Hay
Date
April 20, 2025, 11:09 p.m.

Environment
x15

[  168.648071] ==================================================================
[  168.655334] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3c8/0x3fc
[  168.662292] Read of size 4 at addr f303bd10 by task kunit_try_catch/3840
[  168.669036] 
[  168.670532] CPU: 1 UID: 0 PID: 3840 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-rc3 #1 NONE 
[  168.670562] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  168.670593] Hardware name: Generic DRA74X (Flattened Device Tree)
[  168.670593] Call trace: 
[  168.670593]  unwind_backtrace from show_stack+0x18/0x1c
[  168.670623]  show_stack from dump_stack_lvl+0x70/0x90
[  168.670654]  dump_stack_lvl from print_report+0x158/0x528
[  168.670684]  print_report from kasan_report+0xdc/0x118
[  168.670715]  kasan_report from test_cache_read+0x3c8/0x3fc
[  168.670715]  test_cache_read from vcap_addr_keysets+0x1d8/0x3b4
[  168.670745]  vcap_addr_keysets from vcap_api_addr_keyset_test+0x238/0x6cc
[  168.670776]  vcap_api_addr_keyset_test from kunit_try_run_case+0x22c/0x5a8
[  168.670806]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  168.670837]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  168.670837]  kthread from ret_from_fork+0x14/0x20
[  168.670867] Exception stack(0xf303bfb0 to 0xf303bff8)
[  168.670898] bfa0:                                     00000000 00000000 00000000 00000000
[  168.670898] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  168.670898] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  168.670928] 
[  168.789947] The buggy address belongs to stack of task kunit_try_catch/3840
[  168.796966]  and is located at offset 496 in frame:
[  168.801879]  vcap_api_addr_keyset_test+0x0/0x6cc
[  168.806518] 
[  168.808044] This frame has 7 objects:
[  168.811737]  [48, 60) 'matches'
[  168.811737]  [80, 104) '__assertion'
[  168.814910]  [144, 252) 'admin'
[  168.818511]  [288, 328) 'keysets'
[  168.821655]  [368, 416) 'keydata'
[  168.825012]  [448, 496) 'mskdata'
[  168.828338]  [528, 576) 'actdata'
[  168.831695] 
[  168.836517] The buggy address belongs to the virtual mapping at
[  168.836517]  [f3038000, f303d000) created by:
[  168.836517]  kernel_clone+0x174/0x794
[  168.850524] 
[  168.852020] The buggy address belongs to the physical page:
[  168.857635] page: refcount:1 mapcount:0 mapping:00000000 index:0xa3 pfn:0xb0d7f
[  168.864990] flags: 0x80000000(zone=2)
[  168.868682] raw: 80000000 00000000 00000122 00000000 000000a3 00000000 ffffffff 00000001
[  168.876831] raw: 00000000
[  168.879455] page dumped because: kasan: bad access detected
[  168.885070] 
[  168.886566] Memory state around the buggy address:
[  168.891387]  f303bc00: 00 00 00 04 f2 f2 f2 f2 00 00 00 00 00 f2 f2 f2
[  168.897979]  f303bc80: f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00
[  168.904541] >f303bd00: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 f3 f3 f3 f3
[  168.911102]                  ^
[  168.914184]  f303bd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  168.920745]  f303be00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[  168.927337] ==================================================================