Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x86 |
[ 152.714756] ================================================================== [ 152.727639] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.736731] Read of size 12 at addr ffffffffb96ccd00 by task kunit_try_catch/4207 [ 152.744215] [ 152.745738] CPU: 3 UID: 0 PID: 4207 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 PREEMPT(voluntary) [ 152.745745] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 152.745747] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 152.745750] Call Trace: [ 152.745752] <TASK> [ 152.745754] dump_stack_lvl+0x73/0xb0 [ 152.745759] print_report+0xd1/0x650 [ 152.745765] ? __virt_addr_valid+0x1db/0x2d0 [ 152.745769] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.745773] ? kasan_addr_to_slab+0x11/0xa0 [ 152.745777] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.745781] kasan_report+0x141/0x180 [ 152.745785] ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.745790] kasan_check_range+0x10c/0x1c0 [ 152.745795] __asan_memcpy+0x27/0x70 [ 152.745798] cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0 [ 152.745802] ? __pfx_cs_dsp_mock_bin_add_name_or_info.isra.0+0x10/0x10 [ 152.745807] ? __pfx_cs_dsp_mock_reg_addr_inc_per_unpacked_word+0x10/0x10 [ 152.745811] ? __pfx__cs_dsp_remove_wrapper+0x10/0x10 [ 152.745816] cs_dsp_mock_bin_add_info+0x12/0x20 [ 152.745819] bin_patch_name_and_info+0x1a1/0x8d0 [ 152.745824] ? __pfx_bin_patch_name_and_info+0x10/0x10 [ 152.745829] ? __pfx_kfree_action_wrapper+0x10/0x10 [ 152.745834] ? kunit_add_action_or_reset+0x1d/0x40 [ 152.745838] ? ktime_get_ts64+0x83/0x230 [ 152.745843] kunit_try_run_case+0x1a2/0x480 [ 152.745847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.745851] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 152.745856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 152.745860] ? __kthread_parkme+0x82/0x180 [ 152.745864] ? preempt_count_sub+0x50/0x80 [ 152.745869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 152.745873] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 152.745876] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 152.745880] kthread+0x334/0x6f0 [ 152.745884] ? trace_preempt_on+0x20/0xc0 [ 152.745889] ? __pfx_kthread+0x10/0x10 [ 152.745893] ? _raw_spin_unlock_irq+0x47/0x80 [ 152.745897] ? calculate_sigpending+0x7b/0xa0 [ 152.745901] ? __pfx_kthread+0x10/0x10 [ 152.745905] ret_from_fork+0x3e/0x80 [ 152.745909] ? __pfx_kthread+0x10/0x10 [ 152.745913] ret_from_fork_asm+0x1a/0x30 [ 152.745919] </TASK> [ 152.745921] [ 152.953654] The buggy address belongs to the variable: [ 152.958818] __loc.16+0x80/0x540 [ 152.962052] [ 152.963549] The buggy address belongs to the physical page: [ 152.969123] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x23eacc [ 152.977123] flags: 0x200000000002000(reserved|node=0|zone=2) [ 152.982784] raw: 0200000000002000 ffffea0008fab308 ffffea0008fab308 0000000000000000 [ 152.990522] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 152.998260] page dumped because: kasan: bad access detected [ 153.003831] [ 153.005330] Memory state around the buggy address: [ 153.010123] ffffffffb96ccc00: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 [ 153.017343] ffffffffb96ccc80: 00 00 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 [ 153.024563] >ffffffffb96ccd00: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 [ 153.031780] ^ [ 153.035274] ffffffffb96ccd80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 06 f9 f9 [ 153.042493] ffffffffb96cce00: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9 [ 153.049735] ==================================================================