Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   29.307632] ==================================================================
[   29.318756] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   29.325727] Read of size 1 at addr ffff000080a5511f by task kunit_try_catch/236
[   29.333137] 
[   29.334674] CPU: 2 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   29.334706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.334715] Hardware name: Thundercomm Dragonboard 845c (DT)
[   29.334728] Call trace:
[   29.334735]  show_stack+0x20/0x38 (C)
[   29.334754]  dump_stack_lvl+0x8c/0xd0
[   29.334775]  print_report+0x118/0x608
[   29.334796]  kasan_report+0xdc/0x128
[   29.334814]  __asan_report_load1_noabort+0x20/0x30
[   29.334831]  kmalloc_oob_left+0x2ec/0x320
[   29.334849]  kunit_try_run_case+0x170/0x3f0
[   29.334869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.334890]  kthread+0x328/0x630
[   29.334905]  ret_from_fork+0x10/0x20
[   29.334922] 
[   29.400476] Allocated by task 67:
[   29.403850]  kasan_save_stack+0x3c/0x68
[   29.407760]  kasan_save_track+0x20/0x40
[   29.411670]  kasan_save_alloc_info+0x40/0x58
[   29.416005]  __kasan_kmalloc+0xd4/0xd8
[   29.419826]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   29.425484]  kvasprintf+0xe0/0x180
[   29.428951]  kasprintf+0xd0/0x110
[   29.432327]  pinctrl_dt_to_map+0x118/0x778
[   29.436499]  create_pinctrl+0x120/0xb60
[   29.440408]  pinctrl_get+0xf4/0x1d0
[   29.443957]  devm_pinctrl_get+0x54/0xc8
[   29.447865]  pinctrl_bind_pins+0xa4/0x6e0
[   29.451951]  really_probe+0x94/0x7f0
[   29.455590]  __driver_probe_device+0x164/0x378
[   29.460110]  driver_probe_device+0x64/0x180
[   29.464360]  __device_attach_driver+0x174/0x280
[   29.468969]  bus_for_each_drv+0x118/0x1b0
[   29.473054]  __device_attach+0x174/0x378
[   29.477047]  device_initial_probe+0x1c/0x30
[   29.481297]  bus_probe_device+0x12c/0x170
[   29.485381]  deferred_probe_work_func+0x140/0x208
[   29.490161]  process_one_work+0x530/0xf98
[   29.494245]  worker_thread+0x618/0xf38
[   29.498064]  kthread+0x328/0x630
[   29.501354]  ret_from_fork+0x10/0x20
[   29.504991] 
[   29.506521] Freed by task 67:
[   29.509547]  kasan_save_stack+0x3c/0x68
[   29.513455]  kasan_save_track+0x20/0x40
[   29.517365]  kasan_save_free_info+0x4c/0x78
[   29.521615]  __kasan_slab_free+0x6c/0x98
[   29.525612]  kfree+0x214/0x3c8
[   29.528729]  pinctrl_dt_to_map+0x144/0x778
[   29.532898]  create_pinctrl+0x120/0xb60
[   29.536805]  pinctrl_get+0xf4/0x1d0
[   29.540356]  devm_pinctrl_get+0x54/0xc8
[   29.544262]  pinctrl_bind_pins+0xa4/0x6e0
[   29.548346]  really_probe+0x94/0x7f0
[   29.551982]  __driver_probe_device+0x164/0x378
[   29.556501]  driver_probe_device+0x64/0x180
[   29.560752]  __device_attach_driver+0x174/0x280
[   29.565361]  bus_for_each_drv+0x118/0x1b0
[   29.569444]  __device_attach+0x174/0x378
[   29.573439]  device_initial_probe+0x1c/0x30
[   29.577690]  bus_probe_device+0x12c/0x170
[   29.581772]  deferred_probe_work_func+0x140/0x208
[   29.586553]  process_one_work+0x530/0xf98
[   29.590633]  worker_thread+0x618/0xf38
[   29.594451]  kthread+0x328/0x630
[   29.597741]  ret_from_fork+0x10/0x20
[   29.601378] 
[   29.602908] The buggy address belongs to the object at ffff000080a55100
[   29.602908]  which belongs to the cache kmalloc-16 of size 16
[   29.615393] The buggy address is located 15 bytes to the right of
[   29.615393]  allocated 16-byte region [ffff000080a55100, ffff000080a55110)
[   29.628495] 
[   29.630026] The buggy address belongs to the physical page:
[   29.635670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a55
[   29.643780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.650396] page_type: f5(slab)
[   29.653600] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000
[   29.661451] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   29.669290] page dumped because: kasan: bad access detected
[   29.674938] 
[   29.676472] Memory state around the buggy address:
[   29.681333]  ffff000080a55000: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc
[   29.688654]  ffff000080a55080: 00 06 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc
[   29.695976] >ffff000080a55100: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc
[   29.703288]                             ^
[   29.707363]  ffff000080a55180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.714679]  ffff000080a55200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.721998] ==================================================================

[   32.332985] ==================================================================
[   32.333106] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   32.333220] Read of size 1 at addr fff00000c575725f by task kunit_try_catch/149
[   32.333331] 
[   32.333405] CPU: 0 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   32.333595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.333659] Hardware name: linux,dummy-virt (DT)
[   32.333729] Call trace:
[   32.333777]  show_stack+0x20/0x38 (C)
[   32.334179]  dump_stack_lvl+0x8c/0xd0
[   32.334372]  print_report+0x118/0x608
[   32.334942]  kasan_report+0xdc/0x128
[   32.335080]  __asan_report_load1_noabort+0x20/0x30
[   32.335263]  kmalloc_oob_left+0x2ec/0x320
[   32.335394]  kunit_try_run_case+0x170/0x3f0
[   32.335590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.336513]  kthread+0x328/0x630
[   32.336651]  ret_from_fork+0x10/0x20
[   32.336925] 
[   32.336980] Allocated by task 11:
[   32.337056]  kasan_save_stack+0x3c/0x68
[   32.337295]  kasan_save_track+0x20/0x40
[   32.337389]  kasan_save_alloc_info+0x40/0x58
[   32.337478]  __kasan_kmalloc+0xd4/0xd8
[   32.337603]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   32.337908]  kvasprintf+0xe0/0x180
[   32.338297]  __kthread_create_on_node+0x16c/0x350
[   32.338456]  kthread_create_on_node+0xe4/0x130
[   32.338570]  create_worker+0x380/0x6b8
[   32.338674]  worker_thread+0x808/0xf38
[   32.338774]  kthread+0x328/0x630
[   32.338864]  ret_from_fork+0x10/0x20
[   32.338995] 
[   32.339096] The buggy address belongs to the object at fff00000c5757240
[   32.339096]  which belongs to the cache kmalloc-16 of size 16
[   32.339272] The buggy address is located 19 bytes to the right of
[   32.339272]  allocated 12-byte region [fff00000c5757240, fff00000c575724c)
[   32.339497] 
[   32.339550] The buggy address belongs to the physical page:
[   32.339686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105757
[   32.339812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.339954] page_type: f5(slab)
[   32.340050] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   32.340261] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   32.340514] page dumped because: kasan: bad access detected
[   32.340694] 
[   32.340767] Memory state around the buggy address:
[   32.340843]  fff00000c5757100: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   32.340983]  fff00000c5757180: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   32.341135] >fff00000c5757200: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc
[   32.341263]                                                     ^
[   32.341368]  fff00000c5757280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.341483]  fff00000c5757300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.341582] ==================================================================

[   27.872357] ==================================================================
[   27.873247] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x361/0x3c0
[   27.874293] Read of size 1 at addr ffff8881022bd67f by task kunit_try_catch/168
[   27.875030] 
[   27.875320] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   27.875442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.875474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.875521] Call Trace:
[   27.875569]  <TASK>
[   27.875607]  dump_stack_lvl+0x73/0xb0
[   27.875788]  print_report+0xd1/0x650
[   27.875869]  ? __virt_addr_valid+0x1db/0x2d0
[   27.875933]  ? kmalloc_oob_left+0x361/0x3c0
[   27.875988]  ? kasan_complete_mode_report_info+0x64/0x200
[   27.876084]  ? kmalloc_oob_left+0x361/0x3c0
[   27.876145]  kasan_report+0x141/0x180
[   27.876206]  ? kmalloc_oob_left+0x361/0x3c0
[   27.876273]  __asan_report_load1_noabort+0x18/0x20
[   27.876336]  kmalloc_oob_left+0x361/0x3c0
[   27.876389]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   27.876442]  ? __schedule+0x10cc/0x2b60
[   27.876510]  ? __pfx_read_tsc+0x10/0x10
[   27.876590]  ? ktime_get_ts64+0x86/0x230
[   27.876699]  kunit_try_run_case+0x1a5/0x480
[   27.876848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.876910]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   27.876974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.877038]  ? __kthread_parkme+0x82/0x180
[   27.877111]  ? preempt_count_sub+0x50/0x80
[   27.877177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.877244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.877310]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.877402]  kthread+0x337/0x6f0
[   27.877465]  ? trace_preempt_on+0x20/0xc0
[   27.877511]  ? __pfx_kthread+0x10/0x10
[   27.877561]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.877595]  ? calculate_sigpending+0x7b/0xa0
[   27.877627]  ? __pfx_kthread+0x10/0x10
[   27.877679]  ret_from_fork+0x116/0x1d0
[   27.877707]  ? __pfx_kthread+0x10/0x10
[   27.877734]  ret_from_fork_asm+0x1a/0x30
[   27.877776]  </TASK>
[   27.877791] 
[   27.894489] Allocated by task 21:
[   27.894820]  kasan_save_stack+0x45/0x70
[   27.895480]  kasan_save_track+0x18/0x40
[   27.896187]  kasan_save_alloc_info+0x3b/0x50
[   27.896796]  __kasan_kmalloc+0xb7/0xc0
[   27.897308]  __kmalloc_cache_node_noprof+0x188/0x420
[   27.897778]  build_sched_domains+0x38c/0x5dd0
[   27.898411]  partition_sched_domains+0x471/0x9c0
[   27.898825]  rebuild_sched_domains_locked+0x97d/0xd50
[   27.899611]  cpuset_update_active_cpus+0x80f/0x1a90
[   27.900269]  sched_cpu_activate+0x2bf/0x330
[   27.900685]  cpuhp_invoke_callback+0x2a1/0xf00
[   27.901188]  cpuhp_thread_fun+0x2ce/0x5c0
[   27.901572]  smpboot_thread_fn+0x2bc/0x730
[   27.902110]  kthread+0x337/0x6f0
[   27.902556]  ret_from_fork+0x116/0x1d0
[   27.903006]  ret_from_fork_asm+0x1a/0x30
[   27.903662] 
[   27.904209] Freed by task 21:
[   27.904475]  kasan_save_stack+0x45/0x70
[   27.904886]  kasan_save_track+0x18/0x40
[   27.905341]  kasan_save_free_info+0x3f/0x60
[   27.905849]  __kasan_slab_free+0x56/0x70
[   27.906738]  kfree+0x222/0x3f0
[   27.907399]  build_sched_domains+0x1fff/0x5dd0
[   27.907787]  partition_sched_domains+0x471/0x9c0
[   27.908332]  rebuild_sched_domains_locked+0x97d/0xd50
[   27.908659]  cpuset_update_active_cpus+0x80f/0x1a90
[   27.909233]  sched_cpu_activate+0x2bf/0x330
[   27.909639]  cpuhp_invoke_callback+0x2a1/0xf00
[   27.910305]  cpuhp_thread_fun+0x2ce/0x5c0
[   27.910702]  smpboot_thread_fn+0x2bc/0x730
[   27.911323]  kthread+0x337/0x6f0
[   27.911877]  ret_from_fork+0x116/0x1d0
[   27.912138]  ret_from_fork_asm+0x1a/0x30
[   27.912709] 
[   27.912941] The buggy address belongs to the object at ffff8881022bd660
[   27.912941]  which belongs to the cache kmalloc-16 of size 16
[   27.913872] The buggy address is located 15 bytes to the right of
[   27.913872]  allocated 16-byte region [ffff8881022bd660, ffff8881022bd670)
[   27.914819] 
[   27.915083] The buggy address belongs to the physical page:
[   27.915976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022bd
[   27.916838] flags: 0x200000000000000(node=0|zone=2)
[   27.917390] page_type: f5(slab)
[   27.917761] raw: 0200000000000000 ffff888100041640 dead000000000100 dead000000000122
[   27.918474] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.919267] page dumped because: kasan: bad access detected
[   27.919767] 
[   27.919955] Memory state around the buggy address:
[   27.920309]  ffff8881022bd500: fa fb fc fc 00 06 fc fc 00 06 fc fc 00 06 fc fc
[   27.920725]  ffff8881022bd580: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc
[   27.921309] >ffff8881022bd600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.922523]                                                                 ^
[   27.923228]  ffff8881022bd680: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.923791]  ffff8881022bd700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.924222] ==================================================================