Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 38.934662] ================================================================== [ 38.945321] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 38.952870] Read of size 1 at addr ffff800087baf5cd by task kunit_try_catch/292 [ 38.960161] [ 38.961647] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 38.961702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.961721] Hardware name: WinLink E850-96 board (DT) [ 38.961745] Call trace: [ 38.961764] show_stack+0x20/0x38 (C) [ 38.961802] dump_stack_lvl+0x8c/0xd0 [ 38.961841] print_report+0x310/0x608 [ 38.961880] kasan_report+0xdc/0x128 [ 38.961914] __asan_report_load1_noabort+0x20/0x30 [ 38.961954] kasan_global_oob_right+0x230/0x270 [ 38.961984] kunit_try_run_case+0x170/0x3f0 [ 38.962022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.962062] kthread+0x328/0x630 [ 38.962091] ret_from_fork+0x10/0x20 [ 38.962129] [ 39.024831] The buggy address belongs to the variable: [ 39.029951] global_array+0xd/0x40 [ 39.033336] [ 39.034826] The buggy address belongs to the virtual mapping at [ 39.034826] [ffff800085d50000, ffff800087c61000) created by: [ 39.034826] paging_init+0x66c/0x7d0 [ 39.050003] [ 39.051483] The buggy address belongs to the physical page: [ 39.057039] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87baf [ 39.064936] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 39.072237] raw: 03fffe0000002000 fffffdffc01eebc8 fffffdffc01eebc8 0000000000000000 [ 39.079957] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.087677] page dumped because: kasan: bad access detected [ 39.093231] [ 39.094707] Memory state around the buggy address: [ 39.099488] ffff800087baf480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.106690] ffff800087baf500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.113896] >ffff800087baf580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 39.121096] ^ [ 39.126655] ffff800087baf600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 39.133859] ffff800087baf680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 39.141063] ==================================================================
[ 28.731094] ================================================================== [ 28.731310] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 28.731566] Read of size 1 at addr ffffa6ed585af5cd by task kunit_try_catch/245 [ 28.731874] [ 28.732095] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.732574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.732656] Hardware name: linux,dummy-virt (DT) [ 28.732752] Call trace: [ 28.732821] show_stack+0x20/0x38 (C) [ 28.732976] dump_stack_lvl+0x8c/0xd0 [ 28.733138] print_report+0x310/0x608 [ 28.733268] kasan_report+0xdc/0x128 [ 28.733416] __asan_report_load1_noabort+0x20/0x30 [ 28.733856] kasan_global_oob_right+0x230/0x270 [ 28.734187] kunit_try_run_case+0x170/0x3f0 [ 28.734534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.734720] kthread+0x328/0x630 [ 28.734880] ret_from_fork+0x10/0x20 [ 28.735200] [ 28.735404] The buggy address belongs to the variable: [ 28.735513] global_array+0xd/0x40 [ 28.736770] [ 28.737043] The buggy address belongs to the virtual mapping at [ 28.737043] [ffffa6ed56750000, ffffa6ed58661000) created by: [ 28.737043] paging_init+0x66c/0x7d0 [ 28.737251] [ 28.737411] The buggy address belongs to the physical page: [ 28.737547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47daf [ 28.737779] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 28.737974] raw: 03fffe0000002000 ffffc1ffc01f6bc8 ffffc1ffc01f6bc8 0000000000000000 [ 28.738201] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.738486] page dumped because: kasan: bad access detected [ 28.738627] [ 28.738676] Memory state around the buggy address: [ 28.738852] ffffa6ed585af480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.740118] ffffa6ed585af500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.740318] >ffffa6ed585af580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 28.740555] ^ [ 28.740649] ffffa6ed585af600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 28.740965] ffffa6ed585af680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 28.742519] ==================================================================
[ 28.848504] ================================================================== [ 28.848644] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 28.848775] Read of size 1 at addr ffffa63992daf5cd by task kunit_try_catch/245 [ 28.849414] [ 28.849678] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 28.850221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.850461] Hardware name: linux,dummy-virt (DT) [ 28.850645] Call trace: [ 28.850723] show_stack+0x20/0x38 (C) [ 28.850869] dump_stack_lvl+0x8c/0xd0 [ 28.850996] print_report+0x310/0x608 [ 28.851115] kasan_report+0xdc/0x128 [ 28.851678] __asan_report_load1_noabort+0x20/0x30 [ 28.852357] kasan_global_oob_right+0x230/0x270 [ 28.852831] kunit_try_run_case+0x170/0x3f0 [ 28.853010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.853159] kthread+0x328/0x630 [ 28.853274] ret_from_fork+0x10/0x20 [ 28.853412] [ 28.853739] The buggy address belongs to the variable: [ 28.853873] global_array+0xd/0x40 [ 28.854005] [ 28.854209] The buggy address belongs to the virtual mapping at [ 28.854209] [ffffa63990f50000, ffffa63992e61000) created by: [ 28.854209] paging_init+0x66c/0x7d0 [ 28.854416] [ 28.854541] The buggy address belongs to the physical page: [ 28.854686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47daf [ 28.855300] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 28.856229] raw: 03fffe0000002000 ffffc1ffc01f6bc8 ffffc1ffc01f6bc8 0000000000000000 [ 28.856789] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.857370] page dumped because: kasan: bad access detected [ 28.857660] [ 28.857735] Memory state around the buggy address: [ 28.857921] ffffa63992daf480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.858978] ffffa63992daf500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.859329] >ffffa63992daf580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 28.860023] ^ [ 28.860127] ffffa63992daf600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 28.860234] ffffa63992daf680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 28.860434] ==================================================================
[ 21.819388] ================================================================== [ 21.820385] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 21.822074] Read of size 1 at addr ffffffffb5276e8d by task kunit_try_catch/263 [ 21.823292] [ 21.824043] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 21.824194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.824236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.824326] Call Trace: [ 21.824354] <TASK> [ 21.824380] dump_stack_lvl+0x73/0xb0 [ 21.824434] print_report+0xd1/0x650 [ 21.824467] ? __virt_addr_valid+0x1db/0x2d0 [ 21.824525] ? kasan_global_oob_right+0x286/0x2d0 [ 21.824610] ? kasan_addr_to_slab+0x11/0xa0 [ 21.824678] ? kasan_global_oob_right+0x286/0x2d0 [ 21.824742] kasan_report+0x141/0x180 [ 21.824805] ? kasan_global_oob_right+0x286/0x2d0 [ 21.824872] __asan_report_load1_noabort+0x18/0x20 [ 21.824937] kasan_global_oob_right+0x286/0x2d0 [ 21.825001] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 21.825065] ? __schedule+0x10cc/0x2b60 [ 21.825132] ? __pfx_read_tsc+0x10/0x10 [ 21.825200] ? ktime_get_ts64+0x86/0x230 [ 21.825258] kunit_try_run_case+0x1a5/0x480 [ 21.825308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.825343] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.825380] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.825415] ? __kthread_parkme+0x82/0x180 [ 21.825445] ? preempt_count_sub+0x50/0x80 [ 21.825477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.825549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.825652] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.825704] kthread+0x337/0x6f0 [ 21.825734] ? trace_preempt_on+0x20/0xc0 [ 21.825770] ? __pfx_kthread+0x10/0x10 [ 21.825800] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.825831] ? calculate_sigpending+0x7b/0xa0 [ 21.825866] ? __pfx_kthread+0x10/0x10 [ 21.825896] ret_from_fork+0x116/0x1d0 [ 21.825922] ? __pfx_kthread+0x10/0x10 [ 21.825950] ret_from_fork_asm+0x1a/0x30 [ 21.825993] </TASK> [ 21.826008] [ 21.847230] The buggy address belongs to the variable: [ 21.848313] global_array+0xd/0x40 [ 21.848752] [ 21.849036] The buggy address belongs to the physical page: [ 21.849542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x40876 [ 21.850140] flags: 0x100000000002000(reserved|node=0|zone=1) [ 21.851219] raw: 0100000000002000 ffffea0001021d88 ffffea0001021d88 0000000000000000 [ 21.851836] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.852750] page dumped because: kasan: bad access detected [ 21.853427] [ 21.853803] Memory state around the buggy address: [ 21.854632] ffffffffb5276d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.856074] ffffffffb5276e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.856896] >ffffffffb5276e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 21.857901] ^ [ 21.858275] ffffffffb5276f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 21.859173] ffffffffb5276f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 21.859975] ==================================================================
[ 20.612305] ================================================================== [ 20.613114] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 20.613412] Read of size 1 at addr ffffffffbf276e8d by task kunit_try_catch/263 [ 20.614250] [ 20.615385] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.615459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.615480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.615522] Call Trace: [ 20.615581] <TASK> [ 20.615635] dump_stack_lvl+0x73/0xb0 [ 20.615690] print_report+0xd1/0x650 [ 20.615724] ? __virt_addr_valid+0x1db/0x2d0 [ 20.615758] ? kasan_global_oob_right+0x286/0x2d0 [ 20.615788] ? kasan_addr_to_slab+0x11/0xa0 [ 20.615817] ? kasan_global_oob_right+0x286/0x2d0 [ 20.615847] kasan_report+0x141/0x180 [ 20.615901] ? kasan_global_oob_right+0x286/0x2d0 [ 20.615943] __asan_report_load1_noabort+0x18/0x20 [ 20.615980] kasan_global_oob_right+0x286/0x2d0 [ 20.616011] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 20.616044] ? __schedule+0x10cc/0x2b60 [ 20.616076] ? __pfx_read_tsc+0x10/0x10 [ 20.616119] ? ktime_get_ts64+0x86/0x230 [ 20.616170] kunit_try_run_case+0x1a5/0x480 [ 20.616211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.616245] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.616279] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.616313] ? __kthread_parkme+0x82/0x180 [ 20.616341] ? preempt_count_sub+0x50/0x80 [ 20.616374] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.616409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.616443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.616478] kthread+0x337/0x6f0 [ 20.616507] ? trace_preempt_on+0x20/0xc0 [ 20.616586] ? __pfx_kthread+0x10/0x10 [ 20.616667] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.616750] ? calculate_sigpending+0x7b/0xa0 [ 20.616830] ? __pfx_kthread+0x10/0x10 [ 20.616865] ret_from_fork+0x116/0x1d0 [ 20.616921] ? __pfx_kthread+0x10/0x10 [ 20.616953] ret_from_fork_asm+0x1a/0x30 [ 20.616997] </TASK> [ 20.617013] [ 20.638927] The buggy address belongs to the variable: [ 20.639425] global_array+0xd/0x40 [ 20.640166] [ 20.640689] The buggy address belongs to the physical page: [ 20.641413] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2b876 [ 20.642600] flags: 0x100000000002000(reserved|node=0|zone=1) [ 20.643073] raw: 0100000000002000 ffffea0000ae1d88 ffffea0000ae1d88 0000000000000000 [ 20.643911] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.644780] page dumped because: kasan: bad access detected [ 20.645729] [ 20.646310] Memory state around the buggy address: [ 20.647066] ffffffffbf276d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.648212] ffffffffbf276e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.648893] >ffffffffbf276e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 20.649600] ^ [ 20.650001] ffffffffbf276f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 [ 20.650779] ffffffffbf276f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 20.651681] ==================================================================
[ 22.419379] ================================================================== [ 22.420564] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 22.421292] Read of size 1 at addr ffff800087baf5cd by task kunit_try_catch/298 [ 22.421972] [ 22.422136] CPU: 2 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 22.422189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.422203] Hardware name: Radxa ROCK Pi 4B (DT) [ 22.422222] Call trace: [ 22.422234] show_stack+0x20/0x38 (C) [ 22.422271] dump_stack_lvl+0x8c/0xd0 [ 22.422308] print_report+0x310/0x608 [ 22.422342] kasan_report+0xdc/0x128 [ 22.422375] __asan_report_load1_noabort+0x20/0x30 [ 22.422413] kasan_global_oob_right+0x230/0x270 [ 22.422444] kunit_try_run_case+0x170/0x3f0 [ 22.422481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.422520] kthread+0x328/0x630 [ 22.422548] ret_from_fork+0x10/0x20 [ 22.422581] [ 22.428191] The buggy address belongs to the variable: [ 22.428667] global_array+0xd/0x40 [ 22.429010] [ 22.429177] The buggy address belongs to the virtual mapping at [ 22.429177] [ffff800085d50000, ffff800087c61000) created by: [ 22.429177] paging_init+0x66c/0x7d0 [ 22.430564] [ 22.430720] The buggy address belongs to the physical page: [ 22.431237] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa3af [ 22.431962] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 22.432659] raw: 03fffe0000002000 fffffdffc028ebc8 fffffdffc028ebc8 0000000000000000 [ 22.433377] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.434085] page dumped because: kasan: bad access detected [ 22.434601] [ 22.434754] Memory state around the buggy address: [ 22.435204] ffff800087baf480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.435872] ffff800087baf500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.436539] >ffff800087baf580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 22.437202] ^ [ 22.437722] ffff800087baf600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 22.438389] ffff800087baf680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 22.439052] ==================================================================