Date
July 9, 2025, 1:08 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 32.434732] ================================================================== [ 32.435084] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 32.435313] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/301 [ 32.435382] [ 32.435453] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.435923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.436028] Hardware name: linux,dummy-virt (DT) [ 32.436315] Call trace: [ 32.436384] show_stack+0x20/0x38 (C) [ 32.436534] dump_stack_lvl+0x8c/0xd0 [ 32.436664] print_report+0x310/0x5d0 [ 32.436739] kasan_report+0xdc/0x128 [ 32.436787] __asan_report_load1_noabort+0x20/0x30 [ 32.436984] vmalloc_oob+0x578/0x5d0 [ 32.437230] kunit_try_run_case+0x170/0x3f0 [ 32.437364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.437752] kthread+0x328/0x630 [ 32.437811] ret_from_fork+0x10/0x20 [ 32.438162] [ 32.438216] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 32.438384] The buggy address belongs to the physical page: [ 32.438686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092f5 [ 32.438883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.438967] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.439041] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.439108] page dumped because: kasan: bad access detected [ 32.439145] [ 32.439165] Memory state around the buggy address: [ 32.439201] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.439261] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.439308] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.439349] ^ [ 32.439402] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.439455] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.439497] ================================================================== [ 32.440876] ================================================================== [ 32.440937] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 32.440989] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/301 [ 32.441117] [ 32.441152] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250709 #1 PREEMPT [ 32.441398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.441578] Hardware name: linux,dummy-virt (DT) [ 32.441660] Call trace: [ 32.441699] show_stack+0x20/0x38 (C) [ 32.441837] dump_stack_lvl+0x8c/0xd0 [ 32.441897] print_report+0x310/0x5d0 [ 32.441942] kasan_report+0xdc/0x128 [ 32.442087] __asan_report_load1_noabort+0x20/0x30 [ 32.442141] vmalloc_oob+0x51c/0x5d0 [ 32.442189] kunit_try_run_case+0x170/0x3f0 [ 32.442239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.442306] kthread+0x328/0x630 [ 32.442349] ret_from_fork+0x10/0x20 [ 32.442426] [ 32.442812] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 32.442961] The buggy address belongs to the physical page: [ 32.443017] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092f5 [ 32.443089] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.443153] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.443205] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.443671] page dumped because: kasan: bad access detected [ 32.443729] [ 32.443915] Memory state around the buggy address: [ 32.444035] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.444276] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.444497] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.444706] ^ [ 32.444772] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.445005] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.445184] ==================================================================