Date
July 17, 2025, 10:12 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 32.368231] ================================================================== [ 32.368279] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 32.368330] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 32.368380] [ 32.368421] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.368507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.368537] Hardware name: linux,dummy-virt (DT) [ 32.368569] Call trace: [ 32.368593] show_stack+0x20/0x38 (C) [ 32.368643] dump_stack_lvl+0x8c/0xd0 [ 32.368691] print_report+0x310/0x5d0 [ 32.368737] kasan_report+0xdc/0x128 [ 32.368781] __asan_report_load1_noabort+0x20/0x30 [ 32.368831] vmalloc_oob+0x51c/0x5d0 [ 32.368878] kunit_try_run_case+0x170/0x3f0 [ 32.368924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.368978] kthread+0x328/0x630 [ 32.369020] ret_from_fork+0x10/0x20 [ 32.369081] [ 32.369145] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 32.369188] The buggy address belongs to the physical page: [ 32.369220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b30 [ 32.369289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.369360] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.369419] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.369462] page dumped because: kasan: bad access detected [ 32.369496] [ 32.369516] Memory state around the buggy address: [ 32.369556] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.369601] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.369644] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.369685] ^ [ 32.369727] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.369795] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.369850] ================================================================== [ 32.362438] ================================================================== [ 32.362516] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 32.362873] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 32.362967] [ 32.363138] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250717 #1 PREEMPT [ 32.363232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.363380] Hardware name: linux,dummy-virt (DT) [ 32.363424] Call trace: [ 32.363451] show_stack+0x20/0x38 (C) [ 32.363508] dump_stack_lvl+0x8c/0xd0 [ 32.363617] print_report+0x310/0x5d0 [ 32.363700] kasan_report+0xdc/0x128 [ 32.363965] __asan_report_load1_noabort+0x20/0x30 [ 32.364049] vmalloc_oob+0x578/0x5d0 [ 32.364113] kunit_try_run_case+0x170/0x3f0 [ 32.364227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.364322] kthread+0x328/0x630 [ 32.364482] ret_from_fork+0x10/0x20 [ 32.364690] [ 32.364857] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 32.364960] The buggy address belongs to the physical page: [ 32.365038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b30 [ 32.365224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.365295] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.365349] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.365391] page dumped because: kasan: bad access detected [ 32.365654] [ 32.365765] Memory state around the buggy address: [ 32.365855] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.366139] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.366193] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.366234] ^ [ 32.366276] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.366319] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.366361] ==================================================================