Hay
Date
April 20, 2025, 11:09 p.m.

Environment
qemu-arm64

[   88.107421] ==================================================================
[   88.107771] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[   88.107880] Read of size 12 at addr ffff92deff91b780 by task kunit_try_catch/3086
[   88.107938] 
[   88.108022] CPU: 0 UID: 0 PID: 3086 Comm: kunit_try_catch Tainted: G      D W        N  6.15.0-rc3 #1 PREEMPT 
[   88.108090] Tainted: [D]=DIE, [W]=WARN, [N]=TEST
[   88.108119] Hardware name: linux,dummy-virt (DT)
[   88.108154] Call trace:
[   88.108182]  show_stack+0x18/0x24 (C)
[   88.108255]  __dump_stack+0x28/0x38
[   88.108302]  dump_stack_lvl+0x54/0x6c
[   88.108348]  print_address_description+0x90/0x234
[   88.108395]  print_report+0x68/0x84
[   88.108438]  kasan_report+0xd8/0x134
[   88.108488]  kasan_check_range+0x264/0x2a4
[   88.108534]  __asan_memcpy+0x3c/0x84
[   88.108578]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[   88.108623]  cs_dsp_mock_bin_add_info+0x10/0x1c
[   88.108665]  bin_patch_name_and_info+0xfc/0x550
[   88.108713]  kunit_try_run_case+0x118/0x31c
[   88.108762]  kunit_generic_run_threadfn_adapter+0x84/0x104
[   88.108809]  kthread+0x3f4/0x518
[   88.108856]  ret_from_fork+0x10/0x20
[   88.108910] 
[   88.108962] The buggy address belongs to the variable:
[   88.108993]  .str.279+0x0/0x20
[   88.109044] 
[   88.109131] The buggy address belongs to the virtual mapping at
[   88.109131]  [ffff92defead0000, ffff92df00230000) created by:
[   88.109131]  declare_kernel_vmas+0x54/0xb4
[   88.109194] 
[   88.109265] The buggy address belongs to the physical page:
[   88.109489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43d1b
[   88.109591] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   88.109897] raw: 03fffe0000002000 ffffc1ffc00f46c8 ffffc1ffc00f46c8 0000000000000000
[   88.109955] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   88.110026] page dumped because: kasan: bad access detected
[   88.110078] 
[   88.110124] Memory state around the buggy address:
[   88.110288]  ffff92deff91b680: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[   88.110353]  ffff92deff91b700: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[   88.110564] >ffff92deff91b780: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[   88.110625]                       ^
[   88.110716]  ffff92deff91b800: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[   88.110775]  ffff92deff91b880: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[   88.110838] ==================================================================

[  122.114814] ==================================================================
[  122.115349] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  122.115503] Read of size 12 at addr ffffa2617fd0b680 by task kunit_try_catch/3086
[  122.115589] 
[  122.115707] CPU: 1 UID: 0 PID: 3086 Comm: kunit_try_catch Tainted: G      D W        N  6.15.0-rc3 #1 PREEMPT 
[  122.115803] Tainted: [D]=DIE, [W]=WARN, [N]=TEST
[  122.115844] Hardware name: linux,dummy-virt (DT)
[  122.115911] Call trace:
[  122.115949]  show_stack+0x18/0x24 (C)
[  122.116034]  __dump_stack+0x28/0x38
[  122.116101]  dump_stack_lvl+0x54/0x6c
[  122.116166]  print_address_description+0x90/0x234
[  122.116231]  print_report+0x68/0x84
[  122.116292]  kasan_report+0xd8/0x134
[  122.116361]  kasan_check_range+0x264/0x2a4
[  122.116426]  __asan_memcpy+0x3c/0x84
[  122.116483]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  122.116546]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  122.116608]  bin_patch_name_and_info+0xfc/0x550
[  122.116675]  kunit_try_run_case+0x118/0x31c
[  122.116744]  kunit_generic_run_threadfn_adapter+0x84/0x104
[  122.116810]  kthread+0x3f4/0x518
[  122.116890]  ret_from_fork+0x10/0x20
[  122.116981] 
[  122.117139] The buggy address belongs to the variable:
[  122.117233]  .str.279+0x0/0x20
[  122.117388] 
[  122.117584] The buggy address belongs to the virtual mapping at
[  122.117584]  [ffffa2617eec0000, ffffa26180620000) created by:
[  122.117584]  declare_kernel_vmas+0x54/0xb4
[  122.117763] 
[  122.117924] The buggy address belongs to the physical page:
[  122.118444] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43d0b
[  122.118694] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  122.119202] raw: 03fffe0000002000 ffffc1ffc00f42c8 ffffc1ffc00f42c8 0000000000000000
[  122.119295] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  122.119396] page dumped because: kasan: bad access detected
[  122.119469] 
[  122.119539] Memory state around the buggy address:
[  122.119744]  ffffa2617fd0b580: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[  122.119836]  ffffa2617fd0b600: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[  122.119943] >ffffa2617fd0b680: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[  122.120009]                       ^
[  122.120130]  ffffa2617fd0b700: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[  122.120207]  ffffa2617fd0b780: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[  122.120288] ==================================================================