Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.311521] ==================================================================
[   17.311607] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   17.311680] Free of addr fff00000c7992000 by task kunit_try_catch/209
[   17.311726] 
[   17.311768] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.311854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.311881] Hardware name: linux,dummy-virt (DT)
[   17.311915] Call trace:
[   17.311939]  show_stack+0x20/0x38 (C)
[   17.311993]  dump_stack_lvl+0x8c/0xd0
[   17.312044]  print_report+0x118/0x5d0
[   17.312093]  kasan_report_invalid_free+0xc0/0xe8
[   17.312144]  check_slab_allocation+0xd4/0x108
[   17.312200]  __kasan_slab_pre_free+0x2c/0x48
[   17.312248]  kmem_cache_free+0xf0/0x468
[   17.312295]  kmem_cache_double_free+0x190/0x3c8
[   17.312354]  kunit_try_run_case+0x170/0x3f0
[   17.312403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.312456]  kthread+0x328/0x630
[   17.312729]  ret_from_fork+0x10/0x20
[   17.313598] 
[   17.313739] Allocated by task 209:
[   17.313799]  kasan_save_stack+0x3c/0x68
[   17.314443]  kasan_save_track+0x20/0x40
[   17.314697]  kasan_save_alloc_info+0x40/0x58
[   17.314840]  __kasan_slab_alloc+0xa8/0xb0
[   17.314938]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.315073]  kmem_cache_double_free+0x12c/0x3c8
[   17.315197]  kunit_try_run_case+0x170/0x3f0
[   17.315262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.315640]  kthread+0x328/0x630
[   17.315772]  ret_from_fork+0x10/0x20
[   17.315840] 
[   17.315860] Freed by task 209:
[   17.316238]  kasan_save_stack+0x3c/0x68
[   17.316375]  kasan_save_track+0x20/0x40
[   17.316454]  kasan_save_free_info+0x4c/0x78
[   17.316774]  __kasan_slab_free+0x6c/0x98
[   17.316818]  kmem_cache_free+0x260/0x468
[   17.316856]  kmem_cache_double_free+0x140/0x3c8
[   17.316893]  kunit_try_run_case+0x170/0x3f0
[   17.317366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.318257]  kthread+0x328/0x630
[   17.318769]  ret_from_fork+0x10/0x20
[   17.318855] 
[   17.318875] The buggy address belongs to the object at fff00000c7992000
[   17.318875]  which belongs to the cache test_cache of size 200
[   17.319262] The buggy address is located 0 bytes inside of
[   17.319262]  200-byte region [fff00000c7992000, fff00000c79920c8)
[   17.319386] 
[   17.319457] The buggy address belongs to the physical page:
[   17.319842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107992
[   17.320306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.320435] page_type: f5(slab)
[   17.320798] raw: 0bfffe0000000000 fff00000c598d280 dead000000000122 0000000000000000
[   17.320943] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.320989] page dumped because: kasan: bad access detected
[   17.321200] 
[   17.321307] Memory state around the buggy address:
[   17.321571]  fff00000c7991f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.321666]  fff00000c7991f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.321711] >fff00000c7992000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.321802]                    ^
[   17.321845]  fff00000c7992080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.321897]  fff00000c7992100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.321936] ==================================================================

[   17.122397] ==================================================================
[   17.122479] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   17.122553] Free of addr fff00000c775c000 by task kunit_try_catch/209
[   17.122613] 
[   17.122675] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.122800] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.122914] Hardware name: linux,dummy-virt (DT)
[   17.122956] Call trace:
[   17.122980]  show_stack+0x20/0x38 (C)
[   17.123168]  dump_stack_lvl+0x8c/0xd0
[   17.123249]  print_report+0x118/0x5d0
[   17.123379]  kasan_report_invalid_free+0xc0/0xe8
[   17.123464]  check_slab_allocation+0xd4/0x108
[   17.123545]  __kasan_slab_pre_free+0x2c/0x48
[   17.123614]  kmem_cache_free+0xf0/0x468
[   17.123661]  kmem_cache_double_free+0x190/0x3c8
[   17.123710]  kunit_try_run_case+0x170/0x3f0
[   17.123797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.123968]  kthread+0x328/0x630
[   17.124096]  ret_from_fork+0x10/0x20
[   17.124210] 
[   17.124247] Allocated by task 209:
[   17.124353]  kasan_save_stack+0x3c/0x68
[   17.124482]  kasan_save_track+0x20/0x40
[   17.124550]  kasan_save_alloc_info+0x40/0x58
[   17.124637]  __kasan_slab_alloc+0xa8/0xb0
[   17.124752]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.124851]  kmem_cache_double_free+0x12c/0x3c8
[   17.124945]  kunit_try_run_case+0x170/0x3f0
[   17.125043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.125118]  kthread+0x328/0x630
[   17.125152]  ret_from_fork+0x10/0x20
[   17.125199] 
[   17.125347] Freed by task 209:
[   17.125520]  kasan_save_stack+0x3c/0x68
[   17.125615]  kasan_save_track+0x20/0x40
[   17.125746]  kasan_save_free_info+0x4c/0x78
[   17.125849]  __kasan_slab_free+0x6c/0x98
[   17.125915]  kmem_cache_free+0x260/0x468
[   17.125950]  kmem_cache_double_free+0x140/0x3c8
[   17.125988]  kunit_try_run_case+0x170/0x3f0
[   17.126025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.126068]  kthread+0x328/0x630
[   17.126277]  ret_from_fork+0x10/0x20
[   17.126340] 
[   17.126370] The buggy address belongs to the object at fff00000c775c000
[   17.126370]  which belongs to the cache test_cache of size 200
[   17.126483] The buggy address is located 0 bytes inside of
[   17.126483]  200-byte region [fff00000c775c000, fff00000c775c0c8)
[   17.126565] 
[   17.126607] The buggy address belongs to the physical page:
[   17.126652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775c
[   17.126709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.126774] page_type: f5(slab)
[   17.126880] raw: 0bfffe0000000000 fff00000c56bd640 dead000000000122 0000000000000000
[   17.126959] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.127100] page dumped because: kasan: bad access detected
[   17.127220] 
[   17.127239] Memory state around the buggy address:
[   17.127276]  fff00000c775bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.127319]  fff00000c775bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.127364] >fff00000c775c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.127403]                    ^
[   17.127431]  fff00000c775c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.127474]  fff00000c775c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.127511] ==================================================================

[   12.917401] ==================================================================
[   12.919015] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   12.920153] Free of addr ffff888102e37000 by task kunit_try_catch/226
[   12.921379] 
[   12.921487] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.921535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.921547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.921569] Call Trace:
[   12.921582]  <TASK>
[   12.921599]  dump_stack_lvl+0x73/0xb0
[   12.921634]  print_report+0xd1/0x610
[   12.921657]  ? __virt_addr_valid+0x1db/0x2d0
[   12.921682]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.921704]  ? kmem_cache_double_free+0x1e5/0x480
[   12.921729]  kasan_report_invalid_free+0x10a/0x130
[   12.921754]  ? kmem_cache_double_free+0x1e5/0x480
[   12.921780]  ? kmem_cache_double_free+0x1e5/0x480
[   12.921804]  check_slab_allocation+0x101/0x130
[   12.921825]  __kasan_slab_pre_free+0x28/0x40
[   12.921846]  kmem_cache_free+0xed/0x420
[   12.921866]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   12.921886]  ? kmem_cache_double_free+0x1e5/0x480
[   12.921925]  kmem_cache_double_free+0x1e5/0x480
[   12.921949]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   12.921972]  ? finish_task_switch.isra.0+0x153/0x700
[   12.921996]  ? __switch_to+0x47/0xf50
[   12.922026]  ? __pfx_read_tsc+0x10/0x10
[   12.922047]  ? ktime_get_ts64+0x86/0x230
[   12.922081]  kunit_try_run_case+0x1a5/0x480
[   12.922107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.922136]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.922161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.922184]  ? __kthread_parkme+0x82/0x180
[   12.922205]  ? preempt_count_sub+0x50/0x80
[   12.922228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.922251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.922274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.922297]  kthread+0x337/0x6f0
[   12.922316]  ? trace_preempt_on+0x20/0xc0
[   12.922339]  ? __pfx_kthread+0x10/0x10
[   12.922358]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.922379]  ? calculate_sigpending+0x7b/0xa0
[   12.922404]  ? __pfx_kthread+0x10/0x10
[   12.922424]  ret_from_fork+0x116/0x1d0
[   12.922442]  ? __pfx_kthread+0x10/0x10
[   12.922462]  ret_from_fork_asm+0x1a/0x30
[   12.922493]  </TASK>
[   12.922504] 
[   12.930654] Allocated by task 226:
[   12.930827]  kasan_save_stack+0x45/0x70
[   12.930985]  kasan_save_track+0x18/0x40
[   12.931181]  kasan_save_alloc_info+0x3b/0x50
[   12.931399]  __kasan_slab_alloc+0x91/0xa0
[   12.931663]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.931865]  kmem_cache_double_free+0x14f/0x480
[   12.932142]  kunit_try_run_case+0x1a5/0x480
[   12.932314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.932534]  kthread+0x337/0x6f0
[   12.932709]  ret_from_fork+0x116/0x1d0
[   12.932901]  ret_from_fork_asm+0x1a/0x30
[   12.933124] 
[   12.933195] Freed by task 226:
[   12.933314]  kasan_save_stack+0x45/0x70
[   12.933512]  kasan_save_track+0x18/0x40
[   12.933704]  kasan_save_free_info+0x3f/0x60
[   12.933919]  __kasan_slab_free+0x56/0x70
[   12.934109]  kmem_cache_free+0x249/0x420
[   12.934286]  kmem_cache_double_free+0x16a/0x480
[   12.934469]  kunit_try_run_case+0x1a5/0x480
[   12.934680]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.934921]  kthread+0x337/0x6f0
[   12.935122]  ret_from_fork+0x116/0x1d0
[   12.935263]  ret_from_fork_asm+0x1a/0x30
[   12.935462] 
[   12.935561] The buggy address belongs to the object at ffff888102e37000
[   12.935561]  which belongs to the cache test_cache of size 200
[   12.936079] The buggy address is located 0 bytes inside of
[   12.936079]  200-byte region [ffff888102e37000, ffff888102e370c8)
[   12.936543] 
[   12.936619] The buggy address belongs to the physical page:
[   12.936862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102e37
[   12.937311] flags: 0x200000000000000(node=0|zone=2)
[   12.937533] page_type: f5(slab)
[   12.937657] raw: 0200000000000000 ffff888101ba6280 dead000000000122 0000000000000000
[   12.937888] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   12.938946] page dumped because: kasan: bad access detected
[   12.939167] 
[   12.939263] Memory state around the buggy address:
[   12.939470]  ffff888102e36f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.939752]  ffff888102e36f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.940042] >ffff888102e37000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.940335]                    ^
[   12.940490]  ffff888102e37080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   12.940779]  ffff888102e37100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.941187] ==================================================================

[   12.726926] ==================================================================
[   12.728487] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   12.729347] Free of addr ffff8881026e9000 by task kunit_try_catch/227
[   12.730358] 
[   12.730747] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.730915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.730931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.730954] Call Trace:
[   12.730980]  <TASK>
[   12.730999]  dump_stack_lvl+0x73/0xb0
[   12.731072]  print_report+0xd1/0x610
[   12.731099]  ? __virt_addr_valid+0x1db/0x2d0
[   12.731123]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.731145]  ? kmem_cache_double_free+0x1e5/0x480
[   12.731171]  kasan_report_invalid_free+0x10a/0x130
[   12.731195]  ? kmem_cache_double_free+0x1e5/0x480
[   12.731221]  ? kmem_cache_double_free+0x1e5/0x480
[   12.731245]  check_slab_allocation+0x101/0x130
[   12.731267]  __kasan_slab_pre_free+0x28/0x40
[   12.731287]  kmem_cache_free+0xed/0x420
[   12.731307]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   12.731329]  ? kmem_cache_double_free+0x1e5/0x480
[   12.731356]  kmem_cache_double_free+0x1e5/0x480
[   12.731380]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   12.731448]  ? finish_task_switch.isra.0+0x153/0x700
[   12.731472]  ? __switch_to+0x47/0xf50
[   12.731503]  ? __pfx_read_tsc+0x10/0x10
[   12.731545]  ? ktime_get_ts64+0x86/0x230
[   12.731570]  kunit_try_run_case+0x1a5/0x480
[   12.731595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.731617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.731642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.731665]  ? __kthread_parkme+0x82/0x180
[   12.731685]  ? preempt_count_sub+0x50/0x80
[   12.731707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.731731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.731755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.731779]  kthread+0x337/0x6f0
[   12.731797]  ? trace_preempt_on+0x20/0xc0
[   12.731821]  ? __pfx_kthread+0x10/0x10
[   12.731841]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.731862]  ? calculate_sigpending+0x7b/0xa0
[   12.731886]  ? __pfx_kthread+0x10/0x10
[   12.731907]  ret_from_fork+0x116/0x1d0
[   12.731925]  ? __pfx_kthread+0x10/0x10
[   12.731944]  ret_from_fork_asm+0x1a/0x30
[   12.731979]  </TASK>
[   12.731989] 
[   12.750161] Allocated by task 227:
[   12.750311]  kasan_save_stack+0x45/0x70
[   12.750505]  kasan_save_track+0x18/0x40
[   12.750878]  kasan_save_alloc_info+0x3b/0x50
[   12.751288]  __kasan_slab_alloc+0x91/0xa0
[   12.751854]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.752277]  kmem_cache_double_free+0x14f/0x480
[   12.752804]  kunit_try_run_case+0x1a5/0x480
[   12.753268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.753653]  kthread+0x337/0x6f0
[   12.754034]  ret_from_fork+0x116/0x1d0
[   12.754233]  ret_from_fork_asm+0x1a/0x30
[   12.754717] 
[   12.754881] Freed by task 227:
[   12.755174]  kasan_save_stack+0x45/0x70
[   12.755374]  kasan_save_track+0x18/0x40
[   12.755835]  kasan_save_free_info+0x3f/0x60
[   12.756013]  __kasan_slab_free+0x56/0x70
[   12.756376]  kmem_cache_free+0x249/0x420
[   12.756849]  kmem_cache_double_free+0x16a/0x480
[   12.757205]  kunit_try_run_case+0x1a5/0x480
[   12.757351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.757636]  kthread+0x337/0x6f0
[   12.757873]  ret_from_fork+0x116/0x1d0
[   12.758253]  ret_from_fork_asm+0x1a/0x30
[   12.758732] 
[   12.758891] The buggy address belongs to the object at ffff8881026e9000
[   12.758891]  which belongs to the cache test_cache of size 200
[   12.759616] The buggy address is located 0 bytes inside of
[   12.759616]  200-byte region [ffff8881026e9000, ffff8881026e90c8)
[   12.760638] 
[   12.760716] The buggy address belongs to the physical page:
[   12.760888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1026e9
[   12.761135] flags: 0x200000000000000(node=0|zone=2)
[   12.761301] page_type: f5(slab)
[   12.761426] raw: 0200000000000000 ffff8881015ea640 dead000000000122 0000000000000000
[   12.761680] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   12.762119] page dumped because: kasan: bad access detected
[   12.762339] 
[   12.762592] Memory state around the buggy address:
[   12.762853]  ffff8881026e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.763461]  ffff8881026e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.763822] >ffff8881026e9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.764142]                    ^
[   12.764277]  ffff8881026e9080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   12.764618]  ffff8881026e9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.764966] ==================================================================

[   12.934521] ==================================================================
[   12.935652] BUG: KASAN: double-free in kmem_cache_double_free+0x1e5/0x480
[   12.936284] Free of addr ffff88810341c000 by task kunit_try_catch/226
[   12.936749] 
[   12.936895] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.936949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.936971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.936992] Call Trace:
[   12.937006]  <TASK>
[   12.937032]  dump_stack_lvl+0x73/0xb0
[   12.937066]  print_report+0xd1/0x610
[   12.937089]  ? __virt_addr_valid+0x1db/0x2d0
[   12.937114]  ? kasan_complete_mode_report_info+0x64/0x200
[   12.937136]  ? kmem_cache_double_free+0x1e5/0x480
[   12.937162]  kasan_report_invalid_free+0x10a/0x130
[   12.937262]  ? kmem_cache_double_free+0x1e5/0x480
[   12.937290]  ? kmem_cache_double_free+0x1e5/0x480
[   12.937314]  check_slab_allocation+0x101/0x130
[   12.937336]  __kasan_slab_pre_free+0x28/0x40
[   12.937356]  kmem_cache_free+0xed/0x420
[   12.937377]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   12.937397]  ? kmem_cache_double_free+0x1e5/0x480
[   12.937424]  kmem_cache_double_free+0x1e5/0x480
[   12.937448]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   12.937472]  ? finish_task_switch.isra.0+0x153/0x700
[   12.937495]  ? __switch_to+0x47/0xf50
[   12.937523]  ? __pfx_read_tsc+0x10/0x10
[   12.937544]  ? ktime_get_ts64+0x86/0x230
[   12.937568]  kunit_try_run_case+0x1a5/0x480
[   12.937594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.937617]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.937642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.937665]  ? __kthread_parkme+0x82/0x180
[   12.937686]  ? preempt_count_sub+0x50/0x80
[   12.937709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.937732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.937756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.937779]  kthread+0x337/0x6f0
[   12.937798]  ? trace_preempt_on+0x20/0xc0
[   12.937821]  ? __pfx_kthread+0x10/0x10
[   12.937841]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.937862]  ? calculate_sigpending+0x7b/0xa0
[   12.937886]  ? __pfx_kthread+0x10/0x10
[   12.937906]  ret_from_fork+0x116/0x1d0
[   12.937924]  ? __pfx_kthread+0x10/0x10
[   12.937944]  ret_from_fork_asm+0x1a/0x30
[   12.937975]  </TASK>
[   12.937985] 
[   12.951672] Allocated by task 226:
[   12.952137]  kasan_save_stack+0x45/0x70
[   12.952649]  kasan_save_track+0x18/0x40
[   12.953091]  kasan_save_alloc_info+0x3b/0x50
[   12.953455]  __kasan_slab_alloc+0x91/0xa0
[   12.953720]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.954130]  kmem_cache_double_free+0x14f/0x480
[   12.954307]  kunit_try_run_case+0x1a5/0x480
[   12.954762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.955255]  kthread+0x337/0x6f0
[   12.955382]  ret_from_fork+0x116/0x1d0
[   12.955681]  ret_from_fork_asm+0x1a/0x30
[   12.956168] 
[   12.956331] Freed by task 226:
[   12.956664]  kasan_save_stack+0x45/0x70
[   12.956922]  kasan_save_track+0x18/0x40
[   12.957279]  kasan_save_free_info+0x3f/0x60
[   12.957623]  __kasan_slab_free+0x56/0x70
[   12.957857]  kmem_cache_free+0x249/0x420
[   12.957997]  kmem_cache_double_free+0x16a/0x480
[   12.958649]  kunit_try_run_case+0x1a5/0x480
[   12.959106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.959481]  kthread+0x337/0x6f0
[   12.959796]  ret_from_fork+0x116/0x1d0
[   12.960197]  ret_from_fork_asm+0x1a/0x30
[   12.960458] 
[   12.960626] The buggy address belongs to the object at ffff88810341c000
[   12.960626]  which belongs to the cache test_cache of size 200
[   12.961418] The buggy address is located 0 bytes inside of
[   12.961418]  200-byte region [ffff88810341c000, ffff88810341c0c8)
[   12.962411] 
[   12.962585] The buggy address belongs to the physical page:
[   12.963006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10341c
[   12.963313] flags: 0x200000000000000(node=0|zone=2)
[   12.963644] page_type: f5(slab)
[   12.964003] raw: 0200000000000000 ffff888100fa1b40 dead000000000122 0000000000000000
[   12.964755] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   12.965593] page dumped because: kasan: bad access detected
[   12.966137] 
[   12.966409] Memory state around the buggy address:
[   12.966806]  ffff88810341bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.967303]  ffff88810341bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.967851] >ffff88810341c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.968694]                    ^
[   12.969038]  ffff88810341c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   12.969264]  ffff88810341c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.969558] ==================================================================