Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
juno-r2
qemu-arm64

[   76.149071] ==================================================================
[   76.156393] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   76.163184] Read of size 1 at addr ffff80008029d7f8 by task kunit_try_catch/355
[   76.170595] 
[   76.172136] CPU: 0 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   76.172166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   76.172174] Hardware name: Thundercomm Dragonboard 845c (DT)
[   76.172186] Call trace:
[   76.172193]  show_stack+0x20/0x38 (C)
[   76.172211]  dump_stack_lvl+0x8c/0xd0
[   76.172230]  print_report+0x310/0x608
[   76.172250]  kasan_report+0xdc/0x128
[   76.172269]  __asan_report_load1_noabort+0x20/0x30
[   76.172289]  vmalloc_oob+0x51c/0x5d0
[   76.172305]  kunit_try_run_case+0x170/0x3f0
[   76.172325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   76.172348]  kthread+0x328/0x630
[   76.172364]  ret_from_fork+0x10/0x20
[   76.172381] 
[   76.237470] The buggy address belongs to the virtual mapping at
[   76.237470]  [ffff80008029d000, ffff80008029f000) created by:
[   76.237470]  vmalloc_oob+0x98/0x5d0
[   76.252770] 
[   76.254305] The buggy address belongs to the physical page:
[   76.259950] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116f1f
[   76.268061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.274682] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   76.282526] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   76.290365] page dumped because: kasan: bad access detected
[   76.296011] 
[   76.297539] Memory state around the buggy address:
[   76.302401]  ffff80008029d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.309723]  ffff80008029d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.317046] >ffff80008029d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   76.324367]                                                                 ^
[   76.331595]  ffff80008029d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.338917]  ffff80008029d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.346235] ==================================================================
[   75.936637] ==================================================================
[   75.951974] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   75.958772] Read of size 1 at addr ffff80008029d7f3 by task kunit_try_catch/355
[   75.966182] 
[   75.967717] CPU: 0 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   75.967747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   75.967758] Hardware name: Thundercomm Dragonboard 845c (DT)
[   75.967772] Call trace:
[   75.967781]  show_stack+0x20/0x38 (C)
[   75.967801]  dump_stack_lvl+0x8c/0xd0
[   75.967821]  print_report+0x310/0x608
[   75.967843]  kasan_report+0xdc/0x128
[   75.967862]  __asan_report_load1_noabort+0x20/0x30
[   75.967880]  vmalloc_oob+0x578/0x5d0
[   75.967897]  kunit_try_run_case+0x170/0x3f0
[   75.967918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   75.967941]  kthread+0x328/0x630
[   75.967957]  ret_from_fork+0x10/0x20
[   75.967975] 
[   76.033097] The buggy address belongs to the virtual mapping at
[   76.033097]  [ffff80008029d000, ffff80008029f000) created by:
[   76.033097]  vmalloc_oob+0x98/0x5d0
[   76.048392] 
[   76.049925] The buggy address belongs to the physical page:
[   76.055572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116f1f
[   76.063681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   76.070308] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   76.078152] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   76.086000] page dumped because: kasan: bad access detected
[   76.091649] 
[   76.093181] Memory state around the buggy address:
[   76.098043]  ffff80008029d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.105364]  ffff80008029d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.112687] >ffff80008029d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   76.120000]                                                              ^
[   76.126967]  ffff80008029d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.134291]  ffff80008029d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.141612] ==================================================================

[ 1525.445675] ==================================================================
[ 1525.445698] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[ 1525.445729] Read of size 1 at addr ffff800087c5d7f8 by task kunit_try_catch/340
[ 1525.445764] 
[ 1525.445779] CPU: 4 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.445839] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.445859] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.445882] Call trace:
[ 1525.445894]  show_stack+0x20/0x38 (C)
[ 1525.445931]  dump_stack_lvl+0x8c/0xd0
[ 1525.445970]  print_report+0x310/0x608
[ 1525.446011]  kasan_report+0xdc/0x128
[ 1525.446051]  __asan_report_load1_noabort+0x20/0x30
[ 1525.446089]  vmalloc_oob+0x51c/0x5d0
[ 1525.446125]  kunit_try_run_case+0x170/0x3f0
[ 1525.446165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.446212]  kthread+0x328/0x630
[ 1525.446244]  ret_from_fork+0x10/0x20
[ 1525.446282] 
[ 1525.446296] The buggy address belongs to the virtual mapping at
[ 1525.446296]  [ffff800087c5d000, ffff800087c5f000) created by:
[ 1525.446296]  vmalloc_oob+0x98/0x5d0
[ 1525.446354] 
[ 1525.446364] The buggy address belongs to the physical page:
[ 1525.446384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a79b2
[ 1525.446419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.446461] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 1525.446497] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 1525.446526] page dumped because: kasan: bad access detected
[ 1525.446544] 
[ 1525.446554] Memory state around the buggy address:
[ 1525.446575]  ffff800087c5d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1525.446605]  ffff800087c5d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1525.446635] >ffff800087c5d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 1525.446661]                                                                 ^
[ 1525.446688]  ffff800087c5d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 1525.446719]  ffff800087c5d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 1525.446745] ==================================================================
[ 1525.444553] ==================================================================
[ 1525.444581] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[ 1525.444620] Read of size 1 at addr ffff800087c5d7f3 by task kunit_try_catch/340
[ 1525.444655] 
[ 1525.444673] CPU: 4 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G    B   W        N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[ 1525.444736] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[ 1525.444756] Hardware name: ARM Juno development board (r2) (DT)
[ 1525.444780] Call trace:
[ 1525.444793]  show_stack+0x20/0x38 (C)
[ 1525.444830]  dump_stack_lvl+0x8c/0xd0
[ 1525.444871]  print_report+0x310/0x608
[ 1525.444913]  kasan_report+0xdc/0x128
[ 1525.444953]  __asan_report_load1_noabort+0x20/0x30
[ 1525.444991]  vmalloc_oob+0x578/0x5d0
[ 1525.445026]  kunit_try_run_case+0x170/0x3f0
[ 1525.445067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[ 1525.445113]  kthread+0x328/0x630
[ 1525.445145]  ret_from_fork+0x10/0x20
[ 1525.445183] 
[ 1525.445195] The buggy address belongs to the virtual mapping at
[ 1525.445195]  [ffff800087c5d000, ffff800087c5f000) created by:
[ 1525.445195]  vmalloc_oob+0x98/0x5d0
[ 1525.445252] 
[ 1525.445264] The buggy address belongs to the physical page:
[ 1525.445283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8a79b2
[ 1525.445318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 1525.445362] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[ 1525.445398] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[ 1525.445425] page dumped because: kasan: bad access detected
[ 1525.445445] 
[ 1525.445455] Memory state around the buggy address:
[ 1525.445476]  ffff800087c5d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1525.445506]  ffff800087c5d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[ 1525.445537] >ffff800087c5d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[ 1525.445563]                                                              ^
[ 1525.445590]  ffff800087c5d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 1525.445620]  ffff800087c5d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[ 1525.445646] ==================================================================

[   29.923553] ==================================================================
[   29.923603] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   29.924189] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/281
[   29.924321] 
[   29.924521] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.924768] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.924937] Hardware name: linux,dummy-virt (DT)
[   29.925027] Call trace:
[   29.925189]  show_stack+0x20/0x38 (C)
[   29.925293]  dump_stack_lvl+0x8c/0xd0
[   29.925344]  print_report+0x310/0x608
[   29.925710]  kasan_report+0xdc/0x128
[   29.925907]  __asan_report_load1_noabort+0x20/0x30
[   29.926109]  vmalloc_oob+0x51c/0x5d0
[   29.926168]  kunit_try_run_case+0x170/0x3f0
[   29.926218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.926273]  kthread+0x328/0x630
[   29.926316]  ret_from_fork+0x10/0x20
[   29.926367] 
[   29.926457] The buggy address belongs to the virtual mapping at
[   29.926457]  [ffff8000800fe000, ffff800080100000) created by:
[   29.926457]  vmalloc_oob+0x98/0x5d0
[   29.926558] 
[   29.926587] The buggy address belongs to the physical page:
[   29.926621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105783
[   29.926686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.926754] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.926817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.926870] page dumped because: kasan: bad access detected
[   29.926911] 
[   29.926942] Memory state around the buggy address:
[   29.926977]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.927030]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.927087] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.927126]                                                                 ^
[   29.927169]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.927223]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.927264] ==================================================================
[   29.915731] ==================================================================
[   29.916043] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   29.916128] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/281
[   29.916430] 
[   29.916538] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.916684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.916794] Hardware name: linux,dummy-virt (DT)
[   29.916931] Call trace:
[   29.917007]  show_stack+0x20/0x38 (C)
[   29.917375]  dump_stack_lvl+0x8c/0xd0
[   29.917592]  print_report+0x310/0x608
[   29.917806]  kasan_report+0xdc/0x128
[   29.917879]  __asan_report_load1_noabort+0x20/0x30
[   29.918106]  vmalloc_oob+0x578/0x5d0
[   29.918303]  kunit_try_run_case+0x170/0x3f0
[   29.918816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.918983]  kthread+0x328/0x630
[   29.919350]  ret_from_fork+0x10/0x20
[   29.919514] 
[   29.919614] The buggy address belongs to the virtual mapping at
[   29.919614]  [ffff8000800fe000, ffff800080100000) created by:
[   29.919614]  vmalloc_oob+0x98/0x5d0
[   29.919696] 
[   29.919727] The buggy address belongs to the physical page:
[   29.920013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105783
[   29.920255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.920399] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   29.920677] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   29.920997] page dumped because: kasan: bad access detected
[   29.921108] 
[   29.921170] Memory state around the buggy address:
[   29.921282]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.921468]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.921691] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   29.921738]                                                              ^
[   29.921962]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.922268]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   29.922448] ==================================================================