Hay
Date
July 4, 2025, 3:11 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64

[   36.662016] ==================================================================
[   36.672154] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.680137] Free of addr ffff000803260001 by task kunit_try_catch/292
[   36.686560] 
[   36.688048] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   36.688105] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.688120] Hardware name: WinLink E850-96 board (DT)
[   36.688141] Call trace:
[   36.688153]  show_stack+0x20/0x38 (C)
[   36.688189]  dump_stack_lvl+0x8c/0xd0
[   36.688229]  print_report+0x118/0x608
[   36.688257]  kasan_report_invalid_free+0xc0/0xe8
[   36.688291]  __kasan_mempool_poison_object+0xfc/0x150
[   36.688327]  mempool_free+0x28c/0x328
[   36.688361]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.688398]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   36.688435]  kunit_try_run_case+0x170/0x3f0
[   36.688471]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.688511]  kthread+0x328/0x630
[   36.688544]  ret_from_fork+0x10/0x20
[   36.688580] 
[   36.762779] The buggy address belongs to the physical page:
[   36.768334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260
[   36.776319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.783957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.790900] page_type: f8(unknown)
[   36.794302] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.802016] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.809742] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.817554] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   36.825367] head: 0bfffe0000000002 fffffdffe00c9801 00000000ffffffff 00000000ffffffff
[   36.833179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.840986] page dumped because: kasan: bad access detected
[   36.846540] 
[   36.848016] Memory state around the buggy address:
[   36.852796]  ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.860001]  ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.867208] >ffff000803260000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.874405]                    ^
[   36.877620]  ffff000803260080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.884825]  ffff000803260100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.892027] ==================================================================
[   36.336045] ==================================================================
[   36.346554] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.354535] Free of addr ffff000802678a01 by task kunit_try_catch/290
[   36.360959] 
[   36.362445] CPU: 7 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   36.362500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.362516] Hardware name: WinLink E850-96 board (DT)
[   36.362537] Call trace:
[   36.362550]  show_stack+0x20/0x38 (C)
[   36.362586]  dump_stack_lvl+0x8c/0xd0
[   36.362624]  print_report+0x118/0x608
[   36.362656]  kasan_report_invalid_free+0xc0/0xe8
[   36.362689]  check_slab_allocation+0xfc/0x108
[   36.362720]  __kasan_mempool_poison_object+0x78/0x150
[   36.362753]  mempool_free+0x28c/0x328
[   36.362790]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.362828]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.362864]  kunit_try_run_case+0x170/0x3f0
[   36.362901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.362941]  kthread+0x328/0x630
[   36.362975]  ret_from_fork+0x10/0x20
[   36.363009] 
[   36.440991] Allocated by task 290:
[   36.444380]  kasan_save_stack+0x3c/0x68
[   36.448195]  kasan_save_track+0x20/0x40
[   36.452015]  kasan_save_alloc_info+0x40/0x58
[   36.456268]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.461565]  remove_element+0x130/0x1f8
[   36.465383]  mempool_alloc_preallocated+0x58/0xc0
[   36.470070]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   36.475626]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.480573]  kunit_try_run_case+0x170/0x3f0
[   36.484741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.490209]  kthread+0x328/0x630
[   36.493420]  ret_from_fork+0x10/0x20
[   36.496980] 
[   36.498457] The buggy address belongs to the object at ffff000802678a00
[   36.498457]  which belongs to the cache kmalloc-128 of size 128
[   36.510958] The buggy address is located 1 bytes inside of
[   36.510958]  128-byte region [ffff000802678a00, ffff000802678a80)
[   36.522500] 
[   36.523978] The buggy address belongs to the physical page:
[   36.529535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678
[   36.537519] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   36.545158] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.552101] page_type: f5(slab)
[   36.555238] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.562958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.570684] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000
[   36.578495] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.586308] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff
[   36.594120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   36.601927] page dumped because: kasan: bad access detected
[   36.607481] 
[   36.608957] Memory state around the buggy address:
[   36.613741]  ffff000802678900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   36.620942]  ffff000802678980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.628146] >ffff000802678a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.635346]                    ^
[   36.638561]  ffff000802678a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.645766]  ffff000802678b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.652968] ==================================================================

[   17.718156] ==================================================================
[   17.718323] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   17.718502] Free of addr fff00000c793a001 by task kunit_try_catch/246
[   17.718556] 
[   17.718938] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.719279] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.719323] Hardware name: linux,dummy-virt (DT)
[   17.719641] Call trace:
[   17.719682]  show_stack+0x20/0x38 (C)
[   17.720059]  dump_stack_lvl+0x8c/0xd0
[   17.720247]  print_report+0x118/0x608
[   17.720834]  kasan_report_invalid_free+0xc0/0xe8
[   17.720909]  check_slab_allocation+0xfc/0x108
[   17.720959]  __kasan_mempool_poison_object+0x78/0x150
[   17.721204]  mempool_free+0x28c/0x328
[   17.721321]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   17.721435]  mempool_kmalloc_invalid_free+0xc0/0x118
[   17.721488]  kunit_try_run_case+0x170/0x3f0
[   17.721536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.721605]  kthread+0x328/0x630
[   17.721665]  ret_from_fork+0x10/0x20
[   17.721720] 
[   17.721739] Allocated by task 246:
[   17.721769]  kasan_save_stack+0x3c/0x68
[   17.721806]  kasan_save_track+0x20/0x40
[   17.721851]  kasan_save_alloc_info+0x40/0x58
[   17.721890]  __kasan_mempool_unpoison_object+0x11c/0x180
[   17.721930]  remove_element+0x130/0x1f8
[   17.721970]  mempool_alloc_preallocated+0x58/0xc0
[   17.722019]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   17.722061]  mempool_kmalloc_invalid_free+0xc0/0x118
[   17.722103]  kunit_try_run_case+0x170/0x3f0
[   17.722151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.722194]  kthread+0x328/0x630
[   17.722229]  ret_from_fork+0x10/0x20
[   17.722262] 
[   17.722280] The buggy address belongs to the object at fff00000c793a000
[   17.722280]  which belongs to the cache kmalloc-128 of size 128
[   17.722348] The buggy address is located 1 bytes inside of
[   17.722348]  128-byte region [fff00000c793a000, fff00000c793a080)
[   17.722406] 
[   17.722427] The buggy address belongs to the physical page:
[   17.722455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a
[   17.722517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.722563] page_type: f5(slab)
[   17.722611] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.723218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.723290] page dumped because: kasan: bad access detected
[   17.723334] 
[   17.723388] Memory state around the buggy address:
[   17.723442]  fff00000c7939f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.723499]  fff00000c7939f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.724035] >fff00000c793a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.724115]                    ^
[   17.724253]  fff00000c793a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.724298]  fff00000c793a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.724348] ==================================================================
[   17.734882] ==================================================================
[   17.735030] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   17.735091] Free of addr fff00000c7968001 by task kunit_try_catch/248
[   17.735134] 
[   17.735166] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT 
[   17.735281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.735309] Hardware name: linux,dummy-virt (DT)
[   17.735339] Call trace:
[   17.735360]  show_stack+0x20/0x38 (C)
[   17.735410]  dump_stack_lvl+0x8c/0xd0
[   17.735454]  print_report+0x118/0x608
[   17.735499]  kasan_report_invalid_free+0xc0/0xe8
[   17.735544]  __kasan_mempool_poison_object+0xfc/0x150
[   17.735604]  mempool_free+0x28c/0x328
[   17.735659]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   17.735726]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   17.735780]  kunit_try_run_case+0x170/0x3f0
[   17.735826]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.735878]  kthread+0x328/0x630
[   17.735922]  ret_from_fork+0x10/0x20
[   17.736427] 
[   17.736664] The buggy address belongs to the physical page:
[   17.736838] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107968
[   17.736978] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.737164] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.737372] page_type: f8(unknown)
[   17.737471] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.737565] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.737712] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.737818] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.738307] head: 0bfffe0000000002 ffffc1ffc31e5a01 00000000ffffffff 00000000ffffffff
[   17.738516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.738660] page dumped because: kasan: bad access detected
[   17.738757] 
[   17.738776] Memory state around the buggy address:
[   17.738810]  fff00000c7967f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.738896]  fff00000c7967f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.739088] >fff00000c7968000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.739232]                    ^
[   17.739300]  fff00000c7968080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.739616]  fff00000c7968100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.739779] ==================================================================

[   16.487884] ==================================================================
[   16.488731] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.490234] Free of addr ffff888103ab4001 by task kunit_try_catch/264
[   16.490625] 
[   16.490972] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   16.491091] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.491163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.491194] Call Trace:
[   16.491227]  <TASK>
[   16.491301]  dump_stack_lvl+0x73/0xb0
[   16.491381]  print_report+0xd1/0x650
[   16.491423]  ? __virt_addr_valid+0x1db/0x2d0
[   16.491453]  ? kasan_addr_to_slab+0x11/0xa0
[   16.491475]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.491503]  kasan_report_invalid_free+0x10a/0x130
[   16.491530]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.491561]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.491587]  __kasan_mempool_poison_object+0x102/0x1d0
[   16.491612]  mempool_free+0x2ec/0x380
[   16.491641]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.491668]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   16.491694]  ? dequeue_entities+0x852/0x1740
[   16.491722]  ? finish_task_switch.isra.0+0x153/0x700
[   16.491750]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   16.491777]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   16.491803]  ? dequeue_task_fair+0x166/0x4e0
[   16.491826]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.491847]  ? __pfx_mempool_kfree+0x10/0x10
[   16.491871]  ? __pfx_read_tsc+0x10/0x10
[   16.491892]  ? ktime_get_ts64+0x86/0x230
[   16.491920]  kunit_try_run_case+0x1a5/0x480
[   16.491948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.491971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.491997]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.492022]  ? __kthread_parkme+0x82/0x180
[   16.492046]  ? preempt_count_sub+0x50/0x80
[   16.492090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.492116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.492141]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.492166]  kthread+0x337/0x6f0
[   16.492185]  ? trace_preempt_on+0x20/0xc0
[   16.492240]  ? __pfx_kthread+0x10/0x10
[   16.492291]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.492324]  ? calculate_sigpending+0x7b/0xa0
[   16.492370]  ? __pfx_kthread+0x10/0x10
[   16.492393]  ret_from_fork+0x41/0x80
[   16.492416]  ? __pfx_kthread+0x10/0x10
[   16.492437]  ret_from_fork_asm+0x1a/0x30
[   16.492472]  </TASK>
[   16.492486] 
[   16.508790] The buggy address belongs to the physical page:
[   16.509086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab4
[   16.509757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.510426] flags: 0x200000000000040(head|node=0|zone=2)
[   16.510867] page_type: f8(unknown)
[   16.511122] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.511855] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.512362] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   16.512782] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.513609] head: 0200000000000002 ffffea00040ead01 00000000ffffffff 00000000ffffffff
[   16.514367] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.515026] page dumped because: kasan: bad access detected
[   16.515493] 
[   16.515671] Memory state around the buggy address:
[   16.515947]  ffff888103ab3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.516266]  ffff888103ab3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.517153] >ffff888103ab4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.517947]                    ^
[   16.518582]  ffff888103ab4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.519137]  ffff888103ab4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.519592] ==================================================================
[   16.445568] ==================================================================
[   16.446114] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.446830] Free of addr ffff8881025fa801 by task kunit_try_catch/262
[   16.447305] 
[   16.447563] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G    B            N  6.15.5-rc2 #1 PREEMPT(voluntary) 
[   16.447671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.447697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.447739] Call Trace:
[   16.447769]  <TASK>
[   16.447812]  dump_stack_lvl+0x73/0xb0
[   16.447879]  print_report+0xd1/0x650
[   16.447926]  ? __virt_addr_valid+0x1db/0x2d0
[   16.447978]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.448024]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.448224]  kasan_report_invalid_free+0x10a/0x130
[   16.448300]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.448381]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.448434]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.448476]  check_slab_allocation+0x11f/0x130
[   16.448547]  __kasan_mempool_poison_object+0x91/0x1d0
[   16.448597]  mempool_free+0x2ec/0x380
[   16.448646]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   16.448698]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   16.448751]  ? dequeue_entities+0x852/0x1740
[   16.448787]  ? finish_task_switch.isra.0+0x153/0x700
[   16.448820]  mempool_kmalloc_invalid_free+0xed/0x140
[   16.448848]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   16.448876]  ? dequeue_task_fair+0x166/0x4e0
[   16.448900]  ? __pfx_mempool_kmalloc+0x10/0x10
[   16.448922]  ? __pfx_mempool_kfree+0x10/0x10
[   16.448945]  ? __pfx_read_tsc+0x10/0x10
[   16.448969]  ? ktime_get_ts64+0x86/0x230
[   16.448999]  kunit_try_run_case+0x1a5/0x480
[   16.449046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.449107]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.449186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.449249]  ? __kthread_parkme+0x82/0x180
[   16.449285]  ? preempt_count_sub+0x50/0x80
[   16.449315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.449363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.449393]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.449419]  kthread+0x337/0x6f0
[   16.449440]  ? trace_preempt_on+0x20/0xc0
[   16.449468]  ? __pfx_kthread+0x10/0x10
[   16.449489]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.449514]  ? calculate_sigpending+0x7b/0xa0
[   16.449540]  ? __pfx_kthread+0x10/0x10
[   16.449562]  ret_from_fork+0x41/0x80
[   16.449586]  ? __pfx_kthread+0x10/0x10
[   16.449606]  ret_from_fork_asm+0x1a/0x30
[   16.449645]  </TASK>
[   16.449659] 
[   16.465475] Allocated by task 262:
[   16.465679]  kasan_save_stack+0x45/0x70
[   16.465914]  kasan_save_track+0x18/0x40
[   16.466389]  kasan_save_alloc_info+0x3b/0x50
[   16.466882]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   16.467478]  remove_element+0x11e/0x190
[   16.467749]  mempool_alloc_preallocated+0x4d/0x90
[   16.468222]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   16.468597]  mempool_kmalloc_invalid_free+0xed/0x140
[   16.469138]  kunit_try_run_case+0x1a5/0x480
[   16.469652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.469951]  kthread+0x337/0x6f0
[   16.470629]  ret_from_fork+0x41/0x80
[   16.471006]  ret_from_fork_asm+0x1a/0x30
[   16.471413] 
[   16.471604] The buggy address belongs to the object at ffff8881025fa800
[   16.471604]  which belongs to the cache kmalloc-128 of size 128
[   16.472777] The buggy address is located 1 bytes inside of
[   16.472777]  128-byte region [ffff8881025fa800, ffff8881025fa880)
[   16.473826] 
[   16.474251] The buggy address belongs to the physical page:
[   16.474771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025fa
[   16.475317] flags: 0x200000000000000(node=0|zone=2)
[   16.476124] page_type: f5(slab)
[   16.476690] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   16.477423] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.477660] page dumped because: kasan: bad access detected
[   16.477827] 
[   16.477905] Memory state around the buggy address:
[   16.478059]  ffff8881025fa700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.478442]  ffff8881025fa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478950] >ffff8881025fa800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.479279]                    ^
[   16.480196]  ffff8881025fa880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.480851]  ffff8881025fa900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.481759] ==================================================================