Date
April 22, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 20.141929] ================================================================== [ 20.142062] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 20.142188] Read of size 1 at addr ffff9a6058f3e48d by task kunit_try_catch/247 [ 20.142298] [ 20.142389] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 20.145009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.145146] Hardware name: linux,dummy-virt (DT) [ 20.145239] Call trace: [ 20.146511] show_stack+0x20/0x38 (C) [ 20.146684] dump_stack_lvl+0x8c/0xd0 [ 20.146784] print_report+0x310/0x608 [ 20.146872] kasan_report+0xdc/0x128 [ 20.146963] __asan_report_load1_noabort+0x20/0x30 [ 20.147062] kasan_global_oob_right+0x230/0x270 [ 20.147154] kunit_try_run_case+0x170/0x3f0 [ 20.147243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.147337] kthread+0x328/0x630 [ 20.147422] ret_from_fork+0x10/0x20 [ 20.147556] [ 20.147645] The buggy address belongs to the variable: [ 20.147942] global_array+0xd/0x40 [ 20.150395] [ 20.151663] The buggy address belongs to the virtual mapping at [ 20.151663] [ffff9a6057110000, ffff9a6058ff1000) created by: [ 20.151663] paging_init+0x670/0x7d0 [ 20.151864] [ 20.152130] The buggy address belongs to the physical page: [ 20.154553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d3e [ 20.154708] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 20.154869] raw: 03fffe0000002000 ffffc1ffc01f4f88 ffffc1ffc01f4f88 0000000000000000 [ 20.154981] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.155065] page dumped because: kasan: bad access detected [ 20.155124] [ 20.155157] Memory state around the buggy address: [ 20.155223] ffff9a6058f3e380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.155312] ffff9a6058f3e400: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 20.155398] >ffff9a6058f3e480: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 20.155479] ^ [ 20.155567] ffff9a6058f3e500: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 20.155660] ffff9a6058f3e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.155740] ==================================================================
[ 20.855239] ================================================================== [ 20.856382] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 20.857065] Read of size 1 at addr ffffffff9cc9a28d by task kunit_try_catch/265 [ 20.857805] [ 20.858167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 20.858328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.858570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.858637] Call Trace: [ 20.858683] <TASK> [ 20.858731] dump_stack_lvl+0x73/0xb0 [ 20.858814] print_report+0xd1/0x650 [ 20.858897] ? __virt_addr_valid+0x1db/0x2d0 [ 20.859017] ? kasan_global_oob_right+0x286/0x2d0 [ 20.859098] ? kasan_addr_to_slab+0x11/0xa0 [ 20.859172] ? kasan_global_oob_right+0x286/0x2d0 [ 20.859248] kasan_report+0x141/0x180 [ 20.859288] ? kasan_global_oob_right+0x286/0x2d0 [ 20.859329] __asan_report_load1_noabort+0x18/0x20 [ 20.859360] kasan_global_oob_right+0x286/0x2d0 [ 20.859395] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 20.859588] ? __schedule+0x10cc/0x2b30 [ 20.859641] ? __pfx_read_tsc+0x10/0x10 [ 20.859674] ? ktime_get_ts64+0x86/0x230 [ 20.859715] kunit_try_run_case+0x1a5/0x480 [ 20.859753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.859785] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.859821] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.859857] ? __kthread_parkme+0x82/0x180 [ 20.859891] ? preempt_count_sub+0x50/0x80 [ 20.859927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.859962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.859996] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.860028] kthread+0x337/0x6f0 [ 20.860059] ? trace_preempt_on+0x20/0xc0 [ 20.860095] ? __pfx_kthread+0x10/0x10 [ 20.860127] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.860158] ? calculate_sigpending+0x7b/0xa0 [ 20.860192] ? __pfx_kthread+0x10/0x10 [ 20.860226] ret_from_fork+0x41/0x80 [ 20.860258] ? __pfx_kthread+0x10/0x10 [ 20.860289] ret_from_fork_asm+0x1a/0x30 [ 20.860335] </TASK> [ 20.860350] [ 20.881354] The buggy address belongs to the variable: [ 20.882253] global_array+0xd/0x40 [ 20.882904] [ 20.883143] The buggy address belongs to the physical page: [ 20.883887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5b49a [ 20.884894] flags: 0x100000000002000(reserved|node=0|zone=1) [ 20.885342] raw: 0100000000002000 ffffea00016d2688 ffffea00016d2688 0000000000000000 [ 20.886438] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.887076] page dumped because: kasan: bad access detected [ 20.887703] [ 20.888180] Memory state around the buggy address: [ 20.888587] ffffffff9cc9a180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.889679] ffffffff9cc9a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.890229] >ffffffff9cc9a280: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 20.890964] ^ [ 20.891390] ffffffff9cc9a300: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 20.892205] ffffffff9cc9a380: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 20.893346] ==================================================================
[ 21.681071] ================================================================== [ 21.682227] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 21.682936] Read of size 1 at addr ffff800087b3e48d by task kunit_try_catch/303 [ 21.683600] [ 21.683758] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 21.683795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.683806] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.683820] Call trace: [ 21.683830] show_stack+0x20/0x38 (C) [ 21.683855] dump_stack_lvl+0x8c/0xd0 [ 21.683880] print_report+0x310/0x608 [ 21.683902] kasan_report+0xdc/0x128 [ 21.683924] __asan_report_load1_noabort+0x20/0x30 [ 21.683949] kasan_global_oob_right+0x230/0x270 [ 21.683974] kunit_try_run_case+0x170/0x3f0 [ 21.684002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.684032] kthread+0x328/0x630 [ 21.684058] ret_from_fork+0x10/0x20 [ 21.684083] [ 21.689654] The buggy address belongs to the variable: [ 21.690120] global_array+0xd/0x40 [ 21.690446] [ 21.690605] The buggy address belongs to the virtual mapping at [ 21.690605] [ffff800085d10000, ffff800087bf1000) created by: [ 21.690605] paging_init+0x670/0x7d0 [ 21.691973] [ 21.692123] The buggy address belongs to the physical page: [ 21.692631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa33e [ 21.693345] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 21.694025] raw: 03fffe0000002000 fffffdffc028cf88 fffffdffc028cf88 0000000000000000 [ 21.694730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.695427] page dumped because: kasan: bad access detected [ 21.695934] [ 21.696081] Memory state around the buggy address: [ 21.696520] ffff800087b3e380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.697176] ffff800087b3e400: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 21.697831] >ffff800087b3e480: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 21.698483] ^ [ 21.698808] ffff800087b3e500: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 21.699464] ffff800087b3e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.700115] ==================================================================