Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-armv7 | |
qemu-x86_64 |
[ 146.462380] ================================================================== [ 146.463424] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150 [ 146.464251] Read of size 1 at addr c418502d by task kunit_try_catch/175 [ 146.465113] [ 146.465391] CPU: 1 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 146.466968] Hardware name: Generic DT based system [ 146.467574] unwind_backtrace from show_stack+0x18/0x1c [ 146.468422] show_stack from dump_stack_lvl+0x58/0x70 [ 146.469134] dump_stack_lvl from print_report+0x164/0x51c [ 146.469839] print_report from kasan_report+0xc8/0x104 [ 146.470520] kasan_report from kasan_global_oob_right+0xa0/0x150 [ 146.471307] kasan_global_oob_right from kunit_try_run_case+0x11c/0x2e4 [ 146.472148] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 146.473153] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 146.473977] kthread from ret_from_fork+0x14/0x30 [ 146.474549] Exception stack(0xf9d5bfb0 to 0xf9d5bff8) [ 146.475142] bfa0: 00000000 00000000 00000000 00000000 [ 146.476364] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 146.477290] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 146.478012] [ 146.478349] The buggy address belongs to the variable: [ 146.478868] global_array+0xd/0x40 [ 146.479442] [ 146.479669] The buggy address belongs to the physical page: [ 146.480290] page:2e334ee0 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44185 [ 146.481248] flags: 0x4000(reserved|zone=0) [ 146.481674] page_type: 0xffffffff() [ 146.482358] raw: 00004000 edc8c6b8 edc8c6b8 00000000 00000000 00000000 ffffffff 00000001 [ 146.483197] raw: 00000000 [ 146.483565] page dumped because: kasan: bad access detected [ 146.484235] [ 146.484461] Memory state around the buggy address: [ 146.485000] c4184f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 146.486392] c4184f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 146.487173] >c4185000: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 [ 146.487841] ^ [ 146.488245] c4185080: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 146.489069] c4185100: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 146.489675] ==================================================================
[ 49.321677] ================================================================== [ 49.322732] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa3/0x170 [ 49.323905] Read of size 1 at addr ffffffff995a96ed by task kunit_try_catch/198 [ 49.325055] [ 49.325413] CPU: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 49.326785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 49.327827] Call Trace: [ 49.328217] <TASK> [ 49.328897] dump_stack_lvl+0x4e/0x90 [ 49.329816] print_report+0xd2/0x660 [ 49.330288] ? __virt_addr_valid+0x156/0x1e0 [ 49.331118] ? kasan_addr_to_slab+0x11/0xb0 [ 49.331963] kasan_report+0xff/0x140 [ 49.332600] ? kasan_global_oob_right+0xa3/0x170 [ 49.333433] ? kasan_global_oob_right+0xa3/0x170 [ 49.334319] __asan_load1+0x66/0x70 [ 49.334896] kasan_global_oob_right+0xa3/0x170 [ 49.335685] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 49.336428] ? ktime_get_ts64+0x118/0x140 [ 49.337424] kunit_try_run_case+0x126/0x290 [ 49.338150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.338721] ? __kasan_check_write+0x18/0x20 [ 49.339403] ? trace_preempt_on+0x20/0xa0 [ 49.340045] ? __kthread_parkme+0x4f/0xd0 [ 49.340553] ? preempt_count_sub+0x50/0x80 [ 49.341460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 49.342048] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 49.342975] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 49.343557] kthread+0x19e/0x1e0 [ 49.344239] ? __pfx_kthread+0x10/0x10 [ 49.344893] ret_from_fork+0x41/0x70 [ 49.345571] ? __pfx_kthread+0x10/0x10 [ 49.346319] ret_from_fork_asm+0x1b/0x30 [ 49.347019] </TASK> [ 49.347488] [ 49.347955] The buggy address belongs to the variable: [ 49.348731] global_array+0xd/0x40 [ 49.349377] [ 49.349760] The buggy address belongs to the physical page: [ 49.350364] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x6a7a9 [ 49.351159] flags: 0x100000000004000(reserved|node=0|zone=1) [ 49.351853] page_type: 0xffffffff() [ 49.352367] raw: 0100000000004000 ffffea0001a9ea48 ffffea0001a9ea48 0000000000000000 [ 49.353214] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 49.353906] page dumped because: kasan: bad access detected [ 49.354333] [ 49.354610] Memory state around the buggy address: [ 49.355280] ffffffff995a9580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.356123] ffffffff995a9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.356764] >ffffffff995a9680: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 49.357515] ^ [ 49.358281] ffffffff995a9700: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 49.359141] ffffffff995a9780: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 49.359705] ==================================================================