Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 | |
x86 |
[ 66.276733] ================================================================== [ 66.289337] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x284/0x2bc [ 66.296966] Read of size 1 at addr c6a6ec4d by task kunit_try_catch/301 [ 66.303619] [ 66.305145] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B W N 6.15.0-rc3 #1 NONE [ 66.305175] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 66.305175] Hardware name: Generic DRA74X (Flattened Device Tree) [ 66.305175] Call trace: [ 66.305175] unwind_backtrace from show_stack+0x18/0x1c [ 66.305206] show_stack from dump_stack_lvl+0x70/0x90 [ 66.305236] dump_stack_lvl from print_report+0x158/0x528 [ 66.305267] print_report from kasan_report+0xdc/0x118 [ 66.305297] kasan_report from kasan_global_oob_right+0x284/0x2bc [ 66.305328] kasan_global_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 66.305328] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 66.305358] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 66.305389] kthread from ret_from_fork+0x14/0x20 [ 66.305419] Exception stack(0xf2663fb0 to 0xf2663ff8) [ 66.305419] 3fa0: 00000000 00000000 00000000 00000000 [ 66.305450] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 66.305450] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 66.305480] [ 66.411224] The buggy address belongs to the variable: [ 66.416412] global_array+0xd/0x40 [ 66.419830] [ 66.421325] The buggy address belongs to the physical page: [ 66.426940] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x86a6e [ 66.434234] flags: 0x2000(reserved|zone=0) [ 66.438354] raw: 00002000 eeaee77c eeaee77c 00000000 00000000 00000000 ffffffff 00000001 [ 66.446502] raw: 00000000 [ 66.449157] page dumped because: kasan: bad access detected [ 66.454742] [ 66.456237] Memory state around the buggy address: [ 66.461090] c6a6eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.467651] c6a6eb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.474212] >c6a6ec00: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 66.480804] ^ [ 66.485717] c6a6ec80: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 66.492279] c6a6ed00: 01 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 66.498840] ==================================================================
[ 40.140390] ================================================================== [ 40.152934] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 40.160507] Read of size 1 at addr ffffffffbb49a28d by task kunit_try_catch/288 [ 40.167812] [ 40.169315] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 40.169322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.169325] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 40.169328] Call Trace: [ 40.169329] <TASK> [ 40.169331] dump_stack_lvl+0x73/0xb0 [ 40.169335] print_report+0xd1/0x650 [ 40.169339] ? __virt_addr_valid+0x1db/0x2d0 [ 40.169343] ? kasan_global_oob_right+0x286/0x2d0 [ 40.169347] ? kasan_addr_to_slab+0x11/0xa0 [ 40.169351] ? kasan_global_oob_right+0x286/0x2d0 [ 40.169355] kasan_report+0x141/0x180 [ 40.169359] ? kasan_global_oob_right+0x286/0x2d0 [ 40.169364] __asan_report_load1_noabort+0x18/0x20 [ 40.169368] kasan_global_oob_right+0x286/0x2d0 [ 40.169372] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 40.169376] ? __schedule+0x10cc/0x2b30 [ 40.169381] ? ktime_get_ts64+0x83/0x230 [ 40.169386] kunit_try_run_case+0x1a2/0x480 [ 40.169390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.169394] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 40.169399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 40.169403] ? __kthread_parkme+0x82/0x180 [ 40.169408] ? preempt_count_sub+0x50/0x80 [ 40.169412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 40.169416] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 40.169421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 40.169425] kthread+0x334/0x6f0 [ 40.169429] ? trace_preempt_on+0x20/0xc0 [ 40.169433] ? __pfx_kthread+0x10/0x10 [ 40.169437] ? _raw_spin_unlock_irq+0x47/0x80 [ 40.169441] ? calculate_sigpending+0x7b/0xa0 [ 40.169445] ? __pfx_kthread+0x10/0x10 [ 40.169449] ret_from_fork+0x3e/0x80 [ 40.169453] ? __pfx_kthread+0x10/0x10 [ 40.169458] ret_from_fork_asm+0x1a/0x30 [ 40.169463] </TASK> [ 40.169465] [ 40.333218] The buggy address belongs to the variable: [ 40.338357] global_array+0xd/0x40 [ 40.341772] [ 40.343269] The buggy address belongs to the physical page: [ 40.348842] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x24089a [ 40.356842] flags: 0x200000000002000(reserved|node=0|zone=2) [ 40.362510] raw: 0200000000002000 ffffea0009022688 ffffea0009022688 0000000000000000 [ 40.370256] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 40.377995] page dumped because: kasan: bad access detected [ 40.383567] [ 40.385066] Memory state around the buggy address: [ 40.389858] ffffffffbb49a180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.397080] ffffffffbb49a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.404305] >ffffffffbb49a280: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 40.411526] ^ [ 40.415018] ffffffffbb49a300: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 40.422238] ffffffffbb49a380: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 40.429455] ==================================================================