Date
July 12, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 19.514187] ================================================================== [ 19.514292] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 19.514350] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 19.514864] [ 19.514904] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.515477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.515510] Hardware name: linux,dummy-virt (DT) [ 19.515569] Call trace: [ 19.515594] show_stack+0x20/0x38 (C) [ 19.515795] dump_stack_lvl+0x8c/0xd0 [ 19.515987] print_report+0x310/0x5d0 [ 19.516492] kasan_report+0xdc/0x128 [ 19.516584] __asan_report_load1_noabort+0x20/0x30 [ 19.516860] vmalloc_oob+0x578/0x5d0 [ 19.516912] kunit_try_run_case+0x170/0x3f0 [ 19.517058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.517116] kthread+0x328/0x630 [ 19.517495] ret_from_fork+0x10/0x20 [ 19.517820] [ 19.517847] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 19.517898] The buggy address belongs to the physical page: [ 19.518101] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595b [ 19.518165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.518505] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.518564] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.518615] page dumped because: kasan: bad access detected [ 19.518797] [ 19.518892] Memory state around the buggy address: [ 19.518934] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.519004] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.519114] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.519156] ^ [ 19.519266] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.519313] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.519377] ================================================================== [ 19.520380] ================================================================== [ 19.520432] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 19.520482] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 19.520533] [ 19.520565] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.520652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.521191] Hardware name: linux,dummy-virt (DT) [ 19.521438] Call trace: [ 19.521580] show_stack+0x20/0x38 (C) [ 19.521633] dump_stack_lvl+0x8c/0xd0 [ 19.522297] print_report+0x310/0x5d0 [ 19.522533] kasan_report+0xdc/0x128 [ 19.522610] __asan_report_load1_noabort+0x20/0x30 [ 19.522720] vmalloc_oob+0x51c/0x5d0 [ 19.522795] kunit_try_run_case+0x170/0x3f0 [ 19.522849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.523012] kthread+0x328/0x630 [ 19.523061] ret_from_fork+0x10/0x20 [ 19.523508] [ 19.523615] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 19.523691] The buggy address belongs to the physical page: [ 19.524060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10595b [ 19.524208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.524565] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.524622] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.525020] page dumped because: kasan: bad access detected [ 19.525067] [ 19.525373] Memory state around the buggy address: [ 19.525622] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.525735] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.525781] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.526106] ^ [ 19.526154] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.526211] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.526254] ==================================================================