Date
June 17, 2025, 3:39 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 93.808979] ================================================================== [ 93.809822] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa8/0x168 [ 93.810531] Read of size 1 at addr ffffd0f457ea9dcd by task kunit_try_catch/181 [ 93.811232] [ 93.811539] CPU: 1 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 93.812265] Hardware name: linux,dummy-virt (DT) [ 93.812700] Call trace: [ 93.812954] dump_backtrace+0x9c/0x128 [ 93.813520] show_stack+0x20/0x38 [ 93.813930] dump_stack_lvl+0x60/0xb0 [ 93.814374] print_report+0x328/0x5e8 [ 93.815738] kasan_report+0xdc/0x128 [ 93.816254] __asan_load1+0x60/0x70 [ 93.816733] kasan_global_oob_right+0xa8/0x168 [ 93.817242] kunit_try_run_case+0x114/0x298 [ 93.817732] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 93.818312] kthread+0x18c/0x1a8 [ 93.819002] ret_from_fork+0x10/0x20 [ 93.819520] [ 93.819849] The buggy address belongs to the variable: [ 93.820220] global_array+0xd/0x40 [ 93.820647] [ 93.820921] The buggy address belongs to the virtual mapping at [ 93.820921] [ffffd0f4565a0000, ffffd0f457f31000) created by: [ 93.820921] paging_init+0x26c/0x968 [ 93.822006] [ 93.822280] The buggy address belongs to the physical page: [ 93.823388] page:0000000069219729 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x456a9 [ 93.824487] flags: 0x3fffc0000004000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 93.825255] page_type: 0xffffffff() [ 93.825784] raw: 03fffc0000004000 fffffc000015aa48 fffffc000015aa48 0000000000000000 [ 93.826534] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 93.827244] page dumped because: kasan: bad access detected [ 93.827843] [ 93.828043] Memory state around the buggy address: [ 93.828924] ffffd0f457ea9c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.829659] ffffd0f457ea9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 93.830235] >ffffd0f457ea9d80: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 [ 93.831726] ^ [ 93.832427] ffffd0f457ea9e00: 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 93.833187] ffffd0f457ea9e80: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 93.833862] ==================================================================
[ 34.919184] ================================================================== [ 34.919855] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa3/0x170 [ 34.920527] Read of size 1 at addr ffffffff945af76d by task kunit_try_catch/196 [ 34.920917] [ 34.921091] CPU: 1 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.6.94-rc1 #1 [ 34.921552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.922088] Call Trace: [ 34.922249] <TASK> [ 34.922513] dump_stack_lvl+0x4e/0x90 [ 34.922949] print_report+0xd2/0x650 [ 34.923408] ? __virt_addr_valid+0x156/0x1e0 [ 34.923711] ? kasan_global_oob_right+0xa3/0x170 [ 34.924070] ? kasan_addr_to_slab+0x11/0xb0 [ 34.924413] ? kasan_global_oob_right+0xa3/0x170 [ 34.924765] kasan_report+0x147/0x180 [ 34.925067] ? kasan_global_oob_right+0xa3/0x170 [ 34.925361] __asan_load1+0x66/0x70 [ 34.925590] kasan_global_oob_right+0xa3/0x170 [ 34.925894] ? __pfx_kasan_global_oob_right+0x10/0x10 [ 34.926244] ? ktime_get_ts64+0x118/0x140 [ 34.926605] kunit_try_run_case+0x120/0x290 [ 34.926962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.927299] ? __kasan_check_write+0x18/0x20 [ 34.927626] ? trace_preempt_on+0x20/0xa0 [ 34.927959] ? __kthread_parkme+0x4f/0xd0 [ 34.928240] ? preempt_count_sub+0x50/0x80 [ 34.928557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.928939] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.929327] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 34.929689] kthread+0x19e/0x1e0 [ 34.929979] ? __pfx_kthread+0x10/0x10 [ 34.930283] ret_from_fork+0x41/0x70 [ 34.930518] ? __pfx_kthread+0x10/0x10 [ 34.930784] ret_from_fork_asm+0x1b/0x30 [ 34.931170] </TASK> [ 34.931327] [ 34.931488] The buggy address belongs to the variable: [ 34.931817] global_array+0xd/0x40 [ 34.932079] [ 34.932230] The buggy address belongs to the physical page: [ 34.932564] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x160faf [ 34.933240] flags: 0x200000000004000(reserved|node=0|zone=2) [ 34.933624] page_type: 0xffffffff() [ 34.933911] raw: 0200000000004000 ffffea000583ebc8 ffffea000583ebc8 0000000000000000 [ 34.934340] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.934729] page dumped because: kasan: bad access detected [ 34.935186] [ 34.935299] Memory state around the buggy address: [ 34.935590] ffffffff945af600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.936093] ffffffff945af680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.936487] >ffffffff945af700: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 [ 34.936942] ^ [ 34.937333] ffffffff945af780: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 34.937741] ffffffff945af800: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 34.938136] ==================================================================