Date
July 15, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 18.668126] ================================================================== [ 18.668213] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.668271] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270 [ 18.668325] [ 18.668359] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.668466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.668632] Hardware name: linux,dummy-virt (DT) [ 18.668825] Call trace: [ 18.668950] show_stack+0x20/0x38 (C) [ 18.669045] dump_stack_lvl+0x8c/0xd0 [ 18.669092] print_report+0x310/0x5d0 [ 18.669140] kasan_report+0xdc/0x128 [ 18.669195] __asan_report_load1_noabort+0x20/0x30 [ 18.669453] vmalloc_oob+0x578/0x5d0 [ 18.669526] kunit_try_run_case+0x170/0x3f0 [ 18.669702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.669825] kthread+0x328/0x630 [ 18.669939] ret_from_fork+0x10/0x20 [ 18.670029] [ 18.670085] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 18.670270] The buggy address belongs to the physical page: [ 18.670411] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106efa [ 18.670485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.670566] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.670621] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.670664] page dumped because: kasan: bad access detected [ 18.670697] [ 18.670719] Memory state around the buggy address: [ 18.670764] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.671084] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.671384] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.671720] ^ [ 18.671835] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.671881] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.671924] ================================================================== [ 18.673363] ================================================================== [ 18.673417] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.673465] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270 [ 18.673535] [ 18.673686] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.673836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.673872] Hardware name: linux,dummy-virt (DT) [ 18.674118] Call trace: [ 18.674266] show_stack+0x20/0x38 (C) [ 18.674416] dump_stack_lvl+0x8c/0xd0 [ 18.674467] print_report+0x310/0x5d0 [ 18.674519] kasan_report+0xdc/0x128 [ 18.674745] __asan_report_load1_noabort+0x20/0x30 [ 18.674878] vmalloc_oob+0x51c/0x5d0 [ 18.675037] kunit_try_run_case+0x170/0x3f0 [ 18.675113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.675503] kthread+0x328/0x630 [ 18.675711] ret_from_fork+0x10/0x20 [ 18.675762] [ 18.675786] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 18.675831] The buggy address belongs to the physical page: [ 18.676115] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106efa [ 18.676191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.676253] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.676305] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.676347] page dumped because: kasan: bad access detected [ 18.676381] [ 18.676409] Memory state around the buggy address: [ 18.676444] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.676495] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.676660] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.676825] ^ [ 18.677048] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.677229] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.677390] ==================================================================