Hay
Date
May 30, 2025, 4:14 a.m.

Environment
x15

[  196.980895] ==================================================================
[  196.988189] BUG: KASAN: stack-out-of-bounds in test_cache_read+0x3c8/0x3fc
[  196.995117] Read of size 4 at addr f32c3d10 by task kunit_try_catch/3953
[  197.001861] 
[  197.003387] CPU: 0 UID: 0 PID: 3953 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.0-next-20250530 #1 NONE 
[  197.003417] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  197.003417] Hardware name: Generic DRA74X (Flattened Device Tree)
[  197.003417] Call trace: 
[  197.003417]  unwind_backtrace from show_stack+0x18/0x1c
[  197.003448]  show_stack from dump_stack_lvl+0x70/0x90
[  197.003479]  dump_stack_lvl from print_report+0x158/0x528
[  197.003509]  print_report from kasan_report+0xdc/0x118
[  197.003540]  kasan_report from test_cache_read+0x3c8/0x3fc
[  197.003540]  test_cache_read from vcap_addr_keysets+0x1d8/0x3b4
[  197.003570]  vcap_addr_keysets from vcap_api_addr_keyset_test+0x238/0x6cc
[  197.003601]  vcap_api_addr_keyset_test from kunit_try_run_case+0x22c/0x5a8
[  197.003631]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[  197.003662]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[  197.003662]  kthread from ret_from_fork+0x14/0x20
[  197.003692] Exception stack(0xf32c3fb0 to 0xf32c3ff8)
[  197.003692] 3fa0:                                     00000000 00000000 00000000 00000000
[  197.003723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[  197.003723] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[  197.003753] 
[  197.123657] The buggy address belongs to stack of task kunit_try_catch/3953
[  197.130645]  and is located at offset 496 in frame:
[  197.135559]  vcap_api_addr_keyset_test+0x0/0x6cc
[  197.140228] 
[  197.141723] This frame has 7 objects:
[  197.145416]  [48, 60) 'matches'
[  197.145446]  [80, 104) '__assertion'
[  197.148590]  [144, 252) 'admin'
[  197.152191]  [288, 328) 'keysets'
[  197.155364]  [368, 416) 'keydata'
[  197.158691]  [448, 496) 'mskdata'
[  197.162048]  [528, 576) 'actdata'
[  197.165374] 
[  197.170196] The buggy address belongs to the virtual mapping at
[  197.170196]  [f32c0000, f32c5000) created by:
[  197.170196]  kernel_clone+0x174/0x794
[  197.184204] 
[  197.185699] The buggy address belongs to the physical page:
[  197.191314] page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0xb0b2d
[  197.198577] flags: 0x80000000(zone=2)
[  197.202301] raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
[  197.210418] raw: 00000000
[  197.213073] page dumped because: kasan: bad access detected
[  197.218658] 
[  197.220184] Memory state around the buggy address:
[  197.225006]  f32c3c00: 00 00 00 04 f2 f2 f2 f2 00 00 00 00 00 f2 f2 f2
[  197.231567]  f32c3c80: f2 f2 00 00 00 00 00 00 f2 f2 f2 f2 00 00 00 00
[  197.238128] >f32c3d00: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 f3 f3 f3 f3
[  197.244720]                  ^
[  197.247772]  f32c3d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[  197.254364]  f32c3e00: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2
[  197.260925] ==================================================================