Hay
Date
July 18, 2025, 2:09 p.m.

Environment
qemu-arm64
qemu-x86_64

[   17.924699] ==================================================================
[   17.924779] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   17.924863] Free of addr fff00000c78fa001 by task kunit_try_catch/211
[   17.924906] 
[   17.924943] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.925024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.925051] Hardware name: linux,dummy-virt (DT)
[   17.925081] Call trace:
[   17.925105]  show_stack+0x20/0x38 (C)
[   17.925170]  dump_stack_lvl+0x8c/0xd0
[   17.925233]  print_report+0x118/0x5d0
[   17.925293]  kasan_report_invalid_free+0xc0/0xe8
[   17.925416]  check_slab_allocation+0xfc/0x108
[   17.925465]  __kasan_slab_pre_free+0x2c/0x48
[   17.925518]  kmem_cache_free+0xf0/0x468
[   17.925566]  kmem_cache_invalid_free+0x184/0x3c8
[   17.925622]  kunit_try_run_case+0x170/0x3f0
[   17.925669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.925734]  kthread+0x328/0x630
[   17.925812]  ret_from_fork+0x10/0x20
[   17.925874] 
[   17.925892] Allocated by task 211:
[   17.925923]  kasan_save_stack+0x3c/0x68
[   17.925964]  kasan_save_track+0x20/0x40
[   17.926003]  kasan_save_alloc_info+0x40/0x58
[   17.926043]  __kasan_slab_alloc+0xa8/0xb0
[   17.926081]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.926130]  kmem_cache_invalid_free+0x12c/0x3c8
[   17.926169]  kunit_try_run_case+0x170/0x3f0
[   17.926204]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.926259]  kthread+0x328/0x630
[   17.926292]  ret_from_fork+0x10/0x20
[   17.926339] 
[   17.926405] The buggy address belongs to the object at fff00000c78fa000
[   17.926405]  which belongs to the cache test_cache of size 200
[   17.926470] The buggy address is located 1 bytes inside of
[   17.926470]  200-byte region [fff00000c78fa000, fff00000c78fa0c8)
[   17.926723] 
[   17.926751] The buggy address belongs to the physical page:
[   17.926880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078fa
[   17.926936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.926991] page_type: f5(slab)
[   17.927042] raw: 0bfffe0000000000 fff00000c4557dc0 dead000000000122 0000000000000000
[   17.927273] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.927344] page dumped because: kasan: bad access detected
[   17.927376] 
[   17.927395] Memory state around the buggy address:
[   17.927428]  fff00000c78f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927471]  fff00000c78f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927523] >fff00000c78fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.927561]                    ^
[   17.927588]  fff00000c78fa080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.927642]  fff00000c78fa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927695] ==================================================================

[   17.361716] ==================================================================
[   17.362107] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   17.362263] Free of addr fff00000c7994001 by task kunit_try_catch/211
[   17.362386] 
[   17.362431] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.362549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.362603] Hardware name: linux,dummy-virt (DT)
[   17.362639] Call trace:
[   17.362662]  show_stack+0x20/0x38 (C)
[   17.362747]  dump_stack_lvl+0x8c/0xd0
[   17.363045]  print_report+0x118/0x5d0
[   17.363112]  kasan_report_invalid_free+0xc0/0xe8
[   17.363164]  check_slab_allocation+0xfc/0x108
[   17.363213]  __kasan_slab_pre_free+0x2c/0x48
[   17.363372]  kmem_cache_free+0xf0/0x468
[   17.363460]  kmem_cache_invalid_free+0x184/0x3c8
[   17.363646]  kunit_try_run_case+0x170/0x3f0
[   17.363759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.363823]  kthread+0x328/0x630
[   17.363869]  ret_from_fork+0x10/0x20
[   17.364148] 
[   17.364187] Allocated by task 211:
[   17.364219]  kasan_save_stack+0x3c/0x68
[   17.364481]  kasan_save_track+0x20/0x40
[   17.364744]  kasan_save_alloc_info+0x40/0x58
[   17.364898]  __kasan_slab_alloc+0xa8/0xb0
[   17.364973]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.365075]  kmem_cache_invalid_free+0x12c/0x3c8
[   17.365165]  kunit_try_run_case+0x170/0x3f0
[   17.365250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.365398]  kthread+0x328/0x630
[   17.365816]  ret_from_fork+0x10/0x20
[   17.365946] 
[   17.366015] The buggy address belongs to the object at fff00000c7994000
[   17.366015]  which belongs to the cache test_cache of size 200
[   17.366163] The buggy address is located 1 bytes inside of
[   17.366163]  200-byte region [fff00000c7994000, fff00000c79940c8)
[   17.366231] 
[   17.366253] The buggy address belongs to the physical page:
[   17.366286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107994
[   17.366379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.366433] page_type: f5(slab)
[   17.366475] raw: 0bfffe0000000000 fff00000c598d3c0 dead000000000122 0000000000000000
[   17.366526] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.366857] page dumped because: kasan: bad access detected
[   17.366944] 
[   17.367079] Memory state around the buggy address:
[   17.367132]  fff00000c7993f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.367208]  fff00000c7993f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.367355] >fff00000c7994000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.367664]                    ^
[   17.367839]  fff00000c7994080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.367929]  fff00000c7994100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.368007] ==================================================================

[   17.149276] ==================================================================
[   17.149351] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   17.149419] Free of addr fff00000c775e001 by task kunit_try_catch/211
[   17.149465] 
[   17.149821] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.150044] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.150238] Hardware name: linux,dummy-virt (DT)
[   17.150282] Call trace:
[   17.150322]  show_stack+0x20/0x38 (C)
[   17.150383]  dump_stack_lvl+0x8c/0xd0
[   17.150436]  print_report+0x118/0x5d0
[   17.150491]  kasan_report_invalid_free+0xc0/0xe8
[   17.150543]  check_slab_allocation+0xfc/0x108
[   17.150590]  __kasan_slab_pre_free+0x2c/0x48
[   17.150695]  kmem_cache_free+0xf0/0x468
[   17.150788]  kmem_cache_invalid_free+0x184/0x3c8
[   17.150974]  kunit_try_run_case+0x170/0x3f0
[   17.151077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.151142]  kthread+0x328/0x630
[   17.151187]  ret_from_fork+0x10/0x20
[   17.151374] 
[   17.151424] Allocated by task 211:
[   17.151500]  kasan_save_stack+0x3c/0x68
[   17.151614]  kasan_save_track+0x20/0x40
[   17.151722]  kasan_save_alloc_info+0x40/0x58
[   17.151832]  __kasan_slab_alloc+0xa8/0xb0
[   17.151915]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.151985]  kmem_cache_invalid_free+0x12c/0x3c8
[   17.152025]  kunit_try_run_case+0x170/0x3f0
[   17.152062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.152125]  kthread+0x328/0x630
[   17.152158]  ret_from_fork+0x10/0x20
[   17.152194] 
[   17.152213] The buggy address belongs to the object at fff00000c775e000
[   17.152213]  which belongs to the cache test_cache of size 200
[   17.152273] The buggy address is located 1 bytes inside of
[   17.152273]  200-byte region [fff00000c775e000, fff00000c775e0c8)
[   17.152516] 
[   17.152608] The buggy address belongs to the physical page:
[   17.152758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10775e
[   17.152872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.153017] page_type: f5(slab)
[   17.153143] raw: 0bfffe0000000000 fff00000c56bd780 dead000000000122 0000000000000000
[   17.153512] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.153577] page dumped because: kasan: bad access detected
[   17.153738] 
[   17.153794] Memory state around the buggy address:
[   17.153950]  fff00000c775df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.154040]  fff00000c775df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.154130] >fff00000c775e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.154226]                    ^
[   17.154345]  fff00000c775e080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.154442]  fff00000c775e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.154487] ==================================================================

[   12.954807] ==================================================================
[   12.955487] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   12.956147] Free of addr ffff8881029a4001 by task kunit_try_catch/228
[   12.956458] 
[   12.956788] CPU: 1 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.956839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.956850] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.956873] Call Trace:
[   12.956886]  <TASK>
[   12.956916]  dump_stack_lvl+0x73/0xb0
[   12.956950]  print_report+0xd1/0x610
[   12.956972]  ? __virt_addr_valid+0x1db/0x2d0
[   12.956997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.957210]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.957242]  kasan_report_invalid_free+0x10a/0x130
[   12.957269]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.957296]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.957320]  check_slab_allocation+0x11f/0x130
[   12.957342]  __kasan_slab_pre_free+0x28/0x40
[   12.957363]  kmem_cache_free+0xed/0x420
[   12.957383]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   12.957404]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.957432]  kmem_cache_invalid_free+0x1d8/0x460
[   12.957456]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   12.957480]  ? finish_task_switch.isra.0+0x153/0x700
[   12.957503]  ? __switch_to+0x47/0xf50
[   12.957602]  ? __pfx_read_tsc+0x10/0x10
[   12.957628]  ? ktime_get_ts64+0x86/0x230
[   12.957654]  kunit_try_run_case+0x1a5/0x480
[   12.957680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.957702]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.957727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.957750]  ? __kthread_parkme+0x82/0x180
[   12.957770]  ? preempt_count_sub+0x50/0x80
[   12.957793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.957817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.957840]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.957863]  kthread+0x337/0x6f0
[   12.957882]  ? trace_preempt_on+0x20/0xc0
[   12.957917]  ? __pfx_kthread+0x10/0x10
[   12.957937]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.957958]  ? calculate_sigpending+0x7b/0xa0
[   12.957990]  ? __pfx_kthread+0x10/0x10
[   12.958011]  ret_from_fork+0x116/0x1d0
[   12.958030]  ? __pfx_kthread+0x10/0x10
[   12.958050]  ret_from_fork_asm+0x1a/0x30
[   12.958083]  </TASK>
[   12.958094] 
[   12.969819] Allocated by task 228:
[   12.970163]  kasan_save_stack+0x45/0x70
[   12.970357]  kasan_save_track+0x18/0x40
[   12.970526]  kasan_save_alloc_info+0x3b/0x50
[   12.971074]  __kasan_slab_alloc+0x91/0xa0
[   12.971277]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.971475]  kmem_cache_invalid_free+0x157/0x460
[   12.971917]  kunit_try_run_case+0x1a5/0x480
[   12.972147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.972379]  kthread+0x337/0x6f0
[   12.972536]  ret_from_fork+0x116/0x1d0
[   12.973025]  ret_from_fork_asm+0x1a/0x30
[   12.973290] 
[   12.973384] The buggy address belongs to the object at ffff8881029a4000
[   12.973384]  which belongs to the cache test_cache of size 200
[   12.974257] The buggy address is located 1 bytes inside of
[   12.974257]  200-byte region [ffff8881029a4000, ffff8881029a40c8)
[   12.974995] 
[   12.975140] The buggy address belongs to the physical page:
[   12.975497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a4
[   12.975953] flags: 0x200000000000000(node=0|zone=2)
[   12.976318] page_type: f5(slab)
[   12.976605] raw: 0200000000000000 ffff888100fb88c0 dead000000000122 0000000000000000
[   12.976947] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   12.977481] page dumped because: kasan: bad access detected
[   12.977793] 
[   12.978109] Memory state around the buggy address:
[   12.978499]  ffff8881029a3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.978865]  ffff8881029a3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.979303] >ffff8881029a4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.979647]                    ^
[   12.979951]  ffff8881029a4080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   12.980310]  ffff8881029a4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.980812] ==================================================================

[   12.773686] ==================================================================
[   12.774734] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   12.775193] Free of addr ffff888102aef001 by task kunit_try_catch/229
[   12.775629] 
[   12.775847] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.775894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.775904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.775926] Call Trace:
[   12.775938]  <TASK>
[   12.775956]  dump_stack_lvl+0x73/0xb0
[   12.775987]  print_report+0xd1/0x610
[   12.776009]  ? __virt_addr_valid+0x1db/0x2d0
[   12.776035]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.776057]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.776083]  kasan_report_invalid_free+0x10a/0x130
[   12.776107]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.776135]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.776160]  check_slab_allocation+0x11f/0x130
[   12.776181]  __kasan_slab_pre_free+0x28/0x40
[   12.776202]  kmem_cache_free+0xed/0x420
[   12.776221]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   12.776241]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.776269]  kmem_cache_invalid_free+0x1d8/0x460
[   12.776293]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   12.776316]  ? finish_task_switch.isra.0+0x153/0x700
[   12.776341]  ? __switch_to+0x47/0xf50
[   12.776370]  ? __pfx_read_tsc+0x10/0x10
[   12.776391]  ? ktime_get_ts64+0x86/0x230
[   12.776416]  kunit_try_run_case+0x1a5/0x480
[   12.776455]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.776477]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.776502]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.776531]  ? __kthread_parkme+0x82/0x180
[   12.776552]  ? preempt_count_sub+0x50/0x80
[   12.776575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.776598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.776622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.776645]  kthread+0x337/0x6f0
[   12.776663]  ? trace_preempt_on+0x20/0xc0
[   12.776687]  ? __pfx_kthread+0x10/0x10
[   12.776707]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.776727]  ? calculate_sigpending+0x7b/0xa0
[   12.776752]  ? __pfx_kthread+0x10/0x10
[   12.776773]  ret_from_fork+0x116/0x1d0
[   12.776790]  ? __pfx_kthread+0x10/0x10
[   12.776810]  ret_from_fork_asm+0x1a/0x30
[   12.776843]  </TASK>
[   12.776853] 
[   12.789190] Allocated by task 229:
[   12.789623]  kasan_save_stack+0x45/0x70
[   12.790020]  kasan_save_track+0x18/0x40
[   12.790376]  kasan_save_alloc_info+0x3b/0x50
[   12.790899]  __kasan_slab_alloc+0x91/0xa0
[   12.791316]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.791809]  kmem_cache_invalid_free+0x157/0x460
[   12.792380]  kunit_try_run_case+0x1a5/0x480
[   12.792910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.793457]  kthread+0x337/0x6f0
[   12.793785]  ret_from_fork+0x116/0x1d0
[   12.794215]  ret_from_fork_asm+0x1a/0x30
[   12.794366] 
[   12.794542] The buggy address belongs to the object at ffff888102aef000
[   12.794542]  which belongs to the cache test_cache of size 200
[   12.795339] The buggy address is located 1 bytes inside of
[   12.795339]  200-byte region [ffff888102aef000, ffff888102aef0c8)
[   12.796395] 
[   12.796565] The buggy address belongs to the physical page:
[   12.797015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102aef
[   12.797348] flags: 0x200000000000000(node=0|zone=2)
[   12.797531] page_type: f5(slab)
[   12.797891] raw: 0200000000000000 ffff888101c3b280 dead000000000122 0000000000000000
[   12.798654] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   12.799290] page dumped because: kasan: bad access detected
[   12.799594] 
[   12.799687] Memory state around the buggy address:
[   12.800147]  ffff888102aeef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.800832]  ffff888102aeef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.801102] >ffff888102aef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.801324]                    ^
[   12.801471]  ffff888102aef080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   12.802200]  ffff888102aef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.802884] ==================================================================

[   12.978795] ==================================================================
[   12.979394] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x1d8/0x460
[   12.979658] Free of addr ffff8881029c0001 by task kunit_try_catch/228
[   12.979858] 
[   12.979953] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   12.980002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   12.980025] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   12.980047] Call Trace:
[   12.980060]  <TASK>
[   12.980079]  dump_stack_lvl+0x73/0xb0
[   12.980111]  print_report+0xd1/0x610
[   12.980134]  ? __virt_addr_valid+0x1db/0x2d0
[   12.980160]  ? kasan_complete_mode_report_info+0x2a/0x200
[   12.980182]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.980207]  kasan_report_invalid_free+0x10a/0x130
[   12.980231]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.980257]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.980281]  check_slab_allocation+0x11f/0x130
[   12.980302]  __kasan_slab_pre_free+0x28/0x40
[   12.980322]  kmem_cache_free+0xed/0x420
[   12.980343]  ? kmem_cache_alloc_noprof+0x123/0x3f0
[   12.980363]  ? kmem_cache_invalid_free+0x1d8/0x460
[   12.980389]  kmem_cache_invalid_free+0x1d8/0x460
[   12.980413]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   12.980454]  ? finish_task_switch.isra.0+0x153/0x700
[   12.980478]  ? __switch_to+0x47/0xf50
[   12.980507]  ? __pfx_read_tsc+0x10/0x10
[   12.980528]  ? ktime_get_ts64+0x86/0x230
[   12.980553]  kunit_try_run_case+0x1a5/0x480
[   12.980579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.980601]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   12.980625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   12.980648]  ? __kthread_parkme+0x82/0x180
[   12.980669]  ? preempt_count_sub+0x50/0x80
[   12.980691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.980714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.980737]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.980760]  kthread+0x337/0x6f0
[   12.980778]  ? trace_preempt_on+0x20/0xc0
[   12.980802]  ? __pfx_kthread+0x10/0x10
[   12.980821]  ? _raw_spin_unlock_irq+0x47/0x80
[   12.980842]  ? calculate_sigpending+0x7b/0xa0
[   12.980875]  ? __pfx_kthread+0x10/0x10
[   12.980896]  ret_from_fork+0x116/0x1d0
[   12.980914]  ? __pfx_kthread+0x10/0x10
[   12.980933]  ret_from_fork_asm+0x1a/0x30
[   12.980964]  </TASK>
[   12.980975] 
[   12.994612] Allocated by task 228:
[   12.994794]  kasan_save_stack+0x45/0x70
[   12.994993]  kasan_save_track+0x18/0x40
[   12.995683]  kasan_save_alloc_info+0x3b/0x50
[   12.996001]  __kasan_slab_alloc+0x91/0xa0
[   12.996427]  kmem_cache_alloc_noprof+0x123/0x3f0
[   12.996636]  kmem_cache_invalid_free+0x157/0x460
[   12.996842]  kunit_try_run_case+0x1a5/0x480
[   12.997332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   12.997788]  kthread+0x337/0x6f0
[   12.998119]  ret_from_fork+0x116/0x1d0
[   12.998537]  ret_from_fork_asm+0x1a/0x30
[   12.998724] 
[   12.998817] The buggy address belongs to the object at ffff8881029c0000
[   12.998817]  which belongs to the cache test_cache of size 200
[   12.999900] The buggy address is located 1 bytes inside of
[   12.999900]  200-byte region [ffff8881029c0000, ffff8881029c00c8)
[   13.000714] 
[   13.000815] The buggy address belongs to the physical page:
[   13.001084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029c0
[   13.001404] flags: 0x200000000000000(node=0|zone=2)
[   13.002097] page_type: f5(slab)
[   13.002572] raw: 0200000000000000 ffff888103419000 dead000000000122 0000000000000000
[   13.003265] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   13.003976] page dumped because: kasan: bad access detected
[   13.004670] 
[   13.004765] Memory state around the buggy address:
[   13.004986]  ffff8881029bff00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   13.005803]  ffff8881029bff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.006314] >ffff8881029c0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.006797]                    ^
[   13.007306]  ffff8881029c0080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   13.007770]  ffff8881029c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.008363] ==================================================================