Hay
Date
June 17, 2025, 3:39 p.m.

Environment
qemu-arm64
qemu-x86_64

[   93.808979] ==================================================================
[   93.809822] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa8/0x168
[   93.810531] Read of size 1 at addr ffffd0f457ea9dcd by task kunit_try_catch/181
[   93.811232] 
[   93.811539] CPU: 1 PID: 181 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   93.812265] Hardware name: linux,dummy-virt (DT)
[   93.812700] Call trace:
[   93.812954]  dump_backtrace+0x9c/0x128
[   93.813520]  show_stack+0x20/0x38
[   93.813930]  dump_stack_lvl+0x60/0xb0
[   93.814374]  print_report+0x328/0x5e8
[   93.815738]  kasan_report+0xdc/0x128
[   93.816254]  __asan_load1+0x60/0x70
[   93.816733]  kasan_global_oob_right+0xa8/0x168
[   93.817242]  kunit_try_run_case+0x114/0x298
[   93.817732]  kunit_generic_run_threadfn_adapter+0x38/0x60
[   93.818312]  kthread+0x18c/0x1a8
[   93.819002]  ret_from_fork+0x10/0x20
[   93.819520] 
[   93.819849] The buggy address belongs to the variable:
[   93.820220]  global_array+0xd/0x40
[   93.820647] 
[   93.820921] The buggy address belongs to the virtual mapping at
[   93.820921]  [ffffd0f4565a0000, ffffd0f457f31000) created by:
[   93.820921]  paging_init+0x26c/0x968
[   93.822006] 
[   93.822280] The buggy address belongs to the physical page:
[   93.823388] page:0000000069219729 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x456a9
[   93.824487] flags: 0x3fffc0000004000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   93.825255] page_type: 0xffffffff()
[   93.825784] raw: 03fffc0000004000 fffffc000015aa48 fffffc000015aa48 0000000000000000
[   93.826534] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   93.827244] page dumped because: kasan: bad access detected
[   93.827843] 
[   93.828043] Memory state around the buggy address:
[   93.828924]  ffffd0f457ea9c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   93.829659]  ffffd0f457ea9d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   93.830235] >ffffd0f457ea9d80: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9
[   93.831726]                                               ^
[   93.832427]  ffffd0f457ea9e00: 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   93.833187]  ffffd0f457ea9e80: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   93.833862] ==================================================================


[   34.919184] ==================================================================
[   34.919855] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa3/0x170
[   34.920527] Read of size 1 at addr ffffffff945af76d by task kunit_try_catch/196
[   34.920917] 
[   34.921091] CPU: 1 PID: 196 Comm: kunit_try_catch Tainted: G    B            N 6.6.94-rc1 #1
[   34.921552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   34.922088] Call Trace:
[   34.922249]  <TASK>
[   34.922513]  dump_stack_lvl+0x4e/0x90
[   34.922949]  print_report+0xd2/0x650
[   34.923408]  ? __virt_addr_valid+0x156/0x1e0
[   34.923711]  ? kasan_global_oob_right+0xa3/0x170
[   34.924070]  ? kasan_addr_to_slab+0x11/0xb0
[   34.924413]  ? kasan_global_oob_right+0xa3/0x170
[   34.924765]  kasan_report+0x147/0x180
[   34.925067]  ? kasan_global_oob_right+0xa3/0x170
[   34.925361]  __asan_load1+0x66/0x70
[   34.925590]  kasan_global_oob_right+0xa3/0x170
[   34.925894]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   34.926244]  ? ktime_get_ts64+0x118/0x140
[   34.926605]  kunit_try_run_case+0x120/0x290
[   34.926962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.927299]  ? __kasan_check_write+0x18/0x20
[   34.927626]  ? trace_preempt_on+0x20/0xa0
[   34.927959]  ? __kthread_parkme+0x4f/0xd0
[   34.928240]  ? preempt_count_sub+0x50/0x80
[   34.928557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   34.928939]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   34.929327]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   34.929689]  kthread+0x19e/0x1e0
[   34.929979]  ? __pfx_kthread+0x10/0x10
[   34.930283]  ret_from_fork+0x41/0x70
[   34.930518]  ? __pfx_kthread+0x10/0x10
[   34.930784]  ret_from_fork_asm+0x1b/0x30
[   34.931170]  </TASK>
[   34.931327] 
[   34.931488] The buggy address belongs to the variable:
[   34.931817]  global_array+0xd/0x40
[   34.932079] 
[   34.932230] The buggy address belongs to the physical page:
[   34.932564] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x160faf
[   34.933240] flags: 0x200000000004000(reserved|node=0|zone=2)
[   34.933624] page_type: 0xffffffff()
[   34.933911] raw: 0200000000004000 ffffea000583ebc8 ffffea000583ebc8 0000000000000000
[   34.934340] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   34.934729] page dumped because: kasan: bad access detected
[   34.935186] 
[   34.935299] Memory state around the buggy address:
[   34.935590]  ffffffff945af600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.936093]  ffffffff945af680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.936487] >ffffffff945af700: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   34.936942]                                                           ^
[   34.937333]  ffffffff945af780: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   34.937741]  ffffffff945af800: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   34.938136] ==================================================================