Date
April 20, 2025, 11:09 p.m.
Environment | |
---|---|
x15 |
[ 168.648071] ================================================================== [ 168.655334] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3c8/0x3fc [ 168.662292] Read of size 4 at addr f303bd10 by task kunit_try_catch/3840 [ 168.669036] [ 168.670532] CPU: 1 UID: 0 PID: 3840 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-rc3 #1 NONE [ 168.670562] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 168.670593] Hardware name: Generic DRA74X (Flattened Device Tree) [ 168.670593] Call trace: [ 168.670593] unwind_backtrace from show_stack+0x18/0x1c [ 168.670623] show_stack from dump_stack_lvl+0x70/0x90 [ 168.670654] dump_stack_lvl from print_report+0x158/0x528 [ 168.670684] print_report from kasan_report+0xdc/0x118 [ 168.670715] kasan_report from test_cache_read+0x3c8/0x3fc [ 168.670715] test_cache_read from vcap_addr_keysets+0x1d8/0x3b4 [ 168.670745] vcap_addr_keysets from vcap_api_addr_keyset_test+0x238/0x6cc [ 168.670776] vcap_api_addr_keyset_test from kunit_try_run_case+0x22c/0x5a8 [ 168.670806] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 168.670837] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 168.670837] kthread from ret_from_fork+0x14/0x20 [ 168.670867] Exception stack(0xf303bfb0 to 0xf303bff8) [ 168.670898] bfa0: 00000000 00000000 00000000 00000000 [ 168.670898] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 168.670898] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 168.670928] [ 168.789947] The buggy address belongs to stack of task kunit_try_catch/3840 [ 168.796966] and is located at offset 496 in frame: [ 168.801879] vcap_api_addr_keyset_test+0x0/0x6cc [ 168.806518] [ 168.808044] This frame has 7 objects: [ 168.811737] [48, 60) 'matches' [ 168.811737] [80, 104) '__assertion' [ 168.814910] [144, 252) 'admin' [ 168.818511] [288, 328) 'keysets' [ 168.821655] [368, 416) 'keydata' [ 168.825012] [448, 496) 'mskdata' [ 168.828338] [528, 576) 'actdata' [ 168.831695] [ 168.836517] The buggy address belongs to the virtual mapping at [ 168.836517] [f3038000, f303d000) created by: [ 168.836517] kernel_clone+0x174/0x794 [ 168.850524] [ 168.852020] The buggy address belongs to the physical page: [ 168.857635] page: refcount:1 mapcount:0 mapping:00000000 index:0xa3 pfn:0xb0d7f [ 168.864990] flags: 0x80000000(zone=2) [ 168.868682] raw: 80000000 00000000 00000122 00000000 000000a3 00000000 ffffffff 00000001 [ 168.876831] raw: 00000000 [ 168.879455] page dumped because: kasan: bad access detected [ 168.885070] [ 168.886566] Memory state around the buggy address: [ 168.891387] f303bc00: 00 00 00 04 f2 f2 f2 f2 00 00 00 00 00 f2 f2 f2 [ 168.897979] f303bc80: f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 [ 168.904541] >f303bd00: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 f3 f3 f3 f3 [ 168.911102] ^ [ 168.914184] f303bd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 168.920745] f303be00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 [ 168.927337] ==================================================================