Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 54.819916] ================================================================== [ 54.830896] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 54.838444] Read of size 1 at addr ffff800087b4e6cd by task kunit_try_catch/329 [ 54.845735] [ 54.847222] CPU: 6 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 54.847275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.847292] Hardware name: WinLink E850-96 board (DT) [ 54.847315] Call trace: [ 54.847327] show_stack+0x20/0x38 (C) [ 54.847362] dump_stack_lvl+0x8c/0xd0 [ 54.847397] print_report+0x310/0x5d0 [ 54.847429] kasan_report+0xdc/0x128 [ 54.847456] __asan_report_load1_noabort+0x20/0x30 [ 54.847490] kasan_global_oob_right+0x230/0x270 [ 54.847523] kunit_try_run_case+0x170/0x3f0 [ 54.847564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.847597] kthread+0x328/0x630 [ 54.847625] ret_from_fork+0x10/0x20 [ 54.847661] [ 54.911620] The buggy address belongs to the variable: [ 54.916741] global_array+0xd/0x40 [ 54.920126] [ 54.921601] The buggy address ffff800087b4e6cd belongs to a vmalloc virtual mapping [ 54.929245] The buggy address belongs to the physical page: [ 54.934801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87b4e [ 54.942699] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 54.950001] raw: 03fffe0000002000 fffffdffc01ed388 fffffdffc01ed388 0000000000000000 [ 54.957720] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 54.965438] page dumped because: kasan: bad access detected [ 54.970994] [ 54.972469] Memory state around the buggy address: [ 54.977250] ffff800087b4e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.984454] ffff800087b4e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.991657] >ffff800087b4e680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 54.998858] ^ [ 55.004417] ffff800087b4e700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 55.011622] ffff800087b4e780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 55.018823] ==================================================================
[ 31.867781] ================================================================== [ 31.868105] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 31.868451] Read of size 1 at addr ffffb0785134e6cd by task kunit_try_catch/276 [ 31.868637] [ 31.868787] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.868892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.869156] Hardware name: linux,dummy-virt (DT) [ 31.869275] Call trace: [ 31.869567] show_stack+0x20/0x38 (C) [ 31.869679] dump_stack_lvl+0x8c/0xd0 [ 31.869844] print_report+0x310/0x5d0 [ 31.869944] kasan_report+0xdc/0x128 [ 31.870031] __asan_report_load1_noabort+0x20/0x30 [ 31.870096] kasan_global_oob_right+0x230/0x270 [ 31.870159] kunit_try_run_case+0x170/0x3f0 [ 31.870216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.870279] kthread+0x328/0x630 [ 31.870332] ret_from_fork+0x10/0x20 [ 31.870405] [ 31.870483] The buggy address belongs to the variable: [ 31.870540] global_array+0xd/0x40 [ 31.870615] [ 31.870673] The buggy address ffffb0785134e6cd belongs to a vmalloc virtual mapping [ 31.870781] The buggy address belongs to the physical page: [ 31.870826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4e [ 31.870885] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 31.870957] raw: 03fffe0000002000 ffffc1ffc01f5388 ffffc1ffc01f5388 0000000000000000 [ 31.871010] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.871319] page dumped because: kasan: bad access detected [ 31.871641] [ 31.871857] Memory state around the buggy address: [ 31.871936] ffffb0785134e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.872292] ffffb0785134e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.872601] >ffffb0785134e680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 31.872755] ^ [ 31.872847] ffffb0785134e700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 31.873154] ffffb0785134e780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 31.873283] ==================================================================
[ 26.131822] ================================================================== [ 26.132305] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 26.132561] Read of size 1 at addr ffffffff970bdf4d by task kunit_try_catch/294 [ 26.132796] [ 26.132908] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc6-next-20250714 #1 PREEMPT(voluntary) [ 26.133036] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.133051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.133378] Call Trace: [ 26.133398] <TASK> [ 26.133419] dump_stack_lvl+0x73/0xb0 [ 26.133455] print_report+0xd1/0x610 [ 26.133479] ? __virt_addr_valid+0x1db/0x2d0 [ 26.133518] ? kasan_global_oob_right+0x286/0x2d0 [ 26.133540] ? kasan_addr_to_slab+0x11/0xa0 [ 26.133561] ? kasan_global_oob_right+0x286/0x2d0 [ 26.133591] kasan_report+0x141/0x180 [ 26.133613] ? kasan_global_oob_right+0x286/0x2d0 [ 26.133639] __asan_report_load1_noabort+0x18/0x20 [ 26.133673] kasan_global_oob_right+0x286/0x2d0 [ 26.133694] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 26.133718] ? __schedule+0x10cc/0x2b60 [ 26.133742] ? __pfx_read_tsc+0x10/0x10 [ 26.133764] ? ktime_get_ts64+0x86/0x230 [ 26.133791] kunit_try_run_case+0x1a5/0x480 [ 26.133815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.133835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.133858] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.133883] ? __kthread_parkme+0x82/0x180 [ 26.133905] ? preempt_count_sub+0x50/0x80 [ 26.133928] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.134166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.134192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.134219] kthread+0x337/0x6f0 [ 26.134240] ? trace_preempt_on+0x20/0xc0 [ 26.134265] ? __pfx_kthread+0x10/0x10 [ 26.134287] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.134309] ? calculate_sigpending+0x7b/0xa0 [ 26.134333] ? __pfx_kthread+0x10/0x10 [ 26.134355] ret_from_fork+0x116/0x1d0 [ 26.134374] ? __pfx_kthread+0x10/0x10 [ 26.134395] ret_from_fork_asm+0x1a/0x30 [ 26.134426] </TASK> [ 26.134437] [ 26.145921] The buggy address belongs to the variable: [ 26.146348] global_array+0xd/0x40 [ 26.146540] [ 26.146666] The buggy address belongs to the physical page: [ 26.147232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1622bd [ 26.147780] flags: 0x200000000002000(reserved|node=0|zone=2) [ 26.148348] raw: 0200000000002000 ffffea000588af48 ffffea000588af48 0000000000000000 [ 26.148808] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 26.149400] page dumped because: kasan: bad access detected [ 26.149768] [ 26.149869] Memory state around the buggy address: [ 26.150308] ffffffff970bde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.150947] ffffffff970bde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.151457] >ffffffff970bdf00: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 [ 26.151895] ^ [ 26.152299] ffffffff970bdf80: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 26.152620] ffffffff970be000: 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 26.153208] ==================================================================