Date
July 15, 2025, 11:35 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 55.803572] ================================================================== [ 55.813740] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.821723] Free of addr ffff0008062cc001 by task kunit_try_catch/324 [ 55.828144] [ 55.829631] CPU: 2 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 55.829686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.829702] Hardware name: WinLink E850-96 board (DT) [ 55.829724] Call trace: [ 55.829738] show_stack+0x20/0x38 (C) [ 55.829773] dump_stack_lvl+0x8c/0xd0 [ 55.829809] print_report+0x118/0x5d0 [ 55.829843] kasan_report_invalid_free+0xc0/0xe8 [ 55.829873] __kasan_mempool_poison_object+0xfc/0x150 [ 55.829904] mempool_free+0x28c/0x328 [ 55.829939] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.829978] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 55.830016] kunit_try_run_case+0x170/0x3f0 [ 55.830050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.830086] kthread+0x328/0x630 [ 55.830115] ret_from_fork+0x10/0x20 [ 55.830152] [ 55.905578] The buggy address belongs to the physical page: [ 55.911134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862cc [ 55.919117] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.926757] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 55.933700] page_type: f8(unknown) [ 55.937096] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 55.944816] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 55.952544] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 55.960354] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 55.968167] head: 0bfffe0000000002 fffffdffe018b301 00000000ffffffff 00000000ffffffff [ 55.975979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 55.983787] page dumped because: kasan: bad access detected [ 55.989340] [ 55.990816] Memory state around the buggy address: [ 55.995596] ffff0008062cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.002799] ffff0008062cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.010004] >ffff0008062cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.017204] ^ [ 56.020420] ffff0008062cc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.027625] ffff0008062cc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.034827] ================================================================== [ 55.476400] ================================================================== [ 55.486920] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.494903] Free of addr ffff00080245a301 by task kunit_try_catch/322 [ 55.501326] [ 55.502813] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 55.502872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.502888] Hardware name: WinLink E850-96 board (DT) [ 55.502912] Call trace: [ 55.502924] show_stack+0x20/0x38 (C) [ 55.502958] dump_stack_lvl+0x8c/0xd0 [ 55.502992] print_report+0x118/0x5d0 [ 55.503023] kasan_report_invalid_free+0xc0/0xe8 [ 55.503052] check_slab_allocation+0xfc/0x108 [ 55.503091] __kasan_mempool_poison_object+0x78/0x150 [ 55.503122] mempool_free+0x28c/0x328 [ 55.503154] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.503190] mempool_kmalloc_invalid_free+0xc0/0x118 [ 55.503222] kunit_try_run_case+0x170/0x3f0 [ 55.503253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.503289] kthread+0x328/0x630 [ 55.503319] ret_from_fork+0x10/0x20 [ 55.503353] [ 55.582577] Allocated by task 322: [ 55.585964] kasan_save_stack+0x3c/0x68 [ 55.589780] kasan_save_track+0x20/0x40 [ 55.593600] kasan_save_alloc_info+0x40/0x58 [ 55.597853] __kasan_mempool_unpoison_object+0x11c/0x180 [ 55.603148] remove_element+0x130/0x1f8 [ 55.606967] mempool_alloc_preallocated+0x58/0xc0 [ 55.611656] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 55.617210] mempool_kmalloc_invalid_free+0xc0/0x118 [ 55.622158] kunit_try_run_case+0x170/0x3f0 [ 55.626325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.631793] kthread+0x328/0x630 [ 55.635005] ret_from_fork+0x10/0x20 [ 55.638564] [ 55.640042] The buggy address belongs to the object at ffff00080245a300 [ 55.640042] which belongs to the cache kmalloc-128 of size 128 [ 55.652542] The buggy address is located 1 bytes inside of [ 55.652542] 128-byte region [ffff00080245a300, ffff00080245a380) [ 55.664084] [ 55.665565] The buggy address belongs to the physical page: [ 55.671123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88245a [ 55.679104] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.686745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 55.693686] page_type: f5(slab) [ 55.696823] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.704542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.712269] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.720080] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.727893] head: 0bfffe0000000001 fffffdffe0091681 00000000ffffffff 00000000ffffffff [ 55.735705] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 55.743512] page dumped because: kasan: bad access detected [ 55.749066] [ 55.750543] Memory state around the buggy address: [ 55.755322] ffff00080245a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.762524] ffff00080245a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.769729] >ffff00080245a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.776930] ^ [ 55.780145] ffff00080245a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.787352] ffff00080245a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.794553] ==================================================================
[ 32.808875] ================================================================== [ 32.808958] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.809034] Free of addr fff00000c64f9101 by task kunit_try_catch/273 [ 32.809077] [ 32.809117] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.809203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.809231] Hardware name: linux,dummy-virt (DT) [ 32.809263] Call trace: [ 32.809287] show_stack+0x20/0x38 (C) [ 32.809337] dump_stack_lvl+0x8c/0xd0 [ 32.809388] print_report+0x118/0x5d0 [ 32.809433] kasan_report_invalid_free+0xc0/0xe8 [ 32.809541] check_slab_allocation+0xfc/0x108 [ 32.809605] __kasan_mempool_poison_object+0x78/0x150 [ 32.809687] mempool_free+0x28c/0x328 [ 32.809746] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.809810] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.809870] kunit_try_run_case+0x170/0x3f0 [ 32.809921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.809983] kthread+0x328/0x630 [ 32.810027] ret_from_fork+0x10/0x20 [ 32.810078] [ 32.810096] Allocated by task 273: [ 32.810126] kasan_save_stack+0x3c/0x68 [ 32.810179] kasan_save_track+0x20/0x40 [ 32.810217] kasan_save_alloc_info+0x40/0x58 [ 32.810256] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.810332] remove_element+0x130/0x1f8 [ 32.810791] mempool_alloc_preallocated+0x58/0xc0 [ 32.811260] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 32.811809] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.812390] kunit_try_run_case+0x170/0x3f0 [ 32.812520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.812661] kthread+0x328/0x630 [ 32.812696] ret_from_fork+0x10/0x20 [ 32.813007] [ 32.813091] The buggy address belongs to the object at fff00000c64f9100 [ 32.813091] which belongs to the cache kmalloc-128 of size 128 [ 32.813170] The buggy address is located 1 bytes inside of [ 32.813170] 128-byte region [fff00000c64f9100, fff00000c64f9180) [ 32.813229] [ 32.813250] The buggy address belongs to the physical page: [ 32.813551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 32.813694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.813762] page_type: f5(slab) [ 32.813880] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.813991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.814071] page dumped because: kasan: bad access detected [ 32.814202] [ 32.814244] Memory state around the buggy address: [ 32.814433] fff00000c64f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.814496] fff00000c64f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.814539] >fff00000c64f9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.814584] ^ [ 32.814706] fff00000c64f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.814785] fff00000c64f9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.814975] ================================================================== [ 32.826277] ================================================================== [ 32.826347] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.826521] Free of addr fff00000c9b2c001 by task kunit_try_catch/275 [ 32.826599] [ 32.826685] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.826773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.826866] Hardware name: linux,dummy-virt (DT) [ 32.826945] Call trace: [ 32.827056] show_stack+0x20/0x38 (C) [ 32.827221] dump_stack_lvl+0x8c/0xd0 [ 32.827329] print_report+0x118/0x5d0 [ 32.827475] kasan_report_invalid_free+0xc0/0xe8 [ 32.827561] __kasan_mempool_poison_object+0xfc/0x150 [ 32.827766] mempool_free+0x28c/0x328 [ 32.828025] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.828106] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 32.828302] kunit_try_run_case+0x170/0x3f0 [ 32.828394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.828544] kthread+0x328/0x630 [ 32.828691] ret_from_fork+0x10/0x20 [ 32.828796] [ 32.828905] The buggy address belongs to the physical page: [ 32.829045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c [ 32.829137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.829226] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.829316] page_type: f8(unknown) [ 32.829419] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.829481] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.829565] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.829732] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.829831] head: 0bfffe0000000002 ffffc1ffc326cb01 00000000ffffffff 00000000ffffffff [ 32.829920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.830016] page dumped because: kasan: bad access detected [ 32.830074] [ 32.830136] Memory state around the buggy address: [ 32.830174] fff00000c9b2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.830250] fff00000c9b2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.830549] >fff00000c9b2c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.830693] ^ [ 32.830770] fff00000c9b2c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.830877] fff00000c9b2c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.830951] ==================================================================
[ 25.821394] ================================================================== [ 25.822048] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.822361] Free of addr ffff888106228001 by task kunit_try_catch/291 [ 25.822730] [ 25.822899] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 25.823015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.823032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.823058] Call Trace: [ 25.823074] <TASK> [ 25.823096] dump_stack_lvl+0x73/0xb0 [ 25.823134] print_report+0xd1/0x610 [ 25.823187] ? __virt_addr_valid+0x1db/0x2d0 [ 25.823219] ? kasan_addr_to_slab+0x11/0xa0 [ 25.823245] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.823277] kasan_report_invalid_free+0x10a/0x130 [ 25.823307] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.823341] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.823371] __kasan_mempool_poison_object+0x102/0x1d0 [ 25.823401] mempool_free+0x2ec/0x380 [ 25.823434] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.823465] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 25.823496] ? dequeue_entities+0x23f/0x1630 [ 25.823555] ? __kasan_check_write+0x18/0x20 [ 25.823631] ? __pfx_sched_clock_cpu+0x10/0x10 [ 25.823659] ? finish_task_switch.isra.0+0x153/0x700 [ 25.823695] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 25.823738] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 25.823772] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.823800] ? __pfx_mempool_kfree+0x10/0x10 [ 25.823831] ? __pfx_read_tsc+0x10/0x10 [ 25.823858] ? ktime_get_ts64+0x86/0x230 [ 25.823889] kunit_try_run_case+0x1a5/0x480 [ 25.823919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.823946] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.823975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.824003] ? __kthread_parkme+0x82/0x180 [ 25.824030] ? preempt_count_sub+0x50/0x80 [ 25.824058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.824086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.824118] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.824149] kthread+0x337/0x6f0 [ 25.824175] ? trace_preempt_on+0x20/0xc0 [ 25.824204] ? __pfx_kthread+0x10/0x10 [ 25.824230] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.824259] ? calculate_sigpending+0x7b/0xa0 [ 25.824289] ? __pfx_kthread+0x10/0x10 [ 25.824317] ret_from_fork+0x116/0x1d0 [ 25.824341] ? __pfx_kthread+0x10/0x10 [ 25.824367] ret_from_fork_asm+0x1a/0x30 [ 25.824409] </TASK> [ 25.824422] [ 25.834342] The buggy address belongs to the physical page: [ 25.834619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106228 [ 25.834985] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 25.835330] flags: 0x200000000000040(head|node=0|zone=2) [ 25.835540] page_type: f8(unknown) [ 25.835674] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.836250] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.836587] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 25.836820] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 25.837518] head: 0200000000000002 ffffea0004188a01 00000000ffffffff 00000000ffffffff [ 25.838072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 25.838696] page dumped because: kasan: bad access detected [ 25.838936] [ 25.839032] Memory state around the buggy address: [ 25.839251] ffff888106227f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.839562] ffff888106227f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 25.839913] >ffff888106228000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.840165] ^ [ 25.840334] ffff888106228080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.840710] ffff888106228100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.841106] ================================================================== [ 25.788746] ================================================================== [ 25.789371] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.789918] Free of addr ffff888105922501 by task kunit_try_catch/289 [ 25.790312] [ 25.790780] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT(voluntary) [ 25.790844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.790860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.790887] Call Trace: [ 25.790903] <TASK> [ 25.790925] dump_stack_lvl+0x73/0xb0 [ 25.790962] print_report+0xd1/0x610 [ 25.790992] ? __virt_addr_valid+0x1db/0x2d0 [ 25.791025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.791056] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.791087] kasan_report_invalid_free+0x10a/0x130 [ 25.791118] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.791151] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.791181] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.791210] check_slab_allocation+0x11f/0x130 [ 25.791238] __kasan_mempool_poison_object+0x91/0x1d0 [ 25.791268] mempool_free+0x2ec/0x380 [ 25.791301] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 25.791332] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 25.791364] ? kasan_save_track+0x18/0x40 [ 25.791387] ? kasan_save_alloc_info+0x3b/0x50 [ 25.791416] ? kasan_save_stack+0x45/0x70 [ 25.791442] ? mempool_alloc_preallocated+0x5b/0x90 [ 25.791475] mempool_kmalloc_invalid_free+0xed/0x140 [ 25.791503] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 25.791550] ? __pfx_mempool_kmalloc+0x10/0x10 [ 25.791627] ? __pfx_mempool_kfree+0x10/0x10 [ 25.791660] ? __pfx_read_tsc+0x10/0x10 [ 25.791688] ? ktime_get_ts64+0x86/0x230 [ 25.791719] kunit_try_run_case+0x1a5/0x480 [ 25.791752] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.791780] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.791809] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.791838] ? __kthread_parkme+0x82/0x180 [ 25.791864] ? preempt_count_sub+0x50/0x80 [ 25.791895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.791924] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.791956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.791988] kthread+0x337/0x6f0 [ 25.792013] ? trace_preempt_on+0x20/0xc0 [ 25.792042] ? __pfx_kthread+0x10/0x10 [ 25.792068] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.792098] ? calculate_sigpending+0x7b/0xa0 [ 25.792128] ? __pfx_kthread+0x10/0x10 [ 25.792155] ret_from_fork+0x116/0x1d0 [ 25.792180] ? __pfx_kthread+0x10/0x10 [ 25.792205] ret_from_fork_asm+0x1a/0x30 [ 25.792246] </TASK> [ 25.792259] [ 25.805635] Allocated by task 289: [ 25.806043] kasan_save_stack+0x45/0x70 [ 25.806254] kasan_save_track+0x18/0x40 [ 25.806454] kasan_save_alloc_info+0x3b/0x50 [ 25.806926] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 25.807143] remove_element+0x11e/0x190 [ 25.807454] mempool_alloc_preallocated+0x4d/0x90 [ 25.807893] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 25.808260] mempool_kmalloc_invalid_free+0xed/0x140 [ 25.808627] kunit_try_run_case+0x1a5/0x480 [ 25.808963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.809313] kthread+0x337/0x6f0 [ 25.809450] ret_from_fork+0x116/0x1d0 [ 25.809929] ret_from_fork_asm+0x1a/0x30 [ 25.810092] [ 25.810190] The buggy address belongs to the object at ffff888105922500 [ 25.810190] which belongs to the cache kmalloc-128 of size 128 [ 25.810764] The buggy address is located 1 bytes inside of [ 25.810764] 128-byte region [ffff888105922500, ffff888105922580) [ 25.811831] [ 25.811949] The buggy address belongs to the physical page: [ 25.812291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105922 [ 25.812775] flags: 0x200000000000000(node=0|zone=2) [ 25.813096] page_type: f5(slab) [ 25.813225] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 25.813798] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 25.814121] page dumped because: kasan: bad access detected [ 25.814353] [ 25.814431] Memory state around the buggy address: [ 25.814649] ffff888105922400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 25.815276] ffff888105922480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.815617] >ffff888105922500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.816398] ^ [ 25.816572] ffff888105922580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.817174] ffff888105922600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 25.817751] ==================================================================