Date
July 18, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 18.473612] ================================================================== [ 18.473940] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.474020] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 18.474074] [ 18.474113] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.474678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.475043] Hardware name: linux,dummy-virt (DT) [ 18.475093] Call trace: [ 18.475150] show_stack+0x20/0x38 (C) [ 18.475241] dump_stack_lvl+0x8c/0xd0 [ 18.475366] print_report+0x310/0x5d0 [ 18.475469] kasan_report+0xdc/0x128 [ 18.475547] __asan_report_load1_noabort+0x20/0x30 [ 18.475659] vmalloc_oob+0x578/0x5d0 [ 18.475850] kunit_try_run_case+0x170/0x3f0 [ 18.476200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.476275] kthread+0x328/0x630 [ 18.476570] ret_from_fork+0x10/0x20 [ 18.476735] [ 18.476803] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 18.477227] The buggy address belongs to the physical page: [ 18.477348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c5a8b000 pfn:0x105a8b [ 18.477428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.477845] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.477953] raw: fff00000c5a8b000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.478017] page dumped because: kasan: bad access detected [ 18.478310] [ 18.478445] Memory state around the buggy address: [ 18.478515] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.478566] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.478928] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.479157] ^ [ 18.479292] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.479400] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.479487] ================================================================== [ 18.481118] ================================================================== [ 18.481172] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.481396] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 18.481556] [ 18.481681] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.481788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.481816] Hardware name: linux,dummy-virt (DT) [ 18.481848] Call trace: [ 18.481872] show_stack+0x20/0x38 (C) [ 18.482092] dump_stack_lvl+0x8c/0xd0 [ 18.482642] print_report+0x310/0x5d0 [ 18.482724] kasan_report+0xdc/0x128 [ 18.482869] __asan_report_load1_noabort+0x20/0x30 [ 18.482973] vmalloc_oob+0x51c/0x5d0 [ 18.483397] kunit_try_run_case+0x170/0x3f0 [ 18.483499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.483580] kthread+0x328/0x630 [ 18.483714] ret_from_fork+0x10/0x20 [ 18.483869] [ 18.483923] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 18.483970] The buggy address belongs to the physical page: [ 18.484156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c5a8b000 pfn:0x105a8b [ 18.484249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.484640] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.484765] raw: fff00000c5a8b000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.484811] page dumped because: kasan: bad access detected [ 18.484846] [ 18.484867] Memory state around the buggy address: [ 18.484903] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.484956] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.485038] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.485090] ^ [ 18.485142] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.485189] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.485237] ==================================================================