timer-ptimer-busy-loop-interrupt-signal-pending fail
timer-ptimer-busy-loop-interrupt-signal-pending fail
[ 36.426505] ==================================================================
[ 36.427531] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[ 36.428292] Free of addr fffcb81544243280 by task kunit_try_catch/180
[ 36.430047]
[ 36.430409] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc4 #1
[ 36.430635] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 36.430713] Hardware name: linux,dummy-virt (DT)
[ 36.430829] Call trace:
[ 36.430888] show_stack+0x20/0x38 (C)
[ 36.431077] dump_stack_lvl+0x8c/0xd0
[ 36.431247] print_report+0x118/0x5f0
[ 36.431350] kasan_report_invalid_free+0xb0/0xd8
[ 36.431436] check_slab_allocation+0xd4/0x108
[ 36.431514] __kasan_slab_pre_free+0x2c/0x48
[ 36.431594] kfree+0xe8/0x3c8
[ 36.431662] kfree_sensitive+0x3c/0xb0
[ 36.431839] kmalloc_double_kzfree+0x168/0x308
[ 36.431992] kunit_try_run_case+0x14c/0x3d0
[ 36.432090] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.432183] kthread+0x318/0x618
[ 36.432257] ret_from_fork+0x10/0x20
[ 36.432334]
[ 36.441307] Allocated by task 180:
[ 36.442200] kasan_save_stack+0x3c/0x68
[ 36.442816] kasan_save_track+0x20/0x40
[ 36.443447] kasan_save_alloc_info+0x40/0x58
[ 36.444283] __kasan_kmalloc+0xd4/0xd8
[ 36.444828] __kmalloc_cache_noprof+0x15c/0x3c0
[ 36.445613] kmalloc_double_kzfree+0xb8/0x308
[ 36.446443] kunit_try_run_case+0x14c/0x3d0
[ 36.447148] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.448125] kthread+0x318/0x618
[ 36.448560] ret_from_fork+0x10/0x20
[ 36.449194]
[ 36.449450] Freed by task 180:
[ 36.450484] kasan_save_stack+0x3c/0x68
[ 36.451235] kasan_save_track+0x20/0x40
[ 36.452276] kasan_save_free_info+0x4c/0x78
[ 36.452922] __kasan_slab_free+0x6c/0x98
[ 36.453683] kfree+0x214/0x3c8
[ 36.454363] kfree_sensitive+0x80/0xb0
[ 36.455077] kmalloc_double_kzfree+0x11c/0x308
[ 36.456194] kunit_try_run_case+0x14c/0x3d0
[ 36.457147] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 36.457827] kthread+0x318/0x618
[ 36.458431] ret_from_fork+0x10/0x20
[ 36.459097]
[ 36.459560] The buggy address belongs to the object at fffcb81544243280
[ 36.459560] which belongs to the cache kmalloc-16 of size 16
[ 36.461317] The buggy address is located 0 bytes inside of
[ 36.461317] 16-byte region [fffcb81544243280, fffcb81544243290)
[ 36.462832]
[ 36.463295] The buggy address belongs to the physical page:
[ 36.464093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104243
[ 36.465524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 36.466537] page_type: f5(slab)
[ 36.467168] raw: 0bfffe0000000000 fffcb81540001640 dead000000000122 0000000000000000
[ 36.468290] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[ 36.469959] page dumped because: kasan: bad access detected
[ 36.470817]
[ 36.471243] Memory state around the buggy address:
[ 36.472151] fffcb81544243180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 36.473320] fffcb81544243200: 00 04 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[ 36.474245] >fffcb81544243280: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.475224] ^
[ 36.475856] fffcb81544243300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.477060] fffcb81544243380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 36.478100] ==================================================================
[ 38.820804] ==================================================================
[ 38.822325] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[ 38.823231] Read of size 1 at addr fffcb8154668dd98 by task kunit_try_catch/245
[ 38.824703]
[ 38.825160] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc4 #1
[ 38.825421] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.825505] Hardware name: linux,dummy-virt (DT)
[ 38.825603] Call trace:
[ 38.825673] show_stack+0x20/0x38 (C)
[ 38.825830] dump_stack_lvl+0x8c/0xd0
[ 38.825914] print_report+0x118/0x5f0
[ 38.825996] kasan_report+0xc8/0x118
[ 38.826076] __asan_report_load1_noabort+0x20/0x30
[ 38.826166] memcmp+0x198/0x1d8
[ 38.826240] kasan_memcmp+0x16c/0x300
[ 38.826320] kunit_try_run_case+0x14c/0x3d0
[ 38.826404] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.826492] kthread+0x318/0x618
[ 38.826571] ret_from_fork+0x10/0x20
[ 38.826655]
[ 38.837000] Allocated by task 245:
[ 38.837655] kasan_save_stack+0x3c/0x68
[ 38.838349] kasan_save_track+0x20/0x40
[ 38.839136] kasan_save_alloc_info+0x40/0x58
[ 38.840560] __kasan_kmalloc+0xd4/0xd8
[ 38.841147] __kmalloc_cache_noprof+0x15c/0x3c0
[ 38.841868] kasan_memcmp+0xbc/0x300
[ 38.842458] kunit_try_run_case+0x14c/0x3d0
[ 38.843271] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.844376] kthread+0x318/0x618
[ 38.844992] ret_from_fork+0x10/0x20
[ 38.845663]
[ 38.846116] The buggy address belongs to the object at fffcb8154668dd80
[ 38.846116] which belongs to the cache kmalloc-32 of size 32
[ 38.847722] The buggy address is located 0 bytes to the right of
[ 38.847722] allocated 24-byte region [fffcb8154668dd80, fffcb8154668dd98)
[ 38.850019]
[ 38.850464] The buggy address belongs to the physical page:
[ 38.851295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10668d
[ 38.852920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 38.853712] page_type: f5(slab)
[ 38.854211] raw: 0bfffe0000000000 fffcb81540001780 dead000000000122 0000000000000000
[ 38.855250] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 38.856453] page dumped because: kasan: bad access detected
[ 38.857270]
[ 38.857626] Memory state around the buggy address:
[ 38.859137] fffcb8154668dc80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[ 38.860168] fffcb8154668dd00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 38.861381] >fffcb8154668dd80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.862351] ^
[ 38.863000] fffcb8154668de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.864247] fffcb8154668de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 38.865553] ==================================================================
[ 38.932938] ==================================================================
[ 38.933575] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[ 38.934727] Read of size 1 at addr fffcb8154669fad0 by task kunit_try_catch/247
[ 38.936392]
[ 38.936951] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc4 #1
[ 38.937516] Tainted: [B]=BAD_PAGE, [N]=TEST
[ 38.937597] Hardware name: linux,dummy-virt (DT)
[ 38.937686] Call trace:
[ 38.937727] show_stack+0x20/0x38 (C)
[ 38.937838] dump_stack_lvl+0x8c/0xd0
[ 38.937920] print_report+0x118/0x5f0
[ 38.938001] kasan_report+0xc8/0x118
[ 38.938078] __asan_report_load1_noabort+0x20/0x30
[ 38.938169] kasan_strings+0x838/0x8d8
[ 38.938246] kunit_try_run_case+0x14c/0x3d0
[ 38.938327] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.938419] kthread+0x318/0x618
[ 38.938495] ret_from_fork+0x10/0x20
[ 38.938576]
[ 38.947612] Allocated by task 247:
[ 38.948771] kasan_save_stack+0x3c/0x68
[ 38.949540] kasan_save_track+0x20/0x40
[ 38.950189] kasan_save_alloc_info+0x40/0x58
[ 38.950948] __kasan_kmalloc+0xd4/0xd8
[ 38.951627] __kmalloc_cache_noprof+0x15c/0x3c0
[ 38.952533] kasan_strings+0xb0/0x8d8
[ 38.953211] kunit_try_run_case+0x14c/0x3d0
[ 38.953906] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.954756] kthread+0x318/0x618
[ 38.955353] ret_from_fork+0x10/0x20
[ 38.956614]
[ 38.956913] Freed by task 247:
[ 38.957440] kasan_save_stack+0x3c/0x68
[ 38.958425] kasan_save_track+0x20/0x40
[ 38.959176] kasan_save_free_info+0x4c/0x78
[ 38.960121] __kasan_slab_free+0x6c/0x98
[ 38.960903] kfree+0x214/0x3c8
[ 38.961483] kasan_strings+0x124/0x8d8
[ 38.962155] kunit_try_run_case+0x14c/0x3d0
[ 38.962891] kunit_generic_run_threadfn_adapter+0x88/0x100
[ 38.963709] kthread+0x318/0x618
[ 38.964576] ret_from_fork+0x10/0x20
[ 38.965075]
[ 38.965520] The buggy address belongs to the object at fffcb8154669fac0
[ 38.965520] which belongs to the cache kmalloc-32 of size 32
[ 38.967151] The buggy address is located 16 bytes inside of
[ 38.967151] freed 32-byte region [fffcb8154669fac0, fffcb8154669fae0)
[ 38.969494]
[ 38.969869] The buggy address belongs to the physical page:
[ 38.970610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669f
[ 38.971786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[ 38.972913] page_type: f5(slab)
[ 38.973608] raw: 0bfffe0000000000 fffcb81540001780 dead000000000122 0000000000000000
[ 38.974677] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[ 38.975671] page dumped because: kasan: bad access detected
[ 38.976616]
[ 38.977353] Memory state around the buggy address:
[ 38.977992] fffcb8154669f980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc
[ 38.978829] fffcb8154669fa00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[ 38.979781] >fffcb8154669fa80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 38.980963] ^
[ 38.981736] fffcb8154669fb00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[ 38.982784] fffcb8154669fb80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[ 38.983962] ==================================================================
------------[ cut here ]------------
[ 45.363516] WARNING: CPU: 1 PID: 475 at mm/util.c:674 __kvmalloc_node_noprof+0x11c/0x124
[ 45.364895] Modules linked in: sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[ 45.369688] CPU: 1 UID: 0 PID: 475 Comm: unshare_test Not tainted 6.14.0-rc4 #1
[ 45.371506] Hardware name: linux,dummy-virt (DT)
[ 45.373090] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[ 45.374597] pc : __kvmalloc_node_noprof+0x11c/0x124
[ 45.375890] lr : __kvmalloc_node_noprof+0x50/0x124
[ 45.377117] sp : ffff800080aabce0
[ 45.378051] x29: ffff800080aabcf0 x28: fff9c25881743780 x27: 0000000000000000
[ 45.379183] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[ 45.380354] x23: 0000000080001000 x22: 75cf914bc8161d30 x21: 0000000200001e00
[ 45.381356] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[ 45.383208] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[ 45.384911] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 45.386105] x11: 0000000000000040 x10: 9ca7cc86ce15d300 x9 : 9ca7cc86ce15d300
[ 45.387184] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[ 45.388512] x5 : 0000000000000000 x4 : ffff800080aabcb0 x3 : 0000000000000000
[ 45.389559] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[ 45.390263] Call trace:
[ 45.391446] __kvmalloc_node_noprof+0x11c/0x124 (P)
[ 45.392393] alloc_fdtable+0x74/0x118
[ 45.392937] expand_files+0x114/0x2e0
[ 45.393921] ksys_dup3+0x64/0xe8
[ 45.394646] __arm64_sys_dup3+0x20/0x30
[ 45.395641] invoke_syscall+0x40/0xf8
[ 45.396612] el0_svc_common+0xa8/0xd8
[ 45.396925] do_el0_svc+0x1c/0x28
[ 45.397682] el0_svc+0x38/0x68
[ 45.398191] el0t_64_sync_handler+0x78/0x108
[ 45.398849] el0t_64_sync+0x198/0x19c
[ 45.399820] ---[ end trace 0000000000000000 ]---