Date
July 13, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 18.810436] ================================================================== [ 18.810795] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.810902] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270 [ 18.810987] [ 18.811040] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.811484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.811538] Hardware name: linux,dummy-virt (DT) [ 18.811576] Call trace: [ 18.811610] show_stack+0x20/0x38 (C) [ 18.811853] dump_stack_lvl+0x8c/0xd0 [ 18.812036] print_report+0x310/0x5d0 [ 18.812097] kasan_report+0xdc/0x128 [ 18.812412] __asan_report_load1_noabort+0x20/0x30 [ 18.812647] vmalloc_oob+0x578/0x5d0 [ 18.812904] kunit_try_run_case+0x170/0x3f0 [ 18.813069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.813139] kthread+0x328/0x630 [ 18.813246] ret_from_fork+0x10/0x20 [ 18.813422] [ 18.813623] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 18.813898] The buggy address belongs to the physical page: [ 18.814163] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cf [ 18.814636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.814804] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.814876] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.814948] page dumped because: kasan: bad access detected [ 18.815113] [ 18.815193] Memory state around the buggy address: [ 18.815258] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.815407] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.815466] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.815516] ^ [ 18.815581] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.815632] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.815684] ================================================================== [ 18.816374] ================================================================== [ 18.816428] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.816495] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270 [ 18.816554] [ 18.816586] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.816670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.816710] Hardware name: linux,dummy-virt (DT) [ 18.816743] Call trace: [ 18.816766] show_stack+0x20/0x38 (C) [ 18.816813] dump_stack_lvl+0x8c/0xd0 [ 18.816867] print_report+0x310/0x5d0 [ 18.816913] kasan_report+0xdc/0x128 [ 18.816958] __asan_report_load1_noabort+0x20/0x30 [ 18.817011] vmalloc_oob+0x51c/0x5d0 [ 18.817064] kunit_try_run_case+0x170/0x3f0 [ 18.817121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.817176] kthread+0x328/0x630 [ 18.817243] ret_from_fork+0x10/0x20 [ 18.817820] [ 18.818258] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 18.818364] The buggy address belongs to the physical page: [ 18.818423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cf [ 18.818772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.819005] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.819485] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.819557] page dumped because: kasan: bad access detected [ 18.819930] [ 18.820034] Memory state around the buggy address: [ 18.820114] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.820259] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.820331] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.820372] ^ [ 18.820417] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.820665] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.820981] ==================================================================
[ 19.566887] ================================================================== [ 19.566959] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 19.567061] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270 [ 19.567115] [ 19.567154] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.567300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.567334] Hardware name: linux,dummy-virt (DT) [ 19.567369] Call trace: [ 19.568281] show_stack+0x20/0x38 (C) [ 19.568380] dump_stack_lvl+0x8c/0xd0 [ 19.568452] print_report+0x310/0x5d0 [ 19.568541] kasan_report+0xdc/0x128 [ 19.568625] __asan_report_load1_noabort+0x20/0x30 [ 19.568696] vmalloc_oob+0x578/0x5d0 [ 19.568966] kunit_try_run_case+0x170/0x3f0 [ 19.569208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.569321] kthread+0x328/0x630 [ 19.569368] ret_from_fork+0x10/0x20 [ 19.569726] [ 19.569799] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 19.569903] The buggy address belongs to the physical page: [ 19.569940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae9 [ 19.570278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.570470] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.570544] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.570606] page dumped because: kasan: bad access detected [ 19.570901] [ 19.570990] Memory state around the buggy address: [ 19.571083] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.571168] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.571293] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.571358] ^ [ 19.571540] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.571733] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.571859] ================================================================== [ 19.573523] ================================================================== [ 19.573587] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 19.573858] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270 [ 19.574882] [ 19.574936] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.575089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.575342] Hardware name: linux,dummy-virt (DT) [ 19.575375] Call trace: [ 19.575398] show_stack+0x20/0x38 (C) [ 19.575450] dump_stack_lvl+0x8c/0xd0 [ 19.575496] print_report+0x310/0x5d0 [ 19.575543] kasan_report+0xdc/0x128 [ 19.576316] __asan_report_load1_noabort+0x20/0x30 [ 19.576553] vmalloc_oob+0x51c/0x5d0 [ 19.576599] kunit_try_run_case+0x170/0x3f0 [ 19.576649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.577198] kthread+0x328/0x630 [ 19.577654] ret_from_fork+0x10/0x20 [ 19.578153] [ 19.578424] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 19.578564] The buggy address belongs to the physical page: [ 19.578864] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae9 [ 19.579074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.579139] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.580060] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.580117] page dumped because: kasan: bad access detected [ 19.580215] [ 19.580338] Memory state around the buggy address: [ 19.580518] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.580867] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.581285] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.581680] ^ [ 19.581768] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.581971] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.582534] ==================================================================