Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.080651] ==================================================================
[   33.080728] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.080790] Free of addr fff00000c8dc5401 by task kunit_try_catch/274
[   33.080833] 
[   33.080873] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.080975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.081004] Hardware name: linux,dummy-virt (DT)
[   33.081033] Call trace:
[   33.081088]  show_stack+0x20/0x38 (C)
[   33.081287]  dump_stack_lvl+0x8c/0xd0
[   33.081336]  print_report+0x118/0x608
[   33.081403]  kasan_report_invalid_free+0xc0/0xe8
[   33.081456]  check_slab_allocation+0xfc/0x108
[   33.081523]  __kasan_mempool_poison_object+0x78/0x150
[   33.081578]  mempool_free+0x28c/0x328
[   33.081651]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.081715]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.081782]  kunit_try_run_case+0x170/0x3f0
[   33.081835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.082178]  kthread+0x328/0x630
[   33.082264]  ret_from_fork+0x10/0x20
[   33.082317] 
[   33.082335] Allocated by task 274:
[   33.082384]  kasan_save_stack+0x3c/0x68
[   33.082453]  kasan_save_track+0x20/0x40
[   33.082512]  kasan_save_alloc_info+0x40/0x58
[   33.082567]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.082613]  remove_element+0x130/0x1f8
[   33.082648]  mempool_alloc_preallocated+0x58/0xc0
[   33.082707]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   33.082751]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.082791]  kunit_try_run_case+0x170/0x3f0
[   33.082938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.083013]  kthread+0x328/0x630
[   33.083050]  ret_from_fork+0x10/0x20
[   33.083087] 
[   33.083179] The buggy address belongs to the object at fff00000c8dc5400
[   33.083179]  which belongs to the cache kmalloc-128 of size 128
[   33.083258] The buggy address is located 1 bytes inside of
[   33.083258]  128-byte region [fff00000c8dc5400, fff00000c8dc5480)
[   33.083321] 
[   33.083362] The buggy address belongs to the physical page:
[   33.083394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc5
[   33.083448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.083497] page_type: f5(slab)
[   33.083535] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.083602] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.083876] page dumped because: kasan: bad access detected
[   33.083996] 
[   33.084084] Memory state around the buggy address:
[   33.084145]  fff00000c8dc5300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   33.084210]  fff00000c8dc5380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.084308] >fff00000c8dc5400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.084349]                    ^
[   33.084378]  fff00000c8dc5480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.084438]  fff00000c8dc5500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.084477] ==================================================================
[   33.091068] ==================================================================
[   33.091172] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.091233] Free of addr fff00000c9b04001 by task kunit_try_catch/276
[   33.091278] 
[   33.091313] CPU: 1 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.091497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.091563] Hardware name: linux,dummy-virt (DT)
[   33.091704] Call trace:
[   33.091825]  show_stack+0x20/0x38 (C)
[   33.091922]  dump_stack_lvl+0x8c/0xd0
[   33.091986]  print_report+0x118/0x608
[   33.092034]  kasan_report_invalid_free+0xc0/0xe8
[   33.092105]  __kasan_mempool_poison_object+0xfc/0x150
[   33.092158]  mempool_free+0x28c/0x328
[   33.092204]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.092257]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   33.092310]  kunit_try_run_case+0x170/0x3f0
[   33.092359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.092414]  kthread+0x328/0x630
[   33.092456]  ret_from_fork+0x10/0x20
[   33.092766] 
[   33.092811] The buggy address belongs to the physical page:
[   33.092912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04
[   33.093026] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.093153] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.093219] page_type: f8(unknown)
[   33.093261] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.093311] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.093510] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.093575] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.093662] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff
[   33.093723] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.093784] page dumped because: kasan: bad access detected
[   33.093816] 
[   33.093834] Memory state around the buggy address:
[   33.093876]  fff00000c9b03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.093918]  fff00000c9b03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.093973] >fff00000c9b04000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.094012]                    ^
[   33.094052]  fff00000c9b04080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.094105]  fff00000c9b04100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.094155] ==================================================================

[   34.885114] ==================================================================
[   34.885206] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.885475] Free of addr fff00000c8dbdc01 by task kunit_try_catch/272
[   34.885556] 
[   34.885652] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   34.885767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   34.885861] Hardware name: linux,dummy-virt (DT)
[   34.885929] Call trace:
[   34.885970]  show_stack+0x20/0x38 (C)
[   34.886023]  dump_stack_lvl+0x8c/0xd0
[   34.886128]  print_report+0x118/0x608
[   34.886190]  kasan_report_invalid_free+0xc0/0xe8
[   34.886259]  check_slab_allocation+0xfc/0x108
[   34.886308]  __kasan_mempool_poison_object+0x78/0x150
[   34.886362]  mempool_free+0x28c/0x328
[   34.886629]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   34.886742]  mempool_kmalloc_invalid_free+0xc0/0x118
[   34.886810]  kunit_try_run_case+0x170/0x3f0
[   34.886924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.886990]  kthread+0x328/0x630
[   34.887047]  ret_from_fork+0x10/0x20
[   34.887143] 
[   34.887190] Allocated by task 272:
[   34.887225]  kasan_save_stack+0x3c/0x68
[   34.887272]  kasan_save_track+0x20/0x40
[   34.887380]  kasan_save_alloc_info+0x40/0x58
[   34.887420]  __kasan_mempool_unpoison_object+0x11c/0x180
[   34.887482]  remove_element+0x130/0x1f8
[   34.887827]  mempool_alloc_preallocated+0x58/0xc0
[   34.887917]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   34.887984]  mempool_kmalloc_invalid_free+0xc0/0x118
[   34.888123]  kunit_try_run_case+0x170/0x3f0
[   34.888219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   34.888384]  kthread+0x328/0x630
[   34.888452]  ret_from_fork+0x10/0x20
[   34.888616] 
[   34.888814] The buggy address belongs to the object at fff00000c8dbdc00
[   34.888814]  which belongs to the cache kmalloc-128 of size 128
[   34.888907] The buggy address is located 1 bytes inside of
[   34.888907]  128-byte region [fff00000c8dbdc00, fff00000c8dbdc80)
[   34.888993] 
[   34.889032] The buggy address belongs to the physical page:
[   34.889143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dbd
[   34.889232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   34.889368] page_type: f5(slab)
[   34.889446] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   34.889614] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   34.889683] page dumped because: kasan: bad access detected
[   34.889786] 
[   34.889826] Memory state around the buggy address:
[   34.889859]  fff00000c8dbdb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   34.889914]  fff00000c8dbdb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.890078] >fff00000c8dbdc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.890128]                    ^
[   34.890171]  fff00000c8dbdc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   34.890215]  fff00000c8dbdd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   34.898534]  dump_stack_lvl+0x8c/0xd0
[   34.900841] 
[   34.901942] ==================================================================

[   25.059039] ==================================================================
[   25.059896] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.060194] Free of addr ffff888103b7e801 by task kunit_try_catch/290
[   25.061204] 
[   25.061487] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.061550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.061564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.061589] Call Trace:
[   25.061605]  <TASK>
[   25.061626]  dump_stack_lvl+0x73/0xb0
[   25.061662]  print_report+0xd1/0x650
[   25.061686]  ? __virt_addr_valid+0x1db/0x2d0
[   25.061712]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.061739]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.061765]  kasan_report_invalid_free+0x10a/0x130
[   25.061790]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.061817]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.061848]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.061872]  check_slab_allocation+0x11f/0x130
[   25.061894]  __kasan_mempool_poison_object+0x91/0x1d0
[   25.061918]  mempool_free+0x2ec/0x380
[   25.062021]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.062048]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   25.062087]  ? __kasan_check_write+0x18/0x20
[   25.062111]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.062134]  ? finish_task_switch.isra.0+0x153/0x700
[   25.062161]  mempool_kmalloc_invalid_free+0xed/0x140
[   25.062202]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   25.062230]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.062252]  ? __pfx_mempool_kfree+0x10/0x10
[   25.062278]  ? __pfx_read_tsc+0x10/0x10
[   25.062300]  ? ktime_get_ts64+0x86/0x230
[   25.062326]  kunit_try_run_case+0x1a5/0x480
[   25.062354]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.062378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.062401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.062424]  ? __kthread_parkme+0x82/0x180
[   25.062445]  ? preempt_count_sub+0x50/0x80
[   25.062469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.062493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.062517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.062542]  kthread+0x337/0x6f0
[   25.062562]  ? trace_preempt_on+0x20/0xc0
[   25.062587]  ? __pfx_kthread+0x10/0x10
[   25.062608]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.062632]  ? calculate_sigpending+0x7b/0xa0
[   25.062656]  ? __pfx_kthread+0x10/0x10
[   25.062678]  ret_from_fork+0x116/0x1d0
[   25.062698]  ? __pfx_kthread+0x10/0x10
[   25.062719]  ret_from_fork_asm+0x1a/0x30
[   25.062750]  </TASK>
[   25.062763] 
[   25.079580] Allocated by task 290:
[   25.079738]  kasan_save_stack+0x45/0x70
[   25.079895]  kasan_save_track+0x18/0x40
[   25.080406]  kasan_save_alloc_info+0x3b/0x50
[   25.080834]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.081450]  remove_element+0x11e/0x190
[   25.081780]  mempool_alloc_preallocated+0x4d/0x90
[   25.081951]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   25.082510]  mempool_kmalloc_invalid_free+0xed/0x140
[   25.082981]  kunit_try_run_case+0x1a5/0x480
[   25.083177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.083690]  kthread+0x337/0x6f0
[   25.083854]  ret_from_fork+0x116/0x1d0
[   25.083977]  ret_from_fork_asm+0x1a/0x30
[   25.084120] 
[   25.084229] The buggy address belongs to the object at ffff888103b7e800
[   25.084229]  which belongs to the cache kmalloc-128 of size 128
[   25.085297] The buggy address is located 1 bytes inside of
[   25.085297]  128-byte region [ffff888103b7e800, ffff888103b7e880)
[   25.086507] 
[   25.086677] The buggy address belongs to the physical page:
[   25.086849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103b7e
[   25.087539] flags: 0x200000000000000(node=0|zone=2)
[   25.088007] page_type: f5(slab)
[   25.088359] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.088625] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.088839] page dumped because: kasan: bad access detected
[   25.089173] 
[   25.089323] Memory state around the buggy address:
[   25.089779]  ffff888103b7e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.090518]  ffff888103b7e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.091259] >ffff888103b7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.091919]                    ^
[   25.092176]  ffff888103b7e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.092733]  ffff888103b7e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.093041] ==================================================================
[   25.096726] ==================================================================
[   25.097886] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.098826] Free of addr ffff8881061f0001 by task kunit_try_catch/292
[   25.099045] 
[   25.099186] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.099245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.099259] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.099283] Call Trace:
[   25.099299]  <TASK>
[   25.099321]  dump_stack_lvl+0x73/0xb0
[   25.099366]  print_report+0xd1/0x650
[   25.099390]  ? __virt_addr_valid+0x1db/0x2d0
[   25.099418]  ? kasan_addr_to_slab+0x11/0xa0
[   25.099438]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.099464]  kasan_report_invalid_free+0x10a/0x130
[   25.099489]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.099517]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.099541]  __kasan_mempool_poison_object+0x102/0x1d0
[   25.099565]  mempool_free+0x2ec/0x380
[   25.099594]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.099619]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   25.099646]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.099670]  ? finish_task_switch.isra.0+0x153/0x700
[   25.099697]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   25.099721]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   25.099748]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.099771]  ? __pfx_mempool_kfree+0x10/0x10
[   25.099795]  ? __pfx_read_tsc+0x10/0x10
[   25.099818]  ? ktime_get_ts64+0x86/0x230
[   25.099844]  kunit_try_run_case+0x1a5/0x480
[   25.099871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.099894]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.099918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.099991]  ? __kthread_parkme+0x82/0x180
[   25.100015]  ? preempt_count_sub+0x50/0x80
[   25.100039]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.100076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.100101]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.100126]  kthread+0x337/0x6f0
[   25.100146]  ? trace_preempt_on+0x20/0xc0
[   25.100171]  ? __pfx_kthread+0x10/0x10
[   25.100232]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.100259]  ? calculate_sigpending+0x7b/0xa0
[   25.100285]  ? __pfx_kthread+0x10/0x10
[   25.100306]  ret_from_fork+0x116/0x1d0
[   25.100326]  ? __pfx_kthread+0x10/0x10
[   25.100347]  ret_from_fork_asm+0x1a/0x30
[   25.100380]  </TASK>
[   25.100393] 
[   25.110781] The buggy address belongs to the physical page:
[   25.111017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1061f0
[   25.111463] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.111792] flags: 0x200000000000040(head|node=0|zone=2)
[   25.112096] page_type: f8(unknown)
[   25.112399] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.112753] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.112978] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.113423] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.114150] head: 0200000000000002 ffffea0004187c01 00000000ffffffff 00000000ffffffff
[   25.114503] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.114797] page dumped because: kasan: bad access detected
[   25.115050] 
[   25.115155] Memory state around the buggy address:
[   25.115390]  ffff8881061eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.115715]  ffff8881061eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.115998] >ffff8881061f0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.116321]                    ^
[   25.116438]  ffff8881061f0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.116701]  ffff8881061f0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.117009] ==================================================================

[   24.847044] ==================================================================
[   24.847868] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.848572] Free of addr ffff888106154001 by task kunit_try_catch/291
[   24.849009] 
[   24.849103] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   24.849155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.849168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.849190] Call Trace:
[   24.849203]  <TASK>
[   24.849219]  dump_stack_lvl+0x73/0xb0
[   24.849248]  print_report+0xd1/0x650
[   24.849269]  ? __virt_addr_valid+0x1db/0x2d0
[   24.849293]  ? kasan_addr_to_slab+0x11/0xa0
[   24.849325]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.849352]  kasan_report_invalid_free+0x10a/0x130
[   24.849376]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.849402]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.849426]  __kasan_mempool_poison_object+0x102/0x1d0
[   24.849450]  mempool_free+0x2ec/0x380
[   24.849500]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.849525]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   24.849554]  ? finish_task_switch.isra.0+0x153/0x700
[   24.849580]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   24.849605]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   24.849631]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.849655]  ? __pfx_mempool_kfree+0x10/0x10
[   24.849700]  ? __pfx_read_tsc+0x10/0x10
[   24.849721]  ? ktime_get_ts64+0x86/0x230
[   24.849750]  kunit_try_run_case+0x1a5/0x480
[   24.849775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.849798]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.849820]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.849842]  ? __kthread_parkme+0x82/0x180
[   24.849862]  ? preempt_count_sub+0x50/0x80
[   24.849885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.849909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.849934]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.849958]  kthread+0x337/0x6f0
[   24.849977]  ? trace_preempt_on+0x20/0xc0
[   24.850000]  ? __pfx_kthread+0x10/0x10
[   24.850020]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.850043]  ? calculate_sigpending+0x7b/0xa0
[   24.850067]  ? __pfx_kthread+0x10/0x10
[   24.850088]  ret_from_fork+0x116/0x1d0
[   24.850107]  ? __pfx_kthread+0x10/0x10
[   24.850127]  ret_from_fork_asm+0x1a/0x30
[   24.850157]  </TASK>
[   24.850169] 
[   24.864178] The buggy address belongs to the physical page:
[   24.864729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106154
[   24.864998] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.865221] flags: 0x200000000000040(head|node=0|zone=2)
[   24.865412] page_type: f8(unknown)
[   24.865615] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.865958] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.866237] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.866601] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.866976] head: 0200000000000002 ffffea0004185501 00000000ffffffff 00000000ffffffff
[   24.867300] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.867625] page dumped because: kasan: bad access detected
[   24.868090] 
[   24.868189] Memory state around the buggy address:
[   24.868373]  ffff888106153f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.868777]  ffff888106153f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.869068] >ffff888106154000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.869363]                    ^
[   24.869494]  ffff888106154080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.869847]  ffff888106154100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.870127] ==================================================================
[   24.817654] ==================================================================
[   24.818346] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.818753] Free of addr ffff888104950d01 by task kunit_try_catch/289
[   24.819038] 
[   24.819151] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   24.819330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.819345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.819417] Call Trace:
[   24.819430]  <TASK>
[   24.819449]  dump_stack_lvl+0x73/0xb0
[   24.819494]  print_report+0xd1/0x650
[   24.819519]  ? __virt_addr_valid+0x1db/0x2d0
[   24.819545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.819572]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.819598]  kasan_report_invalid_free+0x10a/0x130
[   24.819623]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.819650]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.819674]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.819710]  check_slab_allocation+0x11f/0x130
[   24.819732]  __kasan_mempool_poison_object+0x91/0x1d0
[   24.819756]  mempool_free+0x2ec/0x380
[   24.819785]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.819810]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   24.819834]  ? update_load_avg+0x1be/0x21b0
[   24.819905]  ? finish_task_switch.isra.0+0x153/0x700
[   24.819933]  mempool_kmalloc_invalid_free+0xed/0x140
[   24.820005]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   24.820032]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.820065]  ? __pfx_mempool_kfree+0x10/0x10
[   24.820091]  ? __pfx_read_tsc+0x10/0x10
[   24.820114]  ? ktime_get_ts64+0x86/0x230
[   24.820141]  kunit_try_run_case+0x1a5/0x480
[   24.820169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.820193]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.820216]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.820239]  ? __kthread_parkme+0x82/0x180
[   24.820261]  ? preempt_count_sub+0x50/0x80
[   24.820286]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.820320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.820345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.820370]  kthread+0x337/0x6f0
[   24.820389]  ? trace_preempt_on+0x20/0xc0
[   24.820414]  ? __pfx_kthread+0x10/0x10
[   24.820435]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.820460]  ? calculate_sigpending+0x7b/0xa0
[   24.820485]  ? __pfx_kthread+0x10/0x10
[   24.820516]  ret_from_fork+0x116/0x1d0
[   24.820536]  ? __pfx_kthread+0x10/0x10
[   24.820557]  ret_from_fork_asm+0x1a/0x30
[   24.820591]  </TASK>
[   24.820603] 
[   24.833888] Allocated by task 289:
[   24.834024]  kasan_save_stack+0x45/0x70
[   24.834236]  kasan_save_track+0x18/0x40
[   24.834445]  kasan_save_alloc_info+0x3b/0x50
[   24.834765]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   24.835014]  remove_element+0x11e/0x190
[   24.835156]  mempool_alloc_preallocated+0x4d/0x90
[   24.835351]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   24.835601]  mempool_kmalloc_invalid_free+0xed/0x140
[   24.835963]  kunit_try_run_case+0x1a5/0x480
[   24.836259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.836444]  kthread+0x337/0x6f0
[   24.836606]  ret_from_fork+0x116/0x1d0
[   24.836860]  ret_from_fork_asm+0x1a/0x30
[   24.837085] 
[   24.837193] The buggy address belongs to the object at ffff888104950d00
[   24.837193]  which belongs to the cache kmalloc-128 of size 128
[   24.837599] The buggy address is located 1 bytes inside of
[   24.837599]  128-byte region [ffff888104950d00, ffff888104950d80)
[   24.838064] 
[   24.838167] The buggy address belongs to the physical page:
[   24.838356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104950
[   24.838830] flags: 0x200000000000000(node=0|zone=2)
[   24.839086] page_type: f5(slab)
[   24.839259] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.839853] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.840181] page dumped because: kasan: bad access detected
[   24.840416] 
[   24.840519] Memory state around the buggy address:
[   24.840770]  ffff888104950c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.841104]  ffff888104950c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.841416] >ffff888104950d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.841784]                    ^
[   24.841977]  ffff888104950d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.842289]  ffff888104950e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.842621] ==================================================================