Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 106.662692] ================================================================== [ 106.663685] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa8/0x160 [ 106.664853] Read of size 1 at addr ffffafe56d3e7e2d by task kunit_try_catch/236 [ 106.665465] [ 106.665716] CPU: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 106.666595] Hardware name: linux,dummy-virt (DT) [ 106.667075] Call trace: [ 106.667370] dump_backtrace+0xe0/0x134 [ 106.667829] show_stack+0x20/0x2c [ 106.668188] dump_stack_lvl+0x88/0xb4 [ 106.669007] print_report+0x158/0x44c [ 106.669451] kasan_report+0xc8/0x180 [ 106.669904] __asan_load1+0x68/0x74 [ 106.670357] kasan_global_oob_right+0xa8/0x160 [ 106.670889] kunit_try_run_case+0x8c/0x124 [ 106.671388] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 106.671975] kthread+0x15c/0x170 [ 106.672392] ret_from_fork+0x10/0x20 [ 106.673186] [ 106.673458] The buggy address belongs to the variable: [ 106.673936] global_array+0xd/0x40 [ 106.674423] [ 106.674669] The buggy address ffffafe56d3e7e2d belongs to a vmalloc virtual mapping [ 106.675363] The buggy address belongs to the physical page: [ 106.675876] page:000000001ada928f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x469e7 [ 106.676976] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 106.677712] raw: 03fffc0000001000 fffffc00001a79c8 fffffc00001a79c8 0000000000000000 [ 106.678381] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 106.679047] page dumped because: kasan: bad access detected [ 106.679543] [ 106.679790] Memory state around the buggy address: [ 106.680279] ffffafe56d3e7d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.680949] ffffafe56d3e7d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 106.681918] >ffffafe56d3e7e00: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 [ 106.682527] ^ [ 106.682982] ffffafe56d3e7e80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 106.683623] ffffafe56d3e7f00: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 [ 106.684260] ==================================================================
[ 76.382577] ================================================================== [ 76.383528] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0 [ 76.384304] Read of size 1 at addr ffffa664876d15cd by task kunit_try_catch/152 [ 76.385199] [ 76.385513] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.386354] Hardware name: linux,dummy-virt (DT) [ 76.386876] Call trace: [ 76.387147] dump_backtrace+0xf8/0x118 [ 76.387709] show_stack+0x18/0x24 [ 76.388193] __dump_stack+0x28/0x38 [ 76.388743] dump_stack_lvl+0x54/0x6c [ 76.389199] print_address_description+0x7c/0x1ec [ 76.389819] print_report+0x50/0x68 [ 76.390324] kasan_report+0xac/0x100 [ 76.390817] __asan_load1+0x6c/0x70 [ 76.391292] kasan_global_oob_right+0x4c/0xf0 [ 76.391770] kunit_try_run_case+0x80/0x184 [ 76.392288] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.393360] kthread+0x16c/0x21c [ 76.393824] ret_from_fork+0x10/0x20 [ 76.394273] [ 76.394496] The buggy address belongs to the variable: [ 76.394973] global_array+0xd/0x20 [ 76.395386] [ 76.395612] The buggy address ffffa664876d15cd belongs to a vmalloc virtual mapping [ 76.396247] The buggy address belongs to the physical page: [ 76.396984] page:0000000092fb1506 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd1 [ 76.397773] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 76.398461] raw: 03fffc0000001000 fffffc00000f3448 fffffc00000f3448 0000000000000000 [ 76.399150] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 76.399776] page dumped because: kasan: bad access detected [ 76.400231] [ 76.400437] Memory state around the buggy address: [ 76.400903] ffffa664876d1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 [ 76.401528] ffffa664876d1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00 [ 76.402157] >ffffa664876d1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9 [ 76.402724] ^ [ 76.403716] ffffa664876d1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.404359] ffffa664876d1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.405265] ==================================================================
[ 75.437504] ================================================================== [ 75.438414] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0 [ 75.439140] Read of size 1 at addr ffffa980ac4c15cd by task kunit_try_catch/152 [ 75.439760] [ 75.440110] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.441380] Hardware name: linux,dummy-virt (DT) [ 75.441800] Call trace: [ 75.442217] dump_backtrace+0xf4/0x114 [ 75.442791] show_stack+0x18/0x24 [ 75.443304] __dump_stack+0x28/0x38 [ 75.443896] dump_stack_lvl+0x50/0x68 [ 75.444453] print_address_description+0x7c/0x1ec [ 75.445126] print_report+0x50/0x68 [ 75.445662] kasan_report+0xac/0xfc [ 75.446153] __asan_load1+0x6c/0x70 [ 75.446633] kasan_global_oob_right+0x4c/0xf0 [ 75.447522] kunit_try_run_case+0x80/0x184 [ 75.447978] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 75.448486] kthread+0x16c/0x21c [ 75.448977] ret_from_fork+0x10/0x20 [ 75.449422] [ 75.449697] The buggy address belongs to the variable: [ 75.450170] global_array+0xd/0x20 [ 75.450663] [ 75.450951] The buggy address ffffa980ac4c15cd belongs to a vmalloc virtual mapping [ 75.451571] The buggy address belongs to the physical page: [ 75.452193] page:0000000009454da2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cc1 [ 75.453890] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 75.454923] raw: 03fffc0000001000 fffffc00000f3048 fffffc00000f3048 0000000000000000 [ 75.455606] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.457023] page dumped because: kasan: bad access detected [ 75.457853] [ 75.458283] Memory state around the buggy address: [ 75.458982] ffffa980ac4c1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9 [ 75.459593] ffffa980ac4c1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00 [ 75.460770] >ffffa980ac4c1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9 [ 75.461391] ^ [ 75.461898] ffffa980ac4c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.462531] ffffa980ac4c1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.463141] ==================================================================
[ 74.011700] ================================================================== [ 74.012572] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150 [ 74.013283] Read of size 1 at addr ffffc778ac5a6eed by task kunit_try_catch/152 [ 74.014218] [ 74.014492] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 74.015250] Hardware name: linux,dummy-virt (DT) [ 74.015686] Call trace: [ 74.015962] dump_backtrace.part.0+0xdc/0xf0 [ 74.016471] show_stack+0x18/0x30 [ 74.016883] dump_stack_lvl+0x64/0x80 [ 74.017326] print_report+0x158/0x438 [ 74.018085] kasan_report+0xb4/0xf4 [ 74.018497] __asan_load1+0x68/0x74 [ 74.018887] kasan_global_oob_right+0xa0/0x150 [ 74.019350] kunit_try_run_case+0x84/0x120 [ 74.019812] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 74.020363] kthread+0x180/0x190 [ 74.020764] ret_from_fork+0x10/0x20 [ 74.021193] [ 74.021439] The buggy address belongs to the variable: [ 74.022182] global_array+0xd/0x40 [ 74.022651] [ 74.022899] The buggy address ffffc778ac5a6eed belongs to a vmalloc virtual mapping [ 74.023564] The buggy address belongs to the physical page: [ 74.024067] page:00000000841dc02e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x455a6 [ 74.024834] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 74.025567] raw: 03fffc0000001000 fffffc0000156988 fffffc0000156988 0000000000000000 [ 74.026335] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.027082] page dumped because: kasan: bad access detected [ 74.027956] [ 74.028136] Memory state around the buggy address: [ 74.028486] ffffc778ac5a6d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.028942] ffffc778ac5a6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.029497] >ffffc778ac5a6e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 [ 74.030557] ^ [ 74.031025] ffffc778ac5a6f00: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 [ 74.031709] ffffc778ac5a6f80: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 74.032252] ==================================================================
[ 65.514738] ================================================================== [ 65.515443] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xb8/0x168 [ 65.515973] Read of size 1 at addr ffffca3b08365e2d by task kunit_try_catch/150 [ 65.516639] [ 65.516910] CPU: 1 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 65.517842] Hardware name: linux,dummy-virt (DT) [ 65.518213] Call trace: [ 65.518462] dump_backtrace+0x110/0x120 [ 65.518883] show_stack+0x18/0x28 [ 65.519271] dump_stack_lvl+0x68/0x84 [ 65.519691] print_report+0x158/0x484 [ 65.520073] kasan_report+0x98/0xe0 [ 65.520456] __asan_load1+0x68/0x78 [ 65.520810] kasan_global_oob_right+0xb8/0x168 [ 65.521249] kunit_try_run_case+0x7c/0x120 [ 65.521662] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 65.522756] kthread+0x1a4/0x1b8 [ 65.523117] ret_from_fork+0x10/0x20 [ 65.523497] [ 65.523719] The buggy address belongs to the variable: [ 65.524082] global_array+0xd/0x40 [ 65.524632] [ 65.524831] The buggy address ffffca3b08365e2d belongs to a vmalloc virtual mapping [ 65.525388] The buggy address belongs to the physical page: [ 65.525794] page:000000007fbc8aa1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x45565 [ 65.526516] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff) [ 65.527145] raw: 03fffc0000001000 fffffc0000155948 fffffc0000155948 0000000000000000 [ 65.527744] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 65.528304] page dumped because: kasan: bad access detected [ 65.528719] [ 65.528886] Memory state around the buggy address: [ 65.529301] ffffca3b08365d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.530458] ffffca3b08365d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.530995] >ffffca3b08365e00: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 [ 65.531529] ^ [ 65.531913] ffffca3b08365e80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 [ 65.532468] ffffca3b08365f00: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 [ 65.532987] ==================================================================
[ 31.722885] ================================================================== [ 31.723471] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x9f/0x160 [ 31.724145] Read of size 1 at addr ffffffffb2dc372d by task kunit_try_catch/256 [ 31.724625] [ 31.724787] CPU: 1 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 31.725611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.726193] Call Trace: [ 31.726379] <TASK> [ 31.726751] dump_stack_lvl+0x49/0x62 [ 31.727100] print_report+0x189/0x492 [ 31.727554] ? kasan_addr_to_slab+0xd/0xb0 [ 31.727916] ? kasan_global_oob_right+0x9f/0x160 [ 31.728303] kasan_report+0x10c/0x190 [ 31.728753] ? kasan_global_oob_right+0x9f/0x160 [ 31.729189] __asan_load1+0x62/0x70 [ 31.729716] kasan_global_oob_right+0x9f/0x160 [ 31.729981] ? kasan_stack_oob+0x190/0x190 [ 31.730231] ? _raw_spin_unlock_irqrestore+0x2d/0x60 [ 31.730845] ? kasan_test_init+0x13e/0x1b0 [ 31.731101] kunit_try_run_case+0x8f/0xd0 [ 31.731369] ? kunit_catch_run_case+0x80/0x80 [ 31.731760] ? kunit_try_catch_throw+0x40/0x40 [ 31.731997] kunit_generic_run_threadfn_adapter+0x2f/0x50 [ 31.732318] kthread+0x17b/0x1b0 [ 31.732544] ? kthread_complete_and_exit+0x30/0x30 [ 31.732894] ret_from_fork+0x22/0x30 [ 31.733100] </TASK> [ 31.733266] [ 31.733413] The buggy address belongs to the variable: [ 31.733966] global_array+0xd/0x40 [ 31.734210] [ 31.734341] The buggy address belongs to the physical page: [ 31.734771] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10dc3 [ 31.735237] flags: 0x100000000001000(reserved|node=0|zone=1) [ 31.735741] raw: 0100000000001000 ffffea00004370c8 ffffea00004370c8 0000000000000000 [ 31.736180] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.736748] page dumped because: kasan: bad access detected [ 31.737056] [ 31.737171] Memory state around the buggy address: [ 31.737568] ffffffffb2dc3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.737890] ffffffffb2dc3680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.738245] >ffffffffb2dc3700: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 [ 31.738563] ^ [ 31.739019] ffffffffb2dc3780: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 [ 31.739422] ffffffffb2dc3800: 00 00 00 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 31.739868] ==================================================================