Hay
Date
July 1, 2025, 3:08 p.m.

Environment
qemu-arm64
qemu-x86_64

[   19.095011] ==================================================================
[   19.095081] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   19.095540] Read of size 1 at addr ffffa1857194f5cd by task kunit_try_catch/246
[   19.095640] 
[   19.095763] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT 
[   19.095852] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.095880] Hardware name: linux,dummy-virt (DT)
[   19.096265] Call trace:
[   19.096298]  show_stack+0x20/0x38 (C)
[   19.096352]  dump_stack_lvl+0x8c/0xd0
[   19.096421]  print_report+0x310/0x608
[   19.096765]  kasan_report+0xdc/0x128
[   19.096864]  __asan_report_load1_noabort+0x20/0x30
[   19.096930]  kasan_global_oob_right+0x230/0x270
[   19.096988]  kunit_try_run_case+0x170/0x3f0
[   19.097040]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.097095]  kthread+0x328/0x630
[   19.097374]  ret_from_fork+0x10/0x20
[   19.097829] 
[   19.098244] The buggy address belongs to the variable:
[   19.098457]  global_array+0xd/0x40
[   19.098587] 
[   19.098733] The buggy address belongs to the virtual mapping at
[   19.098733]  [ffffa1856fb00000, ffffa18571a01000) created by:
[   19.098733]  paging_init+0x66c/0x7d0
[   19.098862] 
[   19.098925] The buggy address belongs to the physical page:
[   19.099299] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f
[   19.099382] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   19.099553] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000
[   19.100005] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.100154] page dumped because: kasan: bad access detected
[   19.100213] 
[   19.100261] Memory state around the buggy address:
[   19.100389]  ffffa1857194f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.100479]  ffffa1857194f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.100660] >ffffa1857194f580: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[   19.100815]                                               ^
[   19.101292]  ffffa1857194f600: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   19.101452]  ffffa1857194f680: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   19.101532] ==================================================================

[   13.419938] ==================================================================
[   13.420637] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x286/0x2d0
[   13.421189] Read of size 1 at addr ffffffff87c61e8d by task kunit_try_catch/262
[   13.421511] 
[   13.421675] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4 #1 PREEMPT(voluntary) 
[   13.421818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.421835] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.421857] Call Trace:
[   13.421871]  <TASK>
[   13.421890]  dump_stack_lvl+0x73/0xb0
[   13.421921]  print_report+0xd1/0x650
[   13.421945]  ? __virt_addr_valid+0x1db/0x2d0
[   13.421969]  ? kasan_global_oob_right+0x286/0x2d0
[   13.421990]  ? kasan_addr_to_slab+0x11/0xa0
[   13.422010]  ? kasan_global_oob_right+0x286/0x2d0
[   13.422044]  kasan_report+0x141/0x180
[   13.422066]  ? kasan_global_oob_right+0x286/0x2d0
[   13.422091]  __asan_report_load1_noabort+0x18/0x20
[   13.422114]  kasan_global_oob_right+0x286/0x2d0
[   13.422135]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   13.422158]  ? __schedule+0x10cc/0x2b60
[   13.422180]  ? __pfx_read_tsc+0x10/0x10
[   13.422203]  ? ktime_get_ts64+0x86/0x230
[   13.422226]  kunit_try_run_case+0x1a5/0x480
[   13.422251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.422273]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.422296]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.422318]  ? __kthread_parkme+0x82/0x180
[   13.422338]  ? preempt_count_sub+0x50/0x80
[   13.422361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.422384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.422407]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.422430]  kthread+0x337/0x6f0
[   13.422449]  ? trace_preempt_on+0x20/0xc0
[   13.422473]  ? __pfx_kthread+0x10/0x10
[   13.422493]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.422515]  ? calculate_sigpending+0x7b/0xa0
[   13.422539]  ? __pfx_kthread+0x10/0x10
[   13.422563]  ret_from_fork+0x116/0x1d0
[   13.422582]  ? __pfx_kthread+0x10/0x10
[   13.422601]  ret_from_fork_asm+0x1a/0x30
[   13.422633]  </TASK>
[   13.422708] 
[   13.430730] The buggy address belongs to the variable:
[   13.431084]  global_array+0xd/0x40
[   13.431289] 
[   13.431404] The buggy address belongs to the physical page:
[   13.431878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5ec61
[   13.432307] flags: 0x100000000002000(reserved|node=0|zone=1)
[   13.432720] raw: 0100000000002000 ffffea00017b1848 ffffea00017b1848 0000000000000000
[   13.433094] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.433411] page dumped because: kasan: bad access detected
[   13.433794] 
[   13.433901] Memory state around the buggy address:
[   13.434158]  ffffffff87c61d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.434479]  ffffffff87c61e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.434946] >ffffffff87c61e80: 00 02 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
[   13.435303]                       ^
[   13.435450]  ffffffff87c61f00: 04 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[   13.436088]  ffffffff87c61f80: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
[   13.436432] ==================================================================