Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64

[   33.897429] ==================================================================
[   33.897762] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   33.898069] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/302
[   33.898124] 
[   33.898194] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.898308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.898409] Hardware name: linux,dummy-virt (DT)
[   33.898447] Call trace:
[   33.898474]  show_stack+0x20/0x38 (C)
[   33.898544]  dump_stack_lvl+0x8c/0xd0
[   33.898602]  print_report+0x310/0x608
[   33.898650]  kasan_report+0xdc/0x128
[   33.898920]  __asan_report_load1_noabort+0x20/0x30
[   33.899292]  vmalloc_oob+0x51c/0x5d0
[   33.899439]  kunit_try_run_case+0x170/0x3f0
[   33.899519]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.899644]  kthread+0x328/0x630
[   33.899715]  ret_from_fork+0x10/0x20
[   33.899798] 
[   33.899854] The buggy address belongs to the virtual mapping at
[   33.899854]  [ffff8000800fe000, ffff800080100000) created by:
[   33.899854]  vmalloc_oob+0x98/0x5d0
[   33.900093] 
[   33.900137] The buggy address belongs to the physical page:
[   33.900372] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091fa
[   33.900461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.900814] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.901030] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.901135] page dumped because: kasan: bad access detected
[   33.901214] 
[   33.901307] Memory state around the buggy address:
[   33.901387]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.901435]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.901641] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.901798]                                                                 ^
[   33.902208]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.902276]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.902505] ==================================================================
[   33.890504] ==================================================================
[   33.890579] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   33.890640] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/302
[   33.890695] 
[   33.890733] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.890835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.890864] Hardware name: linux,dummy-virt (DT)
[   33.890897] Call trace:
[   33.890923]  show_stack+0x20/0x38 (C)
[   33.891533]  dump_stack_lvl+0x8c/0xd0
[   33.891973]  print_report+0x310/0x608
[   33.892077]  kasan_report+0xdc/0x128
[   33.892367]  __asan_report_load1_noabort+0x20/0x30
[   33.892458]  vmalloc_oob+0x578/0x5d0
[   33.892509]  kunit_try_run_case+0x170/0x3f0
[   33.892944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.893047]  kthread+0x328/0x630
[   33.893103]  ret_from_fork+0x10/0x20
[   33.893458] 
[   33.893505] The buggy address belongs to the virtual mapping at
[   33.893505]  [ffff8000800fe000, ffff800080100000) created by:
[   33.893505]  vmalloc_oob+0x98/0x5d0
[   33.893595] 
[   33.893621] The buggy address belongs to the physical page:
[   33.893988] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091fa
[   33.894118] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.894204] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.894639] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.895012] page dumped because: kasan: bad access detected
[   33.895131] 
[   33.895235] Memory state around the buggy address:
[   33.895301]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.895356]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.895754] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.895971]                                                              ^
[   33.896149]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.896201]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.896493] ==================================================================

[   35.455496] ==================================================================
[   35.455592] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   35.455651] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   35.455704] 
[   35.455742] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.455840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.455871] Hardware name: linux,dummy-virt (DT)
[   35.455904] Call trace:
[   35.456143]  show_stack+0x20/0x38 (C)
[   35.456250]  dump_stack_lvl+0x8c/0xd0
[   35.456370]  print_report+0x310/0x608
[   35.456437]  kasan_report+0xdc/0x128
[   35.456516]  __asan_report_load1_noabort+0x20/0x30
[   35.456569]  vmalloc_oob+0x578/0x5d0
[   35.456829]  kunit_try_run_case+0x170/0x3f0
[   35.456944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.457032]  kthread+0x328/0x630
[   35.457104]  ret_from_fork+0x10/0x20
[   35.457219] 
[   35.457287] The buggy address belongs to the virtual mapping at
[   35.457287]  [ffff8000800fe000, ffff800080100000) created by:
[   35.457287]  vmalloc_oob+0x98/0x5d0
[   35.457385] 
[   35.457409] The buggy address belongs to the physical page:
[   35.457445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   35.457662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.457813] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.457909] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.457966] page dumped because: kasan: bad access detected
[   35.458198] 
[   35.458260] Memory state around the buggy address:
[   35.458318]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.458386]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.458432] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   35.458472]                                                              ^
[   35.458516]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.458559]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.458602] ==================================================================
[   35.459626] ==================================================================
[   35.459700] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   35.459752] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   35.459811] 
[   35.459842] CPU: 1 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.459937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.459984] Hardware name: linux,dummy-virt (DT)
[   35.460148] Call trace:
[   35.460306]  show_stack+0x20/0x38 (C)
[   35.460384]  dump_stack_lvl+0x8c/0xd0
[   35.460452]  print_report+0x310/0x608
[   35.460508]  kasan_report+0xdc/0x128
[   35.460591]  __asan_report_load1_noabort+0x20/0x30
[   35.460644]  vmalloc_oob+0x51c/0x5d0
[   35.460702]  kunit_try_run_case+0x170/0x3f0
[   35.460752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.460807]  kthread+0x328/0x630
[   35.460867]  ret_from_fork+0x10/0x20
[   35.460918] 
[   35.460944] The buggy address belongs to the virtual mapping at
[   35.460944]  [ffff8000800fe000, ffff800080100000) created by:
[   35.460944]  vmalloc_oob+0x98/0x5d0
[   35.461019] 
[   35.461041] The buggy address belongs to the physical page:
[   35.461075] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58
[   35.461230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.461298] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   35.461353] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   35.461578] page dumped because: kasan: bad access detected
[   35.461629] 
[   35.461670] Memory state around the buggy address:
[   35.461716]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.461920]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   35.461980] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   35.462022]                                                                 ^
[   35.462248]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.462310]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   35.462357] ==================================================================