Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15
x86

[   66.276733] ==================================================================
[   66.289337] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x284/0x2bc
[   66.296966] Read of size 1 at addr c6a6ec4d by task kunit_try_catch/301
[   66.303619] 
[   66.305145] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-rc3 #1 NONE 
[   66.305175] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   66.305175] Hardware name: Generic DRA74X (Flattened Device Tree)
[   66.305175] Call trace: 
[   66.305175]  unwind_backtrace from show_stack+0x18/0x1c
[   66.305206]  show_stack from dump_stack_lvl+0x70/0x90
[   66.305236]  dump_stack_lvl from print_report+0x158/0x528
[   66.305267]  print_report from kasan_report+0xdc/0x118
[   66.305297]  kasan_report from kasan_global_oob_right+0x284/0x2bc
[   66.305328]  kasan_global_oob_right from kunit_try_run_case+0x22c/0x5a8
[   66.305328]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   66.305358]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   66.305389]  kthread from ret_from_fork+0x14/0x20
[   66.305419] Exception stack(0xf2663fb0 to 0xf2663ff8)
[   66.305419] 3fa0:                                     00000000 00000000 00000000 00000000
[   66.305450] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   66.305450] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   66.305480] 
[   66.411224] The buggy address belongs to the variable:
[   66.416412]  global_array+0xd/0x40
[   66.419830] 
[   66.421325] The buggy address belongs to the physical page:
[   66.426940] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x86a6e
[   66.434234] flags: 0x2000(reserved|zone=0)
[   66.438354] raw: 00002000 eeaee77c eeaee77c 00000000 00000000 00000000 ffffffff 00000001
[   66.446502] raw: 00000000
[   66.449157] page dumped because: kasan: bad access detected
[   66.454742] 
[   66.456237] Memory state around the buggy address:
[   66.461090]  c6a6eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.467651]  c6a6eb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.474212] >c6a6ec00: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   66.480804]                                       ^
[   66.485717]  c6a6ec80: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   66.492279]  c6a6ed00: 01 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   66.498840] ==================================================================

[   40.140390] ==================================================================
[   40.152934] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   40.160507] Read of size 1 at addr ffffffffbb49a28d by task kunit_try_catch/288
[   40.167812] 
[   40.169315] CPU: 1 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   40.169322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   40.169325] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   40.169328] Call Trace:
[   40.169329]  <TASK>
[   40.169331]  dump_stack_lvl+0x73/0xb0
[   40.169335]  print_report+0xd1/0x650
[   40.169339]  ? __virt_addr_valid+0x1db/0x2d0
[   40.169343]  ? kasan_global_oob_right+0x286/0x2d0
[   40.169347]  ? kasan_addr_to_slab+0x11/0xa0
[   40.169351]  ? kasan_global_oob_right+0x286/0x2d0
[   40.169355]  kasan_report+0x141/0x180
[   40.169359]  ? kasan_global_oob_right+0x286/0x2d0
[   40.169364]  __asan_report_load1_noabort+0x18/0x20
[   40.169368]  kasan_global_oob_right+0x286/0x2d0
[   40.169372]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   40.169376]  ? __schedule+0x10cc/0x2b30
[   40.169381]  ? ktime_get_ts64+0x83/0x230
[   40.169386]  kunit_try_run_case+0x1a2/0x480
[   40.169390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.169394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   40.169399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   40.169403]  ? __kthread_parkme+0x82/0x180
[   40.169408]  ? preempt_count_sub+0x50/0x80
[   40.169412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   40.169416]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   40.169421]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   40.169425]  kthread+0x334/0x6f0
[   40.169429]  ? trace_preempt_on+0x20/0xc0
[   40.169433]  ? __pfx_kthread+0x10/0x10
[   40.169437]  ? _raw_spin_unlock_irq+0x47/0x80
[   40.169441]  ? calculate_sigpending+0x7b/0xa0
[   40.169445]  ? __pfx_kthread+0x10/0x10
[   40.169449]  ret_from_fork+0x3e/0x80
[   40.169453]  ? __pfx_kthread+0x10/0x10
[   40.169458]  ret_from_fork_asm+0x1a/0x30
[   40.169463]  </TASK>
[   40.169465] 
[   40.333218] The buggy address belongs to the variable:
[   40.338357]  global_array+0xd/0x40
[   40.341772] 
[   40.343269] The buggy address belongs to the physical page:
[   40.348842] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x24089a
[   40.356842] flags: 0x200000000002000(reserved|node=0|zone=2)
[   40.362510] raw: 0200000000002000 ffffea0009022688 ffffea0009022688 0000000000000000
[   40.370256] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   40.377995] page dumped because: kasan: bad access detected
[   40.383567] 
[   40.385066] Memory state around the buggy address:
[   40.389858]  ffffffffbb49a180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.397080]  ffffffffbb49a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   40.404305] >ffffffffbb49a280: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   40.411526]                       ^
[   40.415018]  ffffffffbb49a300: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   40.422238]  ffffffffbb49a380: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   40.429455] ==================================================================