Date
July 22, 2025, 2:40 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 20.222812] ================================================================== [ 20.222967] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 20.223275] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271 [ 20.223529] [ 20.223808] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.223967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.224046] Hardware name: linux,dummy-virt (DT) [ 20.224242] Call trace: [ 20.224266] show_stack+0x20/0x38 (C) [ 20.224633] dump_stack_lvl+0x8c/0xd0 [ 20.224768] print_report+0x310/0x5d0 [ 20.224869] kasan_report+0xdc/0x128 [ 20.225022] __asan_report_load1_noabort+0x20/0x30 [ 20.225145] vmalloc_oob+0x51c/0x5d0 [ 20.225369] kunit_try_run_case+0x170/0x3f0 [ 20.225678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.225851] kthread+0x328/0x630 [ 20.225913] ret_from_fork+0x10/0x20 [ 20.225971] [ 20.226158] The buggy address ffff80008010b7f8 belongs to a vmalloc virtual mapping [ 20.226671] The buggy address belongs to the physical page: [ 20.226788] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c78f9000 pfn:0x1078f9 [ 20.226916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.227077] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.227151] raw: fff00000c78f9000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.227557] page dumped because: kasan: bad access detected [ 20.227894] [ 20.228049] Memory state around the buggy address: [ 20.228157] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.228225] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.228426] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.228467] ^ [ 20.228567] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.228739] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.228807] ================================================================== [ 20.212697] ================================================================== [ 20.214046] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 20.214162] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271 [ 20.214216] [ 20.214418] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.8-rc1 #1 PREEMPT [ 20.214517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.214572] Hardware name: linux,dummy-virt (DT) [ 20.214848] Call trace: [ 20.215096] show_stack+0x20/0x38 (C) [ 20.215166] dump_stack_lvl+0x8c/0xd0 [ 20.215232] print_report+0x310/0x5d0 [ 20.215550] kasan_report+0xdc/0x128 [ 20.215725] __asan_report_load1_noabort+0x20/0x30 [ 20.216100] vmalloc_oob+0x578/0x5d0 [ 20.216315] kunit_try_run_case+0x170/0x3f0 [ 20.216616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.216919] kthread+0x328/0x630 [ 20.217123] ret_from_fork+0x10/0x20 [ 20.217400] [ 20.217444] The buggy address ffff80008010b7f3 belongs to a vmalloc virtual mapping [ 20.217789] The buggy address belongs to the physical page: [ 20.217928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c78f9000 pfn:0x1078f9 [ 20.218340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.218497] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.218984] raw: fff00000c78f9000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.219050] page dumped because: kasan: bad access detected [ 20.219087] [ 20.219327] Memory state around the buggy address: [ 20.219556] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.219633] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.219888] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.220051] ^ [ 20.220214] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.220418] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.220672] ==================================================================