Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
rk3399-rock-pi-4b

[   63.542893] ==================================================================
[   63.557278] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   63.563959] Read of size 1 at addr ffff800087cdd7f3 by task kunit_try_catch/316
[   63.571249] 
[   63.572736] CPU: 2 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   63.572794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.572811] Hardware name: WinLink E850-96 board (DT)
[   63.572835] Call trace:
[   63.572853]  show_stack+0x20/0x38 (C)
[   63.572893]  dump_stack_lvl+0x8c/0xd0
[   63.572930]  print_report+0x310/0x608
[   63.572967]  kasan_report+0xdc/0x128
[   63.573005]  __asan_report_load1_noabort+0x20/0x30
[   63.573051]  vmalloc_oob+0x578/0x5d0
[   63.573083]  kunit_try_run_case+0x170/0x3f0
[   63.573122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.573162]  kthread+0x328/0x630
[   63.573192]  ret_from_fork+0x10/0x20
[   63.573229] 
[   63.634970] The buggy address belongs to the virtual mapping at
[   63.634970]  [ffff800087cdd000, ffff800087cdf000) created by:
[   63.634970]  vmalloc_oob+0x98/0x5d0
[   63.650069] 
[   63.651547] The buggy address belongs to the physical page:
[   63.657103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646d
[   63.665088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.671610] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.679327] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.687049] page dumped because: kasan: bad access detected
[   63.692602] 
[   63.694077] Memory state around the buggy address:
[   63.698859]  ffff800087cdd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.706060]  ffff800087cdd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.713266] >ffff800087cdd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.720465]                                                              ^
[   63.727329]  ffff800087cdd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.734532]  ffff800087cdd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.741736] ==================================================================
[   63.749077] ==================================================================
[   63.756147] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   63.762827] Read of size 1 at addr ffff800087cdd7f8 by task kunit_try_catch/316
[   63.770118] 
[   63.771601] CPU: 2 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   63.771656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.771673] Hardware name: WinLink E850-96 board (DT)
[   63.771695] Call trace:
[   63.771711]  show_stack+0x20/0x38 (C)
[   63.771748]  dump_stack_lvl+0x8c/0xd0
[   63.771786]  print_report+0x310/0x608
[   63.771821]  kasan_report+0xdc/0x128
[   63.771860]  __asan_report_load1_noabort+0x20/0x30
[   63.771900]  vmalloc_oob+0x51c/0x5d0
[   63.771930]  kunit_try_run_case+0x170/0x3f0
[   63.771968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.772007]  kthread+0x328/0x630
[   63.772037]  ret_from_fork+0x10/0x20
[   63.772071] 
[   63.833836] The buggy address belongs to the virtual mapping at
[   63.833836]  [ffff800087cdd000, ffff800087cdf000) created by:
[   63.833836]  vmalloc_oob+0x98/0x5d0
[   63.848936] 
[   63.850414] The buggy address belongs to the physical page:
[   63.855972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646d
[   63.863955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.870478] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.878196] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.885917] page dumped because: kasan: bad access detected
[   63.891470] 
[   63.892946] Memory state around the buggy address:
[   63.897724]  ffff800087cdd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.904928]  ffff800087cdd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.912135] >ffff800087cdd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.919334]                                                                 ^
[   63.926458]  ffff800087cdd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.933661]  ffff800087cdd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.940861] ==================================================================

[   30.418116] ==================================================================
[   30.418228] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   30.418342] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   30.418782] 
[   30.418915] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.419517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.419621] Hardware name: linux,dummy-virt (DT)
[   30.419864] Call trace:
[   30.419984]  show_stack+0x20/0x38 (C)
[   30.420120]  dump_stack_lvl+0x8c/0xd0
[   30.420253]  print_report+0x310/0x608
[   30.420495]  kasan_report+0xdc/0x128
[   30.420637]  __asan_report_load1_noabort+0x20/0x30
[   30.421210]  vmalloc_oob+0x51c/0x5d0
[   30.421515]  kunit_try_run_case+0x170/0x3f0
[   30.421735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.422001]  kthread+0x328/0x630
[   30.422224]  ret_from_fork+0x10/0x20
[   30.422488] 
[   30.422589] The buggy address belongs to the virtual mapping at
[   30.422589]  [ffff8000800fe000, ffff800080100000) created by:
[   30.422589]  vmalloc_oob+0x98/0x5d0
[   30.422816] 
[   30.422882] The buggy address belongs to the physical page:
[   30.423413] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106442
[   30.423650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.423884] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   30.424043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.424152] page dumped because: kasan: bad access detected
[   30.424228] 
[   30.424281] Memory state around the buggy address:
[   30.424356]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.425007]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.425165] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   30.425293]                                                                 ^
[   30.425631]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.425754]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.426010] ==================================================================
[   30.405657] ==================================================================
[   30.405817] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   30.407263] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   30.407591] 
[   30.407717] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.408693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.409003] Hardware name: linux,dummy-virt (DT)
[   30.409115] Call trace:
[   30.409919]  show_stack+0x20/0x38 (C)
[   30.410301]  dump_stack_lvl+0x8c/0xd0
[   30.410440]  print_report+0x310/0x608
[   30.410622]  kasan_report+0xdc/0x128
[   30.411025]  __asan_report_load1_noabort+0x20/0x30
[   30.411274]  vmalloc_oob+0x578/0x5d0
[   30.411726]  kunit_try_run_case+0x170/0x3f0
[   30.411879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.412043]  kthread+0x328/0x630
[   30.412227]  ret_from_fork+0x10/0x20
[   30.412370] 
[   30.412775] The buggy address belongs to the virtual mapping at
[   30.412775]  [ffff8000800fe000, ffff800080100000) created by:
[   30.412775]  vmalloc_oob+0x98/0x5d0
[   30.413024] 
[   30.413165] The buggy address belongs to the physical page:
[   30.413288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106442
[   30.413547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.413727] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   30.414231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.414762] page dumped because: kasan: bad access detected
[   30.414852] 
[   30.414929] Memory state around the buggy address:
[   30.415105]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.415318]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.415465] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   30.415575]                                                              ^
[   30.415693]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.415896]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.416241] ==================================================================

[   30.516716] ==================================================================
[   30.516892] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   30.517080] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   30.517637] 
[   30.517737] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.518471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.518675] Hardware name: linux,dummy-virt (DT)
[   30.518952] Call trace:
[   30.519024]  show_stack+0x20/0x38 (C)
[   30.519157]  dump_stack_lvl+0x8c/0xd0
[   30.519305]  print_report+0x310/0x608
[   30.519480]  kasan_report+0xdc/0x128
[   30.519692]  __asan_report_load1_noabort+0x20/0x30
[   30.519938]  vmalloc_oob+0x578/0x5d0
[   30.520354]  kunit_try_run_case+0x170/0x3f0
[   30.520887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.521149]  kthread+0x328/0x630
[   30.521467]  ret_from_fork+0x10/0x20
[   30.521906] 
[   30.522041] The buggy address belongs to the virtual mapping at
[   30.522041]  [ffff8000800fe000, ffff800080100000) created by:
[   30.522041]  vmalloc_oob+0x98/0x5d0
[   30.522355] 
[   30.522535] The buggy address belongs to the physical page:
[   30.522730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106473
[   30.523196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.523800] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   30.523968] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.524076] page dumped because: kasan: bad access detected
[   30.524192] 
[   30.524267] Memory state around the buggy address:
[   30.524352]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.524641]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.524951] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   30.525064]                                                              ^
[   30.525184]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.525317]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.526047] ==================================================================
[   30.528408] ==================================================================
[   30.528646] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   30.529166] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   30.529350] 
[   30.529430] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   30.529648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.529724] Hardware name: linux,dummy-virt (DT)
[   30.529799] Call trace:
[   30.530375]  show_stack+0x20/0x38 (C)
[   30.530546]  dump_stack_lvl+0x8c/0xd0
[   30.530675]  print_report+0x310/0x608
[   30.530813]  kasan_report+0xdc/0x128
[   30.531403]  __asan_report_load1_noabort+0x20/0x30
[   30.531581]  vmalloc_oob+0x51c/0x5d0
[   30.531699]  kunit_try_run_case+0x170/0x3f0
[   30.531884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.532283]  kthread+0x328/0x630
[   30.532437]  ret_from_fork+0x10/0x20
[   30.532643] 
[   30.532703] The buggy address belongs to the virtual mapping at
[   30.532703]  [ffff8000800fe000, ffff800080100000) created by:
[   30.532703]  vmalloc_oob+0x98/0x5d0
[   30.533492] 
[   30.533871] The buggy address belongs to the physical page:
[   30.533968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106473
[   30.534746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.535049] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   30.535194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   30.535330] page dumped because: kasan: bad access detected
[   30.535414] 
[   30.535506] Memory state around the buggy address:
[   30.535634]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.535904]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   30.536441] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   30.536609]                                                                 ^
[   30.536802]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.537049]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   30.537151] ==================================================================

[   23.262014] ==================================================================
[   23.262685] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   23.263317] Read of size 1 at addr ffff800087f0c7f8 by task kunit_try_catch/322
[   23.263984] 
[   23.264139] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.264176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.264187] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.264200] Call trace:
[   23.264209]  show_stack+0x20/0x38 (C)
[   23.264234]  dump_stack_lvl+0x8c/0xd0
[   23.264262]  print_report+0x310/0x608
[   23.264286]  kasan_report+0xdc/0x128
[   23.264310]  __asan_report_load1_noabort+0x20/0x30
[   23.264338]  vmalloc_oob+0x51c/0x5d0
[   23.264358]  kunit_try_run_case+0x170/0x3f0
[   23.264384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.264411]  kthread+0x328/0x630
[   23.264432]  ret_from_fork+0x10/0x20
[   23.264457] 
[   23.269951] The buggy address belongs to the virtual mapping at
[   23.269951]  [ffff800087f0c000, ffff800087f0e000) created by:
[   23.269951]  vmalloc_oob+0x98/0x5d0
[   23.271305] 
[   23.271454] The buggy address belongs to the physical page:
[   23.271961] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf691
[   23.272673] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.273280] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.273984] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.274682] page dumped because: kasan: bad access detected
[   23.275188] 
[   23.275334] Memory state around the buggy address:
[   23.275773]  ffff800087f0c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.276428]  ffff800087f0c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.277082] >ffff800087f0c780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   23.277734]                                                                 ^
[   23.278379]  ffff800087f0c800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   23.279034]  ffff800087f0c880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   23.279685] ==================================================================
[   23.242448] ==================================================================
[   23.243844] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   23.244481] Read of size 1 at addr ffff800087f0c7f3 by task kunit_try_catch/322
[   23.245161] 
[   23.245324] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   23.245373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.245389] Hardware name: Radxa ROCK Pi 4B (DT)
[   23.245406] Call trace:
[   23.245418]  show_stack+0x20/0x38 (C)
[   23.245454]  dump_stack_lvl+0x8c/0xd0
[   23.245490]  print_report+0x310/0x608
[   23.245524]  kasan_report+0xdc/0x128
[   23.245557]  __asan_report_load1_noabort+0x20/0x30
[   23.245596]  vmalloc_oob+0x578/0x5d0
[   23.245626]  kunit_try_run_case+0x170/0x3f0
[   23.245660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.245700]  kthread+0x328/0x630
[   23.245726]  ret_from_fork+0x10/0x20
[   23.245759] 
[   23.251292] The buggy address belongs to the virtual mapping at
[   23.251292]  [ffff800087f0c000, ffff800087f0e000) created by:
[   23.251292]  vmalloc_oob+0x98/0x5d0
[   23.252665] 
[   23.252821] The buggy address belongs to the physical page:
[   23.253338] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf691
[   23.254063] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   23.254688] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   23.255405] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   23.256115] page dumped because: kasan: bad access detected
[   23.256630] 
[   23.256784] Memory state around the buggy address:
[   23.257233]  ffff800087f0c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.257900]  ffff800087f0c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.258568] >ffff800087f0c780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   23.259230]                                                              ^
[   23.259864]  ffff800087f0c800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   23.260531]  ffff800087f0c880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   23.261194] ==================================================================