Hay
Date
July 5, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.812410] ==================================================================
[   21.812543] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   21.813121] Read of size 1 at addr ffff95d57834f5cd by task kunit_try_catch/246
[   21.813552] 
[   21.813647] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   21.813781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.813813] Hardware name: linux,dummy-virt (DT)
[   21.813848] Call trace:
[   21.813871]  show_stack+0x20/0x38 (C)
[   21.813930]  dump_stack_lvl+0x8c/0xd0
[   21.813981]  print_report+0x310/0x608
[   21.814127]  kasan_report+0xdc/0x128
[   21.814216]  __asan_report_load1_noabort+0x20/0x30
[   21.814315]  kasan_global_oob_right+0x230/0x270
[   21.814437]  kunit_try_run_case+0x170/0x3f0
[   21.815119]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.815414]  kthread+0x328/0x630
[   21.815515]  ret_from_fork+0x10/0x20
[   21.816402] 
[   21.816760] The buggy address belongs to the variable:
[   21.817049]  global_array+0xd/0x40
[   21.817230] 
[   21.817424] The buggy address belongs to the virtual mapping at
[   21.817424]  [ffff95d576500000, ffff95d578401000) created by:
[   21.817424]  paging_init+0x66c/0x7d0
[   21.817614] 
[   21.817727] The buggy address belongs to the physical page:
[   21.817796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f
[   21.817921] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   21.818350] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000
[   21.818609] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.818710] page dumped because: kasan: bad access detected
[   21.818789] 
[   21.818829] Memory state around the buggy address:
[   21.818905]  ffff95d57834f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.818985]  ffff95d57834f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.819094] >ffff95d57834f580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   21.819172]                                               ^
[   21.819255]  ffff95d57834f600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   21.819342]  ffff95d57834f680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   21.819441] ==================================================================

[   15.609016] ==================================================================
[   15.610132] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   15.610455] Read of size 1 at addr ffffffff99e61e8d by task kunit_try_catch/263
[   15.611109] 
[   15.611438] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.611504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.611519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.611547] Call Trace:
[   15.611564]  <TASK>
[   15.611588]  dump_stack_lvl+0x73/0xb0
[   15.611628]  print_report+0xd1/0x650
[   15.611668]  ? __virt_addr_valid+0x1db/0x2d0
[   15.611698]  ? kasan_global_oob_right+0x286/0x2d0
[   15.611724]  ? kasan_addr_to_slab+0x11/0xa0
[   15.611748]  ? kasan_global_oob_right+0x286/0x2d0
[   15.611782]  kasan_report+0x141/0x180
[   15.611809]  ? kasan_global_oob_right+0x286/0x2d0
[   15.611840]  __asan_report_load1_noabort+0x18/0x20
[   15.611868]  kasan_global_oob_right+0x286/0x2d0
[   15.611894]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   15.611925]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   15.611956]  kunit_try_run_case+0x1a5/0x480
[   15.611987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.612013]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.612043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.612070]  ? __kthread_parkme+0x82/0x180
[   15.612095]  ? preempt_count_sub+0x50/0x80
[   15.612125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.612153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.612180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.612208]  kthread+0x337/0x6f0
[   15.612231]  ? trace_preempt_on+0x20/0xc0
[   15.612261]  ? __pfx_kthread+0x10/0x10
[   15.612286]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.612330]  ? calculate_sigpending+0x7b/0xa0
[   15.612359]  ? __pfx_kthread+0x10/0x10
[   15.612386]  ret_from_fork+0x116/0x1d0
[   15.612410]  ? __pfx_kthread+0x10/0x10
[   15.612434]  ret_from_fork_asm+0x1a/0x30
[   15.612473]  </TASK>
[   15.612487] 
[   15.625235] The buggy address belongs to the variable:
[   15.625831]  global_array+0xd/0x40
[   15.626326] 
[   15.626550] The buggy address belongs to the physical page:
[   15.627168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x58061
[   15.628099] flags: 0x100000000002000(reserved|node=0|zone=1)
[   15.628862] raw: 0100000000002000 ffffea0001601848 ffffea0001601848 0000000000000000
[   15.629668] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   15.630153] page dumped because: kasan: bad access detected
[   15.630360] 
[   15.630451] Memory state around the buggy address:
[   15.630640]  ffffffff99e61d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.630928]  ffffffff99e61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.631451] >ffffffff99e61e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   15.631737]                       ^
[   15.631929]  ffffffff99e61f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   15.632549]  ffffffff99e61f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   15.632959] ==================================================================