Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 20.255219] ================================================================== [ 20.255364] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 20.255438] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 20.255490] [ 20.255533] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.255748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.255871] Hardware name: linux,dummy-virt (DT) [ 20.256023] Call trace: [ 20.256103] show_stack+0x20/0x38 (C) [ 20.256197] dump_stack_lvl+0x8c/0xd0 [ 20.256278] print_report+0x310/0x5d0 [ 20.256328] kasan_report+0xdc/0x128 [ 20.256377] __asan_report_load1_noabort+0x20/0x30 [ 20.256439] vmalloc_oob+0x578/0x5d0 [ 20.256485] kunit_try_run_case+0x170/0x3f0 [ 20.256545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.256600] kthread+0x328/0x630 [ 20.256651] ret_from_fork+0x10/0x20 [ 20.256706] [ 20.256751] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 20.256800] The buggy address belongs to the physical page: [ 20.256834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107997 [ 20.256929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.257012] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.257074] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.257118] page dumped because: kasan: bad access detected [ 20.257152] [ 20.257172] Memory state around the buggy address: [ 20.257209] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.257255] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.257310] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.257356] ^ [ 20.257403] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.257448] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.257497] ================================================================== [ 20.258774] ================================================================== [ 20.258834] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 20.258911] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 20.258963] [ 20.259001] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 20.259085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.259115] Hardware name: linux,dummy-virt (DT) [ 20.259151] Call trace: [ 20.259176] show_stack+0x20/0x38 (C) [ 20.259225] dump_stack_lvl+0x8c/0xd0 [ 20.259275] print_report+0x310/0x5d0 [ 20.261878] kasan_report+0xdc/0x128 [ 20.261942] __asan_report_load1_noabort+0x20/0x30 [ 20.261994] vmalloc_oob+0x51c/0x5d0 [ 20.262042] kunit_try_run_case+0x170/0x3f0 [ 20.262091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.262146] kthread+0x328/0x630 [ 20.262191] ret_from_fork+0x10/0x20 [ 20.262241] [ 20.262265] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 20.262310] The buggy address belongs to the physical page: [ 20.262345] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107997 [ 20.262399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.262466] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 20.262519] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 20.262561] page dumped because: kasan: bad access detected [ 20.262594] [ 20.262614] Memory state around the buggy address: [ 20.262648] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.262692] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.262737] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 20.262776] ^ [ 20.262820] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.262873] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 20.262914] ==================================================================
[ 19.760874] ================================================================== [ 19.760935] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 19.761196] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 19.761334] [ 19.761403] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.761487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.761518] Hardware name: linux,dummy-virt (DT) [ 19.761675] Call trace: [ 19.761700] show_stack+0x20/0x38 (C) [ 19.761751] dump_stack_lvl+0x8c/0xd0 [ 19.761799] print_report+0x310/0x5d0 [ 19.762007] kasan_report+0xdc/0x128 [ 19.762094] __asan_report_load1_noabort+0x20/0x30 [ 19.762372] vmalloc_oob+0x51c/0x5d0 [ 19.762574] kunit_try_run_case+0x170/0x3f0 [ 19.762650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.763031] kthread+0x328/0x630 [ 19.763172] ret_from_fork+0x10/0x20 [ 19.763274] [ 19.763449] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 19.763615] The buggy address belongs to the physical page: [ 19.763677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107abd [ 19.763764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.763874] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.763990] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.764090] page dumped because: kasan: bad access detected [ 19.764146] [ 19.764173] Memory state around the buggy address: [ 19.764207] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.764286] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.764632] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.764742] ^ [ 19.764825] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.764881] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.764930] ================================================================== [ 19.756064] ================================================================== [ 19.756138] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 19.756294] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 19.756363] [ 19.756534] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.756649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.756684] Hardware name: linux,dummy-virt (DT) [ 19.756721] Call trace: [ 19.756747] show_stack+0x20/0x38 (C) [ 19.756985] dump_stack_lvl+0x8c/0xd0 [ 19.757092] print_report+0x310/0x5d0 [ 19.757192] kasan_report+0xdc/0x128 [ 19.757291] __asan_report_load1_noabort+0x20/0x30 [ 19.757389] vmalloc_oob+0x578/0x5d0 [ 19.757486] kunit_try_run_case+0x170/0x3f0 [ 19.757624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.757766] kthread+0x328/0x630 [ 19.757871] ret_from_fork+0x10/0x20 [ 19.758003] [ 19.758079] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 19.758175] The buggy address belongs to the physical page: [ 19.758211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107abd [ 19.758432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.758684] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.758787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.758884] page dumped because: kasan: bad access detected [ 19.758933] [ 19.758955] Memory state around the buggy address: [ 19.758992] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.759308] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.759404] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.759506] ^ [ 19.759664] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.759844] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.759959] ==================================================================
[ 19.406664] ================================================================== [ 19.406732] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 19.406780] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 19.406860] [ 19.406891] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.406975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.407004] Hardware name: linux,dummy-virt (DT) [ 19.407038] Call trace: [ 19.407060] show_stack+0x20/0x38 (C) [ 19.407108] dump_stack_lvl+0x8c/0xd0 [ 19.407154] print_report+0x310/0x5d0 [ 19.407202] kasan_report+0xdc/0x128 [ 19.407247] __asan_report_load1_noabort+0x20/0x30 [ 19.407298] vmalloc_oob+0x51c/0x5d0 [ 19.407356] kunit_try_run_case+0x170/0x3f0 [ 19.407405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.407457] kthread+0x328/0x630 [ 19.407500] ret_from_fork+0x10/0x20 [ 19.407547] [ 19.407569] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 19.407611] The buggy address belongs to the physical page: [ 19.407644] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a6 [ 19.407696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.407766] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.407817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.407858] page dumped because: kasan: bad access detected [ 19.407891] [ 19.407978] Memory state around the buggy address: [ 19.408043] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.408095] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.408140] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.408180] ^ [ 19.408224] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.408270] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.408310] ================================================================== [ 19.402836] ================================================================== [ 19.403215] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 19.403431] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 19.403600] [ 19.403687] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 19.403836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.403866] Hardware name: linux,dummy-virt (DT) [ 19.403900] Call trace: [ 19.403926] show_stack+0x20/0x38 (C) [ 19.403979] dump_stack_lvl+0x8c/0xd0 [ 19.404028] print_report+0x310/0x5d0 [ 19.404075] kasan_report+0xdc/0x128 [ 19.404123] __asan_report_load1_noabort+0x20/0x30 [ 19.404173] vmalloc_oob+0x578/0x5d0 [ 19.404273] kunit_try_run_case+0x170/0x3f0 [ 19.404380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.404527] kthread+0x328/0x630 [ 19.404614] ret_from_fork+0x10/0x20 [ 19.404843] [ 19.404951] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 19.405102] The buggy address belongs to the physical page: [ 19.405167] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a6 [ 19.405230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.405294] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 19.405353] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 19.405404] page dumped because: kasan: bad access detected [ 19.405448] [ 19.405479] Memory state around the buggy address: [ 19.405532] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.405578] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.405630] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 19.405671] ^ [ 19.405733] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.405776] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 19.405816] ==================================================================