Hay
Date
July 13, 2025, 11:09 p.m.

Environment
qemu-arm64

[   18.810436] ==================================================================
[   18.810795] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   18.810902] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270
[   18.810987] 
[   18.811040] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.811484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.811538] Hardware name: linux,dummy-virt (DT)
[   18.811576] Call trace:
[   18.811610]  show_stack+0x20/0x38 (C)
[   18.811853]  dump_stack_lvl+0x8c/0xd0
[   18.812036]  print_report+0x310/0x5d0
[   18.812097]  kasan_report+0xdc/0x128
[   18.812412]  __asan_report_load1_noabort+0x20/0x30
[   18.812647]  vmalloc_oob+0x578/0x5d0
[   18.812904]  kunit_try_run_case+0x170/0x3f0
[   18.813069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.813139]  kthread+0x328/0x630
[   18.813246]  ret_from_fork+0x10/0x20
[   18.813422] 
[   18.813623] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   18.813898] The buggy address belongs to the physical page:
[   18.814163] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cf
[   18.814636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.814804] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.814876] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.814948] page dumped because: kasan: bad access detected
[   18.815113] 
[   18.815193] Memory state around the buggy address:
[   18.815258]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.815407]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.815466] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   18.815516]                                                              ^
[   18.815581]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.815632]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.815684] ==================================================================
[   18.816374] ==================================================================
[   18.816428] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   18.816495] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270
[   18.816554] 
[   18.816586] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.816670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.816710] Hardware name: linux,dummy-virt (DT)
[   18.816743] Call trace:
[   18.816766]  show_stack+0x20/0x38 (C)
[   18.816813]  dump_stack_lvl+0x8c/0xd0
[   18.816867]  print_report+0x310/0x5d0
[   18.816913]  kasan_report+0xdc/0x128
[   18.816958]  __asan_report_load1_noabort+0x20/0x30
[   18.817011]  vmalloc_oob+0x51c/0x5d0
[   18.817064]  kunit_try_run_case+0x170/0x3f0
[   18.817121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.817176]  kthread+0x328/0x630
[   18.817243]  ret_from_fork+0x10/0x20
[   18.817820] 
[   18.818258] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   18.818364] The buggy address belongs to the physical page:
[   18.818423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058cf
[   18.818772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.819005] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.819485] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.819557] page dumped because: kasan: bad access detected
[   18.819930] 
[   18.820034] Memory state around the buggy address:
[   18.820114]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.820259]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.820331] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   18.820372]                                                                 ^
[   18.820417]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.820665]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.820981] ==================================================================

[   19.566887] ==================================================================
[   19.566959] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   19.567061] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270
[   19.567115] 
[   19.567154] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.567300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.567334] Hardware name: linux,dummy-virt (DT)
[   19.567369] Call trace:
[   19.568281]  show_stack+0x20/0x38 (C)
[   19.568380]  dump_stack_lvl+0x8c/0xd0
[   19.568452]  print_report+0x310/0x5d0
[   19.568541]  kasan_report+0xdc/0x128
[   19.568625]  __asan_report_load1_noabort+0x20/0x30
[   19.568696]  vmalloc_oob+0x578/0x5d0
[   19.568966]  kunit_try_run_case+0x170/0x3f0
[   19.569208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.569321]  kthread+0x328/0x630
[   19.569368]  ret_from_fork+0x10/0x20
[   19.569726] 
[   19.569799] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   19.569903] The buggy address belongs to the physical page:
[   19.569940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae9
[   19.570278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.570470] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.570544] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.570606] page dumped because: kasan: bad access detected
[   19.570901] 
[   19.570990] Memory state around the buggy address:
[   19.571083]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.571168]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.571293] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.571358]                                                              ^
[   19.571540]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.571733]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.571859] ==================================================================
[   19.573523] ==================================================================
[   19.573587] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   19.573858] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270
[   19.574882] 
[   19.574936] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.575089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.575342] Hardware name: linux,dummy-virt (DT)
[   19.575375] Call trace:
[   19.575398]  show_stack+0x20/0x38 (C)
[   19.575450]  dump_stack_lvl+0x8c/0xd0
[   19.575496]  print_report+0x310/0x5d0
[   19.575543]  kasan_report+0xdc/0x128
[   19.576316]  __asan_report_load1_noabort+0x20/0x30
[   19.576553]  vmalloc_oob+0x51c/0x5d0
[   19.576599]  kunit_try_run_case+0x170/0x3f0
[   19.576649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.577198]  kthread+0x328/0x630
[   19.577654]  ret_from_fork+0x10/0x20
[   19.578153] 
[   19.578424] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   19.578564] The buggy address belongs to the physical page:
[   19.578864] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ae9
[   19.579074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.579139] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.580060] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.580117] page dumped because: kasan: bad access detected
[   19.580215] 
[   19.580338] Memory state around the buggy address:
[   19.580518]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.580867]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.581285] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.581680]                                                                 ^
[   19.581768]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.581971]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.582534] ==================================================================