Date
July 19, 2025, 11:11 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 18.364788] ================================================================== [ 18.365431] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.365571] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270 [ 18.365630] [ 18.365668] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.366100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.366136] Hardware name: linux,dummy-virt (DT) [ 18.366193] Call trace: [ 18.366495] show_stack+0x20/0x38 (C) [ 18.366659] dump_stack_lvl+0x8c/0xd0 [ 18.367048] print_report+0x310/0x5d0 [ 18.367217] kasan_report+0xdc/0x128 [ 18.367378] __asan_report_load1_noabort+0x20/0x30 [ 18.367439] vmalloc_oob+0x578/0x5d0 [ 18.367659] kunit_try_run_case+0x170/0x3f0 [ 18.367842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.367982] kthread+0x328/0x630 [ 18.368041] ret_from_fork+0x10/0x20 [ 18.368091] [ 18.368133] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 18.368180] The buggy address belongs to the physical page: [ 18.368223] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639b [ 18.368279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.368344] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.368396] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.368440] page dumped because: kasan: bad access detected [ 18.368499] [ 18.368520] Memory state around the buggy address: [ 18.368590] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.368664] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.368735] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.368786] ^ [ 18.368888] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.368944] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.368986] ================================================================== [ 18.370162] ================================================================== [ 18.370271] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.370366] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270 [ 18.370709] [ 18.370831] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.371157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.371602] Hardware name: linux,dummy-virt (DT) [ 18.371649] Call trace: [ 18.371674] show_stack+0x20/0x38 (C) [ 18.372070] dump_stack_lvl+0x8c/0xd0 [ 18.372410] print_report+0x310/0x5d0 [ 18.372652] kasan_report+0xdc/0x128 [ 18.372739] __asan_report_load1_noabort+0x20/0x30 [ 18.373025] vmalloc_oob+0x51c/0x5d0 [ 18.373226] kunit_try_run_case+0x170/0x3f0 [ 18.373399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.373515] kthread+0x328/0x630 [ 18.373826] ret_from_fork+0x10/0x20 [ 18.374274] [ 18.374310] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 18.374367] The buggy address belongs to the physical page: [ 18.374399] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10639b [ 18.374462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.375055] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.375250] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.375368] page dumped because: kasan: bad access detected [ 18.375571] [ 18.375630] Memory state around the buggy address: [ 18.375860] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.376062] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.376312] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.376494] ^ [ 18.376634] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.376719] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.376863] ==================================================================