Hay
Date
March 19, 2025, 10:35 a.m.

Environment
qemu-arm64

[  155.939570] ==================================================================
[  155.940087] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  155.940249] Read of size 12 at addr ffffaf9cb84d6960 by task kunit_try_catch/3099
[  155.940359] 
[  155.940513] CPU: 1 UID: 0 PID: 3099 Comm: kunit_try_catch Tainted: G      D W        N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[  155.940623] Tainted: [D]=DIE, [W]=WARN, [N]=TEST
[  155.940669] Hardware name: linux,dummy-virt (DT)
[  155.940723] Call trace:
[  155.940773]  show_stack+0x18/0x24 (C)
[  155.940873]  __dump_stack+0x28/0x38
[  155.940954]  dump_stack_lvl+0x54/0x6c
[  155.941031]  print_address_description+0x90/0x234
[  155.941148]  print_report+0x68/0x84
[  155.941223]  kasan_report+0xd8/0x134
[  155.941306]  kasan_check_range+0x264/0x2a4
[  155.941399]  __asan_memcpy+0x3c/0x84
[  155.941472]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  155.941547]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  155.941633]  bin_patch_name_and_info+0xfc/0x550
[  155.941711]  kunit_try_run_case+0x118/0x31c
[  155.941794]  kunit_generic_run_threadfn_adapter+0x84/0x104
[  155.941870]  kthread+0x3f4/0x518
[  155.941950]  ret_from_fork+0x10/0x20
[  155.942040] 
[  155.942128] The buggy address belongs to the variable:
[  155.942177]  .str.279+0x0/0x20
[  155.942255] 
[  155.942398] The buggy address belongs to the virtual mapping at
[  155.942398]  [ffffaf9cb7690000, ffffaf9cb8df0000) created by:
[  155.942398]  declare_kernel_vmas+0x54/0xb4
[  155.942498] 
[  155.942587] The buggy address belongs to the physical page:
[  155.942949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd6
[  155.943102] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  155.943599] raw: 03fffe0000002000 ffffc1ffc00f3588 ffffc1ffc00f3588 0000000000000000
[  155.943694] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  155.943809] page dumped because: kasan: bad access detected
[  155.943891] 
[  155.943968] Memory state around the buggy address:
[  155.944208]  ffffaf9cb84d6800: 00 04 f9 f9 00 00 05 f9 f9 f9 f9 f9 00 00 f9 f9
[  155.944327]  ffffaf9cb84d6880: 00 00 f9 f9 00 00 00 00 00 00 00 00 00 00 f9 f9
[  155.944464] >ffffaf9cb84d6900: f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9 00 02 f9 f9
[  155.944546]                                                           ^
[  155.944682]  ffffaf9cb84d6980: 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9 00 00 00 f9
[  155.944777]  ffffaf9cb84d6a00: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[  155.944872] ==================================================================

[  117.564593] ==================================================================
[  117.565235] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  117.565476] Read of size 12 at addr ffff98ceb20d69a0 by task kunit_try_catch/3097
[  117.565564] 
[  117.565679] CPU: 0 UID: 0 PID: 3097 Comm: kunit_try_catch Tainted: G      D W        N  6.14.0-rc7-next-20250319 #1 PREEMPT 
[  117.565769] Tainted: [D]=DIE, [W]=WARN, [N]=TEST
[  117.565803] Hardware name: linux,dummy-virt (DT)
[  117.565841] Call trace:
[  117.565872]  show_stack+0x18/0x24 (C)
[  117.565946]  __dump_stack+0x28/0x38
[  117.566005]  dump_stack_lvl+0x54/0x6c
[  117.566061]  print_address_description+0x90/0x234
[  117.566123]  print_report+0x68/0x84
[  117.566176]  kasan_report+0xd8/0x134
[  117.566235]  kasan_check_range+0x264/0x2a4
[  117.566293]  __asan_memcpy+0x3c/0x84
[  117.566345]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  117.566401]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  117.566472]  bin_patch_name_and_info+0xfc/0x550
[  117.566531]  kunit_try_run_case+0x118/0x31c
[  117.566591]  kunit_generic_run_threadfn_adapter+0x84/0x104
[  117.566648]  kthread+0x3f4/0x518
[  117.566710]  ret_from_fork+0x10/0x20
[  117.566782] 
[  117.566846] The buggy address belongs to the variable:
[  117.566885]  .str.279+0x0/0x20
[  117.566951] 
[  117.567051] The buggy address belongs to the virtual mapping at
[  117.567051]  [ffff98ceb1290000, ffff98ceb29f0000) created by:
[  117.567051]  declare_kernel_vmas+0x54/0xb4
[  117.567132] 
[  117.567202] The buggy address belongs to the physical page:
[  117.567395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd6
[  117.567530] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  117.567897] raw: 03fffe0000002000 ffffc1ffc00f3588 ffffc1ffc00f3588 0000000000000000
[  117.567973] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  117.568064] page dumped because: kasan: bad access detected
[  117.568131] 
[  117.568187] Memory state around the buggy address:
[  117.568363]  ffff98ceb20d6880: f9 f9 f9 f9 00 00 f9 f9 00 00 f9 f9 00 00 00 00
[  117.568459]  ffff98ceb20d6900: 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9
[  117.568538] >ffff98ceb20d6980: 00 01 f9 f9 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9
[  117.568594]                                   ^
[  117.568695]  ffff98ceb20d6a00: 00 06 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9
[  117.568767]  ffff98ceb20d6a80: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[  117.568837] ==================================================================