Hay
Date
June 2, 2025, 2:11 p.m.

Environment
e850-96
qemu-arm64

[   61.456665] ==================================================================
[   61.470998] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   61.477679] Read of size 1 at addr ffff800087b1d7f3 by task kunit_try_catch/316
[   61.484968] 
[   61.486453] CPU: 4 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   61.486507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.486524] Hardware name: WinLink E850-96 board (DT)
[   61.486549] Call trace:
[   61.486563]  show_stack+0x20/0x38 (C)
[   61.486601]  dump_stack_lvl+0x8c/0xd0
[   61.486635]  print_report+0x310/0x608
[   61.486664]  kasan_report+0xdc/0x128
[   61.486692]  __asan_report_load1_noabort+0x20/0x30
[   61.486724]  vmalloc_oob+0x578/0x5d0
[   61.486753]  kunit_try_run_case+0x170/0x3f0
[   61.486793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.486833]  kthread+0x328/0x630
[   61.486869]  ret_from_fork+0x10/0x20
[   61.486904] 
[   61.548688] The buggy address belongs to the virtual mapping at
[   61.548688]  [ffff800087b1d000, ffff800087b1f000) created by:
[   61.548688]  vmalloc_oob+0x98/0x5d0
[   61.563786] 
[   61.565266] The buggy address belongs to the physical page:
[   61.570822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b19
[   61.578807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.585327] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   61.593046] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   61.600766] page dumped because: kasan: bad access detected
[   61.606322] 
[   61.607797] Memory state around the buggy address:
[   61.612578]  ffff800087b1d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.619778]  ffff800087b1d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.626983] >ffff800087b1d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   61.634185]                                                              ^
[   61.641047]  ffff800087b1d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.648250]  ffff800087b1d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.655453] ==================================================================
[   61.662792] ==================================================================
[   61.669867] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   61.676545] Read of size 1 at addr ffff800087b1d7f8 by task kunit_try_catch/316
[   61.683837] 
[   61.685321] CPU: 4 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G    B            N  6.15.1-rc1 #1 PREEMPT 
[   61.685375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.685391] Hardware name: WinLink E850-96 board (DT)
[   61.685414] Call trace:
[   61.685430]  show_stack+0x20/0x38 (C)
[   61.685463]  dump_stack_lvl+0x8c/0xd0
[   61.685496]  print_report+0x310/0x608
[   61.685530]  kasan_report+0xdc/0x128
[   61.685559]  __asan_report_load1_noabort+0x20/0x30
[   61.685595]  vmalloc_oob+0x51c/0x5d0
[   61.685626]  kunit_try_run_case+0x170/0x3f0
[   61.685664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.685705]  kthread+0x328/0x630
[   61.685740]  ret_from_fork+0x10/0x20
[   61.685776] 
[   61.747555] The buggy address belongs to the virtual mapping at
[   61.747555]  [ffff800087b1d000, ffff800087b1f000) created by:
[   61.747555]  vmalloc_oob+0x98/0x5d0
[   61.762655] 
[   61.764134] The buggy address belongs to the physical page:
[   61.769690] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b19
[   61.777675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.784193] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   61.791914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   61.799633] page dumped because: kasan: bad access detected
[   61.805189] 
[   61.806664] Memory state around the buggy address:
[   61.811445]  ffff800087b1d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.818647]  ffff800087b1d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.825852] >ffff800087b1d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   61.833053]                                                                 ^
[   61.840176]  ffff800087b1d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.847379]  ffff800087b1d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.854580] ==================================================================

[   21.230227] ==================================================================
[   21.230299] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   21.230395] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/272
[   21.230448] 
[   21.230564] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.230760] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.230983] Hardware name: linux,dummy-virt (DT)
[   21.231054] Call trace:
[   21.231549]  show_stack+0x20/0x38 (C)
[   21.231646]  dump_stack_lvl+0x8c/0xd0
[   21.231763]  print_report+0x310/0x608
[   21.231812]  kasan_report+0xdc/0x128
[   21.231965]  __asan_report_load1_noabort+0x20/0x30
[   21.232029]  vmalloc_oob+0x578/0x5d0
[   21.232078]  kunit_try_run_case+0x170/0x3f0
[   21.232133]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.232322]  kthread+0x328/0x630
[   21.232390]  ret_from_fork+0x10/0x20
[   21.232666] 
[   21.232700] The buggy address belongs to the virtual mapping at
[   21.232700]  [ffff80008010b000, ffff80008010d000) created by:
[   21.232700]  vmalloc_oob+0x98/0x5d0
[   21.232779] 
[   21.232828] The buggy address belongs to the physical page:
[   21.232870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f87
[   21.233142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.233232] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.233299] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.233390] page dumped because: kasan: bad access detected
[   21.233441] 
[   21.233462] Memory state around the buggy address:
[   21.233499]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.233703]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.233890] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   21.233939]                                                              ^
[   21.234107]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.234160]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.234206] ==================================================================
[   21.234829] ==================================================================
[   21.234878] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   21.235079] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/272
[   21.235229] 
[   21.235264] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.1-rc1 #1 PREEMPT 
[   21.235617] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   21.235659] Hardware name: linux,dummy-virt (DT)
[   21.235803] Call trace:
[   21.235847]  show_stack+0x20/0x38 (C)
[   21.235901]  dump_stack_lvl+0x8c/0xd0
[   21.235956]  print_report+0x310/0x608
[   21.236195]  kasan_report+0xdc/0x128
[   21.236446]  __asan_report_load1_noabort+0x20/0x30
[   21.236582]  vmalloc_oob+0x51c/0x5d0
[   21.236637]  kunit_try_run_case+0x170/0x3f0
[   21.236801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.236981]  kthread+0x328/0x630
[   21.237044]  ret_from_fork+0x10/0x20
[   21.237097] 
[   21.237123] The buggy address belongs to the virtual mapping at
[   21.237123]  [ffff80008010b000, ffff80008010d000) created by:
[   21.237123]  vmalloc_oob+0x98/0x5d0
[   21.237207] 
[   21.237320] The buggy address belongs to the physical page:
[   21.237387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f87
[   21.237440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.237503] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   21.237555] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.237619] page dumped because: kasan: bad access detected
[   21.237652] 
[   21.237672] Memory state around the buggy address:
[   21.238062]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.238187]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.238298] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   21.238339]                                                                 ^
[   21.238392]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.238438]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   21.238519] ==================================================================