Date
July 8, 2025, 11:10 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 34.212424] ================================================================== [ 34.212500] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 34.213232] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 34.213361] [ 34.213402] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.213493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.213562] Hardware name: linux,dummy-virt (DT) [ 34.213626] Call trace: [ 34.213935] show_stack+0x20/0x38 (C) [ 34.213995] dump_stack_lvl+0x8c/0xd0 [ 34.214045] print_report+0x310/0x5d0 [ 34.214096] kasan_report+0xdc/0x128 [ 34.214144] __asan_report_load1_noabort+0x20/0x30 [ 34.214599] vmalloc_oob+0x578/0x5d0 [ 34.215038] kunit_try_run_case+0x170/0x3f0 [ 34.215480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.215717] kthread+0x328/0x630 [ 34.215926] ret_from_fork+0x10/0x20 [ 34.215982] [ 34.216305] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 34.216518] The buggy address belongs to the physical page: [ 34.216654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9 [ 34.216847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.217159] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.217241] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.217689] page dumped because: kasan: bad access detected [ 34.218112] [ 34.218139] Memory state around the buggy address: [ 34.218197] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.218397] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.218753] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 34.218965] ^ [ 34.219270] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.219458] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.219744] ================================================================== [ 34.222202] ================================================================== [ 34.222271] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 34.222322] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 34.222373] [ 34.222404] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.222490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.222520] Hardware name: linux,dummy-virt (DT) [ 34.223166] Call trace: [ 34.223255] show_stack+0x20/0x38 (C) [ 34.223311] dump_stack_lvl+0x8c/0xd0 [ 34.223656] print_report+0x310/0x5d0 [ 34.224089] kasan_report+0xdc/0x128 [ 34.224342] __asan_report_load1_noabort+0x20/0x30 [ 34.224395] vmalloc_oob+0x51c/0x5d0 [ 34.224441] kunit_try_run_case+0x170/0x3f0 [ 34.224491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.224960] kthread+0x328/0x630 [ 34.225079] ret_from_fork+0x10/0x20 [ 34.225530] [ 34.225601] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 34.225678] The buggy address belongs to the physical page: [ 34.225726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9 [ 34.225781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.226135] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.226436] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.226775] page dumped because: kasan: bad access detected [ 34.226955] [ 34.226978] Memory state around the buggy address: [ 34.227272] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.227405] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.227688] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 34.227942] ^ [ 34.228415] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.228486] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.228712] ==================================================================