Date
March 19, 2025, 10:35 a.m.
Environment | |
---|---|
qemu-arm64 |
[ 155.939570] ================================================================== [ 155.940087] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 155.940249] Read of size 12 at addr ffffaf9cb84d6960 by task kunit_try_catch/3099 [ 155.940359] [ 155.940513] CPU: 1 UID: 0 PID: 3099 Comm: kunit_try_catch Tainted: G D W N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 155.940623] Tainted: [D]=DIE, [W]=WARN, [N]=TEST [ 155.940669] Hardware name: linux,dummy-virt (DT) [ 155.940723] Call trace: [ 155.940773] show_stack+0x18/0x24 (C) [ 155.940873] __dump_stack+0x28/0x38 [ 155.940954] dump_stack_lvl+0x54/0x6c [ 155.941031] print_address_description+0x90/0x234 [ 155.941148] print_report+0x68/0x84 [ 155.941223] kasan_report+0xd8/0x134 [ 155.941306] kasan_check_range+0x264/0x2a4 [ 155.941399] __asan_memcpy+0x3c/0x84 [ 155.941472] cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 155.941547] cs_dsp_mock_bin_add_info+0x10/0x1c [ 155.941633] bin_patch_name_and_info+0xfc/0x550 [ 155.941711] kunit_try_run_case+0x118/0x31c [ 155.941794] kunit_generic_run_threadfn_adapter+0x84/0x104 [ 155.941870] kthread+0x3f4/0x518 [ 155.941950] ret_from_fork+0x10/0x20 [ 155.942040] [ 155.942128] The buggy address belongs to the variable: [ 155.942177] .str.279+0x0/0x20 [ 155.942255] [ 155.942398] The buggy address belongs to the virtual mapping at [ 155.942398] [ffffaf9cb7690000, ffffaf9cb8df0000) created by: [ 155.942398] declare_kernel_vmas+0x54/0xb4 [ 155.942498] [ 155.942587] The buggy address belongs to the physical page: [ 155.942949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd6 [ 155.943102] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 155.943599] raw: 03fffe0000002000 ffffc1ffc00f3588 ffffc1ffc00f3588 0000000000000000 [ 155.943694] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 155.943809] page dumped because: kasan: bad access detected [ 155.943891] [ 155.943968] Memory state around the buggy address: [ 155.944208] ffffaf9cb84d6800: 00 04 f9 f9 00 00 05 f9 f9 f9 f9 f9 00 00 f9 f9 [ 155.944327] ffffaf9cb84d6880: 00 00 f9 f9 00 00 00 00 00 00 00 00 00 00 f9 f9 [ 155.944464] >ffffaf9cb84d6900: f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9 00 02 f9 f9 [ 155.944546] ^ [ 155.944682] ffffaf9cb84d6980: 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9 00 00 00 f9 [ 155.944777] ffffaf9cb84d6a00: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9 [ 155.944872] ==================================================================
[ 117.564593] ================================================================== [ 117.565235] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 117.565476] Read of size 12 at addr ffff98ceb20d69a0 by task kunit_try_catch/3097 [ 117.565564] [ 117.565679] CPU: 0 UID: 0 PID: 3097 Comm: kunit_try_catch Tainted: G D W N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 117.565769] Tainted: [D]=DIE, [W]=WARN, [N]=TEST [ 117.565803] Hardware name: linux,dummy-virt (DT) [ 117.565841] Call trace: [ 117.565872] show_stack+0x18/0x24 (C) [ 117.565946] __dump_stack+0x28/0x38 [ 117.566005] dump_stack_lvl+0x54/0x6c [ 117.566061] print_address_description+0x90/0x234 [ 117.566123] print_report+0x68/0x84 [ 117.566176] kasan_report+0xd8/0x134 [ 117.566235] kasan_check_range+0x264/0x2a4 [ 117.566293] __asan_memcpy+0x3c/0x84 [ 117.566345] cs_dsp_mock_bin_add_name_or_info+0x144/0x620 [ 117.566401] cs_dsp_mock_bin_add_info+0x10/0x1c [ 117.566472] bin_patch_name_and_info+0xfc/0x550 [ 117.566531] kunit_try_run_case+0x118/0x31c [ 117.566591] kunit_generic_run_threadfn_adapter+0x84/0x104 [ 117.566648] kthread+0x3f4/0x518 [ 117.566710] ret_from_fork+0x10/0x20 [ 117.566782] [ 117.566846] The buggy address belongs to the variable: [ 117.566885] .str.279+0x0/0x20 [ 117.566951] [ 117.567051] The buggy address belongs to the virtual mapping at [ 117.567051] [ffff98ceb1290000, ffff98ceb29f0000) created by: [ 117.567051] declare_kernel_vmas+0x54/0xb4 [ 117.567132] [ 117.567202] The buggy address belongs to the physical page: [ 117.567395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd6 [ 117.567530] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 117.567897] raw: 03fffe0000002000 ffffc1ffc00f3588 ffffc1ffc00f3588 0000000000000000 [ 117.567973] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 117.568064] page dumped because: kasan: bad access detected [ 117.568131] [ 117.568187] Memory state around the buggy address: [ 117.568363] ffff98ceb20d6880: f9 f9 f9 f9 00 00 f9 f9 00 00 f9 f9 00 00 00 00 [ 117.568459] ffff98ceb20d6900: 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 [ 117.568538] >ffff98ceb20d6980: 00 01 f9 f9 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 [ 117.568594] ^ [ 117.568695] ffff98ceb20d6a00: 00 06 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 [ 117.568767] ffff98ceb20d6a80: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 [ 117.568837] ==================================================================