Hay
Date
July 11, 2025, 10:11 a.m.

Environment
e850-96
qemu-arm64

[   80.765891] ==================================================================
[   80.780266] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   80.786949] Read of size 1 at addr ffff800087c7d7f3 by task kunit_try_catch/353
[   80.794239] 
[   80.795724] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   80.795782] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.795798] Hardware name: WinLink E850-96 board (DT)
[   80.795823] Call trace:
[   80.795841]  show_stack+0x20/0x38 (C)
[   80.795880]  dump_stack_lvl+0x8c/0xd0
[   80.795917]  print_report+0x310/0x5d0
[   80.795948]  kasan_report+0xdc/0x128
[   80.795973]  __asan_report_load1_noabort+0x20/0x30
[   80.796008]  vmalloc_oob+0x578/0x5d0
[   80.796037]  kunit_try_run_case+0x170/0x3f0
[   80.796077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.796110]  kthread+0x328/0x630
[   80.796141]  ret_from_fork+0x10/0x20
[   80.796178] 
[   80.859173] The buggy address ffff800087c7d7f3 belongs to a vmalloc virtual mapping
[   80.866811] The buggy address belongs to the physical page:
[   80.872365] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889
[   80.880352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.886870] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   80.894591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   80.902311] page dumped because: kasan: bad access detected
[   80.907865] 
[   80.909342] Memory state around the buggy address:
[   80.914125]  ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.921323]  ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.928529] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   80.935729]                                                              ^
[   80.942591]  ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   80.949795]  ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   80.956997] ==================================================================
[   80.964301] ==================================================================
[   80.971407] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   80.978090] Read of size 1 at addr ffff800087c7d7f8 by task kunit_try_catch/353
[   80.985381] 
[   80.986864] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   80.986915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.986932] Hardware name: WinLink E850-96 board (DT)
[   80.986954] Call trace:
[   80.986967]  show_stack+0x20/0x38 (C)
[   80.987003]  dump_stack_lvl+0x8c/0xd0
[   80.987036]  print_report+0x310/0x5d0
[   80.987064]  kasan_report+0xdc/0x128
[   80.987090]  __asan_report_load1_noabort+0x20/0x30
[   80.987123]  vmalloc_oob+0x51c/0x5d0
[   80.987154]  kunit_try_run_case+0x170/0x3f0
[   80.987194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.987226]  kthread+0x328/0x630
[   80.987256]  ret_from_fork+0x10/0x20
[   80.987292] 
[   81.050314] The buggy address ffff800087c7d7f8 belongs to a vmalloc virtual mapping
[   81.057953] The buggy address belongs to the physical page:
[   81.063509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889
[   81.071493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   81.078010] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   81.085734] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   81.093454] page dumped because: kasan: bad access detected
[   81.099008] 
[   81.100483] Memory state around the buggy address:
[   81.105262]  ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.112466]  ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.119671] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   81.126872]                                                                 ^
[   81.133994]  ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   81.141199]  ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   81.148399] ==================================================================

[   33.357055] ==================================================================
[   33.357113] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   33.357545] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300
[   33.357652] 
[   33.357732] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.357903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.357932] Hardware name: linux,dummy-virt (DT)
[   33.357966] Call trace:
[   33.358285]  show_stack+0x20/0x38 (C)
[   33.358420]  dump_stack_lvl+0x8c/0xd0
[   33.358793]  print_report+0x310/0x5d0
[   33.358955]  kasan_report+0xdc/0x128
[   33.359277]  __asan_report_load1_noabort+0x20/0x30
[   33.359488]  vmalloc_oob+0x51c/0x5d0
[   33.359841]  kunit_try_run_case+0x170/0x3f0
[   33.359963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.360078]  kthread+0x328/0x630
[   33.360157]  ret_from_fork+0x10/0x20
[   33.360577] 
[   33.360635] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   33.360785] The buggy address belongs to the physical page:
[   33.360843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091c8
[   33.361206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.361308] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.361477] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.361540] page dumped because: kasan: bad access detected
[   33.361663] 
[   33.361685] Memory state around the buggy address:
[   33.361722]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.361775]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.361821] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.362158]                                                                 ^
[   33.362349]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.362575]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.362697] ==================================================================
[   33.348944] ==================================================================
[   33.349036] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   33.349111] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300
[   33.349165] 
[   33.349208] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5-next-20250711 #1 PREEMPT 
[   33.349310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.350311] Hardware name: linux,dummy-virt (DT)
[   33.350746] Call trace:
[   33.350860]  show_stack+0x20/0x38 (C)
[   33.350930]  dump_stack_lvl+0x8c/0xd0
[   33.351030]  print_report+0x310/0x5d0
[   33.351221]  kasan_report+0xdc/0x128
[   33.351420]  __asan_report_load1_noabort+0x20/0x30
[   33.351719]  vmalloc_oob+0x578/0x5d0
[   33.351926]  kunit_try_run_case+0x170/0x3f0
[   33.352275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.352435]  kthread+0x328/0x630
[   33.352523]  ret_from_fork+0x10/0x20
[   33.352712] 
[   33.352742] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   33.352804] The buggy address belongs to the physical page:
[   33.353152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091c8
[   33.353414] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.353594] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.353687] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.353734] page dumped because: kasan: bad access detected
[   33.353769] 
[   33.353804] Memory state around the buggy address:
[   33.354127]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.354280]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.354616] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.354680]                                                              ^
[   33.354820]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.354893]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.355289] ==================================================================