Hay
Date
June 8, 2025, 11:09 p.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
rk3399-rock-pi-4b

[   33.282229] ==================================================================
[   33.291710] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   33.298389] Read of size 1 at addr ffff000802cca0c8 by task kunit_try_catch/254
[   33.305681] 
[   33.307167] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   33.307223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.307241] Hardware name: WinLink E850-96 board (DT)
[   33.307265] Call trace:
[   33.307280]  show_stack+0x20/0x38 (C)
[   33.307316]  dump_stack_lvl+0x8c/0xd0
[   33.307355]  print_report+0x118/0x608
[   33.307390]  kasan_report+0xdc/0x128
[   33.307426]  __asan_report_load1_noabort+0x20/0x30
[   33.307462]  kmem_cache_oob+0x344/0x430
[   33.307495]  kunit_try_run_case+0x170/0x3f0
[   33.307534]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.307573]  kthread+0x328/0x630
[   33.307602]  ret_from_fork+0x10/0x20
[   33.307638] 
[   33.369657] Allocated by task 254:
[   33.373044]  kasan_save_stack+0x3c/0x68
[   33.376859]  kasan_save_track+0x20/0x40
[   33.380680]  kasan_save_alloc_info+0x40/0x58
[   33.384932]  __kasan_slab_alloc+0xa8/0xb0
[   33.388926]  kmem_cache_alloc_noprof+0x10c/0x398
[   33.393526]  kmem_cache_oob+0x12c/0x430
[   33.397345]  kunit_try_run_case+0x170/0x3f0
[   33.401512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.406981]  kthread+0x328/0x630
[   33.410193]  ret_from_fork+0x10/0x20
[   33.413753] 
[   33.415229] The buggy address belongs to the object at ffff000802cca000
[   33.415229]  which belongs to the cache test_cache of size 200
[   33.427642] The buggy address is located 0 bytes to the right of
[   33.427642]  allocated 200-byte region [ffff000802cca000, ffff000802cca0c8)
[   33.440574] 
[   33.442054] The buggy address belongs to the physical page:
[   33.447609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882cca
[   33.455594] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   33.463233] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   33.470176] page_type: f5(slab)
[   33.473314] raw: 0bfffe0000000040 ffff00080179f900 dead000000000122 0000000000000000
[   33.481032] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.488761] head: 0bfffe0000000040 ffff00080179f900 dead000000000122 0000000000000000
[   33.496569] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   33.504383] head: 0bfffe0000000001 fffffdffe00b3281 00000000ffffffff 00000000ffffffff
[   33.512195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   33.520001] page dumped because: kasan: bad access detected
[   33.525555] 
[   33.527031] Memory state around the buggy address:
[   33.531813]  ffff000802cc9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.539014]  ffff000802cca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   33.546218] >ffff000802cca080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   33.553420]                                               ^
[   33.558979]  ffff000802cca100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.566184]  ffff000802cca180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.573386] ==================================================================

[   26.249250] ==================================================================
[   26.249711] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   26.249970] Read of size 1 at addr fff00000c64220c8 by task kunit_try_catch/207
[   26.250114] 
[   26.250218] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.251123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.251240] Hardware name: linux,dummy-virt (DT)
[   26.251361] Call trace:
[   26.251549]  show_stack+0x20/0x38 (C)
[   26.251784]  dump_stack_lvl+0x8c/0xd0
[   26.252278]  print_report+0x118/0x608
[   26.252416]  kasan_report+0xdc/0x128
[   26.252536]  __asan_report_load1_noabort+0x20/0x30
[   26.252725]  kmem_cache_oob+0x344/0x430
[   26.252845]  kunit_try_run_case+0x170/0x3f0
[   26.252995]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.253443]  kthread+0x328/0x630
[   26.253804]  ret_from_fork+0x10/0x20
[   26.253964] 
[   26.254146] Allocated by task 207:
[   26.254230]  kasan_save_stack+0x3c/0x68
[   26.254473]  kasan_save_track+0x20/0x40
[   26.254688]  kasan_save_alloc_info+0x40/0x58
[   26.254809]  __kasan_slab_alloc+0xa8/0xb0
[   26.254920]  kmem_cache_alloc_noprof+0x10c/0x398
[   26.255075]  kmem_cache_oob+0x12c/0x430
[   26.255244]  kunit_try_run_case+0x170/0x3f0
[   26.255420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.255536]  kthread+0x328/0x630
[   26.255650]  ret_from_fork+0x10/0x20
[   26.255914] 
[   26.255987] The buggy address belongs to the object at fff00000c6422000
[   26.255987]  which belongs to the cache test_cache of size 200
[   26.256463] The buggy address is located 0 bytes to the right of
[   26.256463]  allocated 200-byte region [fff00000c6422000, fff00000c64220c8)
[   26.256765] 
[   26.256921] The buggy address belongs to the physical page:
[   26.257023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106422
[   26.257163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.257647] page_type: f5(slab)
[   26.257790] raw: 0bfffe0000000000 fff00000c569f640 dead000000000122 0000000000000000
[   26.258299] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.258427] page dumped because: kasan: bad access detected
[   26.258612] 
[   26.258845] Memory state around the buggy address:
[   26.259185]  fff00000c6421f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.259302]  fff00000c6422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.259415] >fff00000c6422080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   26.259548]                                               ^
[   26.259641]  fff00000c6422100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.259925]  fff00000c6422180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.260063] ==================================================================

[   26.447068] ==================================================================
[   26.447290] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   26.447513] Read of size 1 at addr fff00000c773a0c8 by task kunit_try_catch/207
[   26.447648] 
[   26.447737] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   26.447975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.448237] Hardware name: linux,dummy-virt (DT)
[   26.448460] Call trace:
[   26.448538]  show_stack+0x20/0x38 (C)
[   26.449014]  dump_stack_lvl+0x8c/0xd0
[   26.449802]  print_report+0x118/0x608
[   26.450046]  kasan_report+0xdc/0x128
[   26.450173]  __asan_report_load1_noabort+0x20/0x30
[   26.450369]  kmem_cache_oob+0x344/0x430
[   26.450487]  kunit_try_run_case+0x170/0x3f0
[   26.450618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.450832]  kthread+0x328/0x630
[   26.451118]  ret_from_fork+0x10/0x20
[   26.451463] 
[   26.451508] Allocated by task 207:
[   26.451579]  kasan_save_stack+0x3c/0x68
[   26.451674]  kasan_save_track+0x20/0x40
[   26.451822]  kasan_save_alloc_info+0x40/0x58
[   26.451948]  __kasan_slab_alloc+0xa8/0xb0
[   26.452065]  kmem_cache_alloc_noprof+0x10c/0x398
[   26.452690]  kmem_cache_oob+0x12c/0x430
[   26.452811]  kunit_try_run_case+0x170/0x3f0
[   26.452946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.453198]  kthread+0x328/0x630
[   26.453320]  ret_from_fork+0x10/0x20
[   26.453421] 
[   26.453476] The buggy address belongs to the object at fff00000c773a000
[   26.453476]  which belongs to the cache test_cache of size 200
[   26.453632] The buggy address is located 0 bytes to the right of
[   26.453632]  allocated 200-byte region [fff00000c773a000, fff00000c773a0c8)
[   26.453798] 
[   26.453943] The buggy address belongs to the physical page:
[   26.454061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10773a
[   26.454202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.454346] page_type: f5(slab)
[   26.454566] raw: 0bfffe0000000000 fff00000c1725c80 dead000000000122 0000000000000000
[   26.454938] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   26.455392] page dumped because: kasan: bad access detected
[   26.455477] 
[   26.455519] Memory state around the buggy address:
[   26.455598]  fff00000c7739f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.455708]  fff00000c773a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.455827] >fff00000c773a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   26.455944]                                               ^
[   26.456349]  fff00000c773a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.456696]  fff00000c773a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.456797] ==================================================================

[   20.100020] ==================================================================
[   20.101064] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   20.101956] Read of size 1 at addr ffff888101b360c8 by task kunit_try_catch/225
[   20.102723] 
[   20.103032] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   20.103150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.103184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   20.103246] Call Trace:
[   20.103297]  <TASK>
[   20.103351]  dump_stack_lvl+0x73/0xb0
[   20.103457]  print_report+0xd1/0x650
[   20.103556]  ? __virt_addr_valid+0x1db/0x2d0
[   20.103726]  ? kmem_cache_oob+0x402/0x530
[   20.103804]  ? kasan_complete_mode_report_info+0x2a/0x200
[   20.103876]  ? kmem_cache_oob+0x402/0x530
[   20.103948]  kasan_report+0x141/0x180
[   20.104020]  ? kmem_cache_oob+0x402/0x530
[   20.104168]  __asan_report_load1_noabort+0x18/0x20
[   20.104302]  kmem_cache_oob+0x402/0x530
[   20.104378]  ? trace_hardirqs_on+0x37/0xe0
[   20.104526]  ? __pfx_kmem_cache_oob+0x10/0x10
[   20.104634]  ? finish_task_switch.isra.0+0x153/0x700
[   20.104738]  ? __switch_to+0x47/0xf50
[   20.104821]  ? __pfx_read_tsc+0x10/0x10
[   20.104854]  ? ktime_get_ts64+0x86/0x230
[   20.104891]  kunit_try_run_case+0x1a5/0x480
[   20.104930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.104964]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   20.105001]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   20.105034]  ? __kthread_parkme+0x82/0x180
[   20.105062]  ? preempt_count_sub+0x50/0x80
[   20.105092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   20.105126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.105158]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   20.105191]  kthread+0x337/0x6f0
[   20.105218]  ? trace_preempt_on+0x20/0xc0
[   20.105299]  ? __pfx_kthread+0x10/0x10
[   20.105332]  ? _raw_spin_unlock_irq+0x47/0x80
[   20.105363]  ? calculate_sigpending+0x7b/0xa0
[   20.105399]  ? __pfx_kthread+0x10/0x10
[   20.105428]  ret_from_fork+0x116/0x1d0
[   20.105454]  ? __pfx_kthread+0x10/0x10
[   20.105482]  ret_from_fork_asm+0x1a/0x30
[   20.105553]  </TASK>
[   20.105571] 
[   20.123417] Allocated by task 225:
[   20.123874]  kasan_save_stack+0x45/0x70
[   20.124764]  kasan_save_track+0x18/0x40
[   20.125192]  kasan_save_alloc_info+0x3b/0x50
[   20.125616]  __kasan_slab_alloc+0x91/0xa0
[   20.126193]  kmem_cache_alloc_noprof+0x123/0x3f0
[   20.126862]  kmem_cache_oob+0x157/0x530
[   20.127542]  kunit_try_run_case+0x1a5/0x480
[   20.127996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   20.128438]  kthread+0x337/0x6f0
[   20.128754]  ret_from_fork+0x116/0x1d0
[   20.129602]  ret_from_fork_asm+0x1a/0x30
[   20.130043] 
[   20.130465] The buggy address belongs to the object at ffff888101b36000
[   20.130465]  which belongs to the cache test_cache of size 200
[   20.131619] The buggy address is located 0 bytes to the right of
[   20.131619]  allocated 200-byte region [ffff888101b36000, ffff888101b360c8)
[   20.133002] 
[   20.133301] The buggy address belongs to the physical page:
[   20.134039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b36
[   20.134759] flags: 0x200000000000000(node=0|zone=2)
[   20.135544] page_type: f5(slab)
[   20.136054] raw: 0200000000000000 ffff8881010fd3c0 dead000000000122 0000000000000000
[   20.136651] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   20.137553] page dumped because: kasan: bad access detected
[   20.138021] 
[   20.138538] Memory state around the buggy address:
[   20.139035]  ffff888101b35f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.139898]  ffff888101b36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.140602] >ffff888101b36080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   20.141158]                                               ^
[   20.141775]  ffff888101b36100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.142493]  ffff888101b36180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.143078] ==================================================================

[   19.010030] ==================================================================
[   19.011262] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x402/0x530
[   19.011809] Read of size 1 at addr ffff8881038e30c8 by task kunit_try_catch/225
[   19.012337] 
[   19.012979] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT(voluntary) 
[   19.013106] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.013145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.013386] Call Trace:
[   19.013428]  <TASK>
[   19.013474]  dump_stack_lvl+0x73/0xb0
[   19.013562]  print_report+0xd1/0x650
[   19.013636]  ? __virt_addr_valid+0x1db/0x2d0
[   19.013713]  ? kmem_cache_oob+0x402/0x530
[   19.013863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.013924]  ? kmem_cache_oob+0x402/0x530
[   19.013959]  kasan_report+0x141/0x180
[   19.013991]  ? kmem_cache_oob+0x402/0x530
[   19.014030]  __asan_report_load1_noabort+0x18/0x20
[   19.014064]  kmem_cache_oob+0x402/0x530
[   19.014094]  ? trace_hardirqs_on+0x37/0xe0
[   19.014157]  ? __pfx_kmem_cache_oob+0x10/0x10
[   19.014191]  ? finish_task_switch.isra.0+0x153/0x700
[   19.014224]  ? __switch_to+0x47/0xf50
[   19.014273]  ? __pfx_read_tsc+0x10/0x10
[   19.014304]  ? ktime_get_ts64+0x86/0x230
[   19.014337]  kunit_try_run_case+0x1a5/0x480
[   19.014374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.014407]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.014441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.014474]  ? __kthread_parkme+0x82/0x180
[   19.014500]  ? preempt_count_sub+0x50/0x80
[   19.014585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.014658]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.014695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.014729]  kthread+0x337/0x6f0
[   19.014757]  ? trace_preempt_on+0x20/0xc0
[   19.014787]  ? __pfx_kthread+0x10/0x10
[   19.014815]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.014845]  ? calculate_sigpending+0x7b/0xa0
[   19.014903]  ? __pfx_kthread+0x10/0x10
[   19.014936]  ret_from_fork+0x116/0x1d0
[   19.014962]  ? __pfx_kthread+0x10/0x10
[   19.014990]  ret_from_fork_asm+0x1a/0x30
[   19.015032]  </TASK>
[   19.015047] 
[   19.032828] Allocated by task 225:
[   19.033288]  kasan_save_stack+0x45/0x70
[   19.033973]  kasan_save_track+0x18/0x40
[   19.034308]  kasan_save_alloc_info+0x3b/0x50
[   19.034770]  __kasan_slab_alloc+0x91/0xa0
[   19.035749]  kmem_cache_alloc_noprof+0x123/0x3f0
[   19.036308]  kmem_cache_oob+0x157/0x530
[   19.036997]  kunit_try_run_case+0x1a5/0x480
[   19.037412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.037832]  kthread+0x337/0x6f0
[   19.038390]  ret_from_fork+0x116/0x1d0
[   19.039143]  ret_from_fork_asm+0x1a/0x30
[   19.039526] 
[   19.039793] The buggy address belongs to the object at ffff8881038e3000
[   19.039793]  which belongs to the cache test_cache of size 200
[   19.042118] The buggy address is located 0 bytes to the right of
[   19.042118]  allocated 200-byte region [ffff8881038e3000, ffff8881038e30c8)
[   19.044324] 
[   19.044526] The buggy address belongs to the physical page:
[   19.045618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1038e3
[   19.046655] flags: 0x200000000000000(node=0|zone=2)
[   19.046994] page_type: f5(slab)
[   19.047410] raw: 0200000000000000 ffff88810111b140 dead000000000122 0000000000000000
[   19.048280] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.049245] page dumped because: kasan: bad access detected
[   19.049663] 
[   19.050164] Memory state around the buggy address:
[   19.050712]  ffff8881038e2f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.051352]  ffff8881038e3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.051762] >ffff8881038e3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   19.052182]                                               ^
[   19.052533]  ffff8881038e3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.052963]  ffff8881038e3180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.054840] ==================================================================

[   21.132613] ==================================================================
[   21.133652] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   21.134295] Read of size 1 at addr ffff00000e0b80c8 by task kunit_try_catch/260
[   21.134972] 
[   21.135136] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc1 #1 PREEMPT 
[   21.135186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.135201] Hardware name: Radxa ROCK Pi 4B (DT)
[   21.135219] Call trace:
[   21.135231]  show_stack+0x20/0x38 (C)
[   21.135264]  dump_stack_lvl+0x8c/0xd0
[   21.135299]  print_report+0x118/0x608
[   21.135334]  kasan_report+0xdc/0x128
[   21.135365]  __asan_report_load1_noabort+0x20/0x30
[   21.135403]  kmem_cache_oob+0x344/0x430
[   21.135432]  kunit_try_run_case+0x170/0x3f0
[   21.135466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.135503]  kthread+0x328/0x630
[   21.135529]  ret_from_fork+0x10/0x20
[   21.135561] 
[   21.141110] Allocated by task 260:
[   21.141436]  kasan_save_stack+0x3c/0x68
[   21.141815]  kasan_save_track+0x20/0x40
[   21.142190]  kasan_save_alloc_info+0x40/0x58
[   21.142607]  __kasan_slab_alloc+0xa8/0xb0
[   21.142997]  kmem_cache_alloc_noprof+0x10c/0x398
[   21.143444]  kmem_cache_oob+0x12c/0x430
[   21.143817]  kunit_try_run_case+0x170/0x3f0
[   21.144223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.144746]  kthread+0x328/0x630
[   21.145062]  ret_from_fork+0x10/0x20
[   21.145413] 
[   21.145566] The buggy address belongs to the object at ffff00000e0b8000
[   21.145566]  which belongs to the cache test_cache of size 200
[   21.146690] The buggy address is located 0 bytes to the right of
[   21.146690]  allocated 200-byte region [ffff00000e0b8000, ffff00000e0b80c8)
[   21.147864] 
[   21.148017] The buggy address belongs to the physical page:
[   21.148534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe0b8
[   21.149258] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.149964] flags: 0x3fffe0000000040(head|node=0|zone=0|lastcpupid=0x1ffff)
[   21.150614] page_type: f5(slab)
[   21.150929] raw: 03fffe0000000040 ffff000002518500 dead000000000122 0000000000000000
[   21.151644] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   21.152359] head: 03fffe0000000040 ffff000002518500 dead000000000122 0000000000000000
[   21.153082] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000
[   21.153807] head: 03fffe0000000001 fffffdffc0382e01 00000000ffffffff 00000000ffffffff
[   21.154529] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   21.155244] page dumped because: kasan: bad access detected
[   21.155758] 
[   21.155912] Memory state around the buggy address:
[   21.156360]  ffff00000e0b7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.157027]  ffff00000e0b8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.157692] >ffff00000e0b8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   21.158354]                                               ^
[   21.158872]  ffff00000e0b8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.159538]  ffff00000e0b8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.160199] ==================================================================