Hay
Date
July 15, 2025, 11:35 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   55.803572] ==================================================================
[   55.813740] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.821723] Free of addr ffff0008062cc001 by task kunit_try_catch/324
[   55.828144] 
[   55.829631] CPU: 2 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   55.829686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.829702] Hardware name: WinLink E850-96 board (DT)
[   55.829724] Call trace:
[   55.829738]  show_stack+0x20/0x38 (C)
[   55.829773]  dump_stack_lvl+0x8c/0xd0
[   55.829809]  print_report+0x118/0x5d0
[   55.829843]  kasan_report_invalid_free+0xc0/0xe8
[   55.829873]  __kasan_mempool_poison_object+0xfc/0x150
[   55.829904]  mempool_free+0x28c/0x328
[   55.829939]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.829978]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   55.830016]  kunit_try_run_case+0x170/0x3f0
[   55.830050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.830086]  kthread+0x328/0x630
[   55.830115]  ret_from_fork+0x10/0x20
[   55.830152] 
[   55.905578] The buggy address belongs to the physical page:
[   55.911134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862cc
[   55.919117] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.926757] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.933700] page_type: f8(unknown)
[   55.937096] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.944816] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.952544] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   55.960354] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   55.968167] head: 0bfffe0000000002 fffffdffe018b301 00000000ffffffff 00000000ffffffff
[   55.975979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   55.983787] page dumped because: kasan: bad access detected
[   55.989340] 
[   55.990816] Memory state around the buggy address:
[   55.995596]  ffff0008062cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   56.002799]  ffff0008062cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   56.010004] >ffff0008062cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.017204]                    ^
[   56.020420]  ffff0008062cc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.027625]  ffff0008062cc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   56.034827] ==================================================================
[   55.476400] ==================================================================
[   55.486920] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.494903] Free of addr ffff00080245a301 by task kunit_try_catch/322
[   55.501326] 
[   55.502813] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   55.502872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.502888] Hardware name: WinLink E850-96 board (DT)
[   55.502912] Call trace:
[   55.502924]  show_stack+0x20/0x38 (C)
[   55.502958]  dump_stack_lvl+0x8c/0xd0
[   55.502992]  print_report+0x118/0x5d0
[   55.503023]  kasan_report_invalid_free+0xc0/0xe8
[   55.503052]  check_slab_allocation+0xfc/0x108
[   55.503091]  __kasan_mempool_poison_object+0x78/0x150
[   55.503122]  mempool_free+0x28c/0x328
[   55.503154]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   55.503190]  mempool_kmalloc_invalid_free+0xc0/0x118
[   55.503222]  kunit_try_run_case+0x170/0x3f0
[   55.503253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.503289]  kthread+0x328/0x630
[   55.503319]  ret_from_fork+0x10/0x20
[   55.503353] 
[   55.582577] Allocated by task 322:
[   55.585964]  kasan_save_stack+0x3c/0x68
[   55.589780]  kasan_save_track+0x20/0x40
[   55.593600]  kasan_save_alloc_info+0x40/0x58
[   55.597853]  __kasan_mempool_unpoison_object+0x11c/0x180
[   55.603148]  remove_element+0x130/0x1f8
[   55.606967]  mempool_alloc_preallocated+0x58/0xc0
[   55.611656]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   55.617210]  mempool_kmalloc_invalid_free+0xc0/0x118
[   55.622158]  kunit_try_run_case+0x170/0x3f0
[   55.626325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.631793]  kthread+0x328/0x630
[   55.635005]  ret_from_fork+0x10/0x20
[   55.638564] 
[   55.640042] The buggy address belongs to the object at ffff00080245a300
[   55.640042]  which belongs to the cache kmalloc-128 of size 128
[   55.652542] The buggy address is located 1 bytes inside of
[   55.652542]  128-byte region [ffff00080245a300, ffff00080245a380)
[   55.664084] 
[   55.665565] The buggy address belongs to the physical page:
[   55.671123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88245a
[   55.679104] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   55.686745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   55.693686] page_type: f5(slab)
[   55.696823] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.704542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.712269] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   55.720080] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.727893] head: 0bfffe0000000001 fffffdffe0091681 00000000ffffffff 00000000ffffffff
[   55.735705] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   55.743512] page dumped because: kasan: bad access detected
[   55.749066] 
[   55.750543] Memory state around the buggy address:
[   55.755322]  ffff00080245a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   55.762524]  ffff00080245a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.769729] >ffff00080245a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.776930]                    ^
[   55.780145]  ffff00080245a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.787352]  ffff00080245a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.794553] ==================================================================

[   32.808875] ==================================================================
[   32.808958] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.809034] Free of addr fff00000c64f9101 by task kunit_try_catch/273
[   32.809077] 
[   32.809117] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.809203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.809231] Hardware name: linux,dummy-virt (DT)
[   32.809263] Call trace:
[   32.809287]  show_stack+0x20/0x38 (C)
[   32.809337]  dump_stack_lvl+0x8c/0xd0
[   32.809388]  print_report+0x118/0x5d0
[   32.809433]  kasan_report_invalid_free+0xc0/0xe8
[   32.809541]  check_slab_allocation+0xfc/0x108
[   32.809605]  __kasan_mempool_poison_object+0x78/0x150
[   32.809687]  mempool_free+0x28c/0x328
[   32.809746]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.809810]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.809870]  kunit_try_run_case+0x170/0x3f0
[   32.809921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.809983]  kthread+0x328/0x630
[   32.810027]  ret_from_fork+0x10/0x20
[   32.810078] 
[   32.810096] Allocated by task 273:
[   32.810126]  kasan_save_stack+0x3c/0x68
[   32.810179]  kasan_save_track+0x20/0x40
[   32.810217]  kasan_save_alloc_info+0x40/0x58
[   32.810256]  __kasan_mempool_unpoison_object+0x11c/0x180
[   32.810332]  remove_element+0x130/0x1f8
[   32.810791]  mempool_alloc_preallocated+0x58/0xc0
[   32.811260]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   32.811809]  mempool_kmalloc_invalid_free+0xc0/0x118
[   32.812390]  kunit_try_run_case+0x170/0x3f0
[   32.812520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.812661]  kthread+0x328/0x630
[   32.812696]  ret_from_fork+0x10/0x20
[   32.813007] 
[   32.813091] The buggy address belongs to the object at fff00000c64f9100
[   32.813091]  which belongs to the cache kmalloc-128 of size 128
[   32.813170] The buggy address is located 1 bytes inside of
[   32.813170]  128-byte region [fff00000c64f9100, fff00000c64f9180)
[   32.813229] 
[   32.813250] The buggy address belongs to the physical page:
[   32.813551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9
[   32.813694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   32.813762] page_type: f5(slab)
[   32.813880] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   32.813991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   32.814071] page dumped because: kasan: bad access detected
[   32.814202] 
[   32.814244] Memory state around the buggy address:
[   32.814433]  fff00000c64f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   32.814496]  fff00000c64f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.814539] >fff00000c64f9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.814584]                    ^
[   32.814706]  fff00000c64f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   32.814785]  fff00000c64f9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.814975] ==================================================================
[   32.826277] ==================================================================
[   32.826347] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.826521] Free of addr fff00000c9b2c001 by task kunit_try_catch/275
[   32.826599] 
[   32.826685] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT 
[   32.826773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   32.826866] Hardware name: linux,dummy-virt (DT)
[   32.826945] Call trace:
[   32.827056]  show_stack+0x20/0x38 (C)
[   32.827221]  dump_stack_lvl+0x8c/0xd0
[   32.827329]  print_report+0x118/0x5d0
[   32.827475]  kasan_report_invalid_free+0xc0/0xe8
[   32.827561]  __kasan_mempool_poison_object+0xfc/0x150
[   32.827766]  mempool_free+0x28c/0x328
[   32.828025]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   32.828106]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   32.828302]  kunit_try_run_case+0x170/0x3f0
[   32.828394]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   32.828544]  kthread+0x328/0x630
[   32.828691]  ret_from_fork+0x10/0x20
[   32.828796] 
[   32.828905] The buggy address belongs to the physical page:
[   32.829045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c
[   32.829137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   32.829226] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   32.829316] page_type: f8(unknown)
[   32.829419] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.829481] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.829565] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   32.829732] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   32.829831] head: 0bfffe0000000002 ffffc1ffc326cb01 00000000ffffffff 00000000ffffffff
[   32.829920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   32.830016] page dumped because: kasan: bad access detected
[   32.830074] 
[   32.830136] Memory state around the buggy address:
[   32.830174]  fff00000c9b2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.830250]  fff00000c9b2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   32.830549] >fff00000c9b2c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.830693]                    ^
[   32.830770]  fff00000c9b2c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.830877]  fff00000c9b2c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   32.830951] ==================================================================

[   25.821394] ==================================================================
[   25.822048] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.822361] Free of addr ffff888106228001 by task kunit_try_catch/291
[   25.822730] 
[   25.822899] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   25.823015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.823032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.823058] Call Trace:
[   25.823074]  <TASK>
[   25.823096]  dump_stack_lvl+0x73/0xb0
[   25.823134]  print_report+0xd1/0x610
[   25.823187]  ? __virt_addr_valid+0x1db/0x2d0
[   25.823219]  ? kasan_addr_to_slab+0x11/0xa0
[   25.823245]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.823277]  kasan_report_invalid_free+0x10a/0x130
[   25.823307]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.823341]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.823371]  __kasan_mempool_poison_object+0x102/0x1d0
[   25.823401]  mempool_free+0x2ec/0x380
[   25.823434]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.823465]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   25.823496]  ? dequeue_entities+0x23f/0x1630
[   25.823555]  ? __kasan_check_write+0x18/0x20
[   25.823631]  ? __pfx_sched_clock_cpu+0x10/0x10
[   25.823659]  ? finish_task_switch.isra.0+0x153/0x700
[   25.823695]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   25.823738]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   25.823772]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.823800]  ? __pfx_mempool_kfree+0x10/0x10
[   25.823831]  ? __pfx_read_tsc+0x10/0x10
[   25.823858]  ? ktime_get_ts64+0x86/0x230
[   25.823889]  kunit_try_run_case+0x1a5/0x480
[   25.823919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.823946]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.823975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.824003]  ? __kthread_parkme+0x82/0x180
[   25.824030]  ? preempt_count_sub+0x50/0x80
[   25.824058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.824086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.824118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.824149]  kthread+0x337/0x6f0
[   25.824175]  ? trace_preempt_on+0x20/0xc0
[   25.824204]  ? __pfx_kthread+0x10/0x10
[   25.824230]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.824259]  ? calculate_sigpending+0x7b/0xa0
[   25.824289]  ? __pfx_kthread+0x10/0x10
[   25.824317]  ret_from_fork+0x116/0x1d0
[   25.824341]  ? __pfx_kthread+0x10/0x10
[   25.824367]  ret_from_fork_asm+0x1a/0x30
[   25.824409]  </TASK>
[   25.824422] 
[   25.834342] The buggy address belongs to the physical page:
[   25.834619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106228
[   25.834985] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.835330] flags: 0x200000000000040(head|node=0|zone=2)
[   25.835540] page_type: f8(unknown)
[   25.835674] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.836250] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.836587] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.836820] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   25.837518] head: 0200000000000002 ffffea0004188a01 00000000ffffffff 00000000ffffffff
[   25.838072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   25.838696] page dumped because: kasan: bad access detected
[   25.838936] 
[   25.839032] Memory state around the buggy address:
[   25.839251]  ffff888106227f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.839562]  ffff888106227f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.839913] >ffff888106228000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.840165]                    ^
[   25.840334]  ffff888106228080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.840710]  ffff888106228100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.841106] ==================================================================
[   25.788746] ==================================================================
[   25.789371] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.789918] Free of addr ffff888105922501 by task kunit_try_catch/289
[   25.790312] 
[   25.790780] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) 
[   25.790844] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.790860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.790887] Call Trace:
[   25.790903]  <TASK>
[   25.790925]  dump_stack_lvl+0x73/0xb0
[   25.790962]  print_report+0xd1/0x610
[   25.790992]  ? __virt_addr_valid+0x1db/0x2d0
[   25.791025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.791056]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.791087]  kasan_report_invalid_free+0x10a/0x130
[   25.791118]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.791151]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.791181]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.791210]  check_slab_allocation+0x11f/0x130
[   25.791238]  __kasan_mempool_poison_object+0x91/0x1d0
[   25.791268]  mempool_free+0x2ec/0x380
[   25.791301]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   25.791332]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   25.791364]  ? kasan_save_track+0x18/0x40
[   25.791387]  ? kasan_save_alloc_info+0x3b/0x50
[   25.791416]  ? kasan_save_stack+0x45/0x70
[   25.791442]  ? mempool_alloc_preallocated+0x5b/0x90
[   25.791475]  mempool_kmalloc_invalid_free+0xed/0x140
[   25.791503]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   25.791550]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.791627]  ? __pfx_mempool_kfree+0x10/0x10
[   25.791660]  ? __pfx_read_tsc+0x10/0x10
[   25.791688]  ? ktime_get_ts64+0x86/0x230
[   25.791719]  kunit_try_run_case+0x1a5/0x480
[   25.791752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.791780]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.791809]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.791838]  ? __kthread_parkme+0x82/0x180
[   25.791864]  ? preempt_count_sub+0x50/0x80
[   25.791895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.791924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.791956]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.791988]  kthread+0x337/0x6f0
[   25.792013]  ? trace_preempt_on+0x20/0xc0
[   25.792042]  ? __pfx_kthread+0x10/0x10
[   25.792068]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.792098]  ? calculate_sigpending+0x7b/0xa0
[   25.792128]  ? __pfx_kthread+0x10/0x10
[   25.792155]  ret_from_fork+0x116/0x1d0
[   25.792180]  ? __pfx_kthread+0x10/0x10
[   25.792205]  ret_from_fork_asm+0x1a/0x30
[   25.792246]  </TASK>
[   25.792259] 
[   25.805635] Allocated by task 289:
[   25.806043]  kasan_save_stack+0x45/0x70
[   25.806254]  kasan_save_track+0x18/0x40
[   25.806454]  kasan_save_alloc_info+0x3b/0x50
[   25.806926]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.807143]  remove_element+0x11e/0x190
[   25.807454]  mempool_alloc_preallocated+0x4d/0x90
[   25.807893]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   25.808260]  mempool_kmalloc_invalid_free+0xed/0x140
[   25.808627]  kunit_try_run_case+0x1a5/0x480
[   25.808963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.809313]  kthread+0x337/0x6f0
[   25.809450]  ret_from_fork+0x116/0x1d0
[   25.809929]  ret_from_fork_asm+0x1a/0x30
[   25.810092] 
[   25.810190] The buggy address belongs to the object at ffff888105922500
[   25.810190]  which belongs to the cache kmalloc-128 of size 128
[   25.810764] The buggy address is located 1 bytes inside of
[   25.810764]  128-byte region [ffff888105922500, ffff888105922580)
[   25.811831] 
[   25.811949] The buggy address belongs to the physical page:
[   25.812291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922
[   25.812775] flags: 0x200000000000000(node=0|zone=2)
[   25.813096] page_type: f5(slab)
[   25.813225] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.813798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.814121] page dumped because: kasan: bad access detected
[   25.814353] 
[   25.814431] Memory state around the buggy address:
[   25.814649]  ffff888105922400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.815276]  ffff888105922480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.815617] >ffff888105922500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.816398]                    ^
[   25.816572]  ffff888105922580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.817174]  ffff888105922600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.817751] ==================================================================