Date
July 6, 2025, 11:09 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 | |
x86 |
[ 20.264870] ================================================================== [ 20.266404] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 20.266512] Write of size 1 at addr fff00000c77ac378 by task kunit_try_catch/286 [ 20.266563] [ 20.266600] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.267224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.267263] Hardware name: linux,dummy-virt (DT) [ 20.267324] Call trace: [ 20.267348] show_stack+0x20/0x38 (C) [ 20.267399] dump_stack_lvl+0x8c/0xd0 [ 20.267657] print_report+0x118/0x608 [ 20.267942] kasan_report+0xdc/0x128 [ 20.268262] __asan_report_store1_noabort+0x20/0x30 [ 20.268484] strncpy_from_user+0x270/0x2a0 [ 20.268544] copy_user_test_oob+0x5c0/0xec8 [ 20.268855] kunit_try_run_case+0x170/0x3f0 [ 20.268938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.269125] kthread+0x328/0x630 [ 20.269265] ret_from_fork+0x10/0x20 [ 20.269593] [ 20.269626] Allocated by task 286: [ 20.269658] kasan_save_stack+0x3c/0x68 [ 20.270177] kasan_save_track+0x20/0x40 [ 20.270442] kasan_save_alloc_info+0x40/0x58 [ 20.270508] __kasan_kmalloc+0xd4/0xd8 [ 20.270549] __kmalloc_noprof+0x198/0x4c8 [ 20.271043] kunit_kmalloc_array+0x34/0x88 [ 20.271100] copy_user_test_oob+0xac/0xec8 [ 20.271142] kunit_try_run_case+0x170/0x3f0 [ 20.271182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.271227] kthread+0x328/0x630 [ 20.271261] ret_from_fork+0x10/0x20 [ 20.271998] [ 20.272185] The buggy address belongs to the object at fff00000c77ac300 [ 20.272185] which belongs to the cache kmalloc-128 of size 128 [ 20.272349] The buggy address is located 0 bytes to the right of [ 20.272349] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.272539] [ 20.272658] The buggy address belongs to the physical page: [ 20.272869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.273161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.273736] page_type: f5(slab) [ 20.273937] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.274039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.274420] page dumped because: kasan: bad access detected [ 20.274496] [ 20.274562] Memory state around the buggy address: [ 20.274937] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.275205] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.275347] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.275393] ^ [ 20.275578] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.275866] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.276125] ================================================================== [ 20.254544] ================================================================== [ 20.254995] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 20.255341] Write of size 121 at addr fff00000c77ac300 by task kunit_try_catch/286 [ 20.255397] [ 20.255429] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 20.256056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.256685] Hardware name: linux,dummy-virt (DT) [ 20.256913] Call trace: [ 20.256939] show_stack+0x20/0x38 (C) [ 20.257151] dump_stack_lvl+0x8c/0xd0 [ 20.257388] print_report+0x118/0x608 [ 20.257437] kasan_report+0xdc/0x128 [ 20.257484] kasan_check_range+0x100/0x1a8 [ 20.257532] __kasan_check_write+0x20/0x30 [ 20.257578] strncpy_from_user+0x3c/0x2a0 [ 20.258084] copy_user_test_oob+0x5c0/0xec8 [ 20.258161] kunit_try_run_case+0x170/0x3f0 [ 20.258215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.258270] kthread+0x328/0x630 [ 20.258571] ret_from_fork+0x10/0x20 [ 20.258695] [ 20.258716] Allocated by task 286: [ 20.258906] kasan_save_stack+0x3c/0x68 [ 20.258956] kasan_save_track+0x20/0x40 [ 20.259121] kasan_save_alloc_info+0x40/0x58 [ 20.259199] __kasan_kmalloc+0xd4/0xd8 [ 20.259241] __kmalloc_noprof+0x198/0x4c8 [ 20.259280] kunit_kmalloc_array+0x34/0x88 [ 20.259319] copy_user_test_oob+0xac/0xec8 [ 20.259499] kunit_try_run_case+0x170/0x3f0 [ 20.259939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.260189] kthread+0x328/0x630 [ 20.260224] ret_from_fork+0x10/0x20 [ 20.260262] [ 20.260489] The buggy address belongs to the object at fff00000c77ac300 [ 20.260489] which belongs to the cache kmalloc-128 of size 128 [ 20.260777] The buggy address is located 0 bytes inside of [ 20.260777] allocated 120-byte region [fff00000c77ac300, fff00000c77ac378) [ 20.260912] [ 20.261063] The buggy address belongs to the physical page: [ 20.261120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 20.261405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.261630] page_type: f5(slab) [ 20.261673] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.261726] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.262047] page dumped because: kasan: bad access detected [ 20.262240] [ 20.262296] Memory state around the buggy address: [ 20.262656] fff00000c77ac200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.262724] fff00000c77ac280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.262854] >fff00000c77ac300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.263064] ^ [ 20.263120] fff00000c77ac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.263175] fff00000c77ac400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.263598] ==================================================================
[ 19.847384] ================================================================== [ 19.847457] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 19.847516] Write of size 1 at addr fff00000c76c9378 by task kunit_try_catch/286 [ 19.847718] [ 19.847857] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.847970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.847999] Hardware name: linux,dummy-virt (DT) [ 19.848035] Call trace: [ 19.848299] show_stack+0x20/0x38 (C) [ 19.848418] dump_stack_lvl+0x8c/0xd0 [ 19.848469] print_report+0x118/0x608 [ 19.848696] kasan_report+0xdc/0x128 [ 19.848947] __asan_report_store1_noabort+0x20/0x30 [ 19.849148] strncpy_from_user+0x270/0x2a0 [ 19.849254] copy_user_test_oob+0x5c0/0xec8 [ 19.849363] kunit_try_run_case+0x170/0x3f0 [ 19.849490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.849562] kthread+0x328/0x630 [ 19.849631] ret_from_fork+0x10/0x20 [ 19.849705] [ 19.849856] Allocated by task 286: [ 19.850067] kasan_save_stack+0x3c/0x68 [ 19.850140] kasan_save_track+0x20/0x40 [ 19.850454] kasan_save_alloc_info+0x40/0x58 [ 19.850541] __kasan_kmalloc+0xd4/0xd8 [ 19.850603] __kmalloc_noprof+0x198/0x4c8 [ 19.850719] kunit_kmalloc_array+0x34/0x88 [ 19.850787] copy_user_test_oob+0xac/0xec8 [ 19.850924] kunit_try_run_case+0x170/0x3f0 [ 19.850977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.851053] kthread+0x328/0x630 [ 19.851169] ret_from_fork+0x10/0x20 [ 19.851212] [ 19.851234] The buggy address belongs to the object at fff00000c76c9300 [ 19.851234] which belongs to the cache kmalloc-128 of size 128 [ 19.851308] The buggy address is located 0 bytes to the right of [ 19.851308] allocated 120-byte region [fff00000c76c9300, fff00000c76c9378) [ 19.851579] [ 19.851743] The buggy address belongs to the physical page: [ 19.851826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9 [ 19.852137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.852350] page_type: f5(slab) [ 19.852420] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.852492] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.852725] page dumped because: kasan: bad access detected [ 19.852841] [ 19.852881] Memory state around the buggy address: [ 19.852929] fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.853257] fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.853473] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.853566] ^ [ 19.853686] fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.853741] fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.853881] ================================================================== [ 19.841739] ================================================================== [ 19.841788] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 19.841851] Write of size 121 at addr fff00000c76c9300 by task kunit_try_catch/286 [ 19.841907] [ 19.841950] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT [ 19.842031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.842059] Hardware name: linux,dummy-virt (DT) [ 19.842090] Call trace: [ 19.842125] show_stack+0x20/0x38 (C) [ 19.842175] dump_stack_lvl+0x8c/0xd0 [ 19.842223] print_report+0x118/0x608 [ 19.842278] kasan_report+0xdc/0x128 [ 19.842326] kasan_check_range+0x100/0x1a8 [ 19.842374] __kasan_check_write+0x20/0x30 [ 19.842423] strncpy_from_user+0x3c/0x2a0 [ 19.842483] copy_user_test_oob+0x5c0/0xec8 [ 19.842532] kunit_try_run_case+0x170/0x3f0 [ 19.842587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.842642] kthread+0x328/0x630 [ 19.842686] ret_from_fork+0x10/0x20 [ 19.842734] [ 19.842754] Allocated by task 286: [ 19.842784] kasan_save_stack+0x3c/0x68 [ 19.842823] kasan_save_track+0x20/0x40 [ 19.842869] kasan_save_alloc_info+0x40/0x58 [ 19.842920] __kasan_kmalloc+0xd4/0xd8 [ 19.843450] __kmalloc_noprof+0x198/0x4c8 [ 19.843490] kunit_kmalloc_array+0x34/0x88 [ 19.843537] copy_user_test_oob+0xac/0xec8 [ 19.843577] kunit_try_run_case+0x170/0x3f0 [ 19.843615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.843660] kthread+0x328/0x630 [ 19.843693] ret_from_fork+0x10/0x20 [ 19.843731] [ 19.843752] The buggy address belongs to the object at fff00000c76c9300 [ 19.843752] which belongs to the cache kmalloc-128 of size 128 [ 19.843923] The buggy address is located 0 bytes inside of [ 19.843923] allocated 120-byte region [fff00000c76c9300, fff00000c76c9378) [ 19.844033] [ 19.844124] The buggy address belongs to the physical page: [ 19.844206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c9 [ 19.844395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.844471] page_type: f5(slab) [ 19.844618] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.844797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.844886] page dumped because: kasan: bad access detected [ 19.845159] [ 19.845198] Memory state around the buggy address: [ 19.845329] fff00000c76c9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.845396] fff00000c76c9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.845462] >fff00000c76c9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.845511] ^ [ 19.845773] fff00000c76c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.845827] fff00000c76c9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.845963] ==================================================================
[ 18.199338] ================================================================== [ 18.200386] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 18.200843] Write of size 1 at addr ffff88810254dc78 by task kunit_try_catch/303 [ 18.201348] [ 18.201523] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 18.201610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.201650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.201691] Call Trace: [ 18.201726] <TASK> [ 18.201756] dump_stack_lvl+0x73/0xb0 [ 18.201817] print_report+0xd1/0x650 [ 18.201855] ? __virt_addr_valid+0x1db/0x2d0 [ 18.201890] ? strncpy_from_user+0x1a5/0x1d0 [ 18.201940] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.201986] ? strncpy_from_user+0x1a5/0x1d0 [ 18.202032] kasan_report+0x141/0x180 [ 18.202078] ? strncpy_from_user+0x1a5/0x1d0 [ 18.202132] __asan_report_store1_noabort+0x1b/0x30 [ 18.202179] strncpy_from_user+0x1a5/0x1d0 [ 18.202247] copy_user_test_oob+0x760/0x10f0 [ 18.202300] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.202324] ? finish_task_switch.isra.0+0x153/0x700 [ 18.202354] ? __switch_to+0x47/0xf50 [ 18.202381] ? __schedule+0x10cc/0x2b60 [ 18.202402] ? __pfx_read_tsc+0x10/0x10 [ 18.202422] ? ktime_get_ts64+0x86/0x230 [ 18.202445] kunit_try_run_case+0x1a5/0x480 [ 18.202469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.202489] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.202511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.202532] ? __kthread_parkme+0x82/0x180 [ 18.202551] ? preempt_count_sub+0x50/0x80 [ 18.202573] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.202594] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.202632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.202657] kthread+0x337/0x6f0 [ 18.202677] ? trace_preempt_on+0x20/0xc0 [ 18.202699] ? __pfx_kthread+0x10/0x10 [ 18.202719] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.202738] ? calculate_sigpending+0x7b/0xa0 [ 18.202761] ? __pfx_kthread+0x10/0x10 [ 18.202781] ret_from_fork+0x116/0x1d0 [ 18.202799] ? __pfx_kthread+0x10/0x10 [ 18.202818] ret_from_fork_asm+0x1a/0x30 [ 18.202847] </TASK> [ 18.202862] [ 18.213022] Allocated by task 303: [ 18.213336] kasan_save_stack+0x45/0x70 [ 18.213938] kasan_save_track+0x18/0x40 [ 18.214795] kasan_save_alloc_info+0x3b/0x50 [ 18.215071] __kasan_kmalloc+0xb7/0xc0 [ 18.215743] __kmalloc_noprof+0x1c9/0x500 [ 18.215920] kunit_kmalloc_array+0x25/0x60 [ 18.216229] copy_user_test_oob+0xab/0x10f0 [ 18.216837] kunit_try_run_case+0x1a5/0x480 [ 18.217166] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.217514] kthread+0x337/0x6f0 [ 18.217783] ret_from_fork+0x116/0x1d0 [ 18.218010] ret_from_fork_asm+0x1a/0x30 [ 18.218272] [ 18.218784] The buggy address belongs to the object at ffff88810254dc00 [ 18.218784] which belongs to the cache kmalloc-128 of size 128 [ 18.219264] The buggy address is located 0 bytes to the right of [ 18.219264] allocated 120-byte region [ffff88810254dc00, ffff88810254dc78) [ 18.219707] [ 18.219834] The buggy address belongs to the physical page: [ 18.220507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d [ 18.220859] flags: 0x200000000000000(node=0|zone=2) [ 18.221101] page_type: f5(slab) [ 18.221654] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.222097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.222682] page dumped because: kasan: bad access detected [ 18.222963] [ 18.223120] Memory state around the buggy address: [ 18.223666] ffff88810254db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.224268] ffff88810254db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.224559] >ffff88810254dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.224984] ^ [ 18.225698] ffff88810254dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.226275] ffff88810254dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.226497] ================================================================== [ 18.171636] ================================================================== [ 18.172565] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 18.172854] Write of size 121 at addr ffff88810254dc00 by task kunit_try_catch/303 [ 18.173470] [ 18.173736] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 18.173840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.173871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.173919] Call Trace: [ 18.173957] <TASK> [ 18.173994] dump_stack_lvl+0x73/0xb0 [ 18.174056] print_report+0xd1/0x650 [ 18.174113] ? __virt_addr_valid+0x1db/0x2d0 [ 18.174164] ? strncpy_from_user+0x2e/0x1d0 [ 18.174212] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.174255] ? strncpy_from_user+0x2e/0x1d0 [ 18.174292] kasan_report+0x141/0x180 [ 18.174334] ? strncpy_from_user+0x2e/0x1d0 [ 18.174381] kasan_check_range+0x10c/0x1c0 [ 18.174423] __kasan_check_write+0x18/0x20 [ 18.174462] strncpy_from_user+0x2e/0x1d0 [ 18.174503] ? __kasan_check_read+0x15/0x20 [ 18.174536] copy_user_test_oob+0x760/0x10f0 [ 18.174584] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.174632] ? finish_task_switch.isra.0+0x153/0x700 [ 18.174669] ? __switch_to+0x47/0xf50 [ 18.174708] ? __schedule+0x10cc/0x2b60 [ 18.174744] ? __pfx_read_tsc+0x10/0x10 [ 18.174779] ? ktime_get_ts64+0x86/0x230 [ 18.174822] kunit_try_run_case+0x1a5/0x480 [ 18.174863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.174900] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 18.174938] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 18.174974] ? __kthread_parkme+0x82/0x180 [ 18.175008] ? preempt_count_sub+0x50/0x80 [ 18.175051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.175091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.175131] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.175169] kthread+0x337/0x6f0 [ 18.175202] ? trace_preempt_on+0x20/0xc0 [ 18.175243] ? __pfx_kthread+0x10/0x10 [ 18.175279] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.175314] ? calculate_sigpending+0x7b/0xa0 [ 18.175356] ? __pfx_kthread+0x10/0x10 [ 18.175393] ret_from_fork+0x116/0x1d0 [ 18.175426] ? __pfx_kthread+0x10/0x10 [ 18.175459] ret_from_fork_asm+0x1a/0x30 [ 18.175510] </TASK> [ 18.175533] [ 18.185790] Allocated by task 303: [ 18.185966] kasan_save_stack+0x45/0x70 [ 18.186245] kasan_save_track+0x18/0x40 [ 18.186538] kasan_save_alloc_info+0x3b/0x50 [ 18.186879] __kasan_kmalloc+0xb7/0xc0 [ 18.187224] __kmalloc_noprof+0x1c9/0x500 [ 18.187550] kunit_kmalloc_array+0x25/0x60 [ 18.187891] copy_user_test_oob+0xab/0x10f0 [ 18.188271] kunit_try_run_case+0x1a5/0x480 [ 18.188574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.188972] kthread+0x337/0x6f0 [ 18.189277] ret_from_fork+0x116/0x1d0 [ 18.189581] ret_from_fork_asm+0x1a/0x30 [ 18.189899] [ 18.190082] The buggy address belongs to the object at ffff88810254dc00 [ 18.190082] which belongs to the cache kmalloc-128 of size 128 [ 18.190922] The buggy address is located 0 bytes inside of [ 18.190922] allocated 120-byte region [ffff88810254dc00, ffff88810254dc78) [ 18.191832] [ 18.192051] The buggy address belongs to the physical page: [ 18.192477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10254d [ 18.193057] flags: 0x200000000000000(node=0|zone=2) [ 18.193646] page_type: f5(slab) [ 18.193867] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.194153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.194548] page dumped because: kasan: bad access detected [ 18.194944] [ 18.195061] Memory state around the buggy address: [ 18.195238] ffff88810254db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.196234] ffff88810254db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.196470] >ffff88810254dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.197073] ^ [ 18.197663] ffff88810254dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.197965] ffff88810254dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.198640] ==================================================================
[ 18.109459] ================================================================== [ 18.110083] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 18.110406] Write of size 1 at addr ffff8881031c0b78 by task kunit_try_catch/302 [ 18.110711] [ 18.110977] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 18.111024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.111039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.111074] Call Trace: [ 18.111093] <TASK> [ 18.111113] dump_stack_lvl+0x73/0xb0 [ 18.111295] print_report+0xd1/0x650 [ 18.111322] ? __virt_addr_valid+0x1db/0x2d0 [ 18.111347] ? strncpy_from_user+0x1a5/0x1d0 [ 18.111373] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.111401] ? strncpy_from_user+0x1a5/0x1d0 [ 18.111428] kasan_report+0x141/0x180 [ 18.111452] ? strncpy_from_user+0x1a5/0x1d0 [ 18.111483] __asan_report_store1_noabort+0x1b/0x30 [ 18.111511] strncpy_from_user+0x1a5/0x1d0 [ 18.111539] copy_user_test_oob+0x760/0x10f0 [ 18.111570] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.111596] ? __kasan_check_write+0x18/0x20 [ 18.111618] ? queued_spin_lock_slowpath+0x116/0xb40 [ 18.111643] ? irqentry_exit+0x2a/0x60 [ 18.111667] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 18.111693] ? trace_hardirqs_on+0x37/0xe0 [ 18.111719] ? __pfx_read_tsc+0x10/0x10 [ 18.111743] ? ktime_get_ts64+0x86/0x230 [ 18.111770] kunit_try_run_case+0x1a5/0x480 [ 18.111796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.111823] ? queued_spin_lock_slowpath+0x116/0xb40 [ 18.111847] ? __kthread_parkme+0x82/0x180 [ 18.111869] ? preempt_count_sub+0x50/0x80 [ 18.111895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.111920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.111946] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.111971] kthread+0x337/0x6f0 [ 18.111993] ? trace_preempt_on+0x20/0xc0 [ 18.112017] ? __pfx_kthread+0x10/0x10 [ 18.112040] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.112074] ? calculate_sigpending+0x7b/0xa0 [ 18.112101] ? __pfx_kthread+0x10/0x10 [ 18.112125] ret_from_fork+0x116/0x1d0 [ 18.112145] ? __pfx_kthread+0x10/0x10 [ 18.112169] ret_from_fork_asm+0x1a/0x30 [ 18.112202] </TASK> [ 18.112217] [ 18.121722] Allocated by task 302: [ 18.122039] kasan_save_stack+0x45/0x70 [ 18.122243] kasan_save_track+0x18/0x40 [ 18.122426] kasan_save_alloc_info+0x3b/0x50 [ 18.122630] __kasan_kmalloc+0xb7/0xc0 [ 18.123060] __kmalloc_noprof+0x1c9/0x500 [ 18.123310] kunit_kmalloc_array+0x25/0x60 [ 18.123583] copy_user_test_oob+0xab/0x10f0 [ 18.123873] kunit_try_run_case+0x1a5/0x480 [ 18.124155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.124364] kthread+0x337/0x6f0 [ 18.124671] ret_from_fork+0x116/0x1d0 [ 18.124818] ret_from_fork_asm+0x1a/0x30 [ 18.124961] [ 18.126245] The buggy address belongs to the object at ffff8881031c0b00 [ 18.126245] which belongs to the cache kmalloc-128 of size 128 [ 18.126960] The buggy address is located 0 bytes to the right of [ 18.126960] allocated 120-byte region [ffff8881031c0b00, ffff8881031c0b78) [ 18.127359] [ 18.127438] The buggy address belongs to the physical page: [ 18.127615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0 [ 18.127861] flags: 0x200000000000000(node=0|zone=2) [ 18.128293] page_type: f5(slab) [ 18.128660] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.129306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.130070] page dumped because: kasan: bad access detected [ 18.130533] [ 18.130691] Memory state around the buggy address: [ 18.131102] ffff8881031c0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.131950] ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.132237] >ffff8881031c0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.132454] ^ [ 18.133218] ffff8881031c0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.133716] ffff8881031c0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.133982] ================================================================== [ 18.085991] ================================================================== [ 18.086281] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 18.086612] Write of size 121 at addr ffff8881031c0b00 by task kunit_try_catch/302 [ 18.087377] [ 18.087609] CPU: 1 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 18.087656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 18.087669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 18.087691] Call Trace: [ 18.087771] <TASK> [ 18.087793] dump_stack_lvl+0x73/0xb0 [ 18.087825] print_report+0xd1/0x650 [ 18.087850] ? __virt_addr_valid+0x1db/0x2d0 [ 18.087875] ? strncpy_from_user+0x2e/0x1d0 [ 18.087901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 18.087931] ? strncpy_from_user+0x2e/0x1d0 [ 18.087957] kasan_report+0x141/0x180 [ 18.087982] ? strncpy_from_user+0x2e/0x1d0 [ 18.088013] kasan_check_range+0x10c/0x1c0 [ 18.088039] __kasan_check_write+0x18/0x20 [ 18.088073] strncpy_from_user+0x2e/0x1d0 [ 18.088098] ? __kasan_check_read+0x15/0x20 [ 18.088122] copy_user_test_oob+0x760/0x10f0 [ 18.088151] ? __pfx_copy_user_test_oob+0x10/0x10 [ 18.088180] ? __kasan_check_write+0x18/0x20 [ 18.088201] ? queued_spin_lock_slowpath+0x116/0xb40 [ 18.088227] ? irqentry_exit+0x2a/0x60 [ 18.088250] ? sysvec_apic_timer_interrupt+0x50/0x90 [ 18.088276] ? trace_hardirqs_on+0x37/0xe0 [ 18.088302] ? __pfx_read_tsc+0x10/0x10 [ 18.088324] ? ktime_get_ts64+0x86/0x230 [ 18.088351] kunit_try_run_case+0x1a5/0x480 [ 18.088377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.088404] ? queued_spin_lock_slowpath+0x116/0xb40 [ 18.088430] ? __kthread_parkme+0x82/0x180 [ 18.088452] ? preempt_count_sub+0x50/0x80 [ 18.088477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 18.088502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.088526] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 18.088552] kthread+0x337/0x6f0 [ 18.088574] ? trace_preempt_on+0x20/0xc0 [ 18.088598] ? __pfx_kthread+0x10/0x10 [ 18.088620] ? _raw_spin_unlock_irq+0x47/0x80 [ 18.088644] ? calculate_sigpending+0x7b/0xa0 [ 18.088670] ? __pfx_kthread+0x10/0x10 [ 18.088694] ret_from_fork+0x116/0x1d0 [ 18.088714] ? __pfx_kthread+0x10/0x10 [ 18.088749] ret_from_fork_asm+0x1a/0x30 [ 18.088782] </TASK> [ 18.088795] [ 18.098923] Allocated by task 302: [ 18.099241] kasan_save_stack+0x45/0x70 [ 18.099536] kasan_save_track+0x18/0x40 [ 18.099734] kasan_save_alloc_info+0x3b/0x50 [ 18.100097] __kasan_kmalloc+0xb7/0xc0 [ 18.100283] __kmalloc_noprof+0x1c9/0x500 [ 18.100473] kunit_kmalloc_array+0x25/0x60 [ 18.100657] copy_user_test_oob+0xab/0x10f0 [ 18.101097] kunit_try_run_case+0x1a5/0x480 [ 18.101302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 18.101621] kthread+0x337/0x6f0 [ 18.101803] ret_from_fork+0x116/0x1d0 [ 18.101976] ret_from_fork_asm+0x1a/0x30 [ 18.102331] [ 18.102418] The buggy address belongs to the object at ffff8881031c0b00 [ 18.102418] which belongs to the cache kmalloc-128 of size 128 [ 18.103042] The buggy address is located 0 bytes inside of [ 18.103042] allocated 120-byte region [ffff8881031c0b00, ffff8881031c0b78) [ 18.103532] [ 18.103643] The buggy address belongs to the physical page: [ 18.104157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1031c0 [ 18.104547] flags: 0x200000000000000(node=0|zone=2) [ 18.104783] page_type: f5(slab) [ 18.105081] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 18.105467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 18.105764] page dumped because: kasan: bad access detected [ 18.106126] [ 18.106229] Memory state around the buggy address: [ 18.106545] ffff8881031c0a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 18.106835] ffff8881031c0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.107281] >ffff8881031c0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 18.107588] ^ [ 18.108013] ffff8881031c0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.108433] ffff8881031c0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 18.108794] ==================================================================
[ 79.037519] ================================================================== [ 79.044765] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0 [ 79.051638] Write of size 121 at addr ffff8881066e9300 by task kunit_try_catch/326 [ 79.059213] [ 79.060712] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 79.060720] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 79.060723] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 79.060727] Call Trace: [ 79.060728] <TASK> [ 79.060730] dump_stack_lvl+0x73/0xb0 [ 79.060735] print_report+0xd1/0x650 [ 79.060739] ? __virt_addr_valid+0x1db/0x2d0 [ 79.060743] ? strncpy_from_user+0x2e/0x1d0 [ 79.060747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 79.060753] ? strncpy_from_user+0x2e/0x1d0 [ 79.060757] kasan_report+0x141/0x180 [ 79.060761] ? strncpy_from_user+0x2e/0x1d0 [ 79.060767] kasan_check_range+0x10c/0x1c0 [ 79.060771] __kasan_check_write+0x18/0x20 [ 79.060775] strncpy_from_user+0x2e/0x1d0 [ 79.060779] ? __kasan_check_read+0x15/0x20 [ 79.060783] copy_user_test_oob+0x760/0x10f0 [ 79.060788] ? __pfx_copy_user_test_oob+0x10/0x10 [ 79.060793] ? finish_task_switch.isra.0+0x153/0x700 [ 79.060797] ? __switch_to+0x544/0xf50 [ 79.060802] ? __schedule+0x10cc/0x2b60 [ 79.060806] ? ktime_get_ts64+0x83/0x230 [ 79.060810] kunit_try_run_case+0x1a2/0x480 [ 79.060815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.060819] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 79.060824] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 79.060828] ? __kthread_parkme+0x82/0x180 [ 79.060832] ? preempt_count_sub+0x50/0x80 [ 79.060836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.060841] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.060845] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 79.060850] kthread+0x334/0x6f0 [ 79.060853] ? trace_preempt_on+0x20/0xc0 [ 79.060857] ? __pfx_kthread+0x10/0x10 [ 79.060861] ? _raw_spin_unlock_irq+0x47/0x80 [ 79.060865] ? calculate_sigpending+0x7b/0xa0 [ 79.060870] ? __pfx_kthread+0x10/0x10 [ 79.060874] ret_from_fork+0x113/0x1d0 [ 79.060878] ? __pfx_kthread+0x10/0x10 [ 79.060881] ret_from_fork_asm+0x1a/0x30 [ 79.060887] </TASK> [ 79.060889] [ 79.246046] Allocated by task 326: [ 79.249452] kasan_save_stack+0x45/0x70 [ 79.253293] kasan_save_track+0x18/0x40 [ 79.257133] kasan_save_alloc_info+0x3b/0x50 [ 79.261421] __kasan_kmalloc+0xb7/0xc0 [ 79.265176] __kmalloc_noprof+0x1c9/0x500 [ 79.269189] kunit_kmalloc_array+0x25/0x60 [ 79.273297] copy_user_test_oob+0xab/0x10f0 [ 79.277492] kunit_try_run_case+0x1a2/0x480 [ 79.281684] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.287086] kthread+0x334/0x6f0 [ 79.290325] ret_from_fork+0x113/0x1d0 [ 79.294155] ret_from_fork_asm+0x1a/0x30 [ 79.298081] [ 79.299581] The buggy address belongs to the object at ffff8881066e9300 [ 79.299581] which belongs to the cache kmalloc-128 of size 128 [ 79.312098] The buggy address is located 0 bytes inside of [ 79.312098] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 79.324525] [ 79.326022] The buggy address belongs to the physical page: [ 79.331596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 79.339596] flags: 0x200000000000000(node=0|zone=2) [ 79.344476] page_type: f5(slab) [ 79.347622] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 79.355406] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 79.363150] page dumped because: kasan: bad access detected [ 79.368723] [ 79.370224] Memory state around the buggy address: [ 79.375016] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.382235] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.389456] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 79.396683] ^ [ 79.403815] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.411035] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.418254] ================================================================== [ 79.425481] ================================================================== [ 79.432727] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x1a5/0x1d0 [ 79.439686] Write of size 1 at addr ffff8881066e9378 by task kunit_try_catch/326 [ 79.447080] [ 79.448581] CPU: 3 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G S B N 6.16.0-rc5 #1 PREEMPT(voluntary) [ 79.448589] Tainted: [S]=CPU_OUT_OF_SPEC, [B]=BAD_PAGE, [N]=TEST [ 79.448592] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021 [ 79.448595] Call Trace: [ 79.448597] <TASK> [ 79.448599] dump_stack_lvl+0x73/0xb0 [ 79.448603] print_report+0xd1/0x650 [ 79.448607] ? __virt_addr_valid+0x1db/0x2d0 [ 79.448611] ? strncpy_from_user+0x1a5/0x1d0 [ 79.448616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 79.448621] ? strncpy_from_user+0x1a5/0x1d0 [ 79.448626] kasan_report+0x141/0x180 [ 79.448630] ? strncpy_from_user+0x1a5/0x1d0 [ 79.448635] __asan_report_store1_noabort+0x1b/0x30 [ 79.448640] strncpy_from_user+0x1a5/0x1d0 [ 79.448645] copy_user_test_oob+0x760/0x10f0 [ 79.448650] ? __pfx_copy_user_test_oob+0x10/0x10 [ 79.448655] ? finish_task_switch.isra.0+0x153/0x700 [ 79.448659] ? __switch_to+0x544/0xf50 [ 79.448664] ? __schedule+0x10cc/0x2b60 [ 79.448668] ? ktime_get_ts64+0x83/0x230 [ 79.448672] kunit_try_run_case+0x1a2/0x480 [ 79.448677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.448681] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 79.448686] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 79.448690] ? __kthread_parkme+0x82/0x180 [ 79.448694] ? preempt_count_sub+0x50/0x80 [ 79.448698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 79.448703] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.448707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 79.448712] kthread+0x334/0x6f0 [ 79.448715] ? trace_preempt_on+0x20/0xc0 [ 79.448719] ? __pfx_kthread+0x10/0x10 [ 79.448723] ? _raw_spin_unlock_irq+0x47/0x80 [ 79.448727] ? calculate_sigpending+0x7b/0xa0 [ 79.448732] ? __pfx_kthread+0x10/0x10 [ 79.448736] ret_from_fork+0x113/0x1d0 [ 79.448740] ? __pfx_kthread+0x10/0x10 [ 79.448744] ret_from_fork_asm+0x1a/0x30 [ 79.448749] </TASK> [ 79.448751] [ 79.626763] Allocated by task 326: [ 79.630170] kasan_save_stack+0x45/0x70 [ 79.634011] kasan_save_track+0x18/0x40 [ 79.637857] kasan_save_alloc_info+0x3b/0x50 [ 79.642130] __kasan_kmalloc+0xb7/0xc0 [ 79.645882] __kmalloc_noprof+0x1c9/0x500 [ 79.649896] kunit_kmalloc_array+0x25/0x60 [ 79.653994] copy_user_test_oob+0xab/0x10f0 [ 79.658179] kunit_try_run_case+0x1a2/0x480 [ 79.662380] kunit_generic_run_threadfn_adapter+0x82/0xf0 [ 79.667808] kthread+0x334/0x6f0 [ 79.671041] ret_from_fork+0x113/0x1d0 [ 79.674795] ret_from_fork_asm+0x1a/0x30 [ 79.678720] [ 79.680219] The buggy address belongs to the object at ffff8881066e9300 [ 79.680219] which belongs to the cache kmalloc-128 of size 128 [ 79.692725] The buggy address is located 0 bytes to the right of [ 79.692725] allocated 120-byte region [ffff8881066e9300, ffff8881066e9378) [ 79.705673] [ 79.707174] The buggy address belongs to the physical page: [ 79.712746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e9 [ 79.720755] flags: 0x200000000000000(node=0|zone=2) [ 79.725641] page_type: f5(slab) [ 79.728789] raw: 0200000000000000 ffff888100042a00 dead000000000122 0000000000000000 [ 79.736538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 79.744284] page dumped because: kasan: bad access detected [ 79.749855] [ 79.751363] Memory state around the buggy address: [ 79.756185] ffff8881066e9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 79.763425] ffff8881066e9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.770647] >ffff8881066e9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 79.777868] ^ [ 79.784998] ffff8881066e9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.792218] ffff8881066e9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.799437] ==================================================================