Date
July 20, 2025, 8:11 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 18.256725] ================================================================== [ 18.256803] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.256855] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270 [ 18.256914] [ 18.256953] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.257038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.257077] Hardware name: linux,dummy-virt (DT) [ 18.257110] Call trace: [ 18.257143] show_stack+0x20/0x38 (C) [ 18.257204] dump_stack_lvl+0x8c/0xd0 [ 18.257253] print_report+0x310/0x5d0 [ 18.257309] kasan_report+0xdc/0x128 [ 18.257361] __asan_report_load1_noabort+0x20/0x30 [ 18.257416] vmalloc_oob+0x51c/0x5d0 [ 18.257461] kunit_try_run_case+0x170/0x3f0 [ 18.257510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.257565] kthread+0x328/0x630 [ 18.257608] ret_from_fork+0x10/0x20 [ 18.257657] [ 18.257682] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 18.257734] The buggy address belongs to the physical page: [ 18.257765] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107675 [ 18.257818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.257878] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.257929] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.257980] page dumped because: kasan: bad access detected [ 18.258035] [ 18.258077] Memory state around the buggy address: [ 18.258111] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.258156] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.258210] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.258250] ^ [ 18.258291] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.258335] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.258376] ================================================================== [ 18.252436] ================================================================== [ 18.252508] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.252568] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270 [ 18.252622] [ 18.252655] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.252737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.252767] Hardware name: linux,dummy-virt (DT) [ 18.252803] Call trace: [ 18.252827] show_stack+0x20/0x38 (C) [ 18.253011] dump_stack_lvl+0x8c/0xd0 [ 18.253075] print_report+0x310/0x5d0 [ 18.253415] kasan_report+0xdc/0x128 [ 18.253504] __asan_report_load1_noabort+0x20/0x30 [ 18.253631] vmalloc_oob+0x578/0x5d0 [ 18.253725] kunit_try_run_case+0x170/0x3f0 [ 18.253843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.253927] kthread+0x328/0x630 [ 18.253970] ret_from_fork+0x10/0x20 [ 18.254156] [ 18.254180] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 18.254355] The buggy address belongs to the physical page: [ 18.254447] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107675 [ 18.254551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.254763] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.254970] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.255125] page dumped because: kasan: bad access detected [ 18.255204] [ 18.255300] Memory state around the buggy address: [ 18.255382] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.255446] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.255546] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.255634] ^ [ 18.255724] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.255771] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.255812] ==================================================================