Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 184.854498] ================================================================== [ 184.855802] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xec/0x320 [ 184.857627] Read of size 1 at addr ffff8000800fd7f8 by task kunit_try_catch/219 [ 184.860037] [ 184.860683] CPU: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 184.862708] Hardware name: linux,dummy-virt (DT) [ 184.863933] Call trace: [ 184.864794] dump_backtrace+0x9c/0x128 [ 184.866186] show_stack+0x20/0x38 [ 184.867304] dump_stack_lvl+0x60/0xb0 [ 184.868548] print_report+0x314/0x5d8 [ 184.869924] kasan_report+0xc8/0x118 [ 184.871046] __asan_load1+0x60/0x70 [ 184.872154] vmalloc_oob+0xec/0x320 [ 184.873489] kunit_try_run_case+0xf8/0x260 [ 184.874867] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.876697] kthread+0x18c/0x1a8 [ 184.878069] ret_from_fork+0x10/0x20 [ 184.879204] [ 184.879791] The buggy address belongs to the virtual mapping at [ 184.879791] [ffff8000800fd000, ffff8000800ff000) created by: [ 184.879791] vmalloc_oob+0x88/0x320 [ 184.883066] [ 184.883756] The buggy address belongs to the physical page: [ 184.885464] page:00000000bef78acf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f64 [ 184.887410] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 184.888875] page_type: 0xffffffff() [ 184.890024] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 184.892142] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 184.893796] page dumped because: kasan: bad access detected [ 184.895192] [ 184.895802] Memory state around the buggy address: [ 184.896901] ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 184.898820] ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 184.900434] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 184.902303] ^ [ 184.903934] ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 184.905680] ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 184.907360] ================================================================== [ 184.795530] ================================================================== [ 184.799647] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc8/0x320 [ 184.801314] Read of size 1 at addr ffff8000800fd7f3 by task kunit_try_catch/219 [ 184.803279] [ 184.803955] CPU: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 184.805771] Hardware name: linux,dummy-virt (DT) [ 184.807225] Call trace: [ 184.807637] dump_backtrace+0x9c/0x128 [ 184.808888] show_stack+0x20/0x38 [ 184.810029] dump_stack_lvl+0x60/0xb0 [ 184.811321] print_report+0x314/0x5d8 [ 184.812479] kasan_report+0xc8/0x118 [ 184.813948] __asan_load1+0x60/0x70 [ 184.815092] vmalloc_oob+0xc8/0x320 [ 184.816168] kunit_try_run_case+0xf8/0x260 [ 184.817535] kunit_generic_run_threadfn_adapter+0x38/0x60 [ 184.818836] kthread+0x18c/0x1a8 [ 184.819970] ret_from_fork+0x10/0x20 [ 184.821294] [ 184.822348] The buggy address belongs to the virtual mapping at [ 184.822348] [ffff8000800fd000, ffff8000800ff000) created by: [ 184.822348] vmalloc_oob+0x88/0x320 [ 184.825718] [ 184.826341] The buggy address belongs to the physical page: [ 184.827686] page:00000000bef78acf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f64 [ 184.829655] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff) [ 184.831207] page_type: 0xffffffff() [ 184.832363] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000 [ 184.834518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 184.836054] page dumped because: kasan: bad access detected [ 184.837688] [ 184.838225] Memory state around the buggy address: [ 184.839438] ffff8000800fd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 184.841294] ffff8000800fd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 184.843095] >ffff8000800fd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 184.844614] ^ [ 184.846241] ffff8000800fd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 184.848169] ffff8000800fd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 184.850202] ==================================================================