Hay
Date
May 15, 2025, 10:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.040649] ==================================================================
[   20.040710] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   20.040767] Read of size 1 at addr ffff9507083405cd by task kunit_try_catch/245
[   20.040819] 
[   20.040864] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.040950] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.040977] Hardware name: linux,dummy-virt (DT)
[   20.041008] Call trace:
[   20.041048]  show_stack+0x20/0x38 (C)
[   20.041098]  dump_stack_lvl+0x8c/0xd0
[   20.041146]  print_report+0x310/0x608
[   20.041505]  kasan_report+0xdc/0x128
[   20.041567]  __asan_report_load1_noabort+0x20/0x30
[   20.041664]  kasan_global_oob_right+0x230/0x270
[   20.041738]  kunit_try_run_case+0x170/0x3f0
[   20.041834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.041915]  kthread+0x328/0x630
[   20.041960]  ret_from_fork+0x10/0x20
[   20.042015] 
[   20.042062] The buggy address belongs to the variable:
[   20.042091]  global_array+0xd/0x40
[   20.042139] 
[   20.042354] The buggy address belongs to the virtual mapping at
[   20.042354]  [ffff9507064f0000, ffff950708401000) created by:
[   20.042354]  paging_init+0x66c/0x7d0
[   20.042441] 
[   20.042567] The buggy address belongs to the physical page:
[   20.042628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d40
[   20.042715] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   20.042796] raw: 03fffe0000002000 ffffc1ffc01f5008 ffffc1ffc01f5008 0000000000000000
[   20.042869] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.042990] page dumped because: kasan: bad access detected
[   20.043084] 
[   20.043129] Memory state around the buggy address:
[   20.043237]  ffff950708340480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.043315]  ffff950708340500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.043381] >ffff950708340580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   20.043500]                                               ^
[   20.043568]  ffff950708340600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   20.043641]  ffff950708340680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   20.043678] ==================================================================


[   16.050123] ==================================================================
[   16.051021] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   16.051454] Read of size 1 at addr ffffffffaa85fecd by task kunit_try_catch/263
[   16.052809] 
[   16.053002] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.053079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.053100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.053139] Call Trace:
[   16.053165]  <TASK>
[   16.053231]  dump_stack_lvl+0x73/0xb0
[   16.053306]  print_report+0xd1/0x650
[   16.053352]  ? __virt_addr_valid+0x1db/0x2d0
[   16.053411]  ? kasan_global_oob_right+0x286/0x2d0
[   16.053457]  ? kasan_addr_to_slab+0x11/0xa0
[   16.053495]  ? kasan_global_oob_right+0x286/0x2d0
[   16.053540]  kasan_report+0x141/0x180
[   16.053573]  ? kasan_global_oob_right+0x286/0x2d0
[   16.053616]  __asan_report_load1_noabort+0x18/0x20
[   16.053649]  kasan_global_oob_right+0x286/0x2d0
[   16.053677]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   16.053701]  ? __schedule+0x10cc/0x2b60
[   16.053724]  ? __pfx_read_tsc+0x10/0x10
[   16.053746]  ? ktime_get_ts64+0x86/0x230
[   16.053772]  kunit_try_run_case+0x1a5/0x480
[   16.053797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.053818]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.053840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.053861]  ? __kthread_parkme+0x82/0x180
[   16.053883]  ? preempt_count_sub+0x50/0x80
[   16.053907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.053929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.053950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.053971]  kthread+0x337/0x6f0
[   16.053990]  ? trace_preempt_on+0x20/0xc0
[   16.054014]  ? __pfx_kthread+0x10/0x10
[   16.054033]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.054054]  ? calculate_sigpending+0x7b/0xa0
[   16.054078]  ? __pfx_kthread+0x10/0x10
[   16.054099]  ret_from_fork+0x116/0x1d0
[   16.054116]  ? __pfx_kthread+0x10/0x10
[   16.054136]  ret_from_fork_asm+0x1a/0x30
[   16.054167]  </TASK>
[   16.054180] 
[   16.063483] The buggy address belongs to the variable:
[   16.063926]  global_array+0xd/0x40
[   16.064299] 
[   16.064514] The buggy address belongs to the physical page:
[   16.064991] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2d25f
[   16.065298] flags: 0x100000000002000(reserved|node=0|zone=1)
[   16.065714] raw: 0100000000002000 ffffea0000b497c8 ffffea0000b497c8 0000000000000000
[   16.066328] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   16.067127] page dumped because: kasan: bad access detected
[   16.067369] 
[   16.067536] Memory state around the buggy address:
[   16.068186]  ffffffffaa85fd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.069949]  ffffffffaa85fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.070203] >ffffffffaa85fe80: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9
[   16.070685]                                               ^
[   16.071106]  ffffffffaa85ff00: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   16.071957]  ffffffffaa85ff80: 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   16.072424] ==================================================================