Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64

[   20.255219] ==================================================================
[   20.255364] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   20.255438] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   20.255490] 
[   20.255533] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.255748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.255871] Hardware name: linux,dummy-virt (DT)
[   20.256023] Call trace:
[   20.256103]  show_stack+0x20/0x38 (C)
[   20.256197]  dump_stack_lvl+0x8c/0xd0
[   20.256278]  print_report+0x310/0x5d0
[   20.256328]  kasan_report+0xdc/0x128
[   20.256377]  __asan_report_load1_noabort+0x20/0x30
[   20.256439]  vmalloc_oob+0x578/0x5d0
[   20.256485]  kunit_try_run_case+0x170/0x3f0
[   20.256545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.256600]  kthread+0x328/0x630
[   20.256651]  ret_from_fork+0x10/0x20
[   20.256706] 
[   20.256751] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   20.256800] The buggy address belongs to the physical page:
[   20.256834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107997
[   20.256929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.257012] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.257074] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.257118] page dumped because: kasan: bad access detected
[   20.257152] 
[   20.257172] Memory state around the buggy address:
[   20.257209]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.257255]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.257310] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.257356]                                                              ^
[   20.257403]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.257448]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.257497] ==================================================================
[   20.258774] ==================================================================
[   20.258834] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   20.258911] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   20.258963] 
[   20.259001] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.259085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.259115] Hardware name: linux,dummy-virt (DT)
[   20.259151] Call trace:
[   20.259176]  show_stack+0x20/0x38 (C)
[   20.259225]  dump_stack_lvl+0x8c/0xd0
[   20.259275]  print_report+0x310/0x5d0
[   20.261878]  kasan_report+0xdc/0x128
[   20.261942]  __asan_report_load1_noabort+0x20/0x30
[   20.261994]  vmalloc_oob+0x51c/0x5d0
[   20.262042]  kunit_try_run_case+0x170/0x3f0
[   20.262091]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.262146]  kthread+0x328/0x630
[   20.262191]  ret_from_fork+0x10/0x20
[   20.262241] 
[   20.262265] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   20.262310] The buggy address belongs to the physical page:
[   20.262345] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107997
[   20.262399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.262466] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.262519] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.262561] page dumped because: kasan: bad access detected
[   20.262594] 
[   20.262614] Memory state around the buggy address:
[   20.262648]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.262692]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.262737] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.262776]                                                                 ^
[   20.262820]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.262873]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.262914] ==================================================================

[   19.760874] ==================================================================
[   19.760935] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   19.761196] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   19.761334] 
[   19.761403] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.761487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.761518] Hardware name: linux,dummy-virt (DT)
[   19.761675] Call trace:
[   19.761700]  show_stack+0x20/0x38 (C)
[   19.761751]  dump_stack_lvl+0x8c/0xd0
[   19.761799]  print_report+0x310/0x5d0
[   19.762007]  kasan_report+0xdc/0x128
[   19.762094]  __asan_report_load1_noabort+0x20/0x30
[   19.762372]  vmalloc_oob+0x51c/0x5d0
[   19.762574]  kunit_try_run_case+0x170/0x3f0
[   19.762650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.763031]  kthread+0x328/0x630
[   19.763172]  ret_from_fork+0x10/0x20
[   19.763274] 
[   19.763449] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   19.763615] The buggy address belongs to the physical page:
[   19.763677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107abd
[   19.763764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.763874] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.763990] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.764090] page dumped because: kasan: bad access detected
[   19.764146] 
[   19.764173] Memory state around the buggy address:
[   19.764207]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.764286]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.764632] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.764742]                                                                 ^
[   19.764825]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.764881]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.764930] ==================================================================
[   19.756064] ==================================================================
[   19.756138] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   19.756294] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   19.756363] 
[   19.756534] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.756649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.756684] Hardware name: linux,dummy-virt (DT)
[   19.756721] Call trace:
[   19.756747]  show_stack+0x20/0x38 (C)
[   19.756985]  dump_stack_lvl+0x8c/0xd0
[   19.757092]  print_report+0x310/0x5d0
[   19.757192]  kasan_report+0xdc/0x128
[   19.757291]  __asan_report_load1_noabort+0x20/0x30
[   19.757389]  vmalloc_oob+0x578/0x5d0
[   19.757486]  kunit_try_run_case+0x170/0x3f0
[   19.757624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.757766]  kthread+0x328/0x630
[   19.757871]  ret_from_fork+0x10/0x20
[   19.758003] 
[   19.758079] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   19.758175] The buggy address belongs to the physical page:
[   19.758211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107abd
[   19.758432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.758684] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.758787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.758884] page dumped because: kasan: bad access detected
[   19.758933] 
[   19.758955] Memory state around the buggy address:
[   19.758992]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.759308]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.759404] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.759506]                                                              ^
[   19.759664]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.759844]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.759959] ==================================================================

[   19.406664] ==================================================================
[   19.406732] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   19.406780] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   19.406860] 
[   19.406891] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.406975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.407004] Hardware name: linux,dummy-virt (DT)
[   19.407038] Call trace:
[   19.407060]  show_stack+0x20/0x38 (C)
[   19.407108]  dump_stack_lvl+0x8c/0xd0
[   19.407154]  print_report+0x310/0x5d0
[   19.407202]  kasan_report+0xdc/0x128
[   19.407247]  __asan_report_load1_noabort+0x20/0x30
[   19.407298]  vmalloc_oob+0x51c/0x5d0
[   19.407356]  kunit_try_run_case+0x170/0x3f0
[   19.407405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.407457]  kthread+0x328/0x630
[   19.407500]  ret_from_fork+0x10/0x20
[   19.407547] 
[   19.407569] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   19.407611] The buggy address belongs to the physical page:
[   19.407644] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a6
[   19.407696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.407766] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.407817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.407858] page dumped because: kasan: bad access detected
[   19.407891] 
[   19.407978] Memory state around the buggy address:
[   19.408043]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.408095]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.408140] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.408180]                                                                 ^
[   19.408224]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.408270]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.408310] ==================================================================
[   19.402836] ==================================================================
[   19.403215] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   19.403431] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   19.403600] 
[   19.403687] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.403836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.403866] Hardware name: linux,dummy-virt (DT)
[   19.403900] Call trace:
[   19.403926]  show_stack+0x20/0x38 (C)
[   19.403979]  dump_stack_lvl+0x8c/0xd0
[   19.404028]  print_report+0x310/0x5d0
[   19.404075]  kasan_report+0xdc/0x128
[   19.404123]  __asan_report_load1_noabort+0x20/0x30
[   19.404173]  vmalloc_oob+0x578/0x5d0
[   19.404273]  kunit_try_run_case+0x170/0x3f0
[   19.404380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.404527]  kthread+0x328/0x630
[   19.404614]  ret_from_fork+0x10/0x20
[   19.404843] 
[   19.404951] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   19.405102] The buggy address belongs to the physical page:
[   19.405167] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063a6
[   19.405230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.405294] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.405353] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.405404] page dumped because: kasan: bad access detected
[   19.405448] 
[   19.405479] Memory state around the buggy address:
[   19.405532]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.405578]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.405630] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.405671]                                                              ^
[   19.405733]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.405776]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.405816] ==================================================================