Hay
Date
April 22, 2025, 11:09 a.m.

Environment
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[  170.737022] ==================================================================
[  170.737179] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[  170.737335] Read of size 12 at addr ffff9a6056144de0 by task kunit_try_catch/3323
[  170.737415] 
[  170.737524] CPU: 1 UID: 0 PID: 3323 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT 
[  170.737705] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  170.737760] Hardware name: linux,dummy-virt (DT)
[  170.737827] Call trace:
[  170.737888]  show_stack+0x20/0x38 (C)
[  170.737988]  dump_stack_lvl+0x8c/0xd0
[  170.738086]  print_report+0x310/0x608
[  170.738181]  kasan_report+0xdc/0x128
[  170.738267]  kasan_check_range+0x100/0x1a8
[  170.738354]  __asan_memcpy+0x3c/0x98
[  170.738439]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[  170.738524]  cs_dsp_mock_bin_add_info+0x18/0x30
[  170.738641]  bin_patch_name_and_info+0x168/0x6b0
[  170.738728]  kunit_try_run_case+0x170/0x3f0
[  170.738813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[  170.738904]  kthread+0x328/0x630
[  170.738964]  ret_from_fork+0x10/0x20
[  170.739019] 
[  170.739042] The buggy address belongs to the variable:
[  170.739066]  __loc.0+0x2c0/0x3a0
[  170.739113] 
[  170.739192] The buggy address belongs to the virtual mapping at
[  170.739192]  [ffff9a6054e50000, ffff9a6056b60000) created by:
[  170.739192]  paging_init+0x620/0x7d0
[  170.739251] 
[  170.739356] The buggy address belongs to the physical page:
[  170.739415] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x44f44
[  170.739494] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  170.739626] raw: 03fffe0000002000 ffffc1ffc013d108 ffffc1ffc013d108 0000000000000000
[  170.739692] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  170.739779] page dumped because: kasan: bad access detected
[  170.739829] 
[  170.739875] Memory state around the buggy address:
[  170.739937]  ffff9a6056144c80: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9
[  170.740002]  ffff9a6056144d00: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9
[  170.740058] >ffff9a6056144d80: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[  170.740110]                                                           ^
[  170.740159]  ffff9a6056144e00: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[  170.740190]  ffff9a6056144e80: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[  170.740219] ==================================================================

[  150.180339] ==================================================================
[  150.180804] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[  150.181046] Read of size 12 at addr ffff9a6be46487c0 by task kunit_try_catch/3086
[  150.181162] 
[  150.181291] CPU: 0 UID: 0 PID: 3086 Comm: kunit_try_catch Tainted: G      D W        N  6.15.0-rc3 #1 PREEMPT 
[  150.181385] Tainted: [D]=DIE, [W]=WARN, [N]=TEST
[  150.181413] Hardware name: linux,dummy-virt (DT)
[  150.181470] Call trace:
[  150.181503]  show_stack+0x18/0x24 (C)
[  150.181573]  dump_stack_lvl+0x74/0x8c
[  150.181629]  print_report+0x300/0x5f4
[  150.181685]  kasan_report+0xc4/0x108
[  150.181739]  kasan_check_range+0x100/0x1a8
[  150.181793]  __asan_memcpy+0x3c/0x94
[  150.181847]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[  150.181906]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  150.181963]  bin_patch_name_and_info+0x15c/0x6a0
[  150.182019]  kunit_try_run_case+0x144/0x3bc
[  150.182079]  kunit_generic_run_threadfn_adapter+0x80/0xec
[  150.182137]  kthread+0x37c/0x67c
[  150.182193]  ret_from_fork+0x10/0x20
[  150.182260] 
[  150.182331] The buggy address belongs to the variable:
[  150.182364]  __loc.0+0x2c0/0x3a0
[  150.182421] 
[  150.182552] The buggy address belongs to the virtual mapping at
[  150.182552]  [ffff9a6be3580000, ffff9a6be4e40000) created by:
[  150.182552]  paging_init+0x4d4/0x640
[  150.182629] 
[  150.182704] The buggy address belongs to the physical page:
[  150.183088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x44248
[  150.183226] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  150.183647] raw: 03fffe0000002000 ffffc1ffc0109208 ffffc1ffc0109208 0000000000000000
[  150.183710] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  150.183830] page dumped because: kasan: bad access detected
[  150.183877] 
[  150.183910] Memory state around the buggy address:
[  150.184180]  ffff9a6be4648680: 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9 f9 f9 f9 f9
[  150.184262]  ffff9a6be4648700: 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[  150.184318] >ffff9a6be4648780: 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[  150.184373]                                               ^
[  150.184553]  ffff9a6be4648800: 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[  150.184629]  ffff9a6be4648880: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 06 f9 f9
[  150.184744] ==================================================================

[  107.094390] ==================================================================
[  107.094637] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[  107.094732] Read of size 12 at addr ffffac6be86d63c0 by task kunit_try_catch/3086
[  107.094777] 
[  107.094843] CPU: 1 UID: 0 PID: 3086 Comm: kunit_try_catch Tainted: G      D W        N  6.15.0-rc3 #1 PREEMPT 
[  107.094918] Tainted: [D]=DIE, [W]=WARN, [N]=TEST
[  107.094943] Hardware name: linux,dummy-virt (DT)
[  107.094973] Call trace:
[  107.094997]  show_stack+0x18/0x24 (C)
[  107.095065]  dump_stack_lvl+0x78/0x90
[  107.095115]  print_report+0x1d4/0x5dc
[  107.095162]  kasan_report+0x78/0xc0
[  107.095205]  kasan_check_range+0x180/0x210
[  107.095250]  memcpy+0x3c/0xa4
[  107.095292]  cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[  107.095337]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  107.095380]  bin_patch_name_and_info+0x164/0x6a8
[  107.095423]  kunit_try_run_case+0x144/0x3bc
[  107.095468]  kunit_generic_run_threadfn_adapter+0x80/0xec
[  107.095518]  kthread+0x3f0/0x744
[  107.095561]  ret_from_fork+0x10/0x20
[  107.095615] 
[  107.095666] The buggy address belongs to the variable:
[  107.095693]  __loc.44591+0x280/0x420
[  107.095739] 
[  107.095841] The buggy address belongs to the virtual mapping at
[  107.095841]  [ffffac6be7600000, ffffac6be8ec0000) created by:
[  107.095841]  paging_init+0x474/0x61c
[  107.095895] 
[  107.095957] The buggy address belongs to the physical page:
[  107.096227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x442d6
[  107.096329] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  107.096702] raw: 03fffe0000002000 ffffc1ffc010b588 ffffc1ffc010b588 0000000000000000
[  107.096751] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  107.096840] page dumped because: kasan: bad access detected
[  107.096874] 
[  107.096898] Memory state around the buggy address:
[  107.097126]  ffffac6be86d6280: 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9 f9 f9 f9 f9
[  107.097183]  ffffac6be86d6300: 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
[  107.097226] >ffffac6be86d6380: 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
[  107.097266]                                               ^
[  107.097338]  ffffac6be86d6400: 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9 00 06 f9 f9
[  107.097370]  ffffac6be86d6480: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9
[  107.097419] ==================================================================

[  216.228965] ==================================================================
[  216.230058] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  216.230914] Read of size 12 at addr ffffffff9aeccd00 by task kunit_try_catch/4184
[  216.231617] 
[  216.231852] CPU: 1 UID: 0 PID: 4184 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT(voluntary) 
[  216.231980] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  216.232019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  216.232067] Call Trace:
[  216.232105]  <TASK>
[  216.232177]  dump_stack_lvl+0x73/0xb0
[  216.232283]  print_report+0xd1/0x650
[  216.232369]  ? __virt_addr_valid+0x1db/0x2d0
[  216.232447]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  216.232524]  ? kasan_addr_to_slab+0x11/0xa0
[  216.232597]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  216.232675]  kasan_report+0x141/0x180
[  216.232752]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  216.232840]  kasan_check_range+0x10c/0x1c0
[  216.232926]  __asan_memcpy+0x27/0x70
[  216.232962]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c1/0x3d0
[  216.232998]  ? __pfx_cs_dsp_mock_bin_add_name_or_info.isra.0+0x10/0x10
[  216.233030]  ? __pfx_cs_dsp_mock_reg_addr_inc_per_unpacked_word+0x10/0x10
[  216.233059]  ? __pfx__cs_dsp_remove_wrapper+0x10/0x10
[  216.233094]  cs_dsp_mock_bin_add_info+0x12/0x20
[  216.233162]  bin_patch_name_and_info+0x1a1/0x8d0
[  216.233228]  ? __pfx_bin_patch_name_and_info+0x10/0x10
[  216.233265]  ? __pfx_kfree_action_wrapper+0x10/0x10
[  216.233309]  ? kunit_add_action_or_reset+0x1d/0x40
[  216.233338]  ? __pfx_read_tsc+0x10/0x10
[  216.233364]  ? ktime_get_ts64+0x86/0x230
[  216.233399]  kunit_try_run_case+0x1a5/0x480
[  216.233427]  ? __pfx_kunit_try_run_case+0x10/0x10
[  216.233457]  ? _raw_spin_lock_irqsave+0xa1/0x100
[  216.233487]  ? __kthread_parkme+0x82/0x180
[  216.233516]  ? preempt_count_sub+0x50/0x80
[  216.233548]  ? __pfx_kunit_try_run_case+0x10/0x10
[  216.233576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  216.233603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  216.233628]  kthread+0x337/0x6f0
[  216.233657]  ? trace_preempt_on+0x20/0xc0
[  216.233690]  ? __pfx_kthread+0x10/0x10
[  216.233721]  ? _raw_spin_unlock_irq+0x47/0x80
[  216.233749]  ? calculate_sigpending+0x7b/0xa0
[  216.233777]  ? __pfx_kthread+0x10/0x10
[  216.233808]  ret_from_fork+0x41/0x80
[  216.233835]  ? __pfx_kthread+0x10/0x10
[  216.233864]  ret_from_fork_asm+0x1a/0x30
[  216.233907]  </TASK>
[  216.233921] 
[  216.249905] The buggy address belongs to the variable:
[  216.250373]  __loc.16+0x80/0x540
[  216.250766] 
[  216.251001] The buggy address belongs to the physical page:
[  216.251568] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x596cc
[  216.252323] flags: 0x100000000002000(reserved|node=0|zone=1)
[  216.252728] raw: 0100000000002000 ffffea000165b308 ffffea000165b308 0000000000000000
[  216.253424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  216.254010] page dumped because: kasan: bad access detected
[  216.254476] 
[  216.254713] Memory state around the buggy address:
[  216.255165]  ffffffff9aeccc00: 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[  216.255729]  ffffffff9aeccc80: 00 00 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9
[  216.256294] >ffffffff9aeccd00: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 07 f9 f9
[  216.256800]                       ^
[  216.257085]  ffffffff9aeccd80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 06 f9 f9
[  216.257804]  ffffffff9aecce00: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9
[  216.258477] ==================================================================

[   94.668110] ==================================================================
[   94.669311] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[   94.670155] Read of size 12 at addr ffff800084d44de0 by task kunit_try_catch/3379
[   94.670849] 
[   94.671016] CPU: 0 UID: 0 PID: 3379 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 PREEMPT 
[   94.671061] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   94.671075] Hardware name: Radxa ROCK Pi 4B (DT)
[   94.671089] Call trace:
[   94.671101]  show_stack+0x20/0x38 (C)
[   94.671136]  dump_stack_lvl+0x8c/0xd0
[   94.671166]  print_report+0x310/0x608
[   94.671196]  kasan_report+0xdc/0x128
[   94.671223]  kasan_check_range+0x100/0x1a8
[   94.671253]  __asan_memcpy+0x3c/0x98
[   94.671283]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x19c/0x348
[   94.671315]  cs_dsp_mock_bin_add_info+0x18/0x30
[   94.671342]  bin_patch_name_and_info+0x168/0x6b0
[   94.671373]  kunit_try_run_case+0x170/0x3f0
[   94.671406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.671441]  kthread+0x328/0x630
[   94.671475]  ret_from_fork+0x10/0x20
[   94.671506] 
[   94.678469] The buggy address belongs to the variable:
[   94.678943]  __loc.0+0x2c0/0x3a0
[   94.679268] 
[   94.679435] The buggy address belongs to the virtual mapping at
[   94.679435]  [ffff800083a50000, ffff800085760000) created by:
[   94.679435]  paging_init+0x620/0x7d0
[   94.680808] 
[   94.680885] dwmmc_rockchip fe310000.mmc: IDMAC supports 32-bit address mode.
[   94.680960] The buggy address belongs to the physical page:
[   94.681669] dwmmc_rockchip fe310000.mmc: Using internal DMA controller.
[   94.682081] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7544
[   94.682669] dwmmc_rockchip fe310000.mmc: Version ID is 270a
[   94.683350] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   94.683897] dwmmc_rockchip fe310000.mmc: DW MMC controller at irq 49,32 bit host data width,256 deep fifo
[   94.684496] raw: 03fffe0000002000 fffffdffc01d5108 fffffdffc01d5108 0000000000000000
[   94.686014] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   94.686714] page dumped because: kasan: bad access detected
[   94.687225] 
[   94.687379] Memory state around the buggy address:
[   94.687826]  ffff800084d44c80: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9
[   94.688486]  ffff800084d44d00: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9
[   94.689147] >ffff800084d44d80: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   94.689802]                                                           ^
[   94.690407]  ffff800084d44e00: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[   94.691066]  ffff800084d44e80: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[   94.691722] ==================================================================