Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
x15 |
[ 196.980895] ================================================================== [ 196.988189] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3c8/0x3fc [ 196.995117] Read of size 4 at addr f32c3d10 by task kunit_try_catch/3953 [ 197.001861] [ 197.003387] CPU: 0 UID: 0 PID: 3953 Comm: kunit_try_catch Tainted: G B D W N 6.15.0-next-20250530 #1 NONE [ 197.003417] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 197.003417] Hardware name: Generic DRA74X (Flattened Device Tree) [ 197.003417] Call trace: [ 197.003417] unwind_backtrace from show_stack+0x18/0x1c [ 197.003448] show_stack from dump_stack_lvl+0x70/0x90 [ 197.003479] dump_stack_lvl from print_report+0x158/0x528 [ 197.003509] print_report from kasan_report+0xdc/0x118 [ 197.003540] kasan_report from test_cache_read+0x3c8/0x3fc [ 197.003540] test_cache_read from vcap_addr_keysets+0x1d8/0x3b4 [ 197.003570] vcap_addr_keysets from vcap_api_addr_keyset_test+0x238/0x6cc [ 197.003601] vcap_api_addr_keyset_test from kunit_try_run_case+0x22c/0x5a8 [ 197.003631] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 197.003662] kunit_generic_run_threadfn_adapter from kthread+0x464/0x810 [ 197.003662] kthread from ret_from_fork+0x14/0x20 [ 197.003692] Exception stack(0xf32c3fb0 to 0xf32c3ff8) [ 197.003692] 3fa0: 00000000 00000000 00000000 00000000 [ 197.003723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 197.003723] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 197.003753] [ 197.123657] The buggy address belongs to stack of task kunit_try_catch/3953 [ 197.130645] and is located at offset 496 in frame: [ 197.135559] vcap_api_addr_keyset_test+0x0/0x6cc [ 197.140228] [ 197.141723] This frame has 7 objects: [ 197.145416] [48, 60) 'matches' [ 197.145446] [80, 104) '__assertion' [ 197.148590] [144, 252) 'admin' [ 197.152191] [288, 328) 'keysets' [ 197.155364] [368, 416) 'keydata' [ 197.158691] [448, 496) 'mskdata' [ 197.162048] [528, 576) 'actdata' [ 197.165374] [ 197.170196] The buggy address belongs to the virtual mapping at [ 197.170196] [f32c0000, f32c5000) created by: [ 197.170196] kernel_clone+0x174/0x794 [ 197.184204] [ 197.185699] The buggy address belongs to the physical page: [ 197.191314] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0b2d [ 197.198577] flags: 0x80000000(zone=2) [ 197.202301] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001 [ 197.210418] raw: 00000000 [ 197.213073] page dumped because: kasan: bad access detected [ 197.218658] [ 197.220184] Memory state around the buggy address: [ 197.225006] f32c3c00: 00 00 00 04 f2 f2 f2 f2 00 00 00 00 00 f2 f2 f2 [ 197.231567] f32c3c80: f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00 [ 197.238128] >f32c3d00: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 f3 f3 f3 f3 [ 197.244720] ^ [ 197.247772] f32c3d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 197.254364] f32c3e00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 [ 197.260925] ==================================================================