Hay
Date
July 15, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64

[   17.673551] ==================================================================
[   17.673615] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   17.673666] Read of size 1 at addr ffffa65db074f58d by task kunit_try_catch/246
[   17.673758] 
[   17.673794] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.673904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.673941] Hardware name: linux,dummy-virt (DT)
[   17.673973] Call trace:
[   17.673994]  show_stack+0x20/0x38 (C)
[   17.674287]  dump_stack_lvl+0x8c/0xd0
[   17.674350]  print_report+0x310/0x5d0
[   17.674395]  kasan_report+0xdc/0x128
[   17.674440]  __asan_report_load1_noabort+0x20/0x30
[   17.674492]  kasan_global_oob_right+0x230/0x270
[   17.674540]  kunit_try_run_case+0x170/0x3f0
[   17.674627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.674682]  kthread+0x328/0x630
[   17.674722]  ret_from_fork+0x10/0x20
[   17.674784] 
[   17.674844] The buggy address belongs to the variable:
[   17.674875]  global_array+0xd/0x40
[   17.674923] 
[   17.675139] The buggy address ffffa65db074f58d belongs to a vmalloc virtual mapping
[   17.675241] The buggy address belongs to the physical page:
[   17.675274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f
[   17.675329] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   17.675488] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000
[   17.675540] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.675579] page dumped because: kasan: bad access detected
[   17.675616] 
[   17.675755] Memory state around the buggy address:
[   17.675787]  ffffa65db074f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.675830]  ffffa65db074f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   17.675872] >ffffa65db074f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   17.675911]                       ^
[   17.675939]  ffffa65db074f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   17.676033]  ffffa65db074f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.676101] ==================================================================

[   14.302766] ==================================================================
[   14.303223] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   14.304840] Read of size 1 at addr ffffffffad063e8d by task kunit_try_catch/262
[   14.305879] 
[   14.306224] CPU: 1 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.306274] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.306287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.306709] Call Trace:
[   14.306735]  <TASK>
[   14.306751]  dump_stack_lvl+0x73/0xb0
[   14.306798]  print_report+0xd1/0x610
[   14.306821]  ? __virt_addr_valid+0x1db/0x2d0
[   14.306845]  ? kasan_global_oob_right+0x286/0x2d0
[   14.306867]  ? kasan_addr_to_slab+0x11/0xa0
[   14.306888]  ? kasan_global_oob_right+0x286/0x2d0
[   14.306911]  kasan_report+0x141/0x180
[   14.306934]  ? kasan_global_oob_right+0x286/0x2d0
[   14.306961]  __asan_report_load1_noabort+0x18/0x20
[   14.306987]  kasan_global_oob_right+0x286/0x2d0
[   14.307010]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   14.307036]  ? __schedule+0x10cc/0x2b60
[   14.307060]  ? __pfx_read_tsc+0x10/0x10
[   14.307081]  ? ktime_get_ts64+0x86/0x230
[   14.307105]  kunit_try_run_case+0x1a5/0x480
[   14.307130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.307154]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.307179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.307204]  ? __kthread_parkme+0x82/0x180
[   14.307224]  ? preempt_count_sub+0x50/0x80
[   14.307249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.307275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.307301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.307337]  kthread+0x337/0x6f0
[   14.307361]  ? trace_preempt_on+0x20/0xc0
[   14.307385]  ? __pfx_kthread+0x10/0x10
[   14.307407]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.307429]  ? calculate_sigpending+0x7b/0xa0
[   14.307454]  ? __pfx_kthread+0x10/0x10
[   14.307476]  ret_from_fork+0x116/0x1d0
[   14.307495]  ? __pfx_kthread+0x10/0x10
[   14.307517]  ret_from_fork_asm+0x1a/0x30
[   14.307548]  </TASK>
[   14.307558] 
[   14.320182] The buggy address belongs to the variable:
[   14.320813]  global_array+0xd/0x40
[   14.321021] 
[   14.321113] The buggy address belongs to the physical page:
[   14.321635] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x130263
[   14.322120] flags: 0x200000000002000(reserved|node=0|zone=2)
[   14.322546] raw: 0200000000002000 ffffea0004c098c8 ffffea0004c098c8 0000000000000000
[   14.322903] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   14.323417] page dumped because: kasan: bad access detected
[   14.323639] 
[   14.323737] Memory state around the buggy address:
[   14.323936]  ffffffffad063d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.324248]  ffffffffad063e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.324550] >ffffffffad063e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   14.324875]                       ^
[   14.325054]  ffffffffad063f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   14.325381]  ffffffffad063f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   14.325649] ==================================================================