Date
July 16, 2025, 12:11 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 33.569838] ================================================================== [ 33.569921] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 33.569979] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 33.570032] [ 33.570105] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.570290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.570328] Hardware name: linux,dummy-virt (DT) [ 33.570373] Call trace: [ 33.570632] show_stack+0x20/0x38 (C) [ 33.570718] dump_stack_lvl+0x8c/0xd0 [ 33.570771] print_report+0x310/0x5d0 [ 33.570816] kasan_report+0xdc/0x128 [ 33.570880] __asan_report_load1_noabort+0x20/0x30 [ 33.570933] vmalloc_oob+0x578/0x5d0 [ 33.571009] kunit_try_run_case+0x170/0x3f0 [ 33.571106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.571163] kthread+0x328/0x630 [ 33.571208] ret_from_fork+0x10/0x20 [ 33.571257] [ 33.571280] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 33.571339] The buggy address belongs to the physical page: [ 33.571374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c51 [ 33.571429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.571494] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.571560] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.571607] page dumped because: kasan: bad access detected [ 33.571643] [ 33.571663] Memory state around the buggy address: [ 33.571700] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.571747] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.571793] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.571836] ^ [ 33.571878] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.572119] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.572203] ================================================================== [ 33.572967] ================================================================== [ 33.573053] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 33.573105] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 33.573170] [ 33.573396] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250716 #1 PREEMPT [ 33.573524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.573592] Hardware name: linux,dummy-virt (DT) [ 33.573648] Call trace: [ 33.573678] show_stack+0x20/0x38 (C) [ 33.573730] dump_stack_lvl+0x8c/0xd0 [ 33.573795] print_report+0x310/0x5d0 [ 33.573861] kasan_report+0xdc/0x128 [ 33.573905] __asan_report_load1_noabort+0x20/0x30 [ 33.573968] vmalloc_oob+0x51c/0x5d0 [ 33.574035] kunit_try_run_case+0x170/0x3f0 [ 33.574100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.574183] kthread+0x328/0x630 [ 33.574227] ret_from_fork+0x10/0x20 [ 33.574283] [ 33.574305] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 33.574348] The buggy address belongs to the physical page: [ 33.574387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c51 [ 33.574440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.574583] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.574642] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.574815] page dumped because: kasan: bad access detected [ 33.574859] [ 33.574899] Memory state around the buggy address: [ 33.574960] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.575089] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.575211] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.575265] ^ [ 33.575353] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.575428] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.575471] ==================================================================