Build

Regressions (compared to v6.14-rc4-77-gf4ce1f3318ad)

qemu-arm64-protected, kvm-unit-tests

qemu-arm64, log-parser-boot

qemu-arm64, log-parser-test

Test log snippets

test log snippet regressions 1

timer-ptimer-busy-loop-interrupt-signal-pending fail

test log snippet regressions 2

timer-ptimer-busy-loop-interrupt-signal-pending fail

test log snippet regressions 3

[   36.426505] ==================================================================
[   36.427531] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   36.428292] Free of addr fffcb81544243280 by task kunit_try_catch/180
[   36.430047] 
[   36.430409] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc4 #1
[   36.430635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.430713] Hardware name: linux,dummy-virt (DT)
[   36.430829] Call trace:
[   36.430888]  show_stack+0x20/0x38 (C)
[   36.431077]  dump_stack_lvl+0x8c/0xd0
[   36.431247]  print_report+0x118/0x5f0
[   36.431350]  kasan_report_invalid_free+0xb0/0xd8
[   36.431436]  check_slab_allocation+0xd4/0x108
[   36.431514]  __kasan_slab_pre_free+0x2c/0x48
[   36.431594]  kfree+0xe8/0x3c8
[   36.431662]  kfree_sensitive+0x3c/0xb0
[   36.431839]  kmalloc_double_kzfree+0x168/0x308
[   36.431992]  kunit_try_run_case+0x14c/0x3d0
[   36.432090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.432183]  kthread+0x318/0x618
[   36.432257]  ret_from_fork+0x10/0x20
[   36.432334] 
[   36.441307] Allocated by task 180:
[   36.442200]  kasan_save_stack+0x3c/0x68
[   36.442816]  kasan_save_track+0x20/0x40
[   36.443447]  kasan_save_alloc_info+0x40/0x58
[   36.444283]  __kasan_kmalloc+0xd4/0xd8
[   36.444828]  __kmalloc_cache_noprof+0x15c/0x3c0
[   36.445613]  kmalloc_double_kzfree+0xb8/0x308
[   36.446443]  kunit_try_run_case+0x14c/0x3d0
[   36.447148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.448125]  kthread+0x318/0x618
[   36.448560]  ret_from_fork+0x10/0x20
[   36.449194] 
[   36.449450] Freed by task 180:
[   36.450484]  kasan_save_stack+0x3c/0x68
[   36.451235]  kasan_save_track+0x20/0x40
[   36.452276]  kasan_save_free_info+0x4c/0x78
[   36.452922]  __kasan_slab_free+0x6c/0x98
[   36.453683]  kfree+0x214/0x3c8
[   36.454363]  kfree_sensitive+0x80/0xb0
[   36.455077]  kmalloc_double_kzfree+0x11c/0x308
[   36.456194]  kunit_try_run_case+0x14c/0x3d0
[   36.457147]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.457827]  kthread+0x318/0x618
[   36.458431]  ret_from_fork+0x10/0x20
[   36.459097] 
[   36.459560] The buggy address belongs to the object at fffcb81544243280
[   36.459560]  which belongs to the cache kmalloc-16 of size 16
[   36.461317] The buggy address is located 0 bytes inside of
[   36.461317]  16-byte region [fffcb81544243280, fffcb81544243290)
[   36.462832] 
[   36.463295] The buggy address belongs to the physical page:
[   36.464093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104243
[   36.465524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.466537] page_type: f5(slab)
[   36.467168] raw: 0bfffe0000000000 fffcb81540001640 dead000000000122 0000000000000000
[   36.468290] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   36.469959] page dumped because: kasan: bad access detected
[   36.470817] 
[   36.471243] Memory state around the buggy address:
[   36.472151]  fffcb81544243180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.473320]  fffcb81544243200: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   36.474245] >fffcb81544243280: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.475224]                    ^
[   36.475856]  fffcb81544243300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.477060]  fffcb81544243380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.478100] ==================================================================

test log snippet regressions 4

[   38.820804] ==================================================================
[   38.822325] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   38.823231] Read of size 1 at addr fffcb8154668dd98 by task kunit_try_catch/245
[   38.824703] 
[   38.825160] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc4 #1
[   38.825421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.825505] Hardware name: linux,dummy-virt (DT)
[   38.825603] Call trace:
[   38.825673]  show_stack+0x20/0x38 (C)
[   38.825830]  dump_stack_lvl+0x8c/0xd0
[   38.825914]  print_report+0x118/0x5f0
[   38.825996]  kasan_report+0xc8/0x118
[   38.826076]  __asan_report_load1_noabort+0x20/0x30
[   38.826166]  memcmp+0x198/0x1d8
[   38.826240]  kasan_memcmp+0x16c/0x300
[   38.826320]  kunit_try_run_case+0x14c/0x3d0
[   38.826404]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.826492]  kthread+0x318/0x618
[   38.826571]  ret_from_fork+0x10/0x20
[   38.826655] 
[   38.837000] Allocated by task 245:
[   38.837655]  kasan_save_stack+0x3c/0x68
[   38.838349]  kasan_save_track+0x20/0x40
[   38.839136]  kasan_save_alloc_info+0x40/0x58
[   38.840560]  __kasan_kmalloc+0xd4/0xd8
[   38.841147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.841868]  kasan_memcmp+0xbc/0x300
[   38.842458]  kunit_try_run_case+0x14c/0x3d0
[   38.843271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.844376]  kthread+0x318/0x618
[   38.844992]  ret_from_fork+0x10/0x20
[   38.845663] 
[   38.846116] The buggy address belongs to the object at fffcb8154668dd80
[   38.846116]  which belongs to the cache kmalloc-32 of size 32
[   38.847722] The buggy address is located 0 bytes to the right of
[   38.847722]  allocated 24-byte region [fffcb8154668dd80, fffcb8154668dd98)
[   38.850019] 
[   38.850464] The buggy address belongs to the physical page:
[   38.851295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10668d
[   38.852920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.853712] page_type: f5(slab)
[   38.854211] raw: 0bfffe0000000000 fffcb81540001780 dead000000000122 0000000000000000
[   38.855250] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   38.856453] page dumped because: kasan: bad access detected
[   38.857270] 
[   38.857626] Memory state around the buggy address:
[   38.859137]  fffcb8154668dc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   38.860168]  fffcb8154668dd00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   38.861381] >fffcb8154668dd80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.862351]                             ^
[   38.863000]  fffcb8154668de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.864247]  fffcb8154668de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   38.865553] ==================================================================

test log snippet regressions 5

[   38.932938] ==================================================================
[   38.933575] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[   38.934727] Read of size 1 at addr fffcb8154669fad0 by task kunit_try_catch/247
[   38.936392] 
[   38.936951] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc4 #1
[   38.937516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   38.937597] Hardware name: linux,dummy-virt (DT)
[   38.937686] Call trace:
[   38.937727]  show_stack+0x20/0x38 (C)
[   38.937838]  dump_stack_lvl+0x8c/0xd0
[   38.937920]  print_report+0x118/0x5f0
[   38.938001]  kasan_report+0xc8/0x118
[   38.938078]  __asan_report_load1_noabort+0x20/0x30
[   38.938169]  kasan_strings+0x838/0x8d8
[   38.938246]  kunit_try_run_case+0x14c/0x3d0
[   38.938327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.938419]  kthread+0x318/0x618
[   38.938495]  ret_from_fork+0x10/0x20
[   38.938576] 
[   38.947612] Allocated by task 247:
[   38.948771]  kasan_save_stack+0x3c/0x68
[   38.949540]  kasan_save_track+0x20/0x40
[   38.950189]  kasan_save_alloc_info+0x40/0x58
[   38.950948]  __kasan_kmalloc+0xd4/0xd8
[   38.951627]  __kmalloc_cache_noprof+0x15c/0x3c0
[   38.952533]  kasan_strings+0xb0/0x8d8
[   38.953211]  kunit_try_run_case+0x14c/0x3d0
[   38.953906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.954756]  kthread+0x318/0x618
[   38.955353]  ret_from_fork+0x10/0x20
[   38.956614] 
[   38.956913] Freed by task 247:
[   38.957440]  kasan_save_stack+0x3c/0x68
[   38.958425]  kasan_save_track+0x20/0x40
[   38.959176]  kasan_save_free_info+0x4c/0x78
[   38.960121]  __kasan_slab_free+0x6c/0x98
[   38.960903]  kfree+0x214/0x3c8
[   38.961483]  kasan_strings+0x124/0x8d8
[   38.962155]  kunit_try_run_case+0x14c/0x3d0
[   38.962891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   38.963709]  kthread+0x318/0x618
[   38.964576]  ret_from_fork+0x10/0x20
[   38.965075] 
[   38.965520] The buggy address belongs to the object at fffcb8154669fac0
[   38.965520]  which belongs to the cache kmalloc-32 of size 32
[   38.967151] The buggy address is located 16 bytes inside of
[   38.967151]  freed 32-byte region [fffcb8154669fac0, fffcb8154669fae0)
[   38.969494] 
[   38.969869] The buggy address belongs to the physical page:
[   38.970610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669f
[   38.971786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   38.972913] page_type: f5(slab)
[   38.973608] raw: 0bfffe0000000000 fffcb81540001780 dead000000000122 0000000000000000
[   38.974677] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   38.975671] page dumped because: kasan: bad access detected
[   38.976616] 
[   38.977353] Memory state around the buggy address:
[   38.977992]  fffcb8154669f980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[   38.978829]  fffcb8154669fa00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   38.979781] >fffcb8154669fa80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   38.980963]                                                  ^
[   38.981736]  fffcb8154669fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   38.982784]  fffcb8154669fb80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   38.983962] ==================================================================

test log snippet regressions 6

------------[ cut here ]------------
[   45.363516] WARNING: CPU: 1 PID: 475 at mm/util.c:674 __kvmalloc_node_noprof+0x11c/0x124
[   45.364895] Modules linked in: sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   45.369688] CPU: 1 UID: 0 PID: 475 Comm: unshare_test Not tainted 6.14.0-rc4 #1
[   45.371506] Hardware name: linux,dummy-virt (DT)
[   45.373090] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   45.374597] pc : __kvmalloc_node_noprof+0x11c/0x124
[   45.375890] lr : __kvmalloc_node_noprof+0x50/0x124
[   45.377117] sp : ffff800080aabce0
[   45.378051] x29: ffff800080aabcf0 x28: fff9c25881743780 x27: 0000000000000000
[   45.379183] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   45.380354] x23: 0000000080001000 x22: 75cf914bc8161d30 x21: 0000000200001e00
[   45.381356] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   45.383208] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   45.384911] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   45.386105] x11: 0000000000000040 x10: 9ca7cc86ce15d300 x9 : 9ca7cc86ce15d300
[   45.387184] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   45.388512] x5 : 0000000000000000 x4 : ffff800080aabcb0 x3 : 0000000000000000
[   45.389559] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   45.390263] Call trace:
[   45.391446]  __kvmalloc_node_noprof+0x11c/0x124 (P)
[   45.392393]  alloc_fdtable+0x74/0x118
[   45.392937]  expand_files+0x114/0x2e0
[   45.393921]  ksys_dup3+0x64/0xe8
[   45.394646]  __arm64_sys_dup3+0x20/0x30
[   45.395641]  invoke_syscall+0x40/0xf8
[   45.396612]  el0_svc_common+0xa8/0xd8
[   45.396925]  do_el0_svc+0x1c/0x28
[   45.397682]  el0_svc+0x38/0x68
[   45.398191]  el0t_64_sync_handler+0x78/0x108
[   45.398849]  el0t_64_sync+0x198/0x19c
[   45.399820] ---[ end trace 0000000000000000 ]---