Date
July 19, 2025, 11:12 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 18.063437] ================================================================== [ 18.063529] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.063589] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 18.063661] [ 18.063711] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.063807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.063871] Hardware name: linux,dummy-virt (DT) [ 18.063906] Call trace: [ 18.063933] show_stack+0x20/0x38 (C) [ 18.064172] dump_stack_lvl+0x8c/0xd0 [ 18.064225] print_report+0x310/0x5d0 [ 18.064662] kasan_report+0xdc/0x128 [ 18.064960] __asan_report_load1_noabort+0x20/0x30 [ 18.065214] vmalloc_oob+0x578/0x5d0 [ 18.065280] kunit_try_run_case+0x170/0x3f0 [ 18.065365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.065434] kthread+0x328/0x630 [ 18.065503] ret_from_fork+0x10/0x20 [ 18.065560] [ 18.065586] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 18.065636] The buggy address belongs to the physical page: [ 18.065677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790b [ 18.065755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.065830] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.065884] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.065936] page dumped because: kasan: bad access detected [ 18.065981] [ 18.066009] Memory state around the buggy address: [ 18.066060] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.066116] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.066161] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.066202] ^ [ 18.066257] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.066312] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.066354] ================================================================== [ 18.068073] ================================================================== [ 18.068317] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.068374] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 18.068501] [ 18.068558] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.068718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.068977] Hardware name: linux,dummy-virt (DT) [ 18.069055] Call trace: [ 18.069224] show_stack+0x20/0x38 (C) [ 18.069310] dump_stack_lvl+0x8c/0xd0 [ 18.069477] print_report+0x310/0x5d0 [ 18.069709] kasan_report+0xdc/0x128 [ 18.070043] __asan_report_load1_noabort+0x20/0x30 [ 18.070260] vmalloc_oob+0x51c/0x5d0 [ 18.070416] kunit_try_run_case+0x170/0x3f0 [ 18.070559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.070761] kthread+0x328/0x630 [ 18.070876] ret_from_fork+0x10/0x20 [ 18.071041] [ 18.071170] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 18.071289] The buggy address belongs to the physical page: [ 18.071357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790b [ 18.071471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.071539] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.071926] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.072274] page dumped because: kasan: bad access detected [ 18.072418] [ 18.072533] Memory state around the buggy address: [ 18.072593] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.072736] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.072841] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.072952] ^ [ 18.072999] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.073073] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.073115] ==================================================================