984521] The buggy address belongs to the physical page: [ 13.984699] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x148263 [ 13.985005] flags: 0x200000000002000(reserved|node=0|zone=2) [ 13.985345] raw: 0200000000002000 ffffea00052098c8 ffffea00052098c8 0000000000000000 [ 13.985696] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.986109] page dumped because: kasan: bad access detected [ 13.986282] [ 13.986352] Memory state around the buggy address: [ 13.986508] ffffffff9c063d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.986749] ffffffff9c063e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.987208] >ffffffff9c063e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 13.987558] ^ [ 13.987737] ffffffff9c063f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 13.988182] ffffffff9c063f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 13.988450] ==================================================================
[ 13.848139] ================================================================== [ 13.848977] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 13.849505] Read of size 1 at addr ffffffffaa863e8d by task kunit_try_catch/263 [ 13.850260] [ 13.850746] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 13.850815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.850828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.850851] Call Trace: [ 13.850864] <TASK> [ 13.850882] dump_stack_lvl+0x73/0xb0 [ 13.850915] print_report+0xd1/0x610 [ 13.850937] ? __virt_addr_valid+0x1db/0x2d0 [ 13.850961] ? kasan_global_oob_right+0x286/0x2d0 [ 13.850983] ? kasan_addr_to_slab+0x11/0xa0 [ 13.851003] ? kasan_global_oob_right+0x286/0x2d0 [ 13.851025] kasan_report+0x141/0x180 [ 13.851047] ? kasan_global_oob_right+0x286/0x2d0 [ 13.851074] __asan_report_load1_noabort+0x18/0x20 [ 13.851098] kasan_global_oob_right+0x286/0x2d0 [ 13.851119] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 13.851145] ? __schedule+0x10cc/0x2b60 [ 13.851167] ? __pfx_read_tsc+0x10/0x10 [ 13.851187] ? ktime_get_ts64+0x86/0x230 [ 13.851212] kunit_try_run_case+0x1a5/0x480 [ 13.851237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.851259] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.851283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.851307] ? __kthread_parkme+0x82/0x180 [ 13.851327] ? preempt_count_sub+0x50/0x80 [ 13.851351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.851375] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.851399] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.851423] kthread+0x337/0x6f0 [ 13.851453] ? trace_preempt_on+0x20/0xc0 [ 13.851476] ? __pfx_kthread+0x10/0x10 [ 13.851497] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.851517] ? calculate_sigpending+0x7b/0xa0 [ 13.851541] ? __pfx_kthread+0x10/0x10 [ 13.851562] ret_from_fork+0x116/0x1d0 [ 13.851580] ? __pfx_kthread+0x10/0x10 [ 13.851600] ret_from_fork_asm+0x1a/0x30 [ 13.851632] </TASK> [ 13.851642] [ 13.863185] The buggy address belongs to the variable: [ 13.863822] global_array+0xd/0x40 [ 13.864192] [ 13.864524] The buggy address belongs to the physical page: [ 13.864950] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x15fc63 [ 13.865566] flags: 0x200000000002000(reserved|node=0|zone=2) [ 13.865843] raw: 0200000000002000 ffffea00057f18c8 ffffea00057f18c8 0000000000000000 [ 13.866175] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 13.866927] page dumped because: kasan: bad access detected [ 13.867173] [ 13.867245] Memory state around the buggy address: [ 13.867771] ffffffffaa863d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.868178] ffffffffaa863e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.868746] >ffffffffaa863e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 13.869246] ^ [ 13.869592] ffffffffaa863f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 13.869913] ffffffffaa863f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 13.870222] ==================================================================
[ 14.113498] ================================================================== [ 14.114554] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 14.114952] Read of size 1 at addr ffffffffbc263e8d by task kunit_try_catch/262 [ 14.115615] [ 14.115884] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.115939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.115952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.115975] Call Trace: [ 14.115992] <TASK> [ 14.116025] dump_stack_lvl+0x73/0xb0 [ 14.116063] print_report+0xd1/0x610 [ 14.116087] ? __virt_addr_valid+0x1db/0x2d0 [ 14.116113] ? kasan_global_oob_right+0x286/0x2d0 [ 14.116135] ? kasan_addr_to_slab+0x11/0xa0 [ 14.116155] ? kasan_global_oob_right+0x286/0x2d0 [ 14.116178] kasan_report+0x141/0x180 [ 14.116201] ? kasan_global_oob_right+0x286/0x2d0 [ 14.116228] __asan_report_load1_noabort+0x18/0x20 [ 14.116252] kasan_global_oob_right+0x286/0x2d0 [ 14.116275] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 14.116300] ? __schedule+0x10cc/0x2b60 [ 14.116323] ? __pfx_read_tsc+0x10/0x10 [ 14.116345] ? ktime_get_ts64+0x86/0x230 [ 14.116371] kunit_try_run_case+0x1a5/0x480 [ 14.116398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.116420] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.116445] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.116468] ? __kthread_parkme+0x82/0x180 [ 14.116490] ? preempt_count_sub+0x50/0x80 [ 14.116515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.116539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.116563] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.116587] kthread+0x337/0x6f0 [ 14.116605] ? trace_preempt_on+0x20/0xc0 [ 14.116629] ? __pfx_kthread+0x10/0x10 [ 14.116649] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.116670] ? calculate_sigpending+0x7b/0xa0 [ 14.116695] ? __pfx_kthread+0x10/0x10 [ 14.116716] ret_from_fork+0x116/0x1d0 [ 14.116734] ? __pfx_kthread+0x10/0x10 [ 14.116754] ret_from_fork_asm+0x1a/0x30 [ 14.116786] </TASK> [ 14.116797] [ 14.124779] The buggy address belongs to the variable: [ 14.125170] global_array+0xd/0x40 [ 14.125376] [ 14.125488] The buggy address belongs to the physical page: [ 14.125745] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4fa63 [ 14.126067] flags: 0x100000000002000(reserved|node=0|zone=1) [ 14.126278] raw: 0100000000002000 ffffea00013e98c8 ffffea00013e98c8 0000000000000000 [ 14.126683] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 14.127069] page dumped because: kasan: bad access detected [ 14.127241] [ 14.127312] Memory state around the buggy address: [ 14.127713] ffffffffbc263d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.128090] ffffffffbc263e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 14.128399] >ffffffffbc263e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 14.128709] ^ [ 14.128834] ffffffffbc263f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 14.129068] ffffffffbc263f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 14.129300] ==================================================================