Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64

[   80.734994] ==================================================================
[   80.749391] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   80.756071] Read of size 1 at addr ffff800087c8d7f3 by task kunit_try_catch/350
[   80.763361] 
[   80.764845] CPU: 7 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   80.764902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.764920] Hardware name: WinLink E850-96 board (DT)
[   80.764942] Call trace:
[   80.764959]  show_stack+0x20/0x38 (C)
[   80.764996]  dump_stack_lvl+0x8c/0xd0
[   80.765032]  print_report+0x310/0x5d0
[   80.765061]  kasan_report+0xdc/0x128
[   80.765089]  __asan_report_load1_noabort+0x20/0x30
[   80.765124]  vmalloc_oob+0x578/0x5d0
[   80.765158]  kunit_try_run_case+0x170/0x3f0
[   80.765191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.765229]  kthread+0x328/0x630
[   80.765258]  ret_from_fork+0x10/0x20
[   80.765295] 
[   80.828294] The buggy address ffff800087c8d7f3 belongs to a vmalloc virtual mapping
[   80.835933] The buggy address belongs to the physical page:
[   80.841489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889
[   80.849473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   80.855995] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   80.863713] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   80.871434] page dumped because: kasan: bad access detected
[   80.876987] 
[   80.878463] Memory state around the buggy address:
[   80.883242]  ffff800087c8d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.890446]  ffff800087c8d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   80.897650] >ffff800087c8d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   80.904852]                                                              ^
[   80.911714]  ffff800087c8d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   80.918917]  ffff800087c8d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   80.926120] ==================================================================
[   80.933433] ==================================================================
[   80.940531] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   80.947212] Read of size 1 at addr ffff800087c8d7f8 by task kunit_try_catch/350
[   80.954504] 
[   80.955986] CPU: 7 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   80.956042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   80.956057] Hardware name: WinLink E850-96 board (DT)
[   80.956076] Call trace:
[   80.956088]  show_stack+0x20/0x38 (C)
[   80.956119]  dump_stack_lvl+0x8c/0xd0
[   80.956156]  print_report+0x310/0x5d0
[   80.956185]  kasan_report+0xdc/0x128
[   80.956212]  __asan_report_load1_noabort+0x20/0x30
[   80.956244]  vmalloc_oob+0x51c/0x5d0
[   80.956275]  kunit_try_run_case+0x170/0x3f0
[   80.956306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   80.956342]  kthread+0x328/0x630
[   80.956373]  ret_from_fork+0x10/0x20
[   80.956408] 
[   81.019435] The buggy address ffff800087c8d7f8 belongs to a vmalloc virtual mapping
[   81.027076] The buggy address belongs to the physical page:
[   81.032632] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889
[   81.040615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   81.047135] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   81.054856] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   81.062575] page dumped because: kasan: bad access detected
[   81.068130] 
[   81.069606] Memory state around the buggy address:
[   81.074387]  ffff800087c8d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.081589]  ffff800087c8d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   81.088793] >ffff800087c8d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   81.095995]                                                                 ^
[   81.103116]  ffff800087c8d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   81.110321]  ffff800087c8d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   81.117522] ==================================================================

[   33.561343] ==================================================================
[   33.561420] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   33.561503] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/301
[   33.561556] 
[   33.561594] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.561690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.561717] Hardware name: linux,dummy-virt (DT)
[   33.562245] Call trace:
[   33.562287]  show_stack+0x20/0x38 (C)
[   33.562689]  dump_stack_lvl+0x8c/0xd0
[   33.562838]  print_report+0x310/0x5d0
[   33.562953]  kasan_report+0xdc/0x128
[   33.563120]  __asan_report_load1_noabort+0x20/0x30
[   33.563171]  vmalloc_oob+0x578/0x5d0
[   33.563219]  kunit_try_run_case+0x170/0x3f0
[   33.563270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.563324]  kthread+0x328/0x630
[   33.563372]  ret_from_fork+0x10/0x20
[   33.563424] 
[   33.563460] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   33.563522] The buggy address belongs to the physical page:
[   33.563557] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f6
[   33.563790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.563969] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.564184] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.564323] page dumped because: kasan: bad access detected
[   33.564390] 
[   33.564874] Memory state around the buggy address:
[   33.565136]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.565652]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.565707] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.565748]                                                              ^
[   33.565948]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.566250]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.566301] ==================================================================
[   33.569000] ==================================================================
[   33.569055] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   33.569576] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/301
[   33.569691] 
[   33.569726] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   33.569813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.569866] Hardware name: linux,dummy-virt (DT)
[   33.569900] Call trace:
[   33.569973]  show_stack+0x20/0x38 (C)
[   33.570112]  dump_stack_lvl+0x8c/0xd0
[   33.570532]  print_report+0x310/0x5d0
[   33.570777]  kasan_report+0xdc/0x128
[   33.570845]  __asan_report_load1_noabort+0x20/0x30
[   33.570895]  vmalloc_oob+0x51c/0x5d0
[   33.570943]  kunit_try_run_case+0x170/0x3f0
[   33.571137]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.571342]  kthread+0x328/0x630
[   33.571392]  ret_from_fork+0x10/0x20
[   33.571791] 
[   33.571822] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   33.571967] The buggy address belongs to the physical page:
[   33.572020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f6
[   33.572075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.572141] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   33.572193] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   33.572234] page dumped because: kasan: bad access detected
[   33.572267] 
[   33.572308] Memory state around the buggy address:
[   33.572474]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.572595]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.572641] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   33.572791]                                                                 ^
[   33.572833]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.572915]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   33.573068] ==================================================================