Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   36.901156] ==================================================================
[   36.911733] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   36.919286] Read of size 1 at addr ffff800087a035ad by task kunit_try_catch/294
[   36.926576] 
[   36.928061] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   36.928118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.928136] Hardware name: WinLink E850-96 board (DT)
[   36.928159] Call trace:
[   36.928172]  show_stack+0x20/0x38 (C)
[   36.928210]  dump_stack_lvl+0x8c/0xd0
[   36.928247]  print_report+0x310/0x608
[   36.928278]  kasan_report+0xdc/0x128
[   36.928308]  __asan_report_load1_noabort+0x20/0x30
[   36.928348]  kasan_global_oob_right+0x230/0x270
[   36.928382]  kunit_try_run_case+0x170/0x3f0
[   36.928419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.928459]  kthread+0x328/0x630
[   36.928493]  ret_from_fork+0x10/0x20
[   36.928532] 
[   36.991244] The buggy address belongs to the variable:
[   36.996364]  global_array+0xd/0x40
[   36.999751] 
[   37.001235] The buggy address belongs to the virtual mapping at
[   37.001235]  [ffff800085c20000, ffff800087ac1000) created by:
[   37.001235]  paging_init+0x66c/0x7d0
[   37.016416] 
[   37.017898] The buggy address belongs to the physical page:
[   37.023454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87a03
[   37.031349] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   37.038654] raw: 03fffe0000002000 fffffdffc01e80c8 fffffdffc01e80c8 0000000000000000
[   37.046370] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.054091] page dumped because: kasan: bad access detected
[   37.059645] 
[   37.061120] Memory state around the buggy address:
[   37.065902]  ffff800087a03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.073104]  ffff800087a03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   37.080311] >ffff800087a03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   37.087509]                                   ^
[   37.092027]  ffff800087a03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   37.099232]  ffff800087a03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   37.106434] ==================================================================

[   17.750661] ==================================================================
[   17.750727] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   17.750782] Read of size 1 at addr ffffaa36042035ad by task kunit_try_catch/250
[   17.750832] 
[   17.750869] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.750967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.751006] Hardware name: linux,dummy-virt (DT)
[   17.751039] Call trace:
[   17.751061]  show_stack+0x20/0x38 (C)
[   17.751117]  dump_stack_lvl+0x8c/0xd0
[   17.751174]  print_report+0x310/0x608
[   17.751227]  kasan_report+0xdc/0x128
[   17.751277]  __asan_report_load1_noabort+0x20/0x30
[   17.751327]  kasan_global_oob_right+0x230/0x270
[   17.751374]  kunit_try_run_case+0x170/0x3f0
[   17.751422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.751476]  kthread+0x328/0x630
[   17.751527]  ret_from_fork+0x10/0x20
[   17.751579] 
[   17.751641] The buggy address belongs to the variable:
[   17.751670]  global_array+0xd/0x40
[   17.751730] 
[   17.751815] The buggy address belongs to the virtual mapping at
[   17.751815]  [ffffaa3602420000, ffffaa36042c1000) created by:
[   17.751815]  paging_init+0x66c/0x7d0
[   17.751909] 
[   17.752827] The buggy address belongs to the physical page:
[   17.752897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03
[   17.752975] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   17.753418] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000
[   17.753487] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   17.753690] page dumped because: kasan: bad access detected
[   17.753840] 
[   17.753931] Memory state around the buggy address:
[   17.753972]  ffffaa3604203480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.754019]  ffffaa3604203500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   17.754431] >ffffaa3604203580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   17.754488]                                   ^
[   17.754713]  ffffaa3604203600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   17.754814]  ffffaa3604203680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   17.755160] ==================================================================

[   16.525913] ==================================================================
[   16.526644] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   16.527441] Read of size 1 at addr ffffffffba84332d by task kunit_try_catch/266
[   16.528835] 
[   16.529330] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   16.529730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.529756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.529787] Call Trace:
[   16.529806]  <TASK>
[   16.529833]  dump_stack_lvl+0x73/0xb0
[   16.529875]  print_report+0xd1/0x650
[   16.529904]  ? __virt_addr_valid+0x1db/0x2d0
[   16.529933]  ? kasan_global_oob_right+0x286/0x2d0
[   16.529958]  ? kasan_addr_to_slab+0x11/0xa0
[   16.529983]  ? kasan_global_oob_right+0x286/0x2d0
[   16.530009]  kasan_report+0x141/0x180
[   16.530034]  ? kasan_global_oob_right+0x286/0x2d0
[   16.530070]  __asan_report_load1_noabort+0x18/0x20
[   16.530103]  kasan_global_oob_right+0x286/0x2d0
[   16.530129]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   16.530158]  ? __schedule+0x10cc/0x2b60
[   16.530186]  ? __pfx_read_tsc+0x10/0x10
[   16.530241]  ? ktime_get_ts64+0x86/0x230
[   16.530306]  kunit_try_run_case+0x1a5/0x480
[   16.530362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.530391]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.530420]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.530447]  ? __kthread_parkme+0x82/0x180
[   16.530474]  ? preempt_count_sub+0x50/0x80
[   16.530505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.530531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.530557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.530583]  kthread+0x337/0x6f0
[   16.530602]  ? trace_preempt_on+0x20/0xc0
[   16.530629]  ? __pfx_kthread+0x10/0x10
[   16.530649]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.530674]  ? calculate_sigpending+0x7b/0xa0
[   16.530699]  ? __pfx_kthread+0x10/0x10
[   16.530720]  ret_from_fork+0x41/0x80
[   16.530743]  ? __pfx_kthread+0x10/0x10
[   16.530762]  ret_from_fork_asm+0x1a/0x30
[   16.530797]  </TASK>
[   16.530810] 
[   16.543041] The buggy address belongs to the variable:
[   16.543930]  global_array+0xd/0x40
[   16.544535] 
[   16.544786] The buggy address belongs to the physical page:
[   16.545350] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14e43
[   16.545680] flags: 0x100000000002000(reserved|node=0|zone=1)
[   16.546771] raw: 0100000000002000 ffffea00005390c8 ffffea00005390c8 0000000000000000
[   16.547403] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   16.547864] page dumped because: kasan: bad access detected
[   16.548500] 
[   16.548635] Memory state around the buggy address:
[   16.549036]  ffffffffba843200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.549933]  ffffffffba843280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.550374] >ffffffffba843300: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   16.551141]                                   ^
[   16.551413]  ffffffffba843380: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[   16.551748]  ffffffffba843400: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   16.552073] ==================================================================