Date
July 10, 2025, 9:07 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 32.429638] ================================================================== [ 32.430265] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 32.430330] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 32.430384] [ 32.430423] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.430521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.430660] Hardware name: linux,dummy-virt (DT) [ 32.430808] Call trace: [ 32.430937] show_stack+0x20/0x38 (C) [ 32.431022] dump_stack_lvl+0x8c/0xd0 [ 32.431076] print_report+0x310/0x5d0 [ 32.431122] kasan_report+0xdc/0x128 [ 32.431175] __asan_report_load1_noabort+0x20/0x30 [ 32.431225] vmalloc_oob+0x578/0x5d0 [ 32.431271] kunit_try_run_case+0x170/0x3f0 [ 32.431717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.431779] kthread+0x328/0x630 [ 32.431825] ret_from_fork+0x10/0x20 [ 32.432312] [ 32.432730] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 32.432863] The buggy address belongs to the physical page: [ 32.432901] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b09 [ 32.433018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.433289] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.433610] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.433919] page dumped because: kasan: bad access detected [ 32.434066] [ 32.434101] Memory state around the buggy address: [ 32.434152] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.434200] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.434246] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.434289] ^ [ 32.434359] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.434693] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.435114] ================================================================== [ 32.436366] ================================================================== [ 32.436451] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 32.436500] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 32.436561] [ 32.436714] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.436920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.436950] Hardware name: linux,dummy-virt (DT) [ 32.436991] Call trace: [ 32.437101] show_stack+0x20/0x38 (C) [ 32.437333] dump_stack_lvl+0x8c/0xd0 [ 32.437694] print_report+0x310/0x5d0 [ 32.437967] kasan_report+0xdc/0x128 [ 32.438065] __asan_report_load1_noabort+0x20/0x30 [ 32.438330] vmalloc_oob+0x51c/0x5d0 [ 32.438521] kunit_try_run_case+0x170/0x3f0 [ 32.438795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.439030] kthread+0x328/0x630 [ 32.439075] ret_from_fork+0x10/0x20 [ 32.439181] [ 32.439220] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 32.439266] The buggy address belongs to the physical page: [ 32.439321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b09 [ 32.439375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.439587] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.439749] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.439794] page dumped because: kasan: bad access detected [ 32.439840] [ 32.439860] Memory state around the buggy address: [ 32.439896] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.440170] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.440219] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.440527] ^ [ 32.440741] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.441007] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.441054] ==================================================================