Hay
Date
July 4, 2025, 11:10 a.m.

Environment
qemu-arm64

[   32.606531] ==================================================================
[   32.606583] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   32.606633] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/302
[   32.606685] 
[   32.606715] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.606801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.606830] Hardware name: linux,dummy-virt (DT)
[   32.606863] Call trace:
[   32.606914]  show_stack+0x20/0x38 (C)
[   32.606965]  dump_stack_lvl+0x8c/0xd0
[   32.607022]  print_report+0x310/0x608
[   32.607070]  kasan_report+0xdc/0x128
[   32.607118]  __asan_report_load1_noabort+0x20/0x30
[   32.607166]  vmalloc_oob+0x51c/0x5d0
[   32.607213]  kunit_try_run_case+0x170/0x3f0
[   32.607264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.607317]  kthread+0x328/0x630
[   32.607361]  ret_from_fork+0x10/0x20
[   32.607409] 
[   32.607436] The buggy address belongs to the virtual mapping at
[   32.607436]  [ffff8000800fe000, ffff800080100000) created by:
[   32.607436]  vmalloc_oob+0x98/0x5d0
[   32.607509] 
[   32.607555] The buggy address belongs to the physical page:
[   32.607587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109afb
[   32.607649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.607720] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.607780] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.607824] page dumped because: kasan: bad access detected
[   32.607859] 
[   32.607880] Memory state around the buggy address:
[   32.607925]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.608961]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.609034] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   32.609076]                                                                 ^
[   32.609120]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.609166]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.609209] ==================================================================
[   32.600373] ==================================================================
[   32.600493] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   32.600580] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/302
[   32.600678] 
[   32.600731] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250704 #1 PREEMPT 
[   32.600982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.601120] Hardware name: linux,dummy-virt (DT)
[   32.601198] Call trace:
[   32.601279]  show_stack+0x20/0x38 (C)
[   32.601339]  dump_stack_lvl+0x8c/0xd0
[   32.601386]  print_report+0x310/0x608
[   32.601435]  kasan_report+0xdc/0x128
[   32.601486]  __asan_report_load1_noabort+0x20/0x30
[   32.601535]  vmalloc_oob+0x578/0x5d0
[   32.601582]  kunit_try_run_case+0x170/0x3f0
[   32.601633]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.601690]  kthread+0x328/0x630
[   32.602101]  ret_from_fork+0x10/0x20
[   32.602168] 
[   32.602503] The buggy address belongs to the virtual mapping at
[   32.602503]  [ffff8000800fe000, ffff800080100000) created by:
[   32.602503]  vmalloc_oob+0x98/0x5d0
[   32.602655] 
[   32.602703] The buggy address belongs to the physical page:
[   32.602760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109afb
[   32.603052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.603579] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   32.603643] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   32.603689] page dumped because: kasan: bad access detected
[   32.604039] 
[   32.604102] Memory state around the buggy address:
[   32.604483]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.604580]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.604634] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   32.604969]                                                              ^
[   32.605190]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.605303]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   32.605704] ==================================================================