Date
Feb. 5, 2025, 2:09 p.m.
Environment | |
---|---|
qemu-armv7 | |
qemu-x86_64 |
[ 144.274660] ================================================================== [ 144.275419] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x320 [ 144.276458] Read of size 1 at addr c4fc8f80 by task kunit_try_catch/111 [ 144.277091] [ 144.277790] CPU: 0 PID: 111 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 144.278762] Hardware name: Generic DT based system [ 144.279469] unwind_backtrace from show_stack+0x18/0x1c [ 144.280359] show_stack from dump_stack_lvl+0x58/0x70 [ 144.281175] dump_stack_lvl from print_report+0x164/0x51c [ 144.281926] print_report from kasan_report+0xc8/0x104 [ 144.282705] kasan_report from kmalloc_oob_right+0x134/0x320 [ 144.283549] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4 [ 144.284443] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 144.285408] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 144.286570] kthread from ret_from_fork+0x14/0x30 [ 144.287316] Exception stack(0xf9e93fb0 to 0xf9e93ff8) [ 144.287905] 3fa0: 00000000 00000000 00000000 00000000 [ 144.288933] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 144.289894] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 144.290654] [ 144.290970] Allocated by task 111: [ 144.291582] kasan_set_track+0x3c/0x5c [ 144.292224] __kasan_kmalloc+0x8c/0x94 [ 144.292893] kmalloc_oob_right+0xa0/0x320 [ 144.293571] kunit_try_run_case+0x11c/0x2e4 [ 144.294321] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 144.295086] kthread+0x184/0x1a8 [ 144.295592] ret_from_fork+0x14/0x30 [ 144.296368] [ 144.296739] The buggy address belongs to the object at c4fc8f00 [ 144.296739] which belongs to the cache kmalloc-128 of size 128 [ 144.298153] The buggy address is located 13 bytes to the right of [ 144.298153] allocated 115-byte region [c4fc8f00, c4fc8f73) [ 144.299346] [ 144.299612] The buggy address belongs to the physical page: [ 144.300225] page:0207a5d0 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44fc8 [ 144.301186] flags: 0x800(slab|zone=0) [ 144.301640] page_type: 0xffffffff() [ 144.302192] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001 [ 144.303111] raw: 00000000 [ 144.303543] page dumped because: kasan: bad access detected [ 144.304120] [ 144.304416] Memory state around the buggy address: [ 144.304986] c4fc8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 144.305740] c4fc8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 144.306974] >c4fc8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 144.307666] ^ [ 144.308106] c4fc9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 144.308797] c4fc9080: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 144.309523] ================================================================== [ 144.238609] ================================================================== [ 144.239357] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x100/0x320 [ 144.240173] Write of size 1 at addr c4fc8f78 by task kunit_try_catch/111 [ 144.240725] [ 144.241081] CPU: 0 PID: 111 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 144.242019] Hardware name: Generic DT based system [ 144.242540] unwind_backtrace from show_stack+0x18/0x1c [ 144.243345] show_stack from dump_stack_lvl+0x58/0x70 [ 144.243992] dump_stack_lvl from print_report+0x164/0x51c [ 144.244618] print_report from kasan_report+0xc8/0x104 [ 144.245331] kasan_report from kmalloc_oob_right+0x100/0x320 [ 144.246322] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4 [ 144.247165] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 144.248323] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 144.249192] kthread from ret_from_fork+0x14/0x30 [ 144.249805] Exception stack(0xf9e93fb0 to 0xf9e93ff8) [ 144.250420] 3fa0: 00000000 00000000 00000000 00000000 [ 144.251392] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 144.252357] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 144.253082] [ 144.253370] Allocated by task 111: [ 144.253722] kasan_set_track+0x3c/0x5c [ 144.254345] __kasan_kmalloc+0x8c/0x94 [ 144.255016] kmalloc_oob_right+0xa0/0x320 [ 144.255587] kunit_try_run_case+0x11c/0x2e4 [ 144.256367] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 144.257247] kthread+0x184/0x1a8 [ 144.257676] ret_from_fork+0x14/0x30 [ 144.258200] [ 144.258459] The buggy address belongs to the object at c4fc8f00 [ 144.258459] which belongs to the cache kmalloc-128 of size 128 [ 144.259592] The buggy address is located 5 bytes to the right of [ 144.259592] allocated 115-byte region [c4fc8f00, c4fc8f73) [ 144.260865] [ 144.261104] The buggy address belongs to the physical page: [ 144.261771] page:0207a5d0 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44fc8 [ 144.262751] flags: 0x800(slab|zone=0) [ 144.263212] page_type: 0xffffffff() [ 144.263864] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001 [ 144.264924] raw: 00000000 [ 144.265253] page dumped because: kasan: bad access detected [ 144.266197] [ 144.266514] Memory state around the buggy address: [ 144.267219] c4fc8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 144.268098] c4fc8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 144.268945] >c4fc8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 144.269627] ^ [ 144.270487] c4fc8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 144.271240] c4fc9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 144.271969] ================================================================== [ 144.194227] ================================================================== [ 144.195587] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcc/0x320 [ 144.197558] Write of size 1 at addr c4fc8f73 by task kunit_try_catch/111 [ 144.198212] [ 144.199090] CPU: 0 PID: 111 Comm: kunit_try_catch Tainted: G N 6.6.76-rc1 #1 [ 144.200305] Hardware name: Generic DT based system [ 144.201430] unwind_backtrace from show_stack+0x18/0x1c [ 144.202257] show_stack from dump_stack_lvl+0x58/0x70 [ 144.202952] dump_stack_lvl from print_report+0x164/0x51c [ 144.203668] print_report from kasan_report+0xc8/0x104 [ 144.204431] kasan_report from kmalloc_oob_right+0xcc/0x320 [ 144.205235] kmalloc_oob_right from kunit_try_run_case+0x11c/0x2e4 [ 144.206351] kunit_try_run_case from kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 144.207101] kunit_generic_run_threadfn_adapter from kthread+0x184/0x1a8 [ 144.207731] kthread from ret_from_fork+0x14/0x30 [ 144.208404] Exception stack(0xf9e93fb0 to 0xf9e93ff8) [ 144.209250] 3fa0: 00000000 00000000 00000000 00000000 [ 144.210132] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 144.211033] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 144.211935] [ 144.212270] Allocated by task 111: [ 144.212902] kasan_set_track+0x3c/0x5c [ 144.213534] __kasan_kmalloc+0x8c/0x94 [ 144.214046] kmalloc_oob_right+0xa0/0x320 [ 144.214595] kunit_try_run_case+0x11c/0x2e4 [ 144.215149] kunit_generic_run_threadfn_adapter+0x2c/0x48 [ 144.215975] kthread+0x184/0x1a8 [ 144.216444] ret_from_fork+0x14/0x30 [ 144.216960] [ 144.217457] The buggy address belongs to the object at c4fc8f00 [ 144.217457] which belongs to the cache kmalloc-128 of size 128 [ 144.218939] The buggy address is located 0 bytes to the right of [ 144.218939] allocated 115-byte region [c4fc8f00, c4fc8f73) [ 144.220376] [ 144.220904] The buggy address belongs to the physical page: [ 144.221914] page:0207a5d0 refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x44fc8 [ 144.223467] flags: 0x800(slab|zone=0) [ 144.224494] page_type: 0xffffffff() [ 144.225706] raw: 00000800 c4801300 00000122 00000000 00000000 80100010 ffffffff 00000001 [ 144.226667] raw: 00000000 [ 144.227358] page dumped because: kasan: bad access detected [ 144.228034] [ 144.228385] Memory state around the buggy address: [ 144.229183] c4fc8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 144.229938] c4fc8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 144.230900] >c4fc8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 144.231646] ^ [ 144.232518] c4fc8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 144.233232] c4fc9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 144.234002] ==================================================================
[ 46.575813] ================================================================== [ 46.577068] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xcf/0x330 [ 46.578236] Write of size 1 at addr ffff888102840473 by task kunit_try_catch/134 [ 46.579108] [ 46.580127] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G N 6.6.76-rc1 #1 [ 46.581104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 46.582548] Call Trace: [ 46.583012] <TASK> [ 46.583686] dump_stack_lvl+0x4e/0x90 [ 46.584344] print_report+0xd2/0x660 [ 46.584873] ? __virt_addr_valid+0x156/0x1e0 [ 46.585398] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.586068] kasan_report+0xff/0x140 [ 46.586556] ? kmalloc_oob_right+0xcf/0x330 [ 46.587076] ? kmalloc_oob_right+0xcf/0x330 [ 46.587657] __asan_store1+0x69/0x70 [ 46.588134] kmalloc_oob_right+0xcf/0x330 [ 46.588704] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 46.589358] ? __schedule+0x70b/0x1190 [ 46.589935] ? ktime_get_ts64+0x118/0x140 [ 46.590545] kunit_try_run_case+0x126/0x290 [ 46.591066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.591684] ? __kasan_check_write+0x18/0x20 [ 46.592267] ? trace_preempt_on+0x20/0xa0 [ 46.592816] ? __kthread_parkme+0x4f/0xd0 [ 46.593395] ? preempt_count_sub+0x50/0x80 [ 46.593945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.594503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.595309] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 46.595970] kthread+0x19e/0x1e0 [ 46.596421] ? __pfx_kthread+0x10/0x10 [ 46.596897] ret_from_fork+0x41/0x70 [ 46.597453] ? __pfx_kthread+0x10/0x10 [ 46.597963] ret_from_fork_asm+0x1b/0x30 [ 46.598619] </TASK> [ 46.599159] [ 46.599516] Allocated by task 134: [ 46.600170] kasan_save_stack+0x3c/0x60 [ 46.600694] kasan_set_track+0x29/0x40 [ 46.601215] kasan_save_alloc_info+0x22/0x30 [ 46.601703] __kasan_kmalloc+0xb7/0xc0 [ 46.602231] kmalloc_trace+0x4c/0xb0 [ 46.602694] kmalloc_oob_right+0x9f/0x330 [ 46.603272] kunit_try_run_case+0x126/0x290 [ 46.603792] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 46.604497] kthread+0x19e/0x1e0 [ 46.604964] ret_from_fork+0x41/0x70 [ 46.605525] ret_from_fork_asm+0x1b/0x30 [ 46.606209] [ 46.606649] The buggy address belongs to the object at ffff888102840400 [ 46.606649] which belongs to the cache kmalloc-128 of size 128 [ 46.608081] The buggy address is located 0 bytes to the right of [ 46.608081] allocated 115-byte region [ffff888102840400, ffff888102840473) [ 46.609213] [ 46.609702] The buggy address belongs to the physical page: [ 46.610545] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840 [ 46.611961] flags: 0x200000000000800(slab|node=0|zone=2) [ 46.613040] page_type: 0xffffffff() [ 46.614274] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 46.614996] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 46.615813] page dumped because: kasan: bad access detected [ 46.616289] [ 46.616540] Memory state around the buggy address: [ 46.617446] ffff888102840300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.618275] ffff888102840380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.619042] >ffff888102840400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.619852] ^ [ 46.620675] ffff888102840480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.621531] ffff888102840500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.622451] ================================================================== [ 46.671212] ================================================================== [ 46.671716] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x144/0x330 [ 46.672213] Read of size 1 at addr ffff888102840480 by task kunit_try_catch/134 [ 46.673136] [ 46.673448] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 46.674441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 46.675535] Call Trace: [ 46.675939] <TASK> [ 46.676324] dump_stack_lvl+0x4e/0x90 [ 46.677000] print_report+0xd2/0x660 [ 46.677633] ? __virt_addr_valid+0x156/0x1e0 [ 46.678237] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.679066] kasan_report+0xff/0x140 [ 46.679684] ? kmalloc_oob_right+0x144/0x330 [ 46.680305] ? kmalloc_oob_right+0x144/0x330 [ 46.680984] __asan_load1+0x66/0x70 [ 46.681598] kmalloc_oob_right+0x144/0x330 [ 46.682260] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 46.682836] ? __schedule+0x70b/0x1190 [ 46.683565] ? ktime_get_ts64+0x118/0x140 [ 46.684171] kunit_try_run_case+0x126/0x290 [ 46.684799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.685337] ? __kasan_check_write+0x18/0x20 [ 46.685947] ? trace_preempt_on+0x20/0xa0 [ 46.686482] ? __kthread_parkme+0x4f/0xd0 [ 46.687069] ? preempt_count_sub+0x50/0x80 [ 46.687656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.688209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.689018] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 46.689707] kthread+0x19e/0x1e0 [ 46.690221] ? __pfx_kthread+0x10/0x10 [ 46.690786] ret_from_fork+0x41/0x70 [ 46.691389] ? __pfx_kthread+0x10/0x10 [ 46.691936] ret_from_fork_asm+0x1b/0x30 [ 46.692589] </TASK> [ 46.692959] [ 46.693234] Allocated by task 134: [ 46.693709] kasan_save_stack+0x3c/0x60 [ 46.694236] kasan_set_track+0x29/0x40 [ 46.694769] kasan_save_alloc_info+0x22/0x30 [ 46.695434] __kasan_kmalloc+0xb7/0xc0 [ 46.695973] kmalloc_trace+0x4c/0xb0 [ 46.696415] kmalloc_oob_right+0x9f/0x330 [ 46.697116] kunit_try_run_case+0x126/0x290 [ 46.697694] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 46.698394] kthread+0x19e/0x1e0 [ 46.698946] ret_from_fork+0x41/0x70 [ 46.699505] ret_from_fork_asm+0x1b/0x30 [ 46.700047] [ 46.700323] The buggy address belongs to the object at ffff888102840400 [ 46.700323] which belongs to the cache kmalloc-128 of size 128 [ 46.701474] The buggy address is located 13 bytes to the right of [ 46.701474] allocated 115-byte region [ffff888102840400, ffff888102840473) [ 46.702585] [ 46.702922] The buggy address belongs to the physical page: [ 46.703460] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840 [ 46.704373] flags: 0x200000000000800(slab|node=0|zone=2) [ 46.704967] page_type: 0xffffffff() [ 46.705534] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 46.706353] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 46.707125] page dumped because: kasan: bad access detected [ 46.707690] [ 46.707953] Memory state around the buggy address: [ 46.708554] ffff888102840380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.709288] ffff888102840400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.709947] >ffff888102840480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.710614] ^ [ 46.711107] ffff888102840500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.711803] ffff888102840580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.712556] ================================================================== [ 46.625274] ================================================================== [ 46.626063] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x330 [ 46.626932] Write of size 1 at addr ffff888102840478 by task kunit_try_catch/134 [ 46.627633] [ 46.628036] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G B N 6.6.76-rc1 #1 [ 46.629116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 46.630009] Call Trace: [ 46.630465] <TASK> [ 46.630838] dump_stack_lvl+0x4e/0x90 [ 46.631520] print_report+0xd2/0x660 [ 46.632154] ? __virt_addr_valid+0x156/0x1e0 [ 46.632710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 46.633681] kasan_report+0xff/0x140 [ 46.634326] ? kmalloc_oob_right+0x108/0x330 [ 46.634597] ? kmalloc_oob_right+0x108/0x330 [ 46.635015] __asan_store1+0x69/0x70 [ 46.635718] kmalloc_oob_right+0x108/0x330 [ 46.636447] ? __pfx_kmalloc_oob_right+0x10/0x10 [ 46.637214] ? __schedule+0x70b/0x1190 [ 46.637899] ? ktime_get_ts64+0x118/0x140 [ 46.638479] kunit_try_run_case+0x126/0x290 [ 46.638938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.639453] ? __kasan_check_write+0x18/0x20 [ 46.640037] ? trace_preempt_on+0x20/0xa0 [ 46.640564] ? __kthread_parkme+0x4f/0xd0 [ 46.641258] ? preempt_count_sub+0x50/0x80 [ 46.641942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 46.642580] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 46.643405] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 46.644205] kthread+0x19e/0x1e0 [ 46.644749] ? __pfx_kthread+0x10/0x10 [ 46.645319] ret_from_fork+0x41/0x70 [ 46.646006] ? __pfx_kthread+0x10/0x10 [ 46.646567] ret_from_fork_asm+0x1b/0x30 [ 46.647258] </TASK> [ 46.647623] [ 46.647962] Allocated by task 134: [ 46.648405] kasan_save_stack+0x3c/0x60 [ 46.649044] kasan_set_track+0x29/0x40 [ 46.649583] kasan_save_alloc_info+0x22/0x30 [ 46.650204] __kasan_kmalloc+0xb7/0xc0 [ 46.650798] kmalloc_trace+0x4c/0xb0 [ 46.651361] kmalloc_oob_right+0x9f/0x330 [ 46.651994] kunit_try_run_case+0x126/0x290 [ 46.652576] kunit_generic_run_threadfn_adapter+0x33/0x50 [ 46.653340] kthread+0x19e/0x1e0 [ 46.653882] ret_from_fork+0x41/0x70 [ 46.654444] ret_from_fork_asm+0x1b/0x30 [ 46.655046] [ 46.655380] The buggy address belongs to the object at ffff888102840400 [ 46.655380] which belongs to the cache kmalloc-128 of size 128 [ 46.656540] The buggy address is located 5 bytes to the right of [ 46.656540] allocated 115-byte region [ffff888102840400, ffff888102840473) [ 46.657861] [ 46.658209] The buggy address belongs to the physical page: [ 46.658675] page:(____ptrval____) refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102840 [ 46.659704] flags: 0x200000000000800(slab|node=0|zone=2) [ 46.660418] page_type: 0xffffffff() [ 46.661000] raw: 0200000000000800 ffff8881000418c0 dead000000000122 0000000000000000 [ 46.661792] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 46.662589] page dumped because: kasan: bad access detected [ 46.663101] [ 46.663424] Memory state around the buggy address: [ 46.664087] ffff888102840300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.664941] ffff888102840380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.665591] >ffff888102840400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.666250] ^ [ 46.666969] ffff888102840480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.667707] ffff888102840500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.668501] ==================================================================