Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
rk3399-rock-pi-4b |
[ 27.678968] ================================================================== [ 27.679107] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 27.679232] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271 [ 27.679362] [ 27.679600] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.680254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.680331] Hardware name: linux,dummy-virt (DT) [ 27.680418] Call trace: [ 27.680482] show_stack+0x20/0x38 (C) [ 27.680617] dump_stack_lvl+0x8c/0xd0 [ 27.680748] print_report+0x310/0x608 [ 27.680898] kasan_report+0xdc/0x128 [ 27.681256] __asan_report_load1_noabort+0x20/0x30 [ 27.681612] vmalloc_oob+0x578/0x5d0 [ 27.681792] kunit_try_run_case+0x170/0x3f0 [ 27.681996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.682159] kthread+0x328/0x630 [ 27.682319] ret_from_fork+0x10/0x20 [ 27.682475] [ 27.682555] The buggy address belongs to the virtual mapping at [ 27.682555] [ffff80008010b000, ffff80008010d000) created by: [ 27.682555] vmalloc_oob+0x98/0x5d0 [ 27.682769] [ 27.682865] The buggy address belongs to the physical page: [ 27.682977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106805 [ 27.683126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.683320] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 27.683518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.683635] page dumped because: kasan: bad access detected [ 27.683769] [ 27.683890] Memory state around the buggy address: [ 27.684236] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.684704] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.685001] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 27.685406] ^ [ 27.685617] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 27.685887] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 27.686339] ================================================================== [ 27.688536] ================================================================== [ 27.688702] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 27.689081] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271 [ 27.689408] [ 27.689478] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 27.689675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.689744] Hardware name: linux,dummy-virt (DT) [ 27.689817] Call trace: [ 27.689869] show_stack+0x20/0x38 (C) [ 27.690008] dump_stack_lvl+0x8c/0xd0 [ 27.690125] print_report+0x310/0x608 [ 27.690247] kasan_report+0xdc/0x128 [ 27.690569] __asan_report_load1_noabort+0x20/0x30 [ 27.690798] vmalloc_oob+0x51c/0x5d0 [ 27.690995] kunit_try_run_case+0x170/0x3f0 [ 27.691144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.691301] kthread+0x328/0x630 [ 27.691698] ret_from_fork+0x10/0x20 [ 27.692167] [ 27.692240] The buggy address belongs to the virtual mapping at [ 27.692240] [ffff80008010b000, ffff80008010d000) created by: [ 27.692240] vmalloc_oob+0x98/0x5d0 [ 27.693232] [ 27.693560] The buggy address belongs to the physical page: [ 27.693718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106805 [ 27.694072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.694225] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 27.694708] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 27.694836] page dumped because: kasan: bad access detected [ 27.695039] [ 27.695166] Memory state around the buggy address: [ 27.695252] ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.695360] ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.695466] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 27.695574] ^ [ 27.695705] ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 27.696292] ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 27.696399] ==================================================================
[ 25.632063] ================================================================== [ 25.632739] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 25.633369] Read of size 1 at addr ffff800087e9e7f8 by task kunit_try_catch/323 [ 25.634034] [ 25.634191] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.634230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.634242] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.634256] Call trace: [ 25.634265] show_stack+0x20/0x38 (C) [ 25.634291] dump_stack_lvl+0x8c/0xd0 [ 25.634315] print_report+0x310/0x608 [ 25.634337] kasan_report+0xdc/0x128 [ 25.634358] __asan_report_load1_noabort+0x20/0x30 [ 25.634383] vmalloc_oob+0x51c/0x5d0 [ 25.634406] kunit_try_run_case+0x170/0x3f0 [ 25.634433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.634462] kthread+0x328/0x630 [ 25.634488] ret_from_fork+0x10/0x20 [ 25.634513] [ 25.640005] The buggy address belongs to the virtual mapping at [ 25.640005] [ffff800087e9e000, ffff800087ea0000) created by: [ 25.640005] vmalloc_oob+0x98/0x5d0 [ 25.641363] [ 25.641512] The buggy address belongs to the physical page: [ 25.642019] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe99b [ 25.642732] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.643339] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.644043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.644742] page dumped because: kasan: bad access detected [ 25.645248] [ 25.645395] Memory state around the buggy address: [ 25.645834] ffff800087e9e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.646489] ffff800087e9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.647145] >ffff800087e9e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 25.647796] ^ [ 25.648443] ffff800087e9e800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.649098] ffff800087e9e880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.649751] ================================================================== [ 25.612475] ================================================================== [ 25.613876] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 25.614521] Read of size 1 at addr ffff800087e9e7f3 by task kunit_try_catch/323 [ 25.615201] [ 25.615365] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.15.0-rc3 #1 PREEMPT [ 25.615414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.615430] Hardware name: Radxa ROCK Pi 4B (DT) [ 25.615447] Call trace: [ 25.615459] show_stack+0x20/0x38 (C) [ 25.615492] dump_stack_lvl+0x8c/0xd0 [ 25.615524] print_report+0x310/0x608 [ 25.615554] kasan_report+0xdc/0x128 [ 25.615584] __asan_report_load1_noabort+0x20/0x30 [ 25.615619] vmalloc_oob+0x578/0x5d0 [ 25.615651] kunit_try_run_case+0x170/0x3f0 [ 25.615688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.615728] kthread+0x328/0x630 [ 25.615762] ret_from_fork+0x10/0x20 [ 25.615796] [ 25.621330] The buggy address belongs to the virtual mapping at [ 25.621330] [ffff800087e9e000, ffff800087ea0000) created by: [ 25.621330] vmalloc_oob+0x98/0x5d0 [ 25.622708] [ 25.622864] The buggy address belongs to the physical page: [ 25.623381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe99b [ 25.624107] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 25.624733] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 25.625449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 25.626159] page dumped because: kasan: bad access detected [ 25.626677] [ 25.626830] Memory state around the buggy address: [ 25.627280] ffff800087e9e680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.627948] ffff800087e9e700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.628616] >ffff800087e9e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 25.629279] ^ [ 25.629914] ffff800087e9e800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.630582] ffff800087e9e880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 25.631246] ==================================================================