Hay
Date
July 5, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   20.356347] ==================================================================
[   20.356422] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   20.356511] Read of size 1 at addr ffff918d08f4f5cd by task kunit_try_catch/245
[   20.356564] 
[   20.357052] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   20.357480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.357786] Hardware name: linux,dummy-virt (DT)
[   20.357979] Call trace:
[   20.358002]  show_stack+0x20/0x38 (C)
[   20.358053]  dump_stack_lvl+0x8c/0xd0
[   20.358323]  print_report+0x310/0x608
[   20.358620]  kasan_report+0xdc/0x128
[   20.358715]  __asan_report_load1_noabort+0x20/0x30
[   20.358900]  kasan_global_oob_right+0x230/0x270
[   20.358945]  kunit_try_run_case+0x170/0x3f0
[   20.358997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.359052]  kthread+0x328/0x630
[   20.359093]  ret_from_fork+0x10/0x20
[   20.359168] 
[   20.359328] The buggy address belongs to the variable:
[   20.359359]  global_array+0xd/0x40
[   20.359635] 
[   20.360213] The buggy address belongs to the virtual mapping at
[   20.360213]  [ffff918d07100000, ffff918d09001000) created by:
[   20.360213]  paging_init+0x66c/0x7d0
[   20.360414] 
[   20.360482] The buggy address belongs to the physical page:
[   20.360515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f
[   20.360801] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   20.361005] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000
[   20.361257] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.361300] page dumped because: kasan: bad access detected
[   20.361338] 
[   20.361355] Memory state around the buggy address:
[   20.361387]  ffff918d08f4f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.361720]  ffff918d08f4f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.361767] >ffff918d08f4f580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   20.361804]                                               ^
[   20.361897]  ffff918d08f4f600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   20.362336]  ffff918d08f4f680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   20.362379] ==================================================================

[   15.547980] ==================================================================
[   15.548519] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   15.548823] Read of size 1 at addr ffffffffbc461e8d by task kunit_try_catch/263
[   15.549077] 
[   15.549212] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   15.549266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.549280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.549307] Call Trace:
[   15.549323]  <TASK>
[   15.549351]  dump_stack_lvl+0x73/0xb0
[   15.549385]  print_report+0xd1/0x650
[   15.549410]  ? __virt_addr_valid+0x1db/0x2d0
[   15.549436]  ? kasan_global_oob_right+0x286/0x2d0
[   15.549459]  ? kasan_addr_to_slab+0x11/0xa0
[   15.549483]  ? kasan_global_oob_right+0x286/0x2d0
[   15.549509]  kasan_report+0x141/0x180
[   15.549534]  ? kasan_global_oob_right+0x286/0x2d0
[   15.549563]  __asan_report_load1_noabort+0x18/0x20
[   15.549590]  kasan_global_oob_right+0x286/0x2d0
[   15.549615]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   15.549642]  ? __schedule+0x10cc/0x2b60
[   15.549668]  ? __pfx_read_tsc+0x10/0x10
[   15.549692]  ? ktime_get_ts64+0x86/0x230
[   15.549721]  kunit_try_run_case+0x1a5/0x480
[   15.549751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.549776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.550237]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.550268]  ? __kthread_parkme+0x82/0x180
[   15.550295]  ? preempt_count_sub+0x50/0x80
[   15.550323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.550581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.550610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.550639]  kthread+0x337/0x6f0
[   15.550663]  ? trace_preempt_on+0x20/0xc0
[   15.550692]  ? __pfx_kthread+0x10/0x10
[   15.550716]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.550741]  ? calculate_sigpending+0x7b/0xa0
[   15.550768]  ? __pfx_kthread+0x10/0x10
[   15.550808]  ret_from_fork+0x116/0x1d0
[   15.550832]  ? __pfx_kthread+0x10/0x10
[   15.550856]  ret_from_fork_asm+0x1a/0x30
[   15.550893]  </TASK>
[   15.550909] 
[   15.567376] The buggy address belongs to the variable:
[   15.567916]  global_array+0xd/0x40
[   15.568395] 
[   15.568615] The buggy address belongs to the physical page:
[   15.569176] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x73261
[   15.570033] flags: 0x100000000002000(reserved|node=0|zone=1)
[   15.570860] raw: 0100000000002000 ffffea0001cc9848 ffffea0001cc9848 0000000000000000
[   15.571367] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   15.572100] page dumped because: kasan: bad access detected
[   15.572679] 
[   15.572768] Memory state around the buggy address:
[   15.572966]  ffffffffbc461d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.573338]  ffffffffbc461e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   15.573639] >ffffffffbc461e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   15.574009]                       ^
[   15.574177]  ffffffffbc461f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   15.574518]  ffffffffbc461f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   15.575385] ==================================================================