Hay
Date
July 3, 2025, 10:10 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   50.980145] ==================================================================
[   50.992503] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   51.000623] Free of addr ffff000082240d01 by task kunit_try_catch/350
[   51.007152] 
[   51.008697] CPU: 3 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   51.008730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.008739] Hardware name: Thundercomm Dragonboard 845c (DT)
[   51.008751] Call trace:
[   51.008759]  show_stack+0x20/0x38 (C)
[   51.008778]  dump_stack_lvl+0x8c/0xd0
[   51.008800]  print_report+0x118/0x608
[   51.008823]  kasan_report_invalid_free+0xc0/0xe8
[   51.008845]  check_slab_allocation+0xfc/0x108
[   51.008865]  __kasan_mempool_poison_object+0x78/0x150
[   51.008890]  mempool_free+0x28c/0x328
[   51.008908]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   51.008930]  mempool_kmalloc_invalid_free+0xc0/0x118
[   51.008951]  kunit_try_run_case+0x170/0x3f0
[   51.008971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.008995]  kthread+0x328/0x630
[   51.009011]  ret_from_fork+0x10/0x20
[   51.009030] 
[   51.090707] Allocated by task 350:
[   51.094168]  kasan_save_stack+0x3c/0x68
[   51.098080]  kasan_save_track+0x20/0x40
[   51.101992]  kasan_save_alloc_info+0x40/0x58
[   51.106330]  __kasan_mempool_unpoison_object+0x11c/0x180
[   51.111727]  remove_element+0x130/0x1f8
[   51.115637]  mempool_alloc_preallocated+0x58/0xc0
[   51.120417]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   51.126076]  mempool_kmalloc_invalid_free+0xc0/0x118
[   51.131117]  kunit_try_run_case+0x170/0x3f0
[   51.135371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.140943]  kthread+0x328/0x630
[   51.144234]  ret_from_fork+0x10/0x20
[   51.147873] 
[   51.149406] The buggy address belongs to the object at ffff000082240d00
[   51.149406]  which belongs to the cache kmalloc-128 of size 128
[   51.162072] The buggy address is located 1 bytes inside of
[   51.162072]  128-byte region [ffff000082240d00, ffff000082240d80)
[   51.173778] 
[   51.175309] The buggy address belongs to the physical page:
[   51.180956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240
[   51.189072] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.196832] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   51.203889] page_type: f5(slab)
[   51.207099] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   51.214947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.222794] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   51.230727] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.238662] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff
[   51.246594] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   51.254523] page dumped because: kasan: bad access detected
[   51.260181] 
[   51.261713] Memory state around the buggy address:
[   51.266576]  ffff000082240c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   51.273901]  ffff000082240c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.281226] >ffff000082240d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.288550]                    ^
[   51.291842]  ffff000082240d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.299162]  ffff000082240e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.306476] ==================================================================
[   51.317178] ==================================================================
[   51.329369] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   51.337487] Free of addr ffff00008553c001 by task kunit_try_catch/352
[   51.344023] 
[   51.345558] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   51.345590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.345600] Hardware name: Thundercomm Dragonboard 845c (DT)
[   51.345613] Call trace:
[   51.345620]  show_stack+0x20/0x38 (C)
[   51.345640]  dump_stack_lvl+0x8c/0xd0
[   51.345662]  print_report+0x118/0x608
[   51.345686]  kasan_report_invalid_free+0xc0/0xe8
[   51.345707]  __kasan_mempool_poison_object+0xfc/0x150
[   51.345732]  mempool_free+0x28c/0x328
[   51.345751]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   51.345773]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   51.345794]  kunit_try_run_case+0x170/0x3f0
[   51.345813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.345836]  kthread+0x328/0x630
[   51.345853]  ret_from_fork+0x10/0x20
[   51.345871] 
[   51.423654] The buggy address belongs to the physical page:
[   51.429300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553c
[   51.437414] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   51.445171] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   51.452226] page_type: f8(unknown)
[   51.455695] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   51.463539] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   51.471381] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   51.479311] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   51.487252] head: 0bfffe0000000002 fffffdffc2154f01 00000000ffffffff 00000000ffffffff
[   51.495194] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   51.503128] page dumped because: kasan: bad access detected
[   51.508782] 
[   51.510313] Memory state around the buggy address:
[   51.515172]  ffff00008553bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   51.522497]  ffff00008553bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   51.529821] >ffff00008553c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.537140]                    ^
[   51.540430]  ffff00008553c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.547755]  ffff00008553c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   51.555067] ==================================================================

[   33.186223] ==================================================================
[   33.186281] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.186345] Free of addr fff00000c9c7c001 by task kunit_try_catch/275
[   33.186601] 
[   33.186637] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.186723] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.186750] Hardware name: linux,dummy-virt (DT)
[   33.186784] Call trace:
[   33.187205]  show_stack+0x20/0x38 (C)
[   33.187557]  dump_stack_lvl+0x8c/0xd0
[   33.187775]  print_report+0x118/0x608
[   33.187826]  kasan_report_invalid_free+0xc0/0xe8
[   33.187888]  __kasan_mempool_poison_object+0xfc/0x150
[   33.188187]  mempool_free+0x28c/0x328
[   33.188236]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.188290]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   33.188476]  kunit_try_run_case+0x170/0x3f0
[   33.188525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.188581]  kthread+0x328/0x630
[   33.188722]  ret_from_fork+0x10/0x20
[   33.188771] 
[   33.188791] The buggy address belongs to the physical page:
[   33.189057] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c7c
[   33.189118] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.189166] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.189222] page_type: f8(unknown)
[   33.189327] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.189665] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.189718] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   33.189768] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   33.189818] head: 0bfffe0000000002 ffffc1ffc3271f01 00000000ffffffff 00000000ffffffff
[   33.190314] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   33.190394] page dumped because: kasan: bad access detected
[   33.190440] 
[   33.190459] Memory state around the buggy address:
[   33.190493]  fff00000c9c7bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.190535]  fff00000c9c7bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   33.190655] >fff00000c9c7c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.190773]                    ^
[   33.190814]  fff00000c9c7c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.190870]  fff00000c9c7c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.190910] ==================================================================
[   33.170431] ==================================================================
[   33.170490] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.170548] Free of addr fff00000c5a89001 by task kunit_try_catch/273
[   33.170592] 
[   33.170624] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT 
[   33.170711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.171057] Hardware name: linux,dummy-virt (DT)
[   33.171313] Call trace:
[   33.171440]  show_stack+0x20/0x38 (C)
[   33.171496]  dump_stack_lvl+0x8c/0xd0
[   33.171553]  print_report+0x118/0x608
[   33.171622]  kasan_report_invalid_free+0xc0/0xe8
[   33.171867]  check_slab_allocation+0xfc/0x108
[   33.171958]  __kasan_mempool_poison_object+0x78/0x150
[   33.172049]  mempool_free+0x28c/0x328
[   33.172162]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   33.172217]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.172270]  kunit_try_run_case+0x170/0x3f0
[   33.172365]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.172423]  kthread+0x328/0x630
[   33.172466]  ret_from_fork+0x10/0x20
[   33.172517] 
[   33.172535] Allocated by task 273:
[   33.172567]  kasan_save_stack+0x3c/0x68
[   33.172609]  kasan_save_track+0x20/0x40
[   33.172705]  kasan_save_alloc_info+0x40/0x58
[   33.172769]  __kasan_mempool_unpoison_object+0x11c/0x180
[   33.172815]  remove_element+0x130/0x1f8
[   33.172862]  mempool_alloc_preallocated+0x58/0xc0
[   33.172903]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   33.172982]  mempool_kmalloc_invalid_free+0xc0/0x118
[   33.173025]  kunit_try_run_case+0x170/0x3f0
[   33.173065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.173112]  kthread+0x328/0x630
[   33.173145]  ret_from_fork+0x10/0x20
[   33.173199] 
[   33.173241] The buggy address belongs to the object at fff00000c5a89000
[   33.173241]  which belongs to the cache kmalloc-128 of size 128
[   33.173302] The buggy address is located 1 bytes inside of
[   33.173302]  128-byte region [fff00000c5a89000, fff00000c5a89080)
[   33.173418] 
[   33.173480] The buggy address belongs to the physical page:
[   33.173511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a89
[   33.173575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.173624] page_type: f5(slab)
[   33.173697] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   33.173762] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   33.173803] page dumped because: kasan: bad access detected
[   33.173845] 
[   33.173863] Memory state around the buggy address:
[   33.173917]  fff00000c5a88f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.174097]  fff00000c5a88f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.174231] >fff00000c5a89000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.174270]                    ^
[   33.174356]  fff00000c5a89080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.174411]  fff00000c5a89100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.174466] ==================================================================

[   24.927831] ==================================================================
[   24.929267] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.930059] Free of addr ffff88810607c001 by task kunit_try_catch/292
[   24.930413] 
[   24.930631] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   24.930682] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.930695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.930717] Call Trace:
[   24.930738]  <TASK>
[   24.930755]  dump_stack_lvl+0x73/0xb0
[   24.930785]  print_report+0xd1/0x650
[   24.930818]  ? __virt_addr_valid+0x1db/0x2d0
[   24.930844]  ? kasan_addr_to_slab+0x11/0xa0
[   24.930867]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.930893]  kasan_report_invalid_free+0x10a/0x130
[   24.930917]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.930945]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.930970]  __kasan_mempool_poison_object+0x102/0x1d0
[   24.930994]  mempool_free+0x2ec/0x380
[   24.931020]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.931044]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   24.931068]  ? update_load_avg+0x1be/0x21b0
[   24.931094]  ? finish_task_switch.isra.0+0x153/0x700
[   24.931121]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   24.931145]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   24.931228]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.931251]  ? __pfx_mempool_kfree+0x10/0x10
[   24.931274]  ? __pfx_read_tsc+0x10/0x10
[   24.931296]  ? ktime_get_ts64+0x86/0x230
[   24.931320]  kunit_try_run_case+0x1a5/0x480
[   24.931345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.931367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.931390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.931415]  ? __kthread_parkme+0x82/0x180
[   24.931436]  ? preempt_count_sub+0x50/0x80
[   24.931470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.931495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.931518]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.931543]  kthread+0x337/0x6f0
[   24.931562]  ? trace_preempt_on+0x20/0xc0
[   24.931585]  ? __pfx_kthread+0x10/0x10
[   24.931606]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.931629]  ? calculate_sigpending+0x7b/0xa0
[   24.931653]  ? __pfx_kthread+0x10/0x10
[   24.931674]  ret_from_fork+0x116/0x1d0
[   24.931693]  ? __pfx_kthread+0x10/0x10
[   24.931713]  ret_from_fork_asm+0x1a/0x30
[   24.931744]  </TASK>
[   24.931755] 
[   24.940710] The buggy address belongs to the physical page:
[   24.940993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10607c
[   24.941573] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.941953] flags: 0x200000000000040(head|node=0|zone=2)
[   24.942383] page_type: f8(unknown)
[   24.942582] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.942893] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.943120] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.943598] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   24.944121] head: 0200000000000002 ffffea0004181f01 00000000ffffffff 00000000ffffffff
[   24.944354] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   24.944583] page dumped because: kasan: bad access detected
[   24.945117] 
[   24.945288] Memory state around the buggy address:
[   24.945519]  ffff88810607bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.945799]  ffff88810607bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   24.946014] >ffff88810607c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.946350]                    ^
[   24.946551]  ffff88810607c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.946928]  ffff88810607c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.947540] ==================================================================
[   24.887073] ==================================================================
[   24.887495] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.887746] Free of addr ffff888105ab1a01 by task kunit_try_catch/290
[   24.887937] 
[   24.888016] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250703 #1 PREEMPT(voluntary) 
[   24.888064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.888077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.888100] Call Trace:
[   24.888112]  <TASK>
[   24.888127]  dump_stack_lvl+0x73/0xb0
[   24.888156]  print_report+0xd1/0x650
[   24.888179]  ? __virt_addr_valid+0x1db/0x2d0
[   24.888203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.888228]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.888253]  kasan_report_invalid_free+0x10a/0x130
[   24.888276]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.888303]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.888326]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.888349]  check_slab_allocation+0x11f/0x130
[   24.888375]  __kasan_mempool_poison_object+0x91/0x1d0
[   24.888398]  mempool_free+0x2ec/0x380
[   24.888423]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   24.888448]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   24.888851]  ? __pfx_sched_clock_cpu+0x10/0x10
[   24.889082]  ? finish_task_switch.isra.0+0x153/0x700
[   24.889123]  mempool_kmalloc_invalid_free+0xed/0x140
[   24.889193]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   24.889221]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.889243]  ? __pfx_mempool_kfree+0x10/0x10
[   24.889267]  ? __pfx_read_tsc+0x10/0x10
[   24.889289]  ? ktime_get_ts64+0x86/0x230
[   24.889313]  kunit_try_run_case+0x1a5/0x480
[   24.889340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.889365]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.889387]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.889415]  ? __kthread_parkme+0x82/0x180
[   24.889435]  ? preempt_count_sub+0x50/0x80
[   24.889476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.889501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.889526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.889552]  kthread+0x337/0x6f0
[   24.889572]  ? trace_preempt_on+0x20/0xc0
[   24.889597]  ? __pfx_kthread+0x10/0x10
[   24.889617]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.889642]  ? calculate_sigpending+0x7b/0xa0
[   24.889665]  ? __pfx_kthread+0x10/0x10
[   24.889687]  ret_from_fork+0x116/0x1d0
[   24.889707]  ? __pfx_kthread+0x10/0x10
[   24.889728]  ret_from_fork_asm+0x1a/0x30
[   24.889758]  </TASK>
[   24.889769] 
[   24.908364] Allocated by task 290:
[   24.908607]  kasan_save_stack+0x45/0x70
[   24.909024]  kasan_save_track+0x18/0x40
[   24.909476]  kasan_save_alloc_info+0x3b/0x50
[   24.909912]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   24.910077]  remove_element+0x11e/0x190
[   24.910507]  mempool_alloc_preallocated+0x4d/0x90
[   24.911003]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   24.911512]  mempool_kmalloc_invalid_free+0xed/0x140
[   24.911857]  kunit_try_run_case+0x1a5/0x480
[   24.912298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.913010]  kthread+0x337/0x6f0
[   24.913242]  ret_from_fork+0x116/0x1d0
[   24.913672]  ret_from_fork_asm+0x1a/0x30
[   24.913853] 
[   24.913923] The buggy address belongs to the object at ffff888105ab1a00
[   24.913923]  which belongs to the cache kmalloc-128 of size 128
[   24.914356] The buggy address is located 1 bytes inside of
[   24.914356]  128-byte region [ffff888105ab1a00, ffff888105ab1a80)
[   24.915551] 
[   24.915714] The buggy address belongs to the physical page:
[   24.916244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab1
[   24.917032] flags: 0x200000000000000(node=0|zone=2)
[   24.917557] page_type: f5(slab)
[   24.917852] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.918515] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.918733] page dumped because: kasan: bad access detected
[   24.918893] 
[   24.918956] Memory state around the buggy address:
[   24.919100]  ffff888105ab1900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.919689]  ffff888105ab1980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.920438] >ffff888105ab1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.921107]                    ^
[   24.921608]  ffff888105ab1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.922286]  ffff888105ab1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.922841] ==================================================================