Hay
Date
July 15, 2025, 2:10 p.m.

Environment
qemu-arm64

[  108.035690] ==================================================================
[  108.036307] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe8/0x310
[  108.037221] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/253
[  108.038112] 
[  108.038456] CPU: 1 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  108.039259] Hardware name: linux,dummy-virt (DT)
[  108.039783] Call trace:
[  108.040158]  dump_backtrace+0xe0/0x134
[  108.040798]  show_stack+0x20/0x2c
[  108.041296]  dump_stack_lvl+0x88/0xb4
[  108.041884]  print_report+0x158/0x44c
[  108.042373]  kasan_report+0xc8/0x180
[  108.042795]  __asan_load1+0x68/0x74
[  108.043227]  vmalloc_oob+0xe8/0x310
[  108.043647]  kunit_try_run_case+0x8c/0x124
[  108.044142]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  108.044724]  kthread+0x15c/0x170
[  108.045193]  ret_from_fork+0x10/0x20
[  108.045623] 
[  108.045848] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping
[  108.046462] The buggy address belongs to the physical page:
[  108.046953] page:00000000a9d5ccdc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c1
[  108.047665] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  108.048275] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  108.048971] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  108.049840] page dumped because: kasan: bad access detected
[  108.050308] 
[  108.050506] Memory state around the buggy address:
[  108.051226]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  108.051945]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  108.052762] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  108.053653]                                                                 ^
[  108.054345]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  108.055088]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  108.055725] ==================================================================
[  108.010509] ==================================================================
[  108.012292] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc8/0x310
[  108.014214] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/253
[  108.015099] 
[  108.015311] CPU: 1 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[  108.015976] Hardware name: linux,dummy-virt (DT)
[  108.016780] Call trace:
[  108.017113]  dump_backtrace+0xe0/0x134
[  108.017606]  show_stack+0x20/0x2c
[  108.018032]  dump_stack_lvl+0x88/0xb4
[  108.018520]  print_report+0x158/0x44c
[  108.019028]  kasan_report+0xc8/0x180
[  108.019476]  __asan_load1+0x68/0x74
[  108.019931]  vmalloc_oob+0xc8/0x310
[  108.020407]  kunit_try_run_case+0x8c/0x124
[  108.021107]  kunit_generic_run_threadfn_adapter+0x38/0x54
[  108.021722]  kthread+0x15c/0x170
[  108.022183]  ret_from_fork+0x10/0x20
[  108.022661] 
[  108.022908] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping
[  108.023557] The buggy address belongs to the physical page:
[  108.024074] page:00000000a9d5ccdc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c1
[  108.025050] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[  108.025737] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[  108.026403] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  108.027063] page dumped because: kasan: bad access detected
[  108.027567] 
[  108.027792] Memory state around the buggy address:
[  108.028274]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  108.028977]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  108.030857] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[  108.031441]                                                              ^
[  108.032095]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  108.033058]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[  108.033672] ==================================================================

[   77.683739] ==================================================================
[   77.684315] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c
[   77.685192] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169
[   77.686015] 
[   77.686316] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.687795] Hardware name: linux,dummy-virt (DT)
[   77.688235] Call trace:
[   77.688513]  dump_backtrace+0xf8/0x118
[   77.689037]  show_stack+0x18/0x24
[   77.689640]  __dump_stack+0x28/0x38
[   77.690094]  dump_stack_lvl+0x54/0x6c
[   77.690519]  print_address_description+0x7c/0x1ec
[   77.691064]  print_report+0x50/0x68
[   77.691507]  kasan_report+0xac/0x100
[   77.691962]  __asan_load1+0x6c/0x70
[   77.692416]  vmalloc_oob+0xe4/0x25c
[   77.692946]  kunit_try_run_case+0x80/0x184
[   77.693456]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.694038]  kthread+0x16c/0x21c
[   77.694467]  ret_from_fork+0x10/0x20
[   77.694929] 
[   77.695133] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping
[   77.695771] The buggy address belongs to the physical page:
[   77.696240] page:00000000471b2048 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ace
[   77.697173] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   77.697926] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   77.698596] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   77.699196] page dumped because: kasan: bad access detected
[   77.699695] 
[   77.699912] Memory state around the buggy address:
[   77.700355]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   77.701130]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   77.701895] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   77.702581]                                                                 ^
[   77.703196]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   77.703868]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   77.704440] ==================================================================
[   77.662520] ==================================================================
[   77.663655] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c
[   77.664476] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169
[   77.665444] 
[   77.665684] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.666426] Hardware name: linux,dummy-virt (DT)
[   77.666890] Call trace:
[   77.667158]  dump_backtrace+0xf8/0x118
[   77.667615]  show_stack+0x18/0x24
[   77.668047]  __dump_stack+0x28/0x38
[   77.668501]  dump_stack_lvl+0x54/0x6c
[   77.668971]  print_address_description+0x7c/0x1ec
[   77.669554]  print_report+0x50/0x68
[   77.670000]  kasan_report+0xac/0x100
[   77.670461]  __asan_load1+0x6c/0x70
[   77.670921]  vmalloc_oob+0x9c/0x25c
[   77.671341]  kunit_try_run_case+0x80/0x184
[   77.671851]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.672430]  kthread+0x16c/0x21c
[   77.672950]  ret_from_fork+0x10/0x20
[   77.673418] 
[   77.673652] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping
[   77.674294] The buggy address belongs to the physical page:
[   77.674787] page:00000000471b2048 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ace
[   77.675533] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   77.676201] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   77.676954] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   77.677597] page dumped because: kasan: bad access detected
[   77.678113] 
[   77.678310] Memory state around the buggy address:
[   77.678748]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   77.679409]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   77.680040] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   77.680637]                                                              ^
[   77.681382]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   77.682211]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   77.682846] ==================================================================

[   76.899514] ==================================================================
[   76.900507] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c
[   76.901187] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169
[   76.901721] 
[   76.901964] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.902684] Hardware name: linux,dummy-virt (DT)
[   76.903149] Call trace:
[   76.903435]  dump_backtrace+0xf4/0x114
[   76.904053]  show_stack+0x18/0x24
[   76.904583]  __dump_stack+0x28/0x38
[   76.905039]  dump_stack_lvl+0x50/0x68
[   76.905520]  print_address_description+0x7c/0x1ec
[   76.906122]  print_report+0x50/0x68
[   76.906647]  kasan_report+0xac/0xfc
[   76.907127]  __asan_load1+0x6c/0x70
[   76.907581]  vmalloc_oob+0xe4/0x25c
[   76.908067]  kunit_try_run_case+0x80/0x184
[   76.908830]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.909440]  kthread+0x16c/0x21c
[   76.909955]  ret_from_fork+0x10/0x20
[   76.910474] 
[   76.910700] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping
[   76.911340] The buggy address belongs to the physical page:
[   76.911876] page:000000006e24e2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916
[   76.912867] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   76.913752] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   76.914517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   76.915109] page dumped because: kasan: bad access detected
[   76.915568] 
[   76.915913] Memory state around the buggy address:
[   76.916565]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.917475]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.918376] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   76.919244]                                                                 ^
[   76.920181]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.921341]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.922270] ==================================================================
[   76.865914] ==================================================================
[   76.867155] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c
[   76.868249] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169
[   76.869479] 
[   76.870003] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.871217] Hardware name: linux,dummy-virt (DT)
[   76.872147] Call trace:
[   76.872798]  dump_backtrace+0xf4/0x114
[   76.873722]  show_stack+0x18/0x24
[   76.874602]  __dump_stack+0x28/0x38
[   76.875481]  dump_stack_lvl+0x50/0x68
[   76.876407]  print_address_description+0x7c/0x1ec
[   76.877566]  print_report+0x50/0x68
[   76.878348]  kasan_report+0xac/0xfc
[   76.879256]  __asan_load1+0x6c/0x70
[   76.880328]  vmalloc_oob+0x9c/0x25c
[   76.881051]  kunit_try_run_case+0x80/0x184
[   76.881499]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.882654]  kthread+0x16c/0x21c
[   76.883539]  ret_from_fork+0x10/0x20
[   76.884527] 
[   76.885018] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping
[   76.886213] The buggy address belongs to the physical page:
[   76.887181] page:000000006e24e2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916
[   76.888831] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   76.890023] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   76.890950] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   76.892202] page dumped because: kasan: bad access detected
[   76.893167] 
[   76.893379] Memory state around the buggy address:
[   76.894002]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.894730]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.895516] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   76.896291]                                                              ^
[   76.897012]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.897694]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.898288] ==================================================================

[   75.408920] ==================================================================
[   75.409822] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc0/0x310
[   75.410674] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169
[   75.411162] 
[   75.411356] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.412506] Hardware name: linux,dummy-virt (DT)
[   75.413105] Call trace:
[   75.413498]  dump_backtrace.part.0+0xdc/0xf0
[   75.414278]  show_stack+0x18/0x30
[   75.414941]  dump_stack_lvl+0x64/0x80
[   75.415555]  print_report+0x158/0x438
[   75.416171]  kasan_report+0xb4/0xf4
[   75.416733]  __asan_load1+0x68/0x74
[   75.417288]  vmalloc_oob+0xc0/0x310
[   75.417931]  kunit_try_run_case+0x84/0x120
[   75.418595]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.419334]  kthread+0x180/0x190
[   75.419680]  ret_from_fork+0x10/0x20
[   75.420030] 
[   75.420212] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping
[   75.421073] The buggy address belongs to the physical page:
[   75.421766] page:0000000068235c0c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a7c
[   75.423008] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   75.423898] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   75.424851] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.425735] page dumped because: kasan: bad access detected
[   75.426497] 
[   75.426763] Memory state around the buggy address:
[   75.427570]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.428459]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.429171] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   75.429910]                                                              ^
[   75.430788]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   75.431738]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   75.432640] ==================================================================
[   75.434063] ==================================================================
[   75.434950] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe0/0x310
[   75.435628] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169
[   75.436242] 
[   75.436449] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.437100] Hardware name: linux,dummy-virt (DT)
[   75.437566] Call trace:
[   75.437834]  dump_backtrace.part.0+0xdc/0xf0
[   75.438539]  show_stack+0x18/0x30
[   75.438970]  dump_stack_lvl+0x64/0x80
[   75.439412]  print_report+0x158/0x438
[   75.439883]  kasan_report+0xb4/0xf4
[   75.440280]  __asan_load1+0x68/0x74
[   75.440681]  vmalloc_oob+0xe0/0x310
[   75.441066]  kunit_try_run_case+0x84/0x120
[   75.441546]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.442095]  kthread+0x180/0x190
[   75.442524]  ret_from_fork+0x10/0x20
[   75.443130] 
[   75.443321] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping
[   75.443806] The buggy address belongs to the physical page:
[   75.444164] page:0000000068235c0c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a7c
[   75.444747] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   75.445242] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   75.446323] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.447286] page dumped because: kasan: bad access detected
[   75.447966] 
[   75.448237] Memory state around the buggy address:
[   75.448863]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.449738]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.450762] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   75.451607]                                                                 ^
[   75.452455]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   75.453321]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   75.454914] ==================================================================

[   66.723938] ==================================================================
[   66.724951] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xd8/0x328
[   66.726133] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/167
[   66.726744] 
[   66.726948] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.727627] Hardware name: linux,dummy-virt (DT)
[   66.728019] Call trace:
[   66.728267]  dump_backtrace+0x110/0x120
[   66.728729]  show_stack+0x18/0x28
[   66.729114]  dump_stack_lvl+0x68/0x84
[   66.729815]  print_report+0x158/0x484
[   66.730187]  kasan_report+0x98/0xe0
[   66.730648]  __asan_load1+0x68/0x78
[   66.731028]  vmalloc_oob+0xd8/0x328
[   66.731432]  kunit_try_run_case+0x7c/0x120
[   66.731866]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.732441]  kthread+0x1a4/0x1b8
[   66.732797]  ret_from_fork+0x10/0x20
[   66.733183] 
[   66.733391] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping
[   66.734428] The buggy address belongs to the physical page:
[   66.734896] page:00000000ab988f6b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a11
[   66.735619] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   66.736214] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   66.736843] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   66.737668] page dumped because: kasan: bad access detected
[   66.738092] 
[   66.738276] Memory state around the buggy address:
[   66.738718]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.739299]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.739857] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   66.740401]                                                              ^
[   66.740937]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   66.741523]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   66.742052] ==================================================================
[   66.743119] ==================================================================
[   66.744132] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x100/0x328
[   66.744712] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/167
[   66.745250] 
[   66.745458] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   66.746404] Hardware name: linux,dummy-virt (DT)
[   66.746772] Call trace:
[   66.747028]  dump_backtrace+0x110/0x120
[   66.747459]  show_stack+0x18/0x28
[   66.747825]  dump_stack_lvl+0x68/0x84
[   66.748248]  print_report+0x158/0x484
[   66.748630]  kasan_report+0x98/0xe0
[   66.749002]  __asan_load1+0x68/0x78
[   66.749392]  vmalloc_oob+0x100/0x328
[   66.750243]  kunit_try_run_case+0x7c/0x120
[   66.750669]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   66.751171]  kthread+0x1a4/0x1b8
[   66.751525]  ret_from_fork+0x10/0x20
[   66.751903] 
[   66.752097] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping
[   66.752678] The buggy address belongs to the physical page:
[   66.753136] page:00000000ab988f6b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a11
[   66.754243] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   66.754794] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   66.755405] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   66.756007] page dumped because: kasan: bad access detected
[   66.756458] 
[   66.756644] Memory state around the buggy address:
[   66.757096]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.758169]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   66.758733] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   66.759309]                                                                 ^
[   66.759845]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   66.760414]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   66.760963] ==================================================================