Date
July 15, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 20.994330] ================================================================== [ 20.994391] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 20.994445] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271 [ 20.994732] [ 20.994772] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.994886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.995058] Hardware name: linux,dummy-virt (DT) [ 20.995139] Call trace: [ 20.995166] show_stack+0x20/0x38 (C) [ 20.995460] dump_stack_lvl+0x8c/0xd0 [ 20.995675] print_report+0x310/0x5d0 [ 20.995724] kasan_report+0xdc/0x128 [ 20.996050] __asan_report_load1_noabort+0x20/0x30 [ 20.996526] vmalloc_oob+0x51c/0x5d0 [ 20.996599] kunit_try_run_case+0x170/0x3f0 [ 20.996874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.996954] kthread+0x328/0x630 [ 20.997194] ret_from_fork+0x10/0x20 [ 20.997345] [ 20.997378] The buggy address ffff80008010b7f8 belongs to a vmalloc virtual mapping [ 20.997481] The buggy address belongs to the physical page: [ 20.997560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a3 [ 20.997633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.998061] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.998175] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.998384] page dumped because: kasan: bad access detected [ 20.998510] [ 20.998735] Memory state around the buggy address: [ 20.998820] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.998952] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.999002] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.999057] ^ [ 20.999319] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.999846] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.999936] ================================================================== [ 20.988685] ================================================================== [ 20.988758] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 20.989325] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271 [ 20.989487] [ 20.989543] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.7-rc1 #1 PREEMPT [ 20.989637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.989668] Hardware name: linux,dummy-virt (DT) [ 20.990042] Call trace: [ 20.990102] show_stack+0x20/0x38 (C) [ 20.990442] dump_stack_lvl+0x8c/0xd0 [ 20.990563] print_report+0x310/0x5d0 [ 20.990627] kasan_report+0xdc/0x128 [ 20.990672] __asan_report_load1_noabort+0x20/0x30 [ 20.990745] vmalloc_oob+0x578/0x5d0 [ 20.990792] kunit_try_run_case+0x170/0x3f0 [ 20.990849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.990915] kthread+0x328/0x630 [ 20.990981] ret_from_fork+0x10/0x20 [ 20.991041] [ 20.991072] The buggy address ffff80008010b7f3 belongs to a vmalloc virtual mapping [ 20.991128] The buggy address belongs to the physical page: [ 20.991165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a3 [ 20.991241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.991313] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.991373] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.991418] page dumped because: kasan: bad access detected [ 20.991474] [ 20.991503] Memory state around the buggy address: [ 20.991557] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.991611] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.991659] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.991701] ^ [ 20.991747] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.991794] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.991847] ==================================================================