Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
x15 |
[ 63.909761] ================================================================== [ 63.916793] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 63.923475] Read of size 1 at addr ffff800087ced7f8 by task kunit_try_catch/313 [ 63.930766] [ 63.932250] CPU: 6 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 63.932302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.932319] Hardware name: WinLink E850-96 board (DT) [ 63.932340] Call trace: [ 63.932352] show_stack+0x20/0x38 (C) [ 63.932387] dump_stack_lvl+0x8c/0xd0 [ 63.932427] print_report+0x310/0x608 [ 63.932463] kasan_report+0xdc/0x128 [ 63.932495] __asan_report_load1_noabort+0x20/0x30 [ 63.932527] vmalloc_oob+0x51c/0x5d0 [ 63.932557] kunit_try_run_case+0x170/0x3f0 [ 63.932592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.932634] kthread+0x328/0x630 [ 63.932663] ret_from_fork+0x10/0x20 [ 63.932697] [ 63.995354] The buggy address belongs to the virtual mapping at [ 63.995354] [ffff800087ced000, ffff800087cef000) created by: [ 63.995354] vmalloc_oob+0x98/0x5d0 [ 64.010452] [ 64.011932] The buggy address belongs to the physical page: [ 64.017488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8860c3 [ 64.025472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.031990] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 64.039712] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 64.047431] page dumped because: kasan: bad access detected [ 64.052988] [ 64.054462] Memory state around the buggy address: [ 64.059243] ffff800087ced680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.066445] ffff800087ced700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.073651] >ffff800087ced780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 64.080850] ^ [ 64.087973] ffff800087ced800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 64.095178] ffff800087ced880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 64.102378] ================================================================== [ 63.702769] ================================================================== [ 63.717059] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 63.723741] Read of size 1 at addr ffff800087ced7f3 by task kunit_try_catch/313 [ 63.731029] [ 63.732515] CPU: 6 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 63.732573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.732593] Hardware name: WinLink E850-96 board (DT) [ 63.732614] Call trace: [ 63.732631] show_stack+0x20/0x38 (C) [ 63.732673] dump_stack_lvl+0x8c/0xd0 [ 63.732711] print_report+0x310/0x608 [ 63.732750] kasan_report+0xdc/0x128 [ 63.732782] __asan_report_load1_noabort+0x20/0x30 [ 63.732816] vmalloc_oob+0x578/0x5d0 [ 63.732846] kunit_try_run_case+0x170/0x3f0 [ 63.732881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.732925] kthread+0x328/0x630 [ 63.732955] ret_from_fork+0x10/0x20 [ 63.732990] [ 63.795619] The buggy address belongs to the virtual mapping at [ 63.795619] [ffff800087ced000, ffff800087cef000) created by: [ 63.795619] vmalloc_oob+0x98/0x5d0 [ 63.810716] [ 63.812196] The buggy address belongs to the physical page: [ 63.817751] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8860c3 [ 63.825737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.832257] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 63.839975] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 63.847696] page dumped because: kasan: bad access detected [ 63.853251] [ 63.854727] Memory state around the buggy address: [ 63.859507] ffff800087ced680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.866708] ffff800087ced700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.873913] >ffff800087ced780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 63.881114] ^ [ 63.887977] ffff800087ced800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.895180] ffff800087ced880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 63.902381] ==================================================================
[ 29.691625] ================================================================== [ 29.691761] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 29.692100] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/270 [ 29.692459] [ 29.692546] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.692781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.692908] Hardware name: linux,dummy-virt (DT) [ 29.693046] Call trace: [ 29.693144] show_stack+0x20/0x38 (C) [ 29.693404] dump_stack_lvl+0x8c/0xd0 [ 29.693550] print_report+0x310/0x608 [ 29.693717] kasan_report+0xdc/0x128 [ 29.694050] __asan_report_load1_noabort+0x20/0x30 [ 29.694273] vmalloc_oob+0x51c/0x5d0 [ 29.694405] kunit_try_run_case+0x170/0x3f0 [ 29.694695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.694841] kthread+0x328/0x630 [ 29.694989] ret_from_fork+0x10/0x20 [ 29.695202] [ 29.695317] The buggy address belongs to the virtual mapping at [ 29.695317] [ffff8000800fe000, ffff800080100000) created by: [ 29.695317] vmalloc_oob+0x98/0x5d0 [ 29.695497] [ 29.695553] The buggy address belongs to the physical page: [ 29.696241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5 [ 29.696435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.696646] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.696845] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.696994] page dumped because: kasan: bad access detected [ 29.697170] [ 29.697267] Memory state around the buggy address: [ 29.697409] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.697514] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.697704] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 29.697811] ^ [ 29.697924] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.698176] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.698277] ================================================================== [ 29.681863] ================================================================== [ 29.682034] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 29.682184] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/270 [ 29.682306] [ 29.682397] CPU: 1 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 29.682605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.682714] Hardware name: linux,dummy-virt (DT) [ 29.682815] Call trace: [ 29.682891] show_stack+0x20/0x38 (C) [ 29.683045] dump_stack_lvl+0x8c/0xd0 [ 29.683828] print_report+0x310/0x608 [ 29.683985] kasan_report+0xdc/0x128 [ 29.684185] __asan_report_load1_noabort+0x20/0x30 [ 29.684357] vmalloc_oob+0x578/0x5d0 [ 29.684653] kunit_try_run_case+0x170/0x3f0 [ 29.684821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.684996] kthread+0x328/0x630 [ 29.685587] ret_from_fork+0x10/0x20 [ 29.685966] [ 29.686042] The buggy address belongs to the virtual mapping at [ 29.686042] [ffff8000800fe000, ffff800080100000) created by: [ 29.686042] vmalloc_oob+0x98/0x5d0 [ 29.686480] [ 29.686561] The buggy address belongs to the physical page: [ 29.687113] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e5 [ 29.687487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.687758] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.687967] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.688168] page dumped because: kasan: bad access detected [ 29.688309] [ 29.688412] Memory state around the buggy address: [ 29.688498] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.688972] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.689098] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 29.689210] ^ [ 29.689504] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.689667] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.689869] ==================================================================
[ 89.826995] ================================================================== [ 89.842224] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a0/0x6fc [ 89.848999] Read of size 1 at addr f02b57f3 by task kunit_try_catch/321 [ 89.855651] [ 89.857147] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 89.857177] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 89.857208] Hardware name: Generic DRA74X (Flattened Device Tree) [ 89.857208] Call trace: [ 89.857208] unwind_backtrace from show_stack+0x18/0x1c [ 89.857238] show_stack from dump_stack_lvl+0x70/0x90 [ 89.857269] dump_stack_lvl from print_report+0x158/0x528 [ 89.857299] print_report from kasan_report+0xdc/0x118 [ 89.857330] kasan_report from vmalloc_oob+0x6a0/0x6fc [ 89.857330] vmalloc_oob from kunit_try_run_case+0x22c/0x5a8 [ 89.857360] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 89.857391] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 89.857421] kthread from ret_from_fork+0x14/0x20 [ 89.857452] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 89.857452] bfa0: 00000000 00000000 00000000 00000000 [ 89.857482] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 89.857482] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 89.857513] [ 89.962219] The buggy address belongs to the virtual mapping at [ 89.962219] [f02b5000, f02b7000) created by: [ 89.962219] vmalloc_oob+0x88/0x6fc [ 89.976043] [ 89.977539] The buggy address belongs to the physical page: [ 89.983154] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb084f [ 89.990417] flags: 0x80000000(zone=2) [ 89.994140] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 90.002258] raw: 00000000 [ 90.004913] page dumped because: kasan: bad access detected [ 90.010528] [ 90.012023] Memory state around the buggy address: [ 90.016845] f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.023406] f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.029998] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 90.036560] ^ [ 90.042785] f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.049346] f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.055908] ================================================================== [ 90.063507] ================================================================== [ 90.070800] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x6a8/0x6fc [ 90.077545] Read of size 1 at addr f02b57f8 by task kunit_try_catch/321 [ 90.084197] [ 90.085693] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 90.085723] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 90.085754] Hardware name: Generic DRA74X (Flattened Device Tree) [ 90.085754] Call trace: [ 90.085754] unwind_backtrace from show_stack+0x18/0x1c [ 90.085784] show_stack from dump_stack_lvl+0x70/0x90 [ 90.085815] dump_stack_lvl from print_report+0x158/0x528 [ 90.085845] print_report from kasan_report+0xdc/0x118 [ 90.085876] kasan_report from vmalloc_oob+0x6a8/0x6fc [ 90.085876] vmalloc_oob from kunit_try_run_case+0x22c/0x5a8 [ 90.085906] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 90.085937] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 90.085968] kthread from ret_from_fork+0x14/0x20 [ 90.085998] Exception stack(0xf24fbfb0 to 0xf24fbff8) [ 90.085998] bfa0: 00000000 00000000 00000000 00000000 [ 90.086029] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 90.086029] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 90.086059] [ 90.190734] The buggy address belongs to the virtual mapping at [ 90.190734] [f02b5000, f02b7000) created by: [ 90.190734] vmalloc_oob+0x88/0x6fc [ 90.204559] [ 90.206085] The buggy address belongs to the physical page: [ 90.211669] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb084f [ 90.218963] flags: 0x80000000(zone=2) [ 90.222656] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 90.230804] raw: 00000000 [ 90.233428] page dumped because: kasan: bad access detected [ 90.239044] [ 90.240539] Memory state around the buggy address: [ 90.245361] f02b5680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.251953] f02b5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 90.258514] >f02b5780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 90.265075] ^ [ 90.271575] f02b5800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.278137] f02b5880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 90.284698] ==================================================================