Date
July 14, 2025, 10:38 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 |
[ 79.485248] ================================================================== [ 79.499710] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 79.506390] Read of size 1 at addr ffff800087c7d7f3 by task kunit_try_catch/353 [ 79.513683] [ 79.515168] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 79.515222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.515239] Hardware name: WinLink E850-96 board (DT) [ 79.515262] Call trace: [ 79.515280] show_stack+0x20/0x38 (C) [ 79.515317] dump_stack_lvl+0x8c/0xd0 [ 79.515351] print_report+0x310/0x5d0 [ 79.515381] kasan_report+0xdc/0x128 [ 79.515411] __asan_report_load1_noabort+0x20/0x30 [ 79.515446] vmalloc_oob+0x578/0x5d0 [ 79.515479] kunit_try_run_case+0x170/0x3f0 [ 79.515517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.515552] kthread+0x328/0x630 [ 79.515585] ret_from_fork+0x10/0x20 [ 79.515623] [ 79.578614] The buggy address ffff800087c7d7f3 belongs to a vmalloc virtual mapping [ 79.586253] The buggy address belongs to the physical page: [ 79.591810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8847c6 [ 79.599793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.606314] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 79.614034] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 79.621753] page dumped because: kasan: bad access detected [ 79.627308] [ 79.628783] Memory state around the buggy address: [ 79.633565] ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.640766] ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.647972] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 79.655172] ^ [ 79.662035] ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 79.669238] ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 79.676440] ================================================================== [ 79.683837] ================================================================== [ 79.690853] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 79.697534] Read of size 1 at addr ffff800087c7d7f8 by task kunit_try_catch/353 [ 79.704824] [ 79.706309] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 79.706362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.706379] Hardware name: WinLink E850-96 board (DT) [ 79.706399] Call trace: [ 79.706413] show_stack+0x20/0x38 (C) [ 79.706447] dump_stack_lvl+0x8c/0xd0 [ 79.706480] print_report+0x310/0x5d0 [ 79.706508] kasan_report+0xdc/0x128 [ 79.706535] __asan_report_load1_noabort+0x20/0x30 [ 79.706572] vmalloc_oob+0x51c/0x5d0 [ 79.706607] kunit_try_run_case+0x170/0x3f0 [ 79.706644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.706677] kthread+0x328/0x630 [ 79.706708] ret_from_fork+0x10/0x20 [ 79.706744] [ 79.769756] The buggy address ffff800087c7d7f8 belongs to a vmalloc virtual mapping [ 79.777395] The buggy address belongs to the physical page: [ 79.782949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8847c6 [ 79.790937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.797456] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 79.805176] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 79.812895] page dumped because: kasan: bad access detected [ 79.818451] [ 79.819926] Memory state around the buggy address: [ 79.824705] ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.831909] ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.839114] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 79.846315] ^ [ 79.853438] ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 79.860641] ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 79.867842] ==================================================================
[ 32.731467] ================================================================== [ 32.732147] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 32.732751] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 32.733133] [ 32.733257] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.733641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.733753] Hardware name: linux,dummy-virt (DT) [ 32.733838] Call trace: [ 32.733864] show_stack+0x20/0x38 (C) [ 32.734247] dump_stack_lvl+0x8c/0xd0 [ 32.734360] print_report+0x310/0x5d0 [ 32.734428] kasan_report+0xdc/0x128 [ 32.734753] __asan_report_load1_noabort+0x20/0x30 [ 32.734928] vmalloc_oob+0x578/0x5d0 [ 32.735109] kunit_try_run_case+0x170/0x3f0 [ 32.735221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.735548] kthread+0x328/0x630 [ 32.735860] ret_from_fork+0x10/0x20 [ 32.736032] [ 32.736072] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 32.736227] The buggy address belongs to the physical page: [ 32.736394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a89 [ 32.736735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.736852] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.736933] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.737424] page dumped because: kasan: bad access detected [ 32.737467] [ 32.737596] Memory state around the buggy address: [ 32.737791] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.738168] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.738308] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.738352] ^ [ 32.738416] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.738752] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.739065] ================================================================== [ 32.741815] ================================================================== [ 32.741873] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 32.741934] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 32.741986] [ 32.742064] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.742154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.742181] Hardware name: linux,dummy-virt (DT) [ 32.742224] Call trace: [ 32.742250] show_stack+0x20/0x38 (C) [ 32.742304] dump_stack_lvl+0x8c/0xd0 [ 32.742353] print_report+0x310/0x5d0 [ 32.742396] kasan_report+0xdc/0x128 [ 32.742441] __asan_report_load1_noabort+0x20/0x30 [ 32.742489] vmalloc_oob+0x51c/0x5d0 [ 32.742535] kunit_try_run_case+0x170/0x3f0 [ 32.742593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.742647] kthread+0x328/0x630 [ 32.742689] ret_from_fork+0x10/0x20 [ 32.742736] [ 32.742760] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 32.742804] The buggy address belongs to the physical page: [ 32.742848] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a89 [ 32.742907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.742968] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.743019] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.743070] page dumped because: kasan: bad access detected [ 32.743103] [ 32.743131] Memory state around the buggy address: [ 32.743165] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.743210] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.743260] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.743301] ^ [ 32.743343] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.743387] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.743426] ==================================================================