Date
July 15, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 108.035690] ================================================================== [ 108.036307] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe8/0x310 [ 108.037221] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/253 [ 108.038112] [ 108.038456] CPU: 1 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 108.039259] Hardware name: linux,dummy-virt (DT) [ 108.039783] Call trace: [ 108.040158] dump_backtrace+0xe0/0x134 [ 108.040798] show_stack+0x20/0x2c [ 108.041296] dump_stack_lvl+0x88/0xb4 [ 108.041884] print_report+0x158/0x44c [ 108.042373] kasan_report+0xc8/0x180 [ 108.042795] __asan_load1+0x68/0x74 [ 108.043227] vmalloc_oob+0xe8/0x310 [ 108.043647] kunit_try_run_case+0x8c/0x124 [ 108.044142] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 108.044724] kthread+0x15c/0x170 [ 108.045193] ret_from_fork+0x10/0x20 [ 108.045623] [ 108.045848] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping [ 108.046462] The buggy address belongs to the physical page: [ 108.046953] page:00000000a9d5ccdc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c1 [ 108.047665] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 108.048275] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 108.048971] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 108.049840] page dumped because: kasan: bad access detected [ 108.050308] [ 108.050506] Memory state around the buggy address: [ 108.051226] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 108.051945] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 108.052762] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 108.053653] ^ [ 108.054345] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 108.055088] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 108.055725] ================================================================== [ 108.010509] ================================================================== [ 108.012292] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc8/0x310 [ 108.014214] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/253 [ 108.015099] [ 108.015311] CPU: 1 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 108.015976] Hardware name: linux,dummy-virt (DT) [ 108.016780] Call trace: [ 108.017113] dump_backtrace+0xe0/0x134 [ 108.017606] show_stack+0x20/0x2c [ 108.018032] dump_stack_lvl+0x88/0xb4 [ 108.018520] print_report+0x158/0x44c [ 108.019028] kasan_report+0xc8/0x180 [ 108.019476] __asan_load1+0x68/0x74 [ 108.019931] vmalloc_oob+0xc8/0x310 [ 108.020407] kunit_try_run_case+0x8c/0x124 [ 108.021107] kunit_generic_run_threadfn_adapter+0x38/0x54 [ 108.021722] kthread+0x15c/0x170 [ 108.022183] ret_from_fork+0x10/0x20 [ 108.022661] [ 108.022908] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping [ 108.023557] The buggy address belongs to the physical page: [ 108.024074] page:00000000a9d5ccdc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c1 [ 108.025050] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 108.025737] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 108.026403] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 108.027063] page dumped because: kasan: bad access detected [ 108.027567] [ 108.027792] Memory state around the buggy address: [ 108.028274] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 108.028977] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 108.030857] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 108.031441] ^ [ 108.032095] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 108.033058] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 108.033672] ==================================================================
[ 77.683739] ================================================================== [ 77.684315] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c [ 77.685192] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169 [ 77.686015] [ 77.686316] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.687795] Hardware name: linux,dummy-virt (DT) [ 77.688235] Call trace: [ 77.688513] dump_backtrace+0xf8/0x118 [ 77.689037] show_stack+0x18/0x24 [ 77.689640] __dump_stack+0x28/0x38 [ 77.690094] dump_stack_lvl+0x54/0x6c [ 77.690519] print_address_description+0x7c/0x1ec [ 77.691064] print_report+0x50/0x68 [ 77.691507] kasan_report+0xac/0x100 [ 77.691962] __asan_load1+0x6c/0x70 [ 77.692416] vmalloc_oob+0xe4/0x25c [ 77.692946] kunit_try_run_case+0x80/0x184 [ 77.693456] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.694038] kthread+0x16c/0x21c [ 77.694467] ret_from_fork+0x10/0x20 [ 77.694929] [ 77.695133] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping [ 77.695771] The buggy address belongs to the physical page: [ 77.696240] page:00000000471b2048 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ace [ 77.697173] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 77.697926] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 77.698596] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 77.699196] page dumped because: kasan: bad access detected [ 77.699695] [ 77.699912] Memory state around the buggy address: [ 77.700355] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 77.701130] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 77.701895] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 77.702581] ^ [ 77.703196] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 77.703868] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 77.704440] ================================================================== [ 77.662520] ================================================================== [ 77.663655] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c [ 77.664476] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169 [ 77.665444] [ 77.665684] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 77.666426] Hardware name: linux,dummy-virt (DT) [ 77.666890] Call trace: [ 77.667158] dump_backtrace+0xf8/0x118 [ 77.667615] show_stack+0x18/0x24 [ 77.668047] __dump_stack+0x28/0x38 [ 77.668501] dump_stack_lvl+0x54/0x6c [ 77.668971] print_address_description+0x7c/0x1ec [ 77.669554] print_report+0x50/0x68 [ 77.670000] kasan_report+0xac/0x100 [ 77.670461] __asan_load1+0x6c/0x70 [ 77.670921] vmalloc_oob+0x9c/0x25c [ 77.671341] kunit_try_run_case+0x80/0x184 [ 77.671851] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 77.672430] kthread+0x16c/0x21c [ 77.672950] ret_from_fork+0x10/0x20 [ 77.673418] [ 77.673652] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping [ 77.674294] The buggy address belongs to the physical page: [ 77.674787] page:00000000471b2048 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ace [ 77.675533] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 77.676201] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 77.676954] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 77.677597] page dumped because: kasan: bad access detected [ 77.678113] [ 77.678310] Memory state around the buggy address: [ 77.678748] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 77.679409] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 77.680040] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 77.680637] ^ [ 77.681382] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 77.682211] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 77.682846] ==================================================================
[ 76.899514] ================================================================== [ 76.900507] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c [ 76.901187] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169 [ 76.901721] [ 76.901964] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.902684] Hardware name: linux,dummy-virt (DT) [ 76.903149] Call trace: [ 76.903435] dump_backtrace+0xf4/0x114 [ 76.904053] show_stack+0x18/0x24 [ 76.904583] __dump_stack+0x28/0x38 [ 76.905039] dump_stack_lvl+0x50/0x68 [ 76.905520] print_address_description+0x7c/0x1ec [ 76.906122] print_report+0x50/0x68 [ 76.906647] kasan_report+0xac/0xfc [ 76.907127] __asan_load1+0x6c/0x70 [ 76.907581] vmalloc_oob+0xe4/0x25c [ 76.908067] kunit_try_run_case+0x80/0x184 [ 76.908830] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.909440] kthread+0x16c/0x21c [ 76.909955] ret_from_fork+0x10/0x20 [ 76.910474] [ 76.910700] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping [ 76.911340] The buggy address belongs to the physical page: [ 76.911876] page:000000006e24e2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916 [ 76.912867] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 76.913752] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 76.914517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 76.915109] page dumped because: kasan: bad access detected [ 76.915568] [ 76.915913] Memory state around the buggy address: [ 76.916565] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.917475] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.918376] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 76.919244] ^ [ 76.920181] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 76.921341] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 76.922270] ================================================================== [ 76.865914] ================================================================== [ 76.867155] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c [ 76.868249] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169 [ 76.869479] [ 76.870003] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 76.871217] Hardware name: linux,dummy-virt (DT) [ 76.872147] Call trace: [ 76.872798] dump_backtrace+0xf4/0x114 [ 76.873722] show_stack+0x18/0x24 [ 76.874602] __dump_stack+0x28/0x38 [ 76.875481] dump_stack_lvl+0x50/0x68 [ 76.876407] print_address_description+0x7c/0x1ec [ 76.877566] print_report+0x50/0x68 [ 76.878348] kasan_report+0xac/0xfc [ 76.879256] __asan_load1+0x6c/0x70 [ 76.880328] vmalloc_oob+0x9c/0x25c [ 76.881051] kunit_try_run_case+0x80/0x184 [ 76.881499] kunit_generic_run_threadfn_adapter+0x30/0x4c [ 76.882654] kthread+0x16c/0x21c [ 76.883539] ret_from_fork+0x10/0x20 [ 76.884527] [ 76.885018] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping [ 76.886213] The buggy address belongs to the physical page: [ 76.887181] page:000000006e24e2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916 [ 76.888831] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 76.890023] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 76.890950] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 76.892202] page dumped because: kasan: bad access detected [ 76.893167] [ 76.893379] Memory state around the buggy address: [ 76.894002] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.894730] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 76.895516] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 76.896291] ^ [ 76.897012] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 76.897694] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 76.898288] ==================================================================
[ 75.408920] ================================================================== [ 75.409822] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc0/0x310 [ 75.410674] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169 [ 75.411162] [ 75.411356] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.412506] Hardware name: linux,dummy-virt (DT) [ 75.413105] Call trace: [ 75.413498] dump_backtrace.part.0+0xdc/0xf0 [ 75.414278] show_stack+0x18/0x30 [ 75.414941] dump_stack_lvl+0x64/0x80 [ 75.415555] print_report+0x158/0x438 [ 75.416171] kasan_report+0xb4/0xf4 [ 75.416733] __asan_load1+0x68/0x74 [ 75.417288] vmalloc_oob+0xc0/0x310 [ 75.417931] kunit_try_run_case+0x84/0x120 [ 75.418595] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.419334] kthread+0x180/0x190 [ 75.419680] ret_from_fork+0x10/0x20 [ 75.420030] [ 75.420212] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping [ 75.421073] The buggy address belongs to the physical page: [ 75.421766] page:0000000068235c0c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a7c [ 75.423008] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 75.423898] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 75.424851] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.425735] page dumped because: kasan: bad access detected [ 75.426497] [ 75.426763] Memory state around the buggy address: [ 75.427570] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.428459] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.429171] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 75.429910] ^ [ 75.430788] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 75.431738] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 75.432640] ================================================================== [ 75.434063] ================================================================== [ 75.434950] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe0/0x310 [ 75.435628] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169 [ 75.436242] [ 75.436449] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 75.437100] Hardware name: linux,dummy-virt (DT) [ 75.437566] Call trace: [ 75.437834] dump_backtrace.part.0+0xdc/0xf0 [ 75.438539] show_stack+0x18/0x30 [ 75.438970] dump_stack_lvl+0x64/0x80 [ 75.439412] print_report+0x158/0x438 [ 75.439883] kasan_report+0xb4/0xf4 [ 75.440280] __asan_load1+0x68/0x74 [ 75.440681] vmalloc_oob+0xe0/0x310 [ 75.441066] kunit_try_run_case+0x84/0x120 [ 75.441546] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 75.442095] kthread+0x180/0x190 [ 75.442524] ret_from_fork+0x10/0x20 [ 75.443130] [ 75.443321] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping [ 75.443806] The buggy address belongs to the physical page: [ 75.444164] page:0000000068235c0c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a7c [ 75.444747] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 75.445242] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 75.446323] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 75.447286] page dumped because: kasan: bad access detected [ 75.447966] [ 75.448237] Memory state around the buggy address: [ 75.448863] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.449738] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 75.450762] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 75.451607] ^ [ 75.452455] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 75.453321] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 75.454914] ==================================================================
[ 66.723938] ================================================================== [ 66.724951] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x328 [ 66.726133] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/167 [ 66.726744] [ 66.726948] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.727627] Hardware name: linux,dummy-virt (DT) [ 66.728019] Call trace: [ 66.728267] dump_backtrace+0x110/0x120 [ 66.728729] show_stack+0x18/0x28 [ 66.729114] dump_stack_lvl+0x68/0x84 [ 66.729815] print_report+0x158/0x484 [ 66.730187] kasan_report+0x98/0xe0 [ 66.730648] __asan_load1+0x68/0x78 [ 66.731028] vmalloc_oob+0xd8/0x328 [ 66.731432] kunit_try_run_case+0x7c/0x120 [ 66.731866] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.732441] kthread+0x1a4/0x1b8 [ 66.732797] ret_from_fork+0x10/0x20 [ 66.733183] [ 66.733391] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping [ 66.734428] The buggy address belongs to the physical page: [ 66.734896] page:00000000ab988f6b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a11 [ 66.735619] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 66.736214] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 66.736843] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 66.737668] page dumped because: kasan: bad access detected [ 66.738092] [ 66.738276] Memory state around the buggy address: [ 66.738718] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.739299] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.739857] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 66.740401] ^ [ 66.740937] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 66.741523] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 66.742052] ================================================================== [ 66.743119] ================================================================== [ 66.744132] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x100/0x328 [ 66.744712] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/167 [ 66.745250] [ 66.745458] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.1.146-rc1 #1 [ 66.746404] Hardware name: linux,dummy-virt (DT) [ 66.746772] Call trace: [ 66.747028] dump_backtrace+0x110/0x120 [ 66.747459] show_stack+0x18/0x28 [ 66.747825] dump_stack_lvl+0x68/0x84 [ 66.748248] print_report+0x158/0x484 [ 66.748630] kasan_report+0x98/0xe0 [ 66.749002] __asan_load1+0x68/0x78 [ 66.749392] vmalloc_oob+0x100/0x328 [ 66.750243] kunit_try_run_case+0x7c/0x120 [ 66.750669] kunit_generic_run_threadfn_adapter+0x30/0x50 [ 66.751171] kthread+0x1a4/0x1b8 [ 66.751525] ret_from_fork+0x10/0x20 [ 66.751903] [ 66.752097] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping [ 66.752678] The buggy address belongs to the physical page: [ 66.753136] page:00000000ab988f6b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a11 [ 66.754243] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 66.754794] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 66.755405] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 66.756007] page dumped because: kasan: bad access detected [ 66.756458] [ 66.756644] Memory state around the buggy address: [ 66.757096] ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.758169] ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.758733] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 66.759309] ^ [ 66.759845] ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 66.760414] ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 66.760963] ==================================================================