Hay
Date
June 26, 2025, 11:12 a.m.

Environment
e850-96
qemu-arm64

[   63.558711] ==================================================================
[   63.573117] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   63.579800] Read of size 1 at addr ffff800087b3d7f3 by task kunit_try_catch/318
[   63.587091] 
[   63.588578] CPU: 2 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   63.588636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.588652] Hardware name: WinLink E850-96 board (DT)
[   63.588676] Call trace:
[   63.588690]  show_stack+0x20/0x38 (C)
[   63.588730]  dump_stack_lvl+0x8c/0xd0
[   63.588769]  print_report+0x310/0x608
[   63.588803]  kasan_report+0xdc/0x128
[   63.588835]  __asan_report_load1_noabort+0x20/0x30
[   63.588874]  vmalloc_oob+0x578/0x5d0
[   63.588908]  kunit_try_run_case+0x170/0x3f0
[   63.588945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.588986]  kthread+0x328/0x630
[   63.589023]  ret_from_fork+0x10/0x20
[   63.589060] 
[   63.650809] The buggy address belongs to the virtual mapping at
[   63.650809]  [ffff800087b3d000, ffff800087b3f000) created by:
[   63.650809]  vmalloc_oob+0x98/0x5d0
[   63.665908] 
[   63.667388] The buggy address belongs to the physical page:
[   63.672944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886532
[   63.680927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.687451] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.695168] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.702886] page dumped because: kasan: bad access detected
[   63.708445] 
[   63.709917] Memory state around the buggy address:
[   63.714699]  ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.721900]  ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.729106] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.736306]                                                              ^
[   63.743169]  ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.750372]  ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.757575] ==================================================================
[   63.764906] ==================================================================
[   63.771987] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   63.778667] Read of size 1 at addr ffff800087b3d7f8 by task kunit_try_catch/318
[   63.785958] 
[   63.787443] CPU: 2 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   63.787495] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.787511] Hardware name: WinLink E850-96 board (DT)
[   63.787533] Call trace:
[   63.787546]  show_stack+0x20/0x38 (C)
[   63.787584]  dump_stack_lvl+0x8c/0xd0
[   63.787622]  print_report+0x310/0x608
[   63.787654]  kasan_report+0xdc/0x128
[   63.787686]  __asan_report_load1_noabort+0x20/0x30
[   63.787722]  vmalloc_oob+0x51c/0x5d0
[   63.787754]  kunit_try_run_case+0x170/0x3f0
[   63.787796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.787837]  kthread+0x328/0x630
[   63.787874]  ret_from_fork+0x10/0x20
[   63.787907] 
[   63.849676] The buggy address belongs to the virtual mapping at
[   63.849676]  [ffff800087b3d000, ffff800087b3f000) created by:
[   63.849676]  vmalloc_oob+0x98/0x5d0
[   63.864778] 
[   63.866257] The buggy address belongs to the physical page:
[   63.871812] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886532
[   63.879796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.886318] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   63.894036] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   63.901755] page dumped because: kasan: bad access detected
[   63.907312] 
[   63.908786] Memory state around the buggy address:
[   63.913566]  ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.920769]  ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   63.927974] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   63.935175]                                                                 ^
[   63.942298]  ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.949503]  ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   63.956703] ==================================================================

[   20.935724] ==================================================================
[   20.935891] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   20.936223] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271
[   20.936360] 
[   20.936568] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.937078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.937203] Hardware name: linux,dummy-virt (DT)
[   20.937367] Call trace:
[   20.937490]  show_stack+0x20/0x38 (C)
[   20.937791]  dump_stack_lvl+0x8c/0xd0
[   20.938028]  print_report+0x310/0x608
[   20.938253]  kasan_report+0xdc/0x128
[   20.938397]  __asan_report_load1_noabort+0x20/0x30
[   20.938612]  vmalloc_oob+0x51c/0x5d0
[   20.938704]  kunit_try_run_case+0x170/0x3f0
[   20.938777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.938833]  kthread+0x328/0x630
[   20.938892]  ret_from_fork+0x10/0x20
[   20.938977] 
[   20.939007] The buggy address belongs to the virtual mapping at
[   20.939007]  [ffff80008010b000, ffff80008010d000) created by:
[   20.939007]  vmalloc_oob+0x98/0x5d0
[   20.939085] 
[   20.939106] The buggy address belongs to the physical page:
[   20.939139] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791f
[   20.939208] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.939281] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.939337] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.939384] page dumped because: kasan: bad access detected
[   20.939418] 
[   20.939447] Memory state around the buggy address:
[   20.939481]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.939539]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.939608] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.939664]                                                                 ^
[   20.939717]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.939763]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.939806] ==================================================================
[   20.931266] ==================================================================
[   20.931335] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   20.931397] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271
[   20.931451] 
[   20.931486] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.4-rc3 #1 PREEMPT 
[   20.931589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.931620] Hardware name: linux,dummy-virt (DT)
[   20.931656] Call trace:
[   20.931679]  show_stack+0x20/0x38 (C)
[   20.931731]  dump_stack_lvl+0x8c/0xd0
[   20.931781]  print_report+0x310/0x608
[   20.931828]  kasan_report+0xdc/0x128
[   20.931886]  __asan_report_load1_noabort+0x20/0x30
[   20.931938]  vmalloc_oob+0x578/0x5d0
[   20.931984]  kunit_try_run_case+0x170/0x3f0
[   20.932035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.932090]  kthread+0x328/0x630
[   20.932166]  ret_from_fork+0x10/0x20
[   20.932589] 
[   20.932677] The buggy address belongs to the virtual mapping at
[   20.932677]  [ffff80008010b000, ffff80008010d000) created by:
[   20.932677]  vmalloc_oob+0x98/0x5d0
[   20.932874] 
[   20.932960] The buggy address belongs to the physical page:
[   20.932995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10791f
[   20.933335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.933404] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.933550] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.933737] page dumped because: kasan: bad access detected
[   20.933923] 
[   20.934347] Memory state around the buggy address:
[   20.934403]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.934490]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.934537] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.934749]                                                              ^
[   20.934793]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.934840]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.934892] ==================================================================