Date
July 18, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.924699] ================================================================== [ 17.924779] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.924863] Free of addr fff00000c78fa001 by task kunit_try_catch/211 [ 17.924906] [ 17.924943] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.925024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.925051] Hardware name: linux,dummy-virt (DT) [ 17.925081] Call trace: [ 17.925105] show_stack+0x20/0x38 (C) [ 17.925170] dump_stack_lvl+0x8c/0xd0 [ 17.925233] print_report+0x118/0x5d0 [ 17.925293] kasan_report_invalid_free+0xc0/0xe8 [ 17.925416] check_slab_allocation+0xfc/0x108 [ 17.925465] __kasan_slab_pre_free+0x2c/0x48 [ 17.925518] kmem_cache_free+0xf0/0x468 [ 17.925566] kmem_cache_invalid_free+0x184/0x3c8 [ 17.925622] kunit_try_run_case+0x170/0x3f0 [ 17.925669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.925734] kthread+0x328/0x630 [ 17.925812] ret_from_fork+0x10/0x20 [ 17.925874] [ 17.925892] Allocated by task 211: [ 17.925923] kasan_save_stack+0x3c/0x68 [ 17.925964] kasan_save_track+0x20/0x40 [ 17.926003] kasan_save_alloc_info+0x40/0x58 [ 17.926043] __kasan_slab_alloc+0xa8/0xb0 [ 17.926081] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.926130] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.926169] kunit_try_run_case+0x170/0x3f0 [ 17.926204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.926259] kthread+0x328/0x630 [ 17.926292] ret_from_fork+0x10/0x20 [ 17.926339] [ 17.926405] The buggy address belongs to the object at fff00000c78fa000 [ 17.926405] which belongs to the cache test_cache of size 200 [ 17.926470] The buggy address is located 1 bytes inside of [ 17.926470] 200-byte region [fff00000c78fa000, fff00000c78fa0c8) [ 17.926723] [ 17.926751] The buggy address belongs to the physical page: [ 17.926880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078fa [ 17.926936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.926991] page_type: f5(slab) [ 17.927042] raw: 0bfffe0000000000 fff00000c4557dc0 dead000000000122 0000000000000000 [ 17.927273] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.927344] page dumped because: kasan: bad access detected [ 17.927376] [ 17.927395] Memory state around the buggy address: [ 17.927428] fff00000c78f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927471] fff00000c78f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927523] >fff00000c78fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.927561] ^ [ 17.927588] fff00000c78fa080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.927642] fff00000c78fa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.927695] ==================================================================
[ 17.361716] ================================================================== [ 17.362107] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.362263] Free of addr fff00000c7994001 by task kunit_try_catch/211 [ 17.362386] [ 17.362431] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.362549] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.362603] Hardware name: linux,dummy-virt (DT) [ 17.362639] Call trace: [ 17.362662] show_stack+0x20/0x38 (C) [ 17.362747] dump_stack_lvl+0x8c/0xd0 [ 17.363045] print_report+0x118/0x5d0 [ 17.363112] kasan_report_invalid_free+0xc0/0xe8 [ 17.363164] check_slab_allocation+0xfc/0x108 [ 17.363213] __kasan_slab_pre_free+0x2c/0x48 [ 17.363372] kmem_cache_free+0xf0/0x468 [ 17.363460] kmem_cache_invalid_free+0x184/0x3c8 [ 17.363646] kunit_try_run_case+0x170/0x3f0 [ 17.363759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.363823] kthread+0x328/0x630 [ 17.363869] ret_from_fork+0x10/0x20 [ 17.364148] [ 17.364187] Allocated by task 211: [ 17.364219] kasan_save_stack+0x3c/0x68 [ 17.364481] kasan_save_track+0x20/0x40 [ 17.364744] kasan_save_alloc_info+0x40/0x58 [ 17.364898] __kasan_slab_alloc+0xa8/0xb0 [ 17.364973] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.365075] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.365165] kunit_try_run_case+0x170/0x3f0 [ 17.365250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.365398] kthread+0x328/0x630 [ 17.365816] ret_from_fork+0x10/0x20 [ 17.365946] [ 17.366015] The buggy address belongs to the object at fff00000c7994000 [ 17.366015] which belongs to the cache test_cache of size 200 [ 17.366163] The buggy address is located 1 bytes inside of [ 17.366163] 200-byte region [fff00000c7994000, fff00000c79940c8) [ 17.366231] [ 17.366253] The buggy address belongs to the physical page: [ 17.366286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107994 [ 17.366379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.366433] page_type: f5(slab) [ 17.366475] raw: 0bfffe0000000000 fff00000c598d3c0 dead000000000122 0000000000000000 [ 17.366526] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.366857] page dumped because: kasan: bad access detected [ 17.366944] [ 17.367079] Memory state around the buggy address: [ 17.367132] fff00000c7993f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.367208] fff00000c7993f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.367355] >fff00000c7994000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.367664] ^ [ 17.367839] fff00000c7994080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.367929] fff00000c7994100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.368007] ==================================================================
[ 17.149276] ================================================================== [ 17.149351] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 17.149419] Free of addr fff00000c775e001 by task kunit_try_catch/211 [ 17.149465] [ 17.149821] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 17.150044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.150238] Hardware name: linux,dummy-virt (DT) [ 17.150282] Call trace: [ 17.150322] show_stack+0x20/0x38 (C) [ 17.150383] dump_stack_lvl+0x8c/0xd0 [ 17.150436] print_report+0x118/0x5d0 [ 17.150491] kasan_report_invalid_free+0xc0/0xe8 [ 17.150543] check_slab_allocation+0xfc/0x108 [ 17.150590] __kasan_slab_pre_free+0x2c/0x48 [ 17.150695] kmem_cache_free+0xf0/0x468 [ 17.150788] kmem_cache_invalid_free+0x184/0x3c8 [ 17.150974] kunit_try_run_case+0x170/0x3f0 [ 17.151077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.151142] kthread+0x328/0x630 [ 17.151187] ret_from_fork+0x10/0x20 [ 17.151374] [ 17.151424] Allocated by task 211: [ 17.151500] kasan_save_stack+0x3c/0x68 [ 17.151614] kasan_save_track+0x20/0x40 [ 17.151722] kasan_save_alloc_info+0x40/0x58 [ 17.151832] __kasan_slab_alloc+0xa8/0xb0 [ 17.151915] kmem_cache_alloc_noprof+0x10c/0x398 [ 17.151985] kmem_cache_invalid_free+0x12c/0x3c8 [ 17.152025] kunit_try_run_case+0x170/0x3f0 [ 17.152062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.152125] kthread+0x328/0x630 [ 17.152158] ret_from_fork+0x10/0x20 [ 17.152194] [ 17.152213] The buggy address belongs to the object at fff00000c775e000 [ 17.152213] which belongs to the cache test_cache of size 200 [ 17.152273] The buggy address is located 1 bytes inside of [ 17.152273] 200-byte region [fff00000c775e000, fff00000c775e0c8) [ 17.152516] [ 17.152608] The buggy address belongs to the physical page: [ 17.152758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775e [ 17.152872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.153017] page_type: f5(slab) [ 17.153143] raw: 0bfffe0000000000 fff00000c56bd780 dead000000000122 0000000000000000 [ 17.153512] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 17.153577] page dumped because: kasan: bad access detected [ 17.153738] [ 17.153794] Memory state around the buggy address: [ 17.153950] fff00000c775df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.154040] fff00000c775df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.154130] >fff00000c775e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.154226] ^ [ 17.154345] fff00000c775e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 17.154442] fff00000c775e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.154487] ==================================================================
[ 12.954807] ================================================================== [ 12.955487] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 12.956147] Free of addr ffff8881029a4001 by task kunit_try_catch/228 [ 12.956458] [ 12.956788] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.956839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.956850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.956873] Call Trace: [ 12.956886] <TASK> [ 12.956916] dump_stack_lvl+0x73/0xb0 [ 12.956950] print_report+0xd1/0x610 [ 12.956972] ? __virt_addr_valid+0x1db/0x2d0 [ 12.956997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.957210] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.957242] kasan_report_invalid_free+0x10a/0x130 [ 12.957269] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.957296] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.957320] check_slab_allocation+0x11f/0x130 [ 12.957342] __kasan_slab_pre_free+0x28/0x40 [ 12.957363] kmem_cache_free+0xed/0x420 [ 12.957383] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 12.957404] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.957432] kmem_cache_invalid_free+0x1d8/0x460 [ 12.957456] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 12.957480] ? finish_task_switch.isra.0+0x153/0x700 [ 12.957503] ? __switch_to+0x47/0xf50 [ 12.957602] ? __pfx_read_tsc+0x10/0x10 [ 12.957628] ? ktime_get_ts64+0x86/0x230 [ 12.957654] kunit_try_run_case+0x1a5/0x480 [ 12.957680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.957702] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.957727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.957750] ? __kthread_parkme+0x82/0x180 [ 12.957770] ? preempt_count_sub+0x50/0x80 [ 12.957793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.957817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.957840] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.957863] kthread+0x337/0x6f0 [ 12.957882] ? trace_preempt_on+0x20/0xc0 [ 12.957917] ? __pfx_kthread+0x10/0x10 [ 12.957937] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.957958] ? calculate_sigpending+0x7b/0xa0 [ 12.957990] ? __pfx_kthread+0x10/0x10 [ 12.958011] ret_from_fork+0x116/0x1d0 [ 12.958030] ? __pfx_kthread+0x10/0x10 [ 12.958050] ret_from_fork_asm+0x1a/0x30 [ 12.958083] </TASK> [ 12.958094] [ 12.969819] Allocated by task 228: [ 12.970163] kasan_save_stack+0x45/0x70 [ 12.970357] kasan_save_track+0x18/0x40 [ 12.970526] kasan_save_alloc_info+0x3b/0x50 [ 12.971074] __kasan_slab_alloc+0x91/0xa0 [ 12.971277] kmem_cache_alloc_noprof+0x123/0x3f0 [ 12.971475] kmem_cache_invalid_free+0x157/0x460 [ 12.971917] kunit_try_run_case+0x1a5/0x480 [ 12.972147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.972379] kthread+0x337/0x6f0 [ 12.972536] ret_from_fork+0x116/0x1d0 [ 12.973025] ret_from_fork_asm+0x1a/0x30 [ 12.973290] [ 12.973384] The buggy address belongs to the object at ffff8881029a4000 [ 12.973384] which belongs to the cache test_cache of size 200 [ 12.974257] The buggy address is located 1 bytes inside of [ 12.974257] 200-byte region [ffff8881029a4000, ffff8881029a40c8) [ 12.974995] [ 12.975140] The buggy address belongs to the physical page: [ 12.975497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4 [ 12.975953] flags: 0x200000000000000(node=0|zone=2) [ 12.976318] page_type: f5(slab) [ 12.976605] raw: 0200000000000000 ffff888100fb88c0 dead000000000122 0000000000000000 [ 12.976947] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 12.977481] page dumped because: kasan: bad access detected [ 12.977793] [ 12.978109] Memory state around the buggy address: [ 12.978499] ffff8881029a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.978865] ffff8881029a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.979303] >ffff8881029a4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.979647] ^ [ 12.979951] ffff8881029a4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 12.980310] ffff8881029a4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.980812] ==================================================================
[ 12.773686] ================================================================== [ 12.774734] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 12.775193] Free of addr ffff888102aef001 by task kunit_try_catch/229 [ 12.775629] [ 12.775847] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.775894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.775904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.775926] Call Trace: [ 12.775938] <TASK> [ 12.775956] dump_stack_lvl+0x73/0xb0 [ 12.775987] print_report+0xd1/0x610 [ 12.776009] ? __virt_addr_valid+0x1db/0x2d0 [ 12.776035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.776057] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.776083] kasan_report_invalid_free+0x10a/0x130 [ 12.776107] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.776135] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.776160] check_slab_allocation+0x11f/0x130 [ 12.776181] __kasan_slab_pre_free+0x28/0x40 [ 12.776202] kmem_cache_free+0xed/0x420 [ 12.776221] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 12.776241] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.776269] kmem_cache_invalid_free+0x1d8/0x460 [ 12.776293] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 12.776316] ? finish_task_switch.isra.0+0x153/0x700 [ 12.776341] ? __switch_to+0x47/0xf50 [ 12.776370] ? __pfx_read_tsc+0x10/0x10 [ 12.776391] ? ktime_get_ts64+0x86/0x230 [ 12.776416] kunit_try_run_case+0x1a5/0x480 [ 12.776455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.776477] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.776502] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.776531] ? __kthread_parkme+0x82/0x180 [ 12.776552] ? preempt_count_sub+0x50/0x80 [ 12.776575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.776598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.776622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.776645] kthread+0x337/0x6f0 [ 12.776663] ? trace_preempt_on+0x20/0xc0 [ 12.776687] ? __pfx_kthread+0x10/0x10 [ 12.776707] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.776727] ? calculate_sigpending+0x7b/0xa0 [ 12.776752] ? __pfx_kthread+0x10/0x10 [ 12.776773] ret_from_fork+0x116/0x1d0 [ 12.776790] ? __pfx_kthread+0x10/0x10 [ 12.776810] ret_from_fork_asm+0x1a/0x30 [ 12.776843] </TASK> [ 12.776853] [ 12.789190] Allocated by task 229: [ 12.789623] kasan_save_stack+0x45/0x70 [ 12.790020] kasan_save_track+0x18/0x40 [ 12.790376] kasan_save_alloc_info+0x3b/0x50 [ 12.790899] __kasan_slab_alloc+0x91/0xa0 [ 12.791316] kmem_cache_alloc_noprof+0x123/0x3f0 [ 12.791809] kmem_cache_invalid_free+0x157/0x460 [ 12.792380] kunit_try_run_case+0x1a5/0x480 [ 12.792910] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.793457] kthread+0x337/0x6f0 [ 12.793785] ret_from_fork+0x116/0x1d0 [ 12.794215] ret_from_fork_asm+0x1a/0x30 [ 12.794366] [ 12.794542] The buggy address belongs to the object at ffff888102aef000 [ 12.794542] which belongs to the cache test_cache of size 200 [ 12.795339] The buggy address is located 1 bytes inside of [ 12.795339] 200-byte region [ffff888102aef000, ffff888102aef0c8) [ 12.796395] [ 12.796565] The buggy address belongs to the physical page: [ 12.797015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aef [ 12.797348] flags: 0x200000000000000(node=0|zone=2) [ 12.797531] page_type: f5(slab) [ 12.797891] raw: 0200000000000000 ffff888101c3b280 dead000000000122 0000000000000000 [ 12.798654] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 12.799290] page dumped because: kasan: bad access detected [ 12.799594] [ 12.799687] Memory state around the buggy address: [ 12.800147] ffff888102aeef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.800832] ffff888102aeef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.801102] >ffff888102aef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 12.801324] ^ [ 12.801471] ffff888102aef080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 12.802200] ffff888102aef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 12.802884] ==================================================================
[ 12.978795] ================================================================== [ 12.979394] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460 [ 12.979658] Free of addr ffff8881029c0001 by task kunit_try_catch/228 [ 12.979858] [ 12.979953] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 12.980002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 12.980025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 12.980047] Call Trace: [ 12.980060] <TASK> [ 12.980079] dump_stack_lvl+0x73/0xb0 [ 12.980111] print_report+0xd1/0x610 [ 12.980134] ? __virt_addr_valid+0x1db/0x2d0 [ 12.980160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 12.980182] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.980207] kasan_report_invalid_free+0x10a/0x130 [ 12.980231] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.980257] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.980281] check_slab_allocation+0x11f/0x130 [ 12.980302] __kasan_slab_pre_free+0x28/0x40 [ 12.980322] kmem_cache_free+0xed/0x420 [ 12.980343] ? kmem_cache_alloc_noprof+0x123/0x3f0 [ 12.980363] ? kmem_cache_invalid_free+0x1d8/0x460 [ 12.980389] kmem_cache_invalid_free+0x1d8/0x460 [ 12.980413] ? __pfx_kmem_cache_invalid_free+0x10/0x10 [ 12.980454] ? finish_task_switch.isra.0+0x153/0x700 [ 12.980478] ? __switch_to+0x47/0xf50 [ 12.980507] ? __pfx_read_tsc+0x10/0x10 [ 12.980528] ? ktime_get_ts64+0x86/0x230 [ 12.980553] kunit_try_run_case+0x1a5/0x480 [ 12.980579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.980601] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 12.980625] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 12.980648] ? __kthread_parkme+0x82/0x180 [ 12.980669] ? preempt_count_sub+0x50/0x80 [ 12.980691] ? __pfx_kunit_try_run_case+0x10/0x10 [ 12.980714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.980737] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 12.980760] kthread+0x337/0x6f0 [ 12.980778] ? trace_preempt_on+0x20/0xc0 [ 12.980802] ? __pfx_kthread+0x10/0x10 [ 12.980821] ? _raw_spin_unlock_irq+0x47/0x80 [ 12.980842] ? calculate_sigpending+0x7b/0xa0 [ 12.980875] ? __pfx_kthread+0x10/0x10 [ 12.980896] ret_from_fork+0x116/0x1d0 [ 12.980914] ? __pfx_kthread+0x10/0x10 [ 12.980933] ret_from_fork_asm+0x1a/0x30 [ 12.980964] </TASK> [ 12.980975] [ 12.994612] Allocated by task 228: [ 12.994794] kasan_save_stack+0x45/0x70 [ 12.994993] kasan_save_track+0x18/0x40 [ 12.995683] kasan_save_alloc_info+0x3b/0x50 [ 12.996001] __kasan_slab_alloc+0x91/0xa0 [ 12.996427] kmem_cache_alloc_noprof+0x123/0x3f0 [ 12.996636] kmem_cache_invalid_free+0x157/0x460 [ 12.996842] kunit_try_run_case+0x1a5/0x480 [ 12.997332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 12.997788] kthread+0x337/0x6f0 [ 12.998119] ret_from_fork+0x116/0x1d0 [ 12.998537] ret_from_fork_asm+0x1a/0x30 [ 12.998724] [ 12.998817] The buggy address belongs to the object at ffff8881029c0000 [ 12.998817] which belongs to the cache test_cache of size 200 [ 12.999900] The buggy address is located 1 bytes inside of [ 12.999900] 200-byte region [ffff8881029c0000, ffff8881029c00c8) [ 13.000714] [ 13.000815] The buggy address belongs to the physical page: [ 13.001084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c0 [ 13.001404] flags: 0x200000000000000(node=0|zone=2) [ 13.002097] page_type: f5(slab) [ 13.002572] raw: 0200000000000000 ffff888103419000 dead000000000122 0000000000000000 [ 13.003265] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 13.003976] page dumped because: kasan: bad access detected [ 13.004670] [ 13.004765] Memory state around the buggy address: [ 13.004986] ffff8881029bff00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 13.005803] ffff8881029bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.006314] >ffff8881029c0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 13.006797] ^ [ 13.007306] ffff8881029c0080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 13.007770] ffff8881029c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.008363] ==================================================================