Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 39.055428] ================================================================== [ 39.066038] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 39.073588] Read of size 1 at addr ffff800087bb258d by task kunit_try_catch/289 [ 39.080879] [ 39.082364] CPU: 2 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 39.082421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.082439] Hardware name: WinLink E850-96 board (DT) [ 39.082460] Call trace: [ 39.082473] show_stack+0x20/0x38 (C) [ 39.082512] dump_stack_lvl+0x8c/0xd0 [ 39.082550] print_report+0x310/0x608 [ 39.082588] kasan_report+0xdc/0x128 [ 39.082620] __asan_report_load1_noabort+0x20/0x30 [ 39.082654] kasan_global_oob_right+0x230/0x270 [ 39.082686] kunit_try_run_case+0x170/0x3f0 [ 39.082724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.082764] kthread+0x328/0x630 [ 39.082796] ret_from_fork+0x10/0x20 [ 39.082834] [ 39.146418] The buggy address belongs to the variable: [ 39.151537] global_array+0xd/0x40 [ 39.154923] [ 39.156415] The buggy address belongs to the virtual mapping at [ 39.156415] [ffff800085d50000, ffff800087c71000) created by: [ 39.156415] paging_init+0x66c/0x7d0 [ 39.171589] [ 39.173069] The buggy address belongs to the physical page: [ 39.178626] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87bb2 [ 39.186524] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 39.193822] raw: 03fffe0000002000 fffffdffc01eec88 fffffdffc01eec88 0000000000000000 [ 39.201543] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 39.209263] page dumped because: kasan: bad access detected [ 39.214819] [ 39.216293] Memory state around the buggy address: [ 39.221074] ffff800087bb2480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.228275] ffff800087bb2500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 39.235481] >ffff800087bb2580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 39.242682] ^ [ 39.246159] ffff800087bb2600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 39.253362] ffff800087bb2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.260564] ==================================================================
[ 28.257127] ================================================================== [ 28.257303] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 28.257449] Read of size 1 at addr ffffa1cc1efb258d by task kunit_try_catch/246 [ 28.257569] [ 28.257674] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 28.258218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.258306] Hardware name: linux,dummy-virt (DT) [ 28.258397] Call trace: [ 28.258466] show_stack+0x20/0x38 (C) [ 28.258618] dump_stack_lvl+0x8c/0xd0 [ 28.258838] print_report+0x310/0x608 [ 28.258975] kasan_report+0xdc/0x128 [ 28.259174] __asan_report_load1_noabort+0x20/0x30 [ 28.259345] kasan_global_oob_right+0x230/0x270 [ 28.259596] kunit_try_run_case+0x170/0x3f0 [ 28.259787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.260020] kthread+0x328/0x630 [ 28.260212] ret_from_fork+0x10/0x20 [ 28.260363] [ 28.260530] The buggy address belongs to the variable: [ 28.260650] global_array+0xd/0x40 [ 28.260810] [ 28.261009] The buggy address belongs to the virtual mapping at [ 28.261009] [ffffa1cc1d150000, ffffa1cc1f071000) created by: [ 28.261009] paging_init+0x66c/0x7d0 [ 28.261345] [ 28.261474] The buggy address belongs to the physical page: [ 28.261564] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47db2 [ 28.261721] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 28.261924] raw: 03fffe0000002000 ffffc1ffc01f6c88 ffffc1ffc01f6c88 0000000000000000 [ 28.262131] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.262245] page dumped because: kasan: bad access detected [ 28.262415] [ 28.262495] Memory state around the buggy address: [ 28.262655] ffffa1cc1efb2480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.262848] ffffa1cc1efb2500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 28.262966] >ffffa1cc1efb2580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 28.263124] ^ [ 28.263252] ffffa1cc1efb2600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 28.263389] ffffa1cc1efb2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.263520] ==================================================================
[ 21.025069] ================================================================== [ 21.027009] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 21.028071] Read of size 1 at addr ffffffff8bc7ae4d by task kunit_try_catch/262 [ 21.028966] [ 21.029650] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 21.029783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.029815] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 21.029876] Call Trace: [ 21.029899] <TASK> [ 21.029922] dump_stack_lvl+0x73/0xb0 [ 21.030001] print_report+0xd1/0x650 [ 21.030081] ? __virt_addr_valid+0x1db/0x2d0 [ 21.030159] ? kasan_global_oob_right+0x286/0x2d0 [ 21.030307] ? kasan_addr_to_slab+0x11/0xa0 [ 21.030343] ? kasan_global_oob_right+0x286/0x2d0 [ 21.030376] kasan_report+0x141/0x180 [ 21.030410] ? kasan_global_oob_right+0x286/0x2d0 [ 21.030449] __asan_report_load1_noabort+0x18/0x20 [ 21.030479] kasan_global_oob_right+0x286/0x2d0 [ 21.030510] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 21.030544] ? __schedule+0x10cc/0x2b60 [ 21.030580] ? __pfx_read_tsc+0x10/0x10 [ 21.030610] ? ktime_get_ts64+0x86/0x230 [ 21.030644] kunit_try_run_case+0x1a5/0x480 [ 21.030686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.030734] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 21.030771] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 21.030808] ? __kthread_parkme+0x82/0x180 [ 21.030838] ? preempt_count_sub+0x50/0x80 [ 21.030869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 21.030898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 21.030932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 21.031001] kthread+0x337/0x6f0 [ 21.031033] ? trace_preempt_on+0x20/0xc0 [ 21.031068] ? __pfx_kthread+0x10/0x10 [ 21.031097] ? _raw_spin_unlock_irq+0x47/0x80 [ 21.031130] ? calculate_sigpending+0x7b/0xa0 [ 21.031173] ? __pfx_kthread+0x10/0x10 [ 21.031241] ret_from_fork+0x116/0x1d0 [ 21.031269] ? __pfx_kthread+0x10/0x10 [ 21.031300] ret_from_fork_asm+0x1a/0x30 [ 21.031342] </TASK> [ 21.031357] [ 21.052471] The buggy address belongs to the variable: [ 21.053533] global_array+0xd/0x40 [ 21.054078] [ 21.054606] The buggy address belongs to the physical page: [ 21.055382] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x125a7a [ 21.056648] flags: 0x200000000002000(reserved|node=0|zone=2) [ 21.057291] raw: 0200000000002000 ffffea0004969e88 ffffea0004969e88 0000000000000000 [ 21.058390] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 21.059700] page dumped because: kasan: bad access detected [ 21.060148] [ 21.060463] Memory state around the buggy address: [ 21.061403] ffffffff8bc7ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.062394] ffffffff8bc7ad80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.063137] >ffffffff8bc7ae00: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 [ 21.064061] ^ [ 21.064794] ffffffff8bc7ae80: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 21.065631] ffffffff8bc7af00: 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 21.066715] ==================================================================
[ 65.961669] ================================================================== [ 65.974273] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x284/0x2bc [ 65.981903] Read of size 1 at addr c6a56c8d by task kunit_try_catch/297 [ 65.988555] [ 65.990081] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 65.990112] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 65.990112] Hardware name: Generic DRA74X (Flattened Device Tree) [ 65.990112] Call trace: [ 65.990142] unwind_backtrace from show_stack+0x18/0x1c [ 65.990142] show_stack from dump_stack_lvl+0x70/0x90 [ 65.990173] dump_stack_lvl from print_report+0x158/0x528 [ 65.990203] print_report from kasan_report+0xdc/0x118 [ 65.990234] kasan_report from kasan_global_oob_right+0x284/0x2bc [ 65.990264] kasan_global_oob_right from kunit_try_run_case+0x22c/0x5a8 [ 65.990264] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 65.990295] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 65.990325] kthread from ret_from_fork+0x14/0x20 [ 65.990356] Exception stack(0xf245bfb0 to 0xf245bff8) [ 65.990356] bfa0: 00000000 00000000 00000000 00000000 [ 65.990386] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 65.990417] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 65.990417] [ 66.097045] The buggy address belongs to the variable: [ 66.102203] global_array+0xd/0x40 [ 66.105651] [ 66.107147] The buggy address belongs to the physical page: [ 66.112762] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x86a56 [ 66.120025] flags: 0x2000(reserved|zone=0) [ 66.124145] raw: 00002000 eeaee41c eeaee41c 00000000 00000000 00000000 ffffffff 00000001 [ 66.132293] raw: 00000000 [ 66.134948] page dumped because: kasan: bad access detected [ 66.140533] [ 66.142059] Memory state around the buggy address: [ 66.146881] c6a56b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.153442] c6a56c00: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 66.160034] >c6a56c80: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 66.166595] ^ [ 66.169403] c6a56d00: 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 66.175964] c6a56d80: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 66.182556] ==================================================================