Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 |
[ 88.107421] ================================================================== [ 88.107771] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 88.107880] Read of size 12 at addr ffff92deff91b780 by task kunit_try_catch/3086 [ 88.107938] [ 88.108022] CPU: 0 UID: 0 PID: 3086 Comm: kunit_try_catch Tainted: G D W N 6.15.0-rc3 #1 PREEMPT [ 88.108090] Tainted: [D]=DIE, [W]=WARN, [N]=TEST [ 88.108119] Hardware name: linux,dummy-virt (DT) [ 88.108154] Call trace: [ 88.108182] show_stack+0x18/0x24 (C) [ 88.108255] __dump_stack+0x28/0x38 [ 88.108302] dump_stack_lvl+0x54/0x6c [ 88.108348] print_address_description+0x90/0x234 [ 88.108395] print_report+0x68/0x84 [ 88.108438] kasan_report+0xd8/0x134 [ 88.108488] kasan_check_range+0x264/0x2a4 [ 88.108534] __asan_memcpy+0x3c/0x84 [ 88.108578] cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 88.108623] cs_dsp_mock_bin_add_info+0x10/0x1c [ 88.108665] bin_patch_name_and_info+0xfc/0x550 [ 88.108713] kunit_try_run_case+0x118/0x31c [ 88.108762] kunit_generic_run_threadfn_adapter+0x84/0x104 [ 88.108809] kthread+0x3f4/0x518 [ 88.108856] ret_from_fork+0x10/0x20 [ 88.108910] [ 88.108962] The buggy address belongs to the variable: [ 88.108993] .str.279+0x0/0x20 [ 88.109044] [ 88.109131] The buggy address belongs to the virtual mapping at [ 88.109131] [ffff92defead0000, ffff92df00230000) created by: [ 88.109131] declare_kernel_vmas+0x54/0xb4 [ 88.109194] [ 88.109265] The buggy address belongs to the physical page: [ 88.109489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43d1b [ 88.109591] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 88.109897] raw: 03fffe0000002000 ffffc1ffc00f46c8 ffffc1ffc00f46c8 0000000000000000 [ 88.109955] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 88.110026] page dumped because: kasan: bad access detected [ 88.110078] [ 88.110124] Memory state around the buggy address: [ 88.110288] ffff92deff91b680: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00 [ 88.110353] ffff92deff91b700: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9 [ 88.110564] >ffff92deff91b780: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9 [ 88.110625] ^ [ 88.110716] ffff92deff91b800: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 [ 88.110775] ffff92deff91b880: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9 [ 88.110838] ==================================================================
[ 122.114814] ================================================================== [ 122.115349] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 122.115503] Read of size 12 at addr ffffa2617fd0b680 by task kunit_try_catch/3086 [ 122.115589] [ 122.115707] CPU: 1 UID: 0 PID: 3086 Comm: kunit_try_catch Tainted: G D W N 6.15.0-rc3 #1 PREEMPT [ 122.115803] Tainted: [D]=DIE, [W]=WARN, [N]=TEST [ 122.115844] Hardware name: linux,dummy-virt (DT) [ 122.115911] Call trace: [ 122.115949] show_stack+0x18/0x24 (C) [ 122.116034] __dump_stack+0x28/0x38 [ 122.116101] dump_stack_lvl+0x54/0x6c [ 122.116166] print_address_description+0x90/0x234 [ 122.116231] print_report+0x68/0x84 [ 122.116292] kasan_report+0xd8/0x134 [ 122.116361] kasan_check_range+0x264/0x2a4 [ 122.116426] __asan_memcpy+0x3c/0x84 [ 122.116483] cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 122.116546] cs_dsp_mock_bin_add_info+0x10/0x1c [ 122.116608] bin_patch_name_and_info+0xfc/0x550 [ 122.116675] kunit_try_run_case+0x118/0x31c [ 122.116744] kunit_generic_run_threadfn_adapter+0x84/0x104 [ 122.116810] kthread+0x3f4/0x518 [ 122.116890] ret_from_fork+0x10/0x20 [ 122.116981] [ 122.117139] The buggy address belongs to the variable: [ 122.117233] .str.279+0x0/0x20 [ 122.117388] [ 122.117584] The buggy address belongs to the virtual mapping at [ 122.117584] [ffffa2617eec0000, ffffa26180620000) created by: [ 122.117584] declare_kernel_vmas+0x54/0xb4 [ 122.117763] [ 122.117924] The buggy address belongs to the physical page: [ 122.118444] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43d0b [ 122.118694] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 122.119202] raw: 03fffe0000002000 ffffc1ffc00f42c8 ffffc1ffc00f42c8 0000000000000000 [ 122.119295] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 122.119396] page dumped because: kasan: bad access detected [ 122.119469] [ 122.119539] Memory state around the buggy address: [ 122.119744] ffffa2617fd0b580: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00 [ 122.119836] ffffa2617fd0b600: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9 [ 122.119943] >ffffa2617fd0b680: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9 [ 122.120009] ^ [ 122.120130] ffffa2617fd0b700: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 [ 122.120207] ffffa2617fd0b780: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9 [ 122.120288] ==================================================================