Hay
Date
June 24, 2025, 11:37 a.m.

Environment
dragonboard-845c
qemu-arm64
qemu-x86_64

[   48.780915] ==================================================================
[   48.793265] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   48.801380] Free of addr ffff000080df5e01 by task kunit_try_catch/339
[   48.807906] 
[   48.809447] CPU: 2 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   48.809482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.809493] Hardware name: Thundercomm Dragonboard 845c (DT)
[   48.809509] Call trace:
[   48.809518]  show_stack+0x20/0x38 (C)
[   48.809540]  dump_stack_lvl+0x8c/0xd0
[   48.809561]  print_report+0x118/0x608
[   48.809582]  kasan_report_invalid_free+0xc0/0xe8
[   48.809606]  check_slab_allocation+0xfc/0x108
[   48.809627]  __kasan_mempool_poison_object+0x78/0x150
[   48.809650]  mempool_free+0x28c/0x328
[   48.809671]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   48.809692]  mempool_kmalloc_invalid_free+0xc0/0x118
[   48.809712]  kunit_try_run_case+0x170/0x3f0
[   48.809734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.809756]  kthread+0x328/0x630
[   48.809774]  ret_from_fork+0x10/0x20
[   48.809795] 
[   48.891443] Allocated by task 339:
[   48.894913]  kasan_save_stack+0x3c/0x68
[   48.898821]  kasan_save_track+0x20/0x40
[   48.902727]  kasan_save_alloc_info+0x40/0x58
[   48.907073]  __kasan_mempool_unpoison_object+0x11c/0x180
[   48.912472]  remove_element+0x130/0x1f8
[   48.916376]  mempool_alloc_preallocated+0x58/0xc0
[   48.921155]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   48.926810]  mempool_kmalloc_invalid_free+0xc0/0x118
[   48.931862]  kunit_try_run_case+0x170/0x3f0
[   48.936123]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.941694]  kthread+0x328/0x630
[   48.944981]  ret_from_fork+0x10/0x20
[   48.948626] 
[   48.950158] The buggy address belongs to the object at ffff000080df5e00
[   48.950158]  which belongs to the cache kmalloc-128 of size 128
[   48.962824] The buggy address is located 1 bytes inside of
[   48.962824]  128-byte region [ffff000080df5e00, ffff000080df5e80)
[   48.974528] 
[   48.976062] The buggy address belongs to the physical page:
[   48.981710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4
[   48.989818] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   48.997579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.004639] page_type: f5(slab)
[   49.007844] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   49.015692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.023543] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000
[   49.031478] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.039413] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff
[   49.047347] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   49.055277] page dumped because: kasan: bad access detected
[   49.060925] 
[   49.062456] Memory state around the buggy address:
[   49.067317]  ffff000080df5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   49.074633]  ffff000080df5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.081951] >ffff000080df5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.089265]                    ^
[   49.092550]  ffff000080df5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.099867]  ffff000080df5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.107182] ==================================================================
[   49.118583] ==================================================================
[   49.130764] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   49.138872] Free of addr ffff000095610001 by task kunit_try_catch/341
[   49.145397] 
[   49.146931] CPU: 4 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   49.146962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.146971] Hardware name: Thundercomm Dragonboard 845c (DT)
[   49.146982] Call trace:
[   49.146989]  show_stack+0x20/0x38 (C)
[   49.147008]  dump_stack_lvl+0x8c/0xd0
[   49.147028]  print_report+0x118/0x608
[   49.147046]  kasan_report_invalid_free+0xc0/0xe8
[   49.147067]  __kasan_mempool_poison_object+0xfc/0x150
[   49.147088]  mempool_free+0x28c/0x328
[   49.147103]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   49.147123]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   49.147141]  kunit_try_run_case+0x170/0x3f0
[   49.147159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.147180]  kthread+0x328/0x630
[   49.147193]  ret_from_fork+0x10/0x20
[   49.147212] 
[   49.224937] The buggy address belongs to the physical page:
[   49.230578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115610
[   49.238689] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   49.246437] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   49.253493] page_type: f8(unknown)
[   49.256961] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   49.264798] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   49.272634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   49.280555] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   49.288487] head: 0bfffe0000000002 fffffdffc2558401 00000000ffffffff 00000000ffffffff
[   49.296410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   49.304326] page dumped because: kasan: bad access detected
[   49.309967] 
[   49.311495] Memory state around the buggy address:
[   49.316357]  ffff00009560ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.323667]  ffff00009560ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.330973] >ffff000095610000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.338283]                    ^
[   49.341561]  ffff000095610080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.348873]  ffff000095610100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   49.356181] ==================================================================

[   36.026346] ==================================================================
[   36.026474] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.026586] Free of addr fff00000c77e6501 by task kunit_try_catch/252
[   36.026687] 
[   36.026756] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT 
[   36.026970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.027038] Hardware name: linux,dummy-virt (DT)
[   36.027169] Call trace:
[   36.027240]  show_stack+0x20/0x38 (C)
[   36.027379]  dump_stack_lvl+0x8c/0xd0
[   36.027542]  print_report+0x118/0x608
[   36.027699]  kasan_report_invalid_free+0xc0/0xe8
[   36.027844]  check_slab_allocation+0xfc/0x108
[   36.027997]  __kasan_mempool_poison_object+0x78/0x150
[   36.028256]  mempool_free+0x28c/0x328
[   36.028478]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   36.028744]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.028868]  kunit_try_run_case+0x170/0x3f0
[   36.029067]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.029438]  kthread+0x328/0x630
[   36.029719]  ret_from_fork+0x10/0x20
[   36.029931] 
[   36.029980] Allocated by task 252:
[   36.030058]  kasan_save_stack+0x3c/0x68
[   36.030196]  kasan_save_track+0x20/0x40
[   36.030310]  kasan_save_alloc_info+0x40/0x58
[   36.030426]  __kasan_mempool_unpoison_object+0x11c/0x180
[   36.030553]  remove_element+0x130/0x1f8
[   36.030649]  mempool_alloc_preallocated+0x58/0xc0
[   36.030751]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   36.030901]  mempool_kmalloc_invalid_free+0xc0/0x118
[   36.031036]  kunit_try_run_case+0x170/0x3f0
[   36.031155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.031336]  kthread+0x328/0x630
[   36.031651]  ret_from_fork+0x10/0x20
[   36.031841] 
[   36.031915] The buggy address belongs to the object at fff00000c77e6500
[   36.031915]  which belongs to the cache kmalloc-128 of size 128
[   36.032085] The buggy address is located 1 bytes inside of
[   36.032085]  128-byte region [fff00000c77e6500, fff00000c77e6580)
[   36.033219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.034156] page dumped because: kasan: bad access detected
[   36.035472]  fff00000c77e6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.047402] Free of addr fff00000c781c001 by task kunit_try_catch/254
[   36.049753]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   36.051050] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   36.051303] page_type: f8(unknown)
[   36.051431] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.051732] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   36.051851] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   36.052109] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   36.052282] 
[   36.052330] Memory state around the buggy address:
[   36.052462]  fff00000c781bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   36.052770] >fff00000c781c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   36.062003]     ok 54 mempool_kmalloc_large_invalid_free
[   36.073823] Read of size 1 at addr ffffac8ac84c668d by task kunit_try_catch/256
[   36.074148] Hardware name: linux,dummy-virt (DT)
[   36.074336]  print_report+0x310/0x608
[   36.074575]  kunit_try_run_case+0x170/0x3f0
[   36.075086]  global_array+0xd/0x40
[   36.075212] 
[   36.075350] The buggy address belongs to the virtual mapping at
[   36.075350]  [ffffac8ac6660000, ffffac8ac8581000) created by:
[   36.075350]  paging_init+0x66c/0x7d0
[   36.075544] 
[   36.075809] The buggy address belongs to the physical page:
[   36.075909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47cc6
[   36.076045] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   36.109468] ==================================================================

[   31.319854] ==================================================================
[   31.320613] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.321159] Free of addr ffff888102df6201 by task kunit_try_catch/271
[   31.321735] 
[   31.321985] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   31.322103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.322136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.322181] Call Trace:
[   31.322210]  <TASK>
[   31.322250]  dump_stack_lvl+0x73/0xb0
[   31.322329]  print_report+0xd1/0x650
[   31.322392]  ? __virt_addr_valid+0x1db/0x2d0
[   31.322463]  ? kasan_complete_mode_report_info+0x2a/0x200
[   31.322534]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.322759]  kasan_report_invalid_free+0x10a/0x130
[   31.322856]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.322933]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.322998]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.323060]  check_slab_allocation+0x11f/0x130
[   31.323135]  __kasan_mempool_poison_object+0x91/0x1d0
[   31.323215]  mempool_free+0x2ec/0x380
[   31.323280]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.323338]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   31.323377]  ? __pfx_sched_clock_cpu+0x10/0x10
[   31.323410]  ? finish_task_switch.isra.0+0x153/0x700
[   31.323508]  mempool_kmalloc_invalid_free+0xed/0x140
[   31.323580]  ? __pfx_mempool_kmalloc_invalid_free+0x10/0x10
[   31.323641]  ? __pfx_mempool_kmalloc+0x10/0x10
[   31.323691]  ? __pfx_mempool_kfree+0x10/0x10
[   31.323748]  ? __pfx_read_tsc+0x10/0x10
[   31.323798]  ? ktime_get_ts64+0x86/0x230
[   31.323878]  kunit_try_run_case+0x1a5/0x480
[   31.323923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.323955]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   31.323991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.324023]  ? __kthread_parkme+0x82/0x180
[   31.324052]  ? preempt_count_sub+0x50/0x80
[   31.324109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.324167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.324234]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.324270]  kthread+0x337/0x6f0
[   31.324298]  ? trace_preempt_on+0x20/0xc0
[   31.324333]  ? __pfx_kthread+0x10/0x10
[   31.324361]  ? _raw_spin_unlock_irq+0x47/0x80
[   31.324392]  ? calculate_sigpending+0x7b/0xa0
[   31.324424]  ? __pfx_kthread+0x10/0x10
[   31.324453]  ret_from_fork+0x116/0x1d0
[   31.324480]  ? __pfx_kthread+0x10/0x10
[   31.324507]  ret_from_fork_asm+0x1a/0x30
[   31.324571]  </TASK>
[   31.324588] 
[   31.346963] Allocated by task 271:
[   31.347163]  kasan_save_stack+0x45/0x70
[   31.348142]  kasan_save_track+0x18/0x40
[   31.348623]  kasan_save_alloc_info+0x3b/0x50
[   31.349117]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   31.350108]  remove_element+0x11e/0x190
[   31.350407]  mempool_alloc_preallocated+0x4d/0x90
[   31.351006]  mempool_kmalloc_invalid_free_helper+0x83/0x2e0
[   31.351496]  mempool_kmalloc_invalid_free+0xed/0x140
[   31.352234]  kunit_try_run_case+0x1a5/0x480
[   31.352590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.352981]  kthread+0x337/0x6f0
[   31.353245]  ret_from_fork+0x116/0x1d0
[   31.353514]  ret_from_fork_asm+0x1a/0x30
[   31.354857] 
[   31.355068] The buggy address belongs to the object at ffff888102df6200
[   31.355068]  which belongs to the cache kmalloc-128 of size 128
[   31.355851] The buggy address is located 1 bytes inside of
[   31.355851]  128-byte region [ffff888102df6200, ffff888102df6280)
[   31.356801] 
[   31.357026] The buggy address belongs to the physical page:
[   31.357480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102df6
[   31.358027] flags: 0x200000000000000(node=0|zone=2)
[   31.358661] page_type: f5(slab)
[   31.359003] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   31.359897] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   31.360473] page dumped because: kasan: bad access detected
[   31.361439] 
[   31.361621] Memory state around the buggy address:
[   31.362232]  ffff888102df6100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   31.362747]  ffff888102df6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.363410] >ffff888102df6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.364050]                    ^
[   31.364835]  ffff888102df6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   31.365454]  ffff888102df6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.366020] ==================================================================
[   31.372508] ==================================================================
[   31.373580] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.374405] Free of addr ffff888103be0001 by task kunit_try_catch/273
[   31.375257] 
[   31.375425] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250624 #1 PREEMPT(voluntary) 
[   31.375561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   31.375596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   31.376019] Call Trace:
[   31.376058]  <TASK>
[   31.376116]  dump_stack_lvl+0x73/0xb0
[   31.376194]  print_report+0xd1/0x650
[   31.376230]  ? __virt_addr_valid+0x1db/0x2d0
[   31.376267]  ? kasan_addr_to_slab+0x11/0xa0
[   31.376295]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.376329]  kasan_report_invalid_free+0x10a/0x130
[   31.376361]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.376397]  ? mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.376429]  __kasan_mempool_poison_object+0x102/0x1d0
[   31.376461]  mempool_free+0x2ec/0x380
[   31.376495]  mempool_kmalloc_invalid_free_helper+0x132/0x2e0
[   31.376528]  ? __pfx_mempool_kmalloc_invalid_free_helper+0x10/0x10
[   31.376586]  ? __pfx_sched_clock_cpu+0x10/0x10
[   31.376618]  ? finish_task_switch.isra.0+0x153/0x700
[   31.376688]  mempool_kmalloc_large_invalid_free+0xed/0x140
[   31.376723]  ? __pfx_mempool_kmalloc_large_invalid_free+0x10/0x10
[   31.376758]  ? __pfx_mempool_kmalloc+0x10/0x10
[   31.376788]  ? __pfx_mempool_kfree+0x10/0x10
[   31.376820]  ? __pfx_read_tsc+0x10/0x10
[   31.376849]  ? ktime_get_ts64+0x86/0x230
[   31.376883]  kunit_try_run_case+0x1a5/0x480
[   31.376917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.376947]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   31.376981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   31.377013]  ? __kthread_parkme+0x82/0x180
[   31.377039]  ? preempt_count_sub+0x50/0x80
[   31.377087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   31.377142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   31.377195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   31.377249]  kthread+0x337/0x6f0
[   31.377295]  ? trace_preempt_on+0x20/0xc0
[   31.377346]  ? __pfx_kthread+0x10/0x10
[   31.377395]  ? _raw_spin_unlock_irq+0x47/0x80
[   31.377434]  ? calculate_sigpending+0x7b/0xa0
[   31.377468]  ? __pfx_kthread+0x10/0x10
[   31.377497]  ret_from_fork+0x116/0x1d0
[   31.377523]  ? __pfx_kthread+0x10/0x10
[   31.377576]  ret_from_fork_asm+0x1a/0x30
[   31.377618]  </TASK>
[   31.377638] 
[   31.396399] The buggy address belongs to the physical page:
[   31.397075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103be0
[   31.398080] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   31.398847] flags: 0x200000000000040(head|node=0|zone=2)
[   31.399318] page_type: f8(unknown)
[   31.399641] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   31.400154] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.400855] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   31.401275] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000
[   31.402580] head: 0200000000000002 ffffea00040ef801 00000000ffffffff 00000000ffffffff
[   31.402991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   31.403892] page dumped because: kasan: bad access detected
[   31.404483] 
[   31.404744] Memory state around the buggy address:
[   31.405209]  ffff888103bdff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.405976]  ffff888103bdff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   31.406689] >ffff888103be0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.407134]                    ^
[   31.407473]  ffff888103be0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.408602]  ffff888103be0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   31.409189] ==================================================================