Hay
Date
July 17, 2025, 11:11 p.m.

Environment
qemu-arm64
qemu-x86_64

[   18.988607] ==================================================================
[   18.990297] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.990347] Write of size 8 at addr fff00000c6562248 by task kunit_try_catch/261
[   18.990397] 
[   18.990427] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.995542] Read of size 8 at addr fff00000c6562248 by task kunit_try_catch/261
[   18.999262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.003784]  kasan_bitops_generic+0x110/0x1c8
[   19.003834]  kunit_try_run_case+0x170/0x3f0
[   19.003914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.003968]  kthread+0x328/0x630
[   19.004010]  ret_from_fork+0x10/0x20
[   19.004065] 
[   19.004473]  kasan_bitops_generic+0xa0/0x1c8
[   19.004513]  kunit_try_run_case+0x170/0x3f0
[   19.004796] The buggy address is located 8 bytes inside of
[   19.004796]  allocated 9-byte region [fff00000c6562240, fff00000c6562249)
[   19.005573] page dumped because: kasan: bad access detected
[   19.005950] >fff00000c6562200: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc
[   19.006922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.010715]  kasan_save_track+0x20/0x40
[   19.011465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.015682]  kasan_report+0xdc/0x128
[   19.017429]  __kasan_kmalloc+0xd4/0xd8
[   19.017912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106562
[   19.020922] ==================================================================

[   14.466840] ==================================================================
[   14.467252] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.468083] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.468478] 
[   14.468787] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.468835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.468915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.468940] Call Trace:
[   14.468958]  <TASK>
[   14.468976]  dump_stack_lvl+0x73/0xb0
[   14.469007]  print_report+0xd1/0x610
[   14.469029]  ? __virt_addr_valid+0x1db/0x2d0
[   14.469115]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.469142]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.469165]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.469191]  kasan_report+0x141/0x180
[   14.469212]  ? kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.469243]  kasan_check_range+0x10c/0x1c0
[   14.469267]  __kasan_check_write+0x18/0x20
[   14.469285]  kasan_bitops_modify.constprop.0+0x4ac/0xd50
[   14.469310]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.469337]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.469360]  ? trace_hardirqs_on+0x37/0xe0
[   14.469383]  ? kasan_bitops_generic+0x92/0x1c0
[   14.469410]  kasan_bitops_generic+0x116/0x1c0
[   14.469434]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.469458]  ? __pfx_read_tsc+0x10/0x10
[   14.469478]  ? ktime_get_ts64+0x86/0x230
[   14.469502]  kunit_try_run_case+0x1a5/0x480
[   14.469526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.469547]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.469572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.469606]  ? __kthread_parkme+0x82/0x180
[   14.469627]  ? preempt_count_sub+0x50/0x80
[   14.469652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.469675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.469699]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.469722]  kthread+0x337/0x6f0
[   14.469740]  ? trace_preempt_on+0x20/0xc0
[   14.469761]  ? __pfx_kthread+0x10/0x10
[   14.469781]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.469802]  ? calculate_sigpending+0x7b/0xa0
[   14.469827]  ? __pfx_kthread+0x10/0x10
[   14.469847]  ret_from_fork+0x116/0x1d0
[   14.469865]  ? __pfx_kthread+0x10/0x10
[   14.469884]  ret_from_fork_asm+0x1a/0x30
[   14.469931]  </TASK>
[   14.469941] 
[   14.481654] Allocated by task 278:
[   14.481846]  kasan_save_stack+0x45/0x70
[   14.482128]  kasan_save_track+0x18/0x40
[   14.482431]  kasan_save_alloc_info+0x3b/0x50
[   14.482829]  __kasan_kmalloc+0xb7/0xc0
[   14.483009]  __kmalloc_cache_noprof+0x189/0x420
[   14.483216]  kasan_bitops_generic+0x92/0x1c0
[   14.483435]  kunit_try_run_case+0x1a5/0x480
[   14.483879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.484115]  kthread+0x337/0x6f0
[   14.484472]  ret_from_fork+0x116/0x1d0
[   14.484817]  ret_from_fork_asm+0x1a/0x30
[   14.485154] 
[   14.485401] The buggy address belongs to the object at ffff8881025ee360
[   14.485401]  which belongs to the cache kmalloc-16 of size 16
[   14.486031] The buggy address is located 8 bytes inside of
[   14.486031]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.486834] 
[   14.486952] The buggy address belongs to the physical page:
[   14.487400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.487865] flags: 0x200000000000000(node=0|zone=2)
[   14.488200] page_type: f5(slab)
[   14.488469] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.489079] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.489510] page dumped because: kasan: bad access detected
[   14.489850] 
[   14.489949] Memory state around the buggy address:
[   14.490282]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.490554]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.491138] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.491535]                                                           ^
[   14.492062]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492467]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492852] ==================================================================
[   14.334693] ==================================================================
[   14.335197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.335542] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.335881] 
[   14.336000] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.336048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.336069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.336093] Call Trace:
[   14.336105]  <TASK>
[   14.336124]  dump_stack_lvl+0x73/0xb0
[   14.336155]  print_report+0xd1/0x610
[   14.336179]  ? __virt_addr_valid+0x1db/0x2d0
[   14.336202]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.336228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.336250]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.336276]  kasan_report+0x141/0x180
[   14.336299]  ? kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.336331]  kasan_check_range+0x10c/0x1c0
[   14.336355]  __kasan_check_write+0x18/0x20
[   14.336374]  kasan_bitops_modify.constprop.0+0x101/0xd50
[   14.336399]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.336426]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.336451]  ? trace_hardirqs_on+0x37/0xe0
[   14.336473]  ? kasan_bitops_generic+0x92/0x1c0
[   14.336500]  kasan_bitops_generic+0x116/0x1c0
[   14.336523]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.336548]  ? __pfx_read_tsc+0x10/0x10
[   14.336590]  ? ktime_get_ts64+0x86/0x230
[   14.336616]  kunit_try_run_case+0x1a5/0x480
[   14.336641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.336663]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.336687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.336710]  ? __kthread_parkme+0x82/0x180
[   14.336731]  ? preempt_count_sub+0x50/0x80
[   14.336756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.336779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.336803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.336827]  kthread+0x337/0x6f0
[   14.336845]  ? trace_preempt_on+0x20/0xc0
[   14.336866]  ? __pfx_kthread+0x10/0x10
[   14.336886]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.336907]  ? calculate_sigpending+0x7b/0xa0
[   14.336931]  ? __pfx_kthread+0x10/0x10
[   14.336952]  ret_from_fork+0x116/0x1d0
[   14.336971]  ? __pfx_kthread+0x10/0x10
[   14.336990]  ret_from_fork_asm+0x1a/0x30
[   14.337023]  </TASK>
[   14.337034] 
[   14.344645] Allocated by task 278:
[   14.344841]  kasan_save_stack+0x45/0x70
[   14.345042]  kasan_save_track+0x18/0x40
[   14.345204]  kasan_save_alloc_info+0x3b/0x50
[   14.345410]  __kasan_kmalloc+0xb7/0xc0
[   14.345565]  __kmalloc_cache_noprof+0x189/0x420
[   14.345745]  kasan_bitops_generic+0x92/0x1c0
[   14.345895]  kunit_try_run_case+0x1a5/0x480
[   14.346118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.346374]  kthread+0x337/0x6f0
[   14.346545]  ret_from_fork+0x116/0x1d0
[   14.346755]  ret_from_fork_asm+0x1a/0x30
[   14.346952] 
[   14.347045] The buggy address belongs to the object at ffff8881025ee360
[   14.347045]  which belongs to the cache kmalloc-16 of size 16
[   14.347486] The buggy address is located 8 bytes inside of
[   14.347486]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.347864] 
[   14.347940] The buggy address belongs to the physical page:
[   14.348139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.348493] flags: 0x200000000000000(node=0|zone=2)
[   14.348759] page_type: f5(slab)
[   14.348932] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.349292] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.349624] page dumped because: kasan: bad access detected
[   14.349851] 
[   14.349933] Memory state around the buggy address:
[   14.350146]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.350369]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.350656] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.350970]                                                           ^
[   14.351274]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.351551]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.351785] ==================================================================
[   14.370933] ==================================================================
[   14.371332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.372145] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.372402] 
[   14.372514] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.372557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.372589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.372613] Call Trace:
[   14.372624]  <TASK>
[   14.372713]  dump_stack_lvl+0x73/0xb0
[   14.372744]  print_report+0xd1/0x610
[   14.372767]  ? __virt_addr_valid+0x1db/0x2d0
[   14.372789]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.372814]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.372837]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.372863]  kasan_report+0x141/0x180
[   14.372884]  ? kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.372915]  kasan_check_range+0x10c/0x1c0
[   14.372938]  __kasan_check_write+0x18/0x20
[   14.372956]  kasan_bitops_modify.constprop.0+0x23a/0xd50
[   14.373011]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.373037]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.373123]  ? trace_hardirqs_on+0x37/0xe0
[   14.373147]  ? kasan_bitops_generic+0x92/0x1c0
[   14.373264]  kasan_bitops_generic+0x116/0x1c0
[   14.373291]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.373316]  ? __pfx_read_tsc+0x10/0x10
[   14.373336]  ? ktime_get_ts64+0x86/0x230
[   14.373360]  kunit_try_run_case+0x1a5/0x480
[   14.373385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.373406]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.373431]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.373454]  ? __kthread_parkme+0x82/0x180
[   14.373475]  ? preempt_count_sub+0x50/0x80
[   14.373893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.373920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.373945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.373969]  kthread+0x337/0x6f0
[   14.373988]  ? trace_preempt_on+0x20/0xc0
[   14.374010]  ? __pfx_kthread+0x10/0x10
[   14.374029]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.374062]  ? calculate_sigpending+0x7b/0xa0
[   14.374086]  ? __pfx_kthread+0x10/0x10
[   14.374107]  ret_from_fork+0x116/0x1d0
[   14.374125]  ? __pfx_kthread+0x10/0x10
[   14.374145]  ret_from_fork_asm+0x1a/0x30
[   14.374176]  </TASK>
[   14.374186] 
[   14.385252] Allocated by task 278:
[   14.385420]  kasan_save_stack+0x45/0x70
[   14.385845]  kasan_save_track+0x18/0x40
[   14.386123]  kasan_save_alloc_info+0x3b/0x50
[   14.386434]  __kasan_kmalloc+0xb7/0xc0
[   14.386738]  __kmalloc_cache_noprof+0x189/0x420
[   14.387040]  kasan_bitops_generic+0x92/0x1c0
[   14.387326]  kunit_try_run_case+0x1a5/0x480
[   14.387493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.387837]  kthread+0x337/0x6f0
[   14.388002]  ret_from_fork+0x116/0x1d0
[   14.388197]  ret_from_fork_asm+0x1a/0x30
[   14.388386] 
[   14.388467] The buggy address belongs to the object at ffff8881025ee360
[   14.388467]  which belongs to the cache kmalloc-16 of size 16
[   14.389385] The buggy address is located 8 bytes inside of
[   14.389385]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.390121] 
[   14.390249] The buggy address belongs to the physical page:
[   14.390672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.391107] flags: 0x200000000000000(node=0|zone=2)
[   14.391335] page_type: f5(slab)
[   14.391496] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.392024] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.392455] page dumped because: kasan: bad access detected
[   14.392831] 
[   14.392930] Memory state around the buggy address:
[   14.393293]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.393725]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.394133] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.394415]                                                           ^
[   14.394849]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.395215]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.395614] ==================================================================
[   14.440794] ==================================================================
[   14.441147] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.441466] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.441788] 
[   14.441894] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.441951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.441963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.441984] Call Trace:
[   14.441995]  <TASK>
[   14.442013]  dump_stack_lvl+0x73/0xb0
[   14.442044]  print_report+0xd1/0x610
[   14.442077]  ? __virt_addr_valid+0x1db/0x2d0
[   14.442101]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.442126]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.442148]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.442174]  kasan_report+0x141/0x180
[   14.442195]  ? kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.442231]  kasan_check_range+0x10c/0x1c0
[   14.442254]  __kasan_check_write+0x18/0x20
[   14.442273]  kasan_bitops_modify.constprop.0+0x40e/0xd50
[   14.442298]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.442325]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.442351]  ? trace_hardirqs_on+0x37/0xe0
[   14.442374]  ? kasan_bitops_generic+0x92/0x1c0
[   14.442402]  kasan_bitops_generic+0x116/0x1c0
[   14.442426]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.442449]  ? __pfx_read_tsc+0x10/0x10
[   14.442470]  ? ktime_get_ts64+0x86/0x230
[   14.442494]  kunit_try_run_case+0x1a5/0x480
[   14.442519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.442542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.442567]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.442994]  ? __kthread_parkme+0x82/0x180
[   14.443023]  ? preempt_count_sub+0x50/0x80
[   14.443048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.443087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.443111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.443235]  kthread+0x337/0x6f0
[   14.443259]  ? trace_preempt_on+0x20/0xc0
[   14.443281]  ? __pfx_kthread+0x10/0x10
[   14.443301]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.443323]  ? calculate_sigpending+0x7b/0xa0
[   14.443348]  ? __pfx_kthread+0x10/0x10
[   14.443369]  ret_from_fork+0x116/0x1d0
[   14.443388]  ? __pfx_kthread+0x10/0x10
[   14.443408]  ret_from_fork_asm+0x1a/0x30
[   14.443442]  </TASK>
[   14.443452] 
[   14.456269] Allocated by task 278:
[   14.456527]  kasan_save_stack+0x45/0x70
[   14.456778]  kasan_save_track+0x18/0x40
[   14.456977]  kasan_save_alloc_info+0x3b/0x50
[   14.457171]  __kasan_kmalloc+0xb7/0xc0
[   14.457363]  __kmalloc_cache_noprof+0x189/0x420
[   14.457538]  kasan_bitops_generic+0x92/0x1c0
[   14.457860]  kunit_try_run_case+0x1a5/0x480
[   14.458138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.458402]  kthread+0x337/0x6f0
[   14.458570]  ret_from_fork+0x116/0x1d0
[   14.458826]  ret_from_fork_asm+0x1a/0x30
[   14.459028] 
[   14.459133] The buggy address belongs to the object at ffff8881025ee360
[   14.459133]  which belongs to the cache kmalloc-16 of size 16
[   14.459557] The buggy address is located 8 bytes inside of
[   14.459557]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.460108] 
[   14.460239] The buggy address belongs to the physical page:
[   14.460572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.460966] flags: 0x200000000000000(node=0|zone=2)
[   14.461234] page_type: f5(slab)
[   14.461411] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.461780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.462065] page dumped because: kasan: bad access detected
[   14.462264] 
[   14.462357] Memory state around the buggy address:
[   14.462642]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.463194]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.463568] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.463845]                                                           ^
[   14.464482]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.465132]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.465398] ==================================================================
[   14.495104] ==================================================================
[   14.495544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.495825] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.496334] 
[   14.496460] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.496507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.496518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.496540] Call Trace:
[   14.496558]  <TASK>
[   14.496578]  dump_stack_lvl+0x73/0xb0
[   14.496607]  print_report+0xd1/0x610
[   14.496630]  ? __virt_addr_valid+0x1db/0x2d0
[   14.496653]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.496678]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.496702]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.496729]  kasan_report+0x141/0x180
[   14.496750]  ? kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.496782]  kasan_check_range+0x10c/0x1c0
[   14.496805]  __kasan_check_write+0x18/0x20
[   14.496823]  kasan_bitops_modify.constprop.0+0x547/0xd50
[   14.496849]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.496876]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.496900]  ? trace_hardirqs_on+0x37/0xe0
[   14.496922]  ? kasan_bitops_generic+0x92/0x1c0
[   14.496950]  kasan_bitops_generic+0x116/0x1c0
[   14.496974]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.496999]  ? __pfx_read_tsc+0x10/0x10
[   14.497019]  ? ktime_get_ts64+0x86/0x230
[   14.497043]  kunit_try_run_case+0x1a5/0x480
[   14.497080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.497102]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.497126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.497150]  ? __kthread_parkme+0x82/0x180
[   14.497170]  ? preempt_count_sub+0x50/0x80
[   14.497195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.497219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.497243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.497267]  kthread+0x337/0x6f0
[   14.497286]  ? trace_preempt_on+0x20/0xc0
[   14.497308]  ? __pfx_kthread+0x10/0x10
[   14.497327]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.497349]  ? calculate_sigpending+0x7b/0xa0
[   14.497373]  ? __pfx_kthread+0x10/0x10
[   14.497394]  ret_from_fork+0x116/0x1d0
[   14.497413]  ? __pfx_kthread+0x10/0x10
[   14.497433]  ret_from_fork_asm+0x1a/0x30
[   14.497467]  </TASK>
[   14.497478] 
[   14.508651] Allocated by task 278:
[   14.508890]  kasan_save_stack+0x45/0x70
[   14.509118]  kasan_save_track+0x18/0x40
[   14.509322]  kasan_save_alloc_info+0x3b/0x50
[   14.509533]  __kasan_kmalloc+0xb7/0xc0
[   14.509755]  __kmalloc_cache_noprof+0x189/0x420
[   14.509916]  kasan_bitops_generic+0x92/0x1c0
[   14.510074]  kunit_try_run_case+0x1a5/0x480
[   14.510268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.510524]  kthread+0x337/0x6f0
[   14.511093]  ret_from_fork+0x116/0x1d0
[   14.511239]  ret_from_fork_asm+0x1a/0x30
[   14.511606] 
[   14.511875] The buggy address belongs to the object at ffff8881025ee360
[   14.511875]  which belongs to the cache kmalloc-16 of size 16
[   14.512411] The buggy address is located 8 bytes inside of
[   14.512411]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.512924] 
[   14.513037] The buggy address belongs to the physical page:
[   14.513254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.513913] flags: 0x200000000000000(node=0|zone=2)
[   14.514222] page_type: f5(slab)
[   14.514533] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.514889] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.515205] page dumped because: kasan: bad access detected
[   14.515431] 
[   14.515505] Memory state around the buggy address:
[   14.515902]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.516290]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.516540] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.517014]                                                           ^
[   14.517392]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.517697]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.518085] ==================================================================
[   14.352466] ==================================================================
[   14.353247] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.353661] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.354001] 
[   14.354128] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.354172] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.354183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.354205] Call Trace:
[   14.354227]  <TASK>
[   14.354245]  dump_stack_lvl+0x73/0xb0
[   14.354273]  print_report+0xd1/0x610
[   14.354294]  ? __virt_addr_valid+0x1db/0x2d0
[   14.354317]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.354342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.354365]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.354391]  kasan_report+0x141/0x180
[   14.354412]  ? kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.354443]  kasan_check_range+0x10c/0x1c0
[   14.354466]  __kasan_check_write+0x18/0x20
[   14.354484]  kasan_bitops_modify.constprop.0+0x19c/0xd50
[   14.354510]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.354537]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.354560]  ? trace_hardirqs_on+0x37/0xe0
[   14.354611]  ? kasan_bitops_generic+0x92/0x1c0
[   14.354638]  kasan_bitops_generic+0x116/0x1c0
[   14.354661]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.354686]  ? __pfx_read_tsc+0x10/0x10
[   14.354707]  ? ktime_get_ts64+0x86/0x230
[   14.354731]  kunit_try_run_case+0x1a5/0x480
[   14.354755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.354777]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.354801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.354824]  ? __kthread_parkme+0x82/0x180
[   14.354844]  ? preempt_count_sub+0x50/0x80
[   14.354869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.354892]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.354915]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.354939]  kthread+0x337/0x6f0
[   14.354958]  ? trace_preempt_on+0x20/0xc0
[   14.354978]  ? __pfx_kthread+0x10/0x10
[   14.354998]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.355018]  ? calculate_sigpending+0x7b/0xa0
[   14.355042]  ? __pfx_kthread+0x10/0x10
[   14.355072]  ret_from_fork+0x116/0x1d0
[   14.355090]  ? __pfx_kthread+0x10/0x10
[   14.355110]  ret_from_fork_asm+0x1a/0x30
[   14.355142]  </TASK>
[   14.355153] 
[   14.362691] Allocated by task 278:
[   14.362871]  kasan_save_stack+0x45/0x70
[   14.363080]  kasan_save_track+0x18/0x40
[   14.363266]  kasan_save_alloc_info+0x3b/0x50
[   14.363478]  __kasan_kmalloc+0xb7/0xc0
[   14.363693]  __kmalloc_cache_noprof+0x189/0x420
[   14.363914]  kasan_bitops_generic+0x92/0x1c0
[   14.364135]  kunit_try_run_case+0x1a5/0x480
[   14.364330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.364546]  kthread+0x337/0x6f0
[   14.364731]  ret_from_fork+0x116/0x1d0
[   14.364874]  ret_from_fork_asm+0x1a/0x30
[   14.365088] 
[   14.365182] The buggy address belongs to the object at ffff8881025ee360
[   14.365182]  which belongs to the cache kmalloc-16 of size 16
[   14.365565] The buggy address is located 8 bytes inside of
[   14.365565]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.365938] 
[   14.366028] The buggy address belongs to the physical page:
[   14.366290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.366669] flags: 0x200000000000000(node=0|zone=2)
[   14.366906] page_type: f5(slab)
[   14.367082] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.367422] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.367742] page dumped because: kasan: bad access detected
[   14.367919] 
[   14.367988] Memory state around the buggy address:
[   14.368177]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.368495]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.368841] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.369173]                                                           ^
[   14.369481]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.369832]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.370142] ==================================================================
[   14.396921] ==================================================================
[   14.397270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.397621] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.397953] 
[   14.398073] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.398119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.398131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.398153] Call Trace:
[   14.398172]  <TASK>
[   14.398191]  dump_stack_lvl+0x73/0xb0
[   14.398225]  print_report+0xd1/0x610
[   14.398248]  ? __virt_addr_valid+0x1db/0x2d0
[   14.398271]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.398296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.398319]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.398345]  kasan_report+0x141/0x180
[   14.398366]  ? kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.398398]  kasan_check_range+0x10c/0x1c0
[   14.398421]  __kasan_check_write+0x18/0x20
[   14.398440]  kasan_bitops_modify.constprop.0+0x2d5/0xd50
[   14.398465]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.398491]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.398515]  ? trace_hardirqs_on+0x37/0xe0
[   14.398537]  ? kasan_bitops_generic+0x92/0x1c0
[   14.398565]  kasan_bitops_generic+0x116/0x1c0
[   14.398600]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.398625]  ? __pfx_read_tsc+0x10/0x10
[   14.398648]  ? ktime_get_ts64+0x86/0x230
[   14.398672]  kunit_try_run_case+0x1a5/0x480
[   14.398695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.398717]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.398741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.398763]  ? __kthread_parkme+0x82/0x180
[   14.398783]  ? preempt_count_sub+0x50/0x80
[   14.398807]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.398831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.398854]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.398878]  kthread+0x337/0x6f0
[   14.398896]  ? trace_preempt_on+0x20/0xc0
[   14.398917]  ? __pfx_kthread+0x10/0x10
[   14.398937]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.398958]  ? calculate_sigpending+0x7b/0xa0
[   14.398982]  ? __pfx_kthread+0x10/0x10
[   14.399002]  ret_from_fork+0x116/0x1d0
[   14.399020]  ? __pfx_kthread+0x10/0x10
[   14.399039]  ret_from_fork_asm+0x1a/0x30
[   14.399082]  </TASK>
[   14.399091] 
[   14.406810] Allocated by task 278:
[   14.406937]  kasan_save_stack+0x45/0x70
[   14.407222]  kasan_save_track+0x18/0x40
[   14.407416]  kasan_save_alloc_info+0x3b/0x50
[   14.407631]  __kasan_kmalloc+0xb7/0xc0
[   14.407823]  __kmalloc_cache_noprof+0x189/0x420
[   14.408086]  kasan_bitops_generic+0x92/0x1c0
[   14.408256]  kunit_try_run_case+0x1a5/0x480
[   14.408453]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.408753]  kthread+0x337/0x6f0
[   14.408919]  ret_from_fork+0x116/0x1d0
[   14.409092]  ret_from_fork_asm+0x1a/0x30
[   14.409265] 
[   14.409338] The buggy address belongs to the object at ffff8881025ee360
[   14.409338]  which belongs to the cache kmalloc-16 of size 16
[   14.409865] The buggy address is located 8 bytes inside of
[   14.409865]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.410354] 
[   14.410453] The buggy address belongs to the physical page:
[   14.410660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.411047] flags: 0x200000000000000(node=0|zone=2)
[   14.411283] page_type: f5(slab)
[   14.411426] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.411694] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.412857] page dumped because: kasan: bad access detected
[   14.413091] 
[   14.413163] Memory state around the buggy address:
[   14.413321]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.413625]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.413918] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.414139]                                                           ^
[   14.414345]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.415136]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.415480] ==================================================================
[   14.417881] ==================================================================
[   14.418234] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.418576] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278
[   14.418939] 
[   14.419033] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT(voluntary) 
[   14.419089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.419100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.419122] Call Trace:
[   14.419139]  <TASK>
[   14.419157]  dump_stack_lvl+0x73/0xb0
[   14.419186]  print_report+0xd1/0x610
[   14.419208]  ? __virt_addr_valid+0x1db/0x2d0
[   14.419231]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.419256]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.419278]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.419304]  kasan_report+0x141/0x180
[   14.419325]  ? kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.419356]  kasan_check_range+0x10c/0x1c0
[   14.419379]  __kasan_check_write+0x18/0x20
[   14.419397]  kasan_bitops_modify.constprop.0+0x373/0xd50
[   14.419424]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.419451]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.419475]  ? trace_hardirqs_on+0x37/0xe0
[   14.419497]  ? kasan_bitops_generic+0x92/0x1c0
[   14.419525]  kasan_bitops_generic+0x116/0x1c0
[   14.419550]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.419575]  ? __pfx_read_tsc+0x10/0x10
[   14.419611]  ? ktime_get_ts64+0x86/0x230
[   14.419637]  kunit_try_run_case+0x1a5/0x480
[   14.419662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.419684]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.419708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.419731]  ? __kthread_parkme+0x82/0x180
[   14.419751]  ? preempt_count_sub+0x50/0x80
[   14.419776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.419798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.419822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.419847]  kthread+0x337/0x6f0
[   14.419865]  ? trace_preempt_on+0x20/0xc0
[   14.419886]  ? __pfx_kthread+0x10/0x10
[   14.419906]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.419926]  ? calculate_sigpending+0x7b/0xa0
[   14.419950]  ? __pfx_kthread+0x10/0x10
[   14.419971]  ret_from_fork+0x116/0x1d0
[   14.419989]  ? __pfx_kthread+0x10/0x10
[   14.420008]  ret_from_fork_asm+0x1a/0x30
[   14.420041]  </TASK>
[   14.420061] 
[   14.429902] Allocated by task 278:
[   14.430088]  kasan_save_stack+0x45/0x70
[   14.430295]  kasan_save_track+0x18/0x40
[   14.430485]  kasan_save_alloc_info+0x3b/0x50
[   14.430971]  __kasan_kmalloc+0xb7/0xc0
[   14.431159]  __kmalloc_cache_noprof+0x189/0x420
[   14.431477]  kasan_bitops_generic+0x92/0x1c0
[   14.431790]  kunit_try_run_case+0x1a5/0x480
[   14.432041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.432357]  kthread+0x337/0x6f0
[   14.432490]  ret_from_fork+0x116/0x1d0
[   14.432777]  ret_from_fork_asm+0x1a/0x30
[   14.433012] 
[   14.433122] The buggy address belongs to the object at ffff8881025ee360
[   14.433122]  which belongs to the cache kmalloc-16 of size 16
[   14.433756] The buggy address is located 8 bytes inside of
[   14.433756]  allocated 9-byte region [ffff8881025ee360, ffff8881025ee369)
[   14.434267] 
[   14.434349] The buggy address belongs to the physical page:
[   14.434582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee
[   14.434914] flags: 0x200000000000000(node=0|zone=2)
[   14.435142] page_type: f5(slab)
[   14.435296] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   14.435594] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   14.436409] page dumped because: kasan: bad access detected
[   14.436678] 
[   14.436906] Memory state around the buggy address:
[   14.437110]  ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc
[   14.437514]  ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   14.437898] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   14.438294]                                                           ^
[   14.438530]  ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.439099]  ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.439466] ==================================================================