Date
June 8, 2025, 11:09 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
rk3399-rock-pi-4b |
[ 33.954495] ================================================================== [ 33.958010] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 33.964949] Free of addr ffff0008048e0001 by task kunit_try_catch/258 [ 33.971374] [ 33.972860] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 33.972921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.972938] Hardware name: WinLink E850-96 board (DT) [ 33.972962] Call trace: [ 33.972977] show_stack+0x20/0x38 (C) [ 33.973014] dump_stack_lvl+0x8c/0xd0 [ 33.973052] print_report+0x118/0x608 [ 33.973087] kasan_report_invalid_free+0xc0/0xe8 [ 33.973125] check_slab_allocation+0xfc/0x108 [ 33.973161] __kasan_slab_pre_free+0x2c/0x48 [ 33.973194] kmem_cache_free+0xf0/0x468 [ 33.973228] kmem_cache_invalid_free+0x184/0x3c8 [ 33.973260] kunit_try_run_case+0x170/0x3f0 [ 33.973298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.973336] kthread+0x328/0x630 [ 33.973364] ret_from_fork+0x10/0x20 [ 33.973404] [ 34.044808] Allocated by task 258: [ 34.048195] kasan_save_stack+0x3c/0x68 [ 34.052012] kasan_save_track+0x20/0x40 [ 34.055833] kasan_save_alloc_info+0x40/0x58 [ 34.060084] __kasan_slab_alloc+0xa8/0xb0 [ 34.064077] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.068678] kmem_cache_invalid_free+0x12c/0x3c8 [ 34.073279] kunit_try_run_case+0x170/0x3f0 [ 34.077445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.082914] kthread+0x328/0x630 [ 34.086126] ret_from_fork+0x10/0x20 [ 34.089685] [ 34.091163] The buggy address belongs to the object at ffff0008048e0000 [ 34.091163] which belongs to the cache test_cache of size 200 [ 34.103577] The buggy address is located 1 bytes inside of [ 34.103577] 200-byte region [ffff0008048e0000, ffff0008048e00c8) [ 34.115118] [ 34.116598] The buggy address belongs to the physical page: [ 34.122154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848e0 [ 34.130137] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.137777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.144721] page_type: f5(slab) [ 34.147859] raw: 0bfffe0000000040 ffff000801d92a00 dead000000000122 0000000000000000 [ 34.155576] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.163304] head: 0bfffe0000000040 ffff000801d92a00 dead000000000122 0000000000000000 [ 34.171114] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 34.178927] head: 0bfffe0000000001 fffffdffe0123801 00000000ffffffff 00000000ffffffff [ 34.186739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 34.194544] page dumped because: kasan: bad access detected [ 34.200100] [ 34.201575] Memory state around the buggy address: [ 34.206358] ffff0008048dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.213558] ffff0008048dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.220763] >ffff0008048e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.227964] ^ [ 34.231180] ffff0008048e0080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 34.238384] ffff0008048e0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.245587] ==================================================================
[ 26.573240] ================================================================== [ 26.573379] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 26.573520] Free of addr fff00000c6426001 by task kunit_try_catch/211 [ 26.573627] [ 26.573823] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.574111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.574310] Hardware name: linux,dummy-virt (DT) [ 26.574399] Call trace: [ 26.574460] show_stack+0x20/0x38 (C) [ 26.574589] dump_stack_lvl+0x8c/0xd0 [ 26.574718] print_report+0x118/0x608 [ 26.574848] kasan_report_invalid_free+0xc0/0xe8 [ 26.575003] check_slab_allocation+0xfc/0x108 [ 26.575161] __kasan_slab_pre_free+0x2c/0x48 [ 26.575320] kmem_cache_free+0xf0/0x468 [ 26.575578] kmem_cache_invalid_free+0x184/0x3c8 [ 26.575771] kunit_try_run_case+0x170/0x3f0 [ 26.576099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.576600] kthread+0x328/0x630 [ 26.576846] ret_from_fork+0x10/0x20 [ 26.577272] [ 26.577430] Allocated by task 211: [ 26.577827] kasan_save_stack+0x3c/0x68 [ 26.578003] kasan_save_track+0x20/0x40 [ 26.578490] kasan_save_alloc_info+0x40/0x58 [ 26.578597] __kasan_slab_alloc+0xa8/0xb0 [ 26.579708] kmem_cache_alloc_noprof+0x10c/0x398 [ 26.580429] kmem_cache_invalid_free+0x12c/0x3c8 [ 26.580851] kunit_try_run_case+0x170/0x3f0 [ 26.581034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.581507] kthread+0x328/0x630 [ 26.581763] ret_from_fork+0x10/0x20 [ 26.582000] [ 26.582209] The buggy address belongs to the object at fff00000c6426000 [ 26.582209] which belongs to the cache test_cache of size 200 [ 26.582484] The buggy address is located 1 bytes inside of [ 26.582484] 200-byte region [fff00000c6426000, fff00000c64260c8) [ 26.582644] [ 26.582701] The buggy address belongs to the physical page: [ 26.582777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106426 [ 26.582927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.583063] page_type: f5(slab) [ 26.583166] raw: 0bfffe0000000000 fff00000c569f8c0 dead000000000122 0000000000000000 [ 26.583299] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.583404] page dumped because: kasan: bad access detected [ 26.583485] [ 26.583542] Memory state around the buggy address: [ 26.583702] fff00000c6425f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.583812] fff00000c6425f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.583918] >fff00000c6426000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.584043] ^ [ 26.584252] fff00000c6426080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 26.584364] fff00000c6426100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.584461] ==================================================================
[ 26.851704] ================================================================== [ 26.853233] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 26.853732] Free of addr fff00000c770c001 by task kunit_try_catch/211 [ 26.853863] [ 26.853959] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 26.854207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.854277] Hardware name: linux,dummy-virt (DT) [ 26.854501] Call trace: [ 26.854669] show_stack+0x20/0x38 (C) [ 26.854806] dump_stack_lvl+0x8c/0xd0 [ 26.854953] print_report+0x118/0x608 [ 26.855128] kasan_report_invalid_free+0xc0/0xe8 [ 26.855261] check_slab_allocation+0xfc/0x108 [ 26.855387] __kasan_slab_pre_free+0x2c/0x48 [ 26.855504] kmem_cache_free+0xf0/0x468 [ 26.855622] kmem_cache_invalid_free+0x184/0x3c8 [ 26.855745] kunit_try_run_case+0x170/0x3f0 [ 26.856674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.857149] kthread+0x328/0x630 [ 26.857559] ret_from_fork+0x10/0x20 [ 26.857682] [ 26.857728] Allocated by task 211: [ 26.857801] kasan_save_stack+0x3c/0x68 [ 26.857922] kasan_save_track+0x20/0x40 [ 26.860100] kasan_save_alloc_info+0x40/0x58 [ 26.860511] __kasan_slab_alloc+0xa8/0xb0 [ 26.861023] kmem_cache_alloc_noprof+0x10c/0x398 [ 26.861179] kmem_cache_invalid_free+0x12c/0x3c8 [ 26.861567] kunit_try_run_case+0x170/0x3f0 [ 26.862703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.863325] kthread+0x328/0x630 [ 26.863418] ret_from_fork+0x10/0x20 [ 26.863510] [ 26.863557] The buggy address belongs to the object at fff00000c770c000 [ 26.863557] which belongs to the cache test_cache of size 200 [ 26.863702] The buggy address is located 1 bytes inside of [ 26.863702] 200-byte region [fff00000c770c000, fff00000c770c0c8) [ 26.866263] [ 26.866717] The buggy address belongs to the physical page: [ 26.867155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c [ 26.867298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.867420] page_type: f5(slab) [ 26.867521] raw: 0bfffe0000000000 fff00000c1725dc0 dead000000000122 0000000000000000 [ 26.869802] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 26.870330] page dumped because: kasan: bad access detected [ 26.870893] [ 26.871365] Memory state around the buggy address: [ 26.871451] fff00000c770bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.871558] fff00000c770bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.872901] >fff00000c770c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.873387] ^ [ 26.873493] fff00000c770c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 26.873957] fff00000c770c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.874294] ==================================================================
[ 20.258439] ================================================================== [ 20.259310] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 20.260617] Free of addr ffff8881039d2001 by task kunit_try_catch/229 [ 20.262595] [ 20.263156] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 20.263392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.263436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 20.263518] Call Trace: [ 20.263569] <TASK> [ 20.263620] dump_stack_lvl+0x73/0xb0 [ 20.263820] print_report+0xd1/0x650 [ 20.263908] ? __virt_addr_valid+0x1db/0x2d0 [ 20.263950] ? kasan_complete_mode_report_info+0x2a/0x200 [ 20.263982] ? kmem_cache_invalid_free+0x1d8/0x460 [ 20.264018] kasan_report_invalid_free+0x10a/0x130 [ 20.264052] ? kmem_cache_invalid_free+0x1d8/0x460 [ 20.264090] ? kmem_cache_invalid_free+0x1d8/0x460 [ 20.264125] check_slab_allocation+0x11f/0x130 [ 20.264155] __kasan_slab_pre_free+0x28/0x40 [ 20.264184] kmem_cache_free+0xed/0x420 [ 20.264218] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 20.264284] ? kmem_cache_invalid_free+0x1d8/0x460 [ 20.264326] kmem_cache_invalid_free+0x1d8/0x460 [ 20.264362] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 20.264396] ? finish_task_switch.isra.0+0x153/0x700 [ 20.264428] ? __switch_to+0x47/0xf50 [ 20.264469] ? __pfx_read_tsc+0x10/0x10 [ 20.264523] ? ktime_get_ts64+0x86/0x230 [ 20.264607] kunit_try_run_case+0x1a5/0x480 [ 20.264691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.264759] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 20.264801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 20.264834] ? __kthread_parkme+0x82/0x180 [ 20.264862] ? preempt_count_sub+0x50/0x80 [ 20.264894] ? __pfx_kunit_try_run_case+0x10/0x10 [ 20.264928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.264961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 20.264994] kthread+0x337/0x6f0 [ 20.265021] ? trace_preempt_on+0x20/0xc0 [ 20.265055] ? __pfx_kthread+0x10/0x10 [ 20.265083] ? _raw_spin_unlock_irq+0x47/0x80 [ 20.265113] ? calculate_sigpending+0x7b/0xa0 [ 20.265147] ? __pfx_kthread+0x10/0x10 [ 20.265175] ret_from_fork+0x116/0x1d0 [ 20.265201] ? __pfx_kthread+0x10/0x10 [ 20.265242] ret_from_fork_asm+0x1a/0x30 [ 20.265306] </TASK> [ 20.265322] [ 20.287982] Allocated by task 229: [ 20.288387] kasan_save_stack+0x45/0x70 [ 20.289024] kasan_save_track+0x18/0x40 [ 20.289482] kasan_save_alloc_info+0x3b/0x50 [ 20.290249] __kasan_slab_alloc+0x91/0xa0 [ 20.291275] kmem_cache_alloc_noprof+0x123/0x3f0 [ 20.291675] kmem_cache_invalid_free+0x157/0x460 [ 20.292145] kunit_try_run_case+0x1a5/0x480 [ 20.292609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 20.293067] kthread+0x337/0x6f0 [ 20.293437] ret_from_fork+0x116/0x1d0 [ 20.294305] ret_from_fork_asm+0x1a/0x30 [ 20.295396] [ 20.295832] The buggy address belongs to the object at ffff8881039d2000 [ 20.295832] which belongs to the cache test_cache of size 200 [ 20.296969] The buggy address is located 1 bytes inside of [ 20.296969] 200-byte region [ffff8881039d2000, ffff8881039d20c8) [ 20.298251] [ 20.298524] The buggy address belongs to the physical page: [ 20.299556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039d2 [ 20.300437] flags: 0x200000000000000(node=0|zone=2) [ 20.300909] page_type: f5(slab) [ 20.301229] raw: 0200000000000000 ffff888101678640 dead000000000122 0000000000000000 [ 20.301889] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 20.302456] page dumped because: kasan: bad access detected [ 20.303864] [ 20.304058] Memory state around the buggy address: [ 20.304707] ffff8881039d1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.305353] ffff8881039d1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.306075] >ffff8881039d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.307284] ^ [ 20.307567] ffff8881039d2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 20.308422] ffff8881039d2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.309140] ==================================================================
[ 19.138137] ================================================================== [ 19.139867] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 19.141374] Free of addr ffff88810330b001 by task kunit_try_catch/229 [ 19.142067] [ 19.142701] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT(voluntary) [ 19.142828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.142865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.142950] Call Trace: [ 19.142990] <TASK> [ 19.143038] dump_stack_lvl+0x73/0xb0 [ 19.143128] print_report+0xd1/0x650 [ 19.143209] ? __virt_addr_valid+0x1db/0x2d0 [ 19.143291] ? kasan_complete_mode_report_info+0x2a/0x200 [ 19.143363] ? kmem_cache_invalid_free+0x1d8/0x460 [ 19.143410] kasan_report_invalid_free+0x10a/0x130 [ 19.143447] ? kmem_cache_invalid_free+0x1d8/0x460 [ 19.143486] ? kmem_cache_invalid_free+0x1d8/0x460 [ 19.143543] check_slab_allocation+0x11f/0x130 [ 19.143621] __kasan_slab_pre_free+0x28/0x40 [ 19.143667] kmem_cache_free+0xed/0x420 [ 19.143698] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 19.143728] ? kmem_cache_invalid_free+0x1d8/0x460 [ 19.143766] kmem_cache_invalid_free+0x1d8/0x460 [ 19.143801] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 19.143835] ? finish_task_switch.isra.0+0x153/0x700 [ 19.143866] ? __switch_to+0x47/0xf50 [ 19.143935] ? __pfx_read_tsc+0x10/0x10 [ 19.143968] ? ktime_get_ts64+0x86/0x230 [ 19.144003] kunit_try_run_case+0x1a5/0x480 [ 19.144040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.144073] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.144123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 19.144172] ? __kthread_parkme+0x82/0x180 [ 19.144200] ? preempt_count_sub+0x50/0x80 [ 19.144231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 19.144265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.144298] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 19.144331] kthread+0x337/0x6f0 [ 19.144358] ? trace_preempt_on+0x20/0xc0 [ 19.144392] ? __pfx_kthread+0x10/0x10 [ 19.144421] ? _raw_spin_unlock_irq+0x47/0x80 [ 19.144452] ? calculate_sigpending+0x7b/0xa0 [ 19.144488] ? __pfx_kthread+0x10/0x10 [ 19.144533] ret_from_fork+0x116/0x1d0 [ 19.144602] ? __pfx_kthread+0x10/0x10 [ 19.144674] ret_from_fork_asm+0x1a/0x30 [ 19.144722] </TASK> [ 19.144737] [ 19.166148] Allocated by task 229: [ 19.166551] kasan_save_stack+0x45/0x70 [ 19.167086] kasan_save_track+0x18/0x40 [ 19.167508] kasan_save_alloc_info+0x3b/0x50 [ 19.168017] __kasan_slab_alloc+0x91/0xa0 [ 19.168397] kmem_cache_alloc_noprof+0x123/0x3f0 [ 19.169030] kmem_cache_invalid_free+0x157/0x460 [ 19.169629] kunit_try_run_case+0x1a5/0x480 [ 19.170046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.170490] kthread+0x337/0x6f0 [ 19.170962] ret_from_fork+0x116/0x1d0 [ 19.171471] ret_from_fork_asm+0x1a/0x30 [ 19.171972] [ 19.172265] The buggy address belongs to the object at ffff88810330b000 [ 19.172265] which belongs to the cache test_cache of size 200 [ 19.173324] The buggy address is located 1 bytes inside of [ 19.173324] 200-byte region [ffff88810330b000, ffff88810330b0c8) [ 19.174211] [ 19.174475] The buggy address belongs to the physical page: [ 19.175287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10330b [ 19.176002] flags: 0x200000000000000(node=0|zone=2) [ 19.176629] page_type: f5(slab) [ 19.177142] raw: 0200000000000000 ffff888101affa00 dead000000000122 0000000000000000 [ 19.177702] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 19.178410] page dumped because: kasan: bad access detected [ 19.178991] [ 19.179284] Memory state around the buggy address: [ 19.179933] ffff88810330af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.180669] ffff88810330af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.181227] >ffff88810330b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.181896] ^ [ 19.182222] ffff88810330b080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 19.183173] ffff88810330b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.184050] ==================================================================
[ 21.251417] ================================================================== [ 21.252511] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 21.253179] Free of addr ffff00000e044001 by task kunit_try_catch/264 [ 21.253776] [ 21.253941] CPU: 2 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc1 #1 PREEMPT [ 21.253991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.254005] Hardware name: Radxa ROCK Pi 4B (DT) [ 21.254023] Call trace: [ 21.254035] show_stack+0x20/0x38 (C) [ 21.254069] dump_stack_lvl+0x8c/0xd0 [ 21.254105] print_report+0x118/0x608 [ 21.254138] kasan_report_invalid_free+0xc0/0xe8 [ 21.254173] check_slab_allocation+0xfc/0x108 [ 21.254205] __kasan_slab_pre_free+0x2c/0x48 [ 21.254238] kmem_cache_free+0xf0/0x468 [ 21.254270] kmem_cache_invalid_free+0x184/0x3c8 [ 21.254301] kunit_try_run_case+0x170/0x3f0 [ 21.254336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.254375] kthread+0x328/0x630 [ 21.254401] ret_from_fork+0x10/0x20 [ 21.254433] [ 21.260825] Allocated by task 264: [ 21.261152] kasan_save_stack+0x3c/0x68 [ 21.261530] kasan_save_track+0x20/0x40 [ 21.261905] kasan_save_alloc_info+0x40/0x58 [ 21.262321] __kasan_slab_alloc+0xa8/0xb0 [ 21.262712] kmem_cache_alloc_noprof+0x10c/0x398 [ 21.263158] kmem_cache_invalid_free+0x12c/0x3c8 [ 21.263601] kunit_try_run_case+0x170/0x3f0 [ 21.264007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.264531] kthread+0x328/0x630 [ 21.264847] ret_from_fork+0x10/0x20 [ 21.265196] [ 21.265350] The buggy address belongs to the object at ffff00000e044000 [ 21.265350] which belongs to the cache test_cache of size 200 [ 21.266473] The buggy address is located 1 bytes inside of [ 21.266473] 200-byte region [ffff00000e044000, ffff00000e0440c8) [ 21.267523] [ 21.267677] The buggy address belongs to the physical page: [ 21.268192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe044 [ 21.268915] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.269621] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff) [ 21.270272] page_type: f5(slab) [ 21.270585] raw: 03fffe0000000040 ffff00000e042000 dead000000000122 0000000000000000 [ 21.271301] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 21.272016] head: 03fffe0000000040 ffff00000e042000 dead000000000122 0000000000000000 [ 21.272740] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 21.273463] head: 03fffe0000000001 fffffdffc0381101 00000000ffffffff 00000000ffffffff [ 21.274186] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 21.274901] page dumped because: kasan: bad access detected [ 21.275415] [ 21.275567] Memory state around the buggy address: [ 21.276015] ffff00000e043f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.276681] ffff00000e043f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.277347] >ffff00000e044000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.278008] ^ [ 21.278319] ffff00000e044080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 21.278985] ffff00000e044100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.279646] ==================================================================