Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64
qemu-x86_64

[  106.662692] ==================================================================
[  106.663685] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa8/0x160
[  106.664853] Read of size 1 at addr ffffafe56d3e7e2d by task kunit_try_catch/236
[  106.665465] 
[  106.665716] CPU: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  106.666595] Hardware name: linux,dummy-virt (DT)
[  106.667075] Call trace:
[  106.667370]  dump_backtrace+0xe0/0x134
[  106.667829]  show_stack+0x20/0x2c
[  106.668188]  dump_stack_lvl+0x88/0xb4
[  106.669007]  print_report+0x158/0x44c
[  106.669451]  kasan_report+0xc8/0x180
[  106.669904]  __asan_load1+0x68/0x74
[  106.670357]  kasan_global_oob_right+0xa8/0x160
[  106.670889]  kunit_try_run_case+0x8c/0x124
[  106.671388]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  106.671975]  kthread+0x15c/0x170
[  106.672392]  ret_from_fork+0x10/0x20
[  106.673186] 
[  106.673458] The buggy address belongs to the variable:
[  106.673936]  global_array+0xd/0x40
[  106.674423] 
[  106.674669] The buggy address ffffafe56d3e7e2d belongs to a vmalloc virtual mapping
[  106.675363] The buggy address belongs to the physical page:
[  106.675876] page:000000001ada928f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x469e7
[  106.676976] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[  106.677712] raw: 03fffc0000001000 fffffc00001a79c8 fffffc00001a79c8 0000000000000000
[  106.678381] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  106.679047] page dumped because: kasan: bad access detected
[  106.679543] 
[  106.679790] Memory state around the buggy address:
[  106.680279]  ffffafe56d3e7d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  106.680949]  ffffafe56d3e7d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  106.681918] >ffffafe56d3e7e00: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[  106.682527]                                   ^
[  106.682982]  ffffafe56d3e7e80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[  106.683623]  ffffafe56d3e7f00: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[  106.684260] ==================================================================

[   76.382577] ==================================================================
[   76.383528] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0
[   76.384304] Read of size 1 at addr ffffa664876d15cd by task kunit_try_catch/152
[   76.385199] 
[   76.385513] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.386354] Hardware name: linux,dummy-virt (DT)
[   76.386876] Call trace:
[   76.387147]  dump_backtrace+0xf8/0x118
[   76.387709]  show_stack+0x18/0x24
[   76.388193]  __dump_stack+0x28/0x38
[   76.388743]  dump_stack_lvl+0x54/0x6c
[   76.389199]  print_address_description+0x7c/0x1ec
[   76.389819]  print_report+0x50/0x68
[   76.390324]  kasan_report+0xac/0x100
[   76.390817]  __asan_load1+0x6c/0x70
[   76.391292]  kasan_global_oob_right+0x4c/0xf0
[   76.391770]  kunit_try_run_case+0x80/0x184
[   76.392288]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.393360]  kthread+0x16c/0x21c
[   76.393824]  ret_from_fork+0x10/0x20
[   76.394273] 
[   76.394496] The buggy address belongs to the variable:
[   76.394973]  global_array+0xd/0x20
[   76.395386] 
[   76.395612] The buggy address ffffa664876d15cd belongs to a vmalloc virtual mapping
[   76.396247] The buggy address belongs to the physical page:
[   76.396984] page:0000000092fb1506 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd1
[   76.397773] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   76.398461] raw: 03fffc0000001000 fffffc00000f3448 fffffc00000f3448 0000000000000000
[   76.399150] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   76.399776] page dumped because: kasan: bad access detected
[   76.400231] 
[   76.400437] Memory state around the buggy address:
[   76.400903]  ffffa664876d1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9
[   76.401528]  ffffa664876d1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00
[   76.402157] >ffffa664876d1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9
[   76.402724]                                               ^
[   76.403716]  ffffa664876d1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.404359]  ffffa664876d1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.405265] ==================================================================

[   75.437504] ==================================================================
[   75.438414] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0
[   75.439140] Read of size 1 at addr ffffa980ac4c15cd by task kunit_try_catch/152
[   75.439760] 
[   75.440110] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.441380] Hardware name: linux,dummy-virt (DT)
[   75.441800] Call trace:
[   75.442217]  dump_backtrace+0xf4/0x114
[   75.442791]  show_stack+0x18/0x24
[   75.443304]  __dump_stack+0x28/0x38
[   75.443896]  dump_stack_lvl+0x50/0x68
[   75.444453]  print_address_description+0x7c/0x1ec
[   75.445126]  print_report+0x50/0x68
[   75.445662]  kasan_report+0xac/0xfc
[   75.446153]  __asan_load1+0x6c/0x70
[   75.446633]  kasan_global_oob_right+0x4c/0xf0
[   75.447522]  kunit_try_run_case+0x80/0x184
[   75.447978]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.448486]  kthread+0x16c/0x21c
[   75.448977]  ret_from_fork+0x10/0x20
[   75.449422] 
[   75.449697] The buggy address belongs to the variable:
[   75.450170]  global_array+0xd/0x20
[   75.450663] 
[   75.450951] The buggy address ffffa980ac4c15cd belongs to a vmalloc virtual mapping
[   75.451571] The buggy address belongs to the physical page:
[   75.452193] page:0000000009454da2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cc1
[   75.453890] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   75.454923] raw: 03fffc0000001000 fffffc00000f3048 fffffc00000f3048 0000000000000000
[   75.455606] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.457023] page dumped because: kasan: bad access detected
[   75.457853] 
[   75.458283] Memory state around the buggy address:
[   75.458982]  ffffa980ac4c1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9
[   75.459593]  ffffa980ac4c1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00
[   75.460770] >ffffa980ac4c1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9
[   75.461391]                                               ^
[   75.461898]  ffffa980ac4c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.462531]  ffffa980ac4c1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.463141] ==================================================================

[   74.011700] ==================================================================
[   74.012572] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150
[   74.013283] Read of size 1 at addr ffffc778ac5a6eed by task kunit_try_catch/152
[   74.014218] 
[   74.014492] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.015250] Hardware name: linux,dummy-virt (DT)
[   74.015686] Call trace:
[   74.015962]  dump_backtrace.part.0+0xdc/0xf0
[   74.016471]  show_stack+0x18/0x30
[   74.016883]  dump_stack_lvl+0x64/0x80
[   74.017326]  print_report+0x158/0x438
[   74.018085]  kasan_report+0xb4/0xf4
[   74.018497]  __asan_load1+0x68/0x74
[   74.018887]  kasan_global_oob_right+0xa0/0x150
[   74.019350]  kunit_try_run_case+0x84/0x120
[   74.019812]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.020363]  kthread+0x180/0x190
[   74.020764]  ret_from_fork+0x10/0x20
[   74.021193] 
[   74.021439] The buggy address belongs to the variable:
[   74.022182]  global_array+0xd/0x40
[   74.022651] 
[   74.022899] The buggy address ffffc778ac5a6eed belongs to a vmalloc virtual mapping
[   74.023564] The buggy address belongs to the physical page:
[   74.024067] page:00000000841dc02e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x455a6
[   74.024834] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   74.025567] raw: 03fffc0000001000 fffffc0000156988 fffffc0000156988 0000000000000000
[   74.026335] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.027082] page dumped because: kasan: bad access detected
[   74.027956] 
[   74.028136] Memory state around the buggy address:
[   74.028486]  ffffc778ac5a6d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.028942]  ffffc778ac5a6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.029497] >ffffc778ac5a6e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
[   74.030557]                                                           ^
[   74.031025]  ffffc778ac5a6f00: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   74.031709]  ffffc778ac5a6f80: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   74.032252] ==================================================================

[   65.514738] ==================================================================
[   65.515443] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xb8/0x168
[   65.515973] Read of size 1 at addr ffffca3b08365e2d by task kunit_try_catch/150
[   65.516639] 
[   65.516910] CPU: 1 PID: 150 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   65.517842] Hardware name: linux,dummy-virt (DT)
[   65.518213] Call trace:
[   65.518462]  dump_backtrace+0x110/0x120
[   65.518883]  show_stack+0x18/0x28
[   65.519271]  dump_stack_lvl+0x68/0x84
[   65.519691]  print_report+0x158/0x484
[   65.520073]  kasan_report+0x98/0xe0
[   65.520456]  __asan_load1+0x68/0x78
[   65.520810]  kasan_global_oob_right+0xb8/0x168
[   65.521249]  kunit_try_run_case+0x7c/0x120
[   65.521662]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   65.522756]  kthread+0x1a4/0x1b8
[   65.523117]  ret_from_fork+0x10/0x20
[   65.523497] 
[   65.523719] The buggy address belongs to the variable:
[   65.524082]  global_array+0xd/0x40
[   65.524632] 
[   65.524831] The buggy address ffffca3b08365e2d belongs to a vmalloc virtual mapping
[   65.525388] The buggy address belongs to the physical page:
[   65.525794] page:000000007fbc8aa1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45565
[   65.526516] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   65.527145] raw: 03fffc0000001000 fffffc0000155948 fffffc0000155948 0000000000000000
[   65.527744] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   65.528304] page dumped because: kasan: bad access detected
[   65.528719] 
[   65.528886] Memory state around the buggy address:
[   65.529301]  ffffca3b08365d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.530458]  ffffca3b08365d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   65.530995] >ffffca3b08365e00: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9
[   65.531529]                                   ^
[   65.531913]  ffffca3b08365e80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   65.532468]  ffffca3b08365f00: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   65.532987] ==================================================================

[   31.722885] ==================================================================
[   31.723471] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x9f/0x160
[   31.724145] Read of size 1 at addr ffffffffb2dc372d by task kunit_try_catch/256
[   31.724625] 
[   31.724787] CPU: 1 PID: 256 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   31.725611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.726193] Call Trace:
[   31.726379]  <TASK>
[   31.726751]  dump_stack_lvl+0x49/0x62
[   31.727100]  print_report+0x189/0x492
[   31.727554]  ? kasan_addr_to_slab+0xd/0xb0
[   31.727916]  ? kasan_global_oob_right+0x9f/0x160
[   31.728303]  kasan_report+0x10c/0x190
[   31.728753]  ? kasan_global_oob_right+0x9f/0x160
[   31.729189]  __asan_load1+0x62/0x70
[   31.729716]  kasan_global_oob_right+0x9f/0x160
[   31.729981]  ? kasan_stack_oob+0x190/0x190
[   31.730231]  ? _raw_spin_unlock_irqrestore+0x2d/0x60
[   31.730845]  ? kasan_test_init+0x13e/0x1b0
[   31.731101]  kunit_try_run_case+0x8f/0xd0
[   31.731369]  ? kunit_catch_run_case+0x80/0x80
[   31.731760]  ? kunit_try_catch_throw+0x40/0x40
[   31.731997]  kunit_generic_run_threadfn_adapter+0x2f/0x50
[   31.732318]  kthread+0x17b/0x1b0
[   31.732544]  ? kthread_complete_and_exit+0x30/0x30
[   31.732894]  ret_from_fork+0x22/0x30
[   31.733100]  </TASK>
[   31.733266] 
[   31.733413] The buggy address belongs to the variable:
[   31.733966]  global_array+0xd/0x40
[   31.734210] 
[   31.734341] The buggy address belongs to the physical page:
[   31.734771] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10dc3
[   31.735237] flags: 0x100000000001000(reserved|node=0|zone=1)
[   31.735741] raw: 0100000000001000 ffffea00004370c8 ffffea00004370c8 0000000000000000
[   31.736180] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   31.736748] page dumped because: kasan: bad access detected
[   31.737056] 
[   31.737171] Memory state around the buggy address:
[   31.737568]  ffffffffb2dc3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.737890]  ffffffffb2dc3680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.738245] >ffffffffb2dc3700: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   31.738563]                                   ^
[   31.739019]  ffffffffb2dc3780: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
[   31.739422]  ffffffffb2dc3800: 00 00 00 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   31.739868] ==================================================================