Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
rk3399-rock-pi-4b |
[ 63.542893] ================================================================== [ 63.557278] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 63.563959] Read of size 1 at addr ffff800087cdd7f3 by task kunit_try_catch/316 [ 63.571249] [ 63.572736] CPU: 2 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 63.572794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.572811] Hardware name: WinLink E850-96 board (DT) [ 63.572835] Call trace: [ 63.572853] show_stack+0x20/0x38 (C) [ 63.572893] dump_stack_lvl+0x8c/0xd0 [ 63.572930] print_report+0x310/0x608 [ 63.572967] kasan_report+0xdc/0x128 [ 63.573005] __asan_report_load1_noabort+0x20/0x30 [ 63.573051] vmalloc_oob+0x578/0x5d0 [ 63.573083] kunit_try_run_case+0x170/0x3f0 [ 63.573122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.573162] kthread+0x328/0x630 [ 63.573192] ret_from_fork+0x10/0x20 [ 63.573229] [ 63.634970] The buggy address belongs to the virtual mapping at [ 63.634970] [ffff800087cdd000, ffff800087cdf000) created by: [ 63.634970] vmalloc_oob+0x98/0x5d0 [ 63.650069] [ 63.651547] The buggy address belongs to the physical page: [ 63.657103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646d [ 63.665088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.671610] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 63.679327] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 63.687049] page dumped because: kasan: bad access detected [ 63.692602] [ 63.694077] Memory state around the buggy address: [ 63.698859] ffff800087cdd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.706060] ffff800087cdd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.713266] >ffff800087cdd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 63.720465] ^ [ 63.727329] ffff800087cdd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.734532] ffff800087cdd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.741736] ================================================================== [ 63.749077] ================================================================== [ 63.756147] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 63.762827] Read of size 1 at addr ffff800087cdd7f8 by task kunit_try_catch/316 [ 63.770118] [ 63.771601] CPU: 2 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 63.771656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.771673] Hardware name: WinLink E850-96 board (DT) [ 63.771695] Call trace: [ 63.771711] show_stack+0x20/0x38 (C) [ 63.771748] dump_stack_lvl+0x8c/0xd0 [ 63.771786] print_report+0x310/0x608 [ 63.771821] kasan_report+0xdc/0x128 [ 63.771860] __asan_report_load1_noabort+0x20/0x30 [ 63.771900] vmalloc_oob+0x51c/0x5d0 [ 63.771930] kunit_try_run_case+0x170/0x3f0 [ 63.771968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.772007] kthread+0x328/0x630 [ 63.772037] ret_from_fork+0x10/0x20 [ 63.772071] [ 63.833836] The buggy address belongs to the virtual mapping at [ 63.833836] [ffff800087cdd000, ffff800087cdf000) created by: [ 63.833836] vmalloc_oob+0x98/0x5d0 [ 63.848936] [ 63.850414] The buggy address belongs to the physical page: [ 63.855972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88646d [ 63.863955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.870478] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 63.878196] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 63.885917] page dumped because: kasan: bad access detected [ 63.891470] [ 63.892946] Memory state around the buggy address: [ 63.897724] ffff800087cdd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.904928] ffff800087cdd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.912135] >ffff800087cdd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 63.919334] ^ [ 63.926458] ffff800087cdd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.933661] ffff800087cdd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.940861] ==================================================================
[ 30.418116] ================================================================== [ 30.418228] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 30.418342] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 30.418782] [ 30.418915] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.419517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.419621] Hardware name: linux,dummy-virt (DT) [ 30.419864] Call trace: [ 30.419984] show_stack+0x20/0x38 (C) [ 30.420120] dump_stack_lvl+0x8c/0xd0 [ 30.420253] print_report+0x310/0x608 [ 30.420495] kasan_report+0xdc/0x128 [ 30.420637] __asan_report_load1_noabort+0x20/0x30 [ 30.421210] vmalloc_oob+0x51c/0x5d0 [ 30.421515] kunit_try_run_case+0x170/0x3f0 [ 30.421735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.422001] kthread+0x328/0x630 [ 30.422224] ret_from_fork+0x10/0x20 [ 30.422488] [ 30.422589] The buggy address belongs to the virtual mapping at [ 30.422589] [ffff8000800fe000, ffff800080100000) created by: [ 30.422589] vmalloc_oob+0x98/0x5d0 [ 30.422816] [ 30.422882] The buggy address belongs to the physical page: [ 30.423413] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106442 [ 30.423650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.423884] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 30.424043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.424152] page dumped because: kasan: bad access detected [ 30.424228] [ 30.424281] Memory state around the buggy address: [ 30.424356] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.425007] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.425165] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 30.425293] ^ [ 30.425631] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.425754] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.426010] ================================================================== [ 30.405657] ================================================================== [ 30.405817] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 30.407263] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 30.407591] [ 30.407717] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.408693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.409003] Hardware name: linux,dummy-virt (DT) [ 30.409115] Call trace: [ 30.409919] show_stack+0x20/0x38 (C) [ 30.410301] dump_stack_lvl+0x8c/0xd0 [ 30.410440] print_report+0x310/0x608 [ 30.410622] kasan_report+0xdc/0x128 [ 30.411025] __asan_report_load1_noabort+0x20/0x30 [ 30.411274] vmalloc_oob+0x578/0x5d0 [ 30.411726] kunit_try_run_case+0x170/0x3f0 [ 30.411879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.412043] kthread+0x328/0x630 [ 30.412227] ret_from_fork+0x10/0x20 [ 30.412370] [ 30.412775] The buggy address belongs to the virtual mapping at [ 30.412775] [ffff8000800fe000, ffff800080100000) created by: [ 30.412775] vmalloc_oob+0x98/0x5d0 [ 30.413024] [ 30.413165] The buggy address belongs to the physical page: [ 30.413288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106442 [ 30.413547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.413727] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 30.414231] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.414762] page dumped because: kasan: bad access detected [ 30.414852] [ 30.414929] Memory state around the buggy address: [ 30.415105] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.415318] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.415465] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 30.415575] ^ [ 30.415693] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.415896] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.416241] ==================================================================
[ 30.516716] ================================================================== [ 30.516892] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 30.517080] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269 [ 30.517637] [ 30.517737] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.518471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.518675] Hardware name: linux,dummy-virt (DT) [ 30.518952] Call trace: [ 30.519024] show_stack+0x20/0x38 (C) [ 30.519157] dump_stack_lvl+0x8c/0xd0 [ 30.519305] print_report+0x310/0x608 [ 30.519480] kasan_report+0xdc/0x128 [ 30.519692] __asan_report_load1_noabort+0x20/0x30 [ 30.519938] vmalloc_oob+0x578/0x5d0 [ 30.520354] kunit_try_run_case+0x170/0x3f0 [ 30.520887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.521149] kthread+0x328/0x630 [ 30.521467] ret_from_fork+0x10/0x20 [ 30.521906] [ 30.522041] The buggy address belongs to the virtual mapping at [ 30.522041] [ffff8000800fe000, ffff800080100000) created by: [ 30.522041] vmalloc_oob+0x98/0x5d0 [ 30.522355] [ 30.522535] The buggy address belongs to the physical page: [ 30.522730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106473 [ 30.523196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.523800] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 30.523968] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.524076] page dumped because: kasan: bad access detected [ 30.524192] [ 30.524267] Memory state around the buggy address: [ 30.524352] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.524641] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.524951] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 30.525064] ^ [ 30.525184] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.525317] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.526047] ================================================================== [ 30.528408] ================================================================== [ 30.528646] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 30.529166] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269 [ 30.529350] [ 30.529430] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 30.529648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.529724] Hardware name: linux,dummy-virt (DT) [ 30.529799] Call trace: [ 30.530375] show_stack+0x20/0x38 (C) [ 30.530546] dump_stack_lvl+0x8c/0xd0 [ 30.530675] print_report+0x310/0x608 [ 30.530813] kasan_report+0xdc/0x128 [ 30.531403] __asan_report_load1_noabort+0x20/0x30 [ 30.531581] vmalloc_oob+0x51c/0x5d0 [ 30.531699] kunit_try_run_case+0x170/0x3f0 [ 30.531884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.532283] kthread+0x328/0x630 [ 30.532437] ret_from_fork+0x10/0x20 [ 30.532643] [ 30.532703] The buggy address belongs to the virtual mapping at [ 30.532703] [ffff8000800fe000, ffff800080100000) created by: [ 30.532703] vmalloc_oob+0x98/0x5d0 [ 30.533492] [ 30.533871] The buggy address belongs to the physical page: [ 30.533968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106473 [ 30.534746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.535049] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 30.535194] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 30.535330] page dumped because: kasan: bad access detected [ 30.535414] [ 30.535506] Memory state around the buggy address: [ 30.535634] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.535904] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.536441] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 30.536609] ^ [ 30.536802] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.537049] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 30.537151] ==================================================================
[ 23.262014] ================================================================== [ 23.262685] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 23.263317] Read of size 1 at addr ffff800087f0c7f8 by task kunit_try_catch/322 [ 23.263984] [ 23.264139] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.264176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.264187] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.264200] Call trace: [ 23.264209] show_stack+0x20/0x38 (C) [ 23.264234] dump_stack_lvl+0x8c/0xd0 [ 23.264262] print_report+0x310/0x608 [ 23.264286] kasan_report+0xdc/0x128 [ 23.264310] __asan_report_load1_noabort+0x20/0x30 [ 23.264338] vmalloc_oob+0x51c/0x5d0 [ 23.264358] kunit_try_run_case+0x170/0x3f0 [ 23.264384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.264411] kthread+0x328/0x630 [ 23.264432] ret_from_fork+0x10/0x20 [ 23.264457] [ 23.269951] The buggy address belongs to the virtual mapping at [ 23.269951] [ffff800087f0c000, ffff800087f0e000) created by: [ 23.269951] vmalloc_oob+0x98/0x5d0 [ 23.271305] [ 23.271454] The buggy address belongs to the physical page: [ 23.271961] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf691 [ 23.272673] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.273280] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.273984] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.274682] page dumped because: kasan: bad access detected [ 23.275188] [ 23.275334] Memory state around the buggy address: [ 23.275773] ffff800087f0c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.276428] ffff800087f0c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.277082] >ffff800087f0c780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 23.277734] ^ [ 23.278379] ffff800087f0c800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 23.279034] ffff800087f0c880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 23.279685] ================================================================== [ 23.242448] ================================================================== [ 23.243844] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 23.244481] Read of size 1 at addr ffff800087f0c7f3 by task kunit_try_catch/322 [ 23.245161] [ 23.245324] CPU: 1 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 23.245373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.245389] Hardware name: Radxa ROCK Pi 4B (DT) [ 23.245406] Call trace: [ 23.245418] show_stack+0x20/0x38 (C) [ 23.245454] dump_stack_lvl+0x8c/0xd0 [ 23.245490] print_report+0x310/0x608 [ 23.245524] kasan_report+0xdc/0x128 [ 23.245557] __asan_report_load1_noabort+0x20/0x30 [ 23.245596] vmalloc_oob+0x578/0x5d0 [ 23.245626] kunit_try_run_case+0x170/0x3f0 [ 23.245660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.245700] kthread+0x328/0x630 [ 23.245726] ret_from_fork+0x10/0x20 [ 23.245759] [ 23.251292] The buggy address belongs to the virtual mapping at [ 23.251292] [ffff800087f0c000, ffff800087f0e000) created by: [ 23.251292] vmalloc_oob+0x98/0x5d0 [ 23.252665] [ 23.252821] The buggy address belongs to the physical page: [ 23.253338] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf691 [ 23.254063] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff) [ 23.254688] raw: 03fffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.255405] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.256115] page dumped because: kasan: bad access detected [ 23.256630] [ 23.256784] Memory state around the buggy address: [ 23.257233] ffff800087f0c680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.257900] ffff800087f0c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.258568] >ffff800087f0c780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 23.259230] ^ [ 23.259864] ffff800087f0c800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 23.260531] ffff800087f0c880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 23.261194] ==================================================================