Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   20.141929] ==================================================================
[   20.142062] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   20.142188] Read of size 1 at addr ffff9a6058f3e48d by task kunit_try_catch/247
[   20.142298] 
[   20.142389] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   20.145009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.145146] Hardware name: linux,dummy-virt (DT)
[   20.145239] Call trace:
[   20.146511]  show_stack+0x20/0x38 (C)
[   20.146684]  dump_stack_lvl+0x8c/0xd0
[   20.146784]  print_report+0x310/0x608
[   20.146872]  kasan_report+0xdc/0x128
[   20.146963]  __asan_report_load1_noabort+0x20/0x30
[   20.147062]  kasan_global_oob_right+0x230/0x270
[   20.147154]  kunit_try_run_case+0x170/0x3f0
[   20.147243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.147337]  kthread+0x328/0x630
[   20.147422]  ret_from_fork+0x10/0x20
[   20.147556] 
[   20.147645] The buggy address belongs to the variable:
[   20.147942]  global_array+0xd/0x40
[   20.150395] 
[   20.151663] The buggy address belongs to the virtual mapping at
[   20.151663]  [ffff9a6057110000, ffff9a6058ff1000) created by:
[   20.151663]  paging_init+0x670/0x7d0
[   20.151864] 
[   20.152130] The buggy address belongs to the physical page:
[   20.154553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d3e
[   20.154708] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   20.154869] raw: 03fffe0000002000 ffffc1ffc01f4f88 ffffc1ffc01f4f88 0000000000000000
[   20.154981] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.155065] page dumped because: kasan: bad access detected
[   20.155124] 
[   20.155157] Memory state around the buggy address:
[   20.155223]  ffff9a6058f3e380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.155312]  ffff9a6058f3e400: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   20.155398] >ffff9a6058f3e480: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   20.155479]                       ^
[   20.155567]  ffff9a6058f3e500: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   20.155660]  ffff9a6058f3e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.155740] ==================================================================

[   20.855239] ==================================================================
[   20.856382] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   20.857065] Read of size 1 at addr ffffffff9cc9a28d by task kunit_try_catch/265
[   20.857805] 
[   20.858167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[   20.858328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.858570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.858637] Call Trace:
[   20.858683]  <TASK>
[   20.858731]  dump_stack_lvl+0x73/0xb0
[   20.858814]  print_report+0xd1/0x650
[   20.858897]  ? __virt_addr_valid+0x1db/0x2d0
[   20.859017]  ? kasan_global_oob_right+0x286/0x2d0
[   20.859098]  ? kasan_addr_to_slab+0x11/0xa0
[   20.859172]  ? kasan_global_oob_right+0x286/0x2d0
[   20.859248]  kasan_report+0x141/0x180
[   20.859288]  ? kasan_global_oob_right+0x286/0x2d0
[   20.859329]  __asan_report_load1_noabort+0x18/0x20
[   20.859360]  kasan_global_oob_right+0x286/0x2d0
[   20.859395]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   20.859588]  ? __schedule+0x10cc/0x2b30
[   20.859641]  ? __pfx_read_tsc+0x10/0x10
[   20.859674]  ? ktime_get_ts64+0x86/0x230
[   20.859715]  kunit_try_run_case+0x1a5/0x480
[   20.859753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.859785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.859821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.859857]  ? __kthread_parkme+0x82/0x180
[   20.859891]  ? preempt_count_sub+0x50/0x80
[   20.859927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.859962]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.859996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.860028]  kthread+0x337/0x6f0
[   20.860059]  ? trace_preempt_on+0x20/0xc0
[   20.860095]  ? __pfx_kthread+0x10/0x10
[   20.860127]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.860158]  ? calculate_sigpending+0x7b/0xa0
[   20.860192]  ? __pfx_kthread+0x10/0x10
[   20.860226]  ret_from_fork+0x41/0x80
[   20.860258]  ? __pfx_kthread+0x10/0x10
[   20.860289]  ret_from_fork_asm+0x1a/0x30
[   20.860335]  </TASK>
[   20.860350] 
[   20.881354] The buggy address belongs to the variable:
[   20.882253]  global_array+0xd/0x40
[   20.882904] 
[   20.883143] The buggy address belongs to the physical page:
[   20.883887] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5b49a
[   20.884894] flags: 0x100000000002000(reserved|node=0|zone=1)
[   20.885342] raw: 0100000000002000 ffffea00016d2688 ffffea00016d2688 0000000000000000
[   20.886438] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.887076] page dumped because: kasan: bad access detected
[   20.887703] 
[   20.888180] Memory state around the buggy address:
[   20.888587]  ffffffff9cc9a180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.889679]  ffffffff9cc9a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.890229] >ffffffff9cc9a280: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   20.890964]                       ^
[   20.891390]  ffffffff9cc9a300: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   20.892205]  ffffffff9cc9a380: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   20.893346] ==================================================================

[   21.681071] ==================================================================
[   21.682227] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   21.682936] Read of size 1 at addr ffff800087b3e48d by task kunit_try_catch/303
[   21.683600] 
[   21.683758] CPU: 2 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   21.683795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.683806] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.683820] Call trace:
[   21.683830]  show_stack+0x20/0x38 (C)
[   21.683855]  dump_stack_lvl+0x8c/0xd0
[   21.683880]  print_report+0x310/0x608
[   21.683902]  kasan_report+0xdc/0x128
[   21.683924]  __asan_report_load1_noabort+0x20/0x30
[   21.683949]  kasan_global_oob_right+0x230/0x270
[   21.683974]  kunit_try_run_case+0x170/0x3f0
[   21.684002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.684032]  kthread+0x328/0x630
[   21.684058]  ret_from_fork+0x10/0x20
[   21.684083] 
[   21.689654] The buggy address belongs to the variable:
[   21.690120]  global_array+0xd/0x40
[   21.690446] 
[   21.690605] The buggy address belongs to the virtual mapping at
[   21.690605]  [ffff800085d10000, ffff800087bf1000) created by:
[   21.690605]  paging_init+0x670/0x7d0
[   21.691973] 
[   21.692123] The buggy address belongs to the physical page:
[   21.692631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa33e
[   21.693345] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   21.694025] raw: 03fffe0000002000 fffffdffc028cf88 fffffdffc028cf88 0000000000000000
[   21.694730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.695427] page dumped because: kasan: bad access detected
[   21.695934] 
[   21.696081] Memory state around the buggy address:
[   21.696520]  ffff800087b3e380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.697176]  ffff800087b3e400: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   21.697831] >ffff800087b3e480: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   21.698483]                       ^
[   21.698808]  ffff800087b3e500: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   21.699464]  ffff800087b3e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.700115] ==================================================================