Hay
Date
Dec. 9, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   26.752751] ==================================================================
[   26.753839] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   26.754525] Read of size 1 at addr ffffa2c369d21fed by task kunit_try_catch/233
[   26.755370] 
[   26.755772] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.757093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.757653] Hardware name: linux,dummy-virt (DT)
[   26.758229] Call trace:
[   26.758646]  show_stack+0x20/0x38 (C)
[   26.759649]  dump_stack_lvl+0x8c/0xd0
[   26.760277]  print_report+0x2fc/0x5e0
[   26.760878]  kasan_report+0xc8/0x118
[   26.761350]  __asan_report_load1_noabort+0x20/0x30
[   26.762103]  kasan_global_oob_right+0x230/0x270
[   26.762732]  kunit_try_run_case+0x14c/0x3d0
[   26.763562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.764266]  kthread+0x24c/0x2d0
[   26.764806]  ret_from_fork+0x10/0x20
[   26.765339] 
[   26.765766] The buggy address belongs to the variable:
[   26.766326]  global_array+0xd/0x40
[   26.767315] 
[   26.767823] The buggy address belongs to the virtual mapping at
[   26.767823]  [ffffa2c368050000, ffffa2c369dd1000) created by:
[   26.767823]  paging_init+0x668/0x7c8
[   26.769235] 
[   26.769914] The buggy address belongs to the physical page:
[   26.770586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47921
[   26.771678] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   26.772411] raw: 03fffe0000002000 ffffc1ffc01e4848 ffffc1ffc01e4848 0000000000000000
[   26.773231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.774078] page dumped because: kasan: bad access detected
[   26.774758] 
[   26.775801] Memory state around the buggy address:
[   26.776593]  ffffa2c369d21e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.777553]  ffffa2c369d21f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.778434] >ffffa2c369d21f80: 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   26.779622]                                                           ^
[   26.780541]  ffffa2c369d22000: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   26.781380]  ffffa2c369d22080: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   26.782185] ==================================================================

[   27.089699] ==================================================================
[   27.090866] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x288/0x2d0
[   27.091434] Read of size 1 at addr ffffffff9da0fbad by task kunit_try_catch/252
[   27.092436] 
[   27.092703] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   27.093764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.094147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.095113] Call Trace:
[   27.095764]  <TASK>
[   27.096101]  dump_stack_lvl+0x73/0xb0
[   27.096647]  print_report+0xd1/0x640
[   27.097057]  ? __virt_addr_valid+0x1db/0x2d0
[   27.097449]  ? kasan_addr_to_slab+0x11/0xa0
[   27.098010]  kasan_report+0x102/0x140
[   27.098662]  ? kasan_global_oob_right+0x288/0x2d0
[   27.099550]  ? kasan_global_oob_right+0x288/0x2d0
[   27.100019]  __asan_report_load1_noabort+0x18/0x20
[   27.100445]  kasan_global_oob_right+0x288/0x2d0
[   27.101188]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   27.102023]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   27.102730]  kunit_try_run_case+0x1b3/0x490
[   27.103157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.103568]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.104262]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.104681]  ? __kthread_parkme+0x82/0x160
[   27.105191]  ? preempt_count_sub+0x50/0x80
[   27.105519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.106232]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.107191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.107668]  kthread+0x257/0x310
[   27.108392]  ? __pfx_kthread+0x10/0x10
[   27.108772]  ret_from_fork+0x41/0x80
[   27.109134]  ? __pfx_kthread+0x10/0x10
[   27.109735]  ret_from_fork_asm+0x1a/0x30
[   27.110175]  </TASK>
[   27.110619] 
[   27.110909] The buggy address belongs to the variable:
[   27.111481]  global_array+0xd/0x40
[   27.111987] 
[   27.112591] The buggy address belongs to the physical page:
[   27.113157] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3620f
[   27.113749] flags: 0x100000000002000(reserved|node=0|zone=1)
[   27.114210] raw: 0100000000002000 ffffea0000d883c8 ffffea0000d883c8 0000000000000000
[   27.115141] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.115673] page dumped because: kasan: bad access detected
[   27.116640] 
[   27.116886] Memory state around the buggy address:
[   27.117444]  ffffffff9da0fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.117883]  ffffffff9da0fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.118540] >ffffffff9da0fb80: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   27.119378]                                   ^
[   27.119675]  ffffffff9da0fc00: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[   27.120084]  ffffffff9da0fc80: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   27.121073] ==================================================================