Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 36.901156] ================================================================== [ 36.911733] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 36.919286] Read of size 1 at addr ffff800087a035ad by task kunit_try_catch/294 [ 36.926576] [ 36.928061] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 36.928118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.928136] Hardware name: WinLink E850-96 board (DT) [ 36.928159] Call trace: [ 36.928172] show_stack+0x20/0x38 (C) [ 36.928210] dump_stack_lvl+0x8c/0xd0 [ 36.928247] print_report+0x310/0x608 [ 36.928278] kasan_report+0xdc/0x128 [ 36.928308] __asan_report_load1_noabort+0x20/0x30 [ 36.928348] kasan_global_oob_right+0x230/0x270 [ 36.928382] kunit_try_run_case+0x170/0x3f0 [ 36.928419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.928459] kthread+0x328/0x630 [ 36.928493] ret_from_fork+0x10/0x20 [ 36.928532] [ 36.991244] The buggy address belongs to the variable: [ 36.996364] global_array+0xd/0x40 [ 36.999751] [ 37.001235] The buggy address belongs to the virtual mapping at [ 37.001235] [ffff800085c20000, ffff800087ac1000) created by: [ 37.001235] paging_init+0x66c/0x7d0 [ 37.016416] [ 37.017898] The buggy address belongs to the physical page: [ 37.023454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87a03 [ 37.031349] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 37.038654] raw: 03fffe0000002000 fffffdffc01e80c8 fffffdffc01e80c8 0000000000000000 [ 37.046370] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.054091] page dumped because: kasan: bad access detected [ 37.059645] [ 37.061120] Memory state around the buggy address: [ 37.065902] ffff800087a03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.073104] ffff800087a03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 37.080311] >ffff800087a03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 37.087509] ^ [ 37.092027] ffff800087a03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 37.099232] ffff800087a03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.106434] ==================================================================
[ 17.750661] ================================================================== [ 17.750727] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 17.750782] Read of size 1 at addr ffffaa36042035ad by task kunit_try_catch/250 [ 17.750832] [ 17.750869] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.750967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.751006] Hardware name: linux,dummy-virt (DT) [ 17.751039] Call trace: [ 17.751061] show_stack+0x20/0x38 (C) [ 17.751117] dump_stack_lvl+0x8c/0xd0 [ 17.751174] print_report+0x310/0x608 [ 17.751227] kasan_report+0xdc/0x128 [ 17.751277] __asan_report_load1_noabort+0x20/0x30 [ 17.751327] kasan_global_oob_right+0x230/0x270 [ 17.751374] kunit_try_run_case+0x170/0x3f0 [ 17.751422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.751476] kthread+0x328/0x630 [ 17.751527] ret_from_fork+0x10/0x20 [ 17.751579] [ 17.751641] The buggy address belongs to the variable: [ 17.751670] global_array+0xd/0x40 [ 17.751730] [ 17.751815] The buggy address belongs to the virtual mapping at [ 17.751815] [ffffaa3602420000, ffffaa36042c1000) created by: [ 17.751815] paging_init+0x66c/0x7d0 [ 17.751909] [ 17.752827] The buggy address belongs to the physical page: [ 17.752897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03 [ 17.752975] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 17.753418] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000 [ 17.753487] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 17.753690] page dumped because: kasan: bad access detected [ 17.753840] [ 17.753931] Memory state around the buggy address: [ 17.753972] ffffaa3604203480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.754019] ffffaa3604203500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 [ 17.754431] >ffffaa3604203580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 17.754488] ^ [ 17.754713] ffffaa3604203600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 17.754814] ffffaa3604203680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.755160] ==================================================================
[ 16.525913] ================================================================== [ 16.526644] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0 [ 16.527441] Read of size 1 at addr ffffffffba84332d by task kunit_try_catch/266 [ 16.528835] [ 16.529330] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.529730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.529756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.529787] Call Trace: [ 16.529806] <TASK> [ 16.529833] dump_stack_lvl+0x73/0xb0 [ 16.529875] print_report+0xd1/0x650 [ 16.529904] ? __virt_addr_valid+0x1db/0x2d0 [ 16.529933] ? kasan_global_oob_right+0x286/0x2d0 [ 16.529958] ? kasan_addr_to_slab+0x11/0xa0 [ 16.529983] ? kasan_global_oob_right+0x286/0x2d0 [ 16.530009] kasan_report+0x141/0x180 [ 16.530034] ? kasan_global_oob_right+0x286/0x2d0 [ 16.530070] __asan_report_load1_noabort+0x18/0x20 [ 16.530103] kasan_global_oob_right+0x286/0x2d0 [ 16.530129] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 16.530158] ? __schedule+0x10cc/0x2b60 [ 16.530186] ? __pfx_read_tsc+0x10/0x10 [ 16.530241] ? ktime_get_ts64+0x86/0x230 [ 16.530306] kunit_try_run_case+0x1a5/0x480 [ 16.530362] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.530391] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.530420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.530447] ? __kthread_parkme+0x82/0x180 [ 16.530474] ? preempt_count_sub+0x50/0x80 [ 16.530505] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.530531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.530557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.530583] kthread+0x337/0x6f0 [ 16.530602] ? trace_preempt_on+0x20/0xc0 [ 16.530629] ? __pfx_kthread+0x10/0x10 [ 16.530649] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.530674] ? calculate_sigpending+0x7b/0xa0 [ 16.530699] ? __pfx_kthread+0x10/0x10 [ 16.530720] ret_from_fork+0x41/0x80 [ 16.530743] ? __pfx_kthread+0x10/0x10 [ 16.530762] ret_from_fork_asm+0x1a/0x30 [ 16.530797] </TASK> [ 16.530810] [ 16.543041] The buggy address belongs to the variable: [ 16.543930] global_array+0xd/0x40 [ 16.544535] [ 16.544786] The buggy address belongs to the physical page: [ 16.545350] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14e43 [ 16.545680] flags: 0x100000000002000(reserved|node=0|zone=1) [ 16.546771] raw: 0100000000002000 ffffea00005390c8 ffffea00005390c8 0000000000000000 [ 16.547403] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 16.547864] page dumped because: kasan: bad access detected [ 16.548500] [ 16.548635] Memory state around the buggy address: [ 16.549036] ffffffffba843200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.549933] ffffffffba843280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.550374] >ffffffffba843300: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 16.551141] ^ [ 16.551413] ffffffffba843380: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 [ 16.551748] ffffffffba843400: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 [ 16.552073] ==================================================================