Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64

[   61.684553] ==================================================================
[   61.691570] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   61.698251] Read of size 1 at addr ffff800087b3d7f8 by task kunit_try_catch/318
[   61.705542] 
[   61.707028] CPU: 5 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   61.707083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.707102] Hardware name: WinLink E850-96 board (DT)
[   61.707122] Call trace:
[   61.707135]  show_stack+0x20/0x38 (C)
[   61.707175]  dump_stack_lvl+0x8c/0xd0
[   61.707211]  print_report+0x310/0x608
[   61.707244]  kasan_report+0xdc/0x128
[   61.707272]  __asan_report_load1_noabort+0x20/0x30
[   61.707307]  vmalloc_oob+0x51c/0x5d0
[   61.707340]  kunit_try_run_case+0x170/0x3f0
[   61.707379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.707419]  kthread+0x328/0x630
[   61.707454]  ret_from_fork+0x10/0x20
[   61.707491] 
[   61.769260] The buggy address belongs to the virtual mapping at
[   61.769260]  [ffff800087b3d000, ffff800087b3f000) created by:
[   61.769260]  vmalloc_oob+0x98/0x5d0
[   61.784360] 
[   61.785840] The buggy address belongs to the physical page:
[   61.791396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886862
[   61.799379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.805900] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   61.813620] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   61.821339] page dumped because: kasan: bad access detected
[   61.826894] 
[   61.828369] Memory state around the buggy address:
[   61.833150]  ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.840353]  ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.847560] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   61.854759]                                                                 ^
[   61.861882]  ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.869085]  ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.876286] ==================================================================
[   61.478327] ==================================================================
[   61.492701] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   61.499384] Read of size 1 at addr ffff800087b3d7f3 by task kunit_try_catch/318
[   61.506675] 
[   61.508162] CPU: 5 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   61.508221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.508241] Hardware name: WinLink E850-96 board (DT)
[   61.508266] Call trace:
[   61.508281]  show_stack+0x20/0x38 (C)
[   61.508316]  dump_stack_lvl+0x8c/0xd0
[   61.508355]  print_report+0x310/0x608
[   61.508386]  kasan_report+0xdc/0x128
[   61.508417]  __asan_report_load1_noabort+0x20/0x30
[   61.508455]  vmalloc_oob+0x578/0x5d0
[   61.508487]  kunit_try_run_case+0x170/0x3f0
[   61.508525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.508566]  kthread+0x328/0x630
[   61.508601]  ret_from_fork+0x10/0x20
[   61.508642] 
[   61.570393] The buggy address belongs to the virtual mapping at
[   61.570393]  [ffff800087b3d000, ffff800087b3f000) created by:
[   61.570393]  vmalloc_oob+0x98/0x5d0
[   61.585492] 
[   61.586972] The buggy address belongs to the physical page:
[   61.592528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886862
[   61.600511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.607034] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   61.614751] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   61.622472] page dumped because: kasan: bad access detected
[   61.628026] 
[   61.629501] Memory state around the buggy address:
[   61.634282]  ffff800087b3d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.641484]  ffff800087b3d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   61.648688] >ffff800087b3d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   61.655890]                                                              ^
[   61.662753]  ffff800087b3d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.669956]  ffff800087b3d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   61.677159] ==================================================================

[   18.562277] ==================================================================
[   18.562581] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   18.562756] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/274
[   18.562863] 
[   18.562897] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.563021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.563051] Hardware name: linux,dummy-virt (DT)
[   18.563238] Call trace:
[   18.563393]  show_stack+0x20/0x38 (C)
[   18.563505]  dump_stack_lvl+0x8c/0xd0
[   18.563556]  print_report+0x310/0x608
[   18.563601]  kasan_report+0xdc/0x128
[   18.563659]  __asan_report_load1_noabort+0x20/0x30
[   18.563709]  vmalloc_oob+0x51c/0x5d0
[   18.563756]  kunit_try_run_case+0x170/0x3f0
[   18.563804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.563859]  kthread+0x328/0x630
[   18.563919]  ret_from_fork+0x10/0x20
[   18.564269] 
[   18.564620] The buggy address belongs to the virtual mapping at
[   18.564620]  [ffff80008010b000, ffff80008010d000) created by:
[   18.564620]  vmalloc_oob+0x98/0x5d0
[   18.564748] 
[   18.564800] The buggy address belongs to the physical page:
[   18.564833] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106efa
[   18.564997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.565101] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.565182] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.565591] page dumped because: kasan: bad access detected
[   18.565735] 
[   18.565881] Memory state around the buggy address:
[   18.566009]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.566198]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.566252] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   18.566537]                                                                 ^
[   18.566804]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.567028]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.567200] ==================================================================
[   18.551870] ==================================================================
[   18.551960] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   18.552413] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/274
[   18.552495] 
[   18.552536] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   18.552636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.552664] Hardware name: linux,dummy-virt (DT)
[   18.553070] Call trace:
[   18.553154]  show_stack+0x20/0x38 (C)
[   18.553226]  dump_stack_lvl+0x8c/0xd0
[   18.553525]  print_report+0x310/0x608
[   18.553735]  kasan_report+0xdc/0x128
[   18.553950]  __asan_report_load1_noabort+0x20/0x30
[   18.554135]  vmalloc_oob+0x578/0x5d0
[   18.554193]  kunit_try_run_case+0x170/0x3f0
[   18.554558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.554801]  kthread+0x328/0x630
[   18.555055]  ret_from_fork+0x10/0x20
[   18.555304] 
[   18.555359] The buggy address belongs to the virtual mapping at
[   18.555359]  [ffff80008010b000, ffff80008010d000) created by:
[   18.555359]  vmalloc_oob+0x98/0x5d0
[   18.555799] 
[   18.555882] The buggy address belongs to the physical page:
[   18.556174] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106efa
[   18.556459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.556565] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.556721] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.556801] page dumped because: kasan: bad access detected
[   18.556836] 
[   18.557107] Memory state around the buggy address:
[   18.557248]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.557401]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.557996] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   18.558172]                                                              ^
[   18.558340]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.558599]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   18.558699] ==================================================================