Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64

[   97.809202] ==================================================================
[   97.810006] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[   97.810197] Read of size 12 at addr ffffa830cf51b780 by task kunit_try_catch/3087
[   97.810274] 
[   97.810381] CPU: 0 UID: 0 PID: 3087 Comm: kunit_try_catch Tainted: G      D W        N  6.15.0-rc3 #1 PREEMPT 
[   97.810459] Tainted: [D]=DIE, [W]=WARN, [N]=TEST
[   97.810491] Hardware name: linux,dummy-virt (DT)
[   97.810529] Call trace:
[   97.810560]  show_stack+0x18/0x24 (C)
[   97.810626]  __dump_stack+0x28/0x38
[   97.810677]  dump_stack_lvl+0x54/0x6c
[   97.810727]  print_address_description+0x90/0x234
[   97.810810]  print_report+0x68/0x84
[   97.810857]  kasan_report+0xd8/0x134
[   97.810911]  kasan_check_range+0x264/0x2a4
[   97.810961]  __asan_memcpy+0x3c/0x84
[   97.811008]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[   97.811057]  cs_dsp_mock_bin_add_info+0x10/0x1c
[   97.811102]  bin_patch_name_and_info+0xfc/0x550
[   97.811154]  kunit_try_run_case+0x118/0x31c
[   97.811208]  kunit_generic_run_threadfn_adapter+0x84/0x104
[   97.811259]  kthread+0x3f4/0x518
[   97.811311]  ret_from_fork+0x10/0x20
[   97.811373] 
[   97.811438] The buggy address belongs to the variable:
[   97.811474]  .str.279+0x0/0x20
[   97.811533] 
[   97.811648] The buggy address belongs to the virtual mapping at
[   97.811648]  [ffffa830ce6d0000, ffffa830cfe30000) created by:
[   97.811648]  declare_kernel_vmas+0x54/0xb4
[   97.811720] 
[   97.811797] The buggy address belongs to the physical page:
[   97.812175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43d1b
[   97.812305] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   97.812696] raw: 03fffe0000002000 ffffc1ffc00f46c8 ffffc1ffc00f46c8 0000000000000000
[   97.812785] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   97.812873] page dumped because: kasan: bad access detected
[   97.812935] 
[   97.812990] Memory state around the buggy address:
[   97.813179]  ffffa830cf51b680: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[   97.813318]  ffffa830cf51b700: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[   97.813432] >ffffa830cf51b780: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[   97.813538]                       ^
[   97.813647]  ffffa830cf51b800: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[   97.813712]  ffffa830cf51b880: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[   97.813803] ==================================================================

[   90.082700] ==================================================================
[   90.083207] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[   90.083338] Read of size 12 at addr ffff9fa8ea10b680 by task kunit_try_catch/3086
[   90.083405] 
[   90.083501] CPU: 1 UID: 0 PID: 3086 Comm: kunit_try_catch Tainted: G      D W        N  6.15.0-rc3 #1 PREEMPT 
[   90.083574] Tainted: [D]=DIE, [W]=WARN, [N]=TEST
[   90.083603] Hardware name: linux,dummy-virt (DT)
[   90.083638] Call trace:
[   90.083668]  show_stack+0x18/0x24 (C)
[   90.083732]  __dump_stack+0x28/0x38
[   90.083778]  dump_stack_lvl+0x54/0x6c
[   90.083825]  print_address_description+0x90/0x234
[   90.083872]  print_report+0x68/0x84
[   90.083934]  kasan_report+0xd8/0x134
[   90.083984]  kasan_check_range+0x264/0x2a4
[   90.084029]  __asan_memcpy+0x3c/0x84
[   90.084073]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[   90.084118]  cs_dsp_mock_bin_add_info+0x10/0x1c
[   90.084162]  bin_patch_name_and_info+0xfc/0x550
[   90.084209]  kunit_try_run_case+0x118/0x31c
[   90.084261]  kunit_generic_run_threadfn_adapter+0x84/0x104
[   90.084308]  kthread+0x3f4/0x518
[   90.084356]  ret_from_fork+0x10/0x20
[   90.084411] 
[   90.084468] The buggy address belongs to the variable:
[   90.084502]  .str.279+0x0/0x20
[   90.084555] 
[   90.084648] The buggy address belongs to the virtual mapping at
[   90.084648]  [ffff9fa8e92c0000, ffff9fa8eaa20000) created by:
[   90.084648]  declare_kernel_vmas+0x54/0xb4
[   90.084712] 
[   90.084776] The buggy address belongs to the physical page:
[   90.085099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43d0b
[   90.085233] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   90.085625] raw: 03fffe0000002000 ffffc1ffc00f42c8 ffffc1ffc00f42c8 0000000000000000
[   90.085693] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   90.085777] page dumped because: kasan: bad access detected
[   90.085832] 
[   90.085897] Memory state around the buggy address:
[   90.086074]  ffff9fa8ea10b580: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[   90.086181]  ffff9fa8ea10b600: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[   90.086317] >ffff9fa8ea10b680: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[   90.086399]                       ^
[   90.086555]  ffff9fa8ea10b700: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[   90.086653]  ffff9fa8ea10b780: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[   90.086719] ==================================================================