Date
July 17, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 19.421835] ================================================================== [ 19.421909] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 19.422146] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 19.422222] [ 19.422256] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.422367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.422405] Hardware name: linux,dummy-virt (DT) [ 19.422453] Call trace: [ 19.422492] show_stack+0x20/0x38 (C) [ 19.422580] dump_stack_lvl+0x8c/0xd0 [ 19.422630] print_report+0x310/0x5d0 [ 19.422676] kasan_report+0xdc/0x128 [ 19.423017] __asan_report_load1_noabort+0x20/0x30 [ 19.423108] vmalloc_oob+0x51c/0x5d0 [ 19.423174] kunit_try_run_case+0x170/0x3f0 [ 19.423306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.423400] kthread+0x328/0x630 [ 19.423443] ret_from_fork+0x10/0x20 [ 19.423493] [ 19.423516] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 19.423686] The buggy address belongs to the physical page: [ 19.423720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ff [ 19.424609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.424780] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.424856] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.424925] page dumped because: kasan: bad access detected [ 19.425058] [ 19.425130] Memory state around the buggy address: [ 19.425193] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.425247] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.425291] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.425331] ^ [ 19.425373] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.425417] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.425753] ================================================================== [ 19.418408] ================================================================== [ 19.418480] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 19.418546] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 19.418598] [ 19.418635] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.418718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.418758] Hardware name: linux,dummy-virt (DT) [ 19.418815] Call trace: [ 19.418840] show_stack+0x20/0x38 (C) [ 19.418905] dump_stack_lvl+0x8c/0xd0 [ 19.418955] print_report+0x310/0x5d0 [ 19.419003] kasan_report+0xdc/0x128 [ 19.419048] __asan_report_load1_noabort+0x20/0x30 [ 19.419100] vmalloc_oob+0x578/0x5d0 [ 19.419143] kunit_try_run_case+0x170/0x3f0 [ 19.419193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.419255] kthread+0x328/0x630 [ 19.419299] ret_from_fork+0x10/0x20 [ 19.419346] [ 19.419555] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 19.419606] The buggy address belongs to the physical page: [ 19.419953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ff [ 19.420109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.420275] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.420363] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.420746] page dumped because: kasan: bad access detected [ 19.420834] [ 19.420899] Memory state around the buggy address: [ 19.420936] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.420993] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.421059] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.421192] ^ [ 19.421253] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.421308] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.421351] ==================================================================