Date
July 17, 2025, 11:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 18.988607] ================================================================== [ 18.990297] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 18.990347] Write of size 8 at addr fff00000c6562248 by task kunit_try_catch/261 [ 18.990397] [ 18.990427] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT [ 18.995542] Read of size 8 at addr fff00000c6562248 by task kunit_try_catch/261 [ 18.999262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.003784] kasan_bitops_generic+0x110/0x1c8 [ 19.003834] kunit_try_run_case+0x170/0x3f0 [ 19.003914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.003968] kthread+0x328/0x630 [ 19.004010] ret_from_fork+0x10/0x20 [ 19.004065] [ 19.004473] kasan_bitops_generic+0xa0/0x1c8 [ 19.004513] kunit_try_run_case+0x170/0x3f0 [ 19.004796] The buggy address is located 8 bytes inside of [ 19.004796] allocated 9-byte region [fff00000c6562240, fff00000c6562249) [ 19.005573] page dumped because: kasan: bad access detected [ 19.005950] >fff00000c6562200: fa fb fc fc 00 04 fc fc 00 01 fc fc fc fc fc fc [ 19.006922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.010715] kasan_save_track+0x20/0x40 [ 19.011465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.015682] kasan_report+0xdc/0x128 [ 19.017429] __kasan_kmalloc+0xd4/0xd8 [ 19.017912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106562 [ 19.020922] ==================================================================
[ 14.466840] ================================================================== [ 14.467252] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.468083] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.468478] [ 14.468787] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.468835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.468915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.468940] Call Trace: [ 14.468958] <TASK> [ 14.468976] dump_stack_lvl+0x73/0xb0 [ 14.469007] print_report+0xd1/0x610 [ 14.469029] ? __virt_addr_valid+0x1db/0x2d0 [ 14.469115] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.469142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.469165] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.469191] kasan_report+0x141/0x180 [ 14.469212] ? kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.469243] kasan_check_range+0x10c/0x1c0 [ 14.469267] __kasan_check_write+0x18/0x20 [ 14.469285] kasan_bitops_modify.constprop.0+0x4ac/0xd50 [ 14.469310] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.469337] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.469360] ? trace_hardirqs_on+0x37/0xe0 [ 14.469383] ? kasan_bitops_generic+0x92/0x1c0 [ 14.469410] kasan_bitops_generic+0x116/0x1c0 [ 14.469434] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.469458] ? __pfx_read_tsc+0x10/0x10 [ 14.469478] ? ktime_get_ts64+0x86/0x230 [ 14.469502] kunit_try_run_case+0x1a5/0x480 [ 14.469526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.469547] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.469572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.469606] ? __kthread_parkme+0x82/0x180 [ 14.469627] ? preempt_count_sub+0x50/0x80 [ 14.469652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.469675] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.469699] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.469722] kthread+0x337/0x6f0 [ 14.469740] ? trace_preempt_on+0x20/0xc0 [ 14.469761] ? __pfx_kthread+0x10/0x10 [ 14.469781] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.469802] ? calculate_sigpending+0x7b/0xa0 [ 14.469827] ? __pfx_kthread+0x10/0x10 [ 14.469847] ret_from_fork+0x116/0x1d0 [ 14.469865] ? __pfx_kthread+0x10/0x10 [ 14.469884] ret_from_fork_asm+0x1a/0x30 [ 14.469931] </TASK> [ 14.469941] [ 14.481654] Allocated by task 278: [ 14.481846] kasan_save_stack+0x45/0x70 [ 14.482128] kasan_save_track+0x18/0x40 [ 14.482431] kasan_save_alloc_info+0x3b/0x50 [ 14.482829] __kasan_kmalloc+0xb7/0xc0 [ 14.483009] __kmalloc_cache_noprof+0x189/0x420 [ 14.483216] kasan_bitops_generic+0x92/0x1c0 [ 14.483435] kunit_try_run_case+0x1a5/0x480 [ 14.483879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.484115] kthread+0x337/0x6f0 [ 14.484472] ret_from_fork+0x116/0x1d0 [ 14.484817] ret_from_fork_asm+0x1a/0x30 [ 14.485154] [ 14.485401] The buggy address belongs to the object at ffff8881025ee360 [ 14.485401] which belongs to the cache kmalloc-16 of size 16 [ 14.486031] The buggy address is located 8 bytes inside of [ 14.486031] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.486834] [ 14.486952] The buggy address belongs to the physical page: [ 14.487400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.487865] flags: 0x200000000000000(node=0|zone=2) [ 14.488200] page_type: f5(slab) [ 14.488469] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.489079] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.489510] page dumped because: kasan: bad access detected [ 14.489850] [ 14.489949] Memory state around the buggy address: [ 14.490282] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.490554] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.491138] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.491535] ^ [ 14.492062] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.492467] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.492852] ================================================================== [ 14.334693] ================================================================== [ 14.335197] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.335542] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.335881] [ 14.336000] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.336048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.336069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.336093] Call Trace: [ 14.336105] <TASK> [ 14.336124] dump_stack_lvl+0x73/0xb0 [ 14.336155] print_report+0xd1/0x610 [ 14.336179] ? __virt_addr_valid+0x1db/0x2d0 [ 14.336202] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.336228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.336250] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.336276] kasan_report+0x141/0x180 [ 14.336299] ? kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.336331] kasan_check_range+0x10c/0x1c0 [ 14.336355] __kasan_check_write+0x18/0x20 [ 14.336374] kasan_bitops_modify.constprop.0+0x101/0xd50 [ 14.336399] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.336426] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.336451] ? trace_hardirqs_on+0x37/0xe0 [ 14.336473] ? kasan_bitops_generic+0x92/0x1c0 [ 14.336500] kasan_bitops_generic+0x116/0x1c0 [ 14.336523] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.336548] ? __pfx_read_tsc+0x10/0x10 [ 14.336590] ? ktime_get_ts64+0x86/0x230 [ 14.336616] kunit_try_run_case+0x1a5/0x480 [ 14.336641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.336663] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.336687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.336710] ? __kthread_parkme+0x82/0x180 [ 14.336731] ? preempt_count_sub+0x50/0x80 [ 14.336756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.336779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.336803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.336827] kthread+0x337/0x6f0 [ 14.336845] ? trace_preempt_on+0x20/0xc0 [ 14.336866] ? __pfx_kthread+0x10/0x10 [ 14.336886] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.336907] ? calculate_sigpending+0x7b/0xa0 [ 14.336931] ? __pfx_kthread+0x10/0x10 [ 14.336952] ret_from_fork+0x116/0x1d0 [ 14.336971] ? __pfx_kthread+0x10/0x10 [ 14.336990] ret_from_fork_asm+0x1a/0x30 [ 14.337023] </TASK> [ 14.337034] [ 14.344645] Allocated by task 278: [ 14.344841] kasan_save_stack+0x45/0x70 [ 14.345042] kasan_save_track+0x18/0x40 [ 14.345204] kasan_save_alloc_info+0x3b/0x50 [ 14.345410] __kasan_kmalloc+0xb7/0xc0 [ 14.345565] __kmalloc_cache_noprof+0x189/0x420 [ 14.345745] kasan_bitops_generic+0x92/0x1c0 [ 14.345895] kunit_try_run_case+0x1a5/0x480 [ 14.346118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.346374] kthread+0x337/0x6f0 [ 14.346545] ret_from_fork+0x116/0x1d0 [ 14.346755] ret_from_fork_asm+0x1a/0x30 [ 14.346952] [ 14.347045] The buggy address belongs to the object at ffff8881025ee360 [ 14.347045] which belongs to the cache kmalloc-16 of size 16 [ 14.347486] The buggy address is located 8 bytes inside of [ 14.347486] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.347864] [ 14.347940] The buggy address belongs to the physical page: [ 14.348139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.348493] flags: 0x200000000000000(node=0|zone=2) [ 14.348759] page_type: f5(slab) [ 14.348932] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.349292] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.349624] page dumped because: kasan: bad access detected [ 14.349851] [ 14.349933] Memory state around the buggy address: [ 14.350146] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.350369] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.350656] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.350970] ^ [ 14.351274] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.351551] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.351785] ================================================================== [ 14.370933] ================================================================== [ 14.371332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.372145] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.372402] [ 14.372514] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.372557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.372589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.372613] Call Trace: [ 14.372624] <TASK> [ 14.372713] dump_stack_lvl+0x73/0xb0 [ 14.372744] print_report+0xd1/0x610 [ 14.372767] ? __virt_addr_valid+0x1db/0x2d0 [ 14.372789] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.372814] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.372837] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.372863] kasan_report+0x141/0x180 [ 14.372884] ? kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.372915] kasan_check_range+0x10c/0x1c0 [ 14.372938] __kasan_check_write+0x18/0x20 [ 14.372956] kasan_bitops_modify.constprop.0+0x23a/0xd50 [ 14.373011] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.373037] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.373123] ? trace_hardirqs_on+0x37/0xe0 [ 14.373147] ? kasan_bitops_generic+0x92/0x1c0 [ 14.373264] kasan_bitops_generic+0x116/0x1c0 [ 14.373291] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.373316] ? __pfx_read_tsc+0x10/0x10 [ 14.373336] ? ktime_get_ts64+0x86/0x230 [ 14.373360] kunit_try_run_case+0x1a5/0x480 [ 14.373385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.373406] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.373431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.373454] ? __kthread_parkme+0x82/0x180 [ 14.373475] ? preempt_count_sub+0x50/0x80 [ 14.373893] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.373920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.373945] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.373969] kthread+0x337/0x6f0 [ 14.373988] ? trace_preempt_on+0x20/0xc0 [ 14.374010] ? __pfx_kthread+0x10/0x10 [ 14.374029] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.374062] ? calculate_sigpending+0x7b/0xa0 [ 14.374086] ? __pfx_kthread+0x10/0x10 [ 14.374107] ret_from_fork+0x116/0x1d0 [ 14.374125] ? __pfx_kthread+0x10/0x10 [ 14.374145] ret_from_fork_asm+0x1a/0x30 [ 14.374176] </TASK> [ 14.374186] [ 14.385252] Allocated by task 278: [ 14.385420] kasan_save_stack+0x45/0x70 [ 14.385845] kasan_save_track+0x18/0x40 [ 14.386123] kasan_save_alloc_info+0x3b/0x50 [ 14.386434] __kasan_kmalloc+0xb7/0xc0 [ 14.386738] __kmalloc_cache_noprof+0x189/0x420 [ 14.387040] kasan_bitops_generic+0x92/0x1c0 [ 14.387326] kunit_try_run_case+0x1a5/0x480 [ 14.387493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.387837] kthread+0x337/0x6f0 [ 14.388002] ret_from_fork+0x116/0x1d0 [ 14.388197] ret_from_fork_asm+0x1a/0x30 [ 14.388386] [ 14.388467] The buggy address belongs to the object at ffff8881025ee360 [ 14.388467] which belongs to the cache kmalloc-16 of size 16 [ 14.389385] The buggy address is located 8 bytes inside of [ 14.389385] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.390121] [ 14.390249] The buggy address belongs to the physical page: [ 14.390672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.391107] flags: 0x200000000000000(node=0|zone=2) [ 14.391335] page_type: f5(slab) [ 14.391496] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.392024] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.392455] page dumped because: kasan: bad access detected [ 14.392831] [ 14.392930] Memory state around the buggy address: [ 14.393293] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.393725] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.394133] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.394415] ^ [ 14.394849] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.395215] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.395614] ================================================================== [ 14.440794] ================================================================== [ 14.441147] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.441466] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.441788] [ 14.441894] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.441951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.441963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.441984] Call Trace: [ 14.441995] <TASK> [ 14.442013] dump_stack_lvl+0x73/0xb0 [ 14.442044] print_report+0xd1/0x610 [ 14.442077] ? __virt_addr_valid+0x1db/0x2d0 [ 14.442101] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.442126] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.442148] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.442174] kasan_report+0x141/0x180 [ 14.442195] ? kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.442231] kasan_check_range+0x10c/0x1c0 [ 14.442254] __kasan_check_write+0x18/0x20 [ 14.442273] kasan_bitops_modify.constprop.0+0x40e/0xd50 [ 14.442298] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.442325] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.442351] ? trace_hardirqs_on+0x37/0xe0 [ 14.442374] ? kasan_bitops_generic+0x92/0x1c0 [ 14.442402] kasan_bitops_generic+0x116/0x1c0 [ 14.442426] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.442449] ? __pfx_read_tsc+0x10/0x10 [ 14.442470] ? ktime_get_ts64+0x86/0x230 [ 14.442494] kunit_try_run_case+0x1a5/0x480 [ 14.442519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.442542] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.442567] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.442994] ? __kthread_parkme+0x82/0x180 [ 14.443023] ? preempt_count_sub+0x50/0x80 [ 14.443048] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.443087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.443111] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.443235] kthread+0x337/0x6f0 [ 14.443259] ? trace_preempt_on+0x20/0xc0 [ 14.443281] ? __pfx_kthread+0x10/0x10 [ 14.443301] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.443323] ? calculate_sigpending+0x7b/0xa0 [ 14.443348] ? __pfx_kthread+0x10/0x10 [ 14.443369] ret_from_fork+0x116/0x1d0 [ 14.443388] ? __pfx_kthread+0x10/0x10 [ 14.443408] ret_from_fork_asm+0x1a/0x30 [ 14.443442] </TASK> [ 14.443452] [ 14.456269] Allocated by task 278: [ 14.456527] kasan_save_stack+0x45/0x70 [ 14.456778] kasan_save_track+0x18/0x40 [ 14.456977] kasan_save_alloc_info+0x3b/0x50 [ 14.457171] __kasan_kmalloc+0xb7/0xc0 [ 14.457363] __kmalloc_cache_noprof+0x189/0x420 [ 14.457538] kasan_bitops_generic+0x92/0x1c0 [ 14.457860] kunit_try_run_case+0x1a5/0x480 [ 14.458138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.458402] kthread+0x337/0x6f0 [ 14.458570] ret_from_fork+0x116/0x1d0 [ 14.458826] ret_from_fork_asm+0x1a/0x30 [ 14.459028] [ 14.459133] The buggy address belongs to the object at ffff8881025ee360 [ 14.459133] which belongs to the cache kmalloc-16 of size 16 [ 14.459557] The buggy address is located 8 bytes inside of [ 14.459557] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.460108] [ 14.460239] The buggy address belongs to the physical page: [ 14.460572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.460966] flags: 0x200000000000000(node=0|zone=2) [ 14.461234] page_type: f5(slab) [ 14.461411] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.461780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.462065] page dumped because: kasan: bad access detected [ 14.462264] [ 14.462357] Memory state around the buggy address: [ 14.462642] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.463194] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.463568] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.463845] ^ [ 14.464482] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.465132] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.465398] ================================================================== [ 14.495104] ================================================================== [ 14.495544] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.495825] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.496334] [ 14.496460] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.496507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.496518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.496540] Call Trace: [ 14.496558] <TASK> [ 14.496578] dump_stack_lvl+0x73/0xb0 [ 14.496607] print_report+0xd1/0x610 [ 14.496630] ? __virt_addr_valid+0x1db/0x2d0 [ 14.496653] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.496678] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.496702] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.496729] kasan_report+0x141/0x180 [ 14.496750] ? kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.496782] kasan_check_range+0x10c/0x1c0 [ 14.496805] __kasan_check_write+0x18/0x20 [ 14.496823] kasan_bitops_modify.constprop.0+0x547/0xd50 [ 14.496849] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.496876] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.496900] ? trace_hardirqs_on+0x37/0xe0 [ 14.496922] ? kasan_bitops_generic+0x92/0x1c0 [ 14.496950] kasan_bitops_generic+0x116/0x1c0 [ 14.496974] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.496999] ? __pfx_read_tsc+0x10/0x10 [ 14.497019] ? ktime_get_ts64+0x86/0x230 [ 14.497043] kunit_try_run_case+0x1a5/0x480 [ 14.497080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.497102] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.497126] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.497150] ? __kthread_parkme+0x82/0x180 [ 14.497170] ? preempt_count_sub+0x50/0x80 [ 14.497195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.497219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.497243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.497267] kthread+0x337/0x6f0 [ 14.497286] ? trace_preempt_on+0x20/0xc0 [ 14.497308] ? __pfx_kthread+0x10/0x10 [ 14.497327] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.497349] ? calculate_sigpending+0x7b/0xa0 [ 14.497373] ? __pfx_kthread+0x10/0x10 [ 14.497394] ret_from_fork+0x116/0x1d0 [ 14.497413] ? __pfx_kthread+0x10/0x10 [ 14.497433] ret_from_fork_asm+0x1a/0x30 [ 14.497467] </TASK> [ 14.497478] [ 14.508651] Allocated by task 278: [ 14.508890] kasan_save_stack+0x45/0x70 [ 14.509118] kasan_save_track+0x18/0x40 [ 14.509322] kasan_save_alloc_info+0x3b/0x50 [ 14.509533] __kasan_kmalloc+0xb7/0xc0 [ 14.509755] __kmalloc_cache_noprof+0x189/0x420 [ 14.509916] kasan_bitops_generic+0x92/0x1c0 [ 14.510074] kunit_try_run_case+0x1a5/0x480 [ 14.510268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.510524] kthread+0x337/0x6f0 [ 14.511093] ret_from_fork+0x116/0x1d0 [ 14.511239] ret_from_fork_asm+0x1a/0x30 [ 14.511606] [ 14.511875] The buggy address belongs to the object at ffff8881025ee360 [ 14.511875] which belongs to the cache kmalloc-16 of size 16 [ 14.512411] The buggy address is located 8 bytes inside of [ 14.512411] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.512924] [ 14.513037] The buggy address belongs to the physical page: [ 14.513254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.513913] flags: 0x200000000000000(node=0|zone=2) [ 14.514222] page_type: f5(slab) [ 14.514533] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.514889] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.515205] page dumped because: kasan: bad access detected [ 14.515431] [ 14.515505] Memory state around the buggy address: [ 14.515902] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.516290] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.516540] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.517014] ^ [ 14.517392] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.517697] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.518085] ================================================================== [ 14.352466] ================================================================== [ 14.353247] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.353661] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.354001] [ 14.354128] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.354172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.354183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.354205] Call Trace: [ 14.354227] <TASK> [ 14.354245] dump_stack_lvl+0x73/0xb0 [ 14.354273] print_report+0xd1/0x610 [ 14.354294] ? __virt_addr_valid+0x1db/0x2d0 [ 14.354317] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.354342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.354365] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.354391] kasan_report+0x141/0x180 [ 14.354412] ? kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.354443] kasan_check_range+0x10c/0x1c0 [ 14.354466] __kasan_check_write+0x18/0x20 [ 14.354484] kasan_bitops_modify.constprop.0+0x19c/0xd50 [ 14.354510] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.354537] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.354560] ? trace_hardirqs_on+0x37/0xe0 [ 14.354611] ? kasan_bitops_generic+0x92/0x1c0 [ 14.354638] kasan_bitops_generic+0x116/0x1c0 [ 14.354661] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.354686] ? __pfx_read_tsc+0x10/0x10 [ 14.354707] ? ktime_get_ts64+0x86/0x230 [ 14.354731] kunit_try_run_case+0x1a5/0x480 [ 14.354755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.354777] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.354801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.354824] ? __kthread_parkme+0x82/0x180 [ 14.354844] ? preempt_count_sub+0x50/0x80 [ 14.354869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.354892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.354915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.354939] kthread+0x337/0x6f0 [ 14.354958] ? trace_preempt_on+0x20/0xc0 [ 14.354978] ? __pfx_kthread+0x10/0x10 [ 14.354998] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.355018] ? calculate_sigpending+0x7b/0xa0 [ 14.355042] ? __pfx_kthread+0x10/0x10 [ 14.355072] ret_from_fork+0x116/0x1d0 [ 14.355090] ? __pfx_kthread+0x10/0x10 [ 14.355110] ret_from_fork_asm+0x1a/0x30 [ 14.355142] </TASK> [ 14.355153] [ 14.362691] Allocated by task 278: [ 14.362871] kasan_save_stack+0x45/0x70 [ 14.363080] kasan_save_track+0x18/0x40 [ 14.363266] kasan_save_alloc_info+0x3b/0x50 [ 14.363478] __kasan_kmalloc+0xb7/0xc0 [ 14.363693] __kmalloc_cache_noprof+0x189/0x420 [ 14.363914] kasan_bitops_generic+0x92/0x1c0 [ 14.364135] kunit_try_run_case+0x1a5/0x480 [ 14.364330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.364546] kthread+0x337/0x6f0 [ 14.364731] ret_from_fork+0x116/0x1d0 [ 14.364874] ret_from_fork_asm+0x1a/0x30 [ 14.365088] [ 14.365182] The buggy address belongs to the object at ffff8881025ee360 [ 14.365182] which belongs to the cache kmalloc-16 of size 16 [ 14.365565] The buggy address is located 8 bytes inside of [ 14.365565] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.365938] [ 14.366028] The buggy address belongs to the physical page: [ 14.366290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.366669] flags: 0x200000000000000(node=0|zone=2) [ 14.366906] page_type: f5(slab) [ 14.367082] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.367422] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.367742] page dumped because: kasan: bad access detected [ 14.367919] [ 14.367988] Memory state around the buggy address: [ 14.368177] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.368495] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.368841] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.369173] ^ [ 14.369481] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.369832] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.370142] ================================================================== [ 14.396921] ================================================================== [ 14.397270] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.397621] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.397953] [ 14.398073] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.398119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.398131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.398153] Call Trace: [ 14.398172] <TASK> [ 14.398191] dump_stack_lvl+0x73/0xb0 [ 14.398225] print_report+0xd1/0x610 [ 14.398248] ? __virt_addr_valid+0x1db/0x2d0 [ 14.398271] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.398296] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.398319] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.398345] kasan_report+0x141/0x180 [ 14.398366] ? kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.398398] kasan_check_range+0x10c/0x1c0 [ 14.398421] __kasan_check_write+0x18/0x20 [ 14.398440] kasan_bitops_modify.constprop.0+0x2d5/0xd50 [ 14.398465] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.398491] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.398515] ? trace_hardirqs_on+0x37/0xe0 [ 14.398537] ? kasan_bitops_generic+0x92/0x1c0 [ 14.398565] kasan_bitops_generic+0x116/0x1c0 [ 14.398600] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.398625] ? __pfx_read_tsc+0x10/0x10 [ 14.398648] ? ktime_get_ts64+0x86/0x230 [ 14.398672] kunit_try_run_case+0x1a5/0x480 [ 14.398695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.398717] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.398741] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.398763] ? __kthread_parkme+0x82/0x180 [ 14.398783] ? preempt_count_sub+0x50/0x80 [ 14.398807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.398831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.398854] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.398878] kthread+0x337/0x6f0 [ 14.398896] ? trace_preempt_on+0x20/0xc0 [ 14.398917] ? __pfx_kthread+0x10/0x10 [ 14.398937] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.398958] ? calculate_sigpending+0x7b/0xa0 [ 14.398982] ? __pfx_kthread+0x10/0x10 [ 14.399002] ret_from_fork+0x116/0x1d0 [ 14.399020] ? __pfx_kthread+0x10/0x10 [ 14.399039] ret_from_fork_asm+0x1a/0x30 [ 14.399082] </TASK> [ 14.399091] [ 14.406810] Allocated by task 278: [ 14.406937] kasan_save_stack+0x45/0x70 [ 14.407222] kasan_save_track+0x18/0x40 [ 14.407416] kasan_save_alloc_info+0x3b/0x50 [ 14.407631] __kasan_kmalloc+0xb7/0xc0 [ 14.407823] __kmalloc_cache_noprof+0x189/0x420 [ 14.408086] kasan_bitops_generic+0x92/0x1c0 [ 14.408256] kunit_try_run_case+0x1a5/0x480 [ 14.408453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.408753] kthread+0x337/0x6f0 [ 14.408919] ret_from_fork+0x116/0x1d0 [ 14.409092] ret_from_fork_asm+0x1a/0x30 [ 14.409265] [ 14.409338] The buggy address belongs to the object at ffff8881025ee360 [ 14.409338] which belongs to the cache kmalloc-16 of size 16 [ 14.409865] The buggy address is located 8 bytes inside of [ 14.409865] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.410354] [ 14.410453] The buggy address belongs to the physical page: [ 14.410660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.411047] flags: 0x200000000000000(node=0|zone=2) [ 14.411283] page_type: f5(slab) [ 14.411426] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.411694] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.412857] page dumped because: kasan: bad access detected [ 14.413091] [ 14.413163] Memory state around the buggy address: [ 14.413321] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.413625] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.413918] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.414139] ^ [ 14.414345] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.415136] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.415480] ================================================================== [ 14.417881] ================================================================== [ 14.418234] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.418576] Write of size 8 at addr ffff8881025ee368 by task kunit_try_catch/278 [ 14.418939] [ 14.419033] CPU: 1 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6 #1 PREEMPT(voluntary) [ 14.419089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.419100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.419122] Call Trace: [ 14.419139] <TASK> [ 14.419157] dump_stack_lvl+0x73/0xb0 [ 14.419186] print_report+0xd1/0x610 [ 14.419208] ? __virt_addr_valid+0x1db/0x2d0 [ 14.419231] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.419256] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.419278] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.419304] kasan_report+0x141/0x180 [ 14.419325] ? kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.419356] kasan_check_range+0x10c/0x1c0 [ 14.419379] __kasan_check_write+0x18/0x20 [ 14.419397] kasan_bitops_modify.constprop.0+0x373/0xd50 [ 14.419424] ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10 [ 14.419451] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.419475] ? trace_hardirqs_on+0x37/0xe0 [ 14.419497] ? kasan_bitops_generic+0x92/0x1c0 [ 14.419525] kasan_bitops_generic+0x116/0x1c0 [ 14.419550] ? __pfx_kasan_bitops_generic+0x10/0x10 [ 14.419575] ? __pfx_read_tsc+0x10/0x10 [ 14.419611] ? ktime_get_ts64+0x86/0x230 [ 14.419637] kunit_try_run_case+0x1a5/0x480 [ 14.419662] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.419684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.419708] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.419731] ? __kthread_parkme+0x82/0x180 [ 14.419751] ? preempt_count_sub+0x50/0x80 [ 14.419776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.419798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.419822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.419847] kthread+0x337/0x6f0 [ 14.419865] ? trace_preempt_on+0x20/0xc0 [ 14.419886] ? __pfx_kthread+0x10/0x10 [ 14.419906] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.419926] ? calculate_sigpending+0x7b/0xa0 [ 14.419950] ? __pfx_kthread+0x10/0x10 [ 14.419971] ret_from_fork+0x116/0x1d0 [ 14.419989] ? __pfx_kthread+0x10/0x10 [ 14.420008] ret_from_fork_asm+0x1a/0x30 [ 14.420041] </TASK> [ 14.420061] [ 14.429902] Allocated by task 278: [ 14.430088] kasan_save_stack+0x45/0x70 [ 14.430295] kasan_save_track+0x18/0x40 [ 14.430485] kasan_save_alloc_info+0x3b/0x50 [ 14.430971] __kasan_kmalloc+0xb7/0xc0 [ 14.431159] __kmalloc_cache_noprof+0x189/0x420 [ 14.431477] kasan_bitops_generic+0x92/0x1c0 [ 14.431790] kunit_try_run_case+0x1a5/0x480 [ 14.432041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.432357] kthread+0x337/0x6f0 [ 14.432490] ret_from_fork+0x116/0x1d0 [ 14.432777] ret_from_fork_asm+0x1a/0x30 [ 14.433012] [ 14.433122] The buggy address belongs to the object at ffff8881025ee360 [ 14.433122] which belongs to the cache kmalloc-16 of size 16 [ 14.433756] The buggy address is located 8 bytes inside of [ 14.433756] allocated 9-byte region [ffff8881025ee360, ffff8881025ee369) [ 14.434267] [ 14.434349] The buggy address belongs to the physical page: [ 14.434582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1025ee [ 14.434914] flags: 0x200000000000000(node=0|zone=2) [ 14.435142] page_type: f5(slab) [ 14.435296] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000 [ 14.435594] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 14.436409] page dumped because: kasan: bad access detected [ 14.436678] [ 14.436906] Memory state around the buggy address: [ 14.437110] ffff8881025ee200: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 02 fc fc [ 14.437514] ffff8881025ee280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 14.437898] >ffff8881025ee300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 14.438294] ^ [ 14.438530] ffff8881025ee380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.439099] ffff8881025ee400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.439466] ==================================================================