Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64

[   74.562942] ==================================================================
[   74.578277] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   74.585080] Read of size 1 at addr ffff8000802bd7f3 by task kunit_try_catch/367
[   74.592485] 
[   74.594019] CPU: 3 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   74.594050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.594060] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.594073] Call trace:
[   74.594081]  show_stack+0x20/0x38 (C)
[   74.594100]  dump_stack_lvl+0x8c/0xd0
[   74.594120]  print_report+0x310/0x608
[   74.594140]  kasan_report+0xdc/0x128
[   74.594160]  __asan_report_load1_noabort+0x20/0x30
[   74.594179]  vmalloc_oob+0x578/0x5d0
[   74.594196]  kunit_try_run_case+0x170/0x3f0
[   74.594219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.594243]  kthread+0x328/0x630
[   74.594258]  ret_from_fork+0x10/0x20
[   74.594276] 
[   74.659356] The buggy address belongs to the virtual mapping at
[   74.659356]  [ffff8000802bd000, ffff8000802bf000) created by:
[   74.659356]  vmalloc_oob+0x98/0x5d0
[   74.674655] 
[   74.676194] The buggy address belongs to the physical page:
[   74.681845] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1168cc
[   74.689952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.696574] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   74.704424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.712269] page dumped because: kasan: bad access detected
[   74.717919] 
[   74.719449] Memory state around the buggy address:
[   74.724309]  ffff8000802bd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.731628]  ffff8000802bd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.738946] >ffff8000802bd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   74.746261]                                                              ^
[   74.753232]  ffff8000802bd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   74.760549]  ffff8000802bd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   74.767864] ==================================================================
[   74.775255] ==================================================================
[   74.782571] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   74.789372] Read of size 1 at addr ffff8000802bd7f8 by task kunit_try_catch/367
[   74.796776] 
[   74.798312] CPU: 3 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   74.798341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   74.798351] Hardware name: Thundercomm Dragonboard 845c (DT)
[   74.798362] Call trace:
[   74.798370]  show_stack+0x20/0x38 (C)
[   74.798388]  dump_stack_lvl+0x8c/0xd0
[   74.798409]  print_report+0x310/0x608
[   74.798429]  kasan_report+0xdc/0x128
[   74.798449]  __asan_report_load1_noabort+0x20/0x30
[   74.798467]  vmalloc_oob+0x51c/0x5d0
[   74.798484]  kunit_try_run_case+0x170/0x3f0
[   74.798505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   74.798528]  kthread+0x328/0x630
[   74.798543]  ret_from_fork+0x10/0x20
[   74.798563] 
[   74.863663] The buggy address belongs to the virtual mapping at
[   74.863663]  [ffff8000802bd000, ffff8000802bf000) created by:
[   74.863663]  vmalloc_oob+0x98/0x5d0
[   74.878962] 
[   74.880499] The buggy address belongs to the physical page:
[   74.886150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1168cc
[   74.894254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   74.900874] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   74.908724] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.916567] page dumped because: kasan: bad access detected
[   74.922218] 
[   74.923754] Memory state around the buggy address:
[   74.928617]  ffff8000802bd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.935933]  ffff8000802bd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.943253] >ffff8000802bd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   74.950568]                                                                 ^
[   74.957795]  ffff8000802bd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   74.965111]  ffff8000802bd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   74.972425] ==================================================================

[   37.642295] ==================================================================
[   37.642411] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   37.642537] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/280
[   37.642718] 
[   37.642805] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.643312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.643395] Hardware name: linux,dummy-virt (DT)
[   37.643485] Call trace:
[   37.643558]  show_stack+0x20/0x38 (C)
[   37.643778]  dump_stack_lvl+0x8c/0xd0
[   37.643931]  print_report+0x310/0x608
[   37.644050]  kasan_report+0xdc/0x128
[   37.644172]  __asan_report_load1_noabort+0x20/0x30
[   37.644326]  vmalloc_oob+0x51c/0x5d0
[   37.644728]  kunit_try_run_case+0x170/0x3f0
[   37.644924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.645293]  kthread+0x328/0x630
[   37.645517]  ret_from_fork+0x10/0x20
[   37.645648] 
[   37.645717] The buggy address belongs to the virtual mapping at
[   37.645717]  [ffff8000800fe000, ffff800080100000) created by:
[   37.645717]  vmalloc_oob+0x98/0x5d0
[   37.645917] 
[   37.646084] The buggy address belongs to the physical page:
[   37.646221] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107825
[   37.646385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.646783] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.647004] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.647208] page dumped because: kasan: bad access detected
[   37.647333] 
[   37.647395] Memory state around the buggy address:
[   37.647491]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.647714]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.647912] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   37.648167]                                                                 ^
[   37.648436]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.648646]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.648836] ==================================================================
[   37.634139] ==================================================================
[   37.634499] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   37.634819] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/280
[   37.634965] 
[   37.635100] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   37.635407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.635488] Hardware name: linux,dummy-virt (DT)
[   37.635584] Call trace:
[   37.635763]  show_stack+0x20/0x38 (C)
[   37.635941]  dump_stack_lvl+0x8c/0xd0
[   37.636185]  print_report+0x310/0x608
[   37.636456]  kasan_report+0xdc/0x128
[   37.636593]  __asan_report_load1_noabort+0x20/0x30
[   37.636820]  vmalloc_oob+0x578/0x5d0
[   37.636974]  kunit_try_run_case+0x170/0x3f0
[   37.637125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.637350]  kthread+0x328/0x630
[   37.637482]  ret_from_fork+0x10/0x20
[   37.637612] 
[   37.637681] The buggy address belongs to the virtual mapping at
[   37.637681]  [ffff8000800fe000, ffff800080100000) created by:
[   37.637681]  vmalloc_oob+0x98/0x5d0
[   37.637857] 
[   37.637934] The buggy address belongs to the physical page:
[   37.638020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107825
[   37.638150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.638306] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   37.638442] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   37.638547] page dumped because: kasan: bad access detected
[   37.638628] 
[   37.638677] Memory state around the buggy address:
[   37.638758]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.639232]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   37.639608] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   37.639905]                                                              ^
[   37.640170]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.640344]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   37.640484] ==================================================================