Hay
Date
July 6, 2025, 11:09 p.m.

Environment
qemu-arm64
qemu-x86_64
x86

[   20.069525] ==================================================================
[   20.069593] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   20.069673] Read of size 8 at addr fff00000c77ac278 by task kunit_try_catch/282
[   20.077995] 
[   20.078616] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.078715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.079384] Hardware name: linux,dummy-virt (DT)
[   20.079748] Call trace:
[   20.079781]  show_stack+0x20/0x38 (C)
[   20.080495]  dump_stack_lvl+0x8c/0xd0
[   20.080936]  print_report+0x118/0x608
[   20.080999]  kasan_report+0xdc/0x128
[   20.082528]  __asan_report_load8_noabort+0x20/0x30
[   20.082748]  copy_to_kernel_nofault+0x204/0x250
[   20.083022]  copy_to_kernel_nofault_oob+0x158/0x418
[   20.083204]  kunit_try_run_case+0x170/0x3f0
[   20.083259]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.083313]  kthread+0x328/0x630
[   20.083946]  ret_from_fork+0x10/0x20
[   20.084828] 
[   20.085961] Allocated by task 282:
[   20.086162]  kasan_save_stack+0x3c/0x68
[   20.086754]  kasan_save_track+0x20/0x40
[   20.087484]  kasan_save_alloc_info+0x40/0x58
[   20.087796]  __kasan_kmalloc+0xd4/0xd8
[   20.088433]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.088765]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.089125]  kunit_try_run_case+0x170/0x3f0
[   20.089172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.089218]  kthread+0x328/0x630
[   20.090137]  ret_from_fork+0x10/0x20
[   20.090452] 
[   20.090524] The buggy address belongs to the object at fff00000c77ac200
[   20.090524]  which belongs to the cache kmalloc-128 of size 128
[   20.091015] The buggy address is located 0 bytes to the right of
[   20.091015]  allocated 120-byte region [fff00000c77ac200, fff00000c77ac278)
[   20.091156] 
[   20.091182] The buggy address belongs to the physical page:
[   20.091220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.092461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.093009] page_type: f5(slab)
[   20.093465] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.093648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.094037] page dumped because: kasan: bad access detected
[   20.094075] 
[   20.094656] Memory state around the buggy address:
[   20.094862]  fff00000c77ac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.094912]  fff00000c77ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.095115] >fff00000c77ac200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.095163]                                                                 ^
[   20.095208]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.095253]  fff00000c77ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.095296] ==================================================================
[   20.097777] ==================================================================
[   20.097838] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   20.097894] Write of size 8 at addr fff00000c77ac278 by task kunit_try_catch/282
[   20.097947] 
[   20.097995] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   20.098080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.098109] Hardware name: linux,dummy-virt (DT)
[   20.099269] Call trace:
[   20.099311]  show_stack+0x20/0x38 (C)
[   20.099435]  dump_stack_lvl+0x8c/0xd0
[   20.099489]  print_report+0x118/0x608
[   20.099536]  kasan_report+0xdc/0x128
[   20.099582]  kasan_check_range+0x100/0x1a8
[   20.099631]  __kasan_check_write+0x20/0x30
[   20.099727]  copy_to_kernel_nofault+0x8c/0x250
[   20.099787]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   20.100354]  kunit_try_run_case+0x170/0x3f0
[   20.101407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.101717]  kthread+0x328/0x630
[   20.101950]  ret_from_fork+0x10/0x20
[   20.102232] 
[   20.102256] Allocated by task 282:
[   20.102524]  kasan_save_stack+0x3c/0x68
[   20.102633]  kasan_save_track+0x20/0x40
[   20.102997]  kasan_save_alloc_info+0x40/0x58
[   20.103046]  __kasan_kmalloc+0xd4/0xd8
[   20.103085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.103125]  copy_to_kernel_nofault_oob+0xc8/0x418
[   20.103169]  kunit_try_run_case+0x170/0x3f0
[   20.103869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.104133]  kthread+0x328/0x630
[   20.104298]  ret_from_fork+0x10/0x20
[   20.104338] 
[   20.104620] The buggy address belongs to the object at fff00000c77ac200
[   20.104620]  which belongs to the cache kmalloc-128 of size 128
[   20.104832] The buggy address is located 0 bytes to the right of
[   20.104832]  allocated 120-byte region [fff00000c77ac200, fff00000c77ac278)
[   20.104901] 
[   20.105249] The buggy address belongs to the physical page:
[   20.105290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac
[   20.106016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.106298] page_type: f5(slab)
[   20.106512] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.106573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.106938] page dumped because: kasan: bad access detected
[   20.106995] 
[   20.107328] Memory state around the buggy address:
[   20.107366]  fff00000c77ac100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.107546]  fff00000c77ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.107721] >fff00000c77ac200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   20.107814]                                                                 ^
[   20.107859]  fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.107905]  fff00000c77ac300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.107945] ==================================================================

[   19.753649] ==================================================================
[   19.753945] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   19.754143] Write of size 8 at addr fff00000c76c9278 by task kunit_try_catch/282
[   19.754210] 
[   19.754318] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.754434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.754519] Hardware name: linux,dummy-virt (DT)
[   19.754568] Call trace:
[   19.754594]  show_stack+0x20/0x38 (C)
[   19.754661]  dump_stack_lvl+0x8c/0xd0
[   19.754713]  print_report+0x118/0x608
[   19.754760]  kasan_report+0xdc/0x128
[   19.754806]  kasan_check_range+0x100/0x1a8
[   19.754856]  __kasan_check_write+0x20/0x30
[   19.754901]  copy_to_kernel_nofault+0x8c/0x250
[   19.754974]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   19.755027]  kunit_try_run_case+0x170/0x3f0
[   19.755085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.755153]  kthread+0x328/0x630
[   19.755198]  ret_from_fork+0x10/0x20
[   19.755465] 
[   19.755490] Allocated by task 282:
[   19.755709]  kasan_save_stack+0x3c/0x68
[   19.756054]  kasan_save_track+0x20/0x40
[   19.756178]  kasan_save_alloc_info+0x40/0x58
[   19.756260]  __kasan_kmalloc+0xd4/0xd8
[   19.756404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.756542]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.756611]  kunit_try_run_case+0x170/0x3f0
[   19.756659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.756819]  kthread+0x328/0x630
[   19.756972]  ret_from_fork+0x10/0x20
[   19.757184] 
[   19.757246] The buggy address belongs to the object at fff00000c76c9200
[   19.757246]  which belongs to the cache kmalloc-128 of size 128
[   19.757447] The buggy address is located 0 bytes to the right of
[   19.757447]  allocated 120-byte region [fff00000c76c9200, fff00000c76c9278)
[   19.757674] 
[   19.757714] The buggy address belongs to the physical page:
[   19.757771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.757882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.757971] page_type: f5(slab)
[   19.758159] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.758387] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.758470] page dumped because: kasan: bad access detected
[   19.758582] 
[   19.758650] Memory state around the buggy address:
[   19.758696]  fff00000c76c9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.758943]  fff00000c76c9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.759092] >fff00000c76c9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.759161]                                                                 ^
[   19.759296]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.759393]  fff00000c76c9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.759450] ==================================================================
[   19.747082] ==================================================================
[   19.747155] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   19.747296] Read of size 8 at addr fff00000c76c9278 by task kunit_try_catch/282
[   19.747360] 
[   19.747406] CPU: 1 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT 
[   19.747499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.747734] Hardware name: linux,dummy-virt (DT)
[   19.747790] Call trace:
[   19.747824]  show_stack+0x20/0x38 (C)
[   19.748085]  dump_stack_lvl+0x8c/0xd0
[   19.748214]  print_report+0x118/0x608
[   19.748286]  kasan_report+0xdc/0x128
[   19.748365]  __asan_report_load8_noabort+0x20/0x30
[   19.748428]  copy_to_kernel_nofault+0x204/0x250
[   19.748707]  copy_to_kernel_nofault_oob+0x158/0x418
[   19.748771]  kunit_try_run_case+0x170/0x3f0
[   19.748871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.748945]  kthread+0x328/0x630
[   19.748988]  ret_from_fork+0x10/0x20
[   19.749083] 
[   19.749103] Allocated by task 282:
[   19.749324]  kasan_save_stack+0x3c/0x68
[   19.749394]  kasan_save_track+0x20/0x40
[   19.749501]  kasan_save_alloc_info+0x40/0x58
[   19.749547]  __kasan_kmalloc+0xd4/0xd8
[   19.749613]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.749834]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.749907]  kunit_try_run_case+0x170/0x3f0
[   19.749961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.750007]  kthread+0x328/0x630
[   19.750097]  ret_from_fork+0x10/0x20
[   19.750175] 
[   19.750317] The buggy address belongs to the object at fff00000c76c9200
[   19.750317]  which belongs to the cache kmalloc-128 of size 128
[   19.750391] The buggy address is located 0 bytes to the right of
[   19.750391]  allocated 120-byte region [fff00000c76c9200, fff00000c76c9278)
[   19.750606] 
[   19.750656] The buggy address belongs to the physical page:
[   19.750782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9
[   19.750857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.751002] page_type: f5(slab)
[   19.751065] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.751651] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.751729] page dumped because: kasan: bad access detected
[   19.751879] 
[   19.751963] Memory state around the buggy address:
[   19.752042]  fff00000c76c9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.752105]  fff00000c76c9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.752414] >fff00000c76c9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.752521]                                                                 ^
[   19.752576]  fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.752640]  fff00000c76c9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.752716] ==================================================================

[   17.923485] ==================================================================
[   17.924160] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   17.924900] Read of size 8 at addr ffff888102abe578 by task kunit_try_catch/299
[   17.925131] 
[   17.925332] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.925447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.925485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.925563] Call Trace:
[   17.925591]  <TASK>
[   17.925645]  dump_stack_lvl+0x73/0xb0
[   17.925704]  print_report+0xd1/0x650
[   17.925743]  ? __virt_addr_valid+0x1db/0x2d0
[   17.925779]  ? copy_to_kernel_nofault+0x225/0x260
[   17.925822]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.926254]  ? copy_to_kernel_nofault+0x225/0x260
[   17.926295]  kasan_report+0x141/0x180
[   17.926322]  ? copy_to_kernel_nofault+0x225/0x260
[   17.926350]  __asan_report_load8_noabort+0x18/0x20
[   17.926375]  copy_to_kernel_nofault+0x225/0x260
[   17.926400]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   17.926426]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   17.926449]  ? finish_task_switch.isra.0+0x153/0x700
[   17.926471]  ? __schedule+0x10cc/0x2b60
[   17.926493]  ? trace_hardirqs_on+0x37/0xe0
[   17.926540]  ? __pfx_read_tsc+0x10/0x10
[   17.926573]  ? ktime_get_ts64+0x86/0x230
[   17.926610]  kunit_try_run_case+0x1a5/0x480
[   17.926662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.926685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.926708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.926730]  ? __kthread_parkme+0x82/0x180
[   17.926751]  ? preempt_count_sub+0x50/0x80
[   17.926773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.926795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.926818]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.926840]  kthread+0x337/0x6f0
[   17.926859]  ? trace_preempt_on+0x20/0xc0
[   17.926880]  ? __pfx_kthread+0x10/0x10
[   17.926901]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.926921]  ? calculate_sigpending+0x7b/0xa0
[   17.926944]  ? __pfx_kthread+0x10/0x10
[   17.926965]  ret_from_fork+0x116/0x1d0
[   17.926983]  ? __pfx_kthread+0x10/0x10
[   17.927003]  ret_from_fork_asm+0x1a/0x30
[   17.927033]  </TASK>
[   17.927047] 
[   17.939082] Allocated by task 299:
[   17.939282]  kasan_save_stack+0x45/0x70
[   17.939515]  kasan_save_track+0x18/0x40
[   17.939789]  kasan_save_alloc_info+0x3b/0x50
[   17.940093]  __kasan_kmalloc+0xb7/0xc0
[   17.940286]  __kmalloc_cache_noprof+0x189/0x420
[   17.940558]  copy_to_kernel_nofault_oob+0x12f/0x560
[   17.940796]  kunit_try_run_case+0x1a5/0x480
[   17.940976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.941490]  kthread+0x337/0x6f0
[   17.941806]  ret_from_fork+0x116/0x1d0
[   17.942064]  ret_from_fork_asm+0x1a/0x30
[   17.942366] 
[   17.942456] The buggy address belongs to the object at ffff888102abe500
[   17.942456]  which belongs to the cache kmalloc-128 of size 128
[   17.942993] The buggy address is located 0 bytes to the right of
[   17.942993]  allocated 120-byte region [ffff888102abe500, ffff888102abe578)
[   17.943737] 
[   17.943891] The buggy address belongs to the physical page:
[   17.944298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102abe
[   17.944554] flags: 0x200000000000000(node=0|zone=2)
[   17.944757] page_type: f5(slab)
[   17.944911] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.945156] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.945386] page dumped because: kasan: bad access detected
[   17.945574] 
[   17.945686] Memory state around the buggy address:
[   17.945858]  ffff888102abe400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.946092]  ffff888102abe480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.946317] >ffff888102abe500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.946535]                                                                 ^
[   17.947053]  ffff888102abe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.947582]  ffff888102abe600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.948087] ==================================================================
[   17.949060] ==================================================================
[   17.949696] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   17.950314] Write of size 8 at addr ffff888102abe578 by task kunit_try_catch/299
[   17.950893] 
[   17.951096] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.951198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.951223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.951260] Call Trace:
[   17.951291]  <TASK>
[   17.951321]  dump_stack_lvl+0x73/0xb0
[   17.951385]  print_report+0xd1/0x650
[   17.951433]  ? __virt_addr_valid+0x1db/0x2d0
[   17.951479]  ? copy_to_kernel_nofault+0x99/0x260
[   17.951518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.951556]  ? copy_to_kernel_nofault+0x99/0x260
[   17.951589]  kasan_report+0x141/0x180
[   17.951644]  ? copy_to_kernel_nofault+0x99/0x260
[   17.951694]  kasan_check_range+0x10c/0x1c0
[   17.951733]  __kasan_check_write+0x18/0x20
[   17.951764]  copy_to_kernel_nofault+0x99/0x260
[   17.951801]  copy_to_kernel_nofault_oob+0x288/0x560
[   17.951838]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   17.951872]  ? finish_task_switch.isra.0+0x153/0x700
[   17.951907]  ? __schedule+0x10cc/0x2b60
[   17.951941]  ? trace_hardirqs_on+0x37/0xe0
[   17.951989]  ? __pfx_read_tsc+0x10/0x10
[   17.952022]  ? ktime_get_ts64+0x86/0x230
[   17.952063]  kunit_try_run_case+0x1a5/0x480
[   17.952106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.952143]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.952184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.952225]  ? __kthread_parkme+0x82/0x180
[   17.952262]  ? preempt_count_sub+0x50/0x80
[   17.952302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.952337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.952372]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.952408]  kthread+0x337/0x6f0
[   17.952444]  ? trace_preempt_on+0x20/0xc0
[   17.952486]  ? __pfx_kthread+0x10/0x10
[   17.952526]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.952570]  ? calculate_sigpending+0x7b/0xa0
[   17.952658]  ? __pfx_kthread+0x10/0x10
[   17.952708]  ret_from_fork+0x116/0x1d0
[   17.952748]  ? __pfx_kthread+0x10/0x10
[   17.952791]  ret_from_fork_asm+0x1a/0x30
[   17.952855]  </TASK>
[   17.952883] 
[   17.964829] Allocated by task 299:
[   17.965116]  kasan_save_stack+0x45/0x70
[   17.965449]  kasan_save_track+0x18/0x40
[   17.965674]  kasan_save_alloc_info+0x3b/0x50
[   17.966021]  __kasan_kmalloc+0xb7/0xc0
[   17.966404]  __kmalloc_cache_noprof+0x189/0x420
[   17.966758]  copy_to_kernel_nofault_oob+0x12f/0x560
[   17.967013]  kunit_try_run_case+0x1a5/0x480
[   17.968013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.968422]  kthread+0x337/0x6f0
[   17.968720]  ret_from_fork+0x116/0x1d0
[   17.969305]  ret_from_fork_asm+0x1a/0x30
[   17.969627] 
[   17.969908] The buggy address belongs to the object at ffff888102abe500
[   17.969908]  which belongs to the cache kmalloc-128 of size 128
[   17.970608] The buggy address is located 0 bytes to the right of
[   17.970608]  allocated 120-byte region [ffff888102abe500, ffff888102abe578)
[   17.971597] 
[   17.972130] The buggy address belongs to the physical page:
[   17.972483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102abe
[   17.973204] flags: 0x200000000000000(node=0|zone=2)
[   17.973544] page_type: f5(slab)
[   17.973917] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.974610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.975145] page dumped because: kasan: bad access detected
[   17.975427] 
[   17.975643] Memory state around the buggy address:
[   17.976054]  ffff888102abe400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.976962]  ffff888102abe480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.977739] >ffff888102abe500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.978131]                                                                 ^
[   17.978480]  ffff888102abe580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.978724]  ffff888102abe600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.979438] ==================================================================

[   17.856849] ==================================================================
[   17.857525] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   17.857950] Read of size 8 at addr ffff8881031c0a78 by task kunit_try_catch/298
[   17.858357] 
[   17.858561] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.858615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.858630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.858656] Call Trace:
[   17.858671]  <TASK>
[   17.858689]  dump_stack_lvl+0x73/0xb0
[   17.858763]  print_report+0xd1/0x650
[   17.858791]  ? __virt_addr_valid+0x1db/0x2d0
[   17.858818]  ? copy_to_kernel_nofault+0x225/0x260
[   17.858883]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.858939]  ? copy_to_kernel_nofault+0x225/0x260
[   17.858966]  kasan_report+0x141/0x180
[   17.858990]  ? copy_to_kernel_nofault+0x225/0x260
[   17.859022]  __asan_report_load8_noabort+0x18/0x20
[   17.859060]  copy_to_kernel_nofault+0x225/0x260
[   17.859087]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   17.859114]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   17.859176]  ? finish_task_switch.isra.0+0x153/0x700
[   17.859203]  ? __schedule+0x10cc/0x2b60
[   17.859226]  ? trace_hardirqs_on+0x37/0xe0
[   17.859261]  ? __pfx_read_tsc+0x10/0x10
[   17.859285]  ? ktime_get_ts64+0x86/0x230
[   17.859313]  kunit_try_run_case+0x1a5/0x480
[   17.859340]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.859364]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.859389]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.859415]  ? __kthread_parkme+0x82/0x180
[   17.859437]  ? preempt_count_sub+0x50/0x80
[   17.859463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.859488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.859514]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.859539]  kthread+0x337/0x6f0
[   17.859561]  ? trace_preempt_on+0x20/0xc0
[   17.859586]  ? __pfx_kthread+0x10/0x10
[   17.859610]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.859634]  ? calculate_sigpending+0x7b/0xa0
[   17.859662]  ? __pfx_kthread+0x10/0x10
[   17.859687]  ret_from_fork+0x116/0x1d0
[   17.859747]  ? __pfx_kthread+0x10/0x10
[   17.859787]  ret_from_fork_asm+0x1a/0x30
[   17.859822]  </TASK>
[   17.859837] 
[   17.878182] Allocated by task 298:
[   17.878380]  kasan_save_stack+0x45/0x70
[   17.878577]  kasan_save_track+0x18/0x40
[   17.879219]  kasan_save_alloc_info+0x3b/0x50
[   17.879462]  __kasan_kmalloc+0xb7/0xc0
[   17.879642]  __kmalloc_cache_noprof+0x189/0x420
[   17.880021]  copy_to_kernel_nofault_oob+0x12f/0x560
[   17.880225]  kunit_try_run_case+0x1a5/0x480
[   17.880440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.880701]  kthread+0x337/0x6f0
[   17.880966]  ret_from_fork+0x116/0x1d0
[   17.881204]  ret_from_fork_asm+0x1a/0x30
[   17.881390] 
[   17.881478] The buggy address belongs to the object at ffff8881031c0a00
[   17.881478]  which belongs to the cache kmalloc-128 of size 128
[   17.882206] The buggy address is located 0 bytes to the right of
[   17.882206]  allocated 120-byte region [ffff8881031c0a00, ffff8881031c0a78)
[   17.882714] 
[   17.882836] The buggy address belongs to the physical page:
[   17.883014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   17.883531] flags: 0x200000000000000(node=0|zone=2)
[   17.884118] page_type: f5(slab)
[   17.884315] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.884616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.885382] page dumped because: kasan: bad access detected
[   17.886110] 
[   17.886220] Memory state around the buggy address:
[   17.886516]  ffff8881031c0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.887261]  ffff8881031c0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.887916] >ffff8881031c0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.888394]                                                                 ^
[   17.888975]  ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.889307]  ffff8881031c0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.889611] ==================================================================
[   17.892275] ==================================================================
[   17.892626] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   17.893746] Write of size 8 at addr ffff8881031c0a78 by task kunit_try_catch/298
[   17.894453] 
[   17.894683] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   17.894748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.894764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.894786] Call Trace:
[   17.894801]  <TASK>
[   17.894818]  dump_stack_lvl+0x73/0xb0
[   17.894849]  print_report+0xd1/0x650
[   17.894873]  ? __virt_addr_valid+0x1db/0x2d0
[   17.894897]  ? copy_to_kernel_nofault+0x99/0x260
[   17.894923]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.894951]  ? copy_to_kernel_nofault+0x99/0x260
[   17.894976]  kasan_report+0x141/0x180
[   17.895000]  ? copy_to_kernel_nofault+0x99/0x260
[   17.895031]  kasan_check_range+0x10c/0x1c0
[   17.895069]  __kasan_check_write+0x18/0x20
[   17.895090]  copy_to_kernel_nofault+0x99/0x260
[   17.895116]  copy_to_kernel_nofault_oob+0x288/0x560
[   17.895143]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   17.895167]  ? finish_task_switch.isra.0+0x153/0x700
[   17.895191]  ? __schedule+0x10cc/0x2b60
[   17.895214]  ? trace_hardirqs_on+0x37/0xe0
[   17.895248]  ? __pfx_read_tsc+0x10/0x10
[   17.895271]  ? ktime_get_ts64+0x86/0x230
[   17.895296]  kunit_try_run_case+0x1a5/0x480
[   17.895322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.895346]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.895370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.895395]  ? __kthread_parkme+0x82/0x180
[   17.895417]  ? preempt_count_sub+0x50/0x80
[   17.895442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.895467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.895492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.895517]  kthread+0x337/0x6f0
[   17.895538]  ? trace_preempt_on+0x20/0xc0
[   17.895563]  ? __pfx_kthread+0x10/0x10
[   17.895585]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.895608]  ? calculate_sigpending+0x7b/0xa0
[   17.895634]  ? __pfx_kthread+0x10/0x10
[   17.895657]  ret_from_fork+0x116/0x1d0
[   17.895677]  ? __pfx_kthread+0x10/0x10
[   17.895699]  ret_from_fork_asm+0x1a/0x30
[   17.895899]  </TASK>
[   17.895918] 
[   17.909400] Allocated by task 298:
[   17.909575]  kasan_save_stack+0x45/0x70
[   17.909797]  kasan_save_track+0x18/0x40
[   17.910090]  kasan_save_alloc_info+0x3b/0x50
[   17.910314]  __kasan_kmalloc+0xb7/0xc0
[   17.910522]  __kmalloc_cache_noprof+0x189/0x420
[   17.910752]  copy_to_kernel_nofault_oob+0x12f/0x560
[   17.910949]  kunit_try_run_case+0x1a5/0x480
[   17.911298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.911653]  kthread+0x337/0x6f0
[   17.911986]  ret_from_fork+0x116/0x1d0
[   17.912246]  ret_from_fork_asm+0x1a/0x30
[   17.912413] 
[   17.912522] The buggy address belongs to the object at ffff8881031c0a00
[   17.912522]  which belongs to the cache kmalloc-128 of size 128
[   17.913069] The buggy address is located 0 bytes to the right of
[   17.913069]  allocated 120-byte region [ffff8881031c0a00, ffff8881031c0a78)
[   17.913614] 
[   17.913707] The buggy address belongs to the physical page:
[   17.914253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0
[   17.914586] flags: 0x200000000000000(node=0|zone=2)
[   17.914875] page_type: f5(slab)
[   17.915096] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   17.915428] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.915700] page dumped because: kasan: bad access detected
[   17.916028] 
[   17.916119] Memory state around the buggy address:
[   17.916285]  ffff8881031c0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.916592]  ffff8881031c0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.916920] >ffff8881031c0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.917358]                                                                 ^
[   17.917611]  ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.918123]  ffff8881031c0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.918468] ==================================================================

[   76.353990] ==================================================================
[   76.361240] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   76.368554] Write of size 8 at addr ffff888100cff178 by task kunit_try_catch/322
[   76.375948] 
[   76.377449] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   76.377458] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   76.377461] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   76.377465] Call Trace:
[   76.377466]  <TASK>
[   76.377468]  dump_stack_lvl+0x73/0xb0
[   76.377473]  print_report+0xd1/0x650
[   76.377477]  ? __virt_addr_valid+0x1db/0x2d0
[   76.377482]  ? copy_to_kernel_nofault+0x99/0x260
[   76.377486]  ? kasan_complete_mode_report_info+0x2a/0x200
[   76.377492]  ? copy_to_kernel_nofault+0x99/0x260
[   76.377496]  kasan_report+0x141/0x180
[   76.377500]  ? copy_to_kernel_nofault+0x99/0x260
[   76.377506]  kasan_check_range+0x10c/0x1c0
[   76.377510]  __kasan_check_write+0x18/0x20
[   76.377514]  copy_to_kernel_nofault+0x99/0x260
[   76.377519]  copy_to_kernel_nofault_oob+0x288/0x560
[   76.377523]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   76.377528]  ? finish_task_switch.isra.0+0x153/0x700
[   76.377532]  ? __schedule+0x10cc/0x2b60
[   76.377536]  ? trace_hardirqs_on+0x37/0xe0
[   76.377542]  ? ktime_get_ts64+0x83/0x230
[   76.377546]  kunit_try_run_case+0x1a2/0x480
[   76.377551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.377556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   76.377560]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   76.377564]  ? __kthread_parkme+0x82/0x180
[   76.377568]  ? preempt_count_sub+0x50/0x80
[   76.377573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   76.377577]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.377582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   76.377586]  kthread+0x334/0x6f0
[   76.377590]  ? trace_preempt_on+0x20/0xc0
[   76.377594]  ? __pfx_kthread+0x10/0x10
[   76.377598]  ? _raw_spin_unlock_irq+0x47/0x80
[   76.377602]  ? calculate_sigpending+0x7b/0xa0
[   76.377606]  ? __pfx_kthread+0x10/0x10
[   76.377611]  ret_from_fork+0x113/0x1d0
[   76.377614]  ? __pfx_kthread+0x10/0x10
[   76.377618]  ret_from_fork_asm+0x1a/0x30
[   76.377624]  </TASK>
[   76.377626] 
[   76.561967] Allocated by task 322:
[   76.565373]  kasan_save_stack+0x45/0x70
[   76.569212]  kasan_save_track+0x18/0x40
[   76.573051]  kasan_save_alloc_info+0x3b/0x50
[   76.577325]  __kasan_kmalloc+0xb7/0xc0
[   76.581111]  __kmalloc_cache_noprof+0x189/0x420
[   76.585646]  copy_to_kernel_nofault_oob+0x12f/0x560
[   76.590534]  kunit_try_run_case+0x1a2/0x480
[   76.594726]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.600126]  kthread+0x334/0x6f0
[   76.603363]  ret_from_fork+0x113/0x1d0
[   76.607122]  ret_from_fork_asm+0x1a/0x30
[   76.611055] 
[   76.612555] The buggy address belongs to the object at ffff888100cff100
[   76.612555]  which belongs to the cache kmalloc-128 of size 128
[   76.625070] The buggy address is located 0 bytes to the right of
[   76.625070]  allocated 120-byte region [ffff888100cff100, ffff888100cff178)
[   76.638025] 
[   76.639524] The buggy address belongs to the physical page:
[   76.645099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cff
[   76.653105] flags: 0x200000000000000(node=0|zone=2)
[   76.657984] page_type: f5(slab)
[   76.661133] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   76.668881] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   76.676628] page dumped because: kasan: bad access detected
[   76.682199] 
[   76.683698] Memory state around the buggy address:
[   76.688493]  ffff888100cff000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.695721]  ffff888100cff080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.702948] >ffff888100cff100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   76.710166]                                                                 ^
[   76.717298]  ffff888100cff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.724519]  ffff888100cff200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.731738] ==================================================================
[   75.964511] ==================================================================
[   75.979398] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   75.986806] Read of size 8 at addr ffff888100cff178 by task kunit_try_catch/322
[   75.994112] 
[   75.995613] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G S  B            N  6.16.0-rc5 #1 PREEMPT(voluntary) 
[   75.995622] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST
[   75.995626] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[   75.995629] Call Trace:
[   75.995631]  <TASK>
[   75.995633]  dump_stack_lvl+0x73/0xb0
[   75.995639]  print_report+0xd1/0x650
[   75.995643]  ? __virt_addr_valid+0x1db/0x2d0
[   75.995647]  ? copy_to_kernel_nofault+0x225/0x260
[   75.995652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   75.995657]  ? copy_to_kernel_nofault+0x225/0x260
[   75.995662]  kasan_report+0x141/0x180
[   75.995666]  ? copy_to_kernel_nofault+0x225/0x260
[   75.995672]  __asan_report_load8_noabort+0x18/0x20
[   75.995677]  copy_to_kernel_nofault+0x225/0x260
[   75.995681]  copy_to_kernel_nofault_oob+0x1ed/0x560
[   75.995686]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   75.995690]  ? finish_task_switch.isra.0+0x153/0x700
[   75.995695]  ? __schedule+0x10cc/0x2b60
[   75.995699]  ? trace_hardirqs_on+0x37/0xe0
[   75.995705]  ? ktime_get_ts64+0x83/0x230
[   75.995709]  kunit_try_run_case+0x1a2/0x480
[   75.995714]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.995718]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   75.995723]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   75.995727]  ? __kthread_parkme+0x82/0x180
[   75.995731]  ? preempt_count_sub+0x50/0x80
[   75.995736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   75.995740]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   75.995745]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   75.995749]  kthread+0x334/0x6f0
[   75.995753]  ? trace_preempt_on+0x20/0xc0
[   75.995757]  ? __pfx_kthread+0x10/0x10
[   75.995761]  ? _raw_spin_unlock_irq+0x47/0x80
[   75.995765]  ? calculate_sigpending+0x7b/0xa0
[   75.995770]  ? __pfx_kthread+0x10/0x10
[   75.995774]  ret_from_fork+0x113/0x1d0
[   75.995777]  ? __pfx_kthread+0x10/0x10
[   75.995781]  ret_from_fork_asm+0x1a/0x30
[   75.995787]  </TASK>
[   75.995789] 
[   76.176952] Allocated by task 322:
[   76.180372]  kasan_save_stack+0x45/0x70
[   76.184225]  kasan_save_track+0x18/0x40
[   76.188062]  kasan_save_alloc_info+0x3b/0x50
[   76.192350]  __kasan_kmalloc+0xb7/0xc0
[   76.196133]  __kmalloc_cache_noprof+0x189/0x420
[   76.200674]  copy_to_kernel_nofault_oob+0x12f/0x560
[   76.205561]  kunit_try_run_case+0x1a2/0x480
[   76.209746]  kunit_generic_run_threadfn_adapter+0x82/0xf0
[   76.215146]  kthread+0x334/0x6f0
[   76.218387]  ret_from_fork+0x113/0x1d0
[   76.222140]  ret_from_fork_asm+0x1a/0x30
[   76.226066] 
[   76.227565] The buggy address belongs to the object at ffff888100cff100
[   76.227565]  which belongs to the cache kmalloc-128 of size 128
[   76.240080] The buggy address is located 0 bytes to the right of
[   76.240080]  allocated 120-byte region [ffff888100cff100, ffff888100cff178)
[   76.253028] 
[   76.254527] The buggy address belongs to the physical page:
[   76.260100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cff
[   76.268109] flags: 0x200000000000000(node=0|zone=2)
[   76.272996] page_type: f5(slab)
[   76.276142] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000
[   76.283883] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   76.291631] page dumped because: kasan: bad access detected
[   76.297203] 
[   76.298701] Memory state around the buggy address:
[   76.303496]  ffff888100cff000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.310721]  ffff888100cff080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.317942] >ffff888100cff100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   76.325162]                                                                 ^
[   76.332303]  ffff888100cff180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.339520]  ffff888100cff200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.346739] ==================================================================