Date
April 22, 2025, 11:09 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 97.809202] ================================================================== [ 97.810006] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 97.810197] Read of size 12 at addr ffffa830cf51b780 by task kunit_try_catch/3087 [ 97.810274] [ 97.810381] CPU: 0 UID: 0 PID: 3087 Comm: kunit_try_catch Tainted: G D W N 6.15.0-rc3 #1 PREEMPT [ 97.810459] Tainted: [D]=DIE, [W]=WARN, [N]=TEST [ 97.810491] Hardware name: linux,dummy-virt (DT) [ 97.810529] Call trace: [ 97.810560] show_stack+0x18/0x24 (C) [ 97.810626] __dump_stack+0x28/0x38 [ 97.810677] dump_stack_lvl+0x54/0x6c [ 97.810727] print_address_description+0x90/0x234 [ 97.810810] print_report+0x68/0x84 [ 97.810857] kasan_report+0xd8/0x134 [ 97.810911] kasan_check_range+0x264/0x2a4 [ 97.810961] __asan_memcpy+0x3c/0x84 [ 97.811008] cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 97.811057] cs_dsp_mock_bin_add_info+0x10/0x1c [ 97.811102] bin_patch_name_and_info+0xfc/0x550 [ 97.811154] kunit_try_run_case+0x118/0x31c [ 97.811208] kunit_generic_run_threadfn_adapter+0x84/0x104 [ 97.811259] kthread+0x3f4/0x518 [ 97.811311] ret_from_fork+0x10/0x20 [ 97.811373] [ 97.811438] The buggy address belongs to the variable: [ 97.811474] .str.279+0x0/0x20 [ 97.811533] [ 97.811648] The buggy address belongs to the virtual mapping at [ 97.811648] [ffffa830ce6d0000, ffffa830cfe30000) created by: [ 97.811648] declare_kernel_vmas+0x54/0xb4 [ 97.811720] [ 97.811797] The buggy address belongs to the physical page: [ 97.812175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43d1b [ 97.812305] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 97.812696] raw: 03fffe0000002000 ffffc1ffc00f46c8 ffffc1ffc00f46c8 0000000000000000 [ 97.812785] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 97.812873] page dumped because: kasan: bad access detected [ 97.812935] [ 97.812990] Memory state around the buggy address: [ 97.813179] ffffa830cf51b680: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00 [ 97.813318] ffffa830cf51b700: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9 [ 97.813432] >ffffa830cf51b780: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9 [ 97.813538] ^ [ 97.813647] ffffa830cf51b800: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 [ 97.813712] ffffa830cf51b880: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9 [ 97.813803] ==================================================================
[ 90.082700] ================================================================== [ 90.083207] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 90.083338] Read of size 12 at addr ffff9fa8ea10b680 by task kunit_try_catch/3086 [ 90.083405] [ 90.083501] CPU: 1 UID: 0 PID: 3086 Comm: kunit_try_catch Tainted: G D W N 6.15.0-rc3 #1 PREEMPT [ 90.083574] Tainted: [D]=DIE, [W]=WARN, [N]=TEST [ 90.083603] Hardware name: linux,dummy-virt (DT) [ 90.083638] Call trace: [ 90.083668] show_stack+0x18/0x24 (C) [ 90.083732] __dump_stack+0x28/0x38 [ 90.083778] dump_stack_lvl+0x54/0x6c [ 90.083825] print_address_description+0x90/0x234 [ 90.083872] print_report+0x68/0x84 [ 90.083934] kasan_report+0xd8/0x134 [ 90.083984] kasan_check_range+0x264/0x2a4 [ 90.084029] __asan_memcpy+0x3c/0x84 [ 90.084073] cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 90.084118] cs_dsp_mock_bin_add_info+0x10/0x1c [ 90.084162] bin_patch_name_and_info+0xfc/0x550 [ 90.084209] kunit_try_run_case+0x118/0x31c [ 90.084261] kunit_generic_run_threadfn_adapter+0x84/0x104 [ 90.084308] kthread+0x3f4/0x518 [ 90.084356] ret_from_fork+0x10/0x20 [ 90.084411] [ 90.084468] The buggy address belongs to the variable: [ 90.084502] .str.279+0x0/0x20 [ 90.084555] [ 90.084648] The buggy address belongs to the virtual mapping at [ 90.084648] [ffff9fa8e92c0000, ffff9fa8eaa20000) created by: [ 90.084648] declare_kernel_vmas+0x54/0xb4 [ 90.084712] [ 90.084776] The buggy address belongs to the physical page: [ 90.085099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43d0b [ 90.085233] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 90.085625] raw: 03fffe0000002000 ffffc1ffc00f42c8 ffffc1ffc00f42c8 0000000000000000 [ 90.085693] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 90.085777] page dumped because: kasan: bad access detected [ 90.085832] [ 90.085897] Memory state around the buggy address: [ 90.086074] ffff9fa8ea10b580: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00 [ 90.086181] ffff9fa8ea10b600: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9 [ 90.086317] >ffff9fa8ea10b680: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9 [ 90.086399] ^ [ 90.086555] ffff9fa8ea10b700: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 [ 90.086653] ffff9fa8ea10b780: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9 [ 90.086719] ==================================================================