Date
May 30, 2025, 4:14 a.m.
Environment | |
---|---|
e850-96 | |
qemu-arm64 | |
qemu-x86_64 | |
x15 |
[ 32.712801] ================================================================== [ 32.712971] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.713086] Read of size 4 at addr ffff000805002440 by task swapper/5/0 [ 32.714161] [ 32.715647] CPU: 5 UID: 0 PID: 0 Comm: swapper/5 Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 32.715700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.715717] Hardware name: WinLink E850-96 board (DT) [ 32.715737] Call trace: [ 32.715750] show_stack+0x20/0x38 (C) [ 32.715784] dump_stack_lvl+0x8c/0xd0 [ 32.715824] print_report+0x118/0x608 [ 32.715859] kasan_report+0xdc/0x128 [ 32.715889] __asan_report_load4_noabort+0x20/0x30 [ 32.715923] rcu_uaf_reclaim+0x64/0x70 [ 32.715952] rcu_core+0x9f4/0x1e20 [ 32.715986] rcu_core_si+0x18/0x30 [ 32.716014] handle_softirqs+0x374/0xb28 [ 32.716049] __do_softirq+0x1c/0x28 [ 32.716077] ____do_softirq+0x18/0x30 [ 32.716112] call_on_irq_stack+0x24/0x30 [ 32.716143] do_softirq_own_stack+0x24/0x38 [ 32.716172] __irq_exit_rcu+0x1fc/0x318 [ 32.716203] irq_exit_rcu+0x1c/0x80 [ 32.716232] el1_interrupt+0x38/0x58 [ 32.716261] el1h_64_irq_handler+0x18/0x28 [ 32.716291] el1h_64_irq+0x6c/0x70 [ 32.716320] arch_local_irq_enable+0x4/0x8 (P) [ 32.716353] do_idle+0x384/0x4e8 [ 32.716384] cpu_startup_entry+0x68/0x80 [ 32.716416] secondary_start_kernel+0x288/0x340 [ 32.716449] __secondary_switched+0xc0/0xc8 [ 32.716492] [ 32.826226] Allocated by task 242: [ 32.829613] kasan_save_stack+0x3c/0x68 [ 32.833430] kasan_save_track+0x20/0x40 [ 32.837249] kasan_save_alloc_info+0x40/0x58 [ 32.841503] __kasan_kmalloc+0xd4/0xd8 [ 32.845237] __kmalloc_cache_noprof+0x15c/0x3c0 [ 32.849749] rcu_uaf+0xb0/0x2d8 [ 32.852874] kunit_try_run_case+0x170/0x3f0 [ 32.857041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.862509] kthread+0x328/0x630 [ 32.865721] ret_from_fork+0x10/0x20 [ 32.869280] [ 32.870756] Freed by task 0: [ 32.873623] kasan_save_stack+0x3c/0x68 [ 32.877440] kasan_save_track+0x20/0x40 [ 32.881259] kasan_save_free_info+0x4c/0x78 [ 32.885426] __kasan_slab_free+0x6c/0x98 [ 32.889332] kfree+0x214/0x3c8 [ 32.892370] rcu_uaf_reclaim+0x28/0x70 [ 32.896103] rcu_core+0x9f4/0x1e20 [ 32.899488] rcu_core_si+0x18/0x30 [ 32.902875] handle_softirqs+0x374/0xb28 [ 32.906780] __do_softirq+0x1c/0x28 [ 32.910252] [ 32.911729] Last potentially related work creation: [ 32.916590] kasan_save_stack+0x3c/0x68 [ 32.920408] kasan_record_aux_stack+0xb4/0xc8 [ 32.924748] __call_rcu_common.constprop.0+0x70/0x8b0 [ 32.929783] call_rcu+0x18/0x30 [ 32.932908] rcu_uaf+0x14c/0x2d8 [ 32.936119] kunit_try_run_case+0x170/0x3f0 [ 32.940286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.945755] kthread+0x328/0x630 [ 32.948966] ret_from_fork+0x10/0x20 [ 32.952526] [ 32.954002] The buggy address belongs to the object at ffff000805002440 [ 32.954002] which belongs to the cache kmalloc-32 of size 32 [ 32.966329] The buggy address is located 0 bytes inside of [ 32.966329] freed 32-byte region [ffff000805002440, ffff000805002460) [ 32.978306] [ 32.979784] The buggy address belongs to the physical page: [ 32.985342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885002 [ 32.993327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.999835] page_type: f5(slab) [ 33.002972] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 33.010691] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.018410] page dumped because: kasan: bad access detected [ 33.023966] [ 33.025441] Memory state around the buggy address: [ 33.030222] ffff000805002300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.037423] ffff000805002380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.044630] >ffff000805002400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.051829] ^ [ 33.057128] ffff000805002480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.064333] ffff000805002500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.071535] ==================================================================
[ 25.593282] ================================================================== [ 25.593510] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 25.593652] Read of size 4 at addr fff00000c77ed180 by task swapper/0/0 [ 25.593780] [ 25.596502] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT [ 25.597861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.597932] Hardware name: linux,dummy-virt (DT) [ 25.598010] Call trace: [ 25.598066] show_stack+0x20/0x38 (C) [ 25.599562] dump_stack_lvl+0x8c/0xd0 [ 25.599726] print_report+0x118/0x608 [ 25.599939] kasan_report+0xdc/0x128 [ 25.600404] __asan_report_load4_noabort+0x20/0x30 [ 25.600613] rcu_uaf_reclaim+0x64/0x70 [ 25.600778] rcu_core+0x9f4/0x1e20 [ 25.601117] rcu_core_si+0x18/0x30 [ 25.601238] handle_softirqs+0x374/0xb28 [ 25.601596] __do_softirq+0x1c/0x28 [ 25.601725] ____do_softirq+0x18/0x30 [ 25.601858] call_on_irq_stack+0x24/0x30 [ 25.602395] do_softirq_own_stack+0x24/0x38 [ 25.602925] __irq_exit_rcu+0x1fc/0x318 [ 25.603148] irq_exit_rcu+0x1c/0x80 [ 25.603422] el1_interrupt+0x38/0x58 [ 25.603618] el1h_64_irq_handler+0x18/0x28 [ 25.603757] el1h_64_irq+0x6c/0x70 [ 25.603957] arch_local_irq_enable+0x4/0x8 (P) [ 25.604109] do_idle+0x384/0x4e8 [ 25.604274] cpu_startup_entry+0x64/0x80 [ 25.604409] rest_init+0x160/0x188 [ 25.604915] start_kernel+0x314/0x3d8 [ 25.605131] __primary_switched+0x8c/0xa0 [ 25.605371] [ 25.605482] Allocated by task 199: [ 25.605559] kasan_save_stack+0x3c/0x68 [ 25.605671] kasan_save_track+0x20/0x40 [ 25.605790] kasan_save_alloc_info+0x40/0x58 [ 25.605897] __kasan_kmalloc+0xd4/0xd8 [ 25.606091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 25.606301] rcu_uaf+0xb0/0x2d8 [ 25.606414] kunit_try_run_case+0x170/0x3f0 [ 25.606527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.606652] kthread+0x328/0x630 [ 25.606914] ret_from_fork+0x10/0x20 [ 25.607102] [ 25.607147] Freed by task 0: [ 25.607630] kasan_save_stack+0x3c/0x68 [ 25.607840] kasan_save_track+0x20/0x40 [ 25.608062] kasan_save_free_info+0x4c/0x78 [ 25.608237] __kasan_slab_free+0x6c/0x98 [ 25.608350] kfree+0x214/0x3c8 [ 25.608449] rcu_uaf_reclaim+0x28/0x70 [ 25.608559] rcu_core+0x9f4/0x1e20 [ 25.608663] rcu_core_si+0x18/0x30 [ 25.608778] handle_softirqs+0x374/0xb28 [ 25.609407] __do_softirq+0x1c/0x28 [ 25.609520] [ 25.609617] Last potentially related work creation: [ 25.609785] kasan_save_stack+0x3c/0x68 [ 25.610012] kasan_record_aux_stack+0xb4/0xc8 [ 25.610146] __call_rcu_common.constprop.0+0x70/0x8b0 [ 25.610436] call_rcu+0x18/0x30 [ 25.610546] rcu_uaf+0x14c/0x2d8 [ 25.610783] kunit_try_run_case+0x170/0x3f0 [ 25.611342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.611425] kthread+0x328/0x630 [ 25.611470] ret_from_fork+0x10/0x20 [ 25.611562] [ 25.611734] The buggy address belongs to the object at fff00000c77ed180 [ 25.611734] which belongs to the cache kmalloc-32 of size 32 [ 25.611914] The buggy address is located 0 bytes inside of [ 25.611914] freed 32-byte region [fff00000c77ed180, fff00000c77ed1a0) [ 25.612314] [ 25.612371] The buggy address belongs to the physical page: [ 25.612447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ed [ 25.612574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 25.612770] page_type: f5(slab) [ 25.612890] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 25.613025] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 25.613134] page dumped because: kasan: bad access detected [ 25.613215] [ 25.613393] Memory state around the buggy address: [ 25.613591] fff00000c77ed080: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 25.613864] fff00000c77ed100: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 25.614124] >fff00000c77ed180: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 25.614218] ^ [ 25.614339] fff00000c77ed200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.614479] fff00000c77ed280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.614727] ==================================================================
[ 19.207417] ================================================================== [ 19.208480] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60 [ 19.209425] Read of size 4 at addr ffff888102b69640 by task swapper/0/0 [ 19.209946] [ 19.210968] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.15.0-next-20250530 #1 PREEMPT(voluntary) [ 19.211091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.211130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 19.211188] Call Trace: [ 19.211259] <IRQ> [ 19.211300] dump_stack_lvl+0x73/0xb0 [ 19.211369] print_report+0xd1/0x650 [ 19.211430] ? __virt_addr_valid+0x1db/0x2d0 [ 19.211466] ? rcu_uaf_reclaim+0x50/0x60 [ 19.211495] ? kasan_complete_mode_report_info+0x64/0x200 [ 19.211529] ? rcu_uaf_reclaim+0x50/0x60 [ 19.211558] kasan_report+0x141/0x180 [ 19.211589] ? rcu_uaf_reclaim+0x50/0x60 [ 19.211623] __asan_report_load4_noabort+0x18/0x20 [ 19.211651] rcu_uaf_reclaim+0x50/0x60 [ 19.211680] rcu_core+0x66f/0x1c40 [ 19.211728] ? __pfx_rcu_core+0x10/0x10 [ 19.211985] ? ktime_get+0x6b/0x150 [ 19.212052] rcu_core_si+0x12/0x20 [ 19.212083] handle_softirqs+0x209/0x730 [ 19.212114] ? hrtimer_interrupt+0x2fe/0x780 [ 19.212145] ? __pfx_handle_softirqs+0x10/0x10 [ 19.212269] __irq_exit_rcu+0xc9/0x110 [ 19.212310] irq_exit_rcu+0x12/0x20 [ 19.212340] sysvec_apic_timer_interrupt+0x81/0x90 [ 19.212380] </IRQ> [ 19.212420] <TASK> [ 19.212436] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 19.212560] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 19.212853] Code: 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 23 98 1d 00 fb f4 <c3> cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 19.212968] RSP: 0000:ffffffff8a807dd8 EFLAGS: 00010216 [ 19.213112] RAX: ffff8881cf45b000 RBX: ffffffff8a81cac0 RCX: ffffffff896b2245 [ 19.213311] RDX: ffffed102b60618b RSI: 0000000000000004 RDI: 000000000002846c [ 19.213386] RBP: ffffffff8a807de0 R08: 0000000000000001 R09: ffffed102b60618a [ 19.213447] R10: ffff88815b030c53 R11: 0000000000023400 R12: 0000000000000000 [ 19.213506] R13: fffffbfff1503958 R14: ffffffff8b3c3190 R15: 0000000000000000 [ 19.213587] ? ct_kernel_exit.constprop.0+0xa5/0xd0 [ 19.213663] ? default_idle+0xd/0x20 [ 19.213697] arch_cpu_idle+0xd/0x20 [ 19.213747] default_idle_call+0x48/0x80 [ 19.213790] do_idle+0x379/0x4f0 [ 19.213821] ? __pfx_do_idle+0x10/0x10 [ 19.213846] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 19.213881] ? trace_preempt_on+0x20/0xc0 [ 19.213914] ? schedule+0x86/0x2e0 [ 19.213943] ? preempt_count_sub+0x50/0x80 [ 19.213975] cpu_startup_entry+0x5c/0x70 [ 19.214027] rest_init+0x11a/0x140 [ 19.214058] ? acpi_subsystem_init+0x5d/0x150 [ 19.214094] start_kernel+0x330/0x410 [ 19.214124] x86_64_start_reservations+0x1c/0x30 [ 19.214154] x86_64_start_kernel+0x10d/0x120 [ 19.214233] common_startup_64+0x13e/0x148 [ 19.214345] </TASK> [ 19.214385] [ 19.247082] Allocated by task 215: [ 19.247980] kasan_save_stack+0x45/0x70 [ 19.248567] kasan_save_track+0x18/0x40 [ 19.249282] kasan_save_alloc_info+0x3b/0x50 [ 19.249885] __kasan_kmalloc+0xb7/0xc0 [ 19.250542] __kmalloc_cache_noprof+0x189/0x420 [ 19.251108] rcu_uaf+0xb0/0x330 [ 19.251830] kunit_try_run_case+0x1a5/0x480 [ 19.252347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.253073] kthread+0x337/0x6f0 [ 19.253572] ret_from_fork+0x116/0x1d0 [ 19.254049] ret_from_fork_asm+0x1a/0x30 [ 19.254679] [ 19.254977] Freed by task 0: [ 19.255595] kasan_save_stack+0x45/0x70 [ 19.256411] kasan_save_track+0x18/0x40 [ 19.256820] kasan_save_free_info+0x3f/0x60 [ 19.257116] __kasan_slab_free+0x56/0x70 [ 19.257860] kfree+0x222/0x3f0 [ 19.258382] rcu_uaf_reclaim+0x1f/0x60 [ 19.258842] rcu_core+0x66f/0x1c40 [ 19.259599] rcu_core_si+0x12/0x20 [ 19.260118] handle_softirqs+0x209/0x730 [ 19.260822] __irq_exit_rcu+0xc9/0x110 [ 19.261391] irq_exit_rcu+0x12/0x20 [ 19.261617] sysvec_apic_timer_interrupt+0x81/0x90 [ 19.262585] asm_sysvec_apic_timer_interrupt+0x1f/0x30 [ 19.263783] [ 19.264401] Last potentially related work creation: [ 19.265260] kasan_save_stack+0x45/0x70 [ 19.265683] kasan_record_aux_stack+0xb2/0xc0 [ 19.266139] __call_rcu_common.constprop.0+0x72/0x9d0 [ 19.266628] call_rcu+0x12/0x20 [ 19.267395] rcu_uaf+0x168/0x330 [ 19.267742] kunit_try_run_case+0x1a5/0x480 [ 19.268230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 19.268820] kthread+0x337/0x6f0 [ 19.269631] ret_from_fork+0x116/0x1d0 [ 19.270103] ret_from_fork_asm+0x1a/0x30 [ 19.270739] [ 19.270978] The buggy address belongs to the object at ffff888102b69640 [ 19.270978] which belongs to the cache kmalloc-32 of size 32 [ 19.272623] The buggy address is located 0 bytes inside of [ 19.272623] freed 32-byte region [ffff888102b69640, ffff888102b69660) [ 19.273650] [ 19.273884] The buggy address belongs to the physical page: [ 19.274891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b69 [ 19.275891] flags: 0x200000000000000(node=0|zone=2) [ 19.276431] page_type: f5(slab) [ 19.277036] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000 [ 19.277786] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 19.278397] page dumped because: kasan: bad access detected [ 19.278912] [ 19.279111] Memory state around the buggy address: [ 19.279638] ffff888102b69500: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.280891] ffff888102b69580: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 19.281549] >ffff888102b69600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 19.282390] ^ [ 19.283167] ffff888102b69680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.284082] ffff888102b69700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.284703] ==================================================================
[ 59.263244] ================================================================== [ 59.273681] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x5c/0x60 [ 59.280456] Read of size 4 at addr cc797a80 by task ksoftirqd/0/14 [ 59.286682] [ 59.288208] CPU: 0 UID: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G B W N 6.15.0-next-20250530 #1 NONE [ 59.288238] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 59.288269] Hardware name: Generic DRA74X (Flattened Device Tree) [ 59.288269] Call trace: [ 59.288299] unwind_backtrace from show_stack+0x18/0x1c [ 59.288330] show_stack from dump_stack_lvl+0x70/0x90 [ 59.288360] dump_stack_lvl from print_report+0x158/0x528 [ 59.288391] print_report from kasan_report+0xdc/0x118 [ 59.288421] kasan_report from rcu_uaf_reclaim+0x5c/0x60 [ 59.288482] rcu_uaf_reclaim from rcu_core+0x84c/0x1aa4 [ 59.288513] rcu_core from handle_softirqs+0x3d8/0xc7c [ 59.288543] handle_softirqs from run_ksoftirqd+0x7c/0x9c [ 59.288574] run_ksoftirqd from smpboot_thread_fn+0x46c/0xa68 [ 59.288604] smpboot_thread_fn from kthread+0x464/0x810 [ 59.288635] kthread from ret_from_fork+0x14/0x20 [ 59.288665] Exception stack(0xf007bfb0 to 0xf007bff8) [ 59.288696] bfa0: 00000000 00000000 00000000 00000000 [ 59.288696] bfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 59.288726] bfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 59.288757] [ 59.400054] Allocated by task 250: [ 59.403503] kasan_save_track+0x30/0x5c [ 59.407379] __kasan_kmalloc+0x8c/0x94 [ 59.411163] rcu_uaf+0xd0/0x354 [ 59.414337] kunit_try_run_case+0x22c/0x5a8 [ 59.418579] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.424133] kthread+0x464/0x810 [ 59.427398] ret_from_fork+0x14/0x20 [ 59.430999] [ 59.432525] Freed by task 14: [ 59.435516] kasan_save_track+0x30/0x5c [ 59.439392] kasan_save_free_info+0x3c/0x48 [ 59.443603] __kasan_slab_free+0x40/0x50 [ 59.447570] kfree+0xe8/0x384 [ 59.450592] rcu_uaf_reclaim+0x1c/0x60 [ 59.454376] rcu_core+0x84c/0x1aa4 [ 59.457824] handle_softirqs+0x3d8/0xc7c [ 59.461791] run_ksoftirqd+0x7c/0x9c [ 59.465393] smpboot_thread_fn+0x46c/0xa68 [ 59.469543] kthread+0x464/0x810 [ 59.472808] ret_from_fork+0x14/0x20 [ 59.476409] [ 59.477935] Last potentially related work creation: [ 59.482849] kasan_save_stack+0x30/0x4c [ 59.486724] kasan_record_aux_stack+0x80/0x88 [ 59.491119] __call_rcu_common.constprop.0+0x98/0xb80 [ 59.496215] rcu_uaf+0x1a4/0x354 [ 59.499481] kunit_try_run_case+0x22c/0x5a8 [ 59.503723] kunit_generic_run_threadfn_adapter+0xc4/0x128 [ 59.509277] kthread+0x464/0x810 [ 59.512542] ret_from_fork+0x14/0x20 [ 59.516143] [ 59.517669] The buggy address belongs to the object at cc797a80 [ 59.517669] which belongs to the cache kmalloc-64 of size 64 [ 59.529388] The buggy address is located 0 bytes inside of [ 59.529388] freed 64-byte region [cc797a80, cc797ac0) [ 59.540100] [ 59.541595] The buggy address belongs to the physical page: [ 59.547210] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c797 [ 59.554504] flags: 0x0(zone=0) [ 59.557586] page_type: f5(slab) [ 59.560760] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000 [ 59.568908] raw: 00000000 [ 59.571563] page dumped because: kasan: bad access detected [ 59.577178] [ 59.578704] Memory state around the buggy address: [ 59.583526] cc797980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.590118] cc797a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.596679] >cc797a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.603271] ^ [ 59.605834] cc797b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.612426] cc797b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.618988] ==================================================================