Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
x15

[   63.909761] ==================================================================
[   63.916793] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   63.923475] Read of size 1 at addr ffff800087ced7f8 by task kunit_try_catch/313
[   63.930766] 
[   63.932250] CPU: 6 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   63.932302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.932319] Hardware name: WinLink E850-96 board (DT)
[   63.932340] Call trace:
[   63.932352]  show_stack+0x20/0x38 (C)
[   63.932387]  dump_stack_lvl+0x8c/0xd0
[   63.932427]  print_report+0x310/0x608
[   63.932463]  kasan_report+0xdc/0x128
[   63.932495]  __asan_report_load1_noabort+0x20/0x30
[   63.932527]  vmalloc_oob+0x51c/0x5d0
[   63.932557]  kunit_try_run_case+0x170/0x3f0
[   63.932592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.932634]  kthread+0x328/0x630
[   63.932663]  ret_from_fork+0x10/0x20
[   63.932697] 
[   63.995354] The buggy address belongs to the virtual mapping at
[   63.995354]  [ffff800087ced000, ffff800087cef000) created by:
[   63.995354]  vmalloc_oob+0x98/0x5d0
[   64.010452] 
[   64.011932] The buggy address belongs to the physical page:
[   64.017488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8860c3
[   64.025472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   64.031990] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   64.039712] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   64.047431] page dumped because: kasan: bad access detected
[   64.052988] 
[   64.054462] Memory state around the buggy address:
[   64.059243]  ffff800087ced680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.066445]  ffff800087ced700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   64.073651] >ffff800087ced780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   64.080850]                                                                 ^
[   64.087973]  ffff800087ced800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.095178]  ffff800087ced880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   64.102378] ==================================================================
[   63.702769] ==================================================================
[   63.717059] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   63.723741] Read of size 1 at addr ffff800087ced7f3 by task kunit_try_catch/313
[   63.731029] 
[   63.732515] CPU: 6 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   63.732573] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.732593] Hardware name: WinLink E850-96 board (DT)
[   63.732614] Call trace:
[   63.732631]  show_stack+0x20/0x38 (C)
[   63.732673]  dump_stack_lvl+0x8c/0xd0
[   63.732711]  print_report+0x310/0x608
[   63.732750]  kasan_report+0xdc/0x128
[   63.732782]  __asan_report_load1_noabort+0x20/0x30
[   63.732816]  vmalloc_oob+0x578/0x5d0
[   63.732846]  kunit_try_run_case+0x170/0x3f0
[   63.732881]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.732925]  kthread+0x328/0x630
[   63.732955]  ret_from_fork+0x10/0x20
[   63.732990] 
[   63.795619] The buggy address belongs to the virtual mapping at
[   63.795619]  [ffff800087ced000, ffff800087cef000) created by:
[   63.795619]  vmalloc_oob+0x98/0x5d0
[   63.810716] 
[   63.812196] The buggy address belongs to the physical page:
[   63.817751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8860c3
[   63.825737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.832257] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.839975] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.847696] page dumped because: kasan: bad access detected
[   63.853251] 
[   63.854727] Memory state around the buggy address:
[   63.859507]  ffff800087ced680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.866708]  ffff800087ced700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.873913] >ffff800087ced780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.881114]                                                              ^
[   63.887977]  ffff800087ced800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.895180]  ffff800087ced880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.902381] ==================================================================

[   29.691625] ==================================================================
[   29.691761] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   29.692100] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270
[   29.692459] 
[   29.692546] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.692781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.692908] Hardware name: linux,dummy-virt (DT)
[   29.693046] Call trace:
[   29.693144]  show_stack+0x20/0x38 (C)
[   29.693404]  dump_stack_lvl+0x8c/0xd0
[   29.693550]  print_report+0x310/0x608
[   29.693717]  kasan_report+0xdc/0x128
[   29.694050]  __asan_report_load1_noabort+0x20/0x30
[   29.694273]  vmalloc_oob+0x51c/0x5d0
[   29.694405]  kunit_try_run_case+0x170/0x3f0
[   29.694695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.694841]  kthread+0x328/0x630
[   29.694989]  ret_from_fork+0x10/0x20
[   29.695202] 
[   29.695317] The buggy address belongs to the virtual mapping at
[   29.695317]  [ffff8000800fe000, ffff800080100000) created by:
[   29.695317]  vmalloc_oob+0x98/0x5d0
[   29.695497] 
[   29.695553] The buggy address belongs to the physical page:
[   29.696241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   29.696435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.696646] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.696845] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.696994] page dumped because: kasan: bad access detected
[   29.697170] 
[   29.697267] Memory state around the buggy address:
[   29.697409]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.697514]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.697704] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.697811]                                                                 ^
[   29.697924]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.698176]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.698277] ==================================================================
[   29.681863] ==================================================================
[   29.682034] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   29.682184] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270
[   29.682306] 
[   29.682397] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.682605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.682714] Hardware name: linux,dummy-virt (DT)
[   29.682815] Call trace:
[   29.682891]  show_stack+0x20/0x38 (C)
[   29.683045]  dump_stack_lvl+0x8c/0xd0
[   29.683828]  print_report+0x310/0x608
[   29.683985]  kasan_report+0xdc/0x128
[   29.684185]  __asan_report_load1_noabort+0x20/0x30
[   29.684357]  vmalloc_oob+0x578/0x5d0
[   29.684653]  kunit_try_run_case+0x170/0x3f0
[   29.684821]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.684996]  kthread+0x328/0x630
[   29.685587]  ret_from_fork+0x10/0x20
[   29.685966] 
[   29.686042] The buggy address belongs to the virtual mapping at
[   29.686042]  [ffff8000800fe000, ffff800080100000) created by:
[   29.686042]  vmalloc_oob+0x98/0x5d0
[   29.686480] 
[   29.686561] The buggy address belongs to the physical page:
[   29.687113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5
[   29.687487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.687758] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.687967] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.688168] page dumped because: kasan: bad access detected
[   29.688309] 
[   29.688412] Memory state around the buggy address:
[   29.688498]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.688972]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.689098] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.689210]                                                              ^
[   29.689504]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.689667]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.689869] ==================================================================

[   89.826995] ==================================================================
[   89.842224] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a0/0x6fc
[   89.848999] Read of size 1 at addr f02b57f3 by task kunit_try_catch/321
[   89.855651] 
[   89.857147] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   89.857177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.857208] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.857208] Call trace: 
[   89.857208]  unwind_backtrace from show_stack+0x18/0x1c
[   89.857238]  show_stack from dump_stack_lvl+0x70/0x90
[   89.857269]  dump_stack_lvl from print_report+0x158/0x528
[   89.857299]  print_report from kasan_report+0xdc/0x118
[   89.857330]  kasan_report from vmalloc_oob+0x6a0/0x6fc
[   89.857330]  vmalloc_oob from kunit_try_run_case+0x22c/0x5a8
[   89.857360]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.857391]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.857421]  kthread from ret_from_fork+0x14/0x20
[   89.857452] Exception stack(0xf24fbfb0 to 0xf24fbff8)
[   89.857452] bfa0:                                     00000000 00000000 00000000 00000000
[   89.857482] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.857482] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.857513] 
[   89.962219] The buggy address belongs to the virtual mapping at
[   89.962219]  [f02b5000, f02b7000) created by:
[   89.962219]  vmalloc_oob+0x88/0x6fc
[   89.976043] 
[   89.977539] The buggy address belongs to the physical page:
[   89.983154] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb084f
[   89.990417] flags: 0x80000000(zone=2)
[   89.994140] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   90.002258] raw: 00000000
[   90.004913] page dumped because: kasan: bad access detected
[   90.010528] 
[   90.012023] Memory state around the buggy address:
[   90.016845]  f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.023406]  f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.029998] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   90.036560]                                                      ^
[   90.042785]  f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.049346]  f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.055908] ==================================================================
[   90.063507] ==================================================================
[   90.070800] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a8/0x6fc
[   90.077545] Read of size 1 at addr f02b57f8 by task kunit_try_catch/321
[   90.084197] 
[   90.085693] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   90.085723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   90.085754] Hardware name: Generic DRA74X (Flattened Device Tree)
[   90.085754] Call trace: 
[   90.085754]  unwind_backtrace from show_stack+0x18/0x1c
[   90.085784]  show_stack from dump_stack_lvl+0x70/0x90
[   90.085815]  dump_stack_lvl from print_report+0x158/0x528
[   90.085845]  print_report from kasan_report+0xdc/0x118
[   90.085876]  kasan_report from vmalloc_oob+0x6a8/0x6fc
[   90.085876]  vmalloc_oob from kunit_try_run_case+0x22c/0x5a8
[   90.085906]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   90.085937]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   90.085968]  kthread from ret_from_fork+0x14/0x20
[   90.085998] Exception stack(0xf24fbfb0 to 0xf24fbff8)
[   90.085998] bfa0:                                     00000000 00000000 00000000 00000000
[   90.086029] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   90.086029] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   90.086059] 
[   90.190734] The buggy address belongs to the virtual mapping at
[   90.190734]  [f02b5000, f02b7000) created by:
[   90.190734]  vmalloc_oob+0x88/0x6fc
[   90.204559] 
[   90.206085] The buggy address belongs to the physical page:
[   90.211669] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb084f
[   90.218963] flags: 0x80000000(zone=2)
[   90.222656] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[   90.230804] raw: 00000000
[   90.233428] page dumped because: kasan: bad access detected
[   90.239044] 
[   90.240539] Memory state around the buggy address:
[   90.245361]  f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.251953]  f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   90.258514] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   90.265075]                                                         ^
[   90.271575]  f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.278137]  f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   90.284698] ==================================================================