Hay
Date
June 26, 2025, 9:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   50.490530] ==================================================================
[   50.502705] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   50.510816] Free of addr ffff000096708001 by task kunit_try_catch/329
[   50.517342] 
[   50.518879] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   50.518913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.518925] Hardware name: Thundercomm Dragonboard 845c (DT)
[   50.518942] Call trace:
[   50.518951]  show_stack+0x20/0x38 (C)
[   50.518971]  dump_stack_lvl+0x8c/0xd0
[   50.518993]  print_report+0x118/0x608
[   50.519014]  kasan_report_invalid_free+0xc0/0xe8
[   50.519035]  __kasan_mempool_poison_object+0xfc/0x150
[   50.519058]  mempool_free+0x28c/0x328
[   50.519078]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   50.519099]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   50.519122]  kunit_try_run_case+0x170/0x3f0
[   50.519144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.519169]  kthread+0x328/0x630
[   50.519185]  ret_from_fork+0x10/0x20
[   50.519205] 
[   50.596958] The buggy address belongs to the physical page:
[   50.602604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116708
[   50.610710] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.618469] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.625530] page_type: f8(unknown)
[   50.629003] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.636852] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   50.644699] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   50.652634] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   50.660568] head: 0bfffe0000000002 fffffdffc259c201 00000000ffffffff 00000000ffffffff
[   50.668501] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   50.676431] page dumped because: kasan: bad access detected
[   50.682078] 
[   50.683607] Memory state around the buggy address:
[   50.688468]  ffff000096707f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.695783]  ffff000096707f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   50.703099] >ffff000096708000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.710412]                    ^
[   50.713695]  ffff000096708080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.721012]  ffff000096708100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.728325] ==================================================================
[   50.153810] ==================================================================
[   50.166168] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   50.174291] Free of addr ffff00008039fa01 by task kunit_try_catch/327
[   50.180824] 
[   50.182363] CPU: 0 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   50.182400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.182410] Hardware name: Thundercomm Dragonboard 845c (DT)
[   50.182428] Call trace:
[   50.182438]  show_stack+0x20/0x38 (C)
[   50.182458]  dump_stack_lvl+0x8c/0xd0
[   50.182482]  print_report+0x118/0x608
[   50.182503]  kasan_report_invalid_free+0xc0/0xe8
[   50.182525]  check_slab_allocation+0xfc/0x108
[   50.182548]  __kasan_mempool_poison_object+0x78/0x150
[   50.182570]  mempool_free+0x28c/0x328
[   50.182590]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   50.182613]  mempool_kmalloc_invalid_free+0xc0/0x118
[   50.182633]  kunit_try_run_case+0x170/0x3f0
[   50.182656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.182679]  kthread+0x328/0x630
[   50.182694]  ret_from_fork+0x10/0x20
[   50.182714] 
[   50.264370] Allocated by task 327:
[   50.267836]  kasan_save_stack+0x3c/0x68
[   50.271748]  kasan_save_track+0x20/0x40
[   50.275657]  kasan_save_alloc_info+0x40/0x58
[   50.280004]  __kasan_mempool_unpoison_object+0x11c/0x180
[   50.285405]  remove_element+0x130/0x1f8
[   50.289313]  mempool_alloc_preallocated+0x58/0xc0
[   50.294097]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   50.299753]  mempool_kmalloc_invalid_free+0xc0/0x118
[   50.304802]  kunit_try_run_case+0x170/0x3f0
[   50.309056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.314629]  kthread+0x328/0x630
[   50.317920]  ret_from_fork+0x10/0x20
[   50.321569] 
[   50.323100] The buggy address belongs to the object at ffff00008039fa00
[   50.323100]  which belongs to the cache kmalloc-128 of size 128
[   50.335764] The buggy address is located 1 bytes inside of
[   50.335764]  128-byte region [ffff00008039fa00, ffff00008039fa80)
[   50.347458] 
[   50.348991] The buggy address belongs to the physical page:
[   50.354643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10039e
[   50.362755] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   50.370513] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   50.377571] page_type: f5(slab)
[   50.380778] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   50.388624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.396467] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   50.404398] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.412332] head: 0bfffe0000000001 fffffdffc200e781 00000000ffffffff 00000000ffffffff
[   50.420271] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   50.428205] page dumped because: kasan: bad access detected
[   50.433856] 
[   50.435384] Memory state around the buggy address:
[   50.440253]  ffff00008039f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   50.447570]  ffff00008039f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.454895] >ffff00008039fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.462217]                    ^
[   50.465503]  ffff00008039fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.472827]  ffff00008039fb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   50.480148] ==================================================================

[   28.993425] ==================================================================
[   28.993508] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.993765] Free of addr fff00000c5773901 by task kunit_try_catch/253
[   28.994230] 
[   28.994386] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   28.994546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.994627] Hardware name: linux,dummy-virt (DT)
[   28.994732] Call trace:
[   28.994791]  show_stack+0x20/0x38 (C)
[   28.994874]  dump_stack_lvl+0x8c/0xd0
[   28.995136]  print_report+0x118/0x608
[   28.995203]  kasan_report_invalid_free+0xc0/0xe8
[   28.995256]  check_slab_allocation+0xfc/0x108
[   28.995312]  __kasan_mempool_poison_object+0x78/0x150
[   28.995367]  mempool_free+0x28c/0x328
[   28.995414]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   28.995467]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.995515]  kunit_try_run_case+0x170/0x3f0
[   28.995578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.995633]  kthread+0x328/0x630
[   28.995676]  ret_from_fork+0x10/0x20
[   28.995729] 
[   28.995747] Allocated by task 253:
[   28.996113]  kasan_save_stack+0x3c/0x68
[   28.996275]  kasan_save_track+0x20/0x40
[   28.996381]  kasan_save_alloc_info+0x40/0x58
[   28.996437]  __kasan_mempool_unpoison_object+0x11c/0x180
[   28.996480]  remove_element+0x130/0x1f8
[   28.996548]  mempool_alloc_preallocated+0x58/0xc0
[   28.996613]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   28.996656]  mempool_kmalloc_invalid_free+0xc0/0x118
[   28.996695]  kunit_try_run_case+0x170/0x3f0
[   28.996843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.996906]  kthread+0x328/0x630
[   28.996996]  ret_from_fork+0x10/0x20
[   28.997076] 
[   28.997146] The buggy address belongs to the object at fff00000c5773900
[   28.997146]  which belongs to the cache kmalloc-128 of size 128
[   28.997256] The buggy address is located 1 bytes inside of
[   28.997256]  128-byte region [fff00000c5773900, fff00000c5773980)
[   28.997512] 
[   28.997596] The buggy address belongs to the physical page:
[   28.997660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773
[   28.997753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.997910] page_type: f5(slab)
[   28.997948] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   28.998014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   28.998362] page dumped because: kasan: bad access detected
[   28.998509] 
[   28.998590] Memory state around the buggy address:
[   28.998685]  fff00000c5773800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   28.998745]  fff00000c5773880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.998788] >fff00000c5773900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.998938]                    ^
[   28.999087]  fff00000c5773980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.999252]  fff00000c5773a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   28.999364] ==================================================================
[   29.005719] ==================================================================
[   29.005813] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   29.005876] Free of addr fff00000c6554001 by task kunit_try_catch/255
[   29.005920] 
[   29.005970] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT 
[   29.006080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.006107] Hardware name: linux,dummy-virt (DT)
[   29.006192] Call trace:
[   29.006215]  show_stack+0x20/0x38 (C)
[   29.006264]  dump_stack_lvl+0x8c/0xd0
[   29.006443]  print_report+0x118/0x608
[   29.006499]  kasan_report_invalid_free+0xc0/0xe8
[   29.006737]  __kasan_mempool_poison_object+0xfc/0x150
[   29.006812]  mempool_free+0x28c/0x328
[   29.006886]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   29.006941]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   29.006993]  kunit_try_run_case+0x170/0x3f0
[   29.007039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.007105]  kthread+0x328/0x630
[   29.007330]  ret_from_fork+0x10/0x20
[   29.007386] 
[   29.007424] The buggy address belongs to the physical page:
[   29.007471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554
[   29.007544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   29.007609] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   29.007661] page_type: f8(unknown)
[   29.007702] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.007752] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.007801] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   29.007861] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   29.007910] head: 0bfffe0000000002 ffffc1ffc3195501 00000000ffffffff 00000000ffffffff
[   29.008089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   29.008168] page dumped because: kasan: bad access detected
[   29.008213] 
[   29.008237] Memory state around the buggy address:
[   29.008269]  fff00000c6553f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.008319]  fff00000c6553f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   29.008388] >fff00000c6554000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.008423]                    ^
[   29.008451]  fff00000c6554080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.008492]  fff00000c6554100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   29.008562] ==================================================================

[   23.885702] ==================================================================
[   23.886326] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.886698] Free of addr ffff888102bd8001 by task kunit_try_catch/272
[   23.887198] 
[   23.887318] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   23.887370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.887384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.887407] Call Trace:
[   23.887421]  <TASK>
[   23.887439]  dump_stack_lvl+0x73/0xb0
[   23.887469]  print_report+0xd1/0x650
[   23.887492]  ? __virt_addr_valid+0x1db/0x2d0
[   23.887516]  ? kasan_addr_to_slab+0x11/0xa0
[   23.887536]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.887561]  kasan_report_invalid_free+0x10a/0x130
[   23.887584]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.887613]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.887636]  __kasan_mempool_poison_object+0x102/0x1d0
[   23.887659]  mempool_free+0x2ec/0x380
[   23.887685]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.887709]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   23.887736]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.887758]  ? finish_task_switch.isra.0+0x153/0x700
[   23.887808]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   23.887834]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   23.887861]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.887884]  ? __pfx_mempool_kfree+0x10/0x10
[   23.887907]  ? __pfx_read_tsc+0x10/0x10
[   23.887930]  ? ktime_get_ts64+0x86/0x230
[   23.887954]  kunit_try_run_case+0x1a5/0x480
[   23.887980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.888016]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.888043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.888068]  ? __kthread_parkme+0x82/0x180
[   23.888089]  ? preempt_count_sub+0x50/0x80
[   23.888111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.888135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.888159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.888183]  kthread+0x337/0x6f0
[   23.888202]  ? trace_preempt_on+0x20/0xc0
[   23.888234]  ? __pfx_kthread+0x10/0x10
[   23.888255]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.888278]  ? calculate_sigpending+0x7b/0xa0
[   23.888303]  ? __pfx_kthread+0x10/0x10
[   23.888323]  ret_from_fork+0x116/0x1d0
[   23.888342]  ? __pfx_kthread+0x10/0x10
[   23.888363]  ret_from_fork_asm+0x1a/0x30
[   23.888394]  </TASK>
[   23.888406] 
[   23.897766] The buggy address belongs to the physical page:
[   23.898619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102bd8
[   23.899057] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   23.899347] flags: 0x200000000000040(head|node=0|zone=2)
[   23.899615] page_type: f8(unknown)
[   23.899798] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.900129] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.900833] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   23.901184] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   23.901515] head: 0200000000000002 ffffea00040af601 00000000ffffffff 00000000ffffffff
[   23.901837] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   23.902085] page dumped because: kasan: bad access detected
[   23.902340] 
[   23.902409] Memory state around the buggy address:
[   23.902699]  ffff888102bd7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.903039]  ffff888102bd7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   23.903383] >ffff888102bd8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.903699]                    ^
[   23.903828]  ffff888102bd8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.904102]  ffff888102bd8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.904452] ==================================================================
[   23.851765] ==================================================================
[   23.852721] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.853415] Free of addr ffff8881024e1701 by task kunit_try_catch/270
[   23.854312] 
[   23.854498] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250626 #1 PREEMPT(voluntary) 
[   23.854554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.854567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.854591] Call Trace:
[   23.854607]  <TASK>
[   23.854629]  dump_stack_lvl+0x73/0xb0
[   23.854661]  print_report+0xd1/0x650
[   23.854686]  ? __virt_addr_valid+0x1db/0x2d0
[   23.854711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.854736]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.854762]  kasan_report_invalid_free+0x10a/0x130
[   23.854794]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.854820]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.854844]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.854866]  check_slab_allocation+0x11f/0x130
[   23.854887]  __kasan_mempool_poison_object+0x91/0x1d0
[   23.854911]  mempool_free+0x2ec/0x380
[   23.854938]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   23.854961]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   23.854988]  ? __pfx_sched_clock_cpu+0x10/0x10
[   23.855009]  ? finish_task_switch.isra.0+0x153/0x700
[   23.855042]  mempool_kmalloc_invalid_free+0xed/0x140
[   23.855064]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   23.855089]  ? __pfx_mempool_kmalloc+0x10/0x10
[   23.855111]  ? __pfx_mempool_kfree+0x10/0x10
[   23.855135]  ? __pfx_read_tsc+0x10/0x10
[   23.855157]  ? ktime_get_ts64+0x86/0x230
[   23.855181]  kunit_try_run_case+0x1a5/0x480
[   23.855206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.855239]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.855265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.855289]  ? __kthread_parkme+0x82/0x180
[   23.855309]  ? preempt_count_sub+0x50/0x80
[   23.855331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.855354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.855377]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.855401]  kthread+0x337/0x6f0
[   23.855419]  ? trace_preempt_on+0x20/0xc0
[   23.855443]  ? __pfx_kthread+0x10/0x10
[   23.855463]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.855487]  ? calculate_sigpending+0x7b/0xa0
[   23.855511]  ? __pfx_kthread+0x10/0x10
[   23.855532]  ret_from_fork+0x116/0x1d0
[   23.855551]  ? __pfx_kthread+0x10/0x10
[   23.855571]  ret_from_fork_asm+0x1a/0x30
[   23.855602]  </TASK>
[   23.855614] 
[   23.873309] Allocated by task 270:
[   23.873502]  kasan_save_stack+0x45/0x70
[   23.873682]  kasan_save_track+0x18/0x40
[   23.873853]  kasan_save_alloc_info+0x3b/0x50
[   23.873993]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   23.874157]  remove_element+0x11e/0x190
[   23.874382]  mempool_alloc_preallocated+0x4d/0x90
[   23.874720]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   23.874968]  mempool_kmalloc_invalid_free+0xed/0x140
[   23.875157]  kunit_try_run_case+0x1a5/0x480
[   23.875314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.875817]  kthread+0x337/0x6f0
[   23.875988]  ret_from_fork+0x116/0x1d0
[   23.876192]  ret_from_fork_asm+0x1a/0x30
[   23.876363] 
[   23.876448] The buggy address belongs to the object at ffff8881024e1700
[   23.876448]  which belongs to the cache kmalloc-128 of size 128
[   23.876996] The buggy address is located 1 bytes inside of
[   23.876996]  128-byte region [ffff8881024e1700, ffff8881024e1780)
[   23.877438] 
[   23.877532] The buggy address belongs to the physical page:
[   23.877787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1024e1
[   23.878080] flags: 0x200000000000000(node=0|zone=2)
[   23.878253] page_type: f5(slab)
[   23.878548] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   23.878957] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   23.879356] page dumped because: kasan: bad access detected
[   23.879524] 
[   23.879586] Memory state around the buggy address:
[   23.879736]  ffff8881024e1600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   23.880275]  ffff8881024e1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.880594] >ffff8881024e1700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.880909]                    ^
[   23.881106]  ffff8881024e1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.881492]  ffff8881024e1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.882258] ==================================================================