Date
July 23, 2025, 2:10 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 18.468419] ================================================================== [ 18.468505] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 18.468567] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 18.468624] [ 18.468665] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.468755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.468783] Hardware name: linux,dummy-virt (DT) [ 18.468818] Call trace: [ 18.468844] show_stack+0x20/0x38 (C) [ 18.469742] dump_stack_lvl+0x8c/0xd0 [ 18.469847] print_report+0x310/0x5d0 [ 18.469947] kasan_report+0xdc/0x128 [ 18.470015] __asan_report_load1_noabort+0x20/0x30 [ 18.470502] vmalloc_oob+0x578/0x5d0 [ 18.470591] kunit_try_run_case+0x170/0x3f0 [ 18.470989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.471148] kthread+0x328/0x630 [ 18.471243] ret_from_fork+0x10/0x20 [ 18.471407] [ 18.471479] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 18.472083] The buggy address belongs to the physical page: [ 18.472188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c3f9b000 pfn:0x103f9b [ 18.472355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.472449] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.472783] raw: fff00000c3f9b000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.472920] page dumped because: kasan: bad access detected [ 18.472965] [ 18.472986] Memory state around the buggy address: [ 18.473296] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.473366] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.473658] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.473747] ^ [ 18.473863] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.473937] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.474182] ================================================================== [ 18.475773] ================================================================== [ 18.476016] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 18.476112] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 18.476422] [ 18.476484] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7 #1 PREEMPT [ 18.476575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.476605] Hardware name: linux,dummy-virt (DT) [ 18.476640] Call trace: [ 18.476694] show_stack+0x20/0x38 (C) [ 18.476752] dump_stack_lvl+0x8c/0xd0 [ 18.476811] print_report+0x310/0x5d0 [ 18.476879] kasan_report+0xdc/0x128 [ 18.476927] __asan_report_load1_noabort+0x20/0x30 [ 18.476980] vmalloc_oob+0x51c/0x5d0 [ 18.477040] kunit_try_run_case+0x170/0x3f0 [ 18.477099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 18.477162] kthread+0x328/0x630 [ 18.477216] ret_from_fork+0x10/0x20 [ 18.477265] [ 18.477305] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 18.477351] The buggy address belongs to the physical page: [ 18.477385] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c3f9b000 pfn:0x103f9b [ 18.477465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 18.477534] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 18.477597] raw: fff00000c3f9b000 0000000000000000 00000001ffffffff 0000000000000000 [ 18.477642] page dumped because: kasan: bad access detected [ 18.477676] [ 18.477698] Memory state around the buggy address: [ 18.477734] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.477785] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 18.477832] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 18.478597] ^ [ 18.478686] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.478758] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 18.478824] ==================================================================