Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   28.813228] ==================================================================
[   28.823545] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.831442] Read of size 64 at addr ffff000800d62204 by task kunit_try_catch/229
[   28.838819] 
[   28.840306] CPU: 7 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   28.840368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.840386] Hardware name: WinLink E850-96 board (DT)
[   28.840406] Call trace:
[   28.840422]  show_stack+0x20/0x38 (C)
[   28.840459]  dump_stack_lvl+0x8c/0xd0
[   28.840497]  print_report+0x118/0x608
[   28.840533]  kasan_report+0xdc/0x128
[   28.840566]  kasan_check_range+0x100/0x1a8
[   28.840603]  __asan_memmove+0x3c/0x98
[   28.840632]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   28.840668]  kunit_try_run_case+0x170/0x3f0
[   28.840706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.840746]  kthread+0x328/0x630
[   28.840775]  ret_from_fork+0x10/0x20
[   28.840810] 
[   28.906961] Allocated by task 229:
[   28.910348]  kasan_save_stack+0x3c/0x68
[   28.914164]  kasan_save_track+0x20/0x40
[   28.917984]  kasan_save_alloc_info+0x40/0x58
[   28.922237]  __kasan_kmalloc+0xd4/0xd8
[   28.925971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   28.930484]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   28.935432]  kunit_try_run_case+0x170/0x3f0
[   28.939598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.945067]  kthread+0x328/0x630
[   28.948279]  ret_from_fork+0x10/0x20
[   28.951838] 
[   28.953316] The buggy address belongs to the object at ffff000800d62200
[   28.953316]  which belongs to the cache kmalloc-64 of size 64
[   28.965642] The buggy address is located 4 bytes inside of
[   28.965642]  allocated 64-byte region [ffff000800d62200, ffff000800d62240)
[   28.977966] 
[   28.979445] The buggy address belongs to the physical page:
[   28.985002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880d62
[   28.992985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   28.999495] page_type: f5(slab)
[   29.002631] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   29.010351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.018071] page dumped because: kasan: bad access detected
[   29.023625] 
[   29.025100] Memory state around the buggy address:
[   29.029881]  ffff000800d62100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.037083]  ffff000800d62180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.044289] >ffff000800d62200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   29.051488]                                            ^
[   29.056788]  ffff000800d62280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.063993]  ffff000800d62300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.071195] ==================================================================

[   25.508678] ==================================================================
[   25.508802] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   25.508922] Read of size 64 at addr fff00000c6418284 by task kunit_try_catch/182
[   25.509179] 
[   25.509368] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.509898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.510097] Hardware name: linux,dummy-virt (DT)
[   25.510235] Call trace:
[   25.510291]  show_stack+0x20/0x38 (C)
[   25.510609]  dump_stack_lvl+0x8c/0xd0
[   25.510773]  print_report+0x118/0x608
[   25.510904]  kasan_report+0xdc/0x128
[   25.511043]  kasan_check_range+0x100/0x1a8
[   25.511198]  __asan_memmove+0x3c/0x98
[   25.511650]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   25.511865]  kunit_try_run_case+0x170/0x3f0
[   25.512113]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.512264]  kthread+0x328/0x630
[   25.512400]  ret_from_fork+0x10/0x20
[   25.512759] 
[   25.512807] Allocated by task 182:
[   25.512963]  kasan_save_stack+0x3c/0x68
[   25.513112]  kasan_save_track+0x20/0x40
[   25.513284]  kasan_save_alloc_info+0x40/0x58
[   25.513409]  __kasan_kmalloc+0xd4/0xd8
[   25.513541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.513667]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   25.513929]  kunit_try_run_case+0x170/0x3f0
[   25.514052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.514249]  kthread+0x328/0x630
[   25.514342]  ret_from_fork+0x10/0x20
[   25.514436] 
[   25.514482] The buggy address belongs to the object at fff00000c6418280
[   25.514482]  which belongs to the cache kmalloc-64 of size 64
[   25.514620] The buggy address is located 4 bytes inside of
[   25.514620]  allocated 64-byte region [fff00000c6418280, fff00000c64182c0)
[   25.514768] 
[   25.514815] The buggy address belongs to the physical page:
[   25.514984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418
[   25.515497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.515625] page_type: f5(slab)
[   25.515731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.515872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.516002] page dumped because: kasan: bad access detected
[   25.517119] 
[   25.517192] Memory state around the buggy address:
[   25.517305]  fff00000c6418180: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.517659]  fff00000c6418200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.518017] >fff00000c6418280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.518127]                                            ^
[   25.518232]  fff00000c6418300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.519214]  fff00000c6418380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.519463] ==================================================================

[   25.748101] ==================================================================
[   25.748235] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   25.748359] Read of size 64 at addr fff00000c7742f04 by task kunit_try_catch/182
[   25.748483] 
[   25.748554] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   25.748750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.748813] Hardware name: linux,dummy-virt (DT)
[   25.748909] Call trace:
[   25.748981]  show_stack+0x20/0x38 (C)
[   25.749120]  dump_stack_lvl+0x8c/0xd0
[   25.749449]  print_report+0x118/0x608
[   25.749580]  kasan_report+0xdc/0x128
[   25.749716]  kasan_check_range+0x100/0x1a8
[   25.749880]  __asan_memmove+0x3c/0x98
[   25.750015]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   25.751895]  kunit_try_run_case+0x170/0x3f0
[   25.752044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.752183]  kthread+0x328/0x630
[   25.753449]  ret_from_fork+0x10/0x20
[   25.753640] 
[   25.753740] Allocated by task 182:
[   25.753850]  kasan_save_stack+0x3c/0x68
[   25.754048]  kasan_save_track+0x20/0x40
[   25.754178]  kasan_save_alloc_info+0x40/0x58
[   25.754299]  __kasan_kmalloc+0xd4/0xd8
[   25.754412]  __kmalloc_cache_noprof+0x16c/0x3c0
[   25.754624]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   25.754745]  kunit_try_run_case+0x170/0x3f0
[   25.754953]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.755214]  kthread+0x328/0x630
[   25.755757]  ret_from_fork+0x10/0x20
[   25.755910] 
[   25.756028] The buggy address belongs to the object at fff00000c7742f00
[   25.756028]  which belongs to the cache kmalloc-64 of size 64
[   25.756381] The buggy address is located 4 bytes inside of
[   25.756381]  allocated 64-byte region [fff00000c7742f00, fff00000c7742f40)
[   25.756538] 
[   25.756588] The buggy address belongs to the physical page:
[   25.756664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107742
[   25.756783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.756918] page_type: f5(slab)
[   25.757015] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.757201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.757442] page dumped because: kasan: bad access detected
[   25.757536] 
[   25.757711] Memory state around the buggy address:
[   25.757870]  fff00000c7742e00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   25.758155]  fff00000c7742e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.758266] >fff00000c7742f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   25.759105]                                            ^
[   25.759384]  fff00000c7742f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.759892]  fff00000c7743000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.759993] ==================================================================

[   19.194310] ==================================================================
[   19.195449] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   19.196334] Read of size 64 at addr ffff888101b2f204 by task kunit_try_catch/200
[   19.198107] 
[   19.198560] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.198732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.198775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.198885] Call Trace:
[   19.198934]  <TASK>
[   19.198986]  dump_stack_lvl+0x73/0xb0
[   19.199073]  print_report+0xd1/0x650
[   19.199109]  ? __virt_addr_valid+0x1db/0x2d0
[   19.199144]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   19.199180]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.199210]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   19.199292]  kasan_report+0x141/0x180
[   19.199327]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   19.199368]  kasan_check_range+0x10c/0x1c0
[   19.199401]  __asan_memmove+0x27/0x70
[   19.199429]  kmalloc_memmove_invalid_size+0x16f/0x330
[   19.199464]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   19.199527]  ? __schedule+0x10cc/0x2b60
[   19.199603]  ? __pfx_read_tsc+0x10/0x10
[   19.199667]  ? ktime_get_ts64+0x86/0x230
[   19.199732]  kunit_try_run_case+0x1a5/0x480
[   19.199801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.199860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.199923]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.199984]  ? __kthread_parkme+0x82/0x180
[   19.200039]  ? preempt_count_sub+0x50/0x80
[   19.200097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.200159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.200226]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.200320]  kthread+0x337/0x6f0
[   19.200357]  ? trace_preempt_on+0x20/0xc0
[   19.200394]  ? __pfx_kthread+0x10/0x10
[   19.200424]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.200458]  ? calculate_sigpending+0x7b/0xa0
[   19.200495]  ? __pfx_kthread+0x10/0x10
[   19.200572]  ret_from_fork+0x116/0x1d0
[   19.200642]  ? __pfx_kthread+0x10/0x10
[   19.200690]  ret_from_fork_asm+0x1a/0x30
[   19.200735]  </TASK>
[   19.200751] 
[   19.222390] Allocated by task 200:
[   19.223528]  kasan_save_stack+0x45/0x70
[   19.224242]  kasan_save_track+0x18/0x40
[   19.225453]  kasan_save_alloc_info+0x3b/0x50
[   19.225878]  __kasan_kmalloc+0xb7/0xc0
[   19.226193]  __kmalloc_cache_noprof+0x189/0x420
[   19.227145]  kmalloc_memmove_invalid_size+0xac/0x330
[   19.227919]  kunit_try_run_case+0x1a5/0x480
[   19.228587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.229032]  kthread+0x337/0x6f0
[   19.229364]  ret_from_fork+0x116/0x1d0
[   19.230454]  ret_from_fork_asm+0x1a/0x30
[   19.231138] 
[   19.231614] The buggy address belongs to the object at ffff888101b2f200
[   19.231614]  which belongs to the cache kmalloc-64 of size 64
[   19.233595] The buggy address is located 4 bytes inside of
[   19.233595]  allocated 64-byte region [ffff888101b2f200, ffff888101b2f240)
[   19.235034] 
[   19.235285] The buggy address belongs to the physical page:
[   19.236614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b2f
[   19.237253] flags: 0x200000000000000(node=0|zone=2)
[   19.237690] page_type: f5(slab)
[   19.238044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.239020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.241319] page dumped because: kasan: bad access detected
[   19.242250] 
[   19.243645] Memory state around the buggy address:
[   19.244098]  ffff888101b2f100: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   19.244709]  ffff888101b2f180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.245270] >ffff888101b2f200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   19.248290]                                            ^
[   19.249193]  ffff888101b2f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.250204]  ffff888101b2f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.252325] ==================================================================

[   18.243162] ==================================================================
[   18.244088] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x16f/0x330
[   18.245524] Read of size 64 at addr ffff8881038d4c84 by task kunit_try_catch/200
[   18.246629] 
[   18.246750] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   18.246809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.246825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.246854] Call Trace:
[   18.246869]  <TASK>
[   18.246923]  dump_stack_lvl+0x73/0xb0
[   18.247014]  print_report+0xd1/0x650
[   18.247091]  ? __virt_addr_valid+0x1db/0x2d0
[   18.247167]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   18.247245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.247688]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   18.247729]  kasan_report+0x141/0x180
[   18.247761]  ? kmalloc_memmove_invalid_size+0x16f/0x330
[   18.247802]  kasan_check_range+0x10c/0x1c0
[   18.247835]  __asan_memmove+0x27/0x70
[   18.247861]  kmalloc_memmove_invalid_size+0x16f/0x330
[   18.247924]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   18.247964]  ? __schedule+0x10cc/0x2b60
[   18.247997]  ? __pfx_read_tsc+0x10/0x10
[   18.248027]  ? ktime_get_ts64+0x86/0x230
[   18.248059]  kunit_try_run_case+0x1a5/0x480
[   18.248097]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.248158]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.248194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.248227]  ? __kthread_parkme+0x82/0x180
[   18.248255]  ? preempt_count_sub+0x50/0x80
[   18.248285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.248319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.248352]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.248385]  kthread+0x337/0x6f0
[   18.248411]  ? trace_preempt_on+0x20/0xc0
[   18.248443]  ? __pfx_kthread+0x10/0x10
[   18.248471]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.248500]  ? calculate_sigpending+0x7b/0xa0
[   18.248597]  ? __pfx_kthread+0x10/0x10
[   18.248679]  ret_from_fork+0x116/0x1d0
[   18.248753]  ? __pfx_kthread+0x10/0x10
[   18.248830]  ret_from_fork_asm+0x1a/0x30
[   18.248915]  </TASK>
[   18.248935] 
[   18.271205] Allocated by task 200:
[   18.271858]  kasan_save_stack+0x45/0x70
[   18.272425]  kasan_save_track+0x18/0x40
[   18.272987]  kasan_save_alloc_info+0x3b/0x50
[   18.273422]  __kasan_kmalloc+0xb7/0xc0
[   18.273816]  __kmalloc_cache_noprof+0x189/0x420
[   18.274318]  kmalloc_memmove_invalid_size+0xac/0x330
[   18.275331]  kunit_try_run_case+0x1a5/0x480
[   18.276033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.276656]  kthread+0x337/0x6f0
[   18.277034]  ret_from_fork+0x116/0x1d0
[   18.277431]  ret_from_fork_asm+0x1a/0x30
[   18.278103] 
[   18.278378] The buggy address belongs to the object at ffff8881038d4c80
[   18.278378]  which belongs to the cache kmalloc-64 of size 64
[   18.279559] The buggy address is located 4 bytes inside of
[   18.279559]  allocated 64-byte region [ffff8881038d4c80, ffff8881038d4cc0)
[   18.280920] 
[   18.281160] The buggy address belongs to the physical page:
[   18.281836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038d4
[   18.282542] flags: 0x200000000000000(node=0|zone=2)
[   18.283282] page_type: f5(slab)
[   18.283751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.284524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.285383] page dumped because: kasan: bad access detected
[   18.286321] 
[   18.286677] Memory state around the buggy address:
[   18.287266]  ffff8881038d4b80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.287927]  ffff8881038d4c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.288740] >ffff8881038d4c80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.289511]                                            ^
[   18.290421]  ffff8881038d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.291086]  ffff8881038d4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.291770] ==================================================================

[   20.674758] ==================================================================
[   20.675901] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   20.676652] Read of size 64 at addr ffff00000101c904 by task kunit_try_catch/235
[   20.677339] 
[   20.677505] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   20.677556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.677570] Hardware name: Radxa ROCK Pi 4B (DT)
[   20.677588] Call trace:
[   20.677599]  show_stack+0x20/0x38 (C)
[   20.677633]  dump_stack_lvl+0x8c/0xd0
[   20.677669]  print_report+0x118/0x608
[   20.677704]  kasan_report+0xdc/0x128
[   20.677735]  kasan_check_range+0x100/0x1a8
[   20.677768]  __asan_memmove+0x3c/0x98
[   20.677795]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   20.677828]  kunit_try_run_case+0x170/0x3f0
[   20.677862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.677899]  kthread+0x328/0x630
[   20.677926]  ret_from_fork+0x10/0x20
[   20.677958] 
[   20.683880] Allocated by task 235:
[   20.684204]  kasan_save_stack+0x3c/0x68
[   20.684582]  kasan_save_track+0x20/0x40
[   20.684959]  kasan_save_alloc_info+0x40/0x58
[   20.685374]  __kasan_kmalloc+0xd4/0xd8
[   20.685741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.686177]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   20.686651]  kunit_try_run_case+0x170/0x3f0
[   20.687058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.687580]  kthread+0x328/0x630
[   20.687897]  ret_from_fork+0x10/0x20
[   20.688247] 
[   20.688400] The buggy address belongs to the object at ffff00000101c900
[   20.688400]  which belongs to the cache kmalloc-64 of size 64
[   20.689518] The buggy address is located 4 bytes inside of
[   20.689518]  allocated 64-byte region [ffff00000101c900, ffff00000101c940)
[   20.690638] 
[   20.690793] The buggy address belongs to the physical page:
[   20.691308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c
[   20.692033] flags: 0x3fffe0000000000(node=0|zone=0|lastcpupid=0x1ffff)
[   20.692644] page_type: f5(slab)
[   20.692957] raw: 03fffe0000000000 ffff0000004028c0 dead000000000122 0000000000000000
[   20.693674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.694381] page dumped because: kasan: bad access detected
[   20.694896] 
[   20.695047] Memory state around the buggy address:
[   20.695496]  ffff00000101c800: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   20.696162]  ffff00000101c880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.696827] >ffff00000101c900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.697490]                                            ^
[   20.697984]  ffff00000101c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.698651]  ffff00000101ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.699312] ==================================================================