Date
July 20, 2025, 11:12 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 18.477238] ================================================================== [ 18.477290] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.478053] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 18.478380] [ 18.478445] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.478536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.478566] Hardware name: linux,dummy-virt (DT) [ 18.478751] Call trace: [ 18.478941] show_stack+0x20/0x38 (C) [ 18.479145] dump_stack_lvl+0x8c/0xd0 [ 18.479217] print_report+0x310/0x5d0 [ 18.479759] kasan_report+0xdc/0x128 [ 18.480011] __asan_report_load1_noabort+0x20/0x30 [ 18.480232] vmalloc_oob+0x51c/0x5d0 [ 18.480408] kunit_try_run_case+0x170/0x3f0 [ 18.480628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.480895] kthread+0x328/0x630 [ 18.481025] ret_from_fork+0x10/0x20 [ 18.481159] [ 18.481425] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 18.481643] The buggy address belongs to the physical page: [ 18.481903] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 18.482171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.482503] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.482704] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.482804] page dumped because: kasan: bad access detected [ 18.482861] [ 18.482882] Memory state around the buggy address: [ 18.483081] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.483298] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.483352] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.483570] ^ [ 18.483791] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.483851] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.484182] ================================================================== [ 18.469402] ================================================================== [ 18.469494] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.469822] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 18.470106] [ 18.470149] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.470462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.470856] Hardware name: linux,dummy-virt (DT) [ 18.470908] Call trace: [ 18.470935] show_stack+0x20/0x38 (C) [ 18.471138] dump_stack_lvl+0x8c/0xd0 [ 18.471472] print_report+0x310/0x5d0 [ 18.471535] kasan_report+0xdc/0x128 [ 18.471593] __asan_report_load1_noabort+0x20/0x30 [ 18.471906] vmalloc_oob+0x578/0x5d0 [ 18.472262] kunit_try_run_case+0x170/0x3f0 [ 18.472575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.472747] kthread+0x328/0x630 [ 18.472795] ret_from_fork+0x10/0x20 [ 18.473024] [ 18.473280] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 18.473371] The buggy address belongs to the physical page: [ 18.473407] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c2 [ 18.473836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.473912] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.474347] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.474475] page dumped because: kasan: bad access detected [ 18.474560] [ 18.474780] Memory state around the buggy address: [ 18.475019] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.475143] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.475348] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.475716] ^ [ 18.475807] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.475859] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.476081] ==================================================================