Date
July 4, 2025, 3:11 p.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 |
[ 36.662016] ================================================================== [ 36.672154] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.680137] Free of addr ffff000803260001 by task kunit_try_catch/292 [ 36.686560] [ 36.688048] CPU: 6 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 36.688105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.688120] Hardware name: WinLink E850-96 board (DT) [ 36.688141] Call trace: [ 36.688153] show_stack+0x20/0x38 (C) [ 36.688189] dump_stack_lvl+0x8c/0xd0 [ 36.688229] print_report+0x118/0x608 [ 36.688257] kasan_report_invalid_free+0xc0/0xe8 [ 36.688291] __kasan_mempool_poison_object+0xfc/0x150 [ 36.688327] mempool_free+0x28c/0x328 [ 36.688361] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.688398] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 36.688435] kunit_try_run_case+0x170/0x3f0 [ 36.688471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.688511] kthread+0x328/0x630 [ 36.688544] ret_from_fork+0x10/0x20 [ 36.688580] [ 36.762779] The buggy address belongs to the physical page: [ 36.768334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883260 [ 36.776319] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.783957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.790900] page_type: f8(unknown) [ 36.794302] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.802016] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.809742] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.817554] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 36.825367] head: 0bfffe0000000002 fffffdffe00c9801 00000000ffffffff 00000000ffffffff [ 36.833179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.840986] page dumped because: kasan: bad access detected [ 36.846540] [ 36.848016] Memory state around the buggy address: [ 36.852796] ffff00080325ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.860001] ffff00080325ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.867208] >ffff000803260000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.874405] ^ [ 36.877620] ffff000803260080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.884825] ffff000803260100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.892027] ================================================================== [ 36.336045] ================================================================== [ 36.346554] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.354535] Free of addr ffff000802678a01 by task kunit_try_catch/290 [ 36.360959] [ 36.362445] CPU: 7 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 36.362500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.362516] Hardware name: WinLink E850-96 board (DT) [ 36.362537] Call trace: [ 36.362550] show_stack+0x20/0x38 (C) [ 36.362586] dump_stack_lvl+0x8c/0xd0 [ 36.362624] print_report+0x118/0x608 [ 36.362656] kasan_report_invalid_free+0xc0/0xe8 [ 36.362689] check_slab_allocation+0xfc/0x108 [ 36.362720] __kasan_mempool_poison_object+0x78/0x150 [ 36.362753] mempool_free+0x28c/0x328 [ 36.362790] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 36.362828] mempool_kmalloc_invalid_free+0xc0/0x118 [ 36.362864] kunit_try_run_case+0x170/0x3f0 [ 36.362901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.362941] kthread+0x328/0x630 [ 36.362975] ret_from_fork+0x10/0x20 [ 36.363009] [ 36.440991] Allocated by task 290: [ 36.444380] kasan_save_stack+0x3c/0x68 [ 36.448195] kasan_save_track+0x20/0x40 [ 36.452015] kasan_save_alloc_info+0x40/0x58 [ 36.456268] __kasan_mempool_unpoison_object+0x11c/0x180 [ 36.461565] remove_element+0x130/0x1f8 [ 36.465383] mempool_alloc_preallocated+0x58/0xc0 [ 36.470070] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 36.475626] mempool_kmalloc_invalid_free+0xc0/0x118 [ 36.480573] kunit_try_run_case+0x170/0x3f0 [ 36.484741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.490209] kthread+0x328/0x630 [ 36.493420] ret_from_fork+0x10/0x20 [ 36.496980] [ 36.498457] The buggy address belongs to the object at ffff000802678a00 [ 36.498457] which belongs to the cache kmalloc-128 of size 128 [ 36.510958] The buggy address is located 1 bytes inside of [ 36.510958] 128-byte region [ffff000802678a00, ffff000802678a80) [ 36.522500] [ 36.523978] The buggy address belongs to the physical page: [ 36.529535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882678 [ 36.537519] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.545158] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.552101] page_type: f5(slab) [ 36.555238] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.562958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.570684] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.578495] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.586308] head: 0bfffe0000000001 fffffdffe0099e01 00000000ffffffff 00000000ffffffff [ 36.594120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.601927] page dumped because: kasan: bad access detected [ 36.607481] [ 36.608957] Memory state around the buggy address: [ 36.613741] ffff000802678900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.620942] ffff000802678980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.628146] >ffff000802678a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.635346] ^ [ 36.638561] ffff000802678a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.645766] ffff000802678b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.652968] ==================================================================
[ 17.718156] ================================================================== [ 17.718323] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 17.718502] Free of addr fff00000c793a001 by task kunit_try_catch/246 [ 17.718556] [ 17.718938] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.719279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.719323] Hardware name: linux,dummy-virt (DT) [ 17.719641] Call trace: [ 17.719682] show_stack+0x20/0x38 (C) [ 17.720059] dump_stack_lvl+0x8c/0xd0 [ 17.720247] print_report+0x118/0x608 [ 17.720834] kasan_report_invalid_free+0xc0/0xe8 [ 17.720909] check_slab_allocation+0xfc/0x108 [ 17.720959] __kasan_mempool_poison_object+0x78/0x150 [ 17.721204] mempool_free+0x28c/0x328 [ 17.721321] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 17.721435] mempool_kmalloc_invalid_free+0xc0/0x118 [ 17.721488] kunit_try_run_case+0x170/0x3f0 [ 17.721536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.721605] kthread+0x328/0x630 [ 17.721665] ret_from_fork+0x10/0x20 [ 17.721720] [ 17.721739] Allocated by task 246: [ 17.721769] kasan_save_stack+0x3c/0x68 [ 17.721806] kasan_save_track+0x20/0x40 [ 17.721851] kasan_save_alloc_info+0x40/0x58 [ 17.721890] __kasan_mempool_unpoison_object+0x11c/0x180 [ 17.721930] remove_element+0x130/0x1f8 [ 17.721970] mempool_alloc_preallocated+0x58/0xc0 [ 17.722019] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 17.722061] mempool_kmalloc_invalid_free+0xc0/0x118 [ 17.722103] kunit_try_run_case+0x170/0x3f0 [ 17.722151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.722194] kthread+0x328/0x630 [ 17.722229] ret_from_fork+0x10/0x20 [ 17.722262] [ 17.722280] The buggy address belongs to the object at fff00000c793a000 [ 17.722280] which belongs to the cache kmalloc-128 of size 128 [ 17.722348] The buggy address is located 1 bytes inside of [ 17.722348] 128-byte region [fff00000c793a000, fff00000c793a080) [ 17.722406] [ 17.722427] The buggy address belongs to the physical page: [ 17.722455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793a [ 17.722517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.722563] page_type: f5(slab) [ 17.722611] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.723218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.723290] page dumped because: kasan: bad access detected [ 17.723334] [ 17.723388] Memory state around the buggy address: [ 17.723442] fff00000c7939f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.723499] fff00000c7939f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.724035] >fff00000c793a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.724115] ^ [ 17.724253] fff00000c793a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.724298] fff00000c793a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.724348] ================================================================== [ 17.734882] ================================================================== [ 17.735030] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 17.735091] Free of addr fff00000c7968001 by task kunit_try_catch/248 [ 17.735134] [ 17.735166] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT [ 17.735281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.735309] Hardware name: linux,dummy-virt (DT) [ 17.735339] Call trace: [ 17.735360] show_stack+0x20/0x38 (C) [ 17.735410] dump_stack_lvl+0x8c/0xd0 [ 17.735454] print_report+0x118/0x608 [ 17.735499] kasan_report_invalid_free+0xc0/0xe8 [ 17.735544] __kasan_mempool_poison_object+0xfc/0x150 [ 17.735604] mempool_free+0x28c/0x328 [ 17.735659] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 17.735726] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 17.735780] kunit_try_run_case+0x170/0x3f0 [ 17.735826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.735878] kthread+0x328/0x630 [ 17.735922] ret_from_fork+0x10/0x20 [ 17.736427] [ 17.736664] The buggy address belongs to the physical page: [ 17.736838] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107968 [ 17.736978] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 17.737164] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 17.737372] page_type: f8(unknown) [ 17.737471] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.737565] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.737712] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 17.737818] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 17.738307] head: 0bfffe0000000002 ffffc1ffc31e5a01 00000000ffffffff 00000000ffffffff [ 17.738516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 17.738660] page dumped because: kasan: bad access detected [ 17.738757] [ 17.738776] Memory state around the buggy address: [ 17.738810] fff00000c7967f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.738896] fff00000c7967f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.739088] >fff00000c7968000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.739232] ^ [ 17.739300] fff00000c7968080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.739616] fff00000c7968100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 17.739779] ==================================================================
[ 16.487884] ================================================================== [ 16.488731] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.490234] Free of addr ffff888103ab4001 by task kunit_try_catch/264 [ 16.490625] [ 16.490972] CPU: 1 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.491091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.491163] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.491194] Call Trace: [ 16.491227] <TASK> [ 16.491301] dump_stack_lvl+0x73/0xb0 [ 16.491381] print_report+0xd1/0x650 [ 16.491423] ? __virt_addr_valid+0x1db/0x2d0 [ 16.491453] ? kasan_addr_to_slab+0x11/0xa0 [ 16.491475] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.491503] kasan_report_invalid_free+0x10a/0x130 [ 16.491530] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.491561] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.491587] __kasan_mempool_poison_object+0x102/0x1d0 [ 16.491612] mempool_free+0x2ec/0x380 [ 16.491641] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.491668] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 16.491694] ? dequeue_entities+0x852/0x1740 [ 16.491722] ? finish_task_switch.isra.0+0x153/0x700 [ 16.491750] mempool_kmalloc_large_invalid_free+0xed/0x140 [ 16.491777] ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10 [ 16.491803] ? dequeue_task_fair+0x166/0x4e0 [ 16.491826] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.491847] ? __pfx_mempool_kfree+0x10/0x10 [ 16.491871] ? __pfx_read_tsc+0x10/0x10 [ 16.491892] ? ktime_get_ts64+0x86/0x230 [ 16.491920] kunit_try_run_case+0x1a5/0x480 [ 16.491948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.491971] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.491997] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.492022] ? __kthread_parkme+0x82/0x180 [ 16.492046] ? preempt_count_sub+0x50/0x80 [ 16.492090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.492116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.492141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.492166] kthread+0x337/0x6f0 [ 16.492185] ? trace_preempt_on+0x20/0xc0 [ 16.492240] ? __pfx_kthread+0x10/0x10 [ 16.492291] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.492324] ? calculate_sigpending+0x7b/0xa0 [ 16.492370] ? __pfx_kthread+0x10/0x10 [ 16.492393] ret_from_fork+0x41/0x80 [ 16.492416] ? __pfx_kthread+0x10/0x10 [ 16.492437] ret_from_fork_asm+0x1a/0x30 [ 16.492472] </TASK> [ 16.492486] [ 16.508790] The buggy address belongs to the physical page: [ 16.509086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ab4 [ 16.509757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 16.510426] flags: 0x200000000000040(head|node=0|zone=2) [ 16.510867] page_type: f8(unknown) [ 16.511122] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.511855] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.512362] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000 [ 16.512782] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000 [ 16.513609] head: 0200000000000002 ffffea00040ead01 00000000ffffffff 00000000ffffffff [ 16.514367] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 16.515026] page dumped because: kasan: bad access detected [ 16.515493] [ 16.515671] Memory state around the buggy address: [ 16.515947] ffff888103ab3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.516266] ffff888103ab3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 16.517153] >ffff888103ab4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.517947] ^ [ 16.518582] ffff888103ab4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.519137] ffff888103ab4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.519592] ================================================================== [ 16.445568] ================================================================== [ 16.446114] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.446830] Free of addr ffff8881025fa801 by task kunit_try_catch/262 [ 16.447305] [ 16.447563] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.15.5-rc2 #1 PREEMPT(voluntary) [ 16.447671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.447697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.447739] Call Trace: [ 16.447769] <TASK> [ 16.447812] dump_stack_lvl+0x73/0xb0 [ 16.447879] print_report+0xd1/0x650 [ 16.447926] ? __virt_addr_valid+0x1db/0x2d0 [ 16.447978] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.448024] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.448224] kasan_report_invalid_free+0x10a/0x130 [ 16.448300] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.448381] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.448434] ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.448476] check_slab_allocation+0x11f/0x130 [ 16.448547] __kasan_mempool_poison_object+0x91/0x1d0 [ 16.448597] mempool_free+0x2ec/0x380 [ 16.448646] mempool_kmalloc_invalid_free_helper+0x132/0x2e0 [ 16.448698] ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10 [ 16.448751] ? dequeue_entities+0x852/0x1740 [ 16.448787] ? finish_task_switch.isra.0+0x153/0x700 [ 16.448820] mempool_kmalloc_invalid_free+0xed/0x140 [ 16.448848] ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10 [ 16.448876] ? dequeue_task_fair+0x166/0x4e0 [ 16.448900] ? __pfx_mempool_kmalloc+0x10/0x10 [ 16.448922] ? __pfx_mempool_kfree+0x10/0x10 [ 16.448945] ? __pfx_read_tsc+0x10/0x10 [ 16.448969] ? ktime_get_ts64+0x86/0x230 [ 16.448999] kunit_try_run_case+0x1a5/0x480 [ 16.449046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.449107] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 16.449186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.449249] ? __kthread_parkme+0x82/0x180 [ 16.449285] ? preempt_count_sub+0x50/0x80 [ 16.449315] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.449363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.449393] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.449419] kthread+0x337/0x6f0 [ 16.449440] ? trace_preempt_on+0x20/0xc0 [ 16.449468] ? __pfx_kthread+0x10/0x10 [ 16.449489] ? _raw_spin_unlock_irq+0x47/0x80 [ 16.449514] ? calculate_sigpending+0x7b/0xa0 [ 16.449540] ? __pfx_kthread+0x10/0x10 [ 16.449562] ret_from_fork+0x41/0x80 [ 16.449586] ? __pfx_kthread+0x10/0x10 [ 16.449606] ret_from_fork_asm+0x1a/0x30 [ 16.449645] </TASK> [ 16.449659] [ 16.465475] Allocated by task 262: [ 16.465679] kasan_save_stack+0x45/0x70 [ 16.465914] kasan_save_track+0x18/0x40 [ 16.466389] kasan_save_alloc_info+0x3b/0x50 [ 16.466882] __kasan_mempool_unpoison_object+0x1a9/0x200 [ 16.467478] remove_element+0x11e/0x190 [ 16.467749] mempool_alloc_preallocated+0x4d/0x90 [ 16.468222] mempool_kmalloc_invalid_free_helper+0x83/0x2e0 [ 16.468597] mempool_kmalloc_invalid_free+0xed/0x140 [ 16.469138] kunit_try_run_case+0x1a5/0x480 [ 16.469652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.469951] kthread+0x337/0x6f0 [ 16.470629] ret_from_fork+0x41/0x80 [ 16.471006] ret_from_fork_asm+0x1a/0x30 [ 16.471413] [ 16.471604] The buggy address belongs to the object at ffff8881025fa800 [ 16.471604] which belongs to the cache kmalloc-128 of size 128 [ 16.472777] The buggy address is located 1 bytes inside of [ 16.472777] 128-byte region [ffff8881025fa800, ffff8881025fa880) [ 16.473826] [ 16.474251] The buggy address belongs to the physical page: [ 16.474771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025fa [ 16.475317] flags: 0x200000000000000(node=0|zone=2) [ 16.476124] page_type: f5(slab) [ 16.476690] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 16.477423] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 16.477660] page dumped because: kasan: bad access detected [ 16.477827] [ 16.477905] Memory state around the buggy address: [ 16.478059] ffff8881025fa700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 16.478442] ffff8881025fa780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.478950] >ffff8881025fa800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.479279] ^ [ 16.480196] ffff8881025fa880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.480851] ffff8881025fa900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 16.481759] ==================================================================