Hay
Date
July 20, 2025, 11:12 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.698031] ==================================================================
[   18.698102] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.698233] Free of addr fff00000c780a501 by task kunit_try_catch/241
[   18.698303] 
[   18.698487] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.698595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.698951] Hardware name: linux,dummy-virt (DT)
[   18.699002] Call trace:
[   18.699098]  show_stack+0x20/0x38 (C)
[   18.699248]  dump_stack_lvl+0x8c/0xd0
[   18.699397]  print_report+0x118/0x5d0
[   18.699486]  kasan_report_invalid_free+0xc0/0xe8
[   18.699557]  check_slab_allocation+0xfc/0x108
[   18.700424]  __kasan_mempool_poison_object+0x78/0x150
[   18.700739]  mempool_free+0x28c/0x328
[   18.700823]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.700956]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.701102]  kunit_try_run_case+0x170/0x3f0
[   18.701197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.701530]  kthread+0x328/0x630
[   18.701608]  ret_from_fork+0x10/0x20
[   18.701728] 
[   18.702176] Allocated by task 241:
[   18.702255]  kasan_save_stack+0x3c/0x68
[   18.702309]  kasan_save_track+0x20/0x40
[   18.702346]  kasan_save_alloc_info+0x40/0x58
[   18.702414]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.702568]  remove_element+0x130/0x1f8
[   18.702720]  mempool_alloc_preallocated+0x58/0xc0
[   18.702840]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   18.703025]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.703171]  kunit_try_run_case+0x170/0x3f0
[   18.703219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.703460]  kthread+0x328/0x630
[   18.703569]  ret_from_fork+0x10/0x20
[   18.703608] 
[   18.703758] The buggy address belongs to the object at fff00000c780a500
[   18.703758]  which belongs to the cache kmalloc-128 of size 128
[   18.703888] The buggy address is located 1 bytes inside of
[   18.703888]  128-byte region [fff00000c780a500, fff00000c780a580)
[   18.704096] 
[   18.704167] The buggy address belongs to the physical page:
[   18.704257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10780a
[   18.704364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.704487] page_type: f5(slab)
[   18.704641] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.704726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.704817] page dumped because: kasan: bad access detected
[   18.704850] 
[   18.704867] Memory state around the buggy address:
[   18.704916]  fff00000c780a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.704966]  fff00000c780a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.705018] >fff00000c780a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.705068]                    ^
[   18.705139]  fff00000c780a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.705182]  fff00000c780a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.705221] ==================================================================
[   18.713895] ==================================================================
[   18.713966] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.714018] Free of addr fff00000c7994001 by task kunit_try_catch/243
[   18.714062] 
[   18.714180] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.714589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.714651] Hardware name: linux,dummy-virt (DT)
[   18.714684] Call trace:
[   18.714776]  show_stack+0x20/0x38 (C)
[   18.714850]  dump_stack_lvl+0x8c/0xd0
[   18.714916]  print_report+0x118/0x5d0
[   18.715004]  kasan_report_invalid_free+0xc0/0xe8
[   18.715267]  __kasan_mempool_poison_object+0xfc/0x150
[   18.715543]  mempool_free+0x28c/0x328
[   18.715589]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.715643]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   18.715696]  kunit_try_run_case+0x170/0x3f0
[   18.715852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.716053]  kthread+0x328/0x630
[   18.716214]  ret_from_fork+0x10/0x20
[   18.716397] 
[   18.716417] The buggy address belongs to the physical page:
[   18.716541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107994
[   18.716684] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.716777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.716884] page_type: f8(unknown)
[   18.717616] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.717818] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.718146] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.718205] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.718256] head: 0bfffe0000000002 ffffc1ffc31e6501 00000000ffffffff 00000000ffffffff
[   18.718305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.718348] page dumped because: kasan: bad access detected
[   18.718390] 
[   18.718407] Memory state around the buggy address:
[   18.718440]  fff00000c7993f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.718609]  fff00000c7993f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.718683] >fff00000c7994000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.718769]                    ^
[   18.718804]  fff00000c7994080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.718896]  fff00000c7994100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.718944] ==================================================================

[   18.870405] ==================================================================
[   18.870893] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.870957] Free of addr fff00000c79ec001 by task kunit_try_catch/243
[   18.871001] 
[   18.871561] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.871902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.871943] Hardware name: linux,dummy-virt (DT)
[   18.871979] Call trace:
[   18.872003]  show_stack+0x20/0x38 (C)
[   18.872261]  dump_stack_lvl+0x8c/0xd0
[   18.872434]  print_report+0x118/0x5d0
[   18.872482]  kasan_report_invalid_free+0xc0/0xe8
[   18.872673]  __kasan_mempool_poison_object+0xfc/0x150
[   18.872729]  mempool_free+0x28c/0x328
[   18.872774]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.873025]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   18.873402]  kunit_try_run_case+0x170/0x3f0
[   18.873453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.873515]  kthread+0x328/0x630
[   18.873561]  ret_from_fork+0x10/0x20
[   18.873611] 
[   18.873643] The buggy address belongs to the physical page:
[   18.873677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ec
[   18.873733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.874232] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.874348] page_type: f8(unknown)
[   18.874514] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.874788] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.874993] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.875497] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.875707] head: 0bfffe0000000002 ffffc1ffc31e7b01 00000000ffffffff 00000000ffffffff
[   18.875881] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.875956] page dumped because: kasan: bad access detected
[   18.876205] 
[   18.876227] Memory state around the buggy address:
[   18.876480]  fff00000c79ebf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.876636]  fff00000c79ebf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.876684] >fff00000c79ec000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.876723]                    ^
[   18.876751]  fff00000c79ec080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.876848]  fff00000c79ec100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.876905] ==================================================================
[   18.842458] ==================================================================
[   18.842516] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.842571] Free of addr fff00000c5b4cd01 by task kunit_try_catch/241
[   18.842613] 
[   18.842656] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT 
[   18.842752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.842781] Hardware name: linux,dummy-virt (DT)
[   18.842812] Call trace:
[   18.842835]  show_stack+0x20/0x38 (C)
[   18.842884]  dump_stack_lvl+0x8c/0xd0
[   18.842974]  print_report+0x118/0x5d0
[   18.843022]  kasan_report_invalid_free+0xc0/0xe8
[   18.843426]  check_slab_allocation+0xfc/0x108
[   18.843539]  __kasan_mempool_poison_object+0x78/0x150
[   18.843759]  mempool_free+0x28c/0x328
[   18.843969]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.844109]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.844160]  kunit_try_run_case+0x170/0x3f0
[   18.844214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.844285]  kthread+0x328/0x630
[   18.844330]  ret_from_fork+0x10/0x20
[   18.844560] 
[   18.844586] Allocated by task 241:
[   18.844902]  kasan_save_stack+0x3c/0x68
[   18.845160]  kasan_save_track+0x20/0x40
[   18.845200]  kasan_save_alloc_info+0x40/0x58
[   18.845241]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.845284]  remove_element+0x130/0x1f8
[   18.845442]  mempool_alloc_preallocated+0x58/0xc0
[   18.845715]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   18.845764]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.845817]  kunit_try_run_case+0x170/0x3f0
[   18.845863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.845971]  kthread+0x328/0x630
[   18.846004]  ret_from_fork+0x10/0x20
[   18.846039] 
[   18.846061] The buggy address belongs to the object at fff00000c5b4cd00
[   18.846061]  which belongs to the cache kmalloc-128 of size 128
[   18.846122] The buggy address is located 1 bytes inside of
[   18.846122]  128-byte region [fff00000c5b4cd00, fff00000c5b4cd80)
[   18.846384] 
[   18.846435] The buggy address belongs to the physical page:
[   18.846492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b4c
[   18.846570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.846644] page_type: f5(slab)
[   18.846682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.846739] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.846780] page dumped because: kasan: bad access detected
[   18.846939] 
[   18.846961] Memory state around the buggy address:
[   18.847209]  fff00000c5b4cc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.847527]  fff00000c5b4cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.847766] >fff00000c5b4cd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.847823]                    ^
[   18.847850]  fff00000c5b4cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.847954]  fff00000c5b4ce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.848133] ==================================================================

[   14.427626] ==================================================================
[   14.428546] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.429508] Free of addr ffff888101bc1d01 by task kunit_try_catch/259
[   14.430025] 
[   14.430231] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.430279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.430292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.430314] Call Trace:
[   14.430330]  <TASK>
[   14.430348]  dump_stack_lvl+0x73/0xb0
[   14.430413]  print_report+0xd1/0x610
[   14.430437]  ? __virt_addr_valid+0x1db/0x2d0
[   14.430463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.430485]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.430511]  kasan_report_invalid_free+0x10a/0x130
[   14.430536]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.430563]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.430594]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.430619]  check_slab_allocation+0x11f/0x130
[   14.430642]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.430667]  mempool_free+0x2ec/0x380
[   14.430695]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.430721]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.430750]  ? __pfx_sched_clock_cpu+0x10/0x10
[   14.430774]  ? finish_task_switch.isra.0+0x153/0x700
[   14.430801]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.430825]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   14.430852]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.430875]  ? __pfx_mempool_kfree+0x10/0x10
[   14.430901]  ? __pfx_read_tsc+0x10/0x10
[   14.430924]  ? ktime_get_ts64+0x86/0x230
[   14.430949]  kunit_try_run_case+0x1a5/0x480
[   14.430974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.430998]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.431022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.431046]  ? __kthread_parkme+0x82/0x180
[   14.431068]  ? preempt_count_sub+0x50/0x80
[   14.431092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.431117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.431140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.431164]  kthread+0x337/0x6f0
[   14.431184]  ? trace_preempt_on+0x20/0xc0
[   14.431208]  ? __pfx_kthread+0x10/0x10
[   14.431229]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.431253]  ? calculate_sigpending+0x7b/0xa0
[   14.431278]  ? __pfx_kthread+0x10/0x10
[   14.431301]  ret_from_fork+0x116/0x1d0
[   14.431319]  ? __pfx_kthread+0x10/0x10
[   14.431340]  ret_from_fork_asm+0x1a/0x30
[   14.431373]  </TASK>
[   14.431385] 
[   14.445589] Allocated by task 259:
[   14.445733]  kasan_save_stack+0x45/0x70
[   14.445887]  kasan_save_track+0x18/0x40
[   14.446122]  kasan_save_alloc_info+0x3b/0x50
[   14.446519]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.447054]  remove_element+0x11e/0x190
[   14.447422]  mempool_alloc_preallocated+0x4d/0x90
[   14.447870]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   14.448502]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.449189]  kunit_try_run_case+0x1a5/0x480
[   14.449594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.449988]  kthread+0x337/0x6f0
[   14.450257]  ret_from_fork+0x116/0x1d0
[   14.450622]  ret_from_fork_asm+0x1a/0x30
[   14.450935] 
[   14.451012] The buggy address belongs to the object at ffff888101bc1d00
[   14.451012]  which belongs to the cache kmalloc-128 of size 128
[   14.451877] The buggy address is located 1 bytes inside of
[   14.451877]  128-byte region [ffff888101bc1d00, ffff888101bc1d80)
[   14.452615] 
[   14.452790] The buggy address belongs to the physical page:
[   14.453436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bc1
[   14.454205] flags: 0x200000000000000(node=0|zone=2)
[   14.454382] page_type: f5(slab)
[   14.454520] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.455031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.455760] page dumped because: kasan: bad access detected
[   14.456316] 
[   14.456488] Memory state around the buggy address:
[   14.456939]  ffff888101bc1c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.457384]  ffff888101bc1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.457884] >ffff888101bc1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.458368]                    ^
[   14.458696]  ffff888101bc1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.459473]  ffff888101bc1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.459985] ==================================================================
[   14.465650] ==================================================================
[   14.466166] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.466451] Free of addr ffff888103920001 by task kunit_try_catch/261
[   14.466700] 
[   14.466793] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.466841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.466853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.466876] Call Trace:
[   14.466890]  <TASK>
[   14.466911]  dump_stack_lvl+0x73/0xb0
[   14.466945]  print_report+0xd1/0x610
[   14.466969]  ? __virt_addr_valid+0x1db/0x2d0
[   14.466995]  ? kasan_addr_to_slab+0x11/0xa0
[   14.467016]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.467044]  kasan_report_invalid_free+0x10a/0x130
[   14.467069]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.467098]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.467123]  __kasan_mempool_poison_object+0x102/0x1d0
[   14.467148]  mempool_free+0x2ec/0x380
[   14.467176]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.467202]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.467227]  ? update_load_avg+0x1be/0x21b0
[   14.467252]  ? dequeue_entities+0x27e/0x1740
[   14.467279]  ? finish_task_switch.isra.0+0x153/0x700
[   14.467305]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   14.467331]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   14.467359]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.467382]  ? __pfx_mempool_kfree+0x10/0x10
[   14.467421]  ? __pfx_read_tsc+0x10/0x10
[   14.467444]  ? ktime_get_ts64+0x86/0x230
[   14.467470]  kunit_try_run_case+0x1a5/0x480
[   14.467496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.467519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.467546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.467569]  ? __kthread_parkme+0x82/0x180
[   14.467591]  ? preempt_count_sub+0x50/0x80
[   14.467616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.467641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.467666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.467690]  kthread+0x337/0x6f0
[   14.467711]  ? trace_preempt_on+0x20/0xc0
[   14.467737]  ? __pfx_kthread+0x10/0x10
[   14.467759]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.467780]  ? calculate_sigpending+0x7b/0xa0
[   14.467805]  ? __pfx_kthread+0x10/0x10
[   14.467828]  ret_from_fork+0x116/0x1d0
[   14.467847]  ? __pfx_kthread+0x10/0x10
[   14.467868]  ret_from_fork_asm+0x1a/0x30
[   14.467900]  </TASK>
[   14.467912] 
[   14.477087] The buggy address belongs to the physical page:
[   14.477366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103920
[   14.477775] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.478176] flags: 0x200000000000040(head|node=0|zone=2)
[   14.478367] page_type: f8(unknown)
[   14.478509] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.478744] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.479050] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.479392] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.479995] head: 0200000000000002 ffffea00040e4801 00000000ffffffff 00000000ffffffff
[   14.480301] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.480545] page dumped because: kasan: bad access detected
[   14.480940] 
[   14.481040] Memory state around the buggy address:
[   14.481499]  ffff88810391ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.481872]  ffff88810391ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.482142] >ffff888103920000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.482548]                    ^
[   14.482670]  ffff888103920080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.482885]  ffff888103920100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.483364] ==================================================================

[   14.517632] ==================================================================
[   14.518232] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.518564] Free of addr ffff8881027bc601 by task kunit_try_catch/259
[   14.518910] 
[   14.519033] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.519082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.519095] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.519118] Call Trace:
[   14.519131]  <TASK>
[   14.519159]  dump_stack_lvl+0x73/0xb0
[   14.519190]  print_report+0xd1/0x610
[   14.519213]  ? __virt_addr_valid+0x1db/0x2d0
[   14.519238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.519260]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.519286]  kasan_report_invalid_free+0x10a/0x130
[   14.519311]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.519338]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.519362]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.519386]  check_slab_allocation+0x11f/0x130
[   14.519408]  __kasan_mempool_poison_object+0x91/0x1d0
[   14.519432]  mempool_free+0x2ec/0x380
[   14.519459]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.519484]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.519509]  ? update_curr+0x5c1/0x810
[   14.519538]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.519561]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   14.519583]  ? schedule+0x7c/0x2e0
[   14.519606]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.519627]  ? __pfx_mempool_kfree+0x10/0x10
[   14.519651]  ? __pfx_read_tsc+0x10/0x10
[   14.519672]  ? ktime_get_ts64+0x86/0x230
[   14.519695]  kunit_try_run_case+0x1a5/0x480
[   14.519721]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.519743]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.519767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.519790]  ? __kthread_parkme+0x82/0x180
[   14.519810]  ? preempt_count_sub+0x50/0x80
[   14.519833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.520041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.520071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.520095]  kthread+0x337/0x6f0
[   14.520114]  ? trace_preempt_on+0x20/0xc0
[   14.520138]  ? __pfx_kthread+0x10/0x10
[   14.520174]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.520195]  ? calculate_sigpending+0x7b/0xa0
[   14.520218]  ? __pfx_kthread+0x10/0x10
[   14.520240]  ret_from_fork+0x116/0x1d0
[   14.520258]  ? __pfx_kthread+0x10/0x10
[   14.520279]  ret_from_fork_asm+0x1a/0x30
[   14.520309]  </TASK>
[   14.520324] 
[   14.530319] Allocated by task 259:
[   14.530475]  kasan_save_stack+0x45/0x70
[   14.530706]  kasan_save_track+0x18/0x40
[   14.530842]  kasan_save_alloc_info+0x3b/0x50
[   14.531155]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   14.531433]  remove_element+0x11e/0x190
[   14.531586]  mempool_alloc_preallocated+0x4d/0x90
[   14.531820]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   14.532262]  mempool_kmalloc_invalid_free+0xed/0x140
[   14.532548]  kunit_try_run_case+0x1a5/0x480
[   14.532729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.533092]  kthread+0x337/0x6f0
[   14.533295]  ret_from_fork+0x116/0x1d0
[   14.533489]  ret_from_fork_asm+0x1a/0x30
[   14.533702] 
[   14.533782] The buggy address belongs to the object at ffff8881027bc600
[   14.533782]  which belongs to the cache kmalloc-128 of size 128
[   14.534556] The buggy address is located 1 bytes inside of
[   14.534556]  128-byte region [ffff8881027bc600, ffff8881027bc680)
[   14.534997] 
[   14.535075] The buggy address belongs to the physical page:
[   14.535317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027bc
[   14.535862] flags: 0x200000000000000(node=0|zone=2)
[   14.536096] page_type: f5(slab)
[   14.536238] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   14.536539] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   14.536885] page dumped because: kasan: bad access detected
[   14.537462] 
[   14.537569] Memory state around the buggy address:
[   14.537805]  ffff8881027bc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   14.538124]  ffff8881027bc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.538644] >ffff8881027bc600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.538914]                    ^
[   14.539083]  ffff8881027bc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.539457]  ffff8881027bc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.539679] ==================================================================
[   14.544030] ==================================================================
[   14.544794] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.545205] Free of addr ffff8881038c4001 by task kunit_try_catch/261
[   14.545851] 
[   14.545979] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7 #1 PREEMPT(voluntary) 
[   14.546029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.546042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.546065] Call Trace:
[   14.546079]  <TASK>
[   14.546096]  dump_stack_lvl+0x73/0xb0
[   14.546129]  print_report+0xd1/0x610
[   14.546236]  ? __virt_addr_valid+0x1db/0x2d0
[   14.546262]  ? kasan_addr_to_slab+0x11/0xa0
[   14.546282]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.546308]  kasan_report_invalid_free+0x10a/0x130
[   14.546347]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.546375]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.546400]  __kasan_mempool_poison_object+0x102/0x1d0
[   14.546424]  mempool_free+0x2ec/0x380
[   14.546451]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   14.546476]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   14.546501]  ? update_load_avg+0x1be/0x21b0
[   14.546527]  ? irqentry_exit+0x2a/0x60
[   14.546549]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   14.546576]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   14.546600]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   14.546627]  ? __pfx_mempool_kmalloc+0x10/0x10
[   14.546649]  ? __pfx_mempool_kfree+0x10/0x10
[   14.546673]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   14.546700]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   14.546725]  kunit_try_run_case+0x1a5/0x480
[   14.546751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.546774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.546798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.546822]  ? __kthread_parkme+0x82/0x180
[   14.546842]  ? preempt_count_sub+0x50/0x80
[   14.546907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.546931]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.546955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.546978]  kthread+0x337/0x6f0
[   14.546997]  ? trace_preempt_on+0x20/0xc0
[   14.547022]  ? __pfx_kthread+0x10/0x10
[   14.547042]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.547063]  ? calculate_sigpending+0x7b/0xa0
[   14.547087]  ? __pfx_kthread+0x10/0x10
[   14.547108]  ret_from_fork+0x116/0x1d0
[   14.547126]  ? __pfx_kthread+0x10/0x10
[   14.547159]  ret_from_fork_asm+0x1a/0x30
[   14.547188]  </TASK>
[   14.547199] 
[   14.557281] The buggy address belongs to the physical page:
[   14.557553] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038c4
[   14.557829] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   14.558055] flags: 0x200000000000040(head|node=0|zone=2)
[   14.558304] page_type: f8(unknown)
[   14.558683] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.559171] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.559729] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   14.560164] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   14.560581] head: 0200000000000002 ffffea00040e3101 00000000ffffffff 00000000ffffffff
[   14.560980] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   14.561247] page dumped because: kasan: bad access detected
[   14.561447] 
[   14.561542] Memory state around the buggy address:
[   14.561793]  ffff8881038c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.562264]  ffff8881038c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   14.562762] >ffff8881038c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.563013]                    ^
[   14.563198]  ffff8881038c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.563772]  ffff8881038c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   14.564137] ==================================================================