Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 34.046793] ================================================================== [ 34.048155] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 34.050050] Read of size 1 at addr ffff946f1aed906d by task kunit_try_catch/234 [ 34.050892] [ 34.051307] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.052775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.053785] Hardware name: linux,dummy-virt (DT) [ 34.054472] Call trace: [ 34.054987] show_stack+0x20/0x38 (C) [ 34.055550] dump_stack_lvl+0x8c/0xd0 [ 34.056240] print_report+0x2fc/0x5e0 [ 34.056955] kasan_report+0xc8/0x118 [ 34.057462] __asan_report_load1_noabort+0x20/0x30 [ 34.058218] kasan_global_oob_right+0x230/0x270 [ 34.058935] kunit_try_run_case+0x14c/0x3d0 [ 34.059508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.060311] kthread+0x24c/0x2d0 [ 34.061195] ret_from_fork+0x10/0x20 [ 34.062188] [ 34.062692] The buggy address belongs to the variable: [ 34.063456] global_array+0xd/0x40 [ 34.064089] [ 34.065589] The buggy address belongs to the virtual mapping at [ 34.065589] [ffff946f19220000, ffff946f1af91000) created by: [ 34.065589] paging_init+0x668/0x7c8 [ 34.067291] [ 34.068084] The buggy address belongs to the physical page: [ 34.069224] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478d9 [ 34.070180] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 34.071130] raw: 03fffe0000002000 ffffc1ffc01e3648 ffffc1ffc01e3648 0000000000000000 [ 34.072054] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.072980] page dumped because: kasan: bad access detected [ 34.074533] [ 34.074983] Memory state around the buggy address: [ 34.075729] ffff946f1aed8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.076696] ffff946f1aed8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.077552] >ffff946f1aed9000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 34.078760] ^ [ 34.079472] ffff946f1aed9080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 34.080377] ffff946f1aed9100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 34.081798] ==================================================================
[ 34.071880] ================================================================== [ 34.073171] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 34.074461] Read of size 1 at addr ffffad7794cd906d by task kunit_try_catch/234 [ 34.075376] [ 34.075810] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 34.077144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.077648] Hardware name: linux,dummy-virt (DT) [ 34.078311] Call trace: [ 34.078778] show_stack+0x20/0x38 (C) [ 34.079376] dump_stack_lvl+0x8c/0xd0 [ 34.080313] print_report+0x2fc/0x5e0 [ 34.080888] kasan_report+0xc8/0x118 [ 34.081456] __asan_report_load1_noabort+0x20/0x30 [ 34.082436] kasan_global_oob_right+0x230/0x270 [ 34.083178] kunit_try_run_case+0x14c/0x3d0 [ 34.083807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.084557] kthread+0x24c/0x2d0 [ 34.085152] ret_from_fork+0x10/0x20 [ 34.086097] [ 34.086566] The buggy address belongs to the variable: [ 34.087172] global_array+0xd/0x40 [ 34.087810] [ 34.088358] The buggy address belongs to the virtual mapping at [ 34.088358] [ffffad7793020000, ffffad7794d91000) created by: [ 34.088358] paging_init+0x668/0x7c8 [ 34.090341] [ 34.090990] The buggy address belongs to the physical page: [ 34.091760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x478d9 [ 34.092625] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 34.094454] raw: 03fffe0000002000 ffffc1ffc01e3648 ffffc1ffc01e3648 0000000000000000 [ 34.095419] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.096271] page dumped because: kasan: bad access detected [ 34.097063] [ 34.097440] Memory state around the buggy address: [ 34.098231] ffffad7794cd8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.099473] ffffad7794cd8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.100096] >ffffad7794cd9000: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 34.101029] ^ [ 34.101695] ffffad7794cd9080: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 34.102596] ffffad7794cd9100: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 34.103478] ==================================================================
[ 28.206466] ================================================================== [ 28.207103] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x288/0x2d0 [ 28.207103] Read of size 1 at addr ffffffff959fcc2d by task kunit_try_catch/254 [ 28.207103] [ 28.207103] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 28.207103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.207103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.207103] Call Trace: [ 28.207103] <TASK> [ 28.207103] dump_stack_lvl+0x73/0xb0 [ 28.207103] print_report+0xd1/0x640 [ 28.207103] ? __virt_addr_valid+0x1db/0x2d0 [ 28.207103] ? kasan_addr_to_slab+0x11/0xa0 [ 28.207103] kasan_report+0x102/0x140 [ 28.207103] ? kasan_global_oob_right+0x288/0x2d0 [ 28.207103] ? kasan_global_oob_right+0x288/0x2d0 [ 28.207103] __asan_report_load1_noabort+0x18/0x20 [ 28.207103] kasan_global_oob_right+0x288/0x2d0 [ 28.207103] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 28.207103] ? __schedule+0xc3e/0x2790 [ 28.207103] ? ktime_get_ts64+0x84/0x230 [ 28.207103] kunit_try_run_case+0x1b3/0x490 [ 28.207103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.207103] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.207103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.207103] ? __kthread_parkme+0x82/0x160 [ 28.207103] ? preempt_count_sub+0x50/0x80 [ 28.207103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.207103] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.207103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.207103] kthread+0x257/0x310 [ 28.207103] ? __pfx_kthread+0x10/0x10 [ 28.207103] ret_from_fork+0x41/0x80 [ 28.207103] ? __pfx_kthread+0x10/0x10 [ 28.207103] ret_from_fork_asm+0x1a/0x30 [ 28.207103] </TASK> [ 28.207103] [ 28.207103] The buggy address belongs to the variable: [ 28.207103] global_array+0xd/0x40 [ 28.207103] [ 28.207103] The buggy address belongs to the physical page: [ 28.207103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12dfc [ 28.207103] flags: 0x100000000002000(reserved|node=0|zone=1) [ 28.207103] raw: 0100000000002000 ffffea00004b7f08 ffffea00004b7f08 0000000000000000 [ 28.207103] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.207103] page dumped because: kasan: bad access detected [ 28.207103] [ 28.207103] Memory state around the buggy address: [ 28.207103] ffffffff959fcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.207103] ffffffff959fcb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.207103] >ffffffff959fcc00: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 28.207103] ^ [ 28.207103] ffffffff959fcc80: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 28.207103] ffffffff959fcd00: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 28.207103] ==================================================================
[ 23.133381] ================================================================== [ 23.134459] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x288/0x2d0 [ 23.135360] Read of size 1 at addr ffffffffa87fcc2d by task kunit_try_catch/252 [ 23.135846] [ 23.136142] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 23.136889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.137387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 23.138277] Call Trace: [ 23.138509] <TASK> [ 23.138851] dump_stack_lvl+0x73/0xb0 [ 23.140194] print_report+0xd1/0x640 [ 23.140852] ? __virt_addr_valid+0x1db/0x2d0 [ 23.141245] ? kasan_addr_to_slab+0x11/0xa0 [ 23.141971] kasan_report+0x102/0x140 [ 23.142569] ? kasan_global_oob_right+0x288/0x2d0 [ 23.143318] ? kasan_global_oob_right+0x288/0x2d0 [ 23.144025] __asan_report_load1_noabort+0x18/0x20 [ 23.144426] kasan_global_oob_right+0x288/0x2d0 [ 23.145133] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 23.145839] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 23.146457] kunit_try_run_case+0x1b3/0x490 [ 23.146941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.147348] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 23.148275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 23.148894] ? __kthread_parkme+0x82/0x160 [ 23.149512] ? preempt_count_sub+0x50/0x80 [ 23.150221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 23.150728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 23.151234] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 23.152111] kthread+0x257/0x310 [ 23.152441] ? __pfx_kthread+0x10/0x10 [ 23.153144] ret_from_fork+0x41/0x80 [ 23.154010] ? __pfx_kthread+0x10/0x10 [ 23.154360] ret_from_fork_asm+0x1a/0x30 [ 23.154969] </TASK> [ 23.155181] [ 23.155477] The buggy address belongs to the variable: [ 23.156057] global_array+0xd/0x40 [ 23.156421] [ 23.157260] The buggy address belongs to the physical page: [ 23.157601] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x17d3fc [ 23.158642] flags: 0x200000000002000(reserved|node=0|zone=2) [ 23.159355] raw: 0200000000002000 ffffea0005f4ff08 ffffea0005f4ff08 0000000000000000 [ 23.160186] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.161088] page dumped because: kasan: bad access detected [ 23.161438] [ 23.162000] Memory state around the buggy address: [ 23.162346] ffffffffa87fcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.163018] ffffffffa87fcb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.163549] >ffffffffa87fcc00: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 23.164613] ^ [ 23.165311] ffffffffa87fcc80: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 23.165877] ffffffffa87fcd00: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 23.166914] ==================================================================