Date
July 17, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 18.486907] ================================================================== [ 18.486996] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.487052] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270 [ 18.487104] [ 18.487140] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.487223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.487251] Hardware name: linux,dummy-virt (DT) [ 18.487284] Call trace: [ 18.487307] show_stack+0x20/0x38 (C) [ 18.487358] dump_stack_lvl+0x8c/0xd0 [ 18.487407] print_report+0x310/0x5d0 [ 18.487459] kasan_report+0xdc/0x128 [ 18.487506] __asan_report_load1_noabort+0x20/0x30 [ 18.487556] vmalloc_oob+0x578/0x5d0 [ 18.487601] kunit_try_run_case+0x170/0x3f0 [ 18.487649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.487703] kthread+0x328/0x630 [ 18.487761] ret_from_fork+0x10/0x20 [ 18.487810] [ 18.487834] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 18.487879] The buggy address belongs to the physical page: [ 18.487910] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079da [ 18.487965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.488036] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.488090] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.488132] page dumped because: kasan: bad access detected [ 18.488166] [ 18.488185] Memory state around the buggy address: [ 18.488219] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.488277] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.488437] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.488480] ^ [ 18.488624] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.488688] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.488820] ================================================================== [ 18.489170] ================================================================== [ 18.489218] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.489266] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270 [ 18.489317] [ 18.489346] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.489428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.489458] Hardware name: linux,dummy-virt (DT) [ 18.489490] Call trace: [ 18.489513] show_stack+0x20/0x38 (C) [ 18.489559] dump_stack_lvl+0x8c/0xd0 [ 18.489605] print_report+0x310/0x5d0 [ 18.489693] kasan_report+0xdc/0x128 [ 18.489739] __asan_report_load1_noabort+0x20/0x30 [ 18.489867] vmalloc_oob+0x51c/0x5d0 [ 18.490255] kunit_try_run_case+0x170/0x3f0 [ 18.490471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.490691] kthread+0x328/0x630 [ 18.490740] ret_from_fork+0x10/0x20 [ 18.491016] [ 18.491040] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 18.491085] The buggy address belongs to the physical page: [ 18.491117] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079da [ 18.491170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.491231] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.491289] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.491495] page dumped because: kasan: bad access detected [ 18.491663] [ 18.491762] Memory state around the buggy address: [ 18.491930] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.492025] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.492070] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.492110] ^ [ 18.492153] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.492197] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.492238] ==================================================================