Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64
rk3399-rock-pi-4b

[   27.678968] ==================================================================
[   27.679107] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   27.679232] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271
[   27.679362] 
[   27.679600] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.680254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.680331] Hardware name: linux,dummy-virt (DT)
[   27.680418] Call trace:
[   27.680482]  show_stack+0x20/0x38 (C)
[   27.680617]  dump_stack_lvl+0x8c/0xd0
[   27.680748]  print_report+0x310/0x608
[   27.680898]  kasan_report+0xdc/0x128
[   27.681256]  __asan_report_load1_noabort+0x20/0x30
[   27.681612]  vmalloc_oob+0x578/0x5d0
[   27.681792]  kunit_try_run_case+0x170/0x3f0
[   27.681996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.682159]  kthread+0x328/0x630
[   27.682319]  ret_from_fork+0x10/0x20
[   27.682475] 
[   27.682555] The buggy address belongs to the virtual mapping at
[   27.682555]  [ffff80008010b000, ffff80008010d000) created by:
[   27.682555]  vmalloc_oob+0x98/0x5d0
[   27.682769] 
[   27.682865] The buggy address belongs to the physical page:
[   27.682977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106805
[   27.683126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.683320] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   27.683518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.683635] page dumped because: kasan: bad access detected
[   27.683769] 
[   27.683890] Memory state around the buggy address:
[   27.684236]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.684704]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.685001] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   27.685406]                                                              ^
[   27.685617]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   27.685887]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   27.686339] ==================================================================
[   27.688536] ==================================================================
[   27.688702] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   27.689081] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271
[   27.689408] 
[   27.689478] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   27.689675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.689744] Hardware name: linux,dummy-virt (DT)
[   27.689817] Call trace:
[   27.689869]  show_stack+0x20/0x38 (C)
[   27.690008]  dump_stack_lvl+0x8c/0xd0
[   27.690125]  print_report+0x310/0x608
[   27.690247]  kasan_report+0xdc/0x128
[   27.690569]  __asan_report_load1_noabort+0x20/0x30
[   27.690798]  vmalloc_oob+0x51c/0x5d0
[   27.690995]  kunit_try_run_case+0x170/0x3f0
[   27.691144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.691301]  kthread+0x328/0x630
[   27.691698]  ret_from_fork+0x10/0x20
[   27.692167] 
[   27.692240] The buggy address belongs to the virtual mapping at
[   27.692240]  [ffff80008010b000, ffff80008010d000) created by:
[   27.692240]  vmalloc_oob+0x98/0x5d0
[   27.693232] 
[   27.693560] The buggy address belongs to the physical page:
[   27.693718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106805
[   27.694072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.694225] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   27.694708] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   27.694836] page dumped because: kasan: bad access detected
[   27.695039] 
[   27.695166] Memory state around the buggy address:
[   27.695252]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.695360]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   27.695466] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   27.695574]                                                                 ^
[   27.695705]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   27.696292]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   27.696399] ==================================================================

[   25.632063] ==================================================================
[   25.632739] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   25.633369] Read of size 1 at addr ffff800087e9e7f8 by task kunit_try_catch/323
[   25.634034] 
[   25.634191] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.634230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.634242] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.634256] Call trace:
[   25.634265]  show_stack+0x20/0x38 (C)
[   25.634291]  dump_stack_lvl+0x8c/0xd0
[   25.634315]  print_report+0x310/0x608
[   25.634337]  kasan_report+0xdc/0x128
[   25.634358]  __asan_report_load1_noabort+0x20/0x30
[   25.634383]  vmalloc_oob+0x51c/0x5d0
[   25.634406]  kunit_try_run_case+0x170/0x3f0
[   25.634433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.634462]  kthread+0x328/0x630
[   25.634488]  ret_from_fork+0x10/0x20
[   25.634513] 
[   25.640005] The buggy address belongs to the virtual mapping at
[   25.640005]  [ffff800087e9e000, ffff800087ea0000) created by:
[   25.640005]  vmalloc_oob+0x98/0x5d0
[   25.641363] 
[   25.641512] The buggy address belongs to the physical page:
[   25.642019] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe99b
[   25.642732] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.643339] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   25.644043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.644742] page dumped because: kasan: bad access detected
[   25.645248] 
[   25.645395] Memory state around the buggy address:
[   25.645834]  ffff800087e9e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.646489]  ffff800087e9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.647145] >ffff800087e9e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   25.647796]                                                                 ^
[   25.648443]  ffff800087e9e800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.649098]  ffff800087e9e880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.649751] ==================================================================
[   25.612475] ==================================================================
[   25.613876] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   25.614521] Read of size 1 at addr ffff800087e9e7f3 by task kunit_try_catch/323
[   25.615201] 
[   25.615365] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc3 #1 PREEMPT 
[   25.615414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.615430] Hardware name: Radxa ROCK Pi 4B (DT)
[   25.615447] Call trace:
[   25.615459]  show_stack+0x20/0x38 (C)
[   25.615492]  dump_stack_lvl+0x8c/0xd0
[   25.615524]  print_report+0x310/0x608
[   25.615554]  kasan_report+0xdc/0x128
[   25.615584]  __asan_report_load1_noabort+0x20/0x30
[   25.615619]  vmalloc_oob+0x578/0x5d0
[   25.615651]  kunit_try_run_case+0x170/0x3f0
[   25.615688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.615728]  kthread+0x328/0x630
[   25.615762]  ret_from_fork+0x10/0x20
[   25.615796] 
[   25.621330] The buggy address belongs to the virtual mapping at
[   25.621330]  [ffff800087e9e000, ffff800087ea0000) created by:
[   25.621330]  vmalloc_oob+0x98/0x5d0
[   25.622708] 
[   25.622864] The buggy address belongs to the physical page:
[   25.623381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe99b
[   25.624107] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   25.624733] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   25.625449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.626159] page dumped because: kasan: bad access detected
[   25.626677] 
[   25.626830] Memory state around the buggy address:
[   25.627280]  ffff800087e9e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.627948]  ffff800087e9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.628616] >ffff800087e9e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   25.629279]                                                              ^
[   25.629914]  ffff800087e9e800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.630582]  ffff800087e9e880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   25.631246] ==================================================================