Hay
Date
May 12, 2025, 11:48 a.m.

Environment
qemu-arm64
qemu-x86_64

[   18.949096] ==================================================================
[   18.949167] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   18.949230] Read of size 1 at addr ffffa8e07372e60d by task kunit_try_catch/245
[   18.949279] 
[   18.949314] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT 
[   18.949395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.949422] Hardware name: linux,dummy-virt (DT)
[   18.949451] Call trace:
[   18.949472]  show_stack+0x20/0x38 (C)
[   18.949521]  dump_stack_lvl+0x8c/0xd0
[   18.949568]  print_report+0x310/0x608
[   18.949613]  kasan_report+0xdc/0x128
[   18.949655]  __asan_report_load1_noabort+0x20/0x30
[   18.949732]  kasan_global_oob_right+0x230/0x270
[   18.949784]  kunit_try_run_case+0x170/0x3f0
[   18.949852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.949903]  kthread+0x328/0x630
[   18.949948]  ret_from_fork+0x10/0x20
[   18.950036] 
[   18.950098] The buggy address belongs to the variable:
[   18.950131]  global_array+0xd/0x40
[   18.950179] 
[   18.950251] The buggy address belongs to the virtual mapping at
[   18.950251]  [ffffa8e0718e0000, ffffa8e0737e1000) created by:
[   18.950251]  paging_init+0x66c/0x7d0
[   18.950336] 
[   18.950649] The buggy address belongs to the physical page:
[   18.950714] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d2e
[   18.950772] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   18.951113] raw: 03fffe0000002000 ffffc1ffc01f4b88 ffffc1ffc01f4b88 0000000000000000
[   18.951311] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.951406] page dumped because: kasan: bad access detected
[   18.951476] 
[   18.951641] Memory state around the buggy address:
[   18.951680]  ffffa8e07372e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.951764]  ffffa8e07372e580: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   18.951830] >ffffa8e07372e600: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   18.951888]                       ^
[   18.951956]  ffffa8e07372e680: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   18.952000]  ffffa8e07372e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.952036] ==================================================================

[   18.748803] ==================================================================
[   18.749445] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   18.750695] Read of size 1 at addr ffffffff9325ef0d by task kunit_try_catch/262
[   18.751424] 
[   18.751634] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250512 #1 PREEMPT(voluntary) 
[   18.751717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.751732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.751759] Call Trace:
[   18.751776]  <TASK>
[   18.751798]  dump_stack_lvl+0x73/0xb0
[   18.751841]  print_report+0xd1/0x650
[   18.751868]  ? __virt_addr_valid+0x1db/0x2d0
[   18.751895]  ? kasan_global_oob_right+0x286/0x2d0
[   18.751919]  ? kasan_addr_to_slab+0x11/0xa0
[   18.751942]  ? kasan_global_oob_right+0x286/0x2d0
[   18.751966]  kasan_report+0x141/0x180
[   18.751990]  ? kasan_global_oob_right+0x286/0x2d0
[   18.752018]  __asan_report_load1_noabort+0x18/0x20
[   18.752048]  kasan_global_oob_right+0x286/0x2d0
[   18.752277]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   18.752353]  ? __schedule+0x10cc/0x2b60
[   18.752430]  ? __pfx_read_tsc+0x10/0x10
[   18.752487]  ? ktime_get_ts64+0x86/0x230
[   18.752542]  kunit_try_run_case+0x1a5/0x480
[   18.752602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.752652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.752733]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.752762]  ? __kthread_parkme+0x82/0x180
[   18.752787]  ? preempt_count_sub+0x50/0x80
[   18.752814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.752848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.752892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.752918]  kthread+0x337/0x6f0
[   18.752940]  ? trace_preempt_on+0x20/0xc0
[   18.752967]  ? __pfx_kthread+0x10/0x10
[   18.752990]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.753013]  ? calculate_sigpending+0x7b/0xa0
[   18.753045]  ? __pfx_kthread+0x10/0x10
[   18.753108]  ret_from_fork+0x116/0x1d0
[   18.753142]  ? __pfx_kthread+0x10/0x10
[   18.753176]  ret_from_fork_asm+0x1a/0x30
[   18.753230]  </TASK>
[   18.753249] 
[   18.767390] The buggy address belongs to the variable:
[   18.767644]  global_array+0xd/0x40
[   18.768212] 
[   18.768487] The buggy address belongs to the physical page:
[   18.768998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13f25e
[   18.769770] flags: 0x200000000002000(reserved|node=0|zone=2)
[   18.770296] raw: 0200000000002000 ffffea0004fc9788 ffffea0004fc9788 0000000000000000
[   18.770819] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.771507] page dumped because: kasan: bad access detected
[   18.771724] 
[   18.771921] Memory state around the buggy address:
[   18.772697]  ffffffff9325ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.773439]  ffffffff9325ee80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.774255] >ffffffff9325ef00: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   18.774628]                       ^
[   18.775328]  ffffffff9325ef80: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   18.775976]  ffffffff9325f000: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   18.777186] ==================================================================