Date
July 16, 2025, 3:10 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 19.474798] ================================================================== [ 19.474852] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 19.475282] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 19.475383] [ 19.475512] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.475631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.475667] Hardware name: linux,dummy-virt (DT) [ 19.475701] Call trace: [ 19.475734] show_stack+0x20/0x38 (C) [ 19.475786] dump_stack_lvl+0x8c/0xd0 [ 19.475836] print_report+0x310/0x5d0 [ 19.476023] kasan_report+0xdc/0x128 [ 19.476234] __asan_report_load1_noabort+0x20/0x30 [ 19.476336] vmalloc_oob+0x51c/0x5d0 [ 19.476607] kunit_try_run_case+0x170/0x3f0 [ 19.476705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.476880] kthread+0x328/0x630 [ 19.477002] ret_from_fork+0x10/0x20 [ 19.477203] [ 19.477322] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 19.477390] The buggy address belongs to the physical page: [ 19.477445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10658c [ 19.477556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.477641] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.477783] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.477861] page dumped because: kasan: bad access detected [ 19.477982] [ 19.478062] Memory state around the buggy address: [ 19.478157] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.478204] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.478371] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.478419] ^ [ 19.478577] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.478672] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.478865] ================================================================== [ 19.469691] ================================================================== [ 19.470065] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 19.470139] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 19.470213] [ 19.470248] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.470584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.470628] Hardware name: linux,dummy-virt (DT) [ 19.470661] Call trace: [ 19.470690] show_stack+0x20/0x38 (C) [ 19.470881] dump_stack_lvl+0x8c/0xd0 [ 19.470988] print_report+0x310/0x5d0 [ 19.471070] kasan_report+0xdc/0x128 [ 19.471181] __asan_report_load1_noabort+0x20/0x30 [ 19.471266] vmalloc_oob+0x578/0x5d0 [ 19.471359] kunit_try_run_case+0x170/0x3f0 [ 19.471450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.471642] kthread+0x328/0x630 [ 19.471764] ret_from_fork+0x10/0x20 [ 19.471818] [ 19.472059] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 19.472195] The buggy address belongs to the physical page: [ 19.472270] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10658c [ 19.472440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.472651] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.472777] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.472877] page dumped because: kasan: bad access detected [ 19.473044] [ 19.473133] Memory state around the buggy address: [ 19.473228] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.473322] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.473467] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.473560] ^ [ 19.473612] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.473656] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.473843] ==================================================================