<5>[ 0.000000] Linux version 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ (kbuild@gfx-ci) (gcc (Ubuntu 13.3.0-6ubuntu2~24.04) 13.3.0, GNU ld (GNU Binutils for Ubuntu) 2.42) #1 SMP PREEMPT_DYNAMIC Mon Feb 10 04:31:58 UTC 2025 <6>[ 0.000000] Command line: BOOT_IMAGE=/boot/drm_intel root=/dev/sda2 rootwait fsck.repair=yes nmi_watchdog=panic,auto panic=5 softdog.soft_panic=5 log_buf_len=1M trace_clock=global drm.debug=0xe modprobe.blacklist=i915,snd_hda_intel,xe ro <6>[ 0.000000] KERNEL supported cpus: <6>[ 0.000000] Intel GenuineIntel <6>[ 0.000000] AMD AuthenticAMD <6>[ 0.000000] Hygon HygonGenuine <6>[ 0.000000] Centaur CentaurHauls <6>[ 0.000000] zhaoxin Shanghai <6>[ 0.000000] BIOS-provided physical RAM map: <6>[ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x0000000000057fff] usable <6>[ 0.000000] BIOS-e820: [mem 0x0000000000058000-0x0000000000058fff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x0000000000059000-0x000000000009dfff] usable <6>[ 0.000000] BIOS-e820: [mem 0x000000000009e000-0x000000000009efff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x000000000009f000-0x000000000009ffff] usable <6>[ 0.000000] BIOS-e820: [mem 0x00000000000a0000-0x00000000000fffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000719dffff] usable <6>[ 0.000000] BIOS-e820: [mem 0x00000000719e0000-0x00000000719e0fff] ACPI NVS <6>[ 0.000000] BIOS-e820: [mem 0x00000000719e1000-0x0000000071a2afff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x0000000071a2b000-0x0000000071a9cfff] usable <6>[ 0.000000] BIOS-e820: [mem 0x0000000071a9d000-0x0000000071ebffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x0000000071ec0000-0x0000000071f99fff] ACPI NVS <6>[ 0.000000] BIOS-e820: [mem 0x0000000071f9a000-0x0000000071ffefff] ACPI data <6>[ 0.000000] BIOS-e820: [mem 0x0000000071fff000-0x0000000071ffffff] usable <6>[ 0.000000] BIOS-e820: [mem 0x0000000072000000-0x0000000073ffffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x0000000078000000-0x000000007dffffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x0000000080000000-0x000000008c7fffff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x00000000e00fa000-0x00000000e00fafff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x00000000e00fd000-0x00000000e00fdfff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved <6>[ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x00000002737fffff] usable <6>[ 0.000000] NX (Execute Disable) protection: active <6>[ 0.000000] APIC: Static calls initialized <7>[ 0.000000] e820: update [mem 0x6dc3e018-0x6dc4e057] usable ==> usable <7>[ 0.000000] e820: update [mem 0x6dc35018-0x6dc3d057] usable ==> usable <7>[ 0.000000] e820: update [mem 0x6dc23018-0x6dc34057] usable ==> usable <7>[ 0.000000] e820: update [mem 0x6dc11018-0x6dc22057] usable ==> usable <6>[ 0.000000] extended physical RAM map: <6>[ 0.000000] reserve setup_data: [mem 0x0000000000000000-0x0000000000057fff] usable <6>[ 0.000000] reserve setup_data: [mem 0x0000000000058000-0x0000000000058fff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x0000000000059000-0x000000000009dfff] usable <6>[ 0.000000] reserve setup_data: [mem 0x000000000009e000-0x000000000009efff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x000000000009f000-0x000000000009ffff] usable <6>[ 0.000000] reserve setup_data: [mem 0x00000000000a0000-0x00000000000fffff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x0000000000100000-0x000000006dc11017] usable <6>[ 0.000000] reserve setup_data: [mem 0x000000006dc11018-0x000000006dc22057] usable <6>[ 0.000000] reserve setup_data: [mem 0x000000006dc22058-0x000000006dc23017] usable <6>[ 0.000000] reserve setup_data: [mem 0x000000006dc23018-0x000000006dc34057] usable <6>[ 0.000000] reserve setup_data: [mem 0x000000006dc34058-0x000000006dc35017] usable <6>[ 0.000000] reserve setup_data: [mem 0x000000006dc35018-0x000000006dc3d057] usable <6>[ 0.000000] reserve setup_data: [mem 0x000000006dc3d058-0x000000006dc3e017] usable <6>[ 0.000000] reserve setup_data: [mem 0x000000006dc3e018-0x000000006dc4e057] usable <6>[ 0.000000] reserve setup_data: [mem 0x000000006dc4e058-0x00000000719dffff] usable <6>[ 0.000000] reserve setup_data: [mem 0x00000000719e0000-0x00000000719e0fff] ACPI NVS <6>[ 0.000000] reserve setup_data: [mem 0x00000000719e1000-0x0000000071a2afff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x0000000071a2b000-0x0000000071a9cfff] usable <6>[ 0.000000] reserve setup_data: [mem 0x0000000071a9d000-0x0000000071ebffff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x0000000071ec0000-0x0000000071f99fff] ACPI NVS <6>[ 0.000000] reserve setup_data: [mem 0x0000000071f9a000-0x0000000071ffefff] ACPI data <6>[ 0.000000] reserve setup_data: [mem 0x0000000071fff000-0x0000000071ffffff] usable <6>[ 0.000000] reserve setup_data: [mem 0x0000000072000000-0x0000000073ffffff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x0000000078000000-0x000000007dffffff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x0000000080000000-0x000000008c7fffff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x00000000e00fa000-0x00000000e00fafff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x00000000e00fd000-0x00000000e00fdfff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x00000000fe000000-0x00000000fe010fff] reserved <6>[ 0.000000] reserve setup_data: [mem 0x0000000100000000-0x00000002737fffff] usable <6>[ 0.000000] efi: EFI v2.5 by EDK II BIOS ID:S1200SP.86B.03.01.0026.092720170729 <6>[ 0.000000] efi: SMBIOS=0x71e06000 ACPI=0x71ffe000 ACPI 2.0=0x71ffe014 MOKvar=0x71b79000 <6>[ 0.000000] efi: Not removing mem263: MMIO range=[0xe00fa000-0xe00fafff] (4KB) from e820 map <6>[ 0.000000] efi: Not removing mem264: MMIO range=[0xe00fd000-0xe00fdfff] (4KB) from e820 map <6>[ 0.000000] efi: Not removing mem265: MMIO range=[0xfe000000-0xfe010fff] (68KB) from e820 map <6>[ 0.000000] SMBIOS 2.7 present. <6>[ 0.000000] DMI: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <6>[ 0.000000] DMI: Memory slots populated: 2/4 <6>[ 0.000000] tsc: Detected 3800.000 MHz processor <6>[ 0.000000] tsc: Detected 3799.900 MHz TSC <7>[ 0.000011] e820: update [mem 0x00000000-0x00000fff] usable ==> reserved <7>[ 0.000013] e820: remove [mem 0x000a0000-0x000fffff] usable <6>[ 0.000022] last_pfn = 0x273800 max_arch_pfn = 0x400000000 <6>[ 0.000025] MTRR map: 6 entries (4 fixed + 2 variable; max 24), built from 10 variable MTRRs <6>[ 0.000026] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT <6>[ 0.000311] last_pfn = 0x72000 max_arch_pfn = 0x400000000 <6>[ 0.006269] Using GB pages for direct mapping <6>[ 0.007533] printk: log buffer data + meta data: 1048576 + 3670016 = 4718592 bytes <6>[ 0.007534] printk: early log buf free: 256032(97%) <6>[ 0.007535] Secure boot disabled <6>[ 0.007537] ACPI: Early table checksum verification disabled <6>[ 0.007540] ACPI: RSDP 0x0000000071FFE014 000024 (v02 INTEL ) <6>[ 0.007543] ACPI: XSDT 0x0000000071FB7188 0000CC (v01 INTEL S1200SPL 00000000 INTL 01000013) <6>[ 0.007548] ACPI: FACP 0x0000000071FF6000 0000F4 (v05 INTEL S1200SPL 00000000 INTL 20091013) <6>[ 0.007552] ACPI: DSDT 0x0000000071FC6000 029241 (v02 INTEL S1200SPL 00000000 INTL 20091013) <6>[ 0.007555] ACPI: FACS 0x0000000071F7E000 000040 <6>[ 0.007557] ACPI: HPET 0x0000000071FF5000 000038 (v01 INTEL S1200SPL 00000001 INTL 20091013) <6>[ 0.007560] ACPI: APIC 0x0000000071FF4000 0000BC (v03 INTEL S1200SPL 00000001 INTL 20091013) <6>[ 0.007562] ACPI: MCFG 0x0000000071FF3000 00003C (v01 INTEL S1200SPL 00000001 INTL 20091013) <6>[ 0.007564] ACPI: SPMI 0x0000000071FF1000 000042 (v05 INTEL S1200SPL 00000000 INTL 20091013) <6>[ 0.007567] ACPI: WDDT 0x0000000071FF0000 000040 (v01 INTEL S1200SPL 00000000 INTL 20091013) <6>[ 0.007569] ACPI: SSDT 0x0000000071FC3000 002BAE (v02 INTEL S1200SPL 00001000 INTL 20091013) <6>[ 0.007571] ACPI: SSDT 0x0000000071FC2000 000BE3 (v02 INTEL S1200SPL 00001000 INTL 20091013) <6>[ 0.007574] ACPI: SSDT 0x0000000071FC1000 00019A (v02 INTEL S1200SPL 00001000 INTL 20091013) <6>[ 0.007576] ACPI: SSDT 0x0000000071FC0000 0004A3 (v02 INTEL S1200SPL 00001000 INTL 20091013) <6>[ 0.007578] ACPI: UEFI 0x0000000071F93000 000042 (v01 INTEL S1200SPL 00000002 INTL 01000013) <6>[ 0.007581] ACPI: SSDT 0x0000000071FBF000 000E73 (v02 INTEL S1200SPL 00003000 INTL 20141107) <6>[ 0.007583] ACPI: SSDT 0x0000000071FBD000 000064 (v02 INTEL S1200SPL 00000002 INTL 20141107) <6>[ 0.007585] ACPI: DMAR 0x0000000071FBB000 0000A8 (v01 INTEL S1200SPL 00000001 INTL 00000001) <6>[ 0.007588] ACPI: HEST 0x0000000071FBA000 0000A8 (v01 INTEL S1200SPL 00000001 INTL 00000001) <6>[ 0.007590] ACPI: ERST 0x0000000071FB8000 000230 (v01 INTEL S1200SPL 00000001 INTL 00000001) <6>[ 0.007592] ACPI: SSDT 0x0000000071FF7000 005328 (v02 INTEL S1200SPL 00003000 INTL 20141107) <6>[ 0.007595] ACPI: SSDT 0x0000000071FBE000 000B79 (v02 INTEL S1200SPL 00000002 INTL 20141107) <6>[ 0.007597] ACPI: BERT 0x0000000071FB9000 000030 (v01 INTEL S1200SPL 00000001 INTL 00000001) <6>[ 0.007600] ACPI: PRAD 0x0000000071FBC000 000102 (v02 INTEL S1200SPL 00000002 INTL 20141107) <6>[ 0.007602] ACPI: EINJ 0x0000000071FFD000 000130 (v01 INTEL S1200SPL 00000001 INTL 00000001) <6>[ 0.007604] ACPI: Reserving FACP table memory at [mem 0x71ff6000-0x71ff60f3] <6>[ 0.007605] ACPI: Reserving DSDT table memory at [mem 0x71fc6000-0x71fef240] <6>[ 0.007606] ACPI: Reserving FACS table memory at [mem 0x71f7e000-0x71f7e03f] <6>[ 0.007606] ACPI: Reserving HPET table memory at [mem 0x71ff5000-0x71ff5037] <6>[ 0.007607] ACPI: Reserving APIC table memory at [mem 0x71ff4000-0x71ff40bb] <6>[ 0.007607] ACPI: Reserving MCFG table memory at [mem 0x71ff3000-0x71ff303b] <6>[ 0.007608] ACPI: Reserving SPMI table memory at [mem 0x71ff1000-0x71ff1041] <6>[ 0.007608] ACPI: Reserving WDDT table memory at [mem 0x71ff0000-0x71ff003f] <6>[ 0.007609] ACPI: Reserving SSDT table memory at [mem 0x71fc3000-0x71fc5bad] <6>[ 0.007610] ACPI: Reserving SSDT table memory at [mem 0x71fc2000-0x71fc2be2] <6>[ 0.007610] ACPI: Reserving SSDT table memory at [mem 0x71fc1000-0x71fc1199] <6>[ 0.007611] ACPI: Reserving SSDT table memory at [mem 0x71fc0000-0x71fc04a2] <6>[ 0.007611] ACPI: Reserving UEFI table memory at [mem 0x71f93000-0x71f93041] <6>[ 0.007612] ACPI: Reserving SSDT table memory at [mem 0x71fbf000-0x71fbfe72] <6>[ 0.007613] ACPI: Reserving SSDT table memory at [mem 0x71fbd000-0x71fbd063] <6>[ 0.007613] ACPI: Reserving DMAR table memory at [mem 0x71fbb000-0x71fbb0a7] <6>[ 0.007614] ACPI: Reserving HEST table memory at [mem 0x71fba000-0x71fba0a7] <6>[ 0.007614] ACPI: Reserving ERST table memory at [mem 0x71fb8000-0x71fb822f] <6>[ 0.007615] ACPI: Reserving SSDT table memory at [mem 0x71ff7000-0x71ffc327] <6>[ 0.007615] ACPI: Reserving SSDT table memory at [mem 0x71fbe000-0x71fbeb78] <6>[ 0.007616] ACPI: Reserving BERT table memory at [mem 0x71fb9000-0x71fb902f] <6>[ 0.007617] ACPI: Reserving PRAD table memory at [mem 0x71fbc000-0x71fbc101] <6>[ 0.007617] ACPI: Reserving EINJ table memory at [mem 0x71ffd000-0x71ffd12f] <6>[ 0.007786] No NUMA configuration found <6>[ 0.007787] Faking a node at [mem 0x0000000000000000-0x00000002737fffff] <6>[ 0.007795] NODE_DATA(0) allocated [mem 0x273352fc0-0x27337dfff] <6>[ 0.007954] Zone ranges: <6>[ 0.007954] DMA [mem 0x0000000000001000-0x0000000000ffffff] <6>[ 0.007956] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] <6>[ 0.007957] Normal [mem 0x0000000100000000-0x00000002737fffff] <6>[ 0.007958] Device empty <6>[ 0.007958] Movable zone start for each node <6>[ 0.007960] Early memory node ranges <6>[ 0.007961] node 0: [mem 0x0000000000001000-0x0000000000057fff] <6>[ 0.007962] node 0: [mem 0x0000000000059000-0x000000000009dfff] <6>[ 0.007963] node 0: [mem 0x000000000009f000-0x000000000009ffff] <6>[ 0.007963] node 0: [mem 0x0000000000100000-0x00000000719dffff] <6>[ 0.007964] node 0: [mem 0x0000000071a2b000-0x0000000071a9cfff] <6>[ 0.007965] node 0: [mem 0x0000000071fff000-0x0000000071ffffff] <6>[ 0.007965] node 0: [mem 0x0000000100000000-0x00000002737fffff] <6>[ 0.007966] Initmem setup node 0 [mem 0x0000000000001000-0x00000002737fffff] <6>[ 0.007972] On node 0, zone DMA: 1 pages in unavailable ranges <6>[ 0.007974] On node 0, zone DMA: 1 pages in unavailable ranges <6>[ 0.007974] On node 0, zone DMA: 1 pages in unavailable ranges <6>[ 0.007999] On node 0, zone DMA: 96 pages in unavailable ranges <6>[ 0.010255] On node 0, zone DMA32: 75 pages in unavailable ranges <6>[ 0.010345] On node 0, zone DMA32: 1378 pages in unavailable ranges <6>[ 0.019432] On node 0, zone Normal: 24576 pages in unavailable ranges <6>[ 0.020621] On node 0, zone Normal: 18432 pages in unavailable ranges <6>[ 0.020637] Reserving Intel graphics memory at [mem 0x8a800000-0x8c7fffff] <6>[ 0.020787] ACPI: PM-Timer IO Port: 0x1808 <6>[ 0.020794] ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) <6>[ 0.020795] ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) <6>[ 0.020796] ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) <6>[ 0.020797] ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) <6>[ 0.020797] ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) <6>[ 0.020798] ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) <6>[ 0.020798] ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) <6>[ 0.020799] ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) <6>[ 0.020837] IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 <6>[ 0.020840] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) <6>[ 0.020841] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) <6>[ 0.020845] ACPI: Using ACPI (MADT) for SMP configuration information <6>[ 0.020845] ACPI: HPET id: 0x8086a201 base: 0xfed00000 <6>[ 0.020848] TSC deadline timer available <6>[ 0.020852] CPU topo: Max. logical packages: 1 <6>[ 0.020852] CPU topo: Max. logical dies: 1 <6>[ 0.020853] CPU topo: Max. dies per package: 1 <6>[ 0.020856] CPU topo: Max. threads per core: 2 <6>[ 0.020856] CPU topo: Num. cores per package: 4 <6>[ 0.020857] CPU topo: Num. threads per package: 8 <6>[ 0.020857] CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs <6>[ 0.020885] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] <6>[ 0.020887] PM: hibernation: Registered nosave memory: [mem 0x00058000-0x00058fff] <6>[ 0.020889] PM: hibernation: Registered nosave memory: [mem 0x0009e000-0x0009efff] <6>[ 0.020890] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000fffff] <6>[ 0.020892] PM: hibernation: Registered nosave memory: [mem 0x6dc11000-0x6dc11fff] <6>[ 0.020894] PM: hibernation: Registered nosave memory: [mem 0x6dc22000-0x6dc22fff] <6>[ 0.020894] PM: hibernation: Registered nosave memory: [mem 0x6dc23000-0x6dc23fff] <6>[ 0.020896] PM: hibernation: Registered nosave memory: [mem 0x6dc34000-0x6dc34fff] <6>[ 0.020896] PM: hibernation: Registered nosave memory: [mem 0x6dc35000-0x6dc35fff] <6>[ 0.020898] PM: hibernation: Registered nosave memory: [mem 0x6dc3d000-0x6dc3dfff] <6>[ 0.020898] PM: hibernation: Registered nosave memory: [mem 0x6dc3e000-0x6dc3efff] <6>[ 0.020900] PM: hibernation: Registered nosave memory: [mem 0x6dc4e000-0x6dc4efff] <6>[ 0.020901] PM: hibernation: Registered nosave memory: [mem 0x719e0000-0x719e0fff] <6>[ 0.020902] PM: hibernation: Registered nosave memory: [mem 0x719e1000-0x71a2afff] <6>[ 0.020904] PM: hibernation: Registered nosave memory: [mem 0x71a9d000-0x71ebffff] <6>[ 0.020904] PM: hibernation: Registered nosave memory: [mem 0x71ec0000-0x71f99fff] <6>[ 0.020905] PM: hibernation: Registered nosave memory: [mem 0x71f9a000-0x71ffefff] <6>[ 0.020906] PM: hibernation: Registered nosave memory: [mem 0x72000000-0x73ffffff] <6>[ 0.020907] PM: hibernation: Registered nosave memory: [mem 0x74000000-0x77ffffff] <6>[ 0.020907] PM: hibernation: Registered nosave memory: [mem 0x78000000-0x7dffffff] <6>[ 0.020908] PM: hibernation: Registered nosave memory: [mem 0x7e000000-0x7fffffff] <6>[ 0.020908] PM: hibernation: Registered nosave memory: [mem 0x80000000-0x8c7fffff] <6>[ 0.020909] PM: hibernation: Registered nosave memory: [mem 0x8c800000-0xe00f9fff] <6>[ 0.020909] PM: hibernation: Registered nosave memory: [mem 0xe00fa000-0xe00fafff] <6>[ 0.020910] PM: hibernation: Registered nosave memory: [mem 0xe00fb000-0xe00fcfff] <6>[ 0.020910] PM: hibernation: Registered nosave memory: [mem 0xe00fd000-0xe00fdfff] <6>[ 0.020911] PM: hibernation: Registered nosave memory: [mem 0xe00fe000-0xfdffffff] <6>[ 0.020911] PM: hibernation: Registered nosave memory: [mem 0xfe000000-0xfe010fff] <6>[ 0.020912] PM: hibernation: Registered nosave memory: [mem 0xfe011000-0xffffffff] <6>[ 0.020914] [mem 0x8c800000-0xe00f9fff] available for PCI devices <6>[ 0.020915] Booting paravirtualized kernel on bare hardware <6>[ 0.020916] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns <6>[ 0.020927] setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 <6>[ 0.021427] percpu: Embedded 91 pages/cpu s249856 r8192 d114688 u524288 <7>[ 0.021434] pcpu-alloc: s249856 r8192 d114688 u524288 alloc=1*2097152 <7>[ 0.021436] pcpu-alloc: [0] 0 1 2 3 [0] 4 5 6 7 <5>[ 0.021459] Kernel command line: BOOT_IMAGE=/boot/drm_intel root=/dev/sda2 rootwait fsck.repair=yes nmi_watchdog=panic,auto panic=5 softdog.soft_panic=5 log_buf_len=1M trace_clock=global drm.debug=0xe modprobe.blacklist=i915,snd_hda_intel,xe ro <5>[ 0.021561] Unknown kernel command line parameters "BOOT_IMAGE=/boot/drm_intel", will be passed to user space. <5>[ 0.021572] random: crng init done <6>[ 0.022204] Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) <6>[ 0.022532] Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) <6>[ 0.022623] Fallback order for Node 0: 0 <6>[ 0.022626] Built 1 zonelists, mobility grouping on. Total pages: 1987056 <6>[ 0.022627] Policy zone: Normal <6>[ 0.022638] mem auto-init: stack:all(zero), heap alloc:on, heap free:off <6>[ 0.022639] stackdepot: allocating hash table via alloc_large_system_hash <6>[ 0.022642] stackdepot hash table entries: 524288 (order: 11, 8388608 bytes, linear) <6>[ 0.023285] software IO TLB: area num 8. <4>[ 0.052687] ********************************************************** <4>[ 0.052688] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** <4>[ 0.052688] ** ** <4>[ 0.052688] ** This system shows unhashed kernel memory addresses ** <4>[ 0.052689] ** via the console, logs, and other interfaces. This ** <4>[ 0.052689] ** might reduce the security of your system. ** <4>[ 0.052689] ** ** <4>[ 0.052690] ** If you see this message and you are not debugging ** <4>[ 0.052690] ** the kernel, report this immediately to your system ** <4>[ 0.052690] ** administrator! ** <4>[ 0.052691] ** ** <4>[ 0.052691] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** <4>[ 0.052691] ********************************************************** <6>[ 0.054603] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 <6>[ 0.055124] Kernel/User page tables isolation: enabled <6>[ 0.055223] ftrace: allocating 59590 entries in 233 pages <6>[ 0.069162] ftrace: allocated 233 pages with 5 groups <6>[ 0.071115] Dynamic Preempt: voluntary <6>[ 0.071860] Running RCU self tests <6>[ 0.071861] Running RCU synchronous self tests <6>[ 0.071861] rcu: Preemptible hierarchical RCU implementation. <6>[ 0.071862] rcu: RCU lockdep checking is enabled. <6>[ 0.071862] rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. <6>[ 0.071864] Trampoline variant of Tasks RCU enabled. <6>[ 0.071864] Rude variant of Tasks RCU enabled. <6>[ 0.071864] Tracing variant of Tasks RCU enabled. <6>[ 0.071865] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. <6>[ 0.071865] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 <6>[ 0.071931] Running RCU synchronous self tests <6>[ 0.071939] RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. <6>[ 0.071943] RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. <6>[ 0.071947] RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. <6>[ 0.090154] NR_IRQS: 524544, nr_irqs: 2048, preallocated irqs: 16 <6>[ 0.090668] rcu: srcu_init: Setting srcu_struct sizes based on contention. <6>[ 0.091018] Console: colour dummy device 80x25 <6>[ 0.091030] printk: legacy console [tty0] enabled <6>[ 0.093283] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar <6>[ 0.093296] ... MAX_LOCKDEP_SUBCLASSES: 8 <6>[ 0.093302] ... MAX_LOCK_DEPTH: 48 <6>[ 0.093309] ... MAX_LOCKDEP_KEYS: 8192 <6>[ 0.093315] ... CLASSHASH_SIZE: 4096 <6>[ 0.093322] ... MAX_LOCKDEP_ENTRIES: 524288 <6>[ 0.093329] ... MAX_LOCKDEP_CHAINS: 524288 <6>[ 0.093335] ... CHAINHASH_SIZE: 262144 <6>[ 0.093342] memory used by lock dependency info: 54145 kB <6>[ 0.093350] memory used for stack traces: 4224 kB <6>[ 0.093357] per task-struct memory footprint: 1920 bytes <6>[ 0.093435] ACPI: Core revision 20240827 <6>[ 0.094267] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns <6>[ 0.094407] APIC: Switch to symmetric I/O mode setup <6>[ 0.094417] DMAR: Host address width 39 <6>[ 0.094424] DMAR: DRHD base: 0x000000fed90000 flags: 0x0 <6>[ 0.094473] DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e <6>[ 0.094486] DMAR: DRHD base: 0x000000fed91000 flags: 0x1 <6>[ 0.094517] DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da <6>[ 0.094529] DMAR: RMRR base: 0x0000003e2e0000 end: 0x0000003e2fffff <3>[ 0.094538] DMAR: [Firmware Bug]: No firmware reserved region can cover this RMRR [0x000000003e2e0000-0x000000003e2fffff], contact BIOS vendor for fixes <4>[ 0.094556] DMAR: [Firmware Bug]: Your BIOS is broken; bad RMRR [0x000000003e2e0000-0x000000003e2fffff] BIOS vendor: Intel Corporation; Ver: S1200SP.86B.03.01.0026.092720170729; Product Version: .................... <6>[ 0.094587] DMAR: RMRR base: 0x0000008a000000 end: 0x0000008c7fffff <6>[ 0.094602] DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 <6>[ 0.094612] DMAR-IR: HPET id 0 under DRHD base 0xfed91000 <6>[ 0.094619] DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit. <6>[ 0.094621] DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting. <6>[ 0.096318] DMAR-IR: Enabled IRQ remapping in xapic mode <6>[ 0.096327] x2apic: IRQ remapping doesn't support X2APIC mode <6>[ 0.100911] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 <6>[ 0.105322] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x6d8bf270d8d, max_idle_ns: 881590865083 ns <6>[ 0.105346] Calibrating delay loop (skipped), value calculated using timer frequency.. 7599.80 BogoMIPS (lpj=3799900) <6>[ 0.105383] CPU0: Thermal monitoring enabled (TM1) <6>[ 0.105442] Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 <6>[ 0.105451] Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 <6>[ 0.105463] process: using mwait in idle threads <6>[ 0.105474] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization <6>[ 0.105486] Spectre V2 : Mitigation: Retpolines <6>[ 0.105493] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch <6>[ 0.105504] Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT <3>[ 0.105513] RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! <6>[ 0.105527] RETBleed: Vulnerable <6>[ 0.105532] Speculative Store Bypass: Vulnerable <6>[ 0.105547] MDS: Vulnerable: Clear CPU buffers attempted, no microcode <6>[ 0.105556] TAA: Vulnerable: Clear CPU buffers attempted, no microcode <6>[ 0.105565] MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode <6>[ 0.105576] SRBDS: Vulnerable: No microcode <6>[ 0.105582] GDS: Vulnerable: No microcode <6>[ 0.105595] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' <6>[ 0.105606] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' <6>[ 0.105615] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' <6>[ 0.105624] x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' <6>[ 0.105633] x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' <6>[ 0.105642] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 <6>[ 0.105651] x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 <6>[ 0.105660] x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 <6>[ 0.105668] x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. <6>[ 0.137473] Freeing SMP alternatives memory: 48K <6>[ 0.137484] pid_max: default: 32768 minimum: 301 <6>[ 0.143526] LSM: initializing lsm=capability,landlock,yama,apparmor,ima,evm <6>[ 0.143696] landlock: Up and running. <6>[ 0.143703] Yama: becoming mindful. <6>[ 0.144070] AppArmor: AppArmor initialized <6>[ 0.144517] Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) <6>[ 0.144537] Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) <6>[ 0.146346] Running RCU synchronous self tests <6>[ 0.146356] Running RCU synchronous self tests <6>[ 0.146724] smpboot: CPU0: Intel(R) Xeon(R) CPU E3-1275 v6 @ 3.80GHz (family: 0x6, model: 0x9e, stepping: 0x9) <6>[ 0.149120] Running RCU Tasks wait API self tests <6>[ 0.249413] Running RCU Tasks Rude wait API self tests <6>[ 0.249422] Running RCU Tasks Trace wait API self tests <6>[ 0.249464] Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. <6>[ 0.249528] ... version: 4 <6>[ 0.249535] ... bit width: 48 <6>[ 0.249541] ... generic registers: 4 <6>[ 0.249547] ... value mask: 0000ffffffffffff <6>[ 0.249554] ... max period: 00007fffffffffff <6>[ 0.249562] ... fixed-purpose events: 3 <6>[ 0.249568] ... event mask: 000000070000000f <6>[ 0.249778] signal: max sigframe size: 2032 <6>[ 0.249811] Estimated ratio of average max frequency by base frequency (times 1024): 1077 <6>[ 0.249974] rcu: Hierarchical SRCU implementation. <6>[ 0.249983] rcu: Max phase no-delay instances is 400. <6>[ 0.250265] Timer migration: 1 hierarchy levels; 8 children per group; 1 crossnode level <6>[ 0.253941] NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. <6>[ 0.255378] Callback from call_rcu_tasks_trace() invoked. <6>[ 0.255404] smp: Bringing up secondary CPUs ... <6>[ 0.258599] smpboot: x86: Booting SMP configuration: <6>[ 0.258612] .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 <4>[ 0.274615] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. <4>[ 0.274615] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. <4>[ 0.274615] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. <6>[ 0.275433] smp: Brought up 1 node, 8 CPUs <6>[ 0.275433] smpboot: Total of 8 processors activated (60798.40 BogoMIPS) <6>[ 0.277619] Memory: 7588940K/7948224K available (24579K kernel code, 5576K rwdata, 9248K rodata, 5640K init, 68396K bss, 339120K reserved, 0K cma-reserved) <6>[ 0.278538] devtmpfs: initialized <6>[ 0.278652] x86/mm: Memory block size: 128MB <6>[ 0.289423] ACPI: PM: Registering ACPI NVS region [mem 0x719e0000-0x719e0fff] (4096 bytes) <6>[ 0.289423] ACPI: PM: Registering ACPI NVS region [mem 0x71ec0000-0x71f99fff] (892928 bytes) <6>[ 0.290468] Running RCU synchronous self tests <6>[ 0.290482] Running RCU synchronous self tests <6>[ 0.290521] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns <6>[ 0.290521] futex hash table entries: 2048 (order: 6, 262144 bytes, linear) <6>[ 0.290873] pinctrl core: initialized pinctrl subsystem <6>[ 0.291838] PM: RTC time: 06:09:48, date: 2025-02-10 <6>[ 0.293003] NET: Registered PF_NETLINK/PF_ROUTE protocol family <6>[ 0.294154] DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations <6>[ 0.294230] DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations <6>[ 0.294302] DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations <6>[ 0.294436] audit: initializing netlink subsys (disabled) <5>[ 0.294491] audit: type=2000 audit(1739167788.197:1): state=initialized audit_enabled=0 res=1 <6>[ 0.295717] thermal_sys: Registered thermal governor 'fair_share' <6>[ 0.295719] thermal_sys: Registered thermal governor 'bang_bang' <6>[ 0.295729] thermal_sys: Registered thermal governor 'step_wise' <6>[ 0.295738] thermal_sys: Registered thermal governor 'user_space' <6>[ 0.295746] thermal_sys: Registered thermal governor 'power_allocator' <6>[ 0.295836] EISA bus registered <6>[ 0.295883] cpuidle: using governor ladder <6>[ 0.295883] cpuidle: using governor menu <6>[ 0.295883] ACPI FADT declares the system doesn't support PCIe ASPM, so disable it <6>[ 0.295883] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 <6>[ 0.296972] PCI: ECAM [mem 0xe0000000-0xefffffff] (base 0xe0000000) for domain 0000 [bus 00-ff] <6>[ 0.297009] PCI: Using configuration type 1 for base access <6>[ 0.297227] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. <6>[ 0.298642] HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages <6>[ 0.298642] HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page <6>[ 0.298642] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages <6>[ 0.298642] HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page <6>[ 0.320342] raid6: avx2x4 gen() 22435 MB/s <6>[ 0.337340] raid6: avx2x2 gen() 38012 MB/s <6>[ 0.354341] raid6: avx2x1 gen() 37199 MB/s <6>[ 0.354348] raid6: using algorithm avx2x2 gen() 38012 MB/s <6>[ 0.371341] raid6: .... xor() 26213 MB/s, rmw enabled <6>[ 0.371349] raid6: using avx2x2 recovery algorithm <6>[ 0.372166] fbcon: Taking over console <6>[ 0.372659] ACPI: Added _OSI(Module Device) <6>[ 0.372668] ACPI: Added _OSI(Processor Device) <6>[ 0.372676] ACPI: Added _OSI(3.0 _SCP Extensions) <6>[ 0.372683] ACPI: Added _OSI(Processor Aggregator Device) <6>[ 0.734373] ACPI: 9 ACPI AML tables successfully acquired and loaded <5>[ 0.754328] ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored <6>[ 0.770113] ACPI: Dynamic OEM Table Load: <6>[ 0.780842] ACPI: Dynamic OEM Table Load: <6>[ 0.780863] ACPI: SSDT 0xFFFF888101964C00 00037F (v02 PmRef Cpu0Cst 00003001 INTL 20141107) <6>[ 0.785358] Callback from call_rcu_tasks() invoked. <6>[ 0.786206] ACPI: Dynamic OEM Table Load: <6>[ 0.786226] ACPI: SSDT 0xFFFF8881010CD000 000750 (v02 PmRef Cpu0Ist 00003000 INTL 20141107) <6>[ 0.798618] ACPI: Dynamic OEM Table Load: <6>[ 0.798637] ACPI: SSDT 0xFFFF8881010CE800 0005AA (v02 PmRef ApIst 00003000 INTL 20141107) <6>[ 0.809841] ACPI: Dynamic OEM Table Load: <6>[ 0.809861] ACPI: SSDT 0xFFFF88810295FA00 000119 (v02 PmRef ApCst 00003000 INTL 20141107) <6>[ 0.861116] ACPI: Interpreter enabled <6>[ 0.861269] ACPI: PM: (supports S0 S5) <6>[ 0.861277] ACPI: Using IOAPIC for interrupt routing <6>[ 0.868165] HEST: Table parsing has been initialized. <6>[ 0.869720] GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. <6>[ 0.869734] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug <6>[ 0.869746] PCI: Using E820 reservations for host bridge windows <6>[ 0.882297] ACPI: Enabled 9 GPEs in block 00 to 7F <6>[ 0.897720] ACPI: \_SB_.PCI0.PEG0.PG00: New power resource <6>[ 0.902325] ACPI: \_SB_.PCI0.PEG1.PG01: New power resource <6>[ 0.906752] ACPI: \_SB_.PCI0.PEG2.PG02: New power resource <6>[ 1.033387] ACPI: \_SB_.PCI0.RP01.PXSX.WRST: New power resource <6>[ 1.037360] ACPI: \_SB_.PCI0.RP02.PXSX.WRST: New power resource <6>[ 1.041166] ACPI: \_SB_.PCI0.RP03.PXSX.WRST: New power resource <6>[ 1.045043] ACPI: \_SB_.PCI0.RP04.PXSX.WRST: New power resource <6>[ 1.048887] ACPI: \_SB_.PCI0.RP05.PXSX.WRST: New power resource <6>[ 1.052850] ACPI: \_SB_.PCI0.RP06.PXSX.WRST: New power resource <6>[ 1.056598] ACPI: \_SB_.PCI0.RP07.PXSX.WRST: New power resource <6>[ 1.060209] ACPI: \_SB_.PCI0.RP08.PXSX.WRST: New power resource <6>[ 1.064307] ACPI: \_SB_.PCI0.RP09.PXSX.WRST: New power resource <6>[ 1.068259] ACPI: \_SB_.PCI0.RP10.PXSX.WRST: New power resource <6>[ 1.072037] ACPI: \_SB_.PCI0.RP11.PXSX.WRST: New power resource <6>[ 1.075657] ACPI: \_SB_.PCI0.RP12.PXSX.WRST: New power resource <6>[ 1.079788] ACPI: \_SB_.PCI0.RP13.PXSX.WRST: New power resource <6>[ 1.083331] ACPI: \_SB_.PCI0.RP14.PXSX.WRST: New power resource <6>[ 1.087257] ACPI: \_SB_.PCI0.RP15.PXSX.WRST: New power resource <6>[ 1.091033] ACPI: \_SB_.PCI0.RP16.PXSX.WRST: New power resource <6>[ 1.094895] ACPI: \_SB_.PCI0.RP17.PXSX.WRST: New power resource <6>[ 1.098731] ACPI: \_SB_.PCI0.RP18.PXSX.WRST: New power resource <6>[ 1.102660] ACPI: \_SB_.PCI0.RP19.PXSX.WRST: New power resource <6>[ 1.106442] ACPI: \_SB_.PCI0.RP20.PXSX.WRST: New power resource <6>[ 1.215918] acpi ABCD0000:00: ACPI dock station (docks/bays count: 1) <6>[ 1.261498] ACPI: \_TZ_.FN00: New power resource <6>[ 1.262663] ACPI: \_TZ_.FN01: New power resource <6>[ 1.263834] ACPI: \_TZ_.FN02: New power resource <6>[ 1.265334] ACPI: \_TZ_.FN03: New power resource <6>[ 1.266493] ACPI: \_TZ_.FN04: New power resource <6>[ 1.277343] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) <6>[ 1.277343] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] <6>[ 1.297938] acpi PNP0A08:00: _OSC: OS now controls [SHPCHotplug PME AER PCIeCapability LTR DPC] <6>[ 1.297953] acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration <6>[ 1.318741] PCI host bridge to bus 0000:00 <6>[ 1.318804] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] <6>[ 1.318818] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] <6>[ 1.318831] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] <6>[ 1.318845] pci_bus 0000:00: root bus resource [mem 0x8c800000-0xdfffffff window] <6>[ 1.318859] pci_bus 0000:00: root bus resource [mem 0x280000000-0x2bfffffff window] <6>[ 1.318872] pci_bus 0000:00: root bus resource [mem 0xfd000000-0xfe7fffff window] <6>[ 1.318887] pci_bus 0000:00: root bus resource [bus 00-fe] <6>[ 1.319511] pci 0000:00:00.0: [8086:5918] type 00 class 0x060000 conventional PCI endpoint <6>[ 1.319871] pci 0000:00:02.0: [8086:591d] type 00 class 0x030000 PCIe Root Complex Integrated Endpoint <6>[ 1.319901] pci 0000:00:02.0: BAR 0 [mem 0xa1000000-0xa1ffffff 64bit] <6>[ 1.319912] pci 0000:00:02.0: BAR 2 [mem 0x90000000-0x9fffffff 64bit pref] <6>[ 1.319922] pci 0000:00:02.0: BAR 4 [io 0x5000-0x503f] <6>[ 1.319966] pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] <6>[ 1.322723] pci 0000:00:14.0: [8086:a12f] type 00 class 0x0c0330 conventional PCI endpoint <6>[ 1.322782] pci 0000:00:14.0: BAR 0 [mem 0xa2d00000-0xa2d0ffff 64bit] <6>[ 1.322872] pci 0000:00:14.0: PME# supported from D3hot D3cold <6>[ 1.329113] pci 0000:00:14.2: [8086:a131] type 00 class 0x118000 conventional PCI endpoint <6>[ 1.329173] pci 0000:00:14.2: BAR 0 [mem 0x2bff01000-0x2bff01fff 64bit] <6>[ 1.329761] pci 0000:00:16.0: [8086:a13a] type 00 class 0x078000 conventional PCI endpoint <6>[ 1.329859] pci 0000:00:16.0: BAR 0 [mem 0xa2d17000-0xa2d17fff 64bit] <6>[ 1.329983] pci 0000:00:16.0: PME# supported from D3hot <6>[ 1.332229] pci 0000:00:16.1: [8086:a13b] type 00 class 0x078000 conventional PCI endpoint <6>[ 1.332331] pci 0000:00:16.1: BAR 0 [mem 0xa2d16000-0xa2d16fff 64bit] <6>[ 1.332445] pci 0000:00:16.1: PME# supported from D3hot <6>[ 1.333006] pci 0000:00:17.0: [8086:a102] type 00 class 0x010601 conventional PCI endpoint <6>[ 1.333006] pci 0000:00:17.0: BAR 0 [mem 0xa2d14000-0xa2d15fff] <6>[ 1.333006] pci 0000:00:17.0: BAR 1 [mem 0xa2d19000-0xa2d190ff] <6>[ 1.333006] pci 0000:00:17.0: BAR 2 [io 0x5080-0x5087] <6>[ 1.333006] pci 0000:00:17.0: BAR 3 [io 0x5088-0x508b] <6>[ 1.333006] pci 0000:00:17.0: BAR 4 [io 0x5060-0x507f] <6>[ 1.333006] pci 0000:00:17.0: BAR 5 [mem 0xa2d18000-0xa2d187ff] <6>[ 1.333006] pci 0000:00:17.0: PME# supported from D3hot <6>[ 1.335582] pci 0000:00:1d.0: [8086:a119] type 01 class 0x060400 PCIe Root Port <6>[ 1.335625] pci 0000:00:1d.0: PCI bridge to [bus 01] <6>[ 1.335641] pci 0000:00:1d.0: bridge window [mem 0xa2000000-0xa28fffff] <6>[ 1.335669] pci 0000:00:1d.0: bridge window [mem 0xa0000000-0xa0ffffff 64bit pref] <6>[ 1.335748] pci 0000:00:1d.0: broken device, retraining non-functional downstream link at 2.5GT/s <6>[ 2.336360] pci 0000:00:1d.0: retraining failed <6>[ 3.336397] pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold <6>[ 3.343524] pci 0000:00:1d.2: [8086:a11a] type 01 class 0x060400 PCIe Root Port <6>[ 3.343565] pci 0000:00:1d.2: PCI bridge to [bus 02] <6>[ 3.343579] pci 0000:00:1d.2: bridge window [io 0x4000-0x4fff] <6>[ 3.343600] pci 0000:00:1d.2: bridge window [mem 0xa2b00000-0xa2cfffff] <6>[ 3.343713] pci 0000:00:1d.2: PME# supported from D0 D3hot D3cold <6>[ 3.351271] pci 0000:00:1d.3: [8086:a11b] type 01 class 0x060400 PCIe Root Port <6>[ 3.351311] pci 0000:00:1d.3: PCI bridge to [bus 03] <6>[ 3.351326] pci 0000:00:1d.3: bridge window [io 0x3000-0x3fff] <6>[ 3.351346] pci 0000:00:1d.3: bridge window [mem 0xa2900000-0xa2afffff] <6>[ 3.351452] pci 0000:00:1d.3: PME# supported from D0 D3hot D3cold <6>[ 3.359093] pci 0000:00:1f.0: [8086:a149] type 00 class 0x060100 conventional PCI endpoint <6>[ 3.361585] pci 0000:00:1f.2: [8086:a121] type 00 class 0x058000 conventional PCI endpoint <6>[ 3.361646] pci 0000:00:1f.2: BAR 0 [mem 0xa2d10000-0xa2d13fff] <6>[ 3.364265] pci 0000:00:1f.4: [8086:a123] type 00 class 0x0c0500 conventional PCI endpoint <6>[ 3.364413] pci 0000:00:1f.4: BAR 0 [mem 0x2bff00000-0x2bff000ff 64bit] <6>[ 3.364443] pci 0000:00:1f.4: BAR 4 [io 0x5040-0x505f] <6>[ 3.367059] pci 0000:00:1d.0: PCI bridge to [bus 01] <6>[ 3.367481] pci 0000:02:00.0: working around ROM BAR overlap defect <6>[ 3.367492] pci 0000:02:00.0: [8086:1533] type 00 class 0x020000 PCIe Endpoint <6>[ 3.367587] pci 0000:02:00.0: BAR 0 [mem 0xa2b00000-0xa2bfffff] <6>[ 3.367607] pci 0000:02:00.0: BAR 2 [io 0x4000-0x401f] <6>[ 3.367626] pci 0000:02:00.0: BAR 3 [mem 0xa2c00000-0xa2c03fff] <6>[ 3.367819] pci 0000:02:00.0: PME# supported from D0 D3hot D3cold <6>[ 3.372700] pci 0000:00:1d.2: PCI bridge to [bus 02] <6>[ 3.373060] pci 0000:03:00.0: working around ROM BAR overlap defect <6>[ 3.373071] pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 PCIe Endpoint <6>[ 3.373166] pci 0000:03:00.0: BAR 0 [mem 0xa2900000-0xa29fffff] <6>[ 3.373187] pci 0000:03:00.0: BAR 2 [io 0x3000-0x301f] <6>[ 3.373205] pci 0000:03:00.0: BAR 3 [mem 0xa2a00000-0xa2a03fff] <6>[ 3.373394] pci 0000:03:00.0: PME# supported from D0 D3hot D3cold <6>[ 3.377942] pci 0000:00:1d.3: PCI bridge to [bus 03] <6>[ 3.395490] ACPI: PCI: Interrupt link LNKA configured for IRQ 11 <6>[ 3.396330] ACPI: PCI: Interrupt link LNKB configured for IRQ 10 <6>[ 3.397140] ACPI: PCI: Interrupt link LNKC configured for IRQ 11 <6>[ 3.397950] ACPI: PCI: Interrupt link LNKD configured for IRQ 11 <6>[ 3.399083] ACPI: PCI: Interrupt link LNKE configured for IRQ 11 <6>[ 3.399892] ACPI: PCI: Interrupt link LNKF configured for IRQ 11 <6>[ 3.400697] ACPI: PCI: Interrupt link LNKG configured for IRQ 11 <6>[ 3.401486] ACPI: PCI: Interrupt link LNKH configured for IRQ 11 <6>[ 3.436375] iommu: Default domain type: Translated <6>[ 3.436375] iommu: DMA domain TLB invalidation policy: lazy mode <5>[ 3.438794] SCSI subsystem initialized <7>[ 3.439436] libata version 3.00 loaded. <6>[ 3.439638] ACPI: bus type USB registered <6>[ 3.439638] usbcore: registered new interface driver usbfs <6>[ 3.439638] usbcore: registered new interface driver hub <6>[ 3.439638] usbcore: registered new device driver usb <6>[ 3.439752] pps_core: LinuxPPS API ver. 1 registered <6>[ 3.439760] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <6>[ 3.439797] PTP clock support registered <6>[ 3.440482] EDAC MC: Ver: 3.0.0 <6>[ 3.441553] efivars: Registered efivars operations <6>[ 3.443452] NetLabel: Initializing <6>[ 3.443460] NetLabel: domain hash size = 128 <6>[ 3.443467] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO <6>[ 3.443592] NetLabel: unlabeled traffic allowed by default <6>[ 3.443620] mctp: management component transport protocol core <6>[ 3.443629] NET: Registered PF_MCTP protocol family <6>[ 3.443687] PCI: Using ACPI for IRQ routing <7>[ 3.471607] PCI: pci_cache_line_size set to 64 bytes <7>[ 3.471692] e820: reserve RAM buffer [mem 0x00058000-0x0005ffff] <7>[ 3.471706] e820: reserve RAM buffer [mem 0x0009e000-0x0009ffff] <7>[ 3.471712] e820: reserve RAM buffer [mem 0x6dc11018-0x6fffffff] <7>[ 3.471717] e820: reserve RAM buffer [mem 0x6dc23018-0x6fffffff] <7>[ 3.471722] e820: reserve RAM buffer [mem 0x6dc35018-0x6fffffff] <7>[ 3.471727] e820: reserve RAM buffer [mem 0x6dc3e018-0x6fffffff] <7>[ 3.471733] e820: reserve RAM buffer [mem 0x719e0000-0x73ffffff] <7>[ 3.471738] e820: reserve RAM buffer [mem 0x71a9d000-0x73ffffff] <7>[ 3.471743] e820: reserve RAM buffer [mem 0x72000000-0x73ffffff] <7>[ 3.471748] e820: reserve RAM buffer [mem 0x273800000-0x273ffffff] <6>[ 3.472436] pci 0000:00:02.0: vgaarb: setting as boot VGA device <6>[ 3.472436] pci 0000:00:02.0: vgaarb: bridge control possible <6>[ 3.472436] pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none <6>[ 3.472436] vgaarb: loaded <6>[ 3.472464] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 <6>[ 3.472482] hpet0: 8 comparators, 64-bit 24.000000 MHz counter <6>[ 3.475529] clocksource: Switched to clocksource tsc-early <5>[ 3.484239] VFS: Disk quotas dquot_6.6.0 <6>[ 3.484279] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) <6>[ 3.485980] AppArmor: AppArmor Filesystem Enabled <6>[ 3.486108] pnp: PnP ACPI init <6>[ 3.487227] system 00:00: [mem 0xfd000000-0xfdabffff] has been reserved <6>[ 3.487249] system 00:00: [mem 0xfdad0000-0xfdadffff] has been reserved <6>[ 3.487265] system 00:00: [mem 0xfdb00000-0xfdffffff] has been reserved <6>[ 3.487286] system 00:00: [mem 0xfe000000-0xfe01ffff] could not be reserved <6>[ 3.487304] system 00:00: [mem 0xfe036000-0xfe03bfff] has been reserved <6>[ 3.487319] system 00:00: [mem 0xfe03d000-0xfe3fffff] has been reserved <6>[ 3.487334] system 00:00: [mem 0xfe410000-0xfe7fffff] has been reserved <6>[ 3.489516] system 00:01: [io 0x2000-0x20fe] has been reserved <6>[ 3.490552] system 00:02: [io 0x0680-0x069f] has been reserved <6>[ 3.490570] system 00:02: [io 0xffff] has been reserved <6>[ 3.490584] system 00:02: [io 0xffff] has been reserved <6>[ 3.490598] system 00:02: [io 0xffff] has been reserved <6>[ 3.490611] system 00:02: [io 0x1800-0x18fe] has been reserved <6>[ 3.490625] system 00:02: [io 0x164e-0x164f] has been reserved <6>[ 3.491249] system 00:03: [io 0x0800-0x087f] has been reserved <6>[ 3.491862] system 00:05: [io 0x1854-0x1857] has been reserved <6>[ 3.507442] system 00:07: [mem 0xfdaf0000-0xfdafffff] has been reserved <6>[ 3.507460] system 00:07: [mem 0xfdae0000-0xfdaeffff] has been reserved <6>[ 3.507476] system 00:07: [mem 0xfdac0000-0xfdacffff] has been reserved <6>[ 3.514393] system 00:08: [mem 0xfed10000-0xfed17fff] has been reserved <6>[ 3.514411] system 00:08: [mem 0xfed18000-0xfed18fff] has been reserved <6>[ 3.514427] system 00:08: [mem 0xfed19000-0xfed19fff] has been reserved <6>[ 3.514446] system 00:08: [mem 0xe0000000-0xefffffff] could not be reserved <6>[ 3.514462] system 00:08: [mem 0xfed20000-0xfed3ffff] has been reserved <6>[ 3.514480] system 00:08: [mem 0xfed90000-0xfed93fff] could not be reserved <6>[ 3.514496] system 00:08: [mem 0xfed45000-0xfed8ffff] has been reserved <6>[ 3.514511] system 00:08: [mem 0xff000000-0xffffffff] has been reserved <6>[ 3.514526] system 00:08: [mem 0xfee00000-0xfeefffff] has been reserved <6>[ 3.514546] system 00:08: [mem 0x8c800000-0x8c81ffff] has been reserved <6>[ 3.521772] pnp: PnP ACPI: found 9 devices <6>[ 3.538011] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns <6>[ 3.538392] NET: Registered PF_INET protocol family <6>[ 3.538517] IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) <6>[ 3.540512] tcp_listen_portaddr_hash hash table entries: 4096 (order: 6, 294912 bytes, linear) <6>[ 3.540593] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) <6>[ 3.540666] TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) <6>[ 3.541213] TCP bind hash table entries: 65536 (order: 11, 9437184 bytes, vmalloc hugepage) <6>[ 3.542824] TCP: Hash tables configured (established 65536 bind 65536) <6>[ 3.543084] UDP hash table entries: 4096 (order: 8, 1048576 bytes, linear) <6>[ 3.543320] UDP-Lite hash table entries: 4096 (order: 8, 1048576 bytes, linear) <6>[ 3.543853] NET: Registered PF_UNIX/PF_LOCAL protocol family <6>[ 3.543935] pci 0000:00:1d.0: PCI bridge to [bus 01] <6>[ 3.543958] pci 0000:00:1d.0: bridge window [mem 0xa2000000-0xa28fffff] <6>[ 3.543980] pci 0000:00:1d.0: bridge window [mem 0xa0000000-0xa0ffffff 64bit pref] <6>[ 3.543998] pci 0000:00:1d.2: PCI bridge to [bus 02] <6>[ 3.544010] pci 0000:00:1d.2: bridge window [io 0x4000-0x4fff] <6>[ 3.544024] pci 0000:00:1d.2: bridge window [mem 0xa2b00000-0xa2cfffff] <6>[ 3.544042] pci 0000:00:1d.3: PCI bridge to [bus 03] <6>[ 3.544053] pci 0000:00:1d.3: bridge window [io 0x3000-0x3fff] <6>[ 3.544068] pci 0000:00:1d.3: bridge window [mem 0xa2900000-0xa2afffff] <6>[ 3.544092] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] <6>[ 3.544101] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] <6>[ 3.544109] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] <6>[ 3.544119] pci_bus 0000:00: resource 7 [mem 0x8c800000-0xdfffffff window] <6>[ 3.544128] pci_bus 0000:00: resource 8 [mem 0x280000000-0x2bfffffff window] <6>[ 3.544137] pci_bus 0000:00: resource 9 [mem 0xfd000000-0xfe7fffff window] <6>[ 3.544147] pci_bus 0000:01: resource 1 [mem 0xa2000000-0xa28fffff] <6>[ 3.544156] pci_bus 0000:01: resource 2 [mem 0xa0000000-0xa0ffffff 64bit pref] <6>[ 3.544166] pci_bus 0000:02: resource 0 [io 0x4000-0x4fff] <6>[ 3.544174] pci_bus 0000:02: resource 1 [mem 0xa2b00000-0xa2cfffff] <6>[ 3.544182] pci_bus 0000:03: resource 0 [io 0x3000-0x3fff] <6>[ 3.544190] pci_bus 0000:03: resource 1 [mem 0xa2900000-0xa2afffff] <6>[ 3.548079] PCI: CLS 128 bytes, default 64 <6>[ 3.548221] pci 0000:00:1f.1: [8086:a120] type 00 class 0x058000 conventional PCI endpoint <6>[ 3.548384] pci 0000:00:1f.1: BAR 0 [mem 0xfd000000-0xfdffffff 64bit] <6>[ 3.548972] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) <6>[ 3.548983] software IO TLB: mapped [mem 0x0000000069c11000-0x000000006dc11000] (64MB) <6>[ 3.549529] sgx: EPC section 0x80200000-0x85f7ffff <5>[ 3.554503] Initialise system trusted keyrings <5>[ 3.554595] Key type blacklist registered <6>[ 3.554794] workingset: timestamp_bits=36 max_order=21 bucket_order=0 <6>[ 3.569397] squashfs: version 4.0 (2009/01/31) Phillip Lougher <6>[ 3.569521] ntfs3: Enabled Linux POSIX ACLs support <6>[ 3.569529] ntfs3: Read-only LZX/Xpress compression included <5>[ 3.569954] integrity: Platform Keyring initialized <5>[ 3.569978] integrity: Machine keyring initialized <6>[ 3.579451] xor: automatically using best checksumming function avx <5>[ 3.579463] Key type asymmetric registered <5>[ 3.579476] Asymmetric key parser 'x509' registered <6>[ 3.579615] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 243) <6>[ 3.579858] io scheduler mq-deadline registered <6>[ 3.580533] ledtrig-cpu: registered to indicate activity on CPUs <6>[ 3.582555] pcieport 0000:00:1d.0: PME: Signaling with IRQ 120 <6>[ 3.582874] pcieport 0000:00:1d.0: AER: enabled with IRQ 120 <6>[ 3.584715] pcieport 0000:00:1d.2: PME: Signaling with IRQ 121 <6>[ 3.585021] pcieport 0000:00:1d.2: AER: enabled with IRQ 121 <6>[ 3.586766] pcieport 0000:00:1d.3: PME: Signaling with IRQ 122 <6>[ 3.587057] pcieport 0000:00:1d.3: AER: enabled with IRQ 122 <6>[ 3.587478] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 <6>[ 3.592885] input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input0 <6>[ 3.593125] ACPI: button: Sleep Button [SLPB] <6>[ 3.593391] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1 <6>[ 3.593764] ACPI: button: Power Button [PWRF] <6>[ 3.603702] thermal LNXTHERM:00: registered as thermal_zone0 <6>[ 3.603713] ACPI: thermal: Thermal Zone [TZ00] (28 C) <6>[ 3.606210] thermal LNXTHERM:01: registered as thermal_zone1 <6>[ 3.606221] ACPI: thermal: Thermal Zone [TZ01] (30 C) <6>[ 3.606756] ERST: Error Record Serialization Table (ERST) support is initialized. <6>[ 3.606848] pstore: Using crash dump compression: deflate <6>[ 3.606876] pstore: Registered erst as persistent store backend <6>[ 3.607859] Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled <6>[ 3.629986] 00:06: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A <6>[ 3.677053] Linux agpgart interface v0.103 <6>[ 3.677651] ACPI: bus type drm_connector registered <6>[ 3.709720] loop: module loaded <5>[ 3.749313] Key type psk registered <7>[ 3.751153] ahci 0000:00:17.0: version 3.0 <6>[ 3.762924] ahci 0000:00:17.0: AHCI vers 0001.0301, 32 command slots, 6 Gbps, SATA mode <6>[ 3.762940] ahci 0000:00:17.0: 8/8 ports implemented (port mask 0xff) <6>[ 3.762950] ahci 0000:00:17.0: flags: 64bit ncq sntf led clo only pio slum part ems deso sadm sds apst <6>[ 3.783552] scsi host0: ahci <6>[ 3.784731] scsi host1: ahci <6>[ 3.785772] scsi host2: ahci <6>[ 3.786813] scsi host3: ahci <6>[ 3.787843] scsi host4: ahci <6>[ 3.788849] scsi host5: ahci <6>[ 3.789863] scsi host6: ahci <6>[ 3.790808] scsi host7: ahci <6>[ 3.791258] ata1: SATA max UDMA/133 abar m2048@0xa2d18000 port 0xa2d18100 irq 123 lpm-pol 0 <6>[ 3.791281] ata2: SATA max UDMA/133 abar m2048@0xa2d18000 port 0xa2d18180 irq 123 lpm-pol 0 <6>[ 3.791303] ata3: SATA max UDMA/133 abar m2048@0xa2d18000 port 0xa2d18200 irq 123 lpm-pol 0 <6>[ 3.791325] ata4: SATA max UDMA/133 abar m2048@0xa2d18000 port 0xa2d18280 irq 123 lpm-pol 0 <6>[ 3.791347] ata5: SATA max UDMA/133 abar m2048@0xa2d18000 port 0xa2d18300 irq 123 lpm-pol 0 <6>[ 3.791369] ata6: SATA max UDMA/133 abar m2048@0xa2d18000 port 0xa2d18380 irq 123 lpm-pol 0 <6>[ 3.791391] ata7: SATA max UDMA/133 abar m2048@0xa2d18000 port 0xa2d18400 irq 123 lpm-pol 0 <6>[ 3.791413] ata8: SATA max UDMA/133 abar m2048@0xa2d18000 port 0xa2d18480 irq 123 lpm-pol 0 <6>[ 3.792668] tun: Universal TUN/TAP device driver, 1.6 <6>[ 3.794580] xhci_hcd 0000:00:14.0: xHCI Host Controller <6>[ 3.794726] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 <6>[ 3.796021] xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x0000000001109810 <6>[ 3.800103] xhci_hcd 0000:00:14.0: xHCI Host Controller <6>[ 3.800129] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 <6>[ 3.800154] xhci_hcd 0000:00:14.0: Host supports USB 3.0 SuperSpeed <6>[ 3.800594] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 6.14 <6>[ 3.800618] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 <6>[ 3.800630] usb usb1: Product: xHCI Host Controller <6>[ 3.800637] usb usb1: Manufacturer: Linux 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ xhci-hcd <6>[ 3.800651] usb usb1: SerialNumber: 0000:00:14.0 <6>[ 3.802068] hub 1-0:1.0: USB hub found <6>[ 3.802177] hub 1-0:1.0: 16 ports detected <6>[ 3.819105] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 6.14 <6>[ 3.819121] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 <6>[ 3.819132] usb usb2: Product: xHCI Host Controller <6>[ 3.819140] usb usb2: Manufacturer: Linux 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ xhci-hcd <6>[ 3.819153] usb usb2: SerialNumber: 0000:00:14.0 <6>[ 3.819972] hub 2-0:1.0: USB hub found <6>[ 3.820040] hub 2-0:1.0: 10 ports detected <6>[ 3.831407] usbcore: registered new interface driver usb-storage <6>[ 3.831568] usbcore: registered new interface driver usbserial_generic <6>[ 3.831655] usbserial: USB Serial support registered for generic <6>[ 3.831718] usbcore: registered new interface driver ftdi_sio <6>[ 3.831760] usbserial: USB Serial support registered for FTDI USB Serial Device <6>[ 3.831819] usbcore: registered new interface driver pl2303 <6>[ 3.831860] usbserial: USB Serial support registered for pl2303 <6>[ 3.831987] i8042: PNP: No PS/2 controller found. <6>[ 3.832490] mousedev: PS/2 mouse device common for all mice <6>[ 3.833460] rtc_cmos 00:04: RTC can wake from S4 <6>[ 3.835055] rtc_cmos 00:04: registered as rtc0 <6>[ 3.835220] rtc_cmos 00:04: setting system clock to 2025-02-10T06:09:52 UTC (1739167792) <6>[ 3.835419] rtc_cmos 00:04: alarms up to one month, y3k, 242 bytes nvram <6>[ 3.835480] i2c_dev: i2c /dev entries driver <6>[ 3.836780] softdog: initialized. soft_noboot=0 soft_margin=60 sec soft_panic=5 (nowayout=0) <6>[ 3.836793] softdog: soft_reboot_cmd= soft_active_on_boot=0 <4>[ 3.836804] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. <6>[ 3.836840] device-mapper: uevent: version 1.0.3 <6>[ 3.837229] device-mapper: ioctl: 4.49.0-ioctl (2025-01-17) initialised: dm-devel@lists.linux.dev <6>[ 3.837362] platform eisa.0: Probing EISA bus 0 <4>[ 3.837376] platform eisa.0: EISA: Cannot allocate resource for mainboard <4>[ 3.837391] platform eisa.0: Cannot allocate resource for EISA slot 1 <4>[ 3.837405] platform eisa.0: Cannot allocate resource for EISA slot 2 <4>[ 3.837419] platform eisa.0: Cannot allocate resource for EISA slot 3 <4>[ 3.837432] platform eisa.0: Cannot allocate resource for EISA slot 4 <4>[ 3.837446] platform eisa.0: Cannot allocate resource for EISA slot 5 <4>[ 3.837459] platform eisa.0: Cannot allocate resource for EISA slot 6 <4>[ 3.837472] platform eisa.0: Cannot allocate resource for EISA slot 7 <4>[ 3.837486] platform eisa.0: Cannot allocate resource for EISA slot 8 <6>[ 3.837496] platform eisa.0: EISA: Detected 0 cards <6>[ 3.837505] intel_pstate: Intel P-state driver initializing <6>[ 3.839348] intel_pstate: Disabling energy efficiency optimization <6>[ 3.839359] intel_pstate: HWP enabled <6>[ 3.839365] sdhci: Secure Digital Host Controller Interface driver <6>[ 3.839373] sdhci: Copyright(c) Pierre Ossman <6>[ 3.839484] sdhci-pltfm: SDHCI platform and OF driver helper <6>[ 3.842461] drop_monitor: Initializing network drop monitor service <6>[ 3.843458] NET: Registered PF_INET6 protocol family <6>[ 3.846860] Segment Routing with IPv6 <6>[ 3.846929] In-situ OAM (IOAM) with IPv6 <6>[ 3.847001] NET: Registered PF_PACKET protocol family <5>[ 3.847244] Key type dns_resolver registered <6>[ 3.850266] microcode: Current revision: 0x0000005e <6>[ 3.850914] IPI shorthand broadcast: enabled <6>[ 3.871424] sched_clock: Marking stable (3864001784, 6536825)->(3919178260, -48639651) <6>[ 3.873183] registered taskstats version 1 <5>[ 3.874898] Loading compiled-in X.509 certificates <6>[ 3.926741] Demotion targets for Node 0: null <6>[ 3.926991] kmemleak: Kernel memory leak detector initialized (mem pool available: 14936) <6>[ 3.927046] kmemleak: Automatic memory scanning thread started <5>[ 3.927362] Key type .fscrypt registered <5>[ 3.927370] Key type fscrypt-provisioning registered <6>[ 3.931614] Btrfs loaded, zoned=yes, fsverity=yes <5>[ 3.934307] Key type encrypted registered <6>[ 3.934320] AppArmor: AppArmor sha256 policy hashing enabled <6>[ 3.935168] ima: No TPM chip found, activating TPM-bypass! <5>[ 3.935194] Loading compiled-in module X.509 certificates <5>[ 3.936131] Loaded X.509 cert 'Build time autogenerated kernel key: d752214cdaf7828a6c40bc6edb907b7d5cfe744f' <6>[ 3.936149] ima: Allocated hash algorithm: sha256 <6>[ 3.936215] ima: No architecture policies found <6>[ 3.936356] evm: Initialising EVM extended attributes: <6>[ 3.936364] evm: security.selinux <6>[ 3.936369] evm: security.SMACK64 <6>[ 3.936374] evm: security.SMACK64EXEC <6>[ 3.936379] evm: security.SMACK64TRANSMUTE <6>[ 3.936384] evm: security.SMACK64MMAP <6>[ 3.936389] evm: security.apparmor <6>[ 3.936394] evm: security.ima <6>[ 3.936398] evm: security.capability <6>[ 3.936403] evm: HMAC attrs: 0x1 <6>[ 3.939473] PM: Magic number: 13:974:164 <6>[ 3.939710] printk: legacy console [netcon0] enabled <6>[ 3.939720] netconsole: network logging started <6>[ 3.940734] RAS: Correctable Errors collector initialized. <6>[ 3.941329] clk: Disabling unused clocks <6>[ 3.941350] PM: genpd: Disabling unused power domains <6>[ 4.056706] usb 1-1: new full-speed USB device number 2 using xhci_hcd <6>[ 4.103303] ata6: SATA link down (SStatus 0 SControl 300) <6>[ 4.103517] ata2: SATA link down (SStatus 0 SControl 300) <6>[ 4.103666] ata7: SATA link down (SStatus 0 SControl 300) <6>[ 4.103732] ata4: SATA link down (SStatus 0 SControl 300) <6>[ 4.103802] ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) <6>[ 4.103874] ata5: SATA link down (SStatus 0 SControl 300) <6>[ 4.103949] ata3: SATA link down (SStatus 0 SControl 300) <6>[ 4.104014] ata8: SATA link down (SStatus 0 SControl 300) <6>[ 4.104368] ata1.00: ATA-11: KINGSTON SUV400S37120G, 0C3FD6SD, max UDMA/133 <6>[ 4.104560] ata1.00: 234441648 sectors, multi 1: LBA48 NCQ (depth 32), AA <6>[ 4.108527] ata1.00: configured for UDMA/133 <5>[ 4.110184] scsi 0:0:0:0: Direct-Access ATA KINGSTON SUV400S D6SD PQ: 0 ANSI: 5 <5>[ 4.114010] sd 0:0:0:0: Attached scsi generic sg0 type 0 <5>[ 4.114197] sd 0:0:0:0: [sda] 234441648 512-byte logical blocks: (120 GB/112 GiB) <5>[ 4.114281] sd 0:0:0:0: [sda] 4096-byte physical blocks <5>[ 4.114367] sd 0:0:0:0: [sda] Write Protect is off <7>[ 4.114408] sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 <5>[ 4.114496] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA <6>[ 4.114698] sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes <6>[ 4.138633] sda: sda1 sda2 <5>[ 4.139461] sd 0:0:0:0: [sda] Attached SCSI disk <6>[ 4.139593] md: Waiting for all devices to be available before autodetect <6>[ 4.139617] md: If you don't use raid, use raid=noautodetect <6>[ 4.139626] md: Autodetecting RAID arrays. <6>[ 4.139640] md: autorun ... <6>[ 4.139645] md: ... autorun DONE. <6>[ 4.159923] EXT4-fs (sda2): mounted filesystem 6814686b-dccd-431b-b3a3-463da31da4ac ro with ordered data mode. Quota mode: none. <6>[ 4.159997] VFS: Mounted root (ext4 filesystem) readonly on device 8:2. <6>[ 4.160765] devtmpfs: mounted <6>[ 4.175072] Freeing unused decrypted memory: 2028K <6>[ 4.176010] Freeing unused kernel image (initmem) memory: 5640K <6>[ 4.176127] Write protecting the kernel read-only data: 36864k <6>[ 4.177358] Freeing unused kernel image (text/rodata gap) memory: 2044K <6>[ 4.177831] Freeing unused kernel image (rodata/data gap) memory: 992K <6>[ 4.204464] usb 1-1: New USB device found, idVendor=046b, idProduct=ff10, bcdDevice= 1.00 <6>[ 4.204491] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 <6>[ 4.204502] usb 1-1: Product: Virtual Keyboard and Mouse <6>[ 4.204511] usb 1-1: Manufacturer: American Megatrends Inc. <6>[ 4.204520] usb 1-1: SerialNumber: serial <6>[ 4.214058] x86/mm: Checked W+X mappings: passed, no W+X pages found. <6>[ 4.214069] x86/mm: Checking user space page tables <6>[ 4.248978] x86/mm: Checked W+X mappings: passed, no W+X pages found. <6>[ 4.249022] Run /sbin/init as init process <7>[ 4.249030] with arguments: <7>[ 4.249031] /sbin/init <7>[ 4.249033] with environment: <7>[ 4.249034] HOME=/ <7>[ 4.249035] TERM=linux <7>[ 4.249036] BOOT_IMAGE=/boot/drm_intel <4>[ 4.382120] kmemleak: Found object by alias at 0xffffffffa0406000 <4>[ 4.382239] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.382242] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.382242] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.382243] Call Trace: <4>[ 4.382244] <4>[ 4.382245] dump_stack_lvl+0x91/0xf0 <4>[ 4.382249] dump_stack+0x10/0x20 <4>[ 4.382250] __lookup_object+0x90/0xa0 <4>[ 4.382253] __find_and_get_object+0x6c/0x190 <4>[ 4.382256] paint_ptr+0x1b/0xa0 <4>[ 4.382259] kmemleak_not_leak+0x33/0x70 <4>[ 4.382262] load_module+0xa20/0x2d10 <4>[ 4.382270] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.382274] ? kernel_read_file+0x2ac/0x330 <4>[ 4.382279] init_module_from_file+0x97/0xe0 <4>[ 4.382280] ? init_module_from_file+0x97/0xe0 <4>[ 4.382288] idempotent_init_module+0x134/0x350 <4>[ 4.382296] __x64_sys_finit_module+0x77/0x100 <4>[ 4.382299] x64_sys_call+0x24e3/0x2670 <4>[ 4.382302] do_syscall_64+0x91/0x180 <4>[ 4.382304] ? __lock_acquire+0x437/0x2600 <4>[ 4.382313] ? ext4_llseek+0xc0/0x120 <4>[ 4.382316] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.382320] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.382323] ? do_syscall_64+0x9d/0x180 <4>[ 4.382325] ? __might_fault+0x89/0xb0 <4>[ 4.382327] ? __might_fault+0x53/0xb0 <4>[ 4.382328] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 4.382336] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.382339] ? do_syscall_64+0x9d/0x180 <4>[ 4.382341] ? exc_page_fault+0xb1/0x300 <4>[ 4.382344] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.382346] RIP: 0033:0x73bf64d2725d <4>[ 4.382348] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.382349] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.382351] RAX: ffffffffffffffda RBX: 000061a1e55a7a00 RCX: 000073bf64d2725d <4>[ 4.382352] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000004 <4>[ 4.382353] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7780 <4>[ 4.382353] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.382354] R13: 0000000000020000 R14: 000061a1e55a7aa0 R15: 000061a1e55a7cf0 <4>[ 4.382361] <5>[ 4.382362] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 4.382644] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 4.382653] kmemleak: min_count = 0 <5>[ 4.382660] kmemleak: count = 0 <5>[ 4.382665] kmemleak: flags = 0x1 <5>[ 4.382671] kmemleak: checksum = 0 <5>[ 4.382677] kmemleak: backtrace: <4>[ 4.382683] kmemleak_vmalloc+0x7c/0xf0 <4>[ 4.382690] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 4.382700] execmem_vmalloc+0x5a/0xf0 <4>[ 4.382707] execmem_alloc+0xc2/0x150 <4>[ 4.382715] load_module+0x9db/0x2d10 <4>[ 4.382721] init_module_from_file+0x97/0xe0 <4>[ 4.382728] idempotent_init_module+0x134/0x350 <4>[ 4.382736] __x64_sys_finit_module+0x77/0x100 <4>[ 4.382743] x64_sys_call+0x24e3/0x2670 <4>[ 4.382751] do_syscall_64+0x91/0x180 <4>[ 4.382758] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.382785] kmemleak: Trying to color unknown object at 0xffffffffa0406000 as Grey <4>[ 4.382796] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.382798] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.382798] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.382799] Call Trace: <4>[ 4.382799] <4>[ 4.382800] dump_stack_lvl+0xc1/0xf0 <4>[ 4.382802] dump_stack+0x10/0x20 <4>[ 4.382804] paint_ptr+0x8d/0xa0 <4>[ 4.382806] kmemleak_not_leak+0x33/0x70 <4>[ 4.382809] load_module+0xa20/0x2d10 <4>[ 4.382815] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.382819] ? kernel_read_file+0x2ac/0x330 <4>[ 4.382822] init_module_from_file+0x97/0xe0 <4>[ 4.382823] ? init_module_from_file+0x97/0xe0 <4>[ 4.382830] idempotent_init_module+0x134/0x350 <4>[ 4.382837] __x64_sys_finit_module+0x77/0x100 <4>[ 4.382840] x64_sys_call+0x24e3/0x2670 <4>[ 4.382842] do_syscall_64+0x91/0x180 <4>[ 4.382844] ? __lock_acquire+0x437/0x2600 <4>[ 4.382851] ? ext4_llseek+0xc0/0x120 <4>[ 4.382854] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.382857] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.382860] ? do_syscall_64+0x9d/0x180 <4>[ 4.382861] ? __might_fault+0x89/0xb0 <4>[ 4.382862] ? __might_fault+0x53/0xb0 <4>[ 4.382864] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 4.382870] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.382873] ? do_syscall_64+0x9d/0x180 <4>[ 4.382875] ? exc_page_fault+0xb1/0x300 <4>[ 4.382878] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.382880] RIP: 0033:0x73bf64d2725d <4>[ 4.382881] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.382882] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.382883] RAX: ffffffffffffffda RBX: 000061a1e55a7a00 RCX: 000073bf64d2725d <4>[ 4.382883] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000004 <4>[ 4.382884] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7780 <4>[ 4.382885] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.382885] R13: 0000000000020000 R14: 000061a1e55a7aa0 R15: 000061a1e55a7cf0 <4>[ 4.382892] <7>[ 4.384774] systemd[1]: Inserted module 'autofs4' <4>[ 4.387995] kmemleak: Found object by alias at 0xffffffffa0407000 <4>[ 4.388007] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.388021] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.388022] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.388022] Call Trace: <4>[ 4.388023] <4>[ 4.388024] dump_stack_lvl+0x91/0xf0 <4>[ 4.388026] dump_stack+0x10/0x20 <4>[ 4.388028] __lookup_object+0x90/0xa0 <4>[ 4.388030] __find_and_get_object+0x6c/0x190 <4>[ 4.388033] paint_ptr+0x1b/0xa0 <4>[ 4.388036] kmemleak_not_leak+0x33/0x70 <4>[ 4.388038] load_module+0xa20/0x2d10 <4>[ 4.388046] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.388050] ? kernel_read_file+0x2ac/0x330 <4>[ 4.388054] init_module_from_file+0x97/0xe0 <4>[ 4.388055] ? init_module_from_file+0x97/0xe0 <4>[ 4.388063] idempotent_init_module+0x134/0x350 <4>[ 4.388071] __x64_sys_finit_module+0x77/0x100 <4>[ 4.388072] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.388075] x64_sys_call+0x24e3/0x2670 <4>[ 4.388077] do_syscall_64+0x91/0x180 <4>[ 4.388079] ? do_syscall_64+0x9d/0x180 <4>[ 4.388082] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.388085] ? do_syscall_64+0x9d/0x180 <4>[ 4.388089] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.388092] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.388095] ? do_syscall_64+0x9d/0x180 <4>[ 4.388096] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 4.388101] ? putname+0x60/0x80 <4>[ 4.388103] ? do_sys_openat2+0xab/0xf0 <4>[ 4.388108] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.388110] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.388114] ? do_syscall_64+0x9d/0x180 <4>[ 4.388115] ? exc_page_fault+0xb1/0x300 <4>[ 4.388118] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.388120] RIP: 0033:0x73bf64d2725d <4>[ 4.388122] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.388123] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.388124] RAX: ffffffffffffffda RBX: 000061a1e55a7f70 RCX: 000073bf64d2725d <4>[ 4.388125] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000004 <4>[ 4.388126] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7760 <4>[ 4.388127] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.388127] R13: 0000000000020000 R14: 000061a1e55a7aa0 R15: 000061a1e55a8220 <4>[ 4.388135] <5>[ 4.388135] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 4.388433] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 4.388442] kmemleak: min_count = 0 <5>[ 4.388448] kmemleak: count = 0 <5>[ 4.388454] kmemleak: flags = 0x1 <5>[ 4.388460] kmemleak: checksum = 0 <5>[ 4.388465] kmemleak: backtrace: <4>[ 4.388471] kmemleak_vmalloc+0x7c/0xf0 <4>[ 4.388479] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 4.388488] execmem_vmalloc+0x5a/0xf0 <4>[ 4.388496] execmem_alloc+0xc2/0x150 <4>[ 4.388503] load_module+0x9db/0x2d10 <4>[ 4.388510] init_module_from_file+0x97/0xe0 <4>[ 4.388517] idempotent_init_module+0x134/0x350 <4>[ 4.388524] __x64_sys_finit_module+0x77/0x100 <4>[ 4.388532] x64_sys_call+0x24e3/0x2670 <4>[ 4.388541] do_syscall_64+0x91/0x180 <4>[ 4.388549] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.388564] kmemleak: Trying to color unknown object at 0xffffffffa0407000 as Grey <4>[ 4.388576] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.388577] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.388578] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.388578] Call Trace: <4>[ 4.388579] <4>[ 4.388579] dump_stack_lvl+0xc1/0xf0 <4>[ 4.388582] dump_stack+0x10/0x20 <4>[ 4.388583] paint_ptr+0x8d/0xa0 <4>[ 4.388586] kmemleak_not_leak+0x33/0x70 <4>[ 4.388588] load_module+0xa20/0x2d10 <4>[ 4.388594] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.388598] ? kernel_read_file+0x2ac/0x330 <4>[ 4.388601] init_module_from_file+0x97/0xe0 <4>[ 4.388602] ? init_module_from_file+0x97/0xe0 <4>[ 4.388609] idempotent_init_module+0x134/0x350 <4>[ 4.388616] __x64_sys_finit_module+0x77/0x100 <4>[ 4.388617] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.388620] x64_sys_call+0x24e3/0x2670 <4>[ 4.388622] do_syscall_64+0x91/0x180 <4>[ 4.388624] ? do_syscall_64+0x9d/0x180 <4>[ 4.388627] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.388630] ? do_syscall_64+0x9d/0x180 <4>[ 4.388633] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.388636] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.388638] ? do_syscall_64+0x9d/0x180 <4>[ 4.388640] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 4.388644] ? putname+0x60/0x80 <4>[ 4.388646] ? do_sys_openat2+0xab/0xf0 <4>[ 4.388649] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.388652] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.388655] ? do_syscall_64+0x9d/0x180 <4>[ 4.388656] ? exc_page_fault+0xb1/0x300 <4>[ 4.388659] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.388661] RIP: 0033:0x73bf64d2725d <4>[ 4.388662] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.388663] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.388664] RAX: ffffffffffffffda RBX: 000061a1e55a7f70 RCX: 000073bf64d2725d <4>[ 4.388665] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000004 <4>[ 4.388666] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7760 <4>[ 4.388666] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.388667] R13: 0000000000020000 R14: 000061a1e55a7aa0 R15: 000061a1e55a8220 <4>[ 4.388673] <4>[ 4.388821] kmemleak: Found object by alias at 0xffffffffa040d000 <4>[ 4.389121] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.389123] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.389123] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.389123] Call Trace: <4>[ 4.389124] <4>[ 4.389125] dump_stack_lvl+0x91/0xf0 <4>[ 4.389127] dump_stack+0x10/0x20 <4>[ 4.389128] __lookup_object+0x90/0xa0 <4>[ 4.389130] __find_and_get_object+0x6c/0x190 <4>[ 4.389134] paint_ptr+0x1b/0xa0 <4>[ 4.389136] kmemleak_not_leak+0x33/0x70 <4>[ 4.389138] load_module+0xa20/0x2d10 <4>[ 4.389146] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.389149] ? kernel_read_file+0x2ac/0x330 <4>[ 4.389153] init_module_from_file+0x97/0xe0 <4>[ 4.389154] ? init_module_from_file+0x97/0xe0 <4>[ 4.389162] idempotent_init_module+0x134/0x350 <4>[ 4.389170] __x64_sys_finit_module+0x77/0x100 <4>[ 4.389171] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.389174] x64_sys_call+0x24e3/0x2670 <4>[ 4.389176] do_syscall_64+0x91/0x180 <4>[ 4.389178] ? do_syscall_64+0x9d/0x180 <4>[ 4.389181] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.389184] ? do_syscall_64+0x9d/0x180 <4>[ 4.389188] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.389190] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.389193] ? do_syscall_64+0x9d/0x180 <4>[ 4.389195] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 4.389199] ? putname+0x60/0x80 <4>[ 4.389201] ? do_sys_openat2+0xab/0xf0 <4>[ 4.389205] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.389208] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.389211] ? do_syscall_64+0x9d/0x180 <4>[ 4.389212] ? exc_page_fault+0xb1/0x300 <4>[ 4.389216] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.389218] RIP: 0033:0x73bf64d2725d <4>[ 4.389219] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.389220] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.389221] RAX: ffffffffffffffda RBX: 000061a1e55a7f70 RCX: 000073bf64d2725d <4>[ 4.389221] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000004 <4>[ 4.389222] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7760 <4>[ 4.389222] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.389223] R13: 0000000000020000 R14: 000061a1e55a7aa0 R15: 000061a1e55a8220 <4>[ 4.389230] <5>[ 4.389231] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 4.389528] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 4.389537] kmemleak: min_count = 0 <5>[ 4.389547] kmemleak: count = 0 <5>[ 4.389553] kmemleak: flags = 0x1 <5>[ 4.389559] kmemleak: checksum = 0 <5>[ 4.389565] kmemleak: backtrace: <4>[ 4.389570] kmemleak_vmalloc+0x7c/0xf0 <4>[ 4.389578] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 4.389587] execmem_vmalloc+0x5a/0xf0 <4>[ 4.389594] execmem_alloc+0xc2/0x150 <4>[ 4.389601] load_module+0x9db/0x2d10 <4>[ 4.389621] init_module_from_file+0x97/0xe0 <4>[ 4.389628] idempotent_init_module+0x134/0x350 <4>[ 4.389635] __x64_sys_finit_module+0x77/0x100 <4>[ 4.389642] x64_sys_call+0x24e3/0x2670 <4>[ 4.389649] do_syscall_64+0x91/0x180 <4>[ 4.389656] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.389723] kmemleak: Trying to color unknown object at 0xffffffffa040d000 as Grey <4>[ 4.389734] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.389735] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.389736] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.389736] Call Trace: <4>[ 4.389736] <4>[ 4.389737] dump_stack_lvl+0xc1/0xf0 <4>[ 4.389739] dump_stack+0x10/0x20 <4>[ 4.389741] paint_ptr+0x8d/0xa0 <4>[ 4.389743] kmemleak_not_leak+0x33/0x70 <4>[ 4.389745] load_module+0xa20/0x2d10 <4>[ 4.389752] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.389755] ? kernel_read_file+0x2ac/0x330 <4>[ 4.389758] init_module_from_file+0x97/0xe0 <4>[ 4.389759] ? init_module_from_file+0x97/0xe0 <4>[ 4.389766] idempotent_init_module+0x134/0x350 <4>[ 4.389773] __x64_sys_finit_module+0x77/0x100 <4>[ 4.389774] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.389777] x64_sys_call+0x24e3/0x2670 <4>[ 4.389779] do_syscall_64+0x91/0x180 <4>[ 4.389781] ? do_syscall_64+0x9d/0x180 <4>[ 4.389783] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.389786] ? do_syscall_64+0x9d/0x180 <4>[ 4.389789] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.389792] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.389794] ? do_syscall_64+0x9d/0x180 <4>[ 4.389796] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 4.389800] ? putname+0x60/0x80 <4>[ 4.389802] ? do_sys_openat2+0xab/0xf0 <4>[ 4.389805] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.389808] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.389811] ? do_syscall_64+0x9d/0x180 <4>[ 4.389812] ? exc_page_fault+0xb1/0x300 <4>[ 4.389815] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.389817] RIP: 0033:0x73bf64d2725d <4>[ 4.389818] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.389819] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.389820] RAX: ffffffffffffffda RBX: 000061a1e55a7f70 RCX: 000073bf64d2725d <4>[ 4.389820] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000004 <4>[ 4.389821] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7760 <4>[ 4.389821] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.389822] R13: 0000000000020000 R14: 000061a1e55a7aa0 R15: 000061a1e55a8220 <4>[ 4.389828] <4>[ 4.393366] kmemleak: Found object by alias at 0xffffffffa040e000 <4>[ 4.393390] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.393392] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.393393] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.393393] Call Trace: <4>[ 4.393394] <4>[ 4.393395] dump_stack_lvl+0x91/0xf0 <4>[ 4.393397] dump_stack+0x10/0x20 <4>[ 4.393399] __lookup_object+0x90/0xa0 <4>[ 4.393401] __find_and_get_object+0x6c/0x190 <4>[ 4.393405] paint_ptr+0x1b/0xa0 <4>[ 4.393407] kmemleak_not_leak+0x33/0x70 <4>[ 4.393410] load_module+0xa20/0x2d10 <4>[ 4.393417] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.393421] ? kernel_read_file+0x2ac/0x330 <4>[ 4.393425] init_module_from_file+0x97/0xe0 <4>[ 4.393426] ? init_module_from_file+0x97/0xe0 <4>[ 4.393434] idempotent_init_module+0x134/0x350 <4>[ 4.393442] __x64_sys_finit_module+0x77/0x100 <4>[ 4.393445] x64_sys_call+0x24e3/0x2670 <4>[ 4.393447] do_syscall_64+0x91/0x180 <4>[ 4.393449] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.393452] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.393455] ? do_syscall_64+0x9d/0x180 <4>[ 4.393456] ? exc_page_fault+0xb1/0x300 <4>[ 4.393460] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.393462] RIP: 0033:0x73bf64d2725d <4>[ 4.393463] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.393464] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.393466] RAX: ffffffffffffffda RBX: 000061a1e55a7a00 RCX: 000073bf64d2725d <4>[ 4.393467] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000005 <4>[ 4.393467] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7760 <4>[ 4.393468] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.393469] R13: 0000000000020000 R14: 000061a1e55a7c50 R15: 000061a1e55a8260 <4>[ 4.393476] <5>[ 4.393477] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 4.393730] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 4.393738] kmemleak: min_count = 0 <5>[ 4.393744] kmemleak: count = 0 <5>[ 4.393750] kmemleak: flags = 0x1 <5>[ 4.393756] kmemleak: checksum = 0 <5>[ 4.393761] kmemleak: backtrace: <4>[ 4.393767] kmemleak_vmalloc+0x7c/0xf0 <4>[ 4.393774] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 4.393783] execmem_vmalloc+0x5a/0xf0 <4>[ 4.393790] execmem_alloc+0xc2/0x150 <4>[ 4.393797] load_module+0x9db/0x2d10 <4>[ 4.393804] init_module_from_file+0x97/0xe0 <4>[ 4.393811] idempotent_init_module+0x134/0x350 <4>[ 4.393818] __x64_sys_finit_module+0x77/0x100 <4>[ 4.393826] x64_sys_call+0x24e3/0x2670 <4>[ 4.393833] do_syscall_64+0x91/0x180 <4>[ 4.393840] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.393919] kmemleak: Trying to color unknown object at 0xffffffffa040e000 as Grey <4>[ 4.393931] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.393932] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.393933] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.393933] Call Trace: <4>[ 4.393934] <4>[ 4.393935] dump_stack_lvl+0xc1/0xf0 <4>[ 4.393937] dump_stack+0x10/0x20 <4>[ 4.393938] paint_ptr+0x8d/0xa0 <4>[ 4.393941] kmemleak_not_leak+0x33/0x70 <4>[ 4.393943] load_module+0xa20/0x2d10 <4>[ 4.393950] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.393953] ? kernel_read_file+0x2ac/0x330 <4>[ 4.393957] init_module_from_file+0x97/0xe0 <4>[ 4.393958] ? init_module_from_file+0x97/0xe0 <4>[ 4.393965] idempotent_init_module+0x134/0x350 <4>[ 4.393972] __x64_sys_finit_module+0x77/0x100 <4>[ 4.393974] x64_sys_call+0x24e3/0x2670 <4>[ 4.393976] do_syscall_64+0x91/0x180 <4>[ 4.393978] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.393981] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.393984] ? do_syscall_64+0x9d/0x180 <4>[ 4.393985] ? exc_page_fault+0xb1/0x300 <4>[ 4.393989] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.393990] RIP: 0033:0x73bf64d2725d <4>[ 4.393991] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.393992] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.393993] RAX: ffffffffffffffda RBX: 000061a1e55a7a00 RCX: 000073bf64d2725d <4>[ 4.393994] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000005 <4>[ 4.393995] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7760 <4>[ 4.393995] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.393996] R13: 0000000000020000 R14: 000061a1e55a7c50 R15: 000061a1e55a8260 <4>[ 4.394002] <4>[ 4.394291] kmemleak: Found object by alias at 0xffffffffa0406000 <4>[ 4.394538] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.394539] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.394540] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.394540] Call Trace: <4>[ 4.394541] <4>[ 4.394542] dump_stack_lvl+0x91/0xf0 <4>[ 4.394544] dump_stack+0x10/0x20 <4>[ 4.394545] __lookup_object+0x90/0xa0 <4>[ 4.394548] __find_and_get_object+0x6c/0x190 <4>[ 4.394551] paint_ptr+0x1b/0xa0 <4>[ 4.394554] kmemleak_not_leak+0x33/0x70 <4>[ 4.394556] load_module+0xa20/0x2d10 <4>[ 4.394564] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.394567] ? kernel_read_file+0x2ac/0x330 <4>[ 4.394571] init_module_from_file+0x97/0xe0 <4>[ 4.394572] ? init_module_from_file+0x97/0xe0 <4>[ 4.394593] idempotent_init_module+0x134/0x350 <4>[ 4.394601] __x64_sys_finit_module+0x77/0x100 <4>[ 4.394603] x64_sys_call+0x24e3/0x2670 <4>[ 4.394605] do_syscall_64+0x91/0x180 <4>[ 4.394607] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.394610] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.394613] ? do_syscall_64+0x9d/0x180 <4>[ 4.394615] ? exc_page_fault+0xb1/0x300 <4>[ 4.394618] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.394620] RIP: 0033:0x73bf64d2725d <4>[ 4.394621] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.394622] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.394623] RAX: ffffffffffffffda RBX: 000061a1e55a7a00 RCX: 000073bf64d2725d <4>[ 4.394624] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000005 <4>[ 4.394625] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7760 <4>[ 4.394625] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.394626] R13: 0000000000020000 R14: 000061a1e55a7c50 R15: 000061a1e55a8260 <4>[ 4.394633] <5>[ 4.394633] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 4.394871] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 4.394880] kmemleak: min_count = 0 <5>[ 4.394885] kmemleak: count = 0 <5>[ 4.394891] kmemleak: flags = 0x1 <5>[ 4.394897] kmemleak: checksum = 0 <5>[ 4.394902] kmemleak: backtrace: <4>[ 4.394908] kmemleak_vmalloc+0x7c/0xf0 <4>[ 4.394915] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 4.394924] execmem_vmalloc+0x5a/0xf0 <4>[ 4.394931] execmem_alloc+0xc2/0x150 <4>[ 4.394938] load_module+0x9db/0x2d10 <4>[ 4.394945] init_module_from_file+0x97/0xe0 <4>[ 4.394952] idempotent_init_module+0x134/0x350 <4>[ 4.394959] __x64_sys_finit_module+0x77/0x100 <4>[ 4.394967] x64_sys_call+0x24e3/0x2670 <4>[ 4.394974] do_syscall_64+0x91/0x180 <4>[ 4.394981] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.394995] kmemleak: Trying to color unknown object at 0xffffffffa0406000 as Grey <4>[ 4.395006] CPU: 0 UID: 0 PID: 1 Comm: systemd Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.395008] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.395008] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.395009] Call Trace: <4>[ 4.395009] <4>[ 4.395010] dump_stack_lvl+0xc1/0xf0 <4>[ 4.395012] dump_stack+0x10/0x20 <4>[ 4.395013] paint_ptr+0x8d/0xa0 <4>[ 4.395016] kmemleak_not_leak+0x33/0x70 <4>[ 4.395018] load_module+0xa20/0x2d10 <4>[ 4.395024] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.395027] ? kernel_read_file+0x2ac/0x330 <4>[ 4.395031] init_module_from_file+0x97/0xe0 <4>[ 4.395032] ? init_module_from_file+0x97/0xe0 <4>[ 4.395038] idempotent_init_module+0x134/0x350 <4>[ 4.395045] __x64_sys_finit_module+0x77/0x100 <4>[ 4.395048] x64_sys_call+0x24e3/0x2670 <4>[ 4.395050] do_syscall_64+0x91/0x180 <4>[ 4.395052] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 4.395054] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 4.395057] ? do_syscall_64+0x9d/0x180 <4>[ 4.395059] ? exc_page_fault+0xb1/0x300 <4>[ 4.395062] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.395063] RIP: 0033:0x73bf64d2725d <4>[ 4.395064] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.395065] RSP: 002b:00007ffee8fe7718 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.395066] RAX: ffffffffffffffda RBX: 000061a1e55a7a00 RCX: 000073bf64d2725d <4>[ 4.395067] RDX: 0000000000000000 RSI: 000073bf6579507d RDI: 0000000000000005 <4>[ 4.395067] RBP: 00007ffee8fe77d0 R08: 0000000000000040 R09: 00007ffee8fe7760 <4>[ 4.395068] R10: 000073bf64e03b20 R11: 0000000000000246 R12: 000073bf6579507d <4>[ 4.395069] R13: 0000000000020000 R14: 000061a1e55a7c50 R15: 000061a1e55a8260 <4>[ 4.395075] <7>[ 4.458204] systemd[1]: systemd 255.4-1ubuntu8.4 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT +QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) <7>[ 4.458272] systemd[1]: Detected architecture x86-64. <7>[ 4.461056] systemd[1]: Hostname set to . <6>[ 4.609277] tsc: Refined TSC clocksource calibration: 3792.047 MHz <6>[ 4.609367] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x6d51ff56f2d, max_idle_ns: 881590710838 ns <6>[ 4.609528] clocksource: Switched to clocksource tsc <7>[ 4.721217] systemd[1]: Configuration file /run/systemd/system/systemd-networkd-wait-online.service.d/10-netplan.conf is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. <7>[ 4.722409] systemd[1]: Configuration file /run/systemd/system/netplan-ovs-cleanup.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. <7>[ 4.864338] systemd[1]: Queued start job for default target graphical.target. <4>[ 4.870494] kmemleak: Found object by alias at 0xffffffffa0412000 <4>[ 4.870520] CPU: 7 UID: 0 PID: 211 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.870522] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.870523] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.870524] Call Trace: <4>[ 4.870524] <4>[ 4.870525] dump_stack_lvl+0x91/0xf0 <4>[ 4.870529] dump_stack+0x10/0x20 <4>[ 4.870531] __lookup_object+0x90/0xa0 <4>[ 4.870534] __find_and_get_object+0x6c/0x190 <4>[ 4.870538] paint_ptr+0x1b/0xa0 <4>[ 4.870541] kmemleak_not_leak+0x33/0x70 <4>[ 4.870543] load_module+0xa20/0x2d10 <4>[ 4.870552] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.870568] ? kernel_read_file+0x2ac/0x330 <4>[ 4.870573] init_module_from_file+0x97/0xe0 <4>[ 4.870574] ? init_module_from_file+0x97/0xe0 <4>[ 4.870582] idempotent_init_module+0x134/0x350 <4>[ 4.870590] __x64_sys_finit_module+0x77/0x100 <4>[ 4.870593] x64_sys_call+0x24e3/0x2670 <4>[ 4.870595] do_syscall_64+0x91/0x180 <4>[ 4.870601] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 4.870604] ? irqentry_exit+0x77/0xb0 <4>[ 4.870606] ? exc_page_fault+0xb1/0x300 <4>[ 4.870610] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.870612] RIP: 0033:0x7c48bfb2725d <4>[ 4.870614] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.870615] RSP: 002b:00007ffe2a8d7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.870616] RAX: ffffffffffffffda RBX: 000061d5aa5a51f0 RCX: 00007c48bfb2725d <4>[ 4.870617] RDX: 0000000000000000 RSI: 000061d5974f3e52 RDI: 0000000000000000 <4>[ 4.870618] RBP: 00007ffe2a8d7300 R08: 0000000000000040 R09: 00007ffe2a8d7380 <4>[ 4.870619] R10: 00007c48bfc03b20 R11: 0000000000000246 R12: 000061d5974f3e52 <4>[ 4.870619] R13: 0000000000040000 R14: 000061d5aa5a5100 R15: 0000000000000000 <4>[ 4.870627] <5>[ 4.870627] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 4.870860] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 4.870869] kmemleak: min_count = 0 <5>[ 4.870875] kmemleak: count = 0 <5>[ 4.870881] kmemleak: flags = 0x1 <5>[ 4.870886] kmemleak: checksum = 0 <5>[ 4.870892] kmemleak: backtrace: <4>[ 4.870898] kmemleak_vmalloc+0x7c/0xf0 <4>[ 4.870905] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 4.870915] execmem_vmalloc+0x5a/0xf0 <4>[ 4.870922] execmem_alloc+0xc2/0x150 <4>[ 4.870929] load_module+0x9db/0x2d10 <4>[ 4.870936] init_module_from_file+0x97/0xe0 <4>[ 4.870943] idempotent_init_module+0x134/0x350 <4>[ 4.870950] __x64_sys_finit_module+0x77/0x100 <4>[ 4.870958] x64_sys_call+0x24e3/0x2670 <4>[ 4.870965] do_syscall_64+0x91/0x180 <4>[ 4.870972] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.870986] kmemleak: Trying to color unknown object at 0xffffffffa0412000 as Grey <4>[ 4.870997] CPU: 7 UID: 0 PID: 211 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.870999] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.871000] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.871000] Call Trace: <4>[ 4.871000] <4>[ 4.871001] dump_stack_lvl+0xc1/0xf0 <4>[ 4.871003] dump_stack+0x10/0x20 <4>[ 4.871005] paint_ptr+0x8d/0xa0 <4>[ 4.871007] kmemleak_not_leak+0x33/0x70 <4>[ 4.871009] load_module+0xa20/0x2d10 <4>[ 4.871016] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.871019] ? kernel_read_file+0x2ac/0x330 <4>[ 4.871023] init_module_from_file+0x97/0xe0 <4>[ 4.871024] ? init_module_from_file+0x97/0xe0 <4>[ 4.871030] idempotent_init_module+0x134/0x350 <4>[ 4.871037] __x64_sys_finit_module+0x77/0x100 <4>[ 4.871040] x64_sys_call+0x24e3/0x2670 <4>[ 4.871042] do_syscall_64+0x91/0x180 <4>[ 4.871046] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 4.871049] ? irqentry_exit+0x77/0xb0 <4>[ 4.871051] ? exc_page_fault+0xb1/0x300 <4>[ 4.871054] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.871056] RIP: 0033:0x7c48bfb2725d <4>[ 4.871057] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.871058] RSP: 002b:00007ffe2a8d7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.871059] RAX: ffffffffffffffda RBX: 000061d5aa5a51f0 RCX: 00007c48bfb2725d <4>[ 4.871060] RDX: 0000000000000000 RSI: 000061d5974f3e52 RDI: 0000000000000000 <4>[ 4.871060] RBP: 00007ffe2a8d7300 R08: 0000000000000040 R09: 00007ffe2a8d7380 <4>[ 4.871061] R10: 00007c48bfc03b20 R11: 0000000000000246 R12: 000061d5974f3e52 <4>[ 4.871061] R13: 0000000000040000 R14: 000061d5aa5a5100 R15: 0000000000000000 <4>[ 4.871068] <4>[ 4.871221] kmemleak: Found object by alias at 0xffffffffa0406000 <4>[ 4.871470] CPU: 7 UID: 0 PID: 211 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.871471] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.871472] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.871472] Call Trace: <4>[ 4.871472] <4>[ 4.871473] dump_stack_lvl+0x91/0xf0 <4>[ 4.871475] dump_stack+0x10/0x20 <4>[ 4.871477] __lookup_object+0x90/0xa0 <4>[ 4.871479] __find_and_get_object+0x6c/0x190 <4>[ 4.871482] paint_ptr+0x1b/0xa0 <4>[ 4.871485] kmemleak_not_leak+0x33/0x70 <4>[ 4.871487] load_module+0xa20/0x2d10 <4>[ 4.871494] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.871497] ? kernel_read_file+0x2ac/0x330 <4>[ 4.871501] init_module_from_file+0x97/0xe0 <4>[ 4.871503] ? init_module_from_file+0x97/0xe0 <4>[ 4.871510] idempotent_init_module+0x134/0x350 <4>[ 4.871518] __x64_sys_finit_module+0x77/0x100 <4>[ 4.871521] x64_sys_call+0x24e3/0x2670 <4>[ 4.871523] do_syscall_64+0x91/0x180 <4>[ 4.871528] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 4.871531] ? irqentry_exit+0x77/0xb0 <4>[ 4.871533] ? exc_page_fault+0xb1/0x300 <4>[ 4.871536] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.871538] RIP: 0033:0x7c48bfb2725d <4>[ 4.871539] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.871540] RSP: 002b:00007ffe2a8d7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.871541] RAX: ffffffffffffffda RBX: 000061d5aa5a51f0 RCX: 00007c48bfb2725d <4>[ 4.871542] RDX: 0000000000000000 RSI: 000061d5974f3e52 RDI: 0000000000000000 <4>[ 4.871542] RBP: 00007ffe2a8d7300 R08: 0000000000000040 R09: 00007ffe2a8d7380 <4>[ 4.871543] R10: 00007c48bfc03b20 R11: 0000000000000246 R12: 000061d5974f3e52 <4>[ 4.871543] R13: 0000000000040000 R14: 000061d5aa5a5100 R15: 0000000000000000 <4>[ 4.871550] <5>[ 4.871551] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 4.871810] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 4.871818] kmemleak: min_count = 0 <5>[ 4.871824] kmemleak: count = 0 <5>[ 4.871830] kmemleak: flags = 0x1 <5>[ 4.871835] kmemleak: checksum = 0 <5>[ 4.871841] kmemleak: backtrace: <4>[ 4.871847] kmemleak_vmalloc+0x7c/0xf0 <4>[ 4.871854] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 4.871862] execmem_vmalloc+0x5a/0xf0 <4>[ 4.871870] execmem_alloc+0xc2/0x150 <4>[ 4.871877] load_module+0x9db/0x2d10 <4>[ 4.871883] init_module_from_file+0x97/0xe0 <4>[ 4.871890] idempotent_init_module+0x134/0x350 <4>[ 4.871898] __x64_sys_finit_module+0x77/0x100 <4>[ 4.871905] x64_sys_call+0x24e3/0x2670 <4>[ 4.871912] do_syscall_64+0x91/0x180 <4>[ 4.871919] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.871935] kmemleak: Trying to color unknown object at 0xffffffffa0406000 as Grey <4>[ 4.871961] CPU: 7 UID: 0 PID: 211 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 4.871962] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 4.871962] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 4.871963] Call Trace: <4>[ 4.871963] <4>[ 4.871964] dump_stack_lvl+0xc1/0xf0 <4>[ 4.871966] dump_stack+0x10/0x20 <4>[ 4.871967] paint_ptr+0x8d/0xa0 <4>[ 4.871970] kmemleak_not_leak+0x33/0x70 <4>[ 4.871985] load_module+0xa20/0x2d10 <4>[ 4.871991] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 4.871994] ? kernel_read_file+0x2ac/0x330 <4>[ 4.871998] init_module_from_file+0x97/0xe0 <4>[ 4.871999] ? init_module_from_file+0x97/0xe0 <4>[ 4.872005] idempotent_init_module+0x134/0x350 <4>[ 4.872012] __x64_sys_finit_module+0x77/0x100 <4>[ 4.872015] x64_sys_call+0x24e3/0x2670 <4>[ 4.872017] do_syscall_64+0x91/0x180 <4>[ 4.872021] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 4.872024] ? irqentry_exit+0x77/0xb0 <4>[ 4.872026] ? exc_page_fault+0xb1/0x300 <4>[ 4.872029] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 4.872031] RIP: 0033:0x7c48bfb2725d <4>[ 4.872032] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 4.872033] RSP: 002b:00007ffe2a8d7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 4.872034] RAX: ffffffffffffffda RBX: 000061d5aa5a51f0 RCX: 00007c48bfb2725d <4>[ 4.872034] RDX: 0000000000000000 RSI: 000061d5974f3e52 RDI: 0000000000000000 <4>[ 4.872035] RBP: 00007ffe2a8d7300 R08: 0000000000000040 R09: 00007ffe2a8d7380 <4>[ 4.872036] R10: 00007c48bfc03b20 R11: 0000000000000246 R12: 000061d5974f3e52 <4>[ 4.872036] R13: 0000000000040000 R14: 000061d5aa5a5100 R15: 0000000000000000 <4>[ 4.872042] <7>[ 4.904428] systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. <7>[ 4.908275] systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. <7>[ 4.911486] systemd[1]: Created slice user.slice - User and Session Slice. <7>[ 4.912041] systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. <7>[ 4.913381] systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. <7>[ 4.913642] systemd[1]: Expecting device dev-disk-by\x2duuid-32FD\x2d221C.device - /dev/disk/by-uuid/32FD-221C... <7>[ 4.913842] systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. <7>[ 4.914046] systemd[1]: Reached target slices.target - Slice Units. <7>[ 4.914221] systemd[1]: Reached target snapd.mounts-pre.target - Mounting snaps. <7>[ 4.914396] systemd[1]: Reached target snapd.mounts.target - Mounted snaps. <7>[ 4.914608] systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. <7>[ 4.915199] systemd[1]: Listening on dm-event.socket - Device-mapper event daemon FIFOs. <7>[ 4.916075] systemd[1]: Listening on lvm2-lvmpolld.socket - LVM2 poll daemon socket. <7>[ 4.916772] systemd[1]: Listening on multipathd.socket - multipathd control socket. <7>[ 4.917552] systemd[1]: Listening on syslog.socket - Syslog Socket. <7>[ 4.918183] systemd[1]: Listening on systemd-fsckd.socket - fsck to fsckd communication Socket. <7>[ 4.918877] systemd[1]: Listening on systemd-initctl.socket - initctl Compatibility Named Pipe. <7>[ 4.919594] systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). <7>[ 4.920325] systemd[1]: Listening on systemd-journald.socket - Journal Socket. <7>[ 4.920940] systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. <7>[ 4.921287] systemd[1]: systemd-pcrextend.socket - TPM2 PCR Extension (Varlink) was skipped because of an unmet condition check (ConditionSecurity=measured-uki). <7>[ 4.921924] systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. <7>[ 4.922501] systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. <7>[ 4.944007] systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... <7>[ 4.948138] systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... <7>[ 4.952958] systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... <7>[ 4.957311] systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... <7>[ 4.964755] systemd[1]: Starting systemd-journald.service - Journal Service... <7>[ 4.969403] systemd[1]: Starting keyboard-setup.service - Set the console keyboard layout... <7>[ 4.973973] systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... <7>[ 4.978510] systemd[1]: Starting lvm2-monitor.service - Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... <7>[ 4.984526] systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... <7>[ 4.990635] systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... <7>[ 4.995738] systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... <7>[ 5.001089] systemd-journald[219]: Collecting audit messages is disabled. <7>[ 5.002644] systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... <7>[ 5.008634] systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... <7>[ 5.015175] systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... <7>[ 5.022534] systemd[1]: Starting modprobe@nvme_fabrics.service - Load Kernel Module nvme_fabrics... <7>[ 5.022886] systemd[1]: netplan-ovs-cleanup.service - OpenVSwitch configuration for cleanup was skipped because of an unmet condition check (ConditionFileIsExecutable=/usr/bin/ovs-vsctl). <7>[ 5.029589] systemd[1]: Starting systemd-fsck-root.service - File System Check on Root Device... <4>[ 5.034183] kmemleak: Found object by alias at 0xffffffffa0406000 <4>[ 5.034198] CPU: 3 UID: 0 PID: 229 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.034201] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.034201] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.034202] Call Trace: <4>[ 5.034203] <4>[ 5.034204] dump_stack_lvl+0x91/0xf0 <4>[ 5.034208] dump_stack+0x10/0x20 <4>[ 5.034210] __lookup_object+0x90/0xa0 <4>[ 5.034214] __find_and_get_object+0x6c/0x190 <4>[ 5.034217] paint_ptr+0x1b/0xa0 <4>[ 5.034220] kmemleak_not_leak+0x33/0x70 <4>[ 5.034223] load_module+0xa20/0x2d10 <4>[ 5.034232] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.034236] ? kernel_read_file+0x2ac/0x330 <4>[ 5.034241] init_module_from_file+0x97/0xe0 <4>[ 5.034242] ? init_module_from_file+0x97/0xe0 <4>[ 5.034250] idempotent_init_module+0x134/0x350 <4>[ 5.034258] __x64_sys_finit_module+0x77/0x100 <4>[ 5.034262] x64_sys_call+0x24e3/0x2670 <4>[ 5.034264] do_syscall_64+0x91/0x180 <4>[ 5.034267] ? irqentry_exit+0x77/0xb0 <4>[ 5.034270] ? exc_page_fault+0xb1/0x300 <4>[ 5.034273] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.034276] RIP: 0033:0x7a607c92725d <4>[ 5.034278] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.034279] RSP: 002b:00007ffefc1cdf18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.034281] RAX: ffffffffffffffda RBX: 00005a8a582aef80 RCX: 00007a607c92725d <4>[ 5.034281] RDX: 0000000000000000 RSI: 00005a8a44a2ce52 RDI: 0000000000000003 <4>[ 5.034282] RBP: 00007ffefc1cdfd0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.034283] R10: 00007a607ca03b20 R11: 0000000000000246 R12: 00005a8a44a2ce52 <4>[ 5.034283] R13: 0000000000060000 R14: 00005a8a582af0b0 R15: 0000000000000000 <4>[ 5.034291] <5>[ 5.034292] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 5.034529] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 5.034539] kmemleak: min_count = 0 <5>[ 5.034548] kmemleak: count = 0 <5>[ 5.034554] kmemleak: flags = 0x1 <5>[ 5.034560] kmemleak: checksum = 0 <5>[ 5.034566] kmemleak: backtrace: <4>[ 5.034572] kmemleak_vmalloc+0x7c/0xf0 <4>[ 5.034581] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 5.034590] execmem_vmalloc+0x5a/0xf0 <4>[ 5.034598] execmem_alloc+0xc2/0x150 <4>[ 5.034606] load_module+0x9db/0x2d10 <4>[ 5.034612] init_module_from_file+0x97/0xe0 <4>[ 5.034620] idempotent_init_module+0x134/0x350 <4>[ 5.034628] __x64_sys_finit_module+0x77/0x100 <4>[ 5.034635] x64_sys_call+0x24e3/0x2670 <4>[ 5.034643] do_syscall_64+0x91/0x180 <4>[ 5.034650] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.034671] kmemleak: Trying to color unknown object at 0xffffffffa0406000 as Grey <4>[ 5.034683] CPU: 3 UID: 0 PID: 229 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.034685] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.034685] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.034686] Call Trace: <4>[ 5.034686] <4>[ 5.034687] dump_stack_lvl+0xc1/0xf0 <4>[ 5.034689] dump_stack+0x10/0x20 <4>[ 5.034691] paint_ptr+0x8d/0xa0 <4>[ 5.034693] kmemleak_not_leak+0x33/0x70 <4>[ 5.034696] load_module+0xa20/0x2d10 <4>[ 5.034703] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.034706] ? kernel_read_file+0x2ac/0x330 <4>[ 5.034710] init_module_from_file+0x97/0xe0 <4>[ 5.034711] ? init_module_from_file+0x97/0xe0 <4>[ 5.034719] idempotent_init_module+0x134/0x350 <4>[ 5.034726] __x64_sys_finit_module+0x77/0x100 <4>[ 5.034729] x64_sys_call+0x24e3/0x2670 <4>[ 5.034731] do_syscall_64+0x91/0x180 <4>[ 5.034734] ? irqentry_exit+0x77/0xb0 <4>[ 5.034736] ? exc_page_fault+0xb1/0x300 <4>[ 5.034739] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.034741] RIP: 0033:0x7a607c92725d <4>[ 5.034742] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.034743] RSP: 002b:00007ffefc1cdf18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.034744] RAX: ffffffffffffffda RBX: 00005a8a582aef80 RCX: 00007a607c92725d <4>[ 5.034745] RDX: 0000000000000000 RSI: 00005a8a44a2ce52 RDI: 0000000000000003 <4>[ 5.034746] RBP: 00007ffefc1cdfd0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.034746] R10: 00007a607ca03b20 R11: 0000000000000246 R12: 00005a8a44a2ce52 <4>[ 5.034747] R13: 0000000000060000 R14: 00005a8a582af0b0 R15: 0000000000000000 <4>[ 5.034754] <4>[ 5.035589] pstore: backend 'erst' already in use: ignoring 'efi_pstore' <4>[ 5.036557] kmemleak: Found object by alias at 0xffffffffa0415000 <4>[ 5.036573] CPU: 6 UID: 0 PID: 232 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.036575] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.036576] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.036577] Call Trace: <4>[ 5.036577] <4>[ 5.036578] dump_stack_lvl+0x91/0xf0 <4>[ 5.036582] dump_stack+0x10/0x20 <4>[ 5.036584] __lookup_object+0x90/0xa0 <4>[ 5.036587] __find_and_get_object+0x6c/0x190 <4>[ 5.036591] paint_ptr+0x1b/0xa0 <4>[ 5.036594] kmemleak_not_leak+0x33/0x70 <4>[ 5.036597] load_module+0xa20/0x2d10 <4>[ 5.036608] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.036612] ? kernel_read_file+0x2ac/0x330 <4>[ 5.036618] init_module_from_file+0x97/0xe0 <4>[ 5.036619] ? init_module_from_file+0x97/0xe0 <4>[ 5.036630] idempotent_init_module+0x134/0x350 <4>[ 5.036641] __x64_sys_finit_module+0x77/0x100 <4>[ 5.036645] x64_sys_call+0x24e3/0x2670 <4>[ 5.036647] do_syscall_64+0x91/0x180 <4>[ 5.036650] ? do_syscall_64+0x9d/0x180 <4>[ 5.036656] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.036660] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.036664] ? do_syscall_64+0x9d/0x180 <4>[ 5.036666] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 5.036670] ? irqentry_exit+0x77/0xb0 <4>[ 5.036672] ? exc_page_fault+0xb1/0x300 <4>[ 5.036676] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.036679] RIP: 0033:0x726dbab2725d <4>[ 5.036681] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.036682] RSP: 002b:00007ffc7e78d008 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.036684] RAX: ffffffffffffffda RBX: 000056223a405f80 RCX: 0000726dbab2725d <4>[ 5.036685] RDX: 0000000000000000 RSI: 0000562218413e52 RDI: 0000000000000003 <4>[ 5.036686] RBP: 00007ffc7e78d0c0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.036687] R10: 0000726dbac03b20 R11: 0000000000000246 R12: 0000562218413e52 <4>[ 5.036687] R13: 0000000000060000 R14: 000056223a4060b0 R15: 0000000000000000 <4>[ 5.036697] <5>[ 5.036698] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 5.037046] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 5.037058] kmemleak: min_count = 0 <5>[ 5.037066] kmemleak: count = 0 <5>[ 5.037073] kmemleak: flags = 0x1 <5>[ 5.037081] kmemleak: checksum = 0 <5>[ 5.037088] kmemleak: backtrace: <4>[ 5.037096] kmemleak_vmalloc+0x7c/0xf0 <4>[ 5.037105] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 5.037117] execmem_vmalloc+0x5a/0xf0 <4>[ 5.037126] execmem_alloc+0xc2/0x150 <4>[ 5.037136] load_module+0x9db/0x2d10 <4>[ 5.037144] init_module_from_file+0x97/0xe0 <4>[ 5.037153] idempotent_init_module+0x134/0x350 <4>[ 5.037163] __x64_sys_finit_module+0x77/0x100 <4>[ 5.037173] x64_sys_call+0x24e3/0x2670 <4>[ 5.037182] do_syscall_64+0x91/0x180 <4>[ 5.037191] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.037202] kmemleak: Trying to color unknown object at 0xffffffffa0415000 as Grey <4>[ 5.037222] CPU: 6 UID: 0 PID: 232 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.037225] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.037226] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.037227] Call Trace: <4>[ 5.037227] <4>[ 5.037228] dump_stack_lvl+0xc1/0xf0 <4>[ 5.037232] dump_stack+0x10/0x20 <4>[ 5.037234] paint_ptr+0x8d/0xa0 <4>[ 5.037238] kmemleak_not_leak+0x33/0x70 <4>[ 5.037241] load_module+0xa20/0x2d10 <4>[ 5.037253] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.037259] ? kernel_read_file+0x2ac/0x330 <4>[ 5.037266] init_module_from_file+0x97/0xe0 <4>[ 5.037268] ? init_module_from_file+0x97/0xe0 <4>[ 5.037281] idempotent_init_module+0x134/0x350 <4>[ 5.037295] __x64_sys_finit_module+0x77/0x100 <4>[ 5.037300] x64_sys_call+0x24e3/0x2670 <4>[ 5.037303] do_syscall_64+0x91/0x180 <4>[ 5.037306] ? do_syscall_64+0x9d/0x180 <4>[ 5.037313] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.037318] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.037322] ? do_syscall_64+0x9d/0x180 <4>[ 5.037324] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 5.037329] ? irqentry_exit+0x77/0xb0 <4>[ 5.037331] ? exc_page_fault+0xb1/0x300 <4>[ 5.037336] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.037339] RIP: 0033:0x726dbab2725d <4>[ 5.037341] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.037342] RSP: 002b:00007ffc7e78d008 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.037344] RAX: ffffffffffffffda RBX: 000056223a405f80 RCX: 0000726dbab2725d <4>[ 5.037345] RDX: 0000000000000000 RSI: 0000562218413e52 RDI: 0000000000000003 <4>[ 5.037346] RBP: 00007ffc7e78d0c0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.037347] R10: 0000726dbac03b20 R11: 0000000000000246 R12: 0000562218413e52 <4>[ 5.037348] R13: 0000000000060000 R14: 000056223a4060b0 R15: 0000000000000000 <4>[ 5.037360] <4>[ 5.037530] kmemleak: Found object by alias at 0xffffffffa040d000 <4>[ 5.037895] CPU: 6 UID: 0 PID: 232 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.037897] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.037897] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.037898] Call Trace: <4>[ 5.037899] <4>[ 5.037900] dump_stack_lvl+0x91/0xf0 <4>[ 5.037903] dump_stack+0x10/0x20 <4>[ 5.037904] __lookup_object+0x90/0xa0 <4>[ 5.037907] __find_and_get_object+0x6c/0x190 <4>[ 5.037912] paint_ptr+0x1b/0xa0 <4>[ 5.037915] kmemleak_not_leak+0x33/0x70 <4>[ 5.037918] load_module+0xa20/0x2d10 <4>[ 5.037929] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.037934] ? kernel_read_file+0x2ac/0x330 <4>[ 5.037940] init_module_from_file+0x97/0xe0 <4>[ 5.037941] ? init_module_from_file+0x97/0xe0 <4>[ 5.037953] idempotent_init_module+0x134/0x350 <4>[ 5.037965] __x64_sys_finit_module+0x77/0x100 <4>[ 5.037969] x64_sys_call+0x24e3/0x2670 <4>[ 5.037971] do_syscall_64+0x91/0x180 <4>[ 5.037975] ? do_syscall_64+0x9d/0x180 <4>[ 5.037981] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.037985] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.037989] ? do_syscall_64+0x9d/0x180 <4>[ 5.037991] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 5.037995] ? irqentry_exit+0x77/0xb0 <4>[ 5.037998] ? exc_page_fault+0xb1/0x300 <4>[ 5.038002] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.038004] RIP: 0033:0x726dbab2725d <4>[ 5.038006] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.038007] RSP: 002b:00007ffc7e78d008 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.038009] RAX: ffffffffffffffda RBX: 000056223a405f80 RCX: 0000726dbab2725d <4>[ 5.038010] RDX: 0000000000000000 RSI: 0000562218413e52 RDI: 0000000000000003 <4>[ 5.038011] RBP: 00007ffc7e78d0c0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.038012] R10: 0000726dbac03b20 R11: 0000000000000246 R12: 0000562218413e52 <4>[ 5.038013] R13: 0000000000060000 R14: 000056223a4060b0 R15: 0000000000000000 <4>[ 5.038024] <5>[ 5.038024] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 5.038402] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 5.038414] kmemleak: min_count = 0 <5>[ 5.038423] kmemleak: count = 0 <5>[ 5.038431] kmemleak: flags = 0x1 <5>[ 5.038439] kmemleak: checksum = 0 <5>[ 5.038448] kmemleak: backtrace: <4>[ 5.038456] kmemleak_vmalloc+0x7c/0xf0 <4>[ 5.038466] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 5.038478] execmem_vmalloc+0x5a/0xf0 <4>[ 5.038489] execmem_alloc+0xc2/0x150 <4>[ 5.038499] load_module+0x9db/0x2d10 <4>[ 5.038508] init_module_from_file+0x97/0xe0 <4>[ 5.038518] idempotent_init_module+0x134/0x350 <4>[ 5.038529] __x64_sys_finit_module+0x77/0x100 <4>[ 5.038540] x64_sys_call+0x24e3/0x2670 <4>[ 5.038550] do_syscall_64+0x91/0x180 <4>[ 5.038559] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.038580] kmemleak: Trying to color unknown object at 0xffffffffa040d000 as Grey <4>[ 5.038600] CPU: 6 UID: 0 PID: 232 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.038602] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.038603] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.038604] Call Trace: <4>[ 5.038604] <4>[ 5.038605] dump_stack_lvl+0xc1/0xf0 <4>[ 5.038608] dump_stack+0x10/0x20 <4>[ 5.038610] paint_ptr+0x8d/0xa0 <4>[ 5.038614] kmemleak_not_leak+0x33/0x70 <4>[ 5.038618] load_module+0xa20/0x2d10 <4>[ 5.038630] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.038634] ? kernel_read_file+0x2ac/0x330 <4>[ 5.038640] init_module_from_file+0x97/0xe0 <4>[ 5.038642] ? init_module_from_file+0x97/0xe0 <4>[ 5.038653] idempotent_init_module+0x134/0x350 <4>[ 5.038667] __x64_sys_finit_module+0x77/0x100 <4>[ 5.038671] x64_sys_call+0x24e3/0x2670 <4>[ 5.038673] do_syscall_64+0x91/0x180 <4>[ 5.038677] ? do_syscall_64+0x9d/0x180 <4>[ 5.038684] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.038688] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.038692] ? do_syscall_64+0x9d/0x180 <4>[ 5.038695] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 5.038700] ? irqentry_exit+0x77/0xb0 <4>[ 5.038702] ? exc_page_fault+0xb1/0x300 <4>[ 5.038708] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.038711] RIP: 0033:0x726dbab2725d <4>[ 5.038712] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.038714] RSP: 002b:00007ffc7e78d008 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.038715] RAX: ffffffffffffffda RBX: 000056223a405f80 RCX: 0000726dbab2725d <4>[ 5.038717] RDX: 0000000000000000 RSI: 0000562218413e52 RDI: 0000000000000003 <4>[ 5.038718] RBP: 00007ffc7e78d0c0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.038719] R10: 0000726dbac03b20 R11: 0000000000000246 R12: 0000562218413e52 <4>[ 5.038720] R13: 0000000000060000 R14: 000056223a4060b0 R15: 0000000000000000 <4>[ 5.038733] <7>[ 5.040792] systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... <7>[ 5.040970] systemd[1]: systemd-pcrmachine.service - TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionSecurity=measured-uki). <7>[ 5.041116] systemd[1]: systemd-tpm2-setup-early.service - TPM2 SRK Setup (Early) was skipped because of an unmet condition check (ConditionSecurity=measured-uki). <6>[ 5.046228] fuse: init (API version 7.42) <7>[ 5.048223] systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... <4>[ 5.052483] kmemleak: Found object by alias at 0xffffffffa0437000 <4>[ 5.052498] CPU: 2 UID: 0 PID: 237 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.052501] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.052502] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.052503] Call Trace: <4>[ 5.052503] <4>[ 5.052504] dump_stack_lvl+0x91/0xf0 <4>[ 5.052508] dump_stack+0x10/0x20 <4>[ 5.052510] __lookup_object+0x90/0xa0 <4>[ 5.052514] __find_and_get_object+0x6c/0x190 <4>[ 5.052517] paint_ptr+0x1b/0xa0 <4>[ 5.052520] kmemleak_not_leak+0x33/0x70 <4>[ 5.052523] load_module+0xa20/0x2d10 <4>[ 5.052531] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.052536] ? kernel_read_file+0x2ac/0x330 <4>[ 5.052543] init_module_from_file+0x97/0xe0 <4>[ 5.052545] ? init_module_from_file+0x97/0xe0 <4>[ 5.052553] idempotent_init_module+0x134/0x350 <4>[ 5.052561] __x64_sys_finit_module+0x77/0x100 <4>[ 5.052564] x64_sys_call+0x24e3/0x2670 <4>[ 5.052567] do_syscall_64+0x91/0x180 <4>[ 5.052569] ? ext4_llseek+0xc0/0x120 <4>[ 5.052573] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.052576] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.052580] ? do_syscall_64+0x9d/0x180 <4>[ 5.052582] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.052585] ? do_syscall_64+0x9d/0x180 <4>[ 5.052589] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.052592] ? do_syscall_64+0x9d/0x180 <4>[ 5.052595] ? irqentry_exit+0x77/0xb0 <4>[ 5.052597] ? exc_page_fault+0xb1/0x300 <4>[ 5.052600] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.052603] RIP: 0033:0x715c0732725d <4>[ 5.052605] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.052606] RSP: 002b:00007ffef216ff88 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.052607] RAX: ffffffffffffffda RBX: 000055b13ab620b0 RCX: 0000715c0732725d <4>[ 5.052609] RDX: 0000000000000000 RSI: 000055b11b1a8e52 RDI: 0000000000000003 <4>[ 5.052609] RBP: 00007ffef2170040 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.052610] R10: 0000715c07403b20 R11: 0000000000000246 R12: 000055b11b1a8e52 <4>[ 5.052610] R13: 0000000000060000 R14: 000055b13ab62150 R15: 0000000000000000 <4>[ 5.052618] <5>[ 5.052619] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 5.052903] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 5.052912] kmemleak: min_count = 0 <5>[ 5.052919] kmemleak: count = 0 <5>[ 5.052925] kmemleak: flags = 0x1 <5>[ 5.052931] kmemleak: checksum = 0 <5>[ 5.052937] kmemleak: backtrace: <4>[ 5.052943] kmemleak_vmalloc+0x7c/0xf0 <4>[ 5.052951] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 5.052960] execmem_vmalloc+0x5a/0xf0 <4>[ 5.052968] execmem_alloc+0xc2/0x150 <4>[ 5.052976] load_module+0x9db/0x2d10 <4>[ 5.052983] init_module_from_file+0x97/0xe0 <4>[ 5.052990] idempotent_init_module+0x134/0x350 <4>[ 5.052998] __x64_sys_finit_module+0x77/0x100 <4>[ 5.053006] x64_sys_call+0x24e3/0x2670 <4>[ 5.053013] do_syscall_64+0x91/0x180 <4>[ 5.053020] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.053036] kmemleak: Trying to color unknown object at 0xffffffffa0437000 as Grey <4>[ 5.053048] CPU: 2 UID: 0 PID: 237 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.053050] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.053050] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.053051] Call Trace: <4>[ 5.053051] <4>[ 5.053052] dump_stack_lvl+0xc1/0xf0 <4>[ 5.053054] dump_stack+0x10/0x20 <4>[ 5.053056] paint_ptr+0x8d/0xa0 <4>[ 5.053059] kmemleak_not_leak+0x33/0x70 <4>[ 5.053061] load_module+0xa20/0x2d10 <4>[ 5.053068] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.053071] ? kernel_read_file+0x2ac/0x330 <4>[ 5.053075] init_module_from_file+0x97/0xe0 <4>[ 5.053076] ? init_module_from_file+0x97/0xe0 <4>[ 5.053083] idempotent_init_module+0x134/0x350 <4>[ 5.053094] __x64_sys_finit_module+0x77/0x100 <4>[ 5.053099] x64_sys_call+0x24e3/0x2670 <4>[ 5.053101] do_syscall_64+0x91/0x180 <4>[ 5.053104] ? ext4_llseek+0xc0/0x120 <4>[ 5.053109] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.053113] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.053117] ? do_syscall_64+0x9d/0x180 <4>[ 5.053121] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.053125] ? do_syscall_64+0x9d/0x180 <4>[ 5.053129] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.053133] ? do_syscall_64+0x9d/0x180 <4>[ 5.053137] ? irqentry_exit+0x77/0xb0 <4>[ 5.053140] ? exc_page_fault+0xb1/0x300 <4>[ 5.053145] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.053147] RIP: 0033:0x715c0732725d <4>[ 5.053149] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.053151] RSP: 002b:00007ffef216ff88 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.053152] RAX: ffffffffffffffda RBX: 000055b13ab620b0 RCX: 0000715c0732725d <4>[ 5.053153] RDX: 0000000000000000 RSI: 000055b11b1a8e52 RDI: 0000000000000003 <4>[ 5.053154] RBP: 00007ffef2170040 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.053155] R10: 0000715c07403b20 R11: 0000000000000246 R12: 000055b11b1a8e52 <4>[ 5.053156] R13: 0000000000060000 R14: 000055b13ab62150 R15: 0000000000000000 <4>[ 5.053168] <4>[ 5.053334] kmemleak: Found object by alias at 0xffffffffa043a000 <4>[ 5.053618] CPU: 2 UID: 0 PID: 237 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.053620] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.053620] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.053621] Call Trace: <4>[ 5.053621] <4>[ 5.053622] dump_stack_lvl+0x91/0xf0 <4>[ 5.053625] dump_stack+0x10/0x20 <4>[ 5.053626] __lookup_object+0x90/0xa0 <4>[ 5.053628] __find_and_get_object+0x6c/0x190 <4>[ 5.053632] paint_ptr+0x1b/0xa0 <4>[ 5.053635] kmemleak_not_leak+0x33/0x70 <4>[ 5.053637] load_module+0xa20/0x2d10 <4>[ 5.053645] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.053649] ? kernel_read_file+0x2ac/0x330 <4>[ 5.053653] init_module_from_file+0x97/0xe0 <4>[ 5.053654] ? init_module_from_file+0x97/0xe0 <4>[ 5.053662] idempotent_init_module+0x134/0x350 <4>[ 5.053671] __x64_sys_finit_module+0x77/0x100 <4>[ 5.053673] x64_sys_call+0x24e3/0x2670 <4>[ 5.053676] do_syscall_64+0x91/0x180 <4>[ 5.053678] ? ext4_llseek+0xc0/0x120 <4>[ 5.053680] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.053683] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.053687] ? do_syscall_64+0x9d/0x180 <4>[ 5.053690] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.053693] ? do_syscall_64+0x9d/0x180 <4>[ 5.053696] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.053699] ? do_syscall_64+0x9d/0x180 <4>[ 5.053702] ? irqentry_exit+0x77/0xb0 <4>[ 5.053704] ? exc_page_fault+0xb1/0x300 <4>[ 5.053708] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.053709] RIP: 0033:0x715c0732725d <4>[ 5.053711] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.053712] RSP: 002b:00007ffef216ff88 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.053713] RAX: ffffffffffffffda RBX: 000055b13ab620b0 RCX: 0000715c0732725d <4>[ 5.053714] RDX: 0000000000000000 RSI: 000055b11b1a8e52 RDI: 0000000000000003 <4>[ 5.053714] RBP: 00007ffef2170040 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.053715] R10: 0000715c07403b20 R11: 0000000000000246 R12: 000055b11b1a8e52 <4>[ 5.053716] R13: 0000000000060000 R14: 000055b13ab62150 R15: 0000000000000000 <4>[ 5.053723] <5>[ 5.053724] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 5.054007] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 5.054017] kmemleak: min_count = 0 <5>[ 5.054023] kmemleak: count = 0 <5>[ 5.054028] kmemleak: flags = 0x1 <5>[ 5.054034] kmemleak: checksum = 0 <5>[ 5.054040] kmemleak: backtrace: <4>[ 5.054047] kmemleak_vmalloc+0x7c/0xf0 <4>[ 5.054054] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 5.054063] execmem_vmalloc+0x5a/0xf0 <4>[ 5.054071] execmem_alloc+0xc2/0x150 <4>[ 5.054079] load_module+0x9db/0x2d10 <4>[ 5.054085] init_module_from_file+0x97/0xe0 <4>[ 5.054093] idempotent_init_module+0x134/0x350 <4>[ 5.054101] __x64_sys_finit_module+0x77/0x100 <4>[ 5.054108] x64_sys_call+0x24e3/0x2670 <4>[ 5.054116] do_syscall_64+0x91/0x180 <4>[ 5.054123] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.054138] kmemleak: Trying to color unknown object at 0xffffffffa043a000 as Grey <4>[ 5.054149] CPU: 2 UID: 0 PID: 237 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.054151] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.054151] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.054152] Call Trace: <4>[ 5.054152] <4>[ 5.054153] dump_stack_lvl+0xc1/0xf0 <4>[ 5.054155] dump_stack+0x10/0x20 <4>[ 5.054156] paint_ptr+0x8d/0xa0 <4>[ 5.054159] kmemleak_not_leak+0x33/0x70 <4>[ 5.054161] load_module+0xa20/0x2d10 <4>[ 5.054168] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.054171] ? kernel_read_file+0x2ac/0x330 <4>[ 5.054175] init_module_from_file+0x97/0xe0 <4>[ 5.054176] ? init_module_from_file+0x97/0xe0 <4>[ 5.054183] idempotent_init_module+0x134/0x350 <4>[ 5.054191] __x64_sys_finit_module+0x77/0x100 <4>[ 5.054194] x64_sys_call+0x24e3/0x2670 <4>[ 5.054195] do_syscall_64+0x91/0x180 <4>[ 5.054197] ? ext4_llseek+0xc0/0x120 <4>[ 5.054200] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.054203] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.054206] ? do_syscall_64+0x9d/0x180 <4>[ 5.054208] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.054211] ? do_syscall_64+0x9d/0x180 <4>[ 5.054214] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.054217] ? do_syscall_64+0x9d/0x180 <4>[ 5.054220] ? irqentry_exit+0x77/0xb0 <4>[ 5.054222] ? exc_page_fault+0xb1/0x300 <4>[ 5.054225] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.054227] RIP: 0033:0x715c0732725d <4>[ 5.054228] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.054229] RSP: 002b:00007ffef216ff88 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.054230] RAX: ffffffffffffffda RBX: 000055b13ab620b0 RCX: 0000715c0732725d <4>[ 5.054230] RDX: 0000000000000000 RSI: 000055b11b1a8e52 RDI: 0000000000000003 <4>[ 5.054231] RBP: 00007ffef2170040 R08: 0000000000000040 R09: 0000000000000002 <4>[ 5.054231] R10: 0000715c07403b20 R11: 0000000000000246 R12: 000055b11b1a8e52 <4>[ 5.054232] R13: 0000000000060000 R14: 000055b13ab62150 R15: 0000000000000000 <4>[ 5.054239] <7>[ 5.059825] systemd[1]: Started systemd-journald.service - Journal Service. <4>[ 5.073126] kmemleak: Found object by alias at 0xffffffffa040d000 <4>[ 5.073158] CPU: 5 UID: 0 PID: 242 Comm: systemd-modules Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.073160] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.073161] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.073162] Call Trace: <4>[ 5.073162] <4>[ 5.073164] dump_stack_lvl+0x91/0xf0 <4>[ 5.073168] dump_stack+0x10/0x20 <4>[ 5.073170] __lookup_object+0x90/0xa0 <4>[ 5.073174] __find_and_get_object+0x6c/0x190 <4>[ 5.073178] paint_ptr+0x1b/0xa0 <4>[ 5.073181] kmemleak_not_leak+0x33/0x70 <4>[ 5.073184] load_module+0xa20/0x2d10 <4>[ 5.073194] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.073199] ? kernel_read_file+0x2ac/0x330 <4>[ 5.073205] init_module_from_file+0x97/0xe0 <4>[ 5.073206] ? init_module_from_file+0x97/0xe0 <4>[ 5.073216] idempotent_init_module+0x134/0x350 <4>[ 5.073227] __x64_sys_finit_module+0x77/0x100 <4>[ 5.073231] x64_sys_call+0x24e3/0x2670 <4>[ 5.073233] do_syscall_64+0x91/0x180 <4>[ 5.073237] ? do_syscall_64+0x9d/0x180 <4>[ 5.073239] ? lock_release+0xd3/0x2c0 <4>[ 5.073243] ? __might_fault+0x53/0xb0 <4>[ 5.073247] ? __might_fault+0x89/0xb0 <4>[ 5.073247] ? __might_fault+0x53/0xb0 <4>[ 5.073249] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 5.073259] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.073263] ? do_syscall_64+0x9d/0x180 <4>[ 5.073273] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.073277] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.073280] ? do_syscall_64+0x9d/0x180 <4>[ 5.073282] ? __do_sys_newfstatat+0x44/0x90 <4>[ 5.073293] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.073296] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.073300] ? do_syscall_64+0x9d/0x180 <4>[ 5.073303] ? irqentry_exit+0x77/0xb0 <4>[ 5.073305] ? exc_page_fault+0xb1/0x300 <4>[ 5.073309] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.073312] RIP: 0033:0x70fd4652725d <4>[ 5.073314] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.073315] RSP: 002b:00007ffc2a281d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.073317] RAX: ffffffffffffffda RBX: 00005694eee24d80 RCX: 000070fd4652725d <4>[ 5.073318] RDX: 0000000000000000 RSI: 000070fd46d4207d RDI: 0000000000000005 <4>[ 5.073319] RBP: 00007ffc2a281dd0 R08: 0000000000000040 R09: 00007ffc2a281d80 <4>[ 5.073320] R10: 000070fd46603b20 R11: 0000000000000246 R12: 000070fd46d4207d <4>[ 5.073320] R13: 0000000000020000 R14: 00005694eee24e00 R15: 00005694eee25030 <4>[ 5.073330] <5>[ 5.073331] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 5.073778] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 5.073791] kmemleak: min_count = 0 <5>[ 5.073800] kmemleak: count = 0 <5>[ 5.073808] kmemleak: flags = 0x1 <5>[ 5.073816] kmemleak: checksum = 0 <5>[ 5.073825] kmemleak: backtrace: <4>[ 5.073833] kmemleak_vmalloc+0x7c/0xf0 <4>[ 5.073844] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 5.073856] execmem_vmalloc+0x5a/0xf0 <4>[ 5.073866] execmem_alloc+0xc2/0x150 <4>[ 5.073876] load_module+0x9db/0x2d10 <4>[ 5.073886] init_module_from_file+0x97/0xe0 <4>[ 5.073896] idempotent_init_module+0x134/0x350 <4>[ 5.073907] __x64_sys_finit_module+0x77/0x100 <4>[ 5.073917] x64_sys_call+0x24e3/0x2670 <4>[ 5.073927] do_syscall_64+0x91/0x180 <4>[ 5.073937] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.074097] kmemleak: Trying to color unknown object at 0xffffffffa040d000 as Grey <4>[ 5.074121] CPU: 5 UID: 0 PID: 242 Comm: systemd-modules Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.074123] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.074124] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.074125] Call Trace: <4>[ 5.074126] <4>[ 5.074127] dump_stack_lvl+0xc1/0xf0 <4>[ 5.074131] dump_stack+0x10/0x20 <4>[ 5.074133] paint_ptr+0x8d/0xa0 <4>[ 5.074138] kmemleak_not_leak+0x33/0x70 <4>[ 5.074141] load_module+0xa20/0x2d10 <4>[ 5.074156] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.074162] ? kernel_read_file+0x2ac/0x330 <4>[ 5.074169] init_module_from_file+0x97/0xe0 <4>[ 5.074171] ? init_module_from_file+0x97/0xe0 <4>[ 5.074185] idempotent_init_module+0x134/0x350 <4>[ 5.074201] __x64_sys_finit_module+0x77/0x100 <4>[ 5.074206] x64_sys_call+0x24e3/0x2670 <4>[ 5.074209] do_syscall_64+0x91/0x180 <4>[ 5.074214] ? do_syscall_64+0x9d/0x180 <4>[ 5.074218] ? lock_release+0xd3/0x2c0 <4>[ 5.074223] ? __might_fault+0x53/0xb0 <4>[ 5.074227] ? __might_fault+0x89/0xb0 <4>[ 5.074228] ? __might_fault+0x53/0xb0 <4>[ 5.074231] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 5.074244] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.074249] ? do_syscall_64+0x9d/0x180 <4>[ 5.074262] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.074267] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.074272] ? do_syscall_64+0x9d/0x180 <4>[ 5.074275] ? __do_sys_newfstatat+0x44/0x90 <4>[ 5.074289] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.074294] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.074299] ? do_syscall_64+0x9d/0x180 <4>[ 5.074303] ? irqentry_exit+0x77/0xb0 <4>[ 5.074306] ? exc_page_fault+0xb1/0x300 <4>[ 5.074312] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.074315] RIP: 0033:0x70fd4652725d <4>[ 5.074317] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.074319] RSP: 002b:00007ffc2a281d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.074321] RAX: ffffffffffffffda RBX: 00005694eee24d80 RCX: 000070fd4652725d <4>[ 5.074322] RDX: 0000000000000000 RSI: 000070fd46d4207d RDI: 0000000000000005 <4>[ 5.074323] RBP: 00007ffc2a281dd0 R08: 0000000000000040 R09: 00007ffc2a281d80 <4>[ 5.074324] R10: 000070fd46603b20 R11: 0000000000000246 R12: 000070fd46d4207d <4>[ 5.074325] R13: 0000000000020000 R14: 00005694eee24e00 R15: 00005694eee25030 <4>[ 5.074340] <4>[ 5.075149] kmemleak: Found object by alias at 0xffffffffa043a000 <4>[ 5.075178] CPU: 5 UID: 0 PID: 242 Comm: systemd-modules Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.075181] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.075181] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.075182] Call Trace: <4>[ 5.075183] <4>[ 5.075184] dump_stack_lvl+0x91/0xf0 <4>[ 5.075187] dump_stack+0x10/0x20 <4>[ 5.075188] __lookup_object+0x90/0xa0 <4>[ 5.075191] __find_and_get_object+0x6c/0x190 <4>[ 5.075195] paint_ptr+0x1b/0xa0 <4>[ 5.075198] kmemleak_not_leak+0x33/0x70 <4>[ 5.075201] load_module+0xa20/0x2d10 <4>[ 5.075211] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.075215] ? kernel_read_file+0x2ac/0x330 <4>[ 5.075221] init_module_from_file+0x97/0xe0 <4>[ 5.075222] ? init_module_from_file+0x97/0xe0 <4>[ 5.075232] idempotent_init_module+0x134/0x350 <4>[ 5.075243] __x64_sys_finit_module+0x77/0x100 <4>[ 5.075246] x64_sys_call+0x24e3/0x2670 <4>[ 5.075249] do_syscall_64+0x91/0x180 <4>[ 5.075252] ? do_syscall_64+0x9d/0x180 <4>[ 5.075254] ? lock_release+0xd3/0x2c0 <4>[ 5.075258] ? __might_fault+0x53/0xb0 <4>[ 5.075261] ? __might_fault+0x89/0xb0 <4>[ 5.075262] ? __might_fault+0x53/0xb0 <4>[ 5.075264] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 5.075273] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.075277] ? do_syscall_64+0x9d/0x180 <4>[ 5.075287] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.075290] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.075294] ? do_syscall_64+0x9d/0x180 <4>[ 5.075296] ? __do_sys_newfstatat+0x44/0x90 <4>[ 5.075306] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.075309] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.075312] ? do_syscall_64+0x9d/0x180 <4>[ 5.075316] ? irqentry_exit+0x77/0xb0 <4>[ 5.075318] ? exc_page_fault+0xb1/0x300 <4>[ 5.075322] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.075324] RIP: 0033:0x70fd4652725d <4>[ 5.075326] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.075327] RSP: 002b:00007ffc2a281d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.075328] RAX: ffffffffffffffda RBX: 00005694eee24d80 RCX: 000070fd4652725d <4>[ 5.075329] RDX: 0000000000000000 RSI: 000070fd46d4207d RDI: 0000000000000005 <4>[ 5.075330] RBP: 00007ffc2a281dd0 R08: 0000000000000040 R09: 00007ffc2a281d80 <4>[ 5.075331] R10: 000070fd46603b20 R11: 0000000000000246 R12: 000070fd46d4207d <4>[ 5.075331] R13: 0000000000020000 R14: 00005694eee24e00 R15: 00005694eee25030 <4>[ 5.075341] <5>[ 5.075342] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 5.075798] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 5.075810] kmemleak: min_count = 0 <5>[ 5.075819] kmemleak: count = 0 <5>[ 5.075827] kmemleak: flags = 0x1 <5>[ 5.075835] kmemleak: checksum = 0 <5>[ 5.075843] kmemleak: backtrace: <4>[ 5.075851] kmemleak_vmalloc+0x7c/0xf0 <4>[ 5.075861] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 5.075873] execmem_vmalloc+0x5a/0xf0 <4>[ 5.075883] execmem_alloc+0xc2/0x150 <4>[ 5.075893] load_module+0x9db/0x2d10 <4>[ 5.075902] init_module_from_file+0x97/0xe0 <4>[ 5.075912] idempotent_init_module+0x134/0x350 <4>[ 5.075923] __x64_sys_finit_module+0x77/0x100 <4>[ 5.075933] x64_sys_call+0x24e3/0x2670 <4>[ 5.075943] do_syscall_64+0x91/0x180 <4>[ 5.075952] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.075974] kmemleak: Trying to color unknown object at 0xffffffffa043a000 as Grey <4>[ 5.075991] CPU: 5 UID: 0 PID: 242 Comm: systemd-modules Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.075993] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.075994] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.075994] Call Trace: <4>[ 5.075995] <4>[ 5.075996] dump_stack_lvl+0xc1/0xf0 <4>[ 5.075999] dump_stack+0x10/0x20 <4>[ 5.076001] paint_ptr+0x8d/0xa0 <4>[ 5.076004] kmemleak_not_leak+0x33/0x70 <4>[ 5.076007] load_module+0xa20/0x2d10 <4>[ 5.076020] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.076025] ? kernel_read_file+0x2ac/0x330 <4>[ 5.076031] init_module_from_file+0x97/0xe0 <4>[ 5.076033] ? init_module_from_file+0x97/0xe0 <4>[ 5.076046] idempotent_init_module+0x134/0x350 <4>[ 5.076060] __x64_sys_finit_module+0x77/0x100 <4>[ 5.076064] x64_sys_call+0x24e3/0x2670 <4>[ 5.076067] do_syscall_64+0x91/0x180 <4>[ 5.076070] ? do_syscall_64+0x9d/0x180 <4>[ 5.076074] ? lock_release+0xd3/0x2c0 <4>[ 5.076078] ? __might_fault+0x53/0xb0 <4>[ 5.076082] ? __might_fault+0x89/0xb0 <4>[ 5.076083] ? __might_fault+0x53/0xb0 <4>[ 5.076086] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 5.076098] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.076103] ? do_syscall_64+0x9d/0x180 <4>[ 5.076116] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.076120] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.076125] ? do_syscall_64+0x9d/0x180 <4>[ 5.076127] ? __do_sys_newfstatat+0x44/0x90 <4>[ 5.076140] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.076144] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.076149] ? do_syscall_64+0x9d/0x180 <4>[ 5.076153] ? irqentry_exit+0x77/0xb0 <4>[ 5.076156] ? exc_page_fault+0xb1/0x300 <4>[ 5.076161] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.076164] RIP: 0033:0x70fd4652725d <4>[ 5.076166] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.076167] RSP: 002b:00007ffc2a281d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.076169] RAX: ffffffffffffffda RBX: 00005694eee24d80 RCX: 000070fd4652725d <4>[ 5.076170] RDX: 0000000000000000 RSI: 000070fd46d4207d RDI: 0000000000000005 <4>[ 5.076171] RBP: 00007ffc2a281dd0 R08: 0000000000000040 R09: 00007ffc2a281d80 <4>[ 5.076172] R10: 000070fd46603b20 R11: 0000000000000246 R12: 000070fd46d4207d <4>[ 5.076173] R13: 0000000000020000 R14: 00005694eee24e00 R15: 00005694eee25030 <4>[ 5.076186] <4>[ 5.090179] kmemleak: Found object by alias at 0xffffffffa043b000 <4>[ 5.090193] CPU: 7 UID: 0 PID: 242 Comm: systemd-modules Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.090196] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.090196] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.090197] Call Trace: <4>[ 5.090197] <4>[ 5.090199] dump_stack_lvl+0x91/0xf0 <4>[ 5.090203] dump_stack+0x10/0x20 <4>[ 5.090204] __lookup_object+0x90/0xa0 <4>[ 5.090208] __find_and_get_object+0x6c/0x190 <4>[ 5.090211] paint_ptr+0x1b/0xa0 <4>[ 5.090214] kmemleak_not_leak+0x33/0x70 <4>[ 5.090217] load_module+0xa20/0x2d10 <4>[ 5.090226] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.090230] ? kernel_read_file+0x2ac/0x330 <4>[ 5.090235] init_module_from_file+0x97/0xe0 <4>[ 5.090236] ? init_module_from_file+0x97/0xe0 <4>[ 5.090244] idempotent_init_module+0x134/0x350 <4>[ 5.090252] __x64_sys_finit_module+0x77/0x100 <4>[ 5.090255] x64_sys_call+0x24e3/0x2670 <4>[ 5.090258] do_syscall_64+0x91/0x180 <4>[ 5.090261] ? __slab_free+0x185/0x310 <4>[ 5.090263] ? putname+0x60/0x80 <4>[ 5.090269] ? putname+0x60/0x80 <4>[ 5.090271] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 5.090276] ? putname+0x60/0x80 <4>[ 5.090278] ? do_sys_openat2+0xab/0xf0 <4>[ 5.090282] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.090286] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.090289] ? do_syscall_64+0x9d/0x180 <4>[ 5.090292] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.090295] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.090298] ? do_syscall_64+0x9d/0x180 <4>[ 5.090299] ? irqentry_exit+0x77/0xb0 <4>[ 5.090301] ? exc_page_fault+0xb1/0x300 <4>[ 5.090305] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.090307] RIP: 0033:0x70fd4652725d <4>[ 5.090309] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.090310] RSP: 002b:00007ffc2a281d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.090312] RAX: ffffffffffffffda RBX: 00005694eee24d80 RCX: 000070fd4652725d <4>[ 5.090313] RDX: 0000000000000000 RSI: 000070fd46d4207d RDI: 0000000000000005 <4>[ 5.090314] RBP: 00007ffc2a281dd0 R08: 0000000000000040 R09: 00007ffc2a281d80 <4>[ 5.090314] R10: 000070fd46603b20 R11: 0000000000000246 R12: 000070fd46d4207d <4>[ 5.090315] R13: 0000000000020000 R14: 00005694eee24e00 R15: 00005694eee1dc60 <4>[ 5.090323] <5>[ 5.090323] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 5.090632] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 5.090642] kmemleak: min_count = 0 <5>[ 5.090648] kmemleak: count = 0 <5>[ 5.090654] kmemleak: flags = 0x1 <5>[ 5.090660] kmemleak: checksum = 0 <5>[ 5.090666] kmemleak: backtrace: <4>[ 5.090672] kmemleak_vmalloc+0x7c/0xf0 <4>[ 5.090680] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 5.090690] execmem_vmalloc+0x5a/0xf0 <4>[ 5.090697] execmem_alloc+0xc2/0x150 <4>[ 5.090705] load_module+0x9db/0x2d10 <4>[ 5.090712] init_module_from_file+0x97/0xe0 <4>[ 5.090719] idempotent_init_module+0x134/0x350 <4>[ 5.090727] __x64_sys_finit_module+0x77/0x100 <4>[ 5.090735] x64_sys_call+0x24e3/0x2670 <4>[ 5.090742] do_syscall_64+0x91/0x180 <4>[ 5.090750] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.090768] kmemleak: Trying to color unknown object at 0xffffffffa043b000 as Grey <4>[ 5.090789] CPU: 7 UID: 0 PID: 242 Comm: systemd-modules Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.090792] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.090792] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.090793] Call Trace: <4>[ 5.090793] <4>[ 5.090794] dump_stack_lvl+0xc1/0xf0 <4>[ 5.090797] dump_stack+0x10/0x20 <4>[ 5.090798] paint_ptr+0x8d/0xa0 <4>[ 5.090801] kmemleak_not_leak+0x33/0x70 <4>[ 5.090803] load_module+0xa20/0x2d10 <4>[ 5.090810] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.090815] ? kernel_read_file+0x2ac/0x330 <4>[ 5.090822] init_module_from_file+0x97/0xe0 <4>[ 5.090824] ? init_module_from_file+0x97/0xe0 <4>[ 5.090836] idempotent_init_module+0x134/0x350 <4>[ 5.090850] __x64_sys_finit_module+0x77/0x100 <4>[ 5.090855] x64_sys_call+0x24e3/0x2670 <4>[ 5.090858] do_syscall_64+0x91/0x180 <4>[ 5.090861] ? __slab_free+0x185/0x310 <4>[ 5.090864] ? putname+0x60/0x80 <4>[ 5.090874] ? putname+0x60/0x80 <4>[ 5.090876] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 5.090883] ? putname+0x60/0x80 <4>[ 5.090886] ? do_sys_openat2+0xab/0xf0 <4>[ 5.090892] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.090896] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.090901] ? do_syscall_64+0x9d/0x180 <4>[ 5.090905] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.090908] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.090911] ? do_syscall_64+0x9d/0x180 <4>[ 5.090912] ? irqentry_exit+0x77/0xb0 <4>[ 5.090914] ? exc_page_fault+0xb1/0x300 <4>[ 5.090917] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.090919] RIP: 0033:0x70fd4652725d <4>[ 5.090921] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.090922] RSP: 002b:00007ffc2a281d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.090923] RAX: ffffffffffffffda RBX: 00005694eee24d80 RCX: 000070fd4652725d <4>[ 5.090924] RDX: 0000000000000000 RSI: 000070fd46d4207d RDI: 0000000000000005 <4>[ 5.090924] RBP: 00007ffc2a281dd0 R08: 0000000000000040 R09: 00007ffc2a281d80 <4>[ 5.090925] R10: 000070fd46603b20 R11: 0000000000000246 R12: 000070fd46d4207d <4>[ 5.090926] R13: 0000000000020000 R14: 00005694eee24e00 R15: 00005694eee1dc60 <4>[ 5.090932] <4>[ 5.091034] kmemleak: Found object by alias at 0xffffffffa0440000 <4>[ 5.091329] CPU: 7 UID: 0 PID: 242 Comm: systemd-modules Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.091331] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.091331] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.091332] Call Trace: <4>[ 5.091332] <4>[ 5.091333] dump_stack_lvl+0x91/0xf0 <4>[ 5.091335] dump_stack+0x10/0x20 <4>[ 5.091336] __lookup_object+0x90/0xa0 <4>[ 5.091339] __find_and_get_object+0x6c/0x190 <4>[ 5.091342] paint_ptr+0x1b/0xa0 <4>[ 5.091345] kmemleak_not_leak+0x33/0x70 <4>[ 5.091347] load_module+0xa20/0x2d10 <4>[ 5.091355] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.091358] ? kernel_read_file+0x2ac/0x330 <4>[ 5.091363] init_module_from_file+0x97/0xe0 <4>[ 5.091364] ? init_module_from_file+0x97/0xe0 <4>[ 5.091372] idempotent_init_module+0x134/0x350 <4>[ 5.091380] __x64_sys_finit_module+0x77/0x100 <4>[ 5.091383] x64_sys_call+0x24e3/0x2670 <4>[ 5.091385] do_syscall_64+0x91/0x180 <4>[ 5.091387] ? __slab_free+0x185/0x310 <4>[ 5.091389] ? putname+0x60/0x80 <4>[ 5.091395] ? putname+0x60/0x80 <4>[ 5.091397] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 5.091402] ? putname+0x60/0x80 <4>[ 5.091403] ? do_sys_openat2+0xab/0xf0 <4>[ 5.091408] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.091411] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.091414] ? do_syscall_64+0x9d/0x180 <4>[ 5.091416] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.091419] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.091422] ? do_syscall_64+0x9d/0x180 <4>[ 5.091424] ? irqentry_exit+0x77/0xb0 <4>[ 5.091426] ? exc_page_fault+0xb1/0x300 <4>[ 5.091429] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.091431] RIP: 0033:0x70fd4652725d <4>[ 5.091432] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.091433] RSP: 002b:00007ffc2a281d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.091434] RAX: ffffffffffffffda RBX: 00005694eee24d80 RCX: 000070fd4652725d <4>[ 5.091435] RDX: 0000000000000000 RSI: 000070fd46d4207d RDI: 0000000000000005 <4>[ 5.091436] RBP: 00007ffc2a281dd0 R08: 0000000000000040 R09: 00007ffc2a281d80 <4>[ 5.091436] R10: 000070fd46603b20 R11: 0000000000000246 R12: 000070fd46d4207d <4>[ 5.091437] R13: 0000000000020000 R14: 00005694eee24e00 R15: 00005694eee1dc60 <4>[ 5.091445] <5>[ 5.091445] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 5.091754] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 5.091764] kmemleak: min_count = 0 <5>[ 5.091770] kmemleak: count = 0 <5>[ 5.091776] kmemleak: flags = 0x1 <5>[ 5.091782] kmemleak: checksum = 0 <5>[ 5.091788] kmemleak: backtrace: <4>[ 5.091794] kmemleak_vmalloc+0x7c/0xf0 <4>[ 5.091801] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 5.091811] execmem_vmalloc+0x5a/0xf0 <4>[ 5.091818] execmem_alloc+0xc2/0x150 <4>[ 5.091826] load_module+0x9db/0x2d10 <4>[ 5.091833] init_module_from_file+0x97/0xe0 <4>[ 5.091840] idempotent_init_module+0x134/0x350 <4>[ 5.091848] __x64_sys_finit_module+0x77/0x100 <4>[ 5.091856] x64_sys_call+0x24e3/0x2670 <4>[ 5.091863] do_syscall_64+0x91/0x180 <4>[ 5.091870] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.091885] kmemleak: Trying to color unknown object at 0xffffffffa0440000 as Grey <4>[ 5.091897] CPU: 7 UID: 0 PID: 242 Comm: systemd-modules Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 5.091899] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 5.091899] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 5.091899] Call Trace: <4>[ 5.091900] <4>[ 5.091901] dump_stack_lvl+0xc1/0xf0 <4>[ 5.091904] dump_stack+0x10/0x20 <4>[ 5.091906] paint_ptr+0x8d/0xa0 <4>[ 5.091911] kmemleak_not_leak+0x33/0x70 <4>[ 5.091914] load_module+0xa20/0x2d10 <4>[ 5.091927] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 5.091932] ? kernel_read_file+0x2ac/0x330 <4>[ 5.091938] init_module_from_file+0x97/0xe0 <4>[ 5.091940] ? init_module_from_file+0x97/0xe0 <4>[ 5.091954] idempotent_init_module+0x134/0x350 <4>[ 5.091969] __x64_sys_finit_module+0x77/0x100 <4>[ 5.091974] x64_sys_call+0x24e3/0x2670 <4>[ 5.091976] do_syscall_64+0x91/0x180 <4>[ 5.091980] ? __slab_free+0x185/0x310 <4>[ 5.091982] ? putname+0x60/0x80 <4>[ 5.091992] ? putname+0x60/0x80 <4>[ 5.091995] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 5.092003] ? putname+0x60/0x80 <4>[ 5.092006] ? do_sys_openat2+0xab/0xf0 <4>[ 5.092012] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.092016] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.092021] ? do_syscall_64+0x9d/0x180 <4>[ 5.092025] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 5.092030] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 5.092034] ? do_syscall_64+0x9d/0x180 <4>[ 5.092036] ? irqentry_exit+0x77/0xb0 <4>[ 5.092039] ? exc_page_fault+0xb1/0x300 <4>[ 5.092044] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 5.092046] RIP: 0033:0x70fd4652725d <4>[ 5.092048] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 5.092049] RSP: 002b:00007ffc2a281d18 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 5.092050] RAX: ffffffffffffffda RBX: 00005694eee24d80 RCX: 000070fd4652725d <4>[ 5.092051] RDX: 0000000000000000 RSI: 000070fd46d4207d RDI: 0000000000000005 <4>[ 5.092052] RBP: 00007ffc2a281dd0 R08: 0000000000000040 R09: 00007ffc2a281d80 <4>[ 5.092052] R10: 000070fd46603b20 R11: 0000000000000246 R12: 000070fd46d4207d <4>[ 5.092053] R13: 0000000000020000 R14: 00005694eee24e00 R15: 00005694eee1dc60 <4>[ 5.092060] <6>[ 5.237591] EXT4-fs (sda2): re-mounted 6814686b-dccd-431b-b3a3-463da31da4ac r/w. Quota mode: none. <6>[ 5.275740] Adding 4194300k swap on /swap.img. Priority:-2 extents:35 across:86695936k SS <7>[ 5.302787] systemd-journald[219]: Received client request to flush runtime journal. <7>[ 5.348288] systemd-journald[219]: /var/log/journal/87673222d5fd49d697c113f49f6b17fd/system.journal: Journal file uses a different sequence number ID, rotating. <7>[ 5.348301] systemd-journald[219]: Rotating system journal. <4>[ 6.389902] kmemleak: Found object by alias at 0xffffffffa043a000 <4>[ 6.389909] CPU: 3 UID: 0 PID: 346 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.389912] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.389913] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.389914] Call Trace: <4>[ 6.389914] <4>[ 6.389915] dump_stack_lvl+0x91/0xf0 <4>[ 6.389920] dump_stack+0x10/0x20 <4>[ 6.389922] __lookup_object+0x90/0xa0 <4>[ 6.389926] __find_and_get_object+0x6c/0x190 <4>[ 6.389930] paint_ptr+0x1b/0xa0 <4>[ 6.389933] kmemleak_not_leak+0x33/0x70 <4>[ 6.389936] load_module+0xa20/0x2d10 <4>[ 6.389947] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.389952] ? kernel_read_file+0x2ac/0x330 <4>[ 6.389958] init_module_from_file+0x97/0xe0 <4>[ 6.389959] ? init_module_from_file+0x97/0xe0 <4>[ 6.389970] idempotent_init_module+0x134/0x350 <4>[ 6.389981] __x64_sys_finit_module+0x77/0x100 <4>[ 6.389985] x64_sys_call+0x24e3/0x2670 <4>[ 6.389987] do_syscall_64+0x91/0x180 <4>[ 6.389990] ? putname+0x60/0x80 <4>[ 6.389994] ? lock_acquire+0xc9/0x310 <4>[ 6.389998] ? find_held_lock+0x31/0x90 <4>[ 6.390000] ? __might_fault+0x53/0xb0 <4>[ 6.390003] ? lock_release+0xd3/0x2c0 <4>[ 6.390006] ? __might_fault+0x53/0xb0 <4>[ 6.390009] ? __might_fault+0x89/0xb0 <4>[ 6.390010] ? __might_fault+0x53/0xb0 <4>[ 6.390012] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.390015] ? putname+0x60/0x80 <4>[ 6.390018] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.390021] ? switch_fpu_return+0xe0/0x130 <4>[ 6.390025] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.390029] ? do_syscall_64+0x9d/0x180 <4>[ 6.390032] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.390036] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.390040] ? irqentry_exit+0x77/0xb0 <4>[ 6.390042] ? exc_page_fault+0xb1/0x300 <4>[ 6.390047] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.390049] RIP: 0033:0x78cf6112725d <4>[ 6.390051] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.390053] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.390055] RAX: ffffffffffffffda RBX: 000057e1920de610 RCX: 000078cf6112725d <4>[ 6.390056] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 6.390057] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 6.390057] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.390058] R13: 0000000000020000 R14: 000057e1920cc8c0 R15: 000057e1920de6b0 <4>[ 6.390069] <5>[ 6.390069] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.390086] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.390088] kmemleak: min_count = 0 <5>[ 6.390089] kmemleak: count = 0 <5>[ 6.390091] kmemleak: flags = 0x1 <5>[ 6.390092] kmemleak: checksum = 0 <5>[ 6.390093] kmemleak: backtrace: <4>[ 6.390095] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.390098] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.390101] execmem_vmalloc+0x5a/0xf0 <4>[ 6.390104] execmem_alloc+0xc2/0x150 <4>[ 6.390106] load_module+0x9db/0x2d10 <4>[ 6.390108] init_module_from_file+0x97/0xe0 <4>[ 6.390110] idempotent_init_module+0x134/0x350 <4>[ 6.390112] __x64_sys_finit_module+0x77/0x100 <4>[ 6.390115] x64_sys_call+0x24e3/0x2670 <4>[ 6.390117] do_syscall_64+0x91/0x180 <4>[ 6.390119] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.390122] kmemleak: Trying to color unknown object at 0xffffffffa043a000 as Grey <4>[ 6.390126] CPU: 3 UID: 0 PID: 346 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.390128] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.390129] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.390130] Call Trace: <4>[ 6.390130] <4>[ 6.390131] dump_stack_lvl+0xc1/0xf0 <4>[ 6.390134] dump_stack+0x10/0x20 <4>[ 6.390136] paint_ptr+0x8d/0xa0 <4>[ 6.390141] kmemleak_not_leak+0x33/0x70 <4>[ 6.390144] load_module+0xa20/0x2d10 <4>[ 6.390158] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.390163] ? kernel_read_file+0x2ac/0x330 <4>[ 6.390170] init_module_from_file+0x97/0xe0 <4>[ 6.390172] ? init_module_from_file+0x97/0xe0 <4>[ 6.390186] idempotent_init_module+0x134/0x350 <4>[ 6.390201] __x64_sys_finit_module+0x77/0x100 <4>[ 6.390206] x64_sys_call+0x24e3/0x2670 <4>[ 6.390209] do_syscall_64+0x91/0x180 <4>[ 6.390212] ? putname+0x60/0x80 <4>[ 6.390217] ? lock_acquire+0xc9/0x310 <4>[ 6.390221] ? find_held_lock+0x31/0x90 <4>[ 6.390224] ? __might_fault+0x53/0xb0 <4>[ 6.390227] ? lock_release+0xd3/0x2c0 <4>[ 6.390231] ? __might_fault+0x53/0xb0 <4>[ 6.390235] ? __might_fault+0x89/0xb0 <4>[ 6.390236] ? __might_fault+0x53/0xb0 <4>[ 6.390239] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.390243] ? putname+0x60/0x80 <4>[ 6.390246] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.390250] ? switch_fpu_return+0xe0/0x130 <4>[ 6.390255] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.390260] ? do_syscall_64+0x9d/0x180 <4>[ 6.390264] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.390269] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.390274] ? irqentry_exit+0x77/0xb0 <4>[ 6.390277] ? exc_page_fault+0xb1/0x300 <4>[ 6.390282] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.390285] RIP: 0033:0x78cf6112725d <4>[ 6.390287] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.390288] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.390290] RAX: ffffffffffffffda RBX: 000057e1920de610 RCX: 000078cf6112725d <4>[ 6.390291] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 6.390293] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 6.390294] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.390295] R13: 0000000000020000 R14: 000057e1920cc8c0 R15: 000057e1920de6b0 <4>[ 6.390309] <4>[ 6.391659] kmemleak: Found object by alias at 0xffffffffa0440000 <4>[ 6.391664] CPU: 3 UID: 0 PID: 346 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.391668] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.391668] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.391669] Call Trace: <4>[ 6.391670] <4>[ 6.391672] dump_stack_lvl+0x91/0xf0 <4>[ 6.391676] dump_stack+0x10/0x20 <4>[ 6.391678] __lookup_object+0x90/0xa0 <4>[ 6.391682] __find_and_get_object+0x6c/0x190 <4>[ 6.391686] paint_ptr+0x1b/0xa0 <4>[ 6.391690] kmemleak_not_leak+0x33/0x70 <4>[ 6.391692] load_module+0xa20/0x2d10 <4>[ 6.391703] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.391707] ? kernel_read_file+0x2ac/0x330 <4>[ 6.391713] init_module_from_file+0x97/0xe0 <4>[ 6.391714] ? init_module_from_file+0x97/0xe0 <4>[ 6.391724] idempotent_init_module+0x134/0x350 <4>[ 6.391735] __x64_sys_finit_module+0x77/0x100 <4>[ 6.391739] x64_sys_call+0x24e3/0x2670 <4>[ 6.391741] do_syscall_64+0x91/0x180 <4>[ 6.391744] ? putname+0x60/0x80 <4>[ 6.391748] ? lock_acquire+0xc9/0x310 <4>[ 6.391751] ? find_held_lock+0x31/0x90 <4>[ 6.391753] ? __might_fault+0x53/0xb0 <4>[ 6.391756] ? lock_release+0xd3/0x2c0 <4>[ 6.391759] ? __might_fault+0x53/0xb0 <4>[ 6.391762] ? __might_fault+0x89/0xb0 <4>[ 6.391762] ? __might_fault+0x53/0xb0 <4>[ 6.391765] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.391767] ? putname+0x60/0x80 <4>[ 6.391770] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.391773] ? switch_fpu_return+0xe0/0x130 <4>[ 6.391777] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.391781] ? do_syscall_64+0x9d/0x180 <4>[ 6.391784] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.391788] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.391791] ? irqentry_exit+0x77/0xb0 <4>[ 6.391793] ? exc_page_fault+0xb1/0x300 <4>[ 6.391798] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.391800] RIP: 0033:0x78cf6112725d <4>[ 6.391802] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.391803] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.391804] RAX: ffffffffffffffda RBX: 000057e1920de610 RCX: 000078cf6112725d <4>[ 6.391805] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 6.391806] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 6.391807] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.391808] R13: 0000000000020000 R14: 000057e1920cc8c0 R15: 000057e1920de6b0 <4>[ 6.391818] <5>[ 6.391818] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.391835] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.391837] kmemleak: min_count = 0 <5>[ 6.391839] kmemleak: count = 0 <5>[ 6.391840] kmemleak: flags = 0x1 <5>[ 6.391841] kmemleak: checksum = 0 <5>[ 6.391842] kmemleak: backtrace: <4>[ 6.391844] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.391846] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.391849] execmem_vmalloc+0x5a/0xf0 <4>[ 6.391852] execmem_alloc+0xc2/0x150 <4>[ 6.391855] load_module+0x9db/0x2d10 <4>[ 6.391857] init_module_from_file+0x97/0xe0 <4>[ 6.391859] idempotent_init_module+0x134/0x350 <4>[ 6.391861] __x64_sys_finit_module+0x77/0x100 <4>[ 6.391863] x64_sys_call+0x24e3/0x2670 <4>[ 6.391866] do_syscall_64+0x91/0x180 <4>[ 6.391868] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.391871] kmemleak: Trying to color unknown object at 0xffffffffa0440000 as Grey <4>[ 6.391873] CPU: 3 UID: 0 PID: 346 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.391876] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.391876] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.391877] Call Trace: <4>[ 6.391878] <4>[ 6.391879] dump_stack_lvl+0xc1/0xf0 <4>[ 6.391883] dump_stack+0x10/0x20 <4>[ 6.391885] paint_ptr+0x8d/0xa0 <4>[ 6.391889] kmemleak_not_leak+0x33/0x70 <4>[ 6.391893] load_module+0xa20/0x2d10 <4>[ 6.391906] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.391912] ? kernel_read_file+0x2ac/0x330 <4>[ 6.391919] init_module_from_file+0x97/0xe0 <4>[ 6.391921] ? init_module_from_file+0x97/0xe0 <4>[ 6.391934] idempotent_init_module+0x134/0x350 <4>[ 6.391948] __x64_sys_finit_module+0x77/0x100 <4>[ 6.391953] x64_sys_call+0x24e3/0x2670 <4>[ 6.391956] do_syscall_64+0x91/0x180 <4>[ 6.391959] ? putname+0x60/0x80 <4>[ 6.391964] ? lock_acquire+0xc9/0x310 <4>[ 6.391968] ? find_held_lock+0x31/0x90 <4>[ 6.391971] ? __might_fault+0x53/0xb0 <4>[ 6.391974] ? lock_release+0xd3/0x2c0 <4>[ 6.391979] ? __might_fault+0x53/0xb0 <4>[ 6.391982] ? __might_fault+0x89/0xb0 <4>[ 6.391984] ? __might_fault+0x53/0xb0 <4>[ 6.391986] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.391990] ? putname+0x60/0x80 <4>[ 6.391993] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.391997] ? switch_fpu_return+0xe0/0x130 <4>[ 6.392002] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.392007] ? do_syscall_64+0x9d/0x180 <4>[ 6.392011] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.392015] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.392019] ? irqentry_exit+0x77/0xb0 <4>[ 6.392022] ? exc_page_fault+0xb1/0x300 <4>[ 6.392027] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.392029] RIP: 0033:0x78cf6112725d <4>[ 6.392031] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.392033] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.392035] RAX: ffffffffffffffda RBX: 000057e1920de610 RCX: 000078cf6112725d <4>[ 6.392036] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 6.392037] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 6.392038] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.392039] R13: 0000000000020000 R14: 000057e1920cc8c0 R15: 000057e1920de6b0 <4>[ 6.392053] <4>[ 6.394112] kmemleak: Found object by alias at 0xffffffffa0441000 <4>[ 6.394117] CPU: 5 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.394120] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.394121] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.394122] Call Trace: <4>[ 6.394122] <4>[ 6.394123] dump_stack_lvl+0x91/0xf0 <4>[ 6.394127] dump_stack+0x10/0x20 <4>[ 6.394129] __lookup_object+0x90/0xa0 <4>[ 6.394132] __find_and_get_object+0x6c/0x190 <4>[ 6.394136] paint_ptr+0x1b/0xa0 <4>[ 6.394139] kmemleak_not_leak+0x33/0x70 <4>[ 6.394142] load_module+0xa20/0x2d10 <4>[ 6.394153] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.394157] ? kernel_read_file+0x2ac/0x330 <4>[ 6.394163] init_module_from_file+0x97/0xe0 <4>[ 6.394164] ? init_module_from_file+0x97/0xe0 <4>[ 6.394175] idempotent_init_module+0x134/0x350 <4>[ 6.394186] __x64_sys_finit_module+0x77/0x100 <4>[ 6.394190] x64_sys_call+0x24e3/0x2670 <4>[ 6.394192] do_syscall_64+0x91/0x180 <4>[ 6.394194] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.394198] ? lock_release+0xd3/0x2c0 <4>[ 6.394203] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.394207] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.394211] ? irqentry_exit+0x77/0xb0 <4>[ 6.394213] ? exc_page_fault+0xb1/0x300 <4>[ 6.394217] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.394220] RIP: 0033:0x78cf6112725d <4>[ 6.394222] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.394223] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.394225] RAX: ffffffffffffffda RBX: 000057e1920c6030 RCX: 000078cf6112725d <4>[ 6.394226] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.394227] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.394228] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.394228] R13: 0000000000020000 R14: 000057e192033a60 R15: 000057e1920dd300 <4>[ 6.394238] <5>[ 6.394239] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.394253] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.394255] kmemleak: min_count = 0 <5>[ 6.394256] kmemleak: count = 0 <5>[ 6.394257] kmemleak: flags = 0x1 <5>[ 6.394258] kmemleak: checksum = 0 <5>[ 6.394260] kmemleak: backtrace: <4>[ 6.394261] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.394264] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.394267] execmem_vmalloc+0x5a/0xf0 <4>[ 6.394270] execmem_alloc+0xc2/0x150 <4>[ 6.394273] load_module+0x9db/0x2d10 <4>[ 6.394275] init_module_from_file+0x97/0xe0 <4>[ 6.394277] idempotent_init_module+0x134/0x350 <4>[ 6.394279] __x64_sys_finit_module+0x77/0x100 <4>[ 6.394281] x64_sys_call+0x24e3/0x2670 <4>[ 6.394283] do_syscall_64+0x91/0x180 <4>[ 6.394286] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.394289] kmemleak: Trying to color unknown object at 0xffffffffa0441000 as Grey <4>[ 6.394292] CPU: 5 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.394294] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.394294] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.394295] Call Trace: <4>[ 6.394296] <4>[ 6.394297] dump_stack_lvl+0xc1/0xf0 <4>[ 6.394300] dump_stack+0x10/0x20 <4>[ 6.394302] paint_ptr+0x8d/0xa0 <4>[ 6.394307] kmemleak_not_leak+0x33/0x70 <4>[ 6.394310] load_module+0xa20/0x2d10 <4>[ 6.394324] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.394330] ? kernel_read_file+0x2ac/0x330 <4>[ 6.394337] init_module_from_file+0x97/0xe0 <4>[ 6.394339] ? init_module_from_file+0x97/0xe0 <4>[ 6.394353] idempotent_init_module+0x134/0x350 <4>[ 6.394367] __x64_sys_finit_module+0x77/0x100 <4>[ 6.394372] x64_sys_call+0x24e3/0x2670 <4>[ 6.394375] do_syscall_64+0x91/0x180 <4>[ 6.394377] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.394382] ? lock_release+0xd3/0x2c0 <4>[ 6.394390] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.394394] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.394399] ? irqentry_exit+0x77/0xb0 <4>[ 6.394402] ? exc_page_fault+0xb1/0x300 <4>[ 6.394408] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.394410] RIP: 0033:0x78cf6112725d <4>[ 6.394412] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.394413] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.394415] RAX: ffffffffffffffda RBX: 000057e1920c6030 RCX: 000078cf6112725d <4>[ 6.394416] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.394417] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.394418] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.394419] R13: 0000000000020000 R14: 000057e192033a60 R15: 000057e1920dd300 <4>[ 6.394433] <4>[ 6.394739] kmemleak: Found object by alias at 0xffffffffa044d000 <4>[ 6.394743] CPU: 1 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.394746] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.394747] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.394747] Call Trace: <4>[ 6.394748] <4>[ 6.394749] dump_stack_lvl+0x91/0xf0 <4>[ 6.394753] dump_stack+0x10/0x20 <4>[ 6.394755] __lookup_object+0x90/0xa0 <4>[ 6.394758] __find_and_get_object+0x6c/0x190 <4>[ 6.394763] paint_ptr+0x1b/0xa0 <4>[ 6.394766] kmemleak_not_leak+0x33/0x70 <4>[ 6.394770] load_module+0xa20/0x2d10 <4>[ 6.394782] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.394787] ? kernel_read_file+0x2ac/0x330 <4>[ 6.394794] init_module_from_file+0x97/0xe0 <4>[ 6.394795] ? init_module_from_file+0x97/0xe0 <4>[ 6.394808] idempotent_init_module+0x134/0x350 <4>[ 6.394822] __x64_sys_finit_module+0x77/0x100 <4>[ 6.394827] x64_sys_call+0x24e3/0x2670 <4>[ 6.394829] do_syscall_64+0x91/0x180 <4>[ 6.394832] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.394835] ? lock_release+0xd3/0x2c0 <4>[ 6.394842] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.394847] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.394851] ? irqentry_exit+0x77/0xb0 <4>[ 6.394853] ? exc_page_fault+0xb1/0x300 <4>[ 6.394858] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.394861] RIP: 0033:0x78cf6112725d <4>[ 6.394863] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.394864] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.394866] RAX: ffffffffffffffda RBX: 000057e1920c6030 RCX: 000078cf6112725d <4>[ 6.394867] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.394868] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.394869] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.394870] R13: 0000000000020000 R14: 000057e192033a60 R15: 000057e1920dd300 <4>[ 6.394884] <5>[ 6.394884] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.394903] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.394906] kmemleak: min_count = 0 <5>[ 6.394908] kmemleak: count = 0 <5>[ 6.394910] kmemleak: flags = 0x1 <5>[ 6.394911] kmemleak: checksum = 0 <5>[ 6.394913] kmemleak: backtrace: <4>[ 6.394915] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.394919] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.394923] execmem_vmalloc+0x5a/0xf0 <4>[ 6.394927] execmem_alloc+0xc2/0x150 <4>[ 6.394931] load_module+0x9db/0x2d10 <4>[ 6.394934] init_module_from_file+0x97/0xe0 <4>[ 6.394936] idempotent_init_module+0x134/0x350 <4>[ 6.394939] __x64_sys_finit_module+0x77/0x100 <4>[ 6.394942] x64_sys_call+0x24e3/0x2670 <4>[ 6.394946] do_syscall_64+0x91/0x180 <4>[ 6.394949] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.394953] kmemleak: Trying to color unknown object at 0xffffffffa044d000 as Grey <4>[ 6.394957] CPU: 1 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.394959] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.394959] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.394960] Call Trace: <4>[ 6.394961] <4>[ 6.394962] dump_stack_lvl+0xc1/0xf0 <4>[ 6.394964] dump_stack+0x10/0x20 <4>[ 6.394966] paint_ptr+0x8d/0xa0 <4>[ 6.394970] kmemleak_not_leak+0x33/0x70 <4>[ 6.394973] load_module+0xa20/0x2d10 <4>[ 6.394985] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.394990] ? kernel_read_file+0x2ac/0x330 <4>[ 6.394997] init_module_from_file+0x97/0xe0 <4>[ 6.394999] ? init_module_from_file+0x97/0xe0 <4>[ 6.395012] idempotent_init_module+0x134/0x350 <4>[ 6.395026] __x64_sys_finit_module+0x77/0x100 <4>[ 6.395031] x64_sys_call+0x24e3/0x2670 <4>[ 6.395034] do_syscall_64+0x91/0x180 <4>[ 6.395036] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.395040] ? lock_release+0xd3/0x2c0 <4>[ 6.395048] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.395052] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.395057] ? irqentry_exit+0x77/0xb0 <4>[ 6.395060] ? exc_page_fault+0xb1/0x300 <4>[ 6.395064] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.395066] RIP: 0033:0x78cf6112725d <4>[ 6.395067] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.395068] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.395069] RAX: ffffffffffffffda RBX: 000057e1920c6030 RCX: 000078cf6112725d <4>[ 6.395070] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.395071] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.395072] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.395072] R13: 0000000000020000 R14: 000057e192033a60 R15: 000057e1920dd300 <4>[ 6.395081] <4>[ 6.395093] kmemleak: Found object by alias at 0xffffffffa044e000 <4>[ 6.395107] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.395109] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.395110] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.395110] Call Trace: <4>[ 6.395111] <4>[ 6.395112] dump_stack_lvl+0x91/0xf0 <4>[ 6.395114] dump_stack+0x10/0x20 <4>[ 6.395116] __lookup_object+0x90/0xa0 <4>[ 6.395118] __find_and_get_object+0x6c/0x190 <4>[ 6.395122] paint_ptr+0x1b/0xa0 <4>[ 6.395125] kmemleak_not_leak+0x33/0x70 <4>[ 6.395128] load_module+0xa20/0x2d10 <4>[ 6.395138] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.395142] ? kernel_read_file+0x2ac/0x330 <4>[ 6.395147] init_module_from_file+0x97/0xe0 <4>[ 6.395149] ? init_module_from_file+0x97/0xe0 <4>[ 6.395159] idempotent_init_module+0x134/0x350 <4>[ 6.395170] __x64_sys_finit_module+0x77/0x100 <4>[ 6.395174] x64_sys_call+0x24e3/0x2670 <4>[ 6.395176] do_syscall_64+0x91/0x180 <4>[ 6.395178] ? __might_fault+0x89/0xb0 <4>[ 6.395179] ? __might_fault+0x53/0xb0 <4>[ 6.395181] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.395187] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.395190] ? switch_fpu_return+0xe0/0x130 <4>[ 6.395194] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.395197] ? do_syscall_64+0x9d/0x180 <4>[ 6.395199] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.395202] ? lock_release+0xd3/0x2c0 <4>[ 6.395208] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.395211] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.395215] ? irqentry_exit+0x77/0xb0 <4>[ 6.395217] ? exc_page_fault+0xb1/0x300 <4>[ 6.395222] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.395223] RIP: 0033:0x78cf6112725d <4>[ 6.395225] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.395226] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.395227] RAX: ffffffffffffffda RBX: 000057e1920c6fc0 RCX: 000078cf6112725d <4>[ 6.395228] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000015 <4>[ 6.395228] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.395229] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.395230] R13: 0000000000020000 R14: 000057e1920c6f40 R15: 000057e1920c7190 <4>[ 6.395240] <5>[ 6.395240] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.395255] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.395257] kmemleak: min_count = 0 <5>[ 6.395258] kmemleak: count = 0 <5>[ 6.395259] kmemleak: flags = 0x1 <5>[ 6.395260] kmemleak: checksum = 0 <5>[ 6.395262] kmemleak: backtrace: <4>[ 6.395263] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.395266] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.395268] execmem_vmalloc+0x5a/0xf0 <4>[ 6.395271] execmem_alloc+0xc2/0x150 <4>[ 6.395274] load_module+0x9db/0x2d10 <4>[ 6.395276] init_module_from_file+0x97/0xe0 <4>[ 6.395278] idempotent_init_module+0x134/0x350 <4>[ 6.395280] __x64_sys_finit_module+0x77/0x100 <4>[ 6.395282] x64_sys_call+0x24e3/0x2670 <4>[ 6.395284] do_syscall_64+0x91/0x180 <4>[ 6.395287] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.395289] kmemleak: Trying to color unknown object at 0xffffffffa044e000 as Grey <4>[ 6.395292] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.395294] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.395294] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.395295] Call Trace: <4>[ 6.395296] <4>[ 6.395297] dump_stack_lvl+0xc1/0xf0 <4>[ 6.395300] dump_stack+0x10/0x20 <4>[ 6.395302] paint_ptr+0x8d/0xa0 <4>[ 6.395306] kmemleak_not_leak+0x33/0x70 <4>[ 6.395310] load_module+0xa20/0x2d10 <4>[ 6.395320] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.395325] ? kernel_read_file+0x2ac/0x330 <4>[ 6.395332] init_module_from_file+0x97/0xe0 <4>[ 6.395334] ? init_module_from_file+0x97/0xe0 <4>[ 6.395347] idempotent_init_module+0x134/0x350 <4>[ 6.395361] __x64_sys_finit_module+0x77/0x100 <4>[ 6.395366] x64_sys_call+0x24e3/0x2670 <4>[ 6.395368] do_syscall_64+0x91/0x180 <4>[ 6.395371] ? __might_fault+0x89/0xb0 <4>[ 6.395372] ? __might_fault+0x53/0xb0 <4>[ 6.395375] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.395381] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.395385] ? switch_fpu_return+0xe0/0x130 <4>[ 6.395390] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.395394] ? do_syscall_64+0x9d/0x180 <4>[ 6.395396] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.395400] ? lock_release+0xd3/0x2c0 <4>[ 6.395407] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.395412] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.395416] ? irqentry_exit+0x77/0xb0 <4>[ 6.395419] ? exc_page_fault+0xb1/0x300 <4>[ 6.395424] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.395426] RIP: 0033:0x78cf6112725d <4>[ 6.395428] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.395429] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.395431] RAX: ffffffffffffffda RBX: 000057e1920c6fc0 RCX: 000078cf6112725d <4>[ 6.395432] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000015 <4>[ 6.395433] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.395434] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.395435] R13: 0000000000020000 R14: 000057e1920c6f40 R15: 000057e1920c7190 <4>[ 6.395448] <4>[ 6.395606] kmemleak: Found object by alias at 0xffffffffa044f000 <4>[ 6.395609] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.395612] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.395613] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.395613] Call Trace: <4>[ 6.395614] <4>[ 6.395615] dump_stack_lvl+0x91/0xf0 <4>[ 6.395619] dump_stack+0x10/0x20 <4>[ 6.395621] __lookup_object+0x90/0xa0 <4>[ 6.395625] __find_and_get_object+0x6c/0x190 <4>[ 6.395630] paint_ptr+0x1b/0xa0 <4>[ 6.395635] kmemleak_not_leak+0x33/0x70 <4>[ 6.395638] load_module+0xa20/0x2d10 <4>[ 6.395653] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.395659] ? kernel_read_file+0x2ac/0x330 <4>[ 6.395666] init_module_from_file+0x97/0xe0 <4>[ 6.395668] ? init_module_from_file+0x97/0xe0 <4>[ 6.395683] idempotent_init_module+0x134/0x350 <4>[ 6.395699] __x64_sys_finit_module+0x77/0x100 <4>[ 6.395704] x64_sys_call+0x24e3/0x2670 <4>[ 6.395707] do_syscall_64+0x91/0x180 <4>[ 6.395710] ? __might_fault+0x89/0xb0 <4>[ 6.395711] ? __might_fault+0x53/0xb0 <4>[ 6.395714] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.395721] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.395725] ? switch_fpu_return+0xe0/0x130 <4>[ 6.395731] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.395736] ? do_syscall_64+0x9d/0x180 <4>[ 6.395738] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.395742] ? lock_release+0xd3/0x2c0 <4>[ 6.395750] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.395755] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.395760] ? irqentry_exit+0x77/0xb0 <4>[ 6.395763] ? exc_page_fault+0xb1/0x300 <4>[ 6.395769] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.395772] RIP: 0033:0x78cf6112725d <4>[ 6.395774] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.395776] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.395778] RAX: ffffffffffffffda RBX: 000057e1920c6fc0 RCX: 000078cf6112725d <4>[ 6.395779] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000015 <4>[ 6.395780] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.395781] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.395782] R13: 0000000000020000 R14: 000057e1920c6f40 R15: 000057e1920c7190 <4>[ 6.395798] <5>[ 6.395799] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.395823] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.395825] kmemleak: min_count = 0 <5>[ 6.395827] kmemleak: count = 0 <5>[ 6.395829] kmemleak: flags = 0x1 <5>[ 6.395831] kmemleak: checksum = 0 <5>[ 6.395833] kmemleak: backtrace: <4>[ 6.395834] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.395837] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.395840] execmem_vmalloc+0x5a/0xf0 <4>[ 6.395843] execmem_alloc+0xc2/0x150 <4>[ 6.395846] load_module+0x9db/0x2d10 <4>[ 6.395848] init_module_from_file+0x97/0xe0 <4>[ 6.395850] idempotent_init_module+0x134/0x350 <4>[ 6.395852] __x64_sys_finit_module+0x77/0x100 <4>[ 6.395854] x64_sys_call+0x24e3/0x2670 <4>[ 6.395856] do_syscall_64+0x91/0x180 <4>[ 6.395859] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.395861] kmemleak: Trying to color unknown object at 0xffffffffa044f000 as Grey <4>[ 6.395864] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.395866] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.395866] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.395867] Call Trace: <4>[ 6.395868] <4>[ 6.395869] dump_stack_lvl+0xc1/0xf0 <4>[ 6.395872] dump_stack+0x10/0x20 <4>[ 6.395875] paint_ptr+0x8d/0xa0 <4>[ 6.395879] kmemleak_not_leak+0x33/0x70 <4>[ 6.395882] load_module+0xa20/0x2d10 <4>[ 6.395895] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.395900] ? kernel_read_file+0x2ac/0x330 <4>[ 6.395907] init_module_from_file+0x97/0xe0 <4>[ 6.395909] ? init_module_from_file+0x97/0xe0 <4>[ 6.395923] idempotent_init_module+0x134/0x350 <4>[ 6.395937] __x64_sys_finit_module+0x77/0x100 <4>[ 6.395942] x64_sys_call+0x24e3/0x2670 <4>[ 6.395945] do_syscall_64+0x91/0x180 <4>[ 6.395948] ? __might_fault+0x89/0xb0 <4>[ 6.395949] ? __might_fault+0x53/0xb0 <4>[ 6.395952] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.395959] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.395963] ? switch_fpu_return+0xe0/0x130 <4>[ 6.395968] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.395972] ? do_syscall_64+0x9d/0x180 <4>[ 6.395974] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.395978] ? lock_release+0xd3/0x2c0 <4>[ 6.395986] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.395990] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.395995] ? irqentry_exit+0x77/0xb0 <4>[ 6.395998] ? exc_page_fault+0xb1/0x300 <4>[ 6.396003] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.396006] RIP: 0033:0x78cf6112725d <4>[ 6.396008] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.396009] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.396011] RAX: ffffffffffffffda RBX: 000057e1920c6fc0 RCX: 000078cf6112725d <4>[ 6.396012] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000015 <4>[ 6.396013] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.396014] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.396015] R13: 0000000000020000 R14: 000057e1920c6f40 R15: 000057e1920c7190 <4>[ 6.396028] <4>[ 6.401437] kmemleak: Found object by alias at 0xffffffffa0450000 <4>[ 6.401442] CPU: 2 UID: 0 PID: 317 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.401444] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.401445] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.401446] Call Trace: <4>[ 6.401446] <4>[ 6.401447] dump_stack_lvl+0x91/0xf0 <4>[ 6.401451] dump_stack+0x10/0x20 <4>[ 6.401453] __lookup_object+0x90/0xa0 <4>[ 6.401457] __find_and_get_object+0x6c/0x190 <4>[ 6.401460] paint_ptr+0x1b/0xa0 <4>[ 6.401463] kmemleak_not_leak+0x33/0x70 <4>[ 6.401466] load_module+0xa20/0x2d10 <4>[ 6.401474] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.401478] ? kernel_read_file+0x2ac/0x330 <4>[ 6.401483] init_module_from_file+0x97/0xe0 <4>[ 6.401484] ? init_module_from_file+0x97/0xe0 <4>[ 6.401492] idempotent_init_module+0x134/0x350 <4>[ 6.401500] __x64_sys_finit_module+0x77/0x100 <4>[ 6.401503] x64_sys_call+0x24e3/0x2670 <4>[ 6.401506] do_syscall_64+0x91/0x180 <4>[ 6.401513] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.401516] ? __seccomp_filter+0x379/0x580 <4>[ 6.401518] ? do_syscall_64+0x9d/0x180 <4>[ 6.401522] ? ext4_llseek+0xc0/0x120 <4>[ 6.401526] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.401529] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.401532] ? do_syscall_64+0x9d/0x180 <4>[ 6.401534] ? __slab_free+0x185/0x310 <4>[ 6.401536] ? putname+0x60/0x80 <4>[ 6.401546] ? putname+0x60/0x80 <4>[ 6.401548] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.401553] ? putname+0x60/0x80 <4>[ 6.401555] ? do_sys_openat2+0xab/0xf0 <4>[ 6.401559] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.401562] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.401566] ? do_syscall_64+0x9d/0x180 <4>[ 6.401567] ? irqentry_exit+0x77/0xb0 <4>[ 6.401569] ? exc_page_fault+0xb1/0x300 <4>[ 6.401573] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.401575] RIP: 0033:0x78cf6112725d <4>[ 6.401577] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.401578] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.401580] RAX: ffffffffffffffda RBX: 000057e1920ca7c0 RCX: 000078cf6112725d <4>[ 6.401581] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000001a <4>[ 6.401582] RBP: 00007ffe24e238e0 R08: 0000000000000005 R09: 00007ffe24e23890 <4>[ 6.401582] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.401583] R13: 0000000000020000 R14: 000057e1920c8a50 R15: 000057e191fd3520 <4>[ 6.401591] <5>[ 6.401591] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.401605] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.401607] kmemleak: min_count = 0 <5>[ 6.401608] kmemleak: count = 0 <5>[ 6.401609] kmemleak: flags = 0x1 <5>[ 6.401611] kmemleak: checksum = 0 <5>[ 6.401612] kmemleak: backtrace: <4>[ 6.401613] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.401615] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.401618] execmem_vmalloc+0x5a/0xf0 <4>[ 6.401621] execmem_alloc+0xc2/0x150 <4>[ 6.401623] load_module+0x9db/0x2d10 <4>[ 6.401625] init_module_from_file+0x97/0xe0 <4>[ 6.401627] idempotent_init_module+0x134/0x350 <4>[ 6.401629] __x64_sys_finit_module+0x77/0x100 <4>[ 6.401631] x64_sys_call+0x24e3/0x2670 <4>[ 6.401633] do_syscall_64+0x91/0x180 <4>[ 6.401635] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.401646] kmemleak: Trying to color unknown object at 0xffffffffa0450000 as Grey <4>[ 6.401648] CPU: 2 UID: 0 PID: 317 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.401650] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.401650] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.401651] Call Trace: <4>[ 6.401651] <4>[ 6.401652] dump_stack_lvl+0xc1/0xf0 <4>[ 6.401654] dump_stack+0x10/0x20 <4>[ 6.401655] paint_ptr+0x8d/0xa0 <4>[ 6.401658] kmemleak_not_leak+0x33/0x70 <4>[ 6.401661] load_module+0xa20/0x2d10 <4>[ 6.401667] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.401671] ? kernel_read_file+0x2ac/0x330 <4>[ 6.401675] init_module_from_file+0x97/0xe0 <4>[ 6.401676] ? init_module_from_file+0x97/0xe0 <4>[ 6.401683] idempotent_init_module+0x134/0x350 <4>[ 6.401690] __x64_sys_finit_module+0x77/0x100 <4>[ 6.401693] x64_sys_call+0x24e3/0x2670 <4>[ 6.401695] do_syscall_64+0x91/0x180 <4>[ 6.401701] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.401704] ? __seccomp_filter+0x379/0x580 <4>[ 6.401705] ? do_syscall_64+0x9d/0x180 <4>[ 6.401709] ? ext4_llseek+0xc0/0x120 <4>[ 6.401712] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.401715] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.401718] ? do_syscall_64+0x9d/0x180 <4>[ 6.401720] ? __slab_free+0x185/0x310 <4>[ 6.401721] ? putname+0x60/0x80 <4>[ 6.401727] ? putname+0x60/0x80 <4>[ 6.401728] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.401733] ? putname+0x60/0x80 <4>[ 6.401734] ? do_sys_openat2+0xab/0xf0 <4>[ 6.401738] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.401741] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.401744] ? do_syscall_64+0x9d/0x180 <4>[ 6.401745] ? irqentry_exit+0x77/0xb0 <4>[ 6.401748] ? exc_page_fault+0xb1/0x300 <4>[ 6.401751] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.401752] RIP: 0033:0x78cf6112725d <4>[ 6.401754] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.401755] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.401756] RAX: ffffffffffffffda RBX: 000057e1920ca7c0 RCX: 000078cf6112725d <4>[ 6.401757] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000001a <4>[ 6.401757] RBP: 00007ffe24e238e0 R08: 0000000000000005 R09: 00007ffe24e23890 <4>[ 6.401758] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.401758] R13: 0000000000020000 R14: 000057e1920c8a50 R15: 000057e191fd3520 <4>[ 6.401765] <4>[ 6.401845] kmemleak: Found object by alias at 0xffffffffa0453000 <4>[ 6.401859] CPU: 2 UID: 0 PID: 317 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.401860] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.401861] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.401861] Call Trace: <4>[ 6.401862] <4>[ 6.401863] dump_stack_lvl+0x91/0xf0 <4>[ 6.401865] dump_stack+0x10/0x20 <4>[ 6.401866] __lookup_object+0x90/0xa0 <4>[ 6.401869] __find_and_get_object+0x6c/0x190 <4>[ 6.401872] paint_ptr+0x1b/0xa0 <4>[ 6.401875] kmemleak_not_leak+0x33/0x70 <4>[ 6.401877] load_module+0xa20/0x2d10 <4>[ 6.401885] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.401888] ? kernel_read_file+0x2ac/0x330 <4>[ 6.401892] init_module_from_file+0x97/0xe0 <4>[ 6.401893] ? init_module_from_file+0x97/0xe0 <4>[ 6.401901] idempotent_init_module+0x134/0x350 <4>[ 6.401910] __x64_sys_finit_module+0x77/0x100 <4>[ 6.401913] x64_sys_call+0x24e3/0x2670 <4>[ 6.401915] do_syscall_64+0x91/0x180 <4>[ 6.401922] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.401924] ? __seccomp_filter+0x379/0x580 <4>[ 6.401926] ? do_syscall_64+0x9d/0x180 <4>[ 6.401930] ? ext4_llseek+0xc0/0x120 <4>[ 6.401933] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.401936] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.401939] ? do_syscall_64+0x9d/0x180 <4>[ 6.401941] ? __slab_free+0x185/0x310 <4>[ 6.401942] ? putname+0x60/0x80 <4>[ 6.401949] ? putname+0x60/0x80 <4>[ 6.401951] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.401955] ? putname+0x60/0x80 <4>[ 6.401957] ? do_sys_openat2+0xab/0xf0 <4>[ 6.401961] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.401964] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.401967] ? do_syscall_64+0x9d/0x180 <4>[ 6.401969] ? irqentry_exit+0x77/0xb0 <4>[ 6.401971] ? exc_page_fault+0xb1/0x300 <4>[ 6.401974] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.401976] RIP: 0033:0x78cf6112725d <4>[ 6.401977] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.401978] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.401979] RAX: ffffffffffffffda RBX: 000057e1920ca7c0 RCX: 000078cf6112725d <4>[ 6.401980] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000001a <4>[ 6.401980] RBP: 00007ffe24e238e0 R08: 0000000000000005 R09: 00007ffe24e23890 <4>[ 6.401981] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.401981] R13: 0000000000020000 R14: 000057e1920c8a50 R15: 000057e191fd3520 <4>[ 6.401989] <5>[ 6.401990] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.402003] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.402005] kmemleak: min_count = 0 <5>[ 6.402006] kmemleak: count = 0 <5>[ 6.402007] kmemleak: flags = 0x1 <5>[ 6.402008] kmemleak: checksum = 0 <5>[ 6.402009] kmemleak: backtrace: <4>[ 6.402010] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.402013] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.402015] execmem_vmalloc+0x5a/0xf0 <4>[ 6.402018] execmem_alloc+0xc2/0x150 <4>[ 6.402020] load_module+0x9db/0x2d10 <4>[ 6.402022] init_module_from_file+0x97/0xe0 <4>[ 6.402024] idempotent_init_module+0x134/0x350 <4>[ 6.402025] __x64_sys_finit_module+0x77/0x100 <4>[ 6.402027] x64_sys_call+0x24e3/0x2670 <4>[ 6.402029] do_syscall_64+0x91/0x180 <4>[ 6.402032] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.402034] kmemleak: Trying to color unknown object at 0xffffffffa0453000 as Grey <4>[ 6.402036] CPU: 2 UID: 0 PID: 317 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.402037] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.402038] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.402038] Call Trace: <4>[ 6.402039] <4>[ 6.402039] dump_stack_lvl+0xc1/0xf0 <4>[ 6.402041] dump_stack+0x10/0x20 <4>[ 6.402043] paint_ptr+0x8d/0xa0 <4>[ 6.402045] kmemleak_not_leak+0x33/0x70 <4>[ 6.402048] load_module+0xa20/0x2d10 <4>[ 6.402054] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.402058] ? kernel_read_file+0x2ac/0x330 <4>[ 6.402061] init_module_from_file+0x97/0xe0 <4>[ 6.402062] ? init_module_from_file+0x97/0xe0 <4>[ 6.402070] idempotent_init_module+0x134/0x350 <4>[ 6.402077] __x64_sys_finit_module+0x77/0x100 <4>[ 6.402080] x64_sys_call+0x24e3/0x2670 <4>[ 6.402082] do_syscall_64+0x91/0x180 <4>[ 6.402088] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.402090] ? __seccomp_filter+0x379/0x580 <4>[ 6.402091] ? do_syscall_64+0x9d/0x180 <4>[ 6.402095] ? ext4_llseek+0xc0/0x120 <4>[ 6.402098] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.402101] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.402103] ? do_syscall_64+0x9d/0x180 <4>[ 6.402106] ? __slab_free+0x185/0x310 <4>[ 6.402107] ? putname+0x60/0x80 <4>[ 6.402113] ? putname+0x60/0x80 <4>[ 6.402114] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.402118] ? putname+0x60/0x80 <4>[ 6.402120] ? do_sys_openat2+0xab/0xf0 <4>[ 6.402124] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.402127] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.402129] ? do_syscall_64+0x9d/0x180 <4>[ 6.402131] ? irqentry_exit+0x77/0xb0 <4>[ 6.402133] ? exc_page_fault+0xb1/0x300 <4>[ 6.402136] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.402138] RIP: 0033:0x78cf6112725d <4>[ 6.402139] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.402140] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.402141] RAX: ffffffffffffffda RBX: 000057e1920ca7c0 RCX: 000078cf6112725d <4>[ 6.402141] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000001a <4>[ 6.402142] RBP: 00007ffe24e238e0 R08: 0000000000000005 R09: 00007ffe24e23890 <4>[ 6.402142] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.402143] R13: 0000000000020000 R14: 000057e1920c8a50 R15: 000057e191fd3520 <4>[ 6.402150] <4>[ 6.417155] kmemleak: Found object by alias at 0xffffffffa0454000 <4>[ 6.417162] CPU: 7 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.417165] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.417166] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.417167] Call Trace: <4>[ 6.417168] <4>[ 6.417170] dump_stack_lvl+0x91/0xf0 <4>[ 6.417174] dump_stack+0x10/0x20 <4>[ 6.417176] __lookup_object+0x90/0xa0 <4>[ 6.417180] __find_and_get_object+0x6c/0x190 <4>[ 6.417184] paint_ptr+0x1b/0xa0 <4>[ 6.417188] kmemleak_not_leak+0x33/0x70 <4>[ 6.417191] load_module+0xa20/0x2d10 <4>[ 6.417202] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.417207] ? kernel_read_file+0x2ac/0x330 <4>[ 6.417213] init_module_from_file+0x97/0xe0 <4>[ 6.417214] ? init_module_from_file+0x97/0xe0 <4>[ 6.417224] idempotent_init_module+0x134/0x350 <4>[ 6.417236] __x64_sys_finit_module+0x77/0x100 <4>[ 6.417239] x64_sys_call+0x24e3/0x2670 <4>[ 6.417242] do_syscall_64+0x91/0x180 <4>[ 6.417245] ? do_syscall_64+0x9d/0x180 <4>[ 6.417247] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.417251] ? switch_fpu_return+0xe0/0x130 <4>[ 6.417255] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.417259] ? do_syscall_64+0x9d/0x180 <4>[ 6.417260] ? exc_page_fault+0xb1/0x300 <4>[ 6.417265] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.417267] RIP: 0033:0x78cf6112725d <4>[ 6.417270] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.417271] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.417273] RAX: ffffffffffffffda RBX: 000057e191fd4440 RCX: 000078cf6112725d <4>[ 6.417274] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.417275] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.417276] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.417276] R13: 0000000000020000 R14: 000057e1920c6bb0 R15: 000057e1920c71d0 <4>[ 6.417287] <5>[ 6.417287] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.417301] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.417303] kmemleak: min_count = 0 <5>[ 6.417304] kmemleak: count = 0 <5>[ 6.417305] kmemleak: flags = 0x1 <5>[ 6.417307] kmemleak: checksum = 0 <5>[ 6.417308] kmemleak: backtrace: <4>[ 6.417309] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.417312] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.417316] execmem_vmalloc+0x5a/0xf0 <4>[ 6.417319] execmem_alloc+0xc2/0x150 <4>[ 6.417322] load_module+0x9db/0x2d10 <4>[ 6.417324] init_module_from_file+0x97/0xe0 <4>[ 6.417326] idempotent_init_module+0x134/0x350 <4>[ 6.417328] __x64_sys_finit_module+0x77/0x100 <4>[ 6.417330] x64_sys_call+0x24e3/0x2670 <4>[ 6.417332] do_syscall_64+0x91/0x180 <4>[ 6.417335] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.417338] kmemleak: Trying to color unknown object at 0xffffffffa0454000 as Grey <4>[ 6.417341] CPU: 7 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.417344] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.417344] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.417345] Call Trace: <4>[ 6.417346] <4>[ 6.417347] dump_stack_lvl+0xc1/0xf0 <4>[ 6.417350] dump_stack+0x10/0x20 <4>[ 6.417353] paint_ptr+0x8d/0xa0 <4>[ 6.417357] kmemleak_not_leak+0x33/0x70 <4>[ 6.417361] load_module+0xa20/0x2d10 <4>[ 6.417375] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.417380] ? kernel_read_file+0x2ac/0x330 <4>[ 6.417388] init_module_from_file+0x97/0xe0 <4>[ 6.417390] ? init_module_from_file+0x97/0xe0 <4>[ 6.417403] idempotent_init_module+0x134/0x350 <4>[ 6.417417] __x64_sys_finit_module+0x77/0x100 <4>[ 6.417422] x64_sys_call+0x24e3/0x2670 <4>[ 6.417425] do_syscall_64+0x91/0x180 <4>[ 6.417429] ? do_syscall_64+0x9d/0x180 <4>[ 6.417432] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.417436] ? switch_fpu_return+0xe0/0x130 <4>[ 6.417441] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.417446] ? do_syscall_64+0x9d/0x180 <4>[ 6.417448] ? exc_page_fault+0xb1/0x300 <4>[ 6.417454] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.417457] RIP: 0033:0x78cf6112725d <4>[ 6.417459] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.417460] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.417462] RAX: ffffffffffffffda RBX: 000057e191fd4440 RCX: 000078cf6112725d <4>[ 6.417463] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.417464] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.417465] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.417466] R13: 0000000000020000 R14: 000057e1920c6bb0 R15: 000057e1920c71d0 <4>[ 6.417480] <4>[ 6.417693] kmemleak: Found object by alias at 0xffffffffa0455000 <4>[ 6.417696] CPU: 6 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.417699] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.417699] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.417700] Call Trace: <4>[ 6.417700] <4>[ 6.417701] dump_stack_lvl+0x91/0xf0 <4>[ 6.417704] dump_stack+0x10/0x20 <4>[ 6.417706] __lookup_object+0x90/0xa0 <4>[ 6.417708] __find_and_get_object+0x6c/0x190 <4>[ 6.417712] paint_ptr+0x1b/0xa0 <4>[ 6.417715] kmemleak_not_leak+0x33/0x70 <4>[ 6.417717] load_module+0xa20/0x2d10 <4>[ 6.417725] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.417729] ? kernel_read_file+0x2ac/0x330 <4>[ 6.417733] init_module_from_file+0x97/0xe0 <4>[ 6.417735] ? init_module_from_file+0x97/0xe0 <4>[ 6.417743] idempotent_init_module+0x134/0x350 <4>[ 6.417751] __x64_sys_finit_module+0x77/0x100 <4>[ 6.417754] x64_sys_call+0x24e3/0x2670 <4>[ 6.417756] do_syscall_64+0x91/0x180 <4>[ 6.417760] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.417764] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.417767] ? irqentry_exit+0x77/0xb0 <4>[ 6.417770] ? exc_page_fault+0xb1/0x300 <4>[ 6.417773] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.417775] RIP: 0033:0x78cf6112725d <4>[ 6.417777] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.417778] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.417779] RAX: ffffffffffffffda RBX: 000057e1920c7af0 RCX: 000078cf6112725d <4>[ 6.417780] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.417781] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 6.417782] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.417782] R13: 0000000000020000 R14: 000057e1920c6980 R15: 000057e1920c5ba0 <4>[ 6.417790] <5>[ 6.417790] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.417801] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.417803] kmemleak: min_count = 0 <5>[ 6.417804] kmemleak: count = 0 <5>[ 6.417805] kmemleak: flags = 0x1 <5>[ 6.417806] kmemleak: checksum = 0 <5>[ 6.417807] kmemleak: backtrace: <4>[ 6.417808] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.417811] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.417814] execmem_vmalloc+0x5a/0xf0 <4>[ 6.417817] execmem_alloc+0xc2/0x150 <4>[ 6.417819] load_module+0x9db/0x2d10 <4>[ 6.417821] init_module_from_file+0x97/0xe0 <4>[ 6.417823] idempotent_init_module+0x134/0x350 <4>[ 6.417824] __x64_sys_finit_module+0x77/0x100 <4>[ 6.417826] x64_sys_call+0x24e3/0x2670 <4>[ 6.417828] do_syscall_64+0x91/0x180 <4>[ 6.417831] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.417833] kmemleak: Trying to color unknown object at 0xffffffffa0455000 as Grey <4>[ 6.417835] CPU: 6 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.417837] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.417837] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.417838] Call Trace: <4>[ 6.417838] <4>[ 6.417839] dump_stack_lvl+0xc1/0xf0 <4>[ 6.417841] dump_stack+0x10/0x20 <4>[ 6.417843] paint_ptr+0x8d/0xa0 <4>[ 6.417845] kmemleak_not_leak+0x33/0x70 <4>[ 6.417848] load_module+0xa20/0x2d10 <4>[ 6.417854] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.417858] ? kernel_read_file+0x2ac/0x330 <4>[ 6.417861] init_module_from_file+0x97/0xe0 <4>[ 6.417863] ? init_module_from_file+0x97/0xe0 <4>[ 6.417870] idempotent_init_module+0x134/0x350 <4>[ 6.417877] __x64_sys_finit_module+0x77/0x100 <4>[ 6.417880] x64_sys_call+0x24e3/0x2670 <4>[ 6.417882] do_syscall_64+0x91/0x180 <4>[ 6.417885] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.417901] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.417904] ? irqentry_exit+0x77/0xb0 <4>[ 6.417906] ? exc_page_fault+0xb1/0x300 <4>[ 6.417909] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.417911] RIP: 0033:0x78cf6112725d <4>[ 6.417912] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.417913] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.417914] RAX: ffffffffffffffda RBX: 000057e1920c7af0 RCX: 000078cf6112725d <4>[ 6.417914] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.417915] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 6.417916] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.417916] R13: 0000000000020000 R14: 000057e1920c6980 R15: 000057e1920c5ba0 <4>[ 6.417923] <4>[ 6.418028] kmemleak: Found object by alias at 0xffffffffa0456000 <4>[ 6.418039] CPU: 6 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.418040] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.418041] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.418041] Call Trace: <4>[ 6.418042] <4>[ 6.418042] dump_stack_lvl+0x91/0xf0 <4>[ 6.418045] dump_stack+0x10/0x20 <4>[ 6.418046] __lookup_object+0x90/0xa0 <4>[ 6.418048] __find_and_get_object+0x6c/0x190 <4>[ 6.418051] paint_ptr+0x1b/0xa0 <4>[ 6.418054] kmemleak_not_leak+0x33/0x70 <4>[ 6.418057] load_module+0xa20/0x2d10 <4>[ 6.418064] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.418068] ? kernel_read_file+0x2ac/0x330 <4>[ 6.418072] init_module_from_file+0x97/0xe0 <4>[ 6.418073] ? init_module_from_file+0x97/0xe0 <4>[ 6.418081] idempotent_init_module+0x134/0x350 <4>[ 6.418089] __x64_sys_finit_module+0x77/0x100 <4>[ 6.418092] x64_sys_call+0x24e3/0x2670 <4>[ 6.418094] do_syscall_64+0x91/0x180 <4>[ 6.418098] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.418102] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.418105] ? irqentry_exit+0x77/0xb0 <4>[ 6.418107] ? exc_page_fault+0xb1/0x300 <4>[ 6.418110] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.418112] RIP: 0033:0x78cf6112725d <4>[ 6.418114] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.418114] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.418115] RAX: ffffffffffffffda RBX: 000057e1920c7af0 RCX: 000078cf6112725d <4>[ 6.418116] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.418117] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 6.418117] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.418118] R13: 0000000000020000 R14: 000057e1920c6980 R15: 000057e1920c5ba0 <4>[ 6.418125] <5>[ 6.418126] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.418136] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.418137] kmemleak: min_count = 0 <5>[ 6.418139] kmemleak: count = 0 <5>[ 6.418140] kmemleak: flags = 0x1 <5>[ 6.418141] kmemleak: checksum = 0 <5>[ 6.418142] kmemleak: backtrace: <4>[ 6.418143] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.418145] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.418148] execmem_vmalloc+0x5a/0xf0 <4>[ 6.418150] execmem_alloc+0xc2/0x150 <4>[ 6.418153] load_module+0x9db/0x2d10 <4>[ 6.418155] init_module_from_file+0x97/0xe0 <4>[ 6.418156] idempotent_init_module+0x134/0x350 <4>[ 6.418158] __x64_sys_finit_module+0x77/0x100 <4>[ 6.418160] x64_sys_call+0x24e3/0x2670 <4>[ 6.418162] do_syscall_64+0x91/0x180 <4>[ 6.418165] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.418167] kmemleak: Trying to color unknown object at 0xffffffffa0456000 as Grey <4>[ 6.418169] CPU: 6 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.418170] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.418171] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.418171] Call Trace: <4>[ 6.418171] <4>[ 6.418172] dump_stack_lvl+0xc1/0xf0 <4>[ 6.418174] dump_stack+0x10/0x20 <4>[ 6.418175] paint_ptr+0x8d/0xa0 <4>[ 6.418178] kmemleak_not_leak+0x33/0x70 <4>[ 6.418181] load_module+0xa20/0x2d10 <4>[ 6.418188] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.418191] ? kernel_read_file+0x2ac/0x330 <4>[ 6.418195] init_module_from_file+0x97/0xe0 <4>[ 6.418196] ? init_module_from_file+0x97/0xe0 <4>[ 6.418203] idempotent_init_module+0x134/0x350 <4>[ 6.418211] __x64_sys_finit_module+0x77/0x100 <4>[ 6.418213] x64_sys_call+0x24e3/0x2670 <4>[ 6.418215] do_syscall_64+0x91/0x180 <4>[ 6.418219] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.418222] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.418225] ? irqentry_exit+0x77/0xb0 <4>[ 6.418227] ? exc_page_fault+0xb1/0x300 <4>[ 6.418230] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.418232] RIP: 0033:0x78cf6112725d <4>[ 6.418233] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.418233] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.418234] RAX: ffffffffffffffda RBX: 000057e1920c7af0 RCX: 000078cf6112725d <4>[ 6.418235] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.418235] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 6.418236] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.418237] R13: 0000000000020000 R14: 000057e1920c6980 R15: 000057e1920c5ba0 <4>[ 6.418243] <4>[ 6.418259] kmemleak: Found object by alias at 0xffffffffa0457000 <4>[ 6.418273] CPU: 7 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.418275] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.418276] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.418276] Call Trace: <4>[ 6.418277] <4>[ 6.418278] dump_stack_lvl+0x91/0xf0 <4>[ 6.418281] dump_stack+0x10/0x20 <4>[ 6.418282] __lookup_object+0x90/0xa0 <4>[ 6.418285] __find_and_get_object+0x6c/0x190 <4>[ 6.418289] paint_ptr+0x1b/0xa0 <4>[ 6.418292] kmemleak_not_leak+0x33/0x70 <4>[ 6.418295] load_module+0xa20/0x2d10 <4>[ 6.418305] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.418309] ? kernel_read_file+0x2ac/0x330 <4>[ 6.418314] init_module_from_file+0x97/0xe0 <4>[ 6.418316] ? init_module_from_file+0x97/0xe0 <4>[ 6.418326] idempotent_init_module+0x134/0x350 <4>[ 6.418337] __x64_sys_finit_module+0x77/0x100 <4>[ 6.418341] x64_sys_call+0x24e3/0x2670 <4>[ 6.418343] do_syscall_64+0x91/0x180 <4>[ 6.418346] ? do_syscall_64+0x9d/0x180 <4>[ 6.418348] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.418351] ? switch_fpu_return+0xe0/0x130 <4>[ 6.418355] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.418358] ? do_syscall_64+0x9d/0x180 <4>[ 6.418360] ? exc_page_fault+0xb1/0x300 <4>[ 6.418364] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.418366] RIP: 0033:0x78cf6112725d <4>[ 6.418368] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.418369] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.418370] RAX: ffffffffffffffda RBX: 000057e191fd4440 RCX: 000078cf6112725d <4>[ 6.418371] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.418372] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.418373] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.418374] R13: 0000000000020000 R14: 000057e1920c6bb0 R15: 000057e1920c71d0 <4>[ 6.418384] <5>[ 6.418384] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.418397] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.418399] kmemleak: min_count = 0 <5>[ 6.418400] kmemleak: count = 0 <5>[ 6.418402] kmemleak: flags = 0x1 <5>[ 6.418403] kmemleak: checksum = 0 <5>[ 6.418404] kmemleak: backtrace: <4>[ 6.418405] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.418408] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.418411] execmem_vmalloc+0x5a/0xf0 <4>[ 6.418414] execmem_alloc+0xc2/0x150 <4>[ 6.418417] load_module+0x9db/0x2d10 <4>[ 6.418419] init_module_from_file+0x97/0xe0 <4>[ 6.418421] idempotent_init_module+0x134/0x350 <4>[ 6.418423] __x64_sys_finit_module+0x77/0x100 <4>[ 6.418425] x64_sys_call+0x24e3/0x2670 <4>[ 6.418427] do_syscall_64+0x91/0x180 <4>[ 6.418430] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.418432] kmemleak: Trying to color unknown object at 0xffffffffa0457000 as Grey <4>[ 6.418436] CPU: 7 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.418438] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.418438] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.418439] Call Trace: <4>[ 6.418440] <4>[ 6.418441] dump_stack_lvl+0xc1/0xf0 <4>[ 6.418444] dump_stack+0x10/0x20 <4>[ 6.418446] paint_ptr+0x8d/0xa0 <4>[ 6.418451] kmemleak_not_leak+0x33/0x70 <4>[ 6.418454] load_module+0xa20/0x2d10 <4>[ 6.418467] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.418473] ? kernel_read_file+0x2ac/0x330 <4>[ 6.418480] init_module_from_file+0x97/0xe0 <4>[ 6.418481] ? init_module_from_file+0x97/0xe0 <4>[ 6.418495] idempotent_init_module+0x134/0x350 <4>[ 6.418510] __x64_sys_finit_module+0x77/0x100 <4>[ 6.418515] x64_sys_call+0x24e3/0x2670 <4>[ 6.418518] do_syscall_64+0x91/0x180 <4>[ 6.418522] ? do_syscall_64+0x9d/0x180 <4>[ 6.418524] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.418528] ? switch_fpu_return+0xe0/0x130 <4>[ 6.418534] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.418539] ? do_syscall_64+0x9d/0x180 <4>[ 6.418541] ? exc_page_fault+0xb1/0x300 <4>[ 6.418546] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.418549] RIP: 0033:0x78cf6112725d <4>[ 6.418551] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.418552] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.418554] RAX: ffffffffffffffda RBX: 000057e191fd4440 RCX: 000078cf6112725d <4>[ 6.418555] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.418556] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.418557] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.418558] R13: 0000000000020000 R14: 000057e1920c6bb0 R15: 000057e1920c71d0 <4>[ 6.418584] <4>[ 6.424769] kmemleak: Found object by alias at 0xffffffffa0458000 <4>[ 6.424773] CPU: 4 UID: 0 PID: 311 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.424776] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.424776] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.424777] Call Trace: <4>[ 6.424778] <4>[ 6.424779] dump_stack_lvl+0x91/0xf0 <4>[ 6.424783] dump_stack+0x10/0x20 <4>[ 6.424784] __lookup_object+0x90/0xa0 <4>[ 6.424788] __find_and_get_object+0x6c/0x190 <4>[ 6.424791] paint_ptr+0x1b/0xa0 <4>[ 6.424794] kmemleak_not_leak+0x33/0x70 <4>[ 6.424797] load_module+0xa20/0x2d10 <4>[ 6.424806] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.424810] ? kernel_read_file+0x2ac/0x330 <4>[ 6.424815] init_module_from_file+0x97/0xe0 <4>[ 6.424816] ? init_module_from_file+0x97/0xe0 <4>[ 6.424824] idempotent_init_module+0x134/0x350 <4>[ 6.424832] __x64_sys_finit_module+0x77/0x100 <4>[ 6.424835] x64_sys_call+0x24e3/0x2670 <4>[ 6.424838] do_syscall_64+0x91/0x180 <4>[ 6.424841] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.424844] ? do_syscall_64+0x9d/0x180 <4>[ 6.424851] ? putname+0x60/0x80 <4>[ 6.424853] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.424859] ? putname+0x60/0x80 <4>[ 6.424861] ? do_sys_openat2+0xab/0xf0 <4>[ 6.424865] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.424869] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.424872] ? do_syscall_64+0x9d/0x180 <4>[ 6.424873] ? exc_page_fault+0xb1/0x300 <4>[ 6.424877] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.424879] RIP: 0033:0x78cf6112725d <4>[ 6.424881] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.424882] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.424884] RAX: ffffffffffffffda RBX: 000057e1920c3280 RCX: 000078cf6112725d <4>[ 6.424885] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000014 <4>[ 6.424885] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.424886] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.424887] R13: 0000000000020000 R14: 000057e1920c3870 R15: 000057e1920c6260 <4>[ 6.424895] <5>[ 6.424895] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.424907] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.424909] kmemleak: min_count = 0 <5>[ 6.424910] kmemleak: count = 0 <5>[ 6.424911] kmemleak: flags = 0x1 <5>[ 6.424912] kmemleak: checksum = 0 <5>[ 6.424913] kmemleak: backtrace: <4>[ 6.424915] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.424917] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.424920] execmem_vmalloc+0x5a/0xf0 <4>[ 6.424923] execmem_alloc+0xc2/0x150 <4>[ 6.424925] load_module+0x9db/0x2d10 <4>[ 6.424927] init_module_from_file+0x97/0xe0 <4>[ 6.424929] idempotent_init_module+0x134/0x350 <4>[ 6.424931] __x64_sys_finit_module+0x77/0x100 <4>[ 6.424933] x64_sys_call+0x24e3/0x2670 <4>[ 6.424935] do_syscall_64+0x91/0x180 <4>[ 6.424937] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.424940] kmemleak: Trying to color unknown object at 0xffffffffa0458000 as Grey <4>[ 6.424942] CPU: 4 UID: 0 PID: 311 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.424943] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.424944] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.424944] Call Trace: <4>[ 6.424945] <4>[ 6.424945] dump_stack_lvl+0xc1/0xf0 <4>[ 6.424947] dump_stack+0x10/0x20 <4>[ 6.424949] paint_ptr+0x8d/0xa0 <4>[ 6.424952] kmemleak_not_leak+0x33/0x70 <4>[ 6.424954] load_module+0xa20/0x2d10 <4>[ 6.424961] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.424964] ? kernel_read_file+0x2ac/0x330 <4>[ 6.424968] init_module_from_file+0x97/0xe0 <4>[ 6.424969] ? init_module_from_file+0x97/0xe0 <4>[ 6.424976] idempotent_init_module+0x134/0x350 <4>[ 6.424983] __x64_sys_finit_module+0x77/0x100 <4>[ 6.424986] x64_sys_call+0x24e3/0x2670 <4>[ 6.424988] do_syscall_64+0x91/0x180 <4>[ 6.424990] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.424993] ? do_syscall_64+0x9d/0x180 <4>[ 6.424999] ? putname+0x60/0x80 <4>[ 6.425001] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.425006] ? putname+0x60/0x80 <4>[ 6.425007] ? do_sys_openat2+0xab/0xf0 <4>[ 6.425011] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.425014] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.425017] ? do_syscall_64+0x9d/0x180 <4>[ 6.425018] ? exc_page_fault+0xb1/0x300 <4>[ 6.425021] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.425023] RIP: 0033:0x78cf6112725d <4>[ 6.425024] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.425025] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.425026] RAX: ffffffffffffffda RBX: 000057e1920c3280 RCX: 000078cf6112725d <4>[ 6.425027] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000014 <4>[ 6.425027] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.425028] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.425029] R13: 0000000000020000 R14: 000057e1920c3870 R15: 000057e1920c6260 <4>[ 6.425035] <4>[ 6.425144] kmemleak: Found object by alias at 0xffffffffa046a000 <4>[ 6.425156] CPU: 4 UID: 0 PID: 311 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.425157] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.425158] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.425158] Call Trace: <4>[ 6.425159] <4>[ 6.425159] dump_stack_lvl+0x91/0xf0 <4>[ 6.425162] dump_stack+0x10/0x20 <4>[ 6.425163] __lookup_object+0x90/0xa0 <4>[ 6.425166] __find_and_get_object+0x6c/0x190 <4>[ 6.425169] paint_ptr+0x1b/0xa0 <4>[ 6.425172] kmemleak_not_leak+0x33/0x70 <4>[ 6.425175] load_module+0xa20/0x2d10 <4>[ 6.425182] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.425186] ? kernel_read_file+0x2ac/0x330 <4>[ 6.425191] init_module_from_file+0x97/0xe0 <4>[ 6.425192] ? init_module_from_file+0x97/0xe0 <4>[ 6.425200] idempotent_init_module+0x134/0x350 <4>[ 6.425208] __x64_sys_finit_module+0x77/0x100 <4>[ 6.425211] x64_sys_call+0x24e3/0x2670 <4>[ 6.425213] do_syscall_64+0x91/0x180 <4>[ 6.425216] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.425220] ? do_syscall_64+0x9d/0x180 <4>[ 6.425226] ? putname+0x60/0x80 <4>[ 6.425229] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.425234] ? putname+0x60/0x80 <4>[ 6.425235] ? do_sys_openat2+0xab/0xf0 <4>[ 6.425239] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.425243] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.425246] ? do_syscall_64+0x9d/0x180 <4>[ 6.425248] ? exc_page_fault+0xb1/0x300 <4>[ 6.425251] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.425253] RIP: 0033:0x78cf6112725d <4>[ 6.425255] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.425255] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.425256] RAX: ffffffffffffffda RBX: 000057e1920c3280 RCX: 000078cf6112725d <4>[ 6.425257] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000014 <4>[ 6.425258] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.425258] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.425259] R13: 0000000000020000 R14: 000057e1920c3870 R15: 000057e1920c6260 <4>[ 6.425266] <5>[ 6.425267] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.425278] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.425280] kmemleak: min_count = 0 <5>[ 6.425281] kmemleak: count = 0 <5>[ 6.425282] kmemleak: flags = 0x1 <5>[ 6.425283] kmemleak: checksum = 0 <5>[ 6.425284] kmemleak: backtrace: <4>[ 6.425285] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.425288] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.425290] execmem_vmalloc+0x5a/0xf0 <4>[ 6.425293] execmem_alloc+0xc2/0x150 <4>[ 6.425295] load_module+0x9db/0x2d10 <4>[ 6.425297] init_module_from_file+0x97/0xe0 <4>[ 6.425299] idempotent_init_module+0x134/0x350 <4>[ 6.425301] __x64_sys_finit_module+0x77/0x100 <4>[ 6.425303] x64_sys_call+0x24e3/0x2670 <4>[ 6.425305] do_syscall_64+0x91/0x180 <4>[ 6.425307] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.425310] kmemleak: Trying to color unknown object at 0xffffffffa046a000 as Grey <4>[ 6.425311] CPU: 4 UID: 0 PID: 311 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.425313] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.425313] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.425314] Call Trace: <4>[ 6.425314] <4>[ 6.425315] dump_stack_lvl+0xc1/0xf0 <4>[ 6.425317] dump_stack+0x10/0x20 <4>[ 6.425318] paint_ptr+0x8d/0xa0 <4>[ 6.425321] kmemleak_not_leak+0x33/0x70 <4>[ 6.425323] load_module+0xa20/0x2d10 <4>[ 6.425330] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.425333] ? kernel_read_file+0x2ac/0x330 <4>[ 6.425337] init_module_from_file+0x97/0xe0 <4>[ 6.425338] ? init_module_from_file+0x97/0xe0 <4>[ 6.425345] idempotent_init_module+0x134/0x350 <4>[ 6.425352] __x64_sys_finit_module+0x77/0x100 <4>[ 6.425355] x64_sys_call+0x24e3/0x2670 <4>[ 6.425357] do_syscall_64+0x91/0x180 <4>[ 6.425359] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.425362] ? do_syscall_64+0x9d/0x180 <4>[ 6.425368] ? putname+0x60/0x80 <4>[ 6.425370] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.425374] ? putname+0x60/0x80 <4>[ 6.425376] ? do_sys_openat2+0xab/0xf0 <4>[ 6.425380] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.425383] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.425386] ? do_syscall_64+0x9d/0x180 <4>[ 6.425387] ? exc_page_fault+0xb1/0x300 <4>[ 6.425390] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.425392] RIP: 0033:0x78cf6112725d <4>[ 6.425393] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.425394] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.425395] RAX: ffffffffffffffda RBX: 000057e1920c3280 RCX: 000078cf6112725d <4>[ 6.425395] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000014 <4>[ 6.425396] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.425396] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.425397] R13: 0000000000020000 R14: 000057e1920c3870 R15: 000057e1920c6260 <4>[ 6.425404] <6>[ 6.427870] IPMI message handler: version 39.2 <4>[ 6.428817] kmemleak: Found object by alias at 0xffffffffa044f000 <4>[ 6.428822] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.428824] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.428825] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.428826] Call Trace: <4>[ 6.428826] <4>[ 6.428828] dump_stack_lvl+0x91/0xf0 <4>[ 6.428831] dump_stack+0x10/0x20 <4>[ 6.428833] __lookup_object+0x90/0xa0 <4>[ 6.428837] __find_and_get_object+0x6c/0x190 <4>[ 6.428841] paint_ptr+0x1b/0xa0 <4>[ 6.428844] kmemleak_not_leak+0x33/0x70 <4>[ 6.428847] load_module+0xa20/0x2d10 <4>[ 6.428858] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.428862] ? kernel_read_file+0x2ac/0x330 <4>[ 6.428868] init_module_from_file+0x97/0xe0 <4>[ 6.428869] ? init_module_from_file+0x97/0xe0 <4>[ 6.428880] idempotent_init_module+0x134/0x350 <4>[ 6.428891] __x64_sys_finit_module+0x77/0x100 <4>[ 6.428894] x64_sys_call+0x24e3/0x2670 <4>[ 6.428897] do_syscall_64+0x91/0x180 <4>[ 6.428900] ? free_to_partial_list+0x498/0x690 <4>[ 6.428902] ? putname+0x60/0x80 <4>[ 6.428906] ? putname+0x60/0x80 <4>[ 6.428908] ? __slab_free+0x185/0x310 <4>[ 6.428910] ? putname+0x60/0x80 <4>[ 6.428918] ? putname+0x60/0x80 <4>[ 6.428920] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.428926] ? putname+0x60/0x80 <4>[ 6.428928] ? do_sys_openat2+0xab/0xf0 <4>[ 6.428933] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.428937] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.428941] ? do_syscall_64+0x9d/0x180 <4>[ 6.428942] ? switch_fpu_return+0xe0/0x130 <4>[ 6.428947] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.428950] ? do_syscall_64+0x9d/0x180 <4>[ 6.428952] ? exc_page_fault+0xb1/0x300 <4>[ 6.428956] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.428959] RIP: 0033:0x78cf6112725d <4>[ 6.428961] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.428962] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.428964] RAX: ffffffffffffffda RBX: 000057e1920c5100 RCX: 000078cf6112725d <4>[ 6.428965] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000017 <4>[ 6.428966] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.428966] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.428967] R13: 0000000000020000 R14: 000057e1920c4110 R15: 000057e1920c7210 <4>[ 6.428977] <5>[ 6.428978] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.428994] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.428996] kmemleak: min_count = 0 <5>[ 6.428997] kmemleak: count = 0 <5>[ 6.428999] kmemleak: flags = 0x1 <5>[ 6.429000] kmemleak: checksum = 0 <5>[ 6.429001] kmemleak: backtrace: <4>[ 6.429002] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.429005] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.429008] execmem_vmalloc+0x5a/0xf0 <4>[ 6.429011] execmem_alloc+0xc2/0x150 <4>[ 6.429014] load_module+0x9db/0x2d10 <4>[ 6.429016] init_module_from_file+0x97/0xe0 <4>[ 6.429018] idempotent_init_module+0x134/0x350 <4>[ 6.429020] __x64_sys_finit_module+0x77/0x100 <4>[ 6.429022] x64_sys_call+0x24e3/0x2670 <4>[ 6.429024] do_syscall_64+0x91/0x180 <4>[ 6.429027] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.429030] kmemleak: Trying to color unknown object at 0xffffffffa044f000 as Grey <4>[ 6.429033] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.429035] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.429036] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.429037] Call Trace: <4>[ 6.429037] <4>[ 6.429038] dump_stack_lvl+0xc1/0xf0 <4>[ 6.429041] dump_stack+0x10/0x20 <4>[ 6.429044] paint_ptr+0x8d/0xa0 <4>[ 6.429048] kmemleak_not_leak+0x33/0x70 <4>[ 6.429051] load_module+0xa20/0x2d10 <4>[ 6.429064] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.429069] ? kernel_read_file+0x2ac/0x330 <4>[ 6.429076] init_module_from_file+0x97/0xe0 <4>[ 6.429078] ? init_module_from_file+0x97/0xe0 <4>[ 6.429093] idempotent_init_module+0x134/0x350 <4>[ 6.429107] __x64_sys_finit_module+0x77/0x100 <4>[ 6.429112] x64_sys_call+0x24e3/0x2670 <4>[ 6.429115] do_syscall_64+0x91/0x180 <4>[ 6.429118] ? free_to_partial_list+0x498/0x690 <4>[ 6.429121] ? putname+0x60/0x80 <4>[ 6.429126] ? putname+0x60/0x80 <4>[ 6.429128] ? __slab_free+0x185/0x310 <4>[ 6.429130] ? putname+0x60/0x80 <4>[ 6.429142] ? putname+0x60/0x80 <4>[ 6.429144] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.429152] ? putname+0x60/0x80 <4>[ 6.429155] ? do_sys_openat2+0xab/0xf0 <4>[ 6.429161] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.429166] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.429171] ? do_syscall_64+0x9d/0x180 <4>[ 6.429173] ? switch_fpu_return+0xe0/0x130 <4>[ 6.429178] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.429183] ? do_syscall_64+0x9d/0x180 <4>[ 6.429185] ? exc_page_fault+0xb1/0x300 <4>[ 6.429190] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.429192] RIP: 0033:0x78cf6112725d <4>[ 6.429193] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.429195] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.429196] RAX: ffffffffffffffda RBX: 000057e1920c5100 RCX: 000078cf6112725d <4>[ 6.429197] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000017 <4>[ 6.429198] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.429198] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.429199] R13: 0000000000020000 R14: 000057e1920c4110 R15: 000057e1920c7210 <4>[ 6.429212] <4>[ 6.429350] kmemleak: Found object by alias at 0xffffffffa046b000 <4>[ 6.429373] CPU: 1 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.429375] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.429375] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.429376] Call Trace: <4>[ 6.429376] <4>[ 6.429377] dump_stack_lvl+0x91/0xf0 <4>[ 6.429380] dump_stack+0x10/0x20 <4>[ 6.429382] __lookup_object+0x90/0xa0 <4>[ 6.429385] __find_and_get_object+0x6c/0x190 <4>[ 6.429389] paint_ptr+0x1b/0xa0 <4>[ 6.429392] kmemleak_not_leak+0x33/0x70 <4>[ 6.429394] load_module+0xa20/0x2d10 <4>[ 6.429405] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.429409] ? kernel_read_file+0x2ac/0x330 <4>[ 6.429414] init_module_from_file+0x97/0xe0 <4>[ 6.429416] ? init_module_from_file+0x97/0xe0 <4>[ 6.429426] idempotent_init_module+0x134/0x350 <4>[ 6.429437] __x64_sys_finit_module+0x77/0x100 <4>[ 6.429441] x64_sys_call+0x24e3/0x2670 <4>[ 6.429443] do_syscall_64+0x91/0x180 <4>[ 6.429445] ? free_to_partial_list+0x498/0x690 <4>[ 6.429447] ? putname+0x60/0x80 <4>[ 6.429451] ? putname+0x60/0x80 <4>[ 6.429453] ? __slab_free+0x185/0x310 <4>[ 6.429455] ? putname+0x60/0x80 <4>[ 6.429463] ? putname+0x60/0x80 <4>[ 6.429465] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.429470] ? putname+0x60/0x80 <4>[ 6.429472] ? do_sys_openat2+0xab/0xf0 <4>[ 6.429477] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.429481] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.429485] ? do_syscall_64+0x9d/0x180 <4>[ 6.429486] ? switch_fpu_return+0xe0/0x130 <4>[ 6.429490] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.429494] ? do_syscall_64+0x9d/0x180 <4>[ 6.429495] ? exc_page_fault+0xb1/0x300 <4>[ 6.429500] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.429502] RIP: 0033:0x78cf6112725d <4>[ 6.429503] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.429504] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.429506] RAX: ffffffffffffffda RBX: 000057e1920c5100 RCX: 000078cf6112725d <4>[ 6.429506] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000017 <4>[ 6.429507] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.429508] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.429509] R13: 0000000000020000 R14: 000057e1920c4110 R15: 000057e1920c7210 <4>[ 6.429519] <5>[ 6.429519] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.429535] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.429537] kmemleak: min_count = 0 <5>[ 6.429538] kmemleak: count = 0 <5>[ 6.429540] kmemleak: flags = 0x1 <5>[ 6.429541] kmemleak: checksum = 0 <5>[ 6.429543] kmemleak: backtrace: <4>[ 6.429544] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.429547] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.429550] execmem_vmalloc+0x5a/0xf0 <4>[ 6.429553] execmem_alloc+0xc2/0x150 <4>[ 6.429556] load_module+0x9db/0x2d10 <4>[ 6.429559] init_module_from_file+0x97/0xe0 <4>[ 6.429561] idempotent_init_module+0x134/0x350 <4>[ 6.429563] __x64_sys_finit_module+0x77/0x100 <4>[ 6.429566] x64_sys_call+0x24e3/0x2670 <4>[ 6.429568] do_syscall_64+0x91/0x180 <4>[ 6.429571] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.429657] kmemleak: Trying to color unknown object at 0xffffffffa046b000 as Grey <4>[ 6.429659] CPU: 1 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.429661] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.429662] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.429662] Call Trace: <4>[ 6.429663] <4>[ 6.429664] dump_stack_lvl+0xc1/0xf0 <4>[ 6.429666] dump_stack+0x10/0x20 <4>[ 6.429667] paint_ptr+0x8d/0xa0 <4>[ 6.429670] kmemleak_not_leak+0x33/0x70 <4>[ 6.429673] load_module+0xa20/0x2d10 <4>[ 6.429680] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.429683] ? kernel_read_file+0x2ac/0x330 <4>[ 6.429687] init_module_from_file+0x97/0xe0 <4>[ 6.429688] ? init_module_from_file+0x97/0xe0 <4>[ 6.429695] idempotent_init_module+0x134/0x350 <4>[ 6.429703] __x64_sys_finit_module+0x77/0x100 <4>[ 6.429706] x64_sys_call+0x24e3/0x2670 <4>[ 6.429708] do_syscall_64+0x91/0x180 <4>[ 6.429709] ? free_to_partial_list+0x498/0x690 <4>[ 6.429711] ? putname+0x60/0x80 <4>[ 6.429714] ? putname+0x60/0x80 <4>[ 6.429716] ? __slab_free+0x185/0x310 <4>[ 6.429717] ? putname+0x60/0x80 <4>[ 6.429723] ? putname+0x60/0x80 <4>[ 6.429725] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.429729] ? putname+0x60/0x80 <4>[ 6.429731] ? do_sys_openat2+0xab/0xf0 <4>[ 6.429735] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.429738] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.429741] ? do_syscall_64+0x9d/0x180 <4>[ 6.429742] ? switch_fpu_return+0xe0/0x130 <4>[ 6.429745] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.429748] ? do_syscall_64+0x9d/0x180 <4>[ 6.429749] ? exc_page_fault+0xb1/0x300 <4>[ 6.429753] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.429755] RIP: 0033:0x78cf6112725d <4>[ 6.429756] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.429757] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.429758] RAX: ffffffffffffffda RBX: 000057e1920c5100 RCX: 000078cf6112725d <4>[ 6.429758] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000017 <4>[ 6.429759] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.429760] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.429760] R13: 0000000000020000 R14: 000057e1920c4110 R15: 000057e1920c7210 <4>[ 6.429767] <4>[ 6.430893] kmemleak: Found object by alias at 0xffffffffa046c000 <4>[ 6.430896] CPU: 5 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.430899] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.430900] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.430900] Call Trace: <4>[ 6.430901] <4>[ 6.430902] dump_stack_lvl+0x91/0xf0 <4>[ 6.430906] dump_stack+0x10/0x20 <4>[ 6.430908] __lookup_object+0x90/0xa0 <4>[ 6.430912] __find_and_get_object+0x6c/0x190 <4>[ 6.430916] paint_ptr+0x1b/0xa0 <4>[ 6.430919] kmemleak_not_leak+0x33/0x70 <4>[ 6.430922] load_module+0xa20/0x2d10 <4>[ 6.430932] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.430937] ? kernel_read_file+0x2ac/0x330 <4>[ 6.430942] init_module_from_file+0x97/0xe0 <4>[ 6.430943] ? init_module_from_file+0x97/0xe0 <4>[ 6.430954] idempotent_init_module+0x134/0x350 <4>[ 6.430965] __x64_sys_finit_module+0x77/0x100 <4>[ 6.430969] x64_sys_call+0x24e3/0x2670 <4>[ 6.430971] do_syscall_64+0x91/0x180 <4>[ 6.430975] ? ext4_llseek+0xc0/0x120 <4>[ 6.430979] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.430983] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.430986] ? do_syscall_64+0x9d/0x180 <4>[ 6.430988] ? __might_fault+0x89/0xb0 <4>[ 6.430990] ? __might_fault+0x53/0xb0 <4>[ 6.430992] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.430997] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.431000] ? switch_fpu_return+0xe0/0x130 <4>[ 6.431004] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.431007] ? do_syscall_64+0x9d/0x180 <4>[ 6.431009] ? exc_page_fault+0xb1/0x300 <4>[ 6.431013] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.431015] RIP: 0033:0x78cf6112725d <4>[ 6.431017] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.431018] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.431020] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.431021] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000026 <4>[ 6.431022] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.431023] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.431023] R13: 0000000000020000 R14: 000057e1920c6170 R15: 000057e1920dd340 <4>[ 6.431034] <5>[ 6.431034] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.431049] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.431051] kmemleak: min_count = 0 <5>[ 6.431053] kmemleak: count = 0 <5>[ 6.431054] kmemleak: flags = 0x1 <5>[ 6.431055] kmemleak: checksum = 0 <5>[ 6.431056] kmemleak: backtrace: <4>[ 6.431057] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.431060] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.431063] execmem_vmalloc+0x5a/0xf0 <4>[ 6.431066] execmem_alloc+0xc2/0x150 <4>[ 6.431069] load_module+0x9db/0x2d10 <4>[ 6.431071] init_module_from_file+0x97/0xe0 <4>[ 6.431073] idempotent_init_module+0x134/0x350 <4>[ 6.431075] __x64_sys_finit_module+0x77/0x100 <4>[ 6.431077] x64_sys_call+0x24e3/0x2670 <4>[ 6.431079] do_syscall_64+0x91/0x180 <4>[ 6.431082] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.431084] kmemleak: Trying to color unknown object at 0xffffffffa046c000 as Grey <4>[ 6.431087] CPU: 5 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.431089] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.431090] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.431091] Call Trace: <4>[ 6.431091] <4>[ 6.431092] dump_stack_lvl+0xc1/0xf0 <4>[ 6.431095] dump_stack+0x10/0x20 <4>[ 6.431097] paint_ptr+0x8d/0xa0 <4>[ 6.431102] kmemleak_not_leak+0x33/0x70 <4>[ 6.431105] load_module+0xa20/0x2d10 <4>[ 6.431118] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.431123] ? kernel_read_file+0x2ac/0x330 <4>[ 6.431130] init_module_from_file+0x97/0xe0 <4>[ 6.431132] ? init_module_from_file+0x97/0xe0 <4>[ 6.431143] idempotent_init_module+0x134/0x350 <4>[ 6.431151] __x64_sys_finit_module+0x77/0x100 <4>[ 6.431154] x64_sys_call+0x24e3/0x2670 <4>[ 6.431155] do_syscall_64+0x91/0x180 <4>[ 6.431158] ? ext4_llseek+0xc0/0x120 <4>[ 6.431161] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.431164] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.431167] ? do_syscall_64+0x9d/0x180 <4>[ 6.431169] ? __might_fault+0x89/0xb0 <4>[ 6.431170] ? __might_fault+0x53/0xb0 <4>[ 6.431172] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.431175] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.431177] ? switch_fpu_return+0xe0/0x130 <4>[ 6.431180] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.431183] ? do_syscall_64+0x9d/0x180 <4>[ 6.431185] ? exc_page_fault+0xb1/0x300 <4>[ 6.431188] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.431190] RIP: 0033:0x78cf6112725d <4>[ 6.431191] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.431192] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.431193] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.431194] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000026 <4>[ 6.431194] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.431195] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.431195] R13: 0000000000020000 R14: 000057e1920c6170 R15: 000057e1920dd340 <4>[ 6.431202] <4>[ 6.431309] kmemleak: Found object by alias at 0xffffffffa046e000 <4>[ 6.431325] CPU: 5 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.431327] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.431327] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.431328] Call Trace: <4>[ 6.431328] <4>[ 6.431329] dump_stack_lvl+0x91/0xf0 <4>[ 6.431332] dump_stack+0x10/0x20 <4>[ 6.431334] __lookup_object+0x90/0xa0 <4>[ 6.431336] __find_and_get_object+0x6c/0x190 <4>[ 6.431340] paint_ptr+0x1b/0xa0 <4>[ 6.431343] kmemleak_not_leak+0x33/0x70 <4>[ 6.431346] load_module+0xa20/0x2d10 <4>[ 6.431356] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.431360] ? kernel_read_file+0x2ac/0x330 <4>[ 6.431366] init_module_from_file+0x97/0xe0 <4>[ 6.431367] ? init_module_from_file+0x97/0xe0 <4>[ 6.431377] idempotent_init_module+0x134/0x350 <4>[ 6.431388] __x64_sys_finit_module+0x77/0x100 <4>[ 6.431392] x64_sys_call+0x24e3/0x2670 <4>[ 6.431394] do_syscall_64+0x91/0x180 <4>[ 6.431398] ? ext4_llseek+0xc0/0x120 <4>[ 6.431401] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.431405] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.431408] ? do_syscall_64+0x9d/0x180 <4>[ 6.431410] ? __might_fault+0x89/0xb0 <4>[ 6.431411] ? __might_fault+0x53/0xb0 <4>[ 6.431414] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.431418] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.431421] ? switch_fpu_return+0xe0/0x130 <4>[ 6.431425] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.431428] ? do_syscall_64+0x9d/0x180 <4>[ 6.431430] ? exc_page_fault+0xb1/0x300 <4>[ 6.431434] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.431436] RIP: 0033:0x78cf6112725d <4>[ 6.431437] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.431438] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.431440] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.431440] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000026 <4>[ 6.431441] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.431442] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.431443] R13: 0000000000020000 R14: 000057e1920c6170 R15: 000057e1920dd340 <4>[ 6.431453] <5>[ 6.431453] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.431468] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.431470] kmemleak: min_count = 0 <5>[ 6.431471] kmemleak: count = 0 <5>[ 6.431472] kmemleak: flags = 0x1 <5>[ 6.431473] kmemleak: checksum = 0 <5>[ 6.431475] kmemleak: backtrace: <4>[ 6.431476] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.431478] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.431481] execmem_vmalloc+0x5a/0xf0 <4>[ 6.431484] execmem_alloc+0xc2/0x150 <4>[ 6.431487] load_module+0x9db/0x2d10 <4>[ 6.431489] init_module_from_file+0x97/0xe0 <4>[ 6.431491] idempotent_init_module+0x134/0x350 <4>[ 6.431493] __x64_sys_finit_module+0x77/0x100 <4>[ 6.431495] x64_sys_call+0x24e3/0x2670 <4>[ 6.431497] do_syscall_64+0x91/0x180 <4>[ 6.431500] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.431502] kmemleak: Trying to color unknown object at 0xffffffffa046e000 as Grey <4>[ 6.431505] CPU: 5 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.431508] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.431508] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.431509] Call Trace: <4>[ 6.431510] <4>[ 6.431511] dump_stack_lvl+0xc1/0xf0 <4>[ 6.431514] dump_stack+0x10/0x20 <4>[ 6.431516] paint_ptr+0x8d/0xa0 <4>[ 6.431520] kmemleak_not_leak+0x33/0x70 <4>[ 6.431523] load_module+0xa20/0x2d10 <4>[ 6.431530] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.431533] ? kernel_read_file+0x2ac/0x330 <4>[ 6.431537] init_module_from_file+0x97/0xe0 <4>[ 6.431538] ? init_module_from_file+0x97/0xe0 <4>[ 6.431550] idempotent_init_module+0x134/0x350 <4>[ 6.431557] __x64_sys_finit_module+0x77/0x100 <4>[ 6.431560] x64_sys_call+0x24e3/0x2670 <4>[ 6.431562] do_syscall_64+0x91/0x180 <4>[ 6.431565] ? ext4_llseek+0xc0/0x120 <4>[ 6.431567] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.431570] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.431573] ? do_syscall_64+0x9d/0x180 <4>[ 6.431575] ? __might_fault+0x89/0xb0 <4>[ 6.431576] ? __might_fault+0x53/0xb0 <4>[ 6.431577] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.431581] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.431583] ? switch_fpu_return+0xe0/0x130 <4>[ 6.431586] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.431589] ? do_syscall_64+0x9d/0x180 <4>[ 6.431590] ? exc_page_fault+0xb1/0x300 <4>[ 6.431593] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.431595] RIP: 0033:0x78cf6112725d <4>[ 6.431596] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.431597] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.431598] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.431599] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000026 <4>[ 6.431599] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.431600] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.431600] R13: 0000000000020000 R14: 000057e1920c6170 R15: 000057e1920dd340 <4>[ 6.431607] <4>[ 6.438886] kmemleak: Found object by alias at 0xffffffffa0440000 <4>[ 6.438892] CPU: 7 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.438896] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.438896] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.438897] Call Trace: <4>[ 6.438898] <4>[ 6.438899] dump_stack_lvl+0x91/0xf0 <4>[ 6.438903] dump_stack+0x10/0x20 <4>[ 6.438905] __lookup_object+0x90/0xa0 <4>[ 6.438909] __find_and_get_object+0x6c/0x190 <4>[ 6.438913] paint_ptr+0x1b/0xa0 <4>[ 6.438916] kmemleak_not_leak+0x33/0x70 <4>[ 6.438919] load_module+0xa20/0x2d10 <4>[ 6.438930] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.438934] ? kernel_read_file+0x2ac/0x330 <4>[ 6.438940] init_module_from_file+0x97/0xe0 <4>[ 6.438941] ? init_module_from_file+0x97/0xe0 <4>[ 6.438952] idempotent_init_module+0x134/0x350 <4>[ 6.438963] __x64_sys_finit_module+0x77/0x100 <4>[ 6.438967] x64_sys_call+0x24e3/0x2670 <4>[ 6.438969] do_syscall_64+0x91/0x180 <4>[ 6.438972] ? __might_fault+0x89/0xb0 <4>[ 6.438974] ? __might_fault+0x53/0xb0 <4>[ 6.438976] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.438981] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.438984] ? switch_fpu_return+0xe0/0x130 <4>[ 6.438988] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.438992] ? do_syscall_64+0x9d/0x180 <4>[ 6.438994] ? irqentry_exit+0x77/0xb0 <4>[ 6.438996] ? exc_page_fault+0xb1/0x300 <4>[ 6.439001] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.439003] RIP: 0033:0x78cf6112725d <4>[ 6.439005] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.439007] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.439008] RAX: ffffffffffffffda RBX: 000057e1920c8a20 RCX: 000078cf6112725d <4>[ 6.439009] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.439010] RBP: 00007ffe24e238e0 R08: 0000000000000007 R09: 00007ffe24e23890 <4>[ 6.439011] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.439012] R13: 0000000000020000 R14: 000057e1920c8cd0 R15: 000057e1920c8fa0 <4>[ 6.439022] <5>[ 6.439022] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.439037] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.439038] kmemleak: min_count = 0 <5>[ 6.439040] kmemleak: count = 0 <5>[ 6.439041] kmemleak: flags = 0x1 <5>[ 6.439042] kmemleak: checksum = 0 <5>[ 6.439044] kmemleak: backtrace: <4>[ 6.439045] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.439048] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.439051] execmem_vmalloc+0x5a/0xf0 <4>[ 6.439054] execmem_alloc+0xc2/0x150 <4>[ 6.439057] load_module+0x9db/0x2d10 <4>[ 6.439059] init_module_from_file+0x97/0xe0 <4>[ 6.439061] idempotent_init_module+0x134/0x350 <4>[ 6.439063] __x64_sys_finit_module+0x77/0x100 <4>[ 6.439065] x64_sys_call+0x24e3/0x2670 <4>[ 6.439067] do_syscall_64+0x91/0x180 <4>[ 6.439070] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.439073] kmemleak: Trying to color unknown object at 0xffffffffa0440000 as Grey <4>[ 6.439075] CPU: 7 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.439078] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.439079] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.439079] Call Trace: <4>[ 6.439080] <4>[ 6.439081] dump_stack_lvl+0xc1/0xf0 <4>[ 6.439084] dump_stack+0x10/0x20 <4>[ 6.439087] paint_ptr+0x8d/0xa0 <4>[ 6.439091] kmemleak_not_leak+0x33/0x70 <4>[ 6.439095] load_module+0xa20/0x2d10 <4>[ 6.439108] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.439113] ? kernel_read_file+0x2ac/0x330 <4>[ 6.439120] init_module_from_file+0x97/0xe0 <4>[ 6.439122] ? init_module_from_file+0x97/0xe0 <4>[ 6.439136] idempotent_init_module+0x134/0x350 <4>[ 6.439150] __x64_sys_finit_module+0x77/0x100 <4>[ 6.439155] x64_sys_call+0x24e3/0x2670 <4>[ 6.439158] do_syscall_64+0x91/0x180 <4>[ 6.439161] ? __might_fault+0x89/0xb0 <4>[ 6.439162] ? __might_fault+0x53/0xb0 <4>[ 6.439165] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.439171] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.439174] ? switch_fpu_return+0xe0/0x130 <4>[ 6.439179] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.439184] ? do_syscall_64+0x9d/0x180 <4>[ 6.439187] ? irqentry_exit+0x77/0xb0 <4>[ 6.439190] ? exc_page_fault+0xb1/0x300 <4>[ 6.439196] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.439198] RIP: 0033:0x78cf6112725d <4>[ 6.439200] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.439202] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.439203] RAX: ffffffffffffffda RBX: 000057e1920c8a20 RCX: 000078cf6112725d <4>[ 6.439205] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.439206] RBP: 00007ffe24e238e0 R08: 0000000000000007 R09: 00007ffe24e23890 <4>[ 6.439207] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.439208] R13: 0000000000020000 R14: 000057e1920c8cd0 R15: 000057e1920c8fa0 <4>[ 6.439221] <4>[ 6.439325] kmemleak: Found object by alias at 0xffffffffa046f000 <4>[ 6.439340] CPU: 7 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.439342] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.439342] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.439343] Call Trace: <4>[ 6.439344] <4>[ 6.439345] dump_stack_lvl+0x91/0xf0 <4>[ 6.439347] dump_stack+0x10/0x20 <4>[ 6.439349] __lookup_object+0x90/0xa0 <4>[ 6.439352] __find_and_get_object+0x6c/0x190 <4>[ 6.439356] paint_ptr+0x1b/0xa0 <4>[ 6.439359] kmemleak_not_leak+0x33/0x70 <4>[ 6.439361] load_module+0xa20/0x2d10 <4>[ 6.439372] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.439376] ? kernel_read_file+0x2ac/0x330 <4>[ 6.439381] init_module_from_file+0x97/0xe0 <4>[ 6.439383] ? init_module_from_file+0x97/0xe0 <4>[ 6.439393] idempotent_init_module+0x134/0x350 <4>[ 6.439404] __x64_sys_finit_module+0x77/0x100 <4>[ 6.439408] x64_sys_call+0x24e3/0x2670 <4>[ 6.439410] do_syscall_64+0x91/0x180 <4>[ 6.439412] ? __might_fault+0x89/0xb0 <4>[ 6.439413] ? __might_fault+0x53/0xb0 <4>[ 6.439415] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.439420] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.439423] ? switch_fpu_return+0xe0/0x130 <4>[ 6.439426] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.439430] ? do_syscall_64+0x9d/0x180 <4>[ 6.439432] ? irqentry_exit+0x77/0xb0 <4>[ 6.439435] ? exc_page_fault+0xb1/0x300 <4>[ 6.439439] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.439441] RIP: 0033:0x78cf6112725d <4>[ 6.439442] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.439443] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.439445] RAX: ffffffffffffffda RBX: 000057e1920c8a20 RCX: 000078cf6112725d <4>[ 6.439445] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.439446] RBP: 00007ffe24e238e0 R08: 0000000000000007 R09: 00007ffe24e23890 <4>[ 6.439447] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.439448] R13: 0000000000020000 R14: 000057e1920c8cd0 R15: 000057e1920c8fa0 <4>[ 6.439458] <5>[ 6.439458] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.439472] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.439474] kmemleak: min_count = 0 <5>[ 6.439475] kmemleak: count = 0 <5>[ 6.439476] kmemleak: flags = 0x1 <5>[ 6.439478] kmemleak: checksum = 0 <5>[ 6.439479] kmemleak: backtrace: <4>[ 6.439480] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.439483] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.439486] execmem_vmalloc+0x5a/0xf0 <4>[ 6.439488] execmem_alloc+0xc2/0x150 <4>[ 6.439491] load_module+0x9db/0x2d10 <4>[ 6.439493] init_module_from_file+0x97/0xe0 <4>[ 6.439495] idempotent_init_module+0x134/0x350 <4>[ 6.439497] __x64_sys_finit_module+0x77/0x100 <4>[ 6.439499] x64_sys_call+0x24e3/0x2670 <4>[ 6.439501] do_syscall_64+0x91/0x180 <4>[ 6.439504] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.439507] kmemleak: Trying to color unknown object at 0xffffffffa046f000 as Grey <4>[ 6.439510] CPU: 7 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.439512] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.439513] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.439513] Call Trace: <4>[ 6.439514] <4>[ 6.439515] dump_stack_lvl+0xc1/0xf0 <4>[ 6.439518] dump_stack+0x10/0x20 <4>[ 6.439520] paint_ptr+0x8d/0xa0 <4>[ 6.439525] kmemleak_not_leak+0x33/0x70 <4>[ 6.439528] load_module+0xa20/0x2d10 <4>[ 6.439542] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.439547] ? kernel_read_file+0x2ac/0x330 <4>[ 6.439554] init_module_from_file+0x97/0xe0 <4>[ 6.439556] ? init_module_from_file+0x97/0xe0 <4>[ 6.439570] idempotent_init_module+0x134/0x350 <4>[ 6.439580] __x64_sys_finit_module+0x77/0x100 <4>[ 6.439583] x64_sys_call+0x24e3/0x2670 <4>[ 6.439585] do_syscall_64+0x91/0x180 <4>[ 6.439587] ? __might_fault+0x89/0xb0 <4>[ 6.439588] ? __might_fault+0x53/0xb0 <4>[ 6.439591] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.439597] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.439601] ? switch_fpu_return+0xe0/0x130 <4>[ 6.439605] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.439610] ? do_syscall_64+0x9d/0x180 <4>[ 6.439613] ? irqentry_exit+0x77/0xb0 <4>[ 6.439616] ? exc_page_fault+0xb1/0x300 <4>[ 6.439622] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.439624] RIP: 0033:0x78cf6112725d <4>[ 6.439626] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.439627] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.439629] RAX: ffffffffffffffda RBX: 000057e1920c8a20 RCX: 000078cf6112725d <4>[ 6.439630] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.439631] RBP: 00007ffe24e238e0 R08: 0000000000000007 R09: 00007ffe24e23890 <4>[ 6.439632] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.439633] R13: 0000000000020000 R14: 000057e1920c8cd0 R15: 000057e1920c8fa0 <4>[ 6.439646] <4>[ 6.443754] kmemleak: Found object by alias at 0xffffffffa0470000 <4>[ 6.443758] CPU: 0 UID: 0 PID: 354 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.443761] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.443761] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.443762] Call Trace: <4>[ 6.443763] <4>[ 6.443764] dump_stack_lvl+0x91/0xf0 <4>[ 6.443767] dump_stack+0x10/0x20 <4>[ 6.443769] __lookup_object+0x90/0xa0 <4>[ 6.443772] __find_and_get_object+0x6c/0x190 <4>[ 6.443776] paint_ptr+0x1b/0xa0 <4>[ 6.443778] kmemleak_not_leak+0x33/0x70 <4>[ 6.443781] load_module+0xa20/0x2d10 <4>[ 6.443789] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.443793] ? kernel_read_file+0x2ac/0x330 <4>[ 6.443798] init_module_from_file+0x97/0xe0 <4>[ 6.443799] ? init_module_from_file+0x97/0xe0 <4>[ 6.443807] idempotent_init_module+0x134/0x350 <4>[ 6.443815] __x64_sys_finit_module+0x77/0x100 <4>[ 6.443818] x64_sys_call+0x24e3/0x2670 <4>[ 6.443821] do_syscall_64+0x91/0x180 <4>[ 6.443826] ? ext4_llseek+0xc0/0x120 <4>[ 6.443829] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.443833] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.443836] ? do_syscall_64+0x9d/0x180 <4>[ 6.443839] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.443842] ? irqentry_exit+0x77/0xb0 <4>[ 6.443844] ? sysvec_reschedule_ipi+0xbd/0x220 <4>[ 6.443847] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.443849] RIP: 0033:0x78cf6112725d <4>[ 6.443851] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.443852] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.443854] RAX: ffffffffffffffda RBX: 000057e1920e0320 RCX: 000078cf6112725d <4>[ 6.443855] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002d <4>[ 6.443855] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.443856] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.443857] R13: 0000000000020000 R14: 000057e1920de340 R15: 000057e1920e1ea0 <4>[ 6.443864] <5>[ 6.443865] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.443876] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.443878] kmemleak: min_count = 0 <5>[ 6.443879] kmemleak: count = 0 <5>[ 6.443880] kmemleak: flags = 0x1 <5>[ 6.443881] kmemleak: checksum = 0 <5>[ 6.443882] kmemleak: backtrace: <4>[ 6.443884] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.443886] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.443889] execmem_vmalloc+0x5a/0xf0 <4>[ 6.443892] execmem_alloc+0xc2/0x150 <4>[ 6.443894] load_module+0x9db/0x2d10 <4>[ 6.443896] init_module_from_file+0x97/0xe0 <4>[ 6.443898] idempotent_init_module+0x134/0x350 <4>[ 6.443900] __x64_sys_finit_module+0x77/0x100 <4>[ 6.443902] x64_sys_call+0x24e3/0x2670 <4>[ 6.443904] do_syscall_64+0x91/0x180 <4>[ 6.443906] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.443909] kmemleak: Trying to color unknown object at 0xffffffffa0470000 as Grey <4>[ 6.443911] CPU: 0 UID: 0 PID: 354 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.443913] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.443913] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.443913] Call Trace: <4>[ 6.443914] <4>[ 6.443915] dump_stack_lvl+0xc1/0xf0 <4>[ 6.443917] dump_stack+0x10/0x20 <4>[ 6.443918] paint_ptr+0x8d/0xa0 <4>[ 6.443921] kmemleak_not_leak+0x33/0x70 <4>[ 6.443923] load_module+0xa20/0x2d10 <4>[ 6.443930] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.443933] ? kernel_read_file+0x2ac/0x330 <4>[ 6.443937] init_module_from_file+0x97/0xe0 <4>[ 6.443938] ? init_module_from_file+0x97/0xe0 <4>[ 6.443945] idempotent_init_module+0x134/0x350 <4>[ 6.443952] __x64_sys_finit_module+0x77/0x100 <4>[ 6.443955] x64_sys_call+0x24e3/0x2670 <4>[ 6.443957] do_syscall_64+0x91/0x180 <4>[ 6.443961] ? ext4_llseek+0xc0/0x120 <4>[ 6.443964] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.443966] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.443969] ? do_syscall_64+0x9d/0x180 <4>[ 6.443972] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.443975] ? irqentry_exit+0x77/0xb0 <4>[ 6.443977] ? sysvec_reschedule_ipi+0xbd/0x220 <4>[ 6.443980] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.443982] RIP: 0033:0x78cf6112725d <4>[ 6.443983] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.443984] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.443985] RAX: ffffffffffffffda RBX: 000057e1920e0320 RCX: 000078cf6112725d <4>[ 6.443985] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002d <4>[ 6.443986] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.443986] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.443987] R13: 0000000000020000 R14: 000057e1920de340 R15: 000057e1920e1ea0 <4>[ 6.443996] <4>[ 6.444213] kmemleak: Found object by alias at 0xffffffffa0477000 <4>[ 6.444229] CPU: 0 UID: 0 PID: 354 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.444231] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.444232] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.444233] Call Trace: <4>[ 6.444233] <4>[ 6.444234] dump_stack_lvl+0x91/0xf0 <4>[ 6.444237] dump_stack+0x10/0x20 <4>[ 6.444239] __lookup_object+0x90/0xa0 <4>[ 6.444241] __find_and_get_object+0x6c/0x190 <4>[ 6.444245] paint_ptr+0x1b/0xa0 <4>[ 6.444248] kmemleak_not_leak+0x33/0x70 <4>[ 6.444251] load_module+0xa20/0x2d10 <4>[ 6.444261] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.444266] ? kernel_read_file+0x2ac/0x330 <4>[ 6.444271] init_module_from_file+0x97/0xe0 <4>[ 6.444273] ? init_module_from_file+0x97/0xe0 <4>[ 6.444283] idempotent_init_module+0x134/0x350 <4>[ 6.444294] __x64_sys_finit_module+0x77/0x100 <4>[ 6.444298] x64_sys_call+0x24e3/0x2670 <4>[ 6.444300] do_syscall_64+0x91/0x180 <4>[ 6.444306] ? ext4_llseek+0xc0/0x120 <4>[ 6.444310] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.444313] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.444317] ? do_syscall_64+0x9d/0x180 <4>[ 6.444320] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.444324] ? irqentry_exit+0x77/0xb0 <4>[ 6.444326] ? sysvec_reschedule_ipi+0xbd/0x220 <4>[ 6.444330] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.444332] RIP: 0033:0x78cf6112725d <4>[ 6.444334] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.444335] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.444336] RAX: ffffffffffffffda RBX: 000057e1920e0320 RCX: 000078cf6112725d <4>[ 6.444337] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002d <4>[ 6.444338] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.444339] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.444339] R13: 0000000000020000 R14: 000057e1920de340 R15: 000057e1920e1ea0 <4>[ 6.444350] <5>[ 6.444350] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.444363] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.444365] kmemleak: min_count = 0 <5>[ 6.444367] kmemleak: count = 0 <5>[ 6.444368] kmemleak: flags = 0x1 <5>[ 6.444369] kmemleak: checksum = 0 <5>[ 6.444370] kmemleak: backtrace: <4>[ 6.444371] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.444374] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.444377] execmem_vmalloc+0x5a/0xf0 <4>[ 6.444380] execmem_alloc+0xc2/0x150 <4>[ 6.444383] load_module+0x9db/0x2d10 <4>[ 6.444384] init_module_from_file+0x97/0xe0 <4>[ 6.444386] idempotent_init_module+0x134/0x350 <4>[ 6.444388] __x64_sys_finit_module+0x77/0x100 <4>[ 6.444391] x64_sys_call+0x24e3/0x2670 <4>[ 6.444393] do_syscall_64+0x91/0x180 <4>[ 6.444395] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.444398] kmemleak: Trying to color unknown object at 0xffffffffa0477000 as Grey <4>[ 6.444401] CPU: 0 UID: 0 PID: 354 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.444404] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.444404] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.444405] Call Trace: <4>[ 6.444405] <4>[ 6.444406] dump_stack_lvl+0xc1/0xf0 <4>[ 6.444410] dump_stack+0x10/0x20 <4>[ 6.444412] paint_ptr+0x8d/0xa0 <4>[ 6.444417] kmemleak_not_leak+0x33/0x70 <4>[ 6.444420] load_module+0xa20/0x2d10 <4>[ 6.444434] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.444439] ? kernel_read_file+0x2ac/0x330 <4>[ 6.444446] init_module_from_file+0x97/0xe0 <4>[ 6.444448] ? init_module_from_file+0x97/0xe0 <4>[ 6.444463] idempotent_init_module+0x134/0x350 <4>[ 6.444478] __x64_sys_finit_module+0x77/0x100 <4>[ 6.444483] x64_sys_call+0x24e3/0x2670 <4>[ 6.444486] do_syscall_64+0x91/0x180 <4>[ 6.444494] ? ext4_llseek+0xc0/0x120 <4>[ 6.444499] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.444503] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.444508] ? do_syscall_64+0x9d/0x180 <4>[ 6.444512] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.444517] ? irqentry_exit+0x77/0xb0 <4>[ 6.444520] ? sysvec_reschedule_ipi+0xbd/0x220 <4>[ 6.444525] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.444528] RIP: 0033:0x78cf6112725d <4>[ 6.444530] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.444531] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.444533] RAX: ffffffffffffffda RBX: 000057e1920e0320 RCX: 000078cf6112725d <4>[ 6.444534] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002d <4>[ 6.444535] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.444536] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.444537] R13: 0000000000020000 R14: 000057e1920de340 R15: 000057e1920e1ea0 <4>[ 6.444550] <6>[ 6.449129] ipmi device interface <4>[ 6.452274] kmemleak: Found object by alias at 0xffffffffa0478000 <4>[ 6.452278] CPU: 2 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.452281] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.452282] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.452282] Call Trace: <4>[ 6.452283] <4>[ 6.452284] dump_stack_lvl+0x91/0xf0 <4>[ 6.452287] dump_stack+0x10/0x20 <4>[ 6.452289] __lookup_object+0x90/0xa0 <4>[ 6.452293] __find_and_get_object+0x6c/0x190 <4>[ 6.452296] paint_ptr+0x1b/0xa0 <4>[ 6.452299] kmemleak_not_leak+0x33/0x70 <4>[ 6.452302] load_module+0xa20/0x2d10 <4>[ 6.452310] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.452314] ? kernel_read_file+0x2ac/0x330 <4>[ 6.452319] init_module_from_file+0x97/0xe0 <4>[ 6.452320] ? init_module_from_file+0x97/0xe0 <4>[ 6.452328] idempotent_init_module+0x134/0x350 <4>[ 6.452336] __x64_sys_finit_module+0x77/0x100 <4>[ 6.452339] x64_sys_call+0x24e3/0x2670 <4>[ 6.452342] do_syscall_64+0x91/0x180 <4>[ 6.452345] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.452348] ? switch_fpu_return+0xe0/0x130 <4>[ 6.452351] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452355] ? do_syscall_64+0x9d/0x180 <4>[ 6.452360] ? putname+0x60/0x80 <4>[ 6.452362] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.452367] ? putname+0x60/0x80 <4>[ 6.452370] ? __seccomp_filter+0x379/0x580 <4>[ 6.452375] ? ext4_llseek+0xc0/0x120 <4>[ 6.452378] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.452381] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452384] ? do_syscall_64+0x9d/0x180 <4>[ 6.452387] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.452390] ? switch_fpu_return+0xe0/0x130 <4>[ 6.452393] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452396] ? do_syscall_64+0x9d/0x180 <4>[ 6.452397] ? exc_page_fault+0xb1/0x300 <4>[ 6.452401] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.452403] RIP: 0033:0x78cf6112725d <4>[ 6.452405] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.452406] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.452407] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.452408] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000027 <4>[ 6.452409] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.452410] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.452410] R13: 0000000000020000 R14: 000057e1920d9230 R15: 000057e1920dd380 <4>[ 6.452418] <5>[ 6.452419] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.452432] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.452434] kmemleak: min_count = 0 <5>[ 6.452435] kmemleak: count = 0 <5>[ 6.452436] kmemleak: flags = 0x1 <5>[ 6.452437] kmemleak: checksum = 0 <5>[ 6.452439] kmemleak: backtrace: <4>[ 6.452440] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.452443] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.452445] execmem_vmalloc+0x5a/0xf0 <4>[ 6.452448] execmem_alloc+0xc2/0x150 <4>[ 6.452451] load_module+0x9db/0x2d10 <4>[ 6.452452] init_module_from_file+0x97/0xe0 <4>[ 6.452454] idempotent_init_module+0x134/0x350 <4>[ 6.452456] __x64_sys_finit_module+0x77/0x100 <4>[ 6.452458] x64_sys_call+0x24e3/0x2670 <4>[ 6.452460] do_syscall_64+0x91/0x180 <4>[ 6.452462] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.452465] kmemleak: Trying to color unknown object at 0xffffffffa0478000 as Grey <4>[ 6.452467] CPU: 2 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.452469] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.452469] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.452470] Call Trace: <4>[ 6.452470] <4>[ 6.452471] dump_stack_lvl+0xc1/0xf0 <4>[ 6.452473] dump_stack+0x10/0x20 <4>[ 6.452474] paint_ptr+0x8d/0xa0 <4>[ 6.452477] kmemleak_not_leak+0x33/0x70 <4>[ 6.452479] load_module+0xa20/0x2d10 <4>[ 6.452486] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.452489] ? kernel_read_file+0x2ac/0x330 <4>[ 6.452493] init_module_from_file+0x97/0xe0 <4>[ 6.452494] ? init_module_from_file+0x97/0xe0 <4>[ 6.452501] idempotent_init_module+0x134/0x350 <4>[ 6.452509] __x64_sys_finit_module+0x77/0x100 <4>[ 6.452511] x64_sys_call+0x24e3/0x2670 <4>[ 6.452513] do_syscall_64+0x91/0x180 <4>[ 6.452516] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.452518] ? switch_fpu_return+0xe0/0x130 <4>[ 6.452521] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452524] ? do_syscall_64+0x9d/0x180 <4>[ 6.452529] ? putname+0x60/0x80 <4>[ 6.452531] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.452535] ? putname+0x60/0x80 <4>[ 6.452537] ? __seccomp_filter+0x379/0x580 <4>[ 6.452544] ? ext4_llseek+0xc0/0x120 <4>[ 6.452547] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.452550] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452553] ? do_syscall_64+0x9d/0x180 <4>[ 6.452555] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.452558] ? switch_fpu_return+0xe0/0x130 <4>[ 6.452560] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452563] ? do_syscall_64+0x9d/0x180 <4>[ 6.452565] ? exc_page_fault+0xb1/0x300 <4>[ 6.452568] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.452570] RIP: 0033:0x78cf6112725d <4>[ 6.452571] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.452572] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.452573] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.452574] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000027 <4>[ 6.452574] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.452575] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.452575] R13: 0000000000020000 R14: 000057e1920d9230 R15: 000057e1920dd380 <4>[ 6.452582] <4>[ 6.452717] kmemleak: Found object by alias at 0xffffffffa044d000 <4>[ 6.452719] CPU: 2 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.452721] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.452721] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.452722] Call Trace: <4>[ 6.452722] <4>[ 6.452723] dump_stack_lvl+0x91/0xf0 <4>[ 6.452725] dump_stack+0x10/0x20 <4>[ 6.452727] __lookup_object+0x90/0xa0 <4>[ 6.452729] __find_and_get_object+0x6c/0x190 <4>[ 6.452732] paint_ptr+0x1b/0xa0 <4>[ 6.452735] kmemleak_not_leak+0x33/0x70 <4>[ 6.452738] load_module+0xa20/0x2d10 <4>[ 6.452746] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.452749] ? kernel_read_file+0x2ac/0x330 <4>[ 6.452753] init_module_from_file+0x97/0xe0 <4>[ 6.452754] ? init_module_from_file+0x97/0xe0 <4>[ 6.452762] idempotent_init_module+0x134/0x350 <4>[ 6.452771] __x64_sys_finit_module+0x77/0x100 <4>[ 6.452774] x64_sys_call+0x24e3/0x2670 <4>[ 6.452776] do_syscall_64+0x91/0x180 <4>[ 6.452779] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.452781] ? switch_fpu_return+0xe0/0x130 <4>[ 6.452784] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452788] ? do_syscall_64+0x9d/0x180 <4>[ 6.452793] ? putname+0x60/0x80 <4>[ 6.452795] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.452800] ? putname+0x60/0x80 <4>[ 6.452802] ? __seccomp_filter+0x379/0x580 <4>[ 6.452807] ? ext4_llseek+0xc0/0x120 <4>[ 6.452809] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.452812] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452816] ? do_syscall_64+0x9d/0x180 <4>[ 6.452819] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.452821] ? switch_fpu_return+0xe0/0x130 <4>[ 6.452824] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452827] ? do_syscall_64+0x9d/0x180 <4>[ 6.452828] ? exc_page_fault+0xb1/0x300 <4>[ 6.452832] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.452834] RIP: 0033:0x78cf6112725d <4>[ 6.452835] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.452836] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.452837] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.452837] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000027 <4>[ 6.452838] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.452839] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.452839] R13: 0000000000020000 R14: 000057e1920d9230 R15: 000057e1920dd380 <4>[ 6.452847] <5>[ 6.452847] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.452860] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.452862] kmemleak: min_count = 0 <5>[ 6.452863] kmemleak: count = 0 <5>[ 6.452864] kmemleak: flags = 0x1 <5>[ 6.452865] kmemleak: checksum = 0 <5>[ 6.452866] kmemleak: backtrace: <4>[ 6.452868] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.452870] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.452873] execmem_vmalloc+0x5a/0xf0 <4>[ 6.452875] execmem_alloc+0xc2/0x150 <4>[ 6.452878] load_module+0x9db/0x2d10 <4>[ 6.452879] init_module_from_file+0x97/0xe0 <4>[ 6.452881] idempotent_init_module+0x134/0x350 <4>[ 6.452883] __x64_sys_finit_module+0x77/0x100 <4>[ 6.452885] x64_sys_call+0x24e3/0x2670 <4>[ 6.452887] do_syscall_64+0x91/0x180 <4>[ 6.452889] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.452892] kmemleak: Trying to color unknown object at 0xffffffffa044d000 as Grey <4>[ 6.452894] CPU: 2 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.452895] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.452895] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.452896] Call Trace: <4>[ 6.452896] <4>[ 6.452897] dump_stack_lvl+0xc1/0xf0 <4>[ 6.452899] dump_stack+0x10/0x20 <4>[ 6.452900] paint_ptr+0x8d/0xa0 <4>[ 6.452903] kmemleak_not_leak+0x33/0x70 <4>[ 6.452905] load_module+0xa20/0x2d10 <4>[ 6.452912] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.452915] ? kernel_read_file+0x2ac/0x330 <4>[ 6.452919] init_module_from_file+0x97/0xe0 <4>[ 6.452920] ? init_module_from_file+0x97/0xe0 <4>[ 6.452927] idempotent_init_module+0x134/0x350 <4>[ 6.452935] __x64_sys_finit_module+0x77/0x100 <4>[ 6.452937] x64_sys_call+0x24e3/0x2670 <4>[ 6.452939] do_syscall_64+0x91/0x180 <4>[ 6.452942] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.452944] ? switch_fpu_return+0xe0/0x130 <4>[ 6.452947] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452950] ? do_syscall_64+0x9d/0x180 <4>[ 6.452955] ? putname+0x60/0x80 <4>[ 6.452957] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.452961] ? putname+0x60/0x80 <4>[ 6.452963] ? __seccomp_filter+0x379/0x580 <4>[ 6.452967] ? ext4_llseek+0xc0/0x120 <4>[ 6.452969] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.452972] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452975] ? do_syscall_64+0x9d/0x180 <4>[ 6.452978] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.452980] ? switch_fpu_return+0xe0/0x130 <4>[ 6.452982] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.452985] ? do_syscall_64+0x9d/0x180 <4>[ 6.452987] ? exc_page_fault+0xb1/0x300 <4>[ 6.452990] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.452992] RIP: 0033:0x78cf6112725d <4>[ 6.452993] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.452993] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.452994] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.452995] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000027 <4>[ 6.452995] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.452996] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.452997] R13: 0000000000020000 R14: 000057e1920d9230 R15: 000057e1920dd380 <4>[ 6.453003] <4>[ 6.454855] kmemleak: Found object by alias at 0xffffffffa047a000 <4>[ 6.454858] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.454861] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.454861] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.454862] Call Trace: <4>[ 6.454862] <4>[ 6.454863] dump_stack_lvl+0x91/0xf0 <4>[ 6.454866] dump_stack+0x10/0x20 <4>[ 6.454868] __lookup_object+0x90/0xa0 <4>[ 6.454871] __find_and_get_object+0x6c/0x190 <4>[ 6.454875] paint_ptr+0x1b/0xa0 <4>[ 6.454878] kmemleak_not_leak+0x33/0x70 <4>[ 6.454880] load_module+0xa20/0x2d10 <4>[ 6.454888] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.454892] ? kernel_read_file+0x2ac/0x330 <4>[ 6.454896] init_module_from_file+0x97/0xe0 <4>[ 6.454898] ? init_module_from_file+0x97/0xe0 <4>[ 6.454905] idempotent_init_module+0x134/0x350 <4>[ 6.454914] __x64_sys_finit_module+0x77/0x100 <4>[ 6.454917] x64_sys_call+0x24e3/0x2670 <4>[ 6.454919] do_syscall_64+0x91/0x180 <4>[ 6.454922] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.454925] ? do_syscall_64+0x9d/0x180 <4>[ 6.454928] ? putname+0x60/0x80 <4>[ 6.454930] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.454935] ? putname+0x60/0x80 <4>[ 6.454937] ? do_sys_openat2+0xab/0xf0 <4>[ 6.454941] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.454944] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.454948] ? do_syscall_64+0x9d/0x180 <4>[ 6.454949] ? exc_page_fault+0xb1/0x300 <4>[ 6.454953] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.454955] RIP: 0033:0x78cf6112725d <4>[ 6.454956] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.454957] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.454959] RAX: ffffffffffffffda RBX: 000057e1920c41a0 RCX: 000078cf6112725d <4>[ 6.454960] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.454961] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.454961] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.454962] R13: 0000000000020000 R14: 000057e1920c6440 R15: 000057e1920c7250 <4>[ 6.454970] <5>[ 6.454970] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.454982] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.454984] kmemleak: min_count = 0 <5>[ 6.454985] kmemleak: count = 0 <5>[ 6.454986] kmemleak: flags = 0x1 <5>[ 6.454987] kmemleak: checksum = 0 <5>[ 6.454988] kmemleak: backtrace: <4>[ 6.454989] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.454992] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.454995] execmem_vmalloc+0x5a/0xf0 <4>[ 6.454997] execmem_alloc+0xc2/0x150 <4>[ 6.455000] load_module+0x9db/0x2d10 <4>[ 6.455002] init_module_from_file+0x97/0xe0 <4>[ 6.455003] idempotent_init_module+0x134/0x350 <4>[ 6.455005] __x64_sys_finit_module+0x77/0x100 <4>[ 6.455007] x64_sys_call+0x24e3/0x2670 <4>[ 6.455009] do_syscall_64+0x91/0x180 <4>[ 6.455012] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.455014] kmemleak: Trying to color unknown object at 0xffffffffa047a000 as Grey <4>[ 6.455016] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.455018] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.455018] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.455019] Call Trace: <4>[ 6.455019] <4>[ 6.455020] dump_stack_lvl+0xc1/0xf0 <4>[ 6.455022] dump_stack+0x10/0x20 <4>[ 6.455024] paint_ptr+0x8d/0xa0 <4>[ 6.455027] kmemleak_not_leak+0x33/0x70 <4>[ 6.455029] load_module+0xa20/0x2d10 <4>[ 6.455035] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.455039] ? kernel_read_file+0x2ac/0x330 <4>[ 6.455042] init_module_from_file+0x97/0xe0 <4>[ 6.455044] ? init_module_from_file+0x97/0xe0 <4>[ 6.455051] idempotent_init_module+0x134/0x350 <4>[ 6.455058] __x64_sys_finit_module+0x77/0x100 <4>[ 6.455061] x64_sys_call+0x24e3/0x2670 <4>[ 6.455063] do_syscall_64+0x91/0x180 <4>[ 6.455065] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.455068] ? do_syscall_64+0x9d/0x180 <4>[ 6.455072] ? putname+0x60/0x80 <4>[ 6.455075] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.455082] ? putname+0x60/0x80 <4>[ 6.455085] ? do_sys_openat2+0xab/0xf0 <4>[ 6.455092] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.455096] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.455101] ? do_syscall_64+0x9d/0x180 <4>[ 6.455103] ? exc_page_fault+0xb1/0x300 <4>[ 6.455109] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.455111] RIP: 0033:0x78cf6112725d <4>[ 6.455113] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.455114] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.455116] RAX: ffffffffffffffda RBX: 000057e1920c41a0 RCX: 000078cf6112725d <4>[ 6.455117] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.455118] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.455119] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.455120] R13: 0000000000020000 R14: 000057e1920c6440 R15: 000057e1920c7250 <4>[ 6.455134] <4>[ 6.455254] kmemleak: Found object by alias at 0xffffffffa0453000 <4>[ 6.455266] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.455268] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.455268] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.455269] Call Trace: <4>[ 6.455269] <4>[ 6.455270] dump_stack_lvl+0x91/0xf0 <4>[ 6.455273] dump_stack+0x10/0x20 <4>[ 6.455274] __lookup_object+0x90/0xa0 <4>[ 6.455277] __find_and_get_object+0x6c/0x190 <4>[ 6.455280] paint_ptr+0x1b/0xa0 <4>[ 6.455283] kmemleak_not_leak+0x33/0x70 <4>[ 6.455285] load_module+0xa20/0x2d10 <4>[ 6.455293] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.455297] ? kernel_read_file+0x2ac/0x330 <4>[ 6.455301] init_module_from_file+0x97/0xe0 <4>[ 6.455302] ? init_module_from_file+0x97/0xe0 <4>[ 6.455310] idempotent_init_module+0x134/0x350 <4>[ 6.455318] __x64_sys_finit_module+0x77/0x100 <4>[ 6.455321] x64_sys_call+0x24e3/0x2670 <4>[ 6.455323] do_syscall_64+0x91/0x180 <4>[ 6.455326] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.455330] ? do_syscall_64+0x9d/0x180 <4>[ 6.455332] ? putname+0x60/0x80 <4>[ 6.455334] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.455339] ? putname+0x60/0x80 <4>[ 6.455340] ? do_sys_openat2+0xab/0xf0 <4>[ 6.455345] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.455348] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.455351] ? do_syscall_64+0x9d/0x180 <4>[ 6.455352] ? exc_page_fault+0xb1/0x300 <4>[ 6.455356] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.455358] RIP: 0033:0x78cf6112725d <4>[ 6.455359] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.455360] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.455361] RAX: ffffffffffffffda RBX: 000057e1920c41a0 RCX: 000078cf6112725d <4>[ 6.455362] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.455362] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.455363] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.455363] R13: 0000000000020000 R14: 000057e1920c6440 R15: 000057e1920c7250 <4>[ 6.455371] <5>[ 6.455372] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.455383] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.455385] kmemleak: min_count = 0 <5>[ 6.455386] kmemleak: count = 0 <5>[ 6.455387] kmemleak: flags = 0x1 <5>[ 6.455388] kmemleak: checksum = 0 <5>[ 6.455389] kmemleak: backtrace: <4>[ 6.455390] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.455393] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.455395] execmem_vmalloc+0x5a/0xf0 <4>[ 6.455398] execmem_alloc+0xc2/0x150 <4>[ 6.455400] load_module+0x9db/0x2d10 <4>[ 6.455402] init_module_from_file+0x97/0xe0 <4>[ 6.455404] idempotent_init_module+0x134/0x350 <4>[ 6.455406] __x64_sys_finit_module+0x77/0x100 <4>[ 6.455408] x64_sys_call+0x24e3/0x2670 <4>[ 6.455410] do_syscall_64+0x91/0x180 <4>[ 6.455412] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.455415] kmemleak: Trying to color unknown object at 0xffffffffa0453000 as Grey <4>[ 6.455417] CPU: 5 UID: 0 PID: 312 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.455418] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.455418] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.455419] Call Trace: <4>[ 6.455419] <4>[ 6.455420] dump_stack_lvl+0xc1/0xf0 <4>[ 6.455422] dump_stack+0x10/0x20 <4>[ 6.455424] paint_ptr+0x8d/0xa0 <4>[ 6.455426] kmemleak_not_leak+0x33/0x70 <4>[ 6.455428] load_module+0xa20/0x2d10 <4>[ 6.455435] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.455438] ? kernel_read_file+0x2ac/0x330 <4>[ 6.455442] init_module_from_file+0x97/0xe0 <4>[ 6.455443] ? init_module_from_file+0x97/0xe0 <4>[ 6.455450] idempotent_init_module+0x134/0x350 <4>[ 6.455458] __x64_sys_finit_module+0x77/0x100 <4>[ 6.455460] x64_sys_call+0x24e3/0x2670 <4>[ 6.455462] do_syscall_64+0x91/0x180 <4>[ 6.455465] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.455468] ? do_syscall_64+0x9d/0x180 <4>[ 6.455470] ? putname+0x60/0x80 <4>[ 6.455472] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.455476] ? putname+0x60/0x80 <4>[ 6.455478] ? do_sys_openat2+0xab/0xf0 <4>[ 6.455482] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.455485] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.455487] ? do_syscall_64+0x9d/0x180 <4>[ 6.455489] ? exc_page_fault+0xb1/0x300 <4>[ 6.455492] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.455494] RIP: 0033:0x78cf6112725d <4>[ 6.455495] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.455496] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.455497] RAX: ffffffffffffffda RBX: 000057e1920c41a0 RCX: 000078cf6112725d <4>[ 6.455497] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.455498] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.455498] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.455499] R13: 0000000000020000 R14: 000057e1920c6440 R15: 000057e1920c7250 <4>[ 6.455506] <6>[ 6.459253] mei_me 0000:00:16.0: Device doesn't have valid ME Interface <6>[ 6.459254] mei_me 0000:00:16.1: Device doesn't have valid ME Interface <4>[ 6.486613] kmemleak: Found object by alias at 0xffffffffa0456000 <4>[ 6.486618] CPU: 3 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.486620] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.486621] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.486622] Call Trace: <4>[ 6.486623] <4>[ 6.486624] dump_stack_lvl+0x91/0xf0 <4>[ 6.486628] dump_stack+0x10/0x20 <4>[ 6.486630] __lookup_object+0x90/0xa0 <4>[ 6.486633] __find_and_get_object+0x6c/0x190 <4>[ 6.486637] paint_ptr+0x1b/0xa0 <4>[ 6.486640] kmemleak_not_leak+0x33/0x70 <4>[ 6.486643] load_module+0xa20/0x2d10 <4>[ 6.486654] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.486660] ? kernel_read_file+0x2ac/0x330 <4>[ 6.486668] init_module_from_file+0x97/0xe0 <4>[ 6.486670] ? init_module_from_file+0x97/0xe0 <4>[ 6.486685] idempotent_init_module+0x134/0x350 <4>[ 6.486696] __x64_sys_finit_module+0x77/0x100 <4>[ 6.486700] x64_sys_call+0x24e3/0x2670 <4>[ 6.486702] do_syscall_64+0x91/0x180 <4>[ 6.486705] ? __seccomp_filter+0x379/0x580 <4>[ 6.486711] ? ext4_llseek+0xc0/0x120 <4>[ 6.486715] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.486719] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.486723] ? do_syscall_64+0x9d/0x180 <4>[ 6.486725] ? __lock_acquire+0x437/0x2600 <4>[ 6.486736] ? lock_acquire+0xc9/0x310 <4>[ 6.486739] ? find_held_lock+0x31/0x90 <4>[ 6.486741] ? __might_fault+0x53/0xb0 <4>[ 6.486744] ? lock_release+0xd3/0x2c0 <4>[ 6.486747] ? __might_fault+0x53/0xb0 <4>[ 6.486750] ? __might_fault+0x89/0xb0 <4>[ 6.486751] ? __might_fault+0x53/0xb0 <4>[ 6.486753] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.486758] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.486761] ? switch_fpu_return+0xe0/0x130 <4>[ 6.486765] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.486769] ? do_syscall_64+0x9d/0x180 <4>[ 6.486773] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.486776] ? do_syscall_64+0x9d/0x180 <4>[ 6.486778] ? exc_page_fault+0xb1/0x300 <4>[ 6.486782] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.486785] RIP: 0033:0x78cf6112725d <4>[ 6.486787] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.486788] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.486790] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.486791] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 6.486792] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.486793] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.486794] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920dd3c0 <4>[ 6.486804] <5>[ 6.486805] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.486822] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.486824] kmemleak: min_count = 0 <5>[ 6.486826] kmemleak: count = 0 <5>[ 6.486827] kmemleak: flags = 0x1 <5>[ 6.486828] kmemleak: checksum = 0 <5>[ 6.486829] kmemleak: backtrace: <4>[ 6.486831] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.486834] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.486837] execmem_vmalloc+0x5a/0xf0 <4>[ 6.486840] execmem_alloc+0xc2/0x150 <4>[ 6.486843] load_module+0x9db/0x2d10 <4>[ 6.486844] init_module_from_file+0x97/0xe0 <4>[ 6.486847] idempotent_init_module+0x134/0x350 <4>[ 6.486849] __x64_sys_finit_module+0x77/0x100 <4>[ 6.486851] x64_sys_call+0x24e3/0x2670 <4>[ 6.486853] do_syscall_64+0x91/0x180 <4>[ 6.486855] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.486858] kmemleak: Trying to color unknown object at 0xffffffffa0456000 as Grey <4>[ 6.486861] CPU: 3 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.486863] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.486864] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.486865] Call Trace: <4>[ 6.486865] <4>[ 6.486867] dump_stack_lvl+0xc1/0xf0 <4>[ 6.486870] dump_stack+0x10/0x20 <4>[ 6.486872] paint_ptr+0x8d/0xa0 <4>[ 6.486877] kmemleak_not_leak+0x33/0x70 <4>[ 6.486880] load_module+0xa20/0x2d10 <4>[ 6.486892] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.486897] ? kernel_read_file+0x2ac/0x330 <4>[ 6.486904] init_module_from_file+0x97/0xe0 <4>[ 6.486906] ? init_module_from_file+0x97/0xe0 <4>[ 6.486920] idempotent_init_module+0x134/0x350 <4>[ 6.486935] __x64_sys_finit_module+0x77/0x100 <4>[ 6.486940] x64_sys_call+0x24e3/0x2670 <4>[ 6.486942] do_syscall_64+0x91/0x180 <4>[ 6.486944] ? __seccomp_filter+0x379/0x580 <4>[ 6.486948] ? ext4_llseek+0xc0/0x120 <4>[ 6.486951] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.486954] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.486957] ? do_syscall_64+0x9d/0x180 <4>[ 6.486959] ? __lock_acquire+0x437/0x2600 <4>[ 6.486966] ? lock_acquire+0xc9/0x310 <4>[ 6.486969] ? find_held_lock+0x31/0x90 <4>[ 6.486970] ? __might_fault+0x53/0xb0 <4>[ 6.486972] ? lock_release+0xd3/0x2c0 <4>[ 6.486975] ? __might_fault+0x53/0xb0 <4>[ 6.486977] ? __might_fault+0x89/0xb0 <4>[ 6.486978] ? __might_fault+0x53/0xb0 <4>[ 6.486979] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.486983] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.486985] ? switch_fpu_return+0xe0/0x130 <4>[ 6.486988] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.486991] ? do_syscall_64+0x9d/0x180 <4>[ 6.486994] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.486997] ? do_syscall_64+0x9d/0x180 <4>[ 6.486998] ? exc_page_fault+0xb1/0x300 <4>[ 6.487001] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.487003] RIP: 0033:0x78cf6112725d <4>[ 6.487005] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.487006] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.487007] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.487008] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 6.487008] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.487009] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.487009] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920dd3c0 <4>[ 6.487016] <4>[ 6.487080] kmemleak: Found object by alias at 0xffffffffa046a000 <4>[ 6.487095] CPU: 3 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.487097] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.487097] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.487098] Call Trace: <4>[ 6.487098] <4>[ 6.487099] dump_stack_lvl+0x91/0xf0 <4>[ 6.487101] dump_stack+0x10/0x20 <4>[ 6.487103] __lookup_object+0x90/0xa0 <4>[ 6.487105] __find_and_get_object+0x6c/0x190 <4>[ 6.487108] paint_ptr+0x1b/0xa0 <4>[ 6.487111] kmemleak_not_leak+0x33/0x70 <4>[ 6.487114] load_module+0xa20/0x2d10 <4>[ 6.487121] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.487125] ? kernel_read_file+0x2ac/0x330 <4>[ 6.487129] init_module_from_file+0x97/0xe0 <4>[ 6.487130] ? init_module_from_file+0x97/0xe0 <4>[ 6.487138] idempotent_init_module+0x134/0x350 <4>[ 6.487147] __x64_sys_finit_module+0x77/0x100 <4>[ 6.487150] x64_sys_call+0x24e3/0x2670 <4>[ 6.487152] do_syscall_64+0x91/0x180 <4>[ 6.487154] ? __seccomp_filter+0x379/0x580 <4>[ 6.487158] ? ext4_llseek+0xc0/0x120 <4>[ 6.487160] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.487164] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.487167] ? do_syscall_64+0x9d/0x180 <4>[ 6.487169] ? __lock_acquire+0x437/0x2600 <4>[ 6.487177] ? lock_acquire+0xc9/0x310 <4>[ 6.487179] ? find_held_lock+0x31/0x90 <4>[ 6.487181] ? __might_fault+0x53/0xb0 <4>[ 6.487183] ? lock_release+0xd3/0x2c0 <4>[ 6.487186] ? __might_fault+0x53/0xb0 <4>[ 6.487188] ? __might_fault+0x89/0xb0 <4>[ 6.487189] ? __might_fault+0x53/0xb0 <4>[ 6.487191] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.487194] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.487197] ? switch_fpu_return+0xe0/0x130 <4>[ 6.487200] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.487203] ? do_syscall_64+0x9d/0x180 <4>[ 6.487206] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.487209] ? do_syscall_64+0x9d/0x180 <4>[ 6.487211] ? exc_page_fault+0xb1/0x300 <4>[ 6.487214] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.487216] RIP: 0033:0x78cf6112725d <4>[ 6.487217] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.487218] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.487219] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.487220] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 6.487220] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.487221] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.487222] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920dd3c0 <4>[ 6.487229] <5>[ 6.487230] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.487243] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.487245] kmemleak: min_count = 0 <5>[ 6.487246] kmemleak: count = 0 <5>[ 6.487247] kmemleak: flags = 0x1 <5>[ 6.487248] kmemleak: checksum = 0 <5>[ 6.487250] kmemleak: backtrace: <4>[ 6.487251] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.487253] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.487256] execmem_vmalloc+0x5a/0xf0 <4>[ 6.487258] execmem_alloc+0xc2/0x150 <4>[ 6.487261] load_module+0x9db/0x2d10 <4>[ 6.487262] init_module_from_file+0x97/0xe0 <4>[ 6.487264] idempotent_init_module+0x134/0x350 <4>[ 6.487266] __x64_sys_finit_module+0x77/0x100 <4>[ 6.487268] x64_sys_call+0x24e3/0x2670 <4>[ 6.487270] do_syscall_64+0x91/0x180 <4>[ 6.487272] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.487275] kmemleak: Trying to color unknown object at 0xffffffffa046a000 as Grey <4>[ 6.487277] CPU: 3 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.487278] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.487278] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.487279] Call Trace: <4>[ 6.487279] <4>[ 6.487280] dump_stack_lvl+0xc1/0xf0 <4>[ 6.487282] dump_stack+0x10/0x20 <4>[ 6.487283] paint_ptr+0x8d/0xa0 <4>[ 6.487286] kmemleak_not_leak+0x33/0x70 <4>[ 6.487288] load_module+0xa20/0x2d10 <4>[ 6.487295] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.487298] ? kernel_read_file+0x2ac/0x330 <4>[ 6.487302] init_module_from_file+0x97/0xe0 <4>[ 6.487303] ? init_module_from_file+0x97/0xe0 <4>[ 6.487310] idempotent_init_module+0x134/0x350 <4>[ 6.487318] __x64_sys_finit_module+0x77/0x100 <4>[ 6.487320] x64_sys_call+0x24e3/0x2670 <4>[ 6.487322] do_syscall_64+0x91/0x180 <4>[ 6.487324] ? __seccomp_filter+0x379/0x580 <4>[ 6.487328] ? ext4_llseek+0xc0/0x120 <4>[ 6.487330] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.487333] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.487336] ? do_syscall_64+0x9d/0x180 <4>[ 6.487338] ? __lock_acquire+0x437/0x2600 <4>[ 6.487345] ? lock_acquire+0xc9/0x310 <4>[ 6.487347] ? find_held_lock+0x31/0x90 <4>[ 6.487349] ? __might_fault+0x53/0xb0 <4>[ 6.487351] ? lock_release+0xd3/0x2c0 <4>[ 6.487354] ? __might_fault+0x53/0xb0 <4>[ 6.487356] ? __might_fault+0x89/0xb0 <4>[ 6.487357] ? __might_fault+0x53/0xb0 <4>[ 6.487358] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.487361] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.487364] ? switch_fpu_return+0xe0/0x130 <4>[ 6.487366] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.487369] ? do_syscall_64+0x9d/0x180 <4>[ 6.487372] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.487375] ? do_syscall_64+0x9d/0x180 <4>[ 6.487377] ? exc_page_fault+0xb1/0x300 <4>[ 6.487380] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.487382] RIP: 0033:0x78cf6112725d <4>[ 6.487383] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.487383] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.487384] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.487385] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 6.487386] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.487386] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.487387] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920dd3c0 <4>[ 6.487393] <6>[ 6.507324] intel_pmc_core INT33A1:00: initialized <6>[ 6.514275] EDAC MC0: Giving out device to module ie31200_edac controller IE31200: DEV 0000:00:00.0 (POLLED) <4>[ 6.517749] kmemleak: Found object by alias at 0xffffffffa047f000 <4>[ 6.517755] CPU: 5 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.517759] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.517759] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.517761] Call Trace: <4>[ 6.517761] <4>[ 6.517763] dump_stack_lvl+0x91/0xf0 <4>[ 6.517769] dump_stack+0x10/0x20 <4>[ 6.517771] __lookup_object+0x90/0xa0 <4>[ 6.517777] __find_and_get_object+0x6c/0x190 <4>[ 6.517782] paint_ptr+0x1b/0xa0 <4>[ 6.517787] kmemleak_not_leak+0x33/0x70 <4>[ 6.517791] load_module+0xa20/0x2d10 <4>[ 6.517808] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.517815] ? kernel_read_file+0x2ac/0x330 <4>[ 6.517822] init_module_from_file+0x97/0xe0 <4>[ 6.517824] ? init_module_from_file+0x97/0xe0 <4>[ 6.517836] idempotent_init_module+0x134/0x350 <4>[ 6.517847] __x64_sys_finit_module+0x77/0x100 <4>[ 6.517851] x64_sys_call+0x24e3/0x2670 <4>[ 6.517854] do_syscall_64+0x91/0x180 <4>[ 6.517856] ? __slab_free+0x185/0x310 <4>[ 6.517858] ? putname+0x60/0x80 <4>[ 6.517867] ? putname+0x60/0x80 <4>[ 6.517869] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.517874] ? putname+0x60/0x80 <4>[ 6.517876] ? do_sys_openat2+0xab/0xf0 <4>[ 6.517882] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.517886] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.517889] ? do_syscall_64+0x9d/0x180 <4>[ 6.517892] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.517896] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.517899] ? do_syscall_64+0x9d/0x180 <4>[ 6.517901] ? exc_page_fault+0xb1/0x300 <4>[ 6.517905] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.517908] RIP: 0033:0x78cf6112725d <4>[ 6.517910] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.517911] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.517913] RAX: ffffffffffffffda RBX: 000057e1920c55f0 RCX: 000078cf6112725d <4>[ 6.517914] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.517915] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.517916] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.517917] R13: 0000000000020000 R14: 000057e1920c4b30 R15: 000057e1920c5df0 <4>[ 6.517927] <5>[ 6.517927] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.517943] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.517945] kmemleak: min_count = 0 <5>[ 6.517946] kmemleak: count = 0 <5>[ 6.517947] kmemleak: flags = 0x1 <5>[ 6.517949] kmemleak: checksum = 0 <5>[ 6.517950] kmemleak: backtrace: <4>[ 6.517951] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.517954] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.517957] execmem_vmalloc+0x5a/0xf0 <4>[ 6.517960] execmem_alloc+0xc2/0x150 <4>[ 6.517963] load_module+0x9db/0x2d10 <4>[ 6.517965] init_module_from_file+0x97/0xe0 <4>[ 6.517967] idempotent_init_module+0x134/0x350 <4>[ 6.517969] __x64_sys_finit_module+0x77/0x100 <4>[ 6.517971] x64_sys_call+0x24e3/0x2670 <4>[ 6.517973] do_syscall_64+0x91/0x180 <4>[ 6.517976] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.517979] kmemleak: Trying to color unknown object at 0xffffffffa047f000 as Grey <4>[ 6.517981] CPU: 5 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.517984] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.517984] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.517985] Call Trace: <4>[ 6.517986] <4>[ 6.517987] dump_stack_lvl+0xc1/0xf0 <4>[ 6.517990] dump_stack+0x10/0x20 <4>[ 6.517993] paint_ptr+0x8d/0xa0 <4>[ 6.517997] kmemleak_not_leak+0x33/0x70 <4>[ 6.518000] load_module+0xa20/0x2d10 <4>[ 6.518013] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.518018] ? kernel_read_file+0x2ac/0x330 <4>[ 6.518026] init_module_from_file+0x97/0xe0 <4>[ 6.518027] ? init_module_from_file+0x97/0xe0 <4>[ 6.518040] idempotent_init_module+0x134/0x350 <4>[ 6.518055] __x64_sys_finit_module+0x77/0x100 <4>[ 6.518060] x64_sys_call+0x24e3/0x2670 <4>[ 6.518063] do_syscall_64+0x91/0x180 <4>[ 6.518066] ? __slab_free+0x185/0x310 <4>[ 6.518067] ? putname+0x60/0x80 <4>[ 6.518078] ? putname+0x60/0x80 <4>[ 6.518081] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.518089] ? putname+0x60/0x80 <4>[ 6.518092] ? do_sys_openat2+0xab/0xf0 <4>[ 6.518098] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.518102] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.518107] ? do_syscall_64+0x9d/0x180 <4>[ 6.518111] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.518116] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.518120] ? do_syscall_64+0x9d/0x180 <4>[ 6.518122] ? exc_page_fault+0xb1/0x300 <4>[ 6.518128] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.518130] RIP: 0033:0x78cf6112725d <4>[ 6.518133] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.518134] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.518136] RAX: ffffffffffffffda RBX: 000057e1920c55f0 RCX: 000078cf6112725d <4>[ 6.518137] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.518138] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.518139] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.518140] R13: 0000000000020000 R14: 000057e1920c4b30 R15: 000057e1920c5df0 <4>[ 6.518154] <4>[ 6.518276] kmemleak: Found object by alias at 0xffffffffa044d000 <4>[ 6.518297] CPU: 5 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.518299] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.518300] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.518300] Call Trace: <4>[ 6.518301] <4>[ 6.518302] dump_stack_lvl+0x91/0xf0 <4>[ 6.518304] dump_stack+0x10/0x20 <4>[ 6.518306] __lookup_object+0x90/0xa0 <4>[ 6.518309] __find_and_get_object+0x6c/0x190 <4>[ 6.518313] paint_ptr+0x1b/0xa0 <4>[ 6.518316] kmemleak_not_leak+0x33/0x70 <4>[ 6.518319] load_module+0xa20/0x2d10 <4>[ 6.518329] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.518333] ? kernel_read_file+0x2ac/0x330 <4>[ 6.518338] init_module_from_file+0x97/0xe0 <4>[ 6.518340] ? init_module_from_file+0x97/0xe0 <4>[ 6.518350] idempotent_init_module+0x134/0x350 <4>[ 6.518361] __x64_sys_finit_module+0x77/0x100 <4>[ 6.518365] x64_sys_call+0x24e3/0x2670 <4>[ 6.518367] do_syscall_64+0x91/0x180 <4>[ 6.518369] ? __slab_free+0x185/0x310 <4>[ 6.518370] ? putname+0x60/0x80 <4>[ 6.518378] ? putname+0x60/0x80 <4>[ 6.518380] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.518386] ? putname+0x60/0x80 <4>[ 6.518388] ? do_sys_openat2+0xab/0xf0 <4>[ 6.518393] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.518397] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.518400] ? do_syscall_64+0x9d/0x180 <4>[ 6.518403] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.518407] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.518410] ? do_syscall_64+0x9d/0x180 <4>[ 6.518412] ? exc_page_fault+0xb1/0x300 <4>[ 6.518416] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.518418] RIP: 0033:0x78cf6112725d <4>[ 6.518419] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.518420] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.518422] RAX: ffffffffffffffda RBX: 000057e1920c55f0 RCX: 000078cf6112725d <4>[ 6.518423] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.518423] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.518424] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.518425] R13: 0000000000020000 R14: 000057e1920c4b30 R15: 000057e1920c5df0 <4>[ 6.518435] <5>[ 6.518435] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.518450] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.518452] kmemleak: min_count = 0 <5>[ 6.518454] kmemleak: count = 0 <5>[ 6.518455] kmemleak: flags = 0x1 <5>[ 6.518456] kmemleak: checksum = 0 <5>[ 6.518457] kmemleak: backtrace: <4>[ 6.518459] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.518461] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.518464] execmem_vmalloc+0x5a/0xf0 <4>[ 6.518467] execmem_alloc+0xc2/0x150 <4>[ 6.518470] load_module+0x9db/0x2d10 <4>[ 6.518471] init_module_from_file+0x97/0xe0 <4>[ 6.518473] idempotent_init_module+0x134/0x350 <4>[ 6.518475] __x64_sys_finit_module+0x77/0x100 <4>[ 6.518477] x64_sys_call+0x24e3/0x2670 <4>[ 6.518480] do_syscall_64+0x91/0x180 <4>[ 6.518482] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.518485] kmemleak: Trying to color unknown object at 0xffffffffa044d000 as Grey <4>[ 6.518487] CPU: 5 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.518490] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.518490] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.518491] Call Trace: <4>[ 6.518492] <4>[ 6.518493] dump_stack_lvl+0xc1/0xf0 <4>[ 6.518495] dump_stack+0x10/0x20 <4>[ 6.518498] paint_ptr+0x8d/0xa0 <4>[ 6.518502] kmemleak_not_leak+0x33/0x70 <4>[ 6.518505] load_module+0xa20/0x2d10 <4>[ 6.518518] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.518523] ? kernel_read_file+0x2ac/0x330 <4>[ 6.518530] init_module_from_file+0x97/0xe0 <4>[ 6.518532] ? init_module_from_file+0x97/0xe0 <4>[ 6.518545] idempotent_init_module+0x134/0x350 <4>[ 6.518560] __x64_sys_finit_module+0x77/0x100 <4>[ 6.518565] x64_sys_call+0x24e3/0x2670 <4>[ 6.518568] do_syscall_64+0x91/0x180 <4>[ 6.518570] ? __slab_free+0x185/0x310 <4>[ 6.518572] ? putname+0x60/0x80 <4>[ 6.518582] ? putname+0x60/0x80 <4>[ 6.518585] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.518593] ? putname+0x60/0x80 <4>[ 6.518596] ? do_sys_openat2+0xab/0xf0 <4>[ 6.518602] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.518607] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.518611] ? do_syscall_64+0x9d/0x180 <4>[ 6.518615] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.518619] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.518624] ? do_syscall_64+0x9d/0x180 <4>[ 6.518626] ? exc_page_fault+0xb1/0x300 <4>[ 6.518632] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.518634] RIP: 0033:0x78cf6112725d <4>[ 6.518636] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.518638] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.518639] RAX: ffffffffffffffda RBX: 000057e1920c55f0 RCX: 000078cf6112725d <4>[ 6.518641] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.518642] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.518643] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.518644] R13: 0000000000020000 R14: 000057e1920c4b30 R15: 000057e1920c5df0 <4>[ 6.518657] <4>[ 6.639092] kmemleak: Found object by alias at 0xffffffffa0483000 <4>[ 6.639098] CPU: 5 UID: 0 PID: 323 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.639102] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.639102] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.639103] Call Trace: <4>[ 6.639104] <4>[ 6.639106] dump_stack_lvl+0x91/0xf0 <4>[ 6.639112] dump_stack+0x10/0x20 <4>[ 6.639114] __lookup_object+0x90/0xa0 <4>[ 6.639119] __find_and_get_object+0x6c/0x190 <4>[ 6.639123] paint_ptr+0x1b/0xa0 <4>[ 6.639126] kmemleak_not_leak+0x33/0x70 <4>[ 6.639130] load_module+0xa20/0x2d10 <4>[ 6.639140] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.639145] ? kernel_read_file+0x2ac/0x330 <4>[ 6.639151] init_module_from_file+0x97/0xe0 <4>[ 6.639152] ? init_module_from_file+0x97/0xe0 <4>[ 6.639163] idempotent_init_module+0x134/0x350 <4>[ 6.639174] __x64_sys_finit_module+0x77/0x100 <4>[ 6.639178] x64_sys_call+0x24e3/0x2670 <4>[ 6.639180] do_syscall_64+0x91/0x180 <4>[ 6.639185] ? putname+0x60/0x80 <4>[ 6.639188] ? do_sys_openat2+0xab/0xf0 <4>[ 6.639193] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.639197] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.639201] ? do_syscall_64+0x9d/0x180 <4>[ 6.639204] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.639208] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.639212] ? irqentry_exit+0x77/0xb0 <4>[ 6.639214] ? exc_page_fault+0xb1/0x300 <4>[ 6.639218] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.639221] RIP: 0033:0x78cf6112725d <4>[ 6.639223] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.639225] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.639227] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.639228] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000020 <4>[ 6.639228] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.639229] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.639230] R13: 0000000000020000 R14: 000057e1920cdaf0 R15: 000057e1920d0620 <4>[ 6.639240] <5>[ 6.639241] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.639255] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.639257] kmemleak: min_count = 0 <5>[ 6.639259] kmemleak: count = 0 <5>[ 6.639260] kmemleak: flags = 0x1 <5>[ 6.639261] kmemleak: checksum = 0 <5>[ 6.639262] kmemleak: backtrace: <4>[ 6.639264] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.639267] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.639270] execmem_vmalloc+0x5a/0xf0 <4>[ 6.639273] execmem_alloc+0xc2/0x150 <4>[ 6.639276] load_module+0x9db/0x2d10 <4>[ 6.639277] init_module_from_file+0x97/0xe0 <4>[ 6.639280] idempotent_init_module+0x134/0x350 <4>[ 6.639282] __x64_sys_finit_module+0x77/0x100 <4>[ 6.639284] x64_sys_call+0x24e3/0x2670 <4>[ 6.639286] do_syscall_64+0x91/0x180 <4>[ 6.639288] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.639291] kmemleak: Trying to color unknown object at 0xffffffffa0483000 as Grey <4>[ 6.639294] CPU: 5 UID: 0 PID: 323 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.639296] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.639297] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.639298] Call Trace: <4>[ 6.639298] <4>[ 6.639299] dump_stack_lvl+0xc1/0xf0 <4>[ 6.639302] dump_stack+0x10/0x20 <4>[ 6.639305] paint_ptr+0x8d/0xa0 <4>[ 6.639309] kmemleak_not_leak+0x33/0x70 <4>[ 6.639312] load_module+0xa20/0x2d10 <4>[ 6.639325] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.639330] ? kernel_read_file+0x2ac/0x330 <4>[ 6.639337] init_module_from_file+0x97/0xe0 <4>[ 6.639339] ? init_module_from_file+0x97/0xe0 <4>[ 6.639353] idempotent_init_module+0x134/0x350 <4>[ 6.639368] __x64_sys_finit_module+0x77/0x100 <4>[ 6.639373] x64_sys_call+0x24e3/0x2670 <4>[ 6.639376] do_syscall_64+0x91/0x180 <4>[ 6.639382] ? putname+0x60/0x80 <4>[ 6.639385] ? do_sys_openat2+0xab/0xf0 <4>[ 6.639391] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.639396] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.639400] ? do_syscall_64+0x9d/0x180 <4>[ 6.639403] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.639408] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.639413] ? irqentry_exit+0x77/0xb0 <4>[ 6.639416] ? exc_page_fault+0xb1/0x300 <4>[ 6.639421] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.639424] RIP: 0033:0x78cf6112725d <4>[ 6.639426] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.639427] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.639429] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.639430] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000020 <4>[ 6.639431] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.639431] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.639432] R13: 0000000000020000 R14: 000057e1920cdaf0 R15: 000057e1920d0620 <4>[ 6.639443] <4>[ 6.640118] kmemleak: Found object by alias at 0xffffffffa044d000 <4>[ 6.640122] CPU: 5 UID: 0 PID: 323 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.640125] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.640125] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.640126] Call Trace: <4>[ 6.640126] <4>[ 6.640127] dump_stack_lvl+0x91/0xf0 <4>[ 6.640131] dump_stack+0x10/0x20 <4>[ 6.640133] __lookup_object+0x90/0xa0 <4>[ 6.640136] __find_and_get_object+0x6c/0x190 <4>[ 6.640140] paint_ptr+0x1b/0xa0 <4>[ 6.640143] kmemleak_not_leak+0x33/0x70 <4>[ 6.640146] load_module+0xa20/0x2d10 <4>[ 6.640156] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.640161] ? kernel_read_file+0x2ac/0x330 <4>[ 6.640166] init_module_from_file+0x97/0xe0 <4>[ 6.640168] ? init_module_from_file+0x97/0xe0 <4>[ 6.640178] idempotent_init_module+0x134/0x350 <4>[ 6.640189] __x64_sys_finit_module+0x77/0x100 <4>[ 6.640193] x64_sys_call+0x24e3/0x2670 <4>[ 6.640195] do_syscall_64+0x91/0x180 <4>[ 6.640200] ? putname+0x60/0x80 <4>[ 6.640202] ? do_sys_openat2+0xab/0xf0 <4>[ 6.640207] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.640211] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.640214] ? do_syscall_64+0x9d/0x180 <4>[ 6.640217] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.640221] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.640224] ? irqentry_exit+0x77/0xb0 <4>[ 6.640227] ? exc_page_fault+0xb1/0x300 <4>[ 6.640231] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.640233] RIP: 0033:0x78cf6112725d <4>[ 6.640235] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.640236] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.640237] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.640238] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000020 <4>[ 6.640239] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.640240] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.640241] R13: 0000000000020000 R14: 000057e1920cdaf0 R15: 000057e1920d0620 <4>[ 6.640251] <5>[ 6.640251] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.640265] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.640267] kmemleak: min_count = 0 <5>[ 6.640269] kmemleak: count = 0 <5>[ 6.640270] kmemleak: flags = 0x1 <5>[ 6.640271] kmemleak: checksum = 0 <5>[ 6.640272] kmemleak: backtrace: <4>[ 6.640274] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.640277] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.640280] execmem_vmalloc+0x5a/0xf0 <4>[ 6.640282] execmem_alloc+0xc2/0x150 <4>[ 6.640285] load_module+0x9db/0x2d10 <4>[ 6.640287] init_module_from_file+0x97/0xe0 <4>[ 6.640289] idempotent_init_module+0x134/0x350 <4>[ 6.640291] __x64_sys_finit_module+0x77/0x100 <4>[ 6.640293] x64_sys_call+0x24e3/0x2670 <4>[ 6.640296] do_syscall_64+0x91/0x180 <4>[ 6.640298] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.640328] kmemleak: Trying to color unknown object at 0xffffffffa044d000 as Grey <4>[ 6.640331] CPU: 5 UID: 0 PID: 323 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.640334] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.640335] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.640335] Call Trace: <4>[ 6.640336] <4>[ 6.640337] dump_stack_lvl+0xc1/0xf0 <4>[ 6.640341] dump_stack+0x10/0x20 <4>[ 6.640343] paint_ptr+0x8d/0xa0 <4>[ 6.640347] kmemleak_not_leak+0x33/0x70 <4>[ 6.640351] load_module+0xa20/0x2d10 <4>[ 6.640363] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.640367] ? kernel_read_file+0x2ac/0x330 <4>[ 6.640374] init_module_from_file+0x97/0xe0 <4>[ 6.640376] ? init_module_from_file+0x97/0xe0 <4>[ 6.640389] idempotent_init_module+0x134/0x350 <4>[ 6.640404] __x64_sys_finit_module+0x77/0x100 <4>[ 6.640409] x64_sys_call+0x24e3/0x2670 <4>[ 6.640412] do_syscall_64+0x91/0x180 <4>[ 6.640417] ? putname+0x60/0x80 <4>[ 6.640420] ? do_sys_openat2+0xab/0xf0 <4>[ 6.640426] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.640431] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.640435] ? do_syscall_64+0x9d/0x180 <4>[ 6.640439] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.640444] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.640448] ? irqentry_exit+0x77/0xb0 <4>[ 6.640451] ? exc_page_fault+0xb1/0x300 <4>[ 6.640457] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.640459] RIP: 0033:0x78cf6112725d <4>[ 6.640461] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.640463] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.640465] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.640466] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000020 <4>[ 6.640467] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.640468] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.640469] R13: 0000000000020000 R14: 000057e1920cdaf0 R15: 000057e1920d0620 <4>[ 6.640481] <4>[ 6.640589] kmemleak: Found object by alias at 0xffffffffa0453000 <4>[ 6.640592] CPU: 5 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.640594] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.640595] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.640595] Call Trace: <4>[ 6.640596] <4>[ 6.640597] dump_stack_lvl+0x91/0xf0 <4>[ 6.640600] dump_stack+0x10/0x20 <4>[ 6.640601] __lookup_object+0x90/0xa0 <4>[ 6.640604] __find_and_get_object+0x6c/0x190 <4>[ 6.640608] paint_ptr+0x1b/0xa0 <4>[ 6.640611] kmemleak_not_leak+0x33/0x70 <4>[ 6.640614] load_module+0xa20/0x2d10 <4>[ 6.640624] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.640628] ? kernel_read_file+0x2ac/0x330 <4>[ 6.640634] init_module_from_file+0x97/0xe0 <4>[ 6.640635] ? init_module_from_file+0x97/0xe0 <4>[ 6.640645] idempotent_init_module+0x134/0x350 <4>[ 6.640656] __x64_sys_finit_module+0x77/0x100 <4>[ 6.640660] x64_sys_call+0x24e3/0x2670 <4>[ 6.640662] do_syscall_64+0x91/0x180 <4>[ 6.640664] ? __might_fault+0x53/0xb0 <4>[ 6.640666] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.640671] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.640675] ? switch_fpu_return+0xe0/0x130 <4>[ 6.640679] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.640682] ? do_syscall_64+0x9d/0x180 <4>[ 6.640684] ? do_syscall_64+0x9d/0x180 <4>[ 6.640687] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.640690] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.640694] ? do_syscall_64+0x9d/0x180 <4>[ 6.640697] ? do_syscall_64+0x9d/0x180 <4>[ 6.640699] ? do_syscall_64+0x9d/0x180 <4>[ 6.640702] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.640704] RIP: 0033:0x78cf6112725d <4>[ 6.640706] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.640707] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.640708] RAX: ffffffffffffffda RBX: 000057e191fd45a0 RCX: 000078cf6112725d <4>[ 6.640709] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.640710] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.640711] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.640711] R13: 0000000000020000 R14: 000057e1920c76f0 R15: 000057e1920cab50 <4>[ 6.640722] <5>[ 6.640722] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.640737] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.640739] kmemleak: min_count = 0 <5>[ 6.640740] kmemleak: count = 0 <5>[ 6.640741] kmemleak: flags = 0x1 <5>[ 6.640743] kmemleak: checksum = 0 <5>[ 6.640744] kmemleak: backtrace: <4>[ 6.640745] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.640748] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.640751] execmem_vmalloc+0x5a/0xf0 <4>[ 6.640754] execmem_alloc+0xc2/0x150 <4>[ 6.640756] load_module+0x9db/0x2d10 <4>[ 6.640758] init_module_from_file+0x97/0xe0 <4>[ 6.640760] idempotent_init_module+0x134/0x350 <4>[ 6.640762] __x64_sys_finit_module+0x77/0x100 <4>[ 6.640764] x64_sys_call+0x24e3/0x2670 <4>[ 6.640767] do_syscall_64+0x91/0x180 <4>[ 6.640769] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.640772] kmemleak: Trying to color unknown object at 0xffffffffa0453000 as Grey <4>[ 6.640775] CPU: 5 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.640777] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.640777] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.640778] Call Trace: <4>[ 6.640778] <4>[ 6.640780] dump_stack_lvl+0xc1/0xf0 <4>[ 6.640783] dump_stack+0x10/0x20 <4>[ 6.640785] paint_ptr+0x8d/0xa0 <4>[ 6.640789] kmemleak_not_leak+0x33/0x70 <4>[ 6.640793] load_module+0xa20/0x2d10 <4>[ 6.640804] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.640809] ? kernel_read_file+0x2ac/0x330 <4>[ 6.640815] init_module_from_file+0x97/0xe0 <4>[ 6.640817] ? init_module_from_file+0x97/0xe0 <4>[ 6.640830] idempotent_init_module+0x134/0x350 <4>[ 6.640843] __x64_sys_finit_module+0x77/0x100 <4>[ 6.640848] x64_sys_call+0x24e3/0x2670 <4>[ 6.640850] do_syscall_64+0x91/0x180 <4>[ 6.640852] ? __might_fault+0x53/0xb0 <4>[ 6.640855] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.640860] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.640863] ? switch_fpu_return+0xe0/0x130 <4>[ 6.640868] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.640872] ? do_syscall_64+0x9d/0x180 <4>[ 6.640875] ? do_syscall_64+0x9d/0x180 <4>[ 6.640878] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.640882] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.640887] ? do_syscall_64+0x9d/0x180 <4>[ 6.640890] ? do_syscall_64+0x9d/0x180 <4>[ 6.640893] ? do_syscall_64+0x9d/0x180 <4>[ 6.640897] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.640899] RIP: 0033:0x78cf6112725d <4>[ 6.640901] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.640903] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.640904] RAX: ffffffffffffffda RBX: 000057e191fd45a0 RCX: 000078cf6112725d <4>[ 6.640906] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 6.640907] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.640908] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.640909] R13: 0000000000020000 R14: 000057e1920c76f0 R15: 000057e1920cab50 <4>[ 6.640922] <4>[ 6.694635] kmemleak: Found object by alias at 0xffffffffa046b000 <4>[ 6.694641] CPU: 0 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.694644] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.694645] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.694646] Call Trace: <4>[ 6.694646] <4>[ 6.694648] dump_stack_lvl+0x91/0xf0 <4>[ 6.694652] dump_stack+0x10/0x20 <4>[ 6.694654] __lookup_object+0x90/0xa0 <4>[ 6.694659] __find_and_get_object+0x6c/0x190 <4>[ 6.694663] paint_ptr+0x1b/0xa0 <4>[ 6.694666] kmemleak_not_leak+0x33/0x70 <4>[ 6.694669] load_module+0xa20/0x2d10 <4>[ 6.694680] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.694684] ? kernel_read_file+0x2ac/0x330 <4>[ 6.694690] init_module_from_file+0x97/0xe0 <4>[ 6.694692] ? init_module_from_file+0x97/0xe0 <4>[ 6.694702] idempotent_init_module+0x134/0x350 <4>[ 6.694713] __x64_sys_finit_module+0x77/0x100 <4>[ 6.694717] x64_sys_call+0x24e3/0x2670 <4>[ 6.694720] do_syscall_64+0x91/0x180 <4>[ 6.694724] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.694728] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.694732] ? do_syscall_64+0x9d/0x180 <4>[ 6.694734] ? do_syscall_64+0x9d/0x180 <4>[ 6.694736] ? do_syscall_64+0x9d/0x180 <4>[ 6.694740] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.694742] RIP: 0033:0x78cf6112725d <4>[ 6.694745] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.694746] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.694749] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.694750] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000019 <4>[ 6.694750] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.694751] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.694752] R13: 0000000000020000 R14: 000057e1920c7bf0 R15: 000057e1920cab90 <4>[ 6.694762] <5>[ 6.694763] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.694776] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.694778] kmemleak: min_count = 0 <5>[ 6.694779] kmemleak: count = 0 <5>[ 6.694780] kmemleak: flags = 0x1 <5>[ 6.694781] kmemleak: checksum = 0 <5>[ 6.694783] kmemleak: backtrace: <4>[ 6.694784] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.694787] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.694791] execmem_vmalloc+0x5a/0xf0 <4>[ 6.694794] execmem_alloc+0xc2/0x150 <4>[ 6.694796] load_module+0x9db/0x2d10 <4>[ 6.694798] init_module_from_file+0x97/0xe0 <4>[ 6.694800] idempotent_init_module+0x134/0x350 <4>[ 6.694802] __x64_sys_finit_module+0x77/0x100 <4>[ 6.694804] x64_sys_call+0x24e3/0x2670 <4>[ 6.694807] do_syscall_64+0x91/0x180 <4>[ 6.694809] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.694812] kmemleak: Trying to color unknown object at 0xffffffffa046b000 as Grey <4>[ 6.694815] CPU: 0 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.694818] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.694819] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.694819] Call Trace: <4>[ 6.694820] <4>[ 6.694821] dump_stack_lvl+0xc1/0xf0 <4>[ 6.694824] dump_stack+0x10/0x20 <4>[ 6.694826] paint_ptr+0x8d/0xa0 <4>[ 6.694831] kmemleak_not_leak+0x33/0x70 <4>[ 6.694834] load_module+0xa20/0x2d10 <4>[ 6.694848] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.694853] ? kernel_read_file+0x2ac/0x330 <4>[ 6.694861] init_module_from_file+0x97/0xe0 <4>[ 6.694862] ? init_module_from_file+0x97/0xe0 <4>[ 6.694876] idempotent_init_module+0x134/0x350 <4>[ 6.694891] __x64_sys_finit_module+0x77/0x100 <4>[ 6.694895] x64_sys_call+0x24e3/0x2670 <4>[ 6.694898] do_syscall_64+0x91/0x180 <4>[ 6.694903] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.694908] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.694912] ? do_syscall_64+0x9d/0x180 <4>[ 6.694915] ? do_syscall_64+0x9d/0x180 <4>[ 6.694917] ? do_syscall_64+0x9d/0x180 <4>[ 6.694922] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.694924] RIP: 0033:0x78cf6112725d <4>[ 6.694926] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.694928] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.694929] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.694930] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000019 <4>[ 6.694931] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.694933] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.694934] R13: 0000000000020000 R14: 000057e1920c7bf0 R15: 000057e1920cab90 <4>[ 6.694947] <4>[ 6.695054] kmemleak: Found object by alias at 0xffffffffa046e000 <4>[ 6.695068] CPU: 0 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.695070] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.695070] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.695071] Call Trace: <4>[ 6.695071] <4>[ 6.695072] dump_stack_lvl+0x91/0xf0 <4>[ 6.695075] dump_stack+0x10/0x20 <4>[ 6.695077] __lookup_object+0x90/0xa0 <4>[ 6.695080] __find_and_get_object+0x6c/0x190 <4>[ 6.695084] paint_ptr+0x1b/0xa0 <4>[ 6.695087] kmemleak_not_leak+0x33/0x70 <4>[ 6.695090] load_module+0xa20/0x2d10 <4>[ 6.695100] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.695104] ? kernel_read_file+0x2ac/0x330 <4>[ 6.695110] init_module_from_file+0x97/0xe0 <4>[ 6.695111] ? init_module_from_file+0x97/0xe0 <4>[ 6.695121] idempotent_init_module+0x134/0x350 <4>[ 6.695132] __x64_sys_finit_module+0x77/0x100 <4>[ 6.695136] x64_sys_call+0x24e3/0x2670 <4>[ 6.695138] do_syscall_64+0x91/0x180 <4>[ 6.695142] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.695145] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.695149] ? do_syscall_64+0x9d/0x180 <4>[ 6.695151] ? do_syscall_64+0x9d/0x180 <4>[ 6.695153] ? do_syscall_64+0x9d/0x180 <4>[ 6.695156] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.695158] RIP: 0033:0x78cf6112725d <4>[ 6.695160] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.695161] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.695162] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.695163] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000019 <4>[ 6.695164] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.695164] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.695165] R13: 0000000000020000 R14: 000057e1920c7bf0 R15: 000057e1920cab90 <4>[ 6.695175] <5>[ 6.695175] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.695188] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.695190] kmemleak: min_count = 0 <5>[ 6.695191] kmemleak: count = 0 <5>[ 6.695192] kmemleak: flags = 0x1 <5>[ 6.695194] kmemleak: checksum = 0 <5>[ 6.695195] kmemleak: backtrace: <4>[ 6.695196] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.695199] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.695202] execmem_vmalloc+0x5a/0xf0 <4>[ 6.695204] execmem_alloc+0xc2/0x150 <4>[ 6.695207] load_module+0x9db/0x2d10 <4>[ 6.695209] init_module_from_file+0x97/0xe0 <4>[ 6.695211] idempotent_init_module+0x134/0x350 <4>[ 6.695213] __x64_sys_finit_module+0x77/0x100 <4>[ 6.695215] x64_sys_call+0x24e3/0x2670 <4>[ 6.695217] do_syscall_64+0x91/0x180 <4>[ 6.695220] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.695223] kmemleak: Trying to color unknown object at 0xffffffffa046e000 as Grey <4>[ 6.695225] CPU: 0 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.695227] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.695228] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.695229] Call Trace: <4>[ 6.695229] <4>[ 6.695231] dump_stack_lvl+0xc1/0xf0 <4>[ 6.695234] dump_stack+0x10/0x20 <4>[ 6.695236] paint_ptr+0x8d/0xa0 <4>[ 6.695240] kmemleak_not_leak+0x33/0x70 <4>[ 6.695243] load_module+0xa20/0x2d10 <4>[ 6.695256] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.695262] ? kernel_read_file+0x2ac/0x330 <4>[ 6.695269] init_module_from_file+0x97/0xe0 <4>[ 6.695270] ? init_module_from_file+0x97/0xe0 <4>[ 6.695284] idempotent_init_module+0x134/0x350 <4>[ 6.695299] __x64_sys_finit_module+0x77/0x100 <4>[ 6.695304] x64_sys_call+0x24e3/0x2670 <4>[ 6.695307] do_syscall_64+0x91/0x180 <4>[ 6.695312] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.695317] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.695321] ? do_syscall_64+0x9d/0x180 <4>[ 6.695324] ? do_syscall_64+0x9d/0x180 <4>[ 6.695326] ? do_syscall_64+0x9d/0x180 <4>[ 6.695331] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.695334] RIP: 0033:0x78cf6112725d <4>[ 6.695336] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.695337] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.695339] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.695340] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000019 <4>[ 6.695341] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.695342] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.695343] R13: 0000000000020000 R14: 000057e1920c7bf0 R15: 000057e1920cab90 <4>[ 6.695356] <4>[ 6.726130] kmemleak: Found object by alias at 0xffffffffa048a000 <4>[ 6.726136] CPU: 5 UID: 0 PID: 323 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.726139] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.726140] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.726141] Call Trace: <4>[ 6.726142] <4>[ 6.726143] dump_stack_lvl+0x91/0xf0 <4>[ 6.726148] dump_stack+0x10/0x20 <4>[ 6.726149] __lookup_object+0x90/0xa0 <4>[ 6.726154] __find_and_get_object+0x6c/0x190 <4>[ 6.726158] paint_ptr+0x1b/0xa0 <4>[ 6.726161] kmemleak_not_leak+0x33/0x70 <4>[ 6.726164] load_module+0xa20/0x2d10 <4>[ 6.726175] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.726180] ? kernel_read_file+0x2ac/0x330 <4>[ 6.726186] init_module_from_file+0x97/0xe0 <4>[ 6.726187] ? init_module_from_file+0x97/0xe0 <4>[ 6.726198] idempotent_init_module+0x134/0x350 <4>[ 6.726209] __x64_sys_finit_module+0x77/0x100 <4>[ 6.726212] x64_sys_call+0x24e3/0x2670 <4>[ 6.726215] do_syscall_64+0x91/0x180 <4>[ 6.726219] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.726222] RIP: 0033:0x78cf6112725d <4>[ 6.726224] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.726226] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.726228] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.726229] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000021 <4>[ 6.726229] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.726230] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.726231] R13: 0000000000020000 R14: 000057e1920cf2a0 R15: 000057e1920d0660 <4>[ 6.726241] <5>[ 6.726242] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.726253] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.726255] kmemleak: min_count = 0 <5>[ 6.726257] kmemleak: count = 0 <5>[ 6.726258] kmemleak: flags = 0x1 <5>[ 6.726259] kmemleak: checksum = 0 <5>[ 6.726260] kmemleak: backtrace: <4>[ 6.726262] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.726265] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.726268] execmem_vmalloc+0x5a/0xf0 <4>[ 6.726271] execmem_alloc+0xc2/0x150 <4>[ 6.726274] load_module+0x9db/0x2d10 <4>[ 6.726276] init_module_from_file+0x97/0xe0 <4>[ 6.726278] idempotent_init_module+0x134/0x350 <4>[ 6.726280] __x64_sys_finit_module+0x77/0x100 <4>[ 6.726282] x64_sys_call+0x24e3/0x2670 <4>[ 6.726284] do_syscall_64+0x91/0x180 <4>[ 6.726287] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.726317] kmemleak: Trying to color unknown object at 0xffffffffa048a000 as Grey <4>[ 6.726320] CPU: 5 UID: 0 PID: 323 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.726323] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.726323] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.726324] Call Trace: <4>[ 6.726325] <4>[ 6.726326] dump_stack_lvl+0xc1/0xf0 <4>[ 6.726330] dump_stack+0x10/0x20 <4>[ 6.726332] paint_ptr+0x8d/0xa0 <4>[ 6.726336] kmemleak_not_leak+0x33/0x70 <4>[ 6.726340] load_module+0xa20/0x2d10 <4>[ 6.726353] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.726359] ? kernel_read_file+0x2ac/0x330 <4>[ 6.726366] init_module_from_file+0x97/0xe0 <4>[ 6.726368] ? init_module_from_file+0x97/0xe0 <4>[ 6.726382] idempotent_init_module+0x134/0x350 <4>[ 6.726397] __x64_sys_finit_module+0x77/0x100 <4>[ 6.726402] x64_sys_call+0x24e3/0x2670 <4>[ 6.726404] do_syscall_64+0x91/0x180 <4>[ 6.726409] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.726412] RIP: 0033:0x78cf6112725d <4>[ 6.726414] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.726415] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.726417] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.726418] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000021 <4>[ 6.726419] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.726420] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.726421] R13: 0000000000020000 R14: 000057e1920cf2a0 R15: 000057e1920d0660 <4>[ 6.726434] <4>[ 6.726576] kmemleak: Found object by alias at 0xffffffffa046f000 <4>[ 6.726579] CPU: 5 UID: 0 PID: 323 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.726581] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.726581] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.726582] Call Trace: <4>[ 6.726583] <4>[ 6.726584] dump_stack_lvl+0x91/0xf0 <4>[ 6.726587] dump_stack+0x10/0x20 <4>[ 6.726589] __lookup_object+0x90/0xa0 <4>[ 6.726592] __find_and_get_object+0x6c/0x190 <4>[ 6.726597] paint_ptr+0x1b/0xa0 <4>[ 6.726601] kmemleak_not_leak+0x33/0x70 <4>[ 6.726604] load_module+0xa20/0x2d10 <4>[ 6.726616] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.726621] ? kernel_read_file+0x2ac/0x330 <4>[ 6.726627] init_module_from_file+0x97/0xe0 <4>[ 6.726629] ? init_module_from_file+0x97/0xe0 <4>[ 6.726642] idempotent_init_module+0x134/0x350 <4>[ 6.726657] __x64_sys_finit_module+0x77/0x100 <4>[ 6.726662] x64_sys_call+0x24e3/0x2670 <4>[ 6.726664] do_syscall_64+0x91/0x180 <4>[ 6.726669] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.726671] RIP: 0033:0x78cf6112725d <4>[ 6.726673] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.726674] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.726676] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.726677] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000021 <4>[ 6.726678] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.726679] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.726680] R13: 0000000000020000 R14: 000057e1920cf2a0 R15: 000057e1920d0660 <4>[ 6.726693] <5>[ 6.726694] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.726711] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.726713] kmemleak: min_count = 0 <5>[ 6.726715] kmemleak: count = 0 <5>[ 6.726717] kmemleak: flags = 0x1 <5>[ 6.726719] kmemleak: checksum = 0 <5>[ 6.726720] kmemleak: backtrace: <4>[ 6.726723] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.726726] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.726730] execmem_vmalloc+0x5a/0xf0 <4>[ 6.726734] execmem_alloc+0xc2/0x150 <4>[ 6.726737] load_module+0x9db/0x2d10 <4>[ 6.726740] init_module_from_file+0x97/0xe0 <4>[ 6.726743] idempotent_init_module+0x134/0x350 <4>[ 6.726746] __x64_sys_finit_module+0x77/0x100 <4>[ 6.726748] x64_sys_call+0x24e3/0x2670 <4>[ 6.726752] do_syscall_64+0x91/0x180 <4>[ 6.726755] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.726759] kmemleak: Trying to color unknown object at 0xffffffffa046f000 as Grey <4>[ 6.726761] CPU: 5 UID: 0 PID: 323 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.726764] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.726764] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.726765] Call Trace: <4>[ 6.726765] <4>[ 6.726766] dump_stack_lvl+0xc1/0xf0 <4>[ 6.726769] dump_stack+0x10/0x20 <4>[ 6.726771] paint_ptr+0x8d/0xa0 <4>[ 6.726775] kmemleak_not_leak+0x33/0x70 <4>[ 6.726779] load_module+0xa20/0x2d10 <4>[ 6.726791] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.726796] ? kernel_read_file+0x2ac/0x330 <4>[ 6.726802] init_module_from_file+0x97/0xe0 <4>[ 6.726803] ? init_module_from_file+0x97/0xe0 <4>[ 6.726815] idempotent_init_module+0x134/0x350 <4>[ 6.726827] __x64_sys_finit_module+0x77/0x100 <4>[ 6.726832] x64_sys_call+0x24e3/0x2670 <4>[ 6.726834] do_syscall_64+0x91/0x180 <4>[ 6.726839] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.726841] RIP: 0033:0x78cf6112725d <4>[ 6.726843] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.726844] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.726846] RAX: ffffffffffffffda RBX: 000057e1920c29c0 RCX: 000078cf6112725d <4>[ 6.726847] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000021 <4>[ 6.726848] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.726849] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.726850] R13: 0000000000020000 R14: 000057e1920cf2a0 R15: 000057e1920d0660 <4>[ 6.726862] <4>[ 6.728675] kmemleak: Found object by alias at 0xffffffffa0477000 <4>[ 6.728679] CPU: 1 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.728682] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.728682] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.728683] Call Trace: <4>[ 6.728684] <4>[ 6.728685] dump_stack_lvl+0x91/0xf0 <4>[ 6.728689] dump_stack+0x10/0x20 <4>[ 6.728691] __lookup_object+0x90/0xa0 <4>[ 6.728694] __find_and_get_object+0x6c/0x190 <4>[ 6.728698] paint_ptr+0x1b/0xa0 <4>[ 6.728701] kmemleak_not_leak+0x33/0x70 <4>[ 6.728704] load_module+0xa20/0x2d10 <4>[ 6.728714] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.728719] ? kernel_read_file+0x2ac/0x330 <4>[ 6.728724] init_module_from_file+0x97/0xe0 <4>[ 6.728726] ? init_module_from_file+0x97/0xe0 <4>[ 6.728736] idempotent_init_module+0x134/0x350 <4>[ 6.728747] __x64_sys_finit_module+0x77/0x100 <4>[ 6.728751] x64_sys_call+0x24e3/0x2670 <4>[ 6.728753] do_syscall_64+0x91/0x180 <4>[ 6.728762] ? lock_acquire+0xc9/0x310 <4>[ 6.728766] ? find_held_lock+0x31/0x90 <4>[ 6.728768] ? __might_fault+0x53/0xb0 <4>[ 6.728771] ? lock_release+0xd3/0x2c0 <4>[ 6.728774] ? __might_fault+0x53/0xb0 <4>[ 6.728777] ? __might_fault+0x89/0xb0 <4>[ 6.728778] ? __might_fault+0x53/0xb0 <4>[ 6.728780] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.728789] ? __seccomp_filter+0x379/0x580 <4>[ 6.728792] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.728797] ? ext4_llseek+0xc0/0x120 <4>[ 6.728801] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.728805] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.728808] ? do_syscall_64+0x9d/0x180 <4>[ 6.728811] ? putname+0x60/0x80 <4>[ 6.728814] ? do_sys_openat2+0xab/0xf0 <4>[ 6.728819] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.728822] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.728826] ? do_syscall_64+0x9d/0x180 <4>[ 6.728828] ? irqentry_exit+0x77/0xb0 <4>[ 6.728830] ? exc_page_fault+0xb1/0x300 <4>[ 6.728834] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.728836] RIP: 0033:0x78cf6112725d <4>[ 6.728838] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.728840] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.728842] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.728842] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000029 <4>[ 6.728843] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.728844] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.728845] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920df920 <4>[ 6.728855] <5>[ 6.728856] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.728874] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.728875] kmemleak: min_count = 0 <5>[ 6.728877] kmemleak: count = 0 <5>[ 6.728878] kmemleak: flags = 0x1 <5>[ 6.728879] kmemleak: checksum = 0 <5>[ 6.728881] kmemleak: backtrace: <4>[ 6.728882] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.728885] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.728888] execmem_vmalloc+0x5a/0xf0 <4>[ 6.728891] execmem_alloc+0xc2/0x150 <4>[ 6.728893] load_module+0x9db/0x2d10 <4>[ 6.728895] init_module_from_file+0x97/0xe0 <4>[ 6.728897] idempotent_init_module+0x134/0x350 <4>[ 6.728899] __x64_sys_finit_module+0x77/0x100 <4>[ 6.728902] x64_sys_call+0x24e3/0x2670 <4>[ 6.728904] do_syscall_64+0x91/0x180 <4>[ 6.728906] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.728909] kmemleak: Trying to color unknown object at 0xffffffffa0477000 as Grey <4>[ 6.728913] CPU: 1 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.728915] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.728916] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.728917] Call Trace: <4>[ 6.728917] <4>[ 6.728919] dump_stack_lvl+0xc1/0xf0 <4>[ 6.728922] dump_stack+0x10/0x20 <4>[ 6.728924] paint_ptr+0x8d/0xa0 <4>[ 6.728929] kmemleak_not_leak+0x33/0x70 <4>[ 6.728932] load_module+0xa20/0x2d10 <4>[ 6.728946] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.728951] ? kernel_read_file+0x2ac/0x330 <4>[ 6.728958] init_module_from_file+0x97/0xe0 <4>[ 6.728960] ? init_module_from_file+0x97/0xe0 <4>[ 6.728975] idempotent_init_module+0x134/0x350 <4>[ 6.728989] __x64_sys_finit_module+0x77/0x100 <4>[ 6.728994] x64_sys_call+0x24e3/0x2670 <4>[ 6.728997] do_syscall_64+0x91/0x180 <4>[ 6.729009] ? lock_acquire+0xc9/0x310 <4>[ 6.729013] ? find_held_lock+0x31/0x90 <4>[ 6.729016] ? __might_fault+0x53/0xb0 <4>[ 6.729019] ? lock_release+0xd3/0x2c0 <4>[ 6.729023] ? __might_fault+0x53/0xb0 <4>[ 6.729027] ? __might_fault+0x89/0xb0 <4>[ 6.729029] ? __might_fault+0x53/0xb0 <4>[ 6.729031] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.729042] ? __seccomp_filter+0x379/0x580 <4>[ 6.729045] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.729052] ? ext4_llseek+0xc0/0x120 <4>[ 6.729057] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.729062] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.729066] ? do_syscall_64+0x9d/0x180 <4>[ 6.729070] ? putname+0x60/0x80 <4>[ 6.729073] ? do_sys_openat2+0xab/0xf0 <4>[ 6.729080] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.729085] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.729090] ? do_syscall_64+0x9d/0x180 <4>[ 6.729092] ? irqentry_exit+0x77/0xb0 <4>[ 6.729095] ? exc_page_fault+0xb1/0x300 <4>[ 6.729100] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.729103] RIP: 0033:0x78cf6112725d <4>[ 6.729105] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.729106] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.729108] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.729109] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000029 <4>[ 6.729111] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.729112] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.729113] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920df920 <4>[ 6.729127] <4>[ 6.729235] kmemleak: Found object by alias at 0xffffffffa044d000 <4>[ 6.729253] CPU: 1 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.729254] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.729255] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.729255] Call Trace: <4>[ 6.729256] <4>[ 6.729257] dump_stack_lvl+0x91/0xf0 <4>[ 6.729259] dump_stack+0x10/0x20 <4>[ 6.729261] __lookup_object+0x90/0xa0 <4>[ 6.729264] __find_and_get_object+0x6c/0x190 <4>[ 6.729268] paint_ptr+0x1b/0xa0 <4>[ 6.729271] kmemleak_not_leak+0x33/0x70 <4>[ 6.729274] load_module+0xa20/0x2d10 <4>[ 6.729284] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.729288] ? kernel_read_file+0x2ac/0x330 <4>[ 6.729293] init_module_from_file+0x97/0xe0 <4>[ 6.729294] ? init_module_from_file+0x97/0xe0 <4>[ 6.729305] idempotent_init_module+0x134/0x350 <4>[ 6.729316] __x64_sys_finit_module+0x77/0x100 <4>[ 6.729320] x64_sys_call+0x24e3/0x2670 <4>[ 6.729322] do_syscall_64+0x91/0x180 <4>[ 6.729330] ? lock_acquire+0xc9/0x310 <4>[ 6.729333] ? find_held_lock+0x31/0x90 <4>[ 6.729336] ? __might_fault+0x53/0xb0 <4>[ 6.729338] ? lock_release+0xd3/0x2c0 <4>[ 6.729341] ? __might_fault+0x53/0xb0 <4>[ 6.729344] ? __might_fault+0x89/0xb0 <4>[ 6.729345] ? __might_fault+0x53/0xb0 <4>[ 6.729347] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.729355] ? __seccomp_filter+0x379/0x580 <4>[ 6.729357] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.729362] ? ext4_llseek+0xc0/0x120 <4>[ 6.729366] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.729369] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.729373] ? do_syscall_64+0x9d/0x180 <4>[ 6.729375] ? putname+0x60/0x80 <4>[ 6.729378] ? do_sys_openat2+0xab/0xf0 <4>[ 6.729383] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.729386] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.729389] ? do_syscall_64+0x9d/0x180 <4>[ 6.729391] ? irqentry_exit+0x77/0xb0 <4>[ 6.729393] ? exc_page_fault+0xb1/0x300 <4>[ 6.729398] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.729400] RIP: 0033:0x78cf6112725d <4>[ 6.729401] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.729402] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.729403] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.729404] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000029 <4>[ 6.729405] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.729405] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.729406] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920df920 <4>[ 6.729416] <5>[ 6.729417] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.729434] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.729436] kmemleak: min_count = 0 <5>[ 6.729437] kmemleak: count = 0 <5>[ 6.729438] kmemleak: flags = 0x1 <5>[ 6.729440] kmemleak: checksum = 0 <5>[ 6.729441] kmemleak: backtrace: <4>[ 6.729442] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.729445] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.729448] execmem_vmalloc+0x5a/0xf0 <4>[ 6.729450] execmem_alloc+0xc2/0x150 <4>[ 6.729453] load_module+0x9db/0x2d10 <4>[ 6.729455] init_module_from_file+0x97/0xe0 <4>[ 6.729457] idempotent_init_module+0x134/0x350 <4>[ 6.729459] __x64_sys_finit_module+0x77/0x100 <4>[ 6.729461] x64_sys_call+0x24e3/0x2670 <4>[ 6.729464] do_syscall_64+0x91/0x180 <4>[ 6.729466] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.729469] kmemleak: Trying to color unknown object at 0xffffffffa044d000 as Grey <4>[ 6.729472] CPU: 1 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.729474] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.729474] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.729475] Call Trace: <4>[ 6.729476] <4>[ 6.729477] dump_stack_lvl+0xc1/0xf0 <4>[ 6.729480] dump_stack+0x10/0x20 <4>[ 6.729483] paint_ptr+0x8d/0xa0 <4>[ 6.729487] kmemleak_not_leak+0x33/0x70 <4>[ 6.729490] load_module+0xa20/0x2d10 <4>[ 6.729504] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.729509] ? kernel_read_file+0x2ac/0x330 <4>[ 6.729517] init_module_from_file+0x97/0xe0 <4>[ 6.729518] ? init_module_from_file+0x97/0xe0 <4>[ 6.729533] idempotent_init_module+0x134/0x350 <4>[ 6.729546] __x64_sys_finit_module+0x77/0x100 <4>[ 6.729551] x64_sys_call+0x24e3/0x2670 <4>[ 6.729553] do_syscall_64+0x91/0x180 <4>[ 6.729562] ? lock_acquire+0xc9/0x310 <4>[ 6.729566] ? find_held_lock+0x31/0x90 <4>[ 6.729569] ? __might_fault+0x53/0xb0 <4>[ 6.729572] ? lock_release+0xd3/0x2c0 <4>[ 6.729576] ? __might_fault+0x53/0xb0 <4>[ 6.729579] ? __might_fault+0x89/0xb0 <4>[ 6.729580] ? __might_fault+0x53/0xb0 <4>[ 6.729583] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.729592] ? __seccomp_filter+0x379/0x580 <4>[ 6.729594] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.729601] ? ext4_llseek+0xc0/0x120 <4>[ 6.729605] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.729609] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.729614] ? do_syscall_64+0x9d/0x180 <4>[ 6.729617] ? putname+0x60/0x80 <4>[ 6.729620] ? do_sys_openat2+0xab/0xf0 <4>[ 6.729626] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.729630] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.729635] ? do_syscall_64+0x9d/0x180 <4>[ 6.729637] ? irqentry_exit+0x77/0xb0 <4>[ 6.729640] ? exc_page_fault+0xb1/0x300 <4>[ 6.729645] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.729648] RIP: 0033:0x78cf6112725d <4>[ 6.729649] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.729650] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.729652] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.729653] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000029 <4>[ 6.729654] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.729655] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.729656] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920df920 <4>[ 6.729666] <6>[ 6.738189] acpi INT33D6:00: intel-vbtn: created platform device <6>[ 6.764437] input: Intel Virtual Buttons as /devices/platform/INT33D6:00/input/input2 <4>[ 6.769234] kmemleak: Found object by alias at 0xffffffffa048f000 <4>[ 6.769239] CPU: 4 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.769242] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.769243] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.769244] Call Trace: <4>[ 6.769244] <4>[ 6.769246] dump_stack_lvl+0x91/0xf0 <4>[ 6.769250] dump_stack+0x10/0x20 <4>[ 6.769252] __lookup_object+0x90/0xa0 <4>[ 6.769256] __find_and_get_object+0x6c/0x190 <4>[ 6.769260] paint_ptr+0x1b/0xa0 <4>[ 6.769263] kmemleak_not_leak+0x33/0x70 <4>[ 6.769266] load_module+0xa20/0x2d10 <4>[ 6.769277] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.769282] ? kernel_read_file+0x2ac/0x330 <4>[ 6.769288] init_module_from_file+0x97/0xe0 <4>[ 6.769289] ? init_module_from_file+0x97/0xe0 <4>[ 6.769300] idempotent_init_module+0x134/0x350 <4>[ 6.769311] __x64_sys_finit_module+0x77/0x100 <4>[ 6.769315] x64_sys_call+0x24e3/0x2670 <4>[ 6.769317] do_syscall_64+0x91/0x180 <4>[ 6.769320] ? do_syscall_64+0x9d/0x180 <4>[ 6.769323] ? do_syscall_64+0x9d/0x180 <4>[ 6.769326] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.769329] RIP: 0033:0x78cf6112725d <4>[ 6.769331] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.769333] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.769335] RAX: ffffffffffffffda RBX: 000057e191fd3120 RCX: 000078cf6112725d <4>[ 6.769336] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.769336] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.769337] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.769338] R13: 0000000000020000 R14: 000057e1920c7d80 R15: 000057e1920c1960 <4>[ 6.769348] <5>[ 6.769349] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.769361] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.769363] kmemleak: min_count = 0 <5>[ 6.769364] kmemleak: count = 0 <5>[ 6.769365] kmemleak: flags = 0x1 <5>[ 6.769366] kmemleak: checksum = 0 <5>[ 6.769368] kmemleak: backtrace: <4>[ 6.769369] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.769372] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.769375] execmem_vmalloc+0x5a/0xf0 <4>[ 6.769378] execmem_alloc+0xc2/0x150 <4>[ 6.769381] load_module+0x9db/0x2d10 <4>[ 6.769383] init_module_from_file+0x97/0xe0 <4>[ 6.769385] idempotent_init_module+0x134/0x350 <4>[ 6.769387] __x64_sys_finit_module+0x77/0x100 <4>[ 6.769389] x64_sys_call+0x24e3/0x2670 <4>[ 6.769391] do_syscall_64+0x91/0x180 <4>[ 6.769394] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.769397] kmemleak: Trying to color unknown object at 0xffffffffa048f000 as Grey <4>[ 6.769400] CPU: 4 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.769403] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.769403] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.769404] Call Trace: <4>[ 6.769404] <4>[ 6.769405] dump_stack_lvl+0xc1/0xf0 <4>[ 6.769408] dump_stack+0x10/0x20 <4>[ 6.769411] paint_ptr+0x8d/0xa0 <4>[ 6.769415] kmemleak_not_leak+0x33/0x70 <4>[ 6.769418] load_module+0xa20/0x2d10 <4>[ 6.769432] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.769437] ? kernel_read_file+0x2ac/0x330 <4>[ 6.769444] init_module_from_file+0x97/0xe0 <4>[ 6.769446] ? init_module_from_file+0x97/0xe0 <4>[ 6.769460] idempotent_init_module+0x134/0x350 <4>[ 6.769475] __x64_sys_finit_module+0x77/0x100 <4>[ 6.769480] x64_sys_call+0x24e3/0x2670 <4>[ 6.769482] do_syscall_64+0x91/0x180 <4>[ 6.769485] ? do_syscall_64+0x9d/0x180 <4>[ 6.769489] ? do_syscall_64+0x9d/0x180 <4>[ 6.769493] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.769496] RIP: 0033:0x78cf6112725d <4>[ 6.769498] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.769499] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.769501] RAX: ffffffffffffffda RBX: 000057e191fd3120 RCX: 000078cf6112725d <4>[ 6.769502] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.769503] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.769504] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.769505] R13: 0000000000020000 R14: 000057e1920c7d80 R15: 000057e1920c1960 <4>[ 6.769519] <4>[ 6.769700] kmemleak: Found object by alias at 0xffffffffa0498000 <4>[ 6.769704] CPU: 4 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.769706] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.769707] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.769708] Call Trace: <4>[ 6.769708] <4>[ 6.769709] dump_stack_lvl+0x91/0xf0 <4>[ 6.769712] dump_stack+0x10/0x20 <4>[ 6.769714] __lookup_object+0x90/0xa0 <4>[ 6.769716] __find_and_get_object+0x6c/0x190 <4>[ 6.769720] paint_ptr+0x1b/0xa0 <4>[ 6.769723] kmemleak_not_leak+0x33/0x70 <4>[ 6.769726] load_module+0xa20/0x2d10 <4>[ 6.769736] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.769740] ? kernel_read_file+0x2ac/0x330 <4>[ 6.769746] init_module_from_file+0x97/0xe0 <4>[ 6.769747] ? init_module_from_file+0x97/0xe0 <4>[ 6.769757] idempotent_init_module+0x134/0x350 <4>[ 6.769768] __x64_sys_finit_module+0x77/0x100 <4>[ 6.769772] x64_sys_call+0x24e3/0x2670 <4>[ 6.769774] do_syscall_64+0x91/0x180 <4>[ 6.769776] ? do_syscall_64+0x9d/0x180 <4>[ 6.769779] ? do_syscall_64+0x9d/0x180 <4>[ 6.769783] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.769785] RIP: 0033:0x78cf6112725d <4>[ 6.769786] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.769787] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.769789] RAX: ffffffffffffffda RBX: 000057e191fd3120 RCX: 000078cf6112725d <4>[ 6.769789] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.769790] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.769791] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.769792] R13: 0000000000020000 R14: 000057e1920c7d80 R15: 000057e1920c1960 <4>[ 6.769802] <5>[ 6.769802] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.769814] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.769816] kmemleak: min_count = 0 <5>[ 6.769817] kmemleak: count = 0 <5>[ 6.769818] kmemleak: flags = 0x1 <5>[ 6.769819] kmemleak: checksum = 0 <5>[ 6.769821] kmemleak: backtrace: <4>[ 6.769822] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.769825] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.769828] execmem_vmalloc+0x5a/0xf0 <4>[ 6.769830] execmem_alloc+0xc2/0x150 <4>[ 6.769833] load_module+0x9db/0x2d10 <4>[ 6.769835] init_module_from_file+0x97/0xe0 <4>[ 6.769837] idempotent_init_module+0x134/0x350 <4>[ 6.769839] __x64_sys_finit_module+0x77/0x100 <4>[ 6.769841] x64_sys_call+0x24e3/0x2670 <4>[ 6.769843] do_syscall_64+0x91/0x180 <4>[ 6.769846] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.769849] kmemleak: Trying to color unknown object at 0xffffffffa0498000 as Grey <4>[ 6.769851] CPU: 4 UID: 0 PID: 313 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.769853] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.769854] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.769855] Call Trace: <4>[ 6.769855] <4>[ 6.769856] dump_stack_lvl+0xc1/0xf0 <4>[ 6.769859] dump_stack+0x10/0x20 <4>[ 6.769861] paint_ptr+0x8d/0xa0 <4>[ 6.769865] kmemleak_not_leak+0x33/0x70 <4>[ 6.769868] load_module+0xa20/0x2d10 <4>[ 6.769882] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.769887] ? kernel_read_file+0x2ac/0x330 <4>[ 6.769894] init_module_from_file+0x97/0xe0 <4>[ 6.769896] ? init_module_from_file+0x97/0xe0 <4>[ 6.769910] idempotent_init_module+0x134/0x350 <4>[ 6.769924] __x64_sys_finit_module+0x77/0x100 <4>[ 6.769929] x64_sys_call+0x24e3/0x2670 <4>[ 6.769932] do_syscall_64+0x91/0x180 <4>[ 6.769935] ? do_syscall_64+0x9d/0x180 <4>[ 6.769938] ? do_syscall_64+0x9d/0x180 <4>[ 6.769943] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.769945] RIP: 0033:0x78cf6112725d <4>[ 6.769947] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.769948] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.769950] RAX: ffffffffffffffda RBX: 000057e191fd3120 RCX: 000078cf6112725d <4>[ 6.769951] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000016 <4>[ 6.769953] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.769954] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.769955] R13: 0000000000020000 R14: 000057e1920c7d80 R15: 000057e1920c1960 <4>[ 6.769968] <4>[ 6.778686] kmemleak: Found object by alias at 0xffffffffa0499000 <4>[ 6.778692] CPU: 0 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.778695] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.778696] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.778696] Call Trace: <4>[ 6.778697] <4>[ 6.778699] dump_stack_lvl+0x91/0xf0 <4>[ 6.778703] dump_stack+0x10/0x20 <4>[ 6.778705] __lookup_object+0x90/0xa0 <4>[ 6.778709] __find_and_get_object+0x6c/0x190 <4>[ 6.778713] paint_ptr+0x1b/0xa0 <4>[ 6.778717] kmemleak_not_leak+0x33/0x70 <4>[ 6.778720] load_module+0xa20/0x2d10 <4>[ 6.778730] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.778735] ? kernel_read_file+0x2ac/0x330 <4>[ 6.778741] init_module_from_file+0x97/0xe0 <4>[ 6.778742] ? init_module_from_file+0x97/0xe0 <4>[ 6.778753] idempotent_init_module+0x134/0x350 <4>[ 6.778764] __x64_sys_finit_module+0x77/0x100 <4>[ 6.778768] x64_sys_call+0x24e3/0x2670 <4>[ 6.778770] do_syscall_64+0x91/0x180 <4>[ 6.778781] ? lock_acquire+0xc9/0x310 <4>[ 6.778784] ? find_held_lock+0x31/0x90 <4>[ 6.778787] ? __might_fault+0x53/0xb0 <4>[ 6.778790] ? lock_release+0xd3/0x2c0 <4>[ 6.778793] ? __might_fault+0x53/0xb0 <4>[ 6.778796] ? __seccomp_filter+0x379/0x580 <4>[ 6.778802] ? ext4_llseek+0xc0/0x120 <4>[ 6.778806] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.778810] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.778813] ? do_syscall_64+0x9d/0x180 <4>[ 6.778816] ? do_syscall_64+0x9d/0x180 <4>[ 6.778818] ? lock_release+0xd3/0x2c0 <4>[ 6.778823] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.778828] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.778831] ? irqentry_exit+0x77/0xb0 <4>[ 6.778834] ? exc_page_fault+0xb1/0x300 <4>[ 6.778838] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.778841] RIP: 0033:0x78cf6112725d <4>[ 6.778843] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.778844] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.778846] RAX: ffffffffffffffda RBX: 000057e1920c6030 RCX: 000078cf6112725d <4>[ 6.778847] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000023 <4>[ 6.778848] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.778849] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.778850] R13: 0000000000020000 R14: 000057e192033a60 R15: 000057e1920d58d0 <4>[ 6.778860] <5>[ 6.778861] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.778877] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.778879] kmemleak: min_count = 0 <5>[ 6.778880] kmemleak: count = 0 <5>[ 6.778881] kmemleak: flags = 0x1 <5>[ 6.778882] kmemleak: checksum = 0 <5>[ 6.778884] kmemleak: backtrace: <4>[ 6.778885] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.778888] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.778891] execmem_vmalloc+0x5a/0xf0 <4>[ 6.778894] execmem_alloc+0xc2/0x150 <4>[ 6.778897] load_module+0x9db/0x2d10 <4>[ 6.778899] init_module_from_file+0x97/0xe0 <4>[ 6.778901] idempotent_init_module+0x134/0x350 <4>[ 6.778903] __x64_sys_finit_module+0x77/0x100 <4>[ 6.778905] x64_sys_call+0x24e3/0x2670 <4>[ 6.778907] do_syscall_64+0x91/0x180 <4>[ 6.778910] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.778913] kmemleak: Trying to color unknown object at 0xffffffffa0499000 as Grey <4>[ 6.778917] CPU: 0 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.778919] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.778920] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.778920] Call Trace: <4>[ 6.778921] <4>[ 6.778922] dump_stack_lvl+0xc1/0xf0 <4>[ 6.778926] dump_stack+0x10/0x20 <4>[ 6.778928] paint_ptr+0x8d/0xa0 <4>[ 6.778932] kmemleak_not_leak+0x33/0x70 <4>[ 6.778936] load_module+0xa20/0x2d10 <4>[ 6.778949] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.778955] ? kernel_read_file+0x2ac/0x330 <4>[ 6.778962] init_module_from_file+0x97/0xe0 <4>[ 6.778964] ? init_module_from_file+0x97/0xe0 <4>[ 6.778977] idempotent_init_module+0x134/0x350 <4>[ 6.778992] __x64_sys_finit_module+0x77/0x100 <4>[ 6.778997] x64_sys_call+0x24e3/0x2670 <4>[ 6.779000] do_syscall_64+0x91/0x180 <4>[ 6.779014] ? lock_acquire+0xc9/0x310 <4>[ 6.779018] ? find_held_lock+0x31/0x90 <4>[ 6.779021] ? __might_fault+0x53/0xb0 <4>[ 6.779024] ? lock_release+0xd3/0x2c0 <4>[ 6.779028] ? __might_fault+0x53/0xb0 <4>[ 6.779032] ? __seccomp_filter+0x379/0x580 <4>[ 6.779040] ? ext4_llseek+0xc0/0x120 <4>[ 6.779045] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.779049] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.779054] ? do_syscall_64+0x9d/0x180 <4>[ 6.779058] ? do_syscall_64+0x9d/0x180 <4>[ 6.779060] ? lock_release+0xd3/0x2c0 <4>[ 6.779067] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.779073] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.779077] ? irqentry_exit+0x77/0xb0 <4>[ 6.779080] ? exc_page_fault+0xb1/0x300 <4>[ 6.779085] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.779088] RIP: 0033:0x78cf6112725d <4>[ 6.779090] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.779091] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.779093] RAX: ffffffffffffffda RBX: 000057e1920c6030 RCX: 000078cf6112725d <4>[ 6.779095] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000023 <4>[ 6.779096] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.779097] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.779098] R13: 0000000000020000 R14: 000057e192033a60 R15: 000057e1920d58d0 <4>[ 6.779111] <4>[ 6.779921] kmemleak: Found object by alias at 0xffffffffa049b000 <4>[ 6.779925] CPU: 5 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.779927] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.779928] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.779929] Call Trace: <4>[ 6.779929] <4>[ 6.779930] dump_stack_lvl+0x91/0xf0 <4>[ 6.779933] dump_stack+0x10/0x20 <4>[ 6.779935] __lookup_object+0x90/0xa0 <4>[ 6.779937] __find_and_get_object+0x6c/0x190 <4>[ 6.779941] paint_ptr+0x1b/0xa0 <4>[ 6.779944] kmemleak_not_leak+0x33/0x70 <4>[ 6.779946] load_module+0xa20/0x2d10 <4>[ 6.779954] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.779958] ? kernel_read_file+0x2ac/0x330 <4>[ 6.779963] init_module_from_file+0x97/0xe0 <4>[ 6.779964] ? init_module_from_file+0x97/0xe0 <4>[ 6.779972] idempotent_init_module+0x134/0x350 <4>[ 6.779980] __x64_sys_finit_module+0x77/0x100 <4>[ 6.779983] x64_sys_call+0x24e3/0x2670 <4>[ 6.779986] do_syscall_64+0x91/0x180 <4>[ 6.779988] ? do_syscall_64+0x9d/0x180 <4>[ 6.779990] ? do_sys_openat2+0xab/0xf0 <4>[ 6.779992] ? __seccomp_filter+0x379/0x580 <4>[ 6.779997] ? ext4_llseek+0xc0/0x120 <4>[ 6.780000] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.780003] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.780007] ? do_syscall_64+0x9d/0x180 <4>[ 6.780009] ? switch_fpu_return+0xe0/0x130 <4>[ 6.780013] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.780016] ? do_syscall_64+0x9d/0x180 <4>[ 6.780018] ? ext4_llseek+0xc0/0x120 <4>[ 6.780021] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.780023] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.780026] ? do_syscall_64+0x9d/0x180 <4>[ 6.780029] ? putname+0x60/0x80 <4>[ 6.780031] ? do_sys_openat2+0xab/0xf0 <4>[ 6.780035] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.780038] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.780041] ? do_syscall_64+0x9d/0x180 <4>[ 6.780043] ? irqentry_exit+0x77/0xb0 <4>[ 6.780045] ? exc_page_fault+0xb1/0x300 <4>[ 6.780048] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.780051] RIP: 0033:0x78cf6112725d <4>[ 6.780052] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.780053] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.780055] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.780056] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002a <4>[ 6.780057] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.780057] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.780058] R13: 0000000000020000 R14: 000057e1920c4790 R15: 000057e1920df960 <4>[ 6.780066] <5>[ 6.780066] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.780081] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.780083] kmemleak: min_count = 0 <5>[ 6.780084] kmemleak: count = 0 <5>[ 6.780085] kmemleak: flags = 0x1 <5>[ 6.780086] kmemleak: checksum = 0 <5>[ 6.780087] kmemleak: backtrace: <4>[ 6.780088] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.780091] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.780094] execmem_vmalloc+0x5a/0xf0 <4>[ 6.780096] execmem_alloc+0xc2/0x150 <4>[ 6.780099] load_module+0x9db/0x2d10 <4>[ 6.780101] init_module_from_file+0x97/0xe0 <4>[ 6.780102] idempotent_init_module+0x134/0x350 <4>[ 6.780104] __x64_sys_finit_module+0x77/0x100 <4>[ 6.780106] x64_sys_call+0x24e3/0x2670 <4>[ 6.780108] do_syscall_64+0x91/0x180 <4>[ 6.780111] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.780113] kmemleak: Trying to color unknown object at 0xffffffffa049b000 as Grey <4>[ 6.780115] CPU: 5 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.780117] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.780117] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.780118] Call Trace: <4>[ 6.780118] <4>[ 6.780119] dump_stack_lvl+0xc1/0xf0 <4>[ 6.780121] dump_stack+0x10/0x20 <4>[ 6.780123] paint_ptr+0x8d/0xa0 <4>[ 6.780125] kmemleak_not_leak+0x33/0x70 <4>[ 6.780127] load_module+0xa20/0x2d10 <4>[ 6.780134] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.780137] ? kernel_read_file+0x2ac/0x330 <4>[ 6.780141] init_module_from_file+0x97/0xe0 <4>[ 6.780142] ? init_module_from_file+0x97/0xe0 <4>[ 6.780149] idempotent_init_module+0x134/0x350 <4>[ 6.780159] __x64_sys_finit_module+0x77/0x100 <4>[ 6.780164] x64_sys_call+0x24e3/0x2670 <4>[ 6.780166] do_syscall_64+0x91/0x180 <4>[ 6.780169] ? do_syscall_64+0x9d/0x180 <4>[ 6.780172] ? do_sys_openat2+0xab/0xf0 <4>[ 6.780175] ? __seccomp_filter+0x379/0x580 <4>[ 6.780183] ? ext4_llseek+0xc0/0x120 <4>[ 6.780187] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.780192] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.780197] ? do_syscall_64+0x9d/0x180 <4>[ 6.780201] ? switch_fpu_return+0xe0/0x130 <4>[ 6.780205] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.780210] ? do_syscall_64+0x9d/0x180 <4>[ 6.780213] ? ext4_llseek+0xc0/0x120 <4>[ 6.780217] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.780222] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.780226] ? do_syscall_64+0x9d/0x180 <4>[ 6.780230] ? putname+0x60/0x80 <4>[ 6.780233] ? do_sys_openat2+0xab/0xf0 <4>[ 6.780239] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.780244] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.780248] ? do_syscall_64+0x9d/0x180 <4>[ 6.780250] ? irqentry_exit+0x77/0xb0 <4>[ 6.780253] ? exc_page_fault+0xb1/0x300 <4>[ 6.780258] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.780260] RIP: 0033:0x78cf6112725d <4>[ 6.780263] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.780264] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.780266] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.780267] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002a <4>[ 6.780268] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.780269] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.780270] R13: 0000000000020000 R14: 000057e1920c4790 R15: 000057e1920df960 <4>[ 6.780284] <4>[ 6.787674] kmemleak: Found object by alias at 0xffffffffa049c000 <4>[ 6.787680] CPU: 5 UID: 0 PID: 328 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.787683] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.787683] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.787684] Call Trace: <4>[ 6.787685] <4>[ 6.787686] dump_stack_lvl+0x91/0xf0 <4>[ 6.787691] dump_stack+0x10/0x20 <4>[ 6.787692] __lookup_object+0x90/0xa0 <4>[ 6.787696] __find_and_get_object+0x6c/0x190 <4>[ 6.787700] paint_ptr+0x1b/0xa0 <4>[ 6.787704] kmemleak_not_leak+0x33/0x70 <4>[ 6.787707] load_module+0xa20/0x2d10 <4>[ 6.787718] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.787723] ? kernel_read_file+0x2ac/0x330 <4>[ 6.787729] init_module_from_file+0x97/0xe0 <4>[ 6.787730] ? init_module_from_file+0x97/0xe0 <4>[ 6.787740] idempotent_init_module+0x134/0x350 <4>[ 6.787752] __x64_sys_finit_module+0x77/0x100 <4>[ 6.787756] x64_sys_call+0x24e3/0x2670 <4>[ 6.787759] do_syscall_64+0x91/0x180 <4>[ 6.787762] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.787767] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.787771] ? irqentry_exit+0x77/0xb0 <4>[ 6.787773] ? exc_page_fault+0xb1/0x300 <4>[ 6.787778] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.787780] RIP: 0033:0x78cf6112725d <4>[ 6.787783] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.787784] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.787786] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.787787] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000024 <4>[ 6.787788] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.787789] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.787790] R13: 0000000000020000 R14: 000057e1920c4790 R15: 000057e1920de880 <4>[ 6.787801] <5>[ 6.787802] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.787817] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.787819] kmemleak: min_count = 0 <5>[ 6.787820] kmemleak: count = 0 <5>[ 6.787822] kmemleak: flags = 0x1 <5>[ 6.787823] kmemleak: checksum = 0 <5>[ 6.787825] kmemleak: backtrace: <4>[ 6.787826] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.787829] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.787833] execmem_vmalloc+0x5a/0xf0 <4>[ 6.787836] execmem_alloc+0xc2/0x150 <4>[ 6.787839] load_module+0x9db/0x2d10 <4>[ 6.787842] init_module_from_file+0x97/0xe0 <4>[ 6.787844] idempotent_init_module+0x134/0x350 <4>[ 6.787846] __x64_sys_finit_module+0x77/0x100 <4>[ 6.787849] x64_sys_call+0x24e3/0x2670 <4>[ 6.787851] do_syscall_64+0x91/0x180 <4>[ 6.787854] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.787886] kmemleak: Trying to color unknown object at 0xffffffffa049c000 as Grey <4>[ 6.787890] CPU: 5 UID: 0 PID: 328 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.787892] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.787893] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.787894] Call Trace: <4>[ 6.787894] <4>[ 6.787896] dump_stack_lvl+0xc1/0xf0 <4>[ 6.787899] dump_stack+0x10/0x20 <4>[ 6.787902] paint_ptr+0x8d/0xa0 <4>[ 6.787906] kmemleak_not_leak+0x33/0x70 <4>[ 6.787909] load_module+0xa20/0x2d10 <4>[ 6.787922] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.787927] ? kernel_read_file+0x2ac/0x330 <4>[ 6.787935] init_module_from_file+0x97/0xe0 <4>[ 6.787937] ? init_module_from_file+0x97/0xe0 <4>[ 6.787951] idempotent_init_module+0x134/0x350 <4>[ 6.787965] __x64_sys_finit_module+0x77/0x100 <4>[ 6.787970] x64_sys_call+0x24e3/0x2670 <4>[ 6.787973] do_syscall_64+0x91/0x180 <4>[ 6.787976] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.787981] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.787985] ? irqentry_exit+0x77/0xb0 <4>[ 6.787988] ? exc_page_fault+0xb1/0x300 <4>[ 6.787994] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.787997] RIP: 0033:0x78cf6112725d <4>[ 6.787999] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.788000] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.788002] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.788003] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000024 <4>[ 6.788005] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.788006] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.788007] R13: 0000000000020000 R14: 000057e1920c4790 R15: 000057e1920de880 <4>[ 6.788020] <4>[ 6.788139] kmemleak: Found object by alias at 0xffffffffa044d000 <4>[ 6.788150] CPU: 5 UID: 0 PID: 328 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.788151] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.788152] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.788152] Call Trace: <4>[ 6.788153] <4>[ 6.788154] dump_stack_lvl+0x91/0xf0 <4>[ 6.788156] dump_stack+0x10/0x20 <4>[ 6.788157] __lookup_object+0x90/0xa0 <4>[ 6.788160] __find_and_get_object+0x6c/0x190 <4>[ 6.788163] paint_ptr+0x1b/0xa0 <4>[ 6.788166] kmemleak_not_leak+0x33/0x70 <4>[ 6.788168] load_module+0xa20/0x2d10 <4>[ 6.788176] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.788180] ? kernel_read_file+0x2ac/0x330 <4>[ 6.788184] init_module_from_file+0x97/0xe0 <4>[ 6.788185] ? init_module_from_file+0x97/0xe0 <4>[ 6.788193] idempotent_init_module+0x134/0x350 <4>[ 6.788202] __x64_sys_finit_module+0x77/0x100 <4>[ 6.788205] x64_sys_call+0x24e3/0x2670 <4>[ 6.788207] do_syscall_64+0x91/0x180 <4>[ 6.788209] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.788212] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.788215] ? irqentry_exit+0x77/0xb0 <4>[ 6.788217] ? exc_page_fault+0xb1/0x300 <4>[ 6.788221] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.788223] RIP: 0033:0x78cf6112725d <4>[ 6.788224] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.788225] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.788226] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.788227] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000024 <4>[ 6.788227] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.788228] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.788229] R13: 0000000000020000 R14: 000057e1920c4790 R15: 000057e1920de880 <4>[ 6.788236] <5>[ 6.788237] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.788247] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.788248] kmemleak: min_count = 0 <5>[ 6.788249] kmemleak: count = 0 <5>[ 6.788250] kmemleak: flags = 0x1 <5>[ 6.788252] kmemleak: checksum = 0 <5>[ 6.788253] kmemleak: backtrace: <4>[ 6.788254] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.788256] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.788259] execmem_vmalloc+0x5a/0xf0 <4>[ 6.788261] execmem_alloc+0xc2/0x150 <4>[ 6.788264] load_module+0x9db/0x2d10 <4>[ 6.788266] init_module_from_file+0x97/0xe0 <4>[ 6.788267] idempotent_init_module+0x134/0x350 <4>[ 6.788269] __x64_sys_finit_module+0x77/0x100 <4>[ 6.788271] x64_sys_call+0x24e3/0x2670 <4>[ 6.788273] do_syscall_64+0x91/0x180 <4>[ 6.788276] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.788294] kmemleak: Trying to color unknown object at 0xffffffffa044d000 as Grey <4>[ 6.788298] CPU: 5 UID: 0 PID: 328 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.788300] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.788300] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.788301] Call Trace: <4>[ 6.788302] <4>[ 6.788303] dump_stack_lvl+0xc1/0xf0 <4>[ 6.788306] dump_stack+0x10/0x20 <4>[ 6.788309] paint_ptr+0x8d/0xa0 <4>[ 6.788313] kmemleak_not_leak+0x33/0x70 <4>[ 6.788317] load_module+0xa20/0x2d10 <4>[ 6.788329] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.788334] ? kernel_read_file+0x2ac/0x330 <4>[ 6.788341] init_module_from_file+0x97/0xe0 <4>[ 6.788343] ? init_module_from_file+0x97/0xe0 <4>[ 6.788357] idempotent_init_module+0x134/0x350 <4>[ 6.788372] __x64_sys_finit_module+0x77/0x100 <4>[ 6.788377] x64_sys_call+0x24e3/0x2670 <4>[ 6.788380] do_syscall_64+0x91/0x180 <4>[ 6.788383] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.788388] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.788393] ? irqentry_exit+0x77/0xb0 <4>[ 6.788396] ? exc_page_fault+0xb1/0x300 <4>[ 6.788401] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.788404] RIP: 0033:0x78cf6112725d <4>[ 6.788405] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.788407] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.788409] RAX: ffffffffffffffda RBX: 000057e1920be3e0 RCX: 000078cf6112725d <4>[ 6.788410] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000024 <4>[ 6.788411] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.788412] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.788413] R13: 0000000000020000 R14: 000057e1920c4790 R15: 000057e1920de880 <4>[ 6.788421] <4>[ 6.788908] kmemleak: Found object by alias at 0xffffffffa04ad000 <4>[ 6.788912] CPU: 1 UID: 0 PID: 443 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.788915] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.788916] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.788917] Call Trace: <4>[ 6.788917] <4>[ 6.788919] dump_stack_lvl+0x91/0xf0 <4>[ 6.788923] dump_stack+0x10/0x20 <4>[ 6.788938] __lookup_object+0x90/0xa0 <4>[ 6.788941] __find_and_get_object+0x6c/0x190 <4>[ 6.788947] paint_ptr+0x1b/0xa0 <4>[ 6.788951] kmemleak_not_leak+0x33/0x70 <4>[ 6.788954] load_module+0xa20/0x2d10 <4>[ 6.788969] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.788975] ? kernel_read_file+0x2ac/0x330 <4>[ 6.788981] init_module_from_file+0x97/0xe0 <4>[ 6.788983] ? init_module_from_file+0x97/0xe0 <4>[ 6.788994] idempotent_init_module+0x134/0x350 <4>[ 6.789005] __x64_sys_finit_module+0x77/0x100 <4>[ 6.789008] x64_sys_call+0x24e3/0x2670 <4>[ 6.789010] do_syscall_64+0x91/0x180 <4>[ 6.789015] ? ext4_llseek+0xc0/0x120 <4>[ 6.789019] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.789023] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.789026] ? do_syscall_64+0x9d/0x180 <4>[ 6.789028] ? do_syscall_64+0x9d/0x180 <4>[ 6.789030] ? __might_fault+0x53/0xb0 <4>[ 6.789032] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.789038] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.789041] ? switch_fpu_return+0xe0/0x130 <4>[ 6.789045] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.789049] ? do_syscall_64+0x9d/0x180 <4>[ 6.789051] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.789055] ? irqentry_exit+0x77/0xb0 <4>[ 6.789057] ? exc_page_fault+0xb1/0x300 <4>[ 6.789061] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.789063] RIP: 0033:0x74c9bdd2725d <4>[ 6.789065] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.789066] RSP: 002b:00007fffd9e21ed8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.789067] RAX: ffffffffffffffda RBX: 000064593d706060 RCX: 000074c9bdd2725d <4>[ 6.789068] RDX: 0000000000000000 RSI: 000064591f393e52 RDI: 0000000000000000 <4>[ 6.789069] RBP: 00007fffd9e21f90 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.789070] R10: 000074c9bde03b20 R11: 0000000000000246 R12: 000064591f393e52 <4>[ 6.789070] R13: 0000000000040000 R14: 000064593d706100 R15: 0000000000000000 <4>[ 6.789080] <5>[ 6.789081] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.789096] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.789098] kmemleak: min_count = 0 <5>[ 6.789099] kmemleak: count = 0 <5>[ 6.789101] kmemleak: flags = 0x1 <5>[ 6.789102] kmemleak: checksum = 0 <5>[ 6.789103] kmemleak: backtrace: <4>[ 6.789104] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.789107] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.789110] execmem_vmalloc+0x5a/0xf0 <4>[ 6.789112] execmem_alloc+0xc2/0x150 <4>[ 6.789115] load_module+0x9db/0x2d10 <4>[ 6.789117] init_module_from_file+0x97/0xe0 <4>[ 6.789119] idempotent_init_module+0x134/0x350 <4>[ 6.789121] __x64_sys_finit_module+0x77/0x100 <4>[ 6.789123] x64_sys_call+0x24e3/0x2670 <4>[ 6.789125] do_syscall_64+0x91/0x180 <4>[ 6.789128] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.789130] kmemleak: Trying to color unknown object at 0xffffffffa04ad000 as Grey <4>[ 6.789133] CPU: 1 UID: 0 PID: 443 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.789135] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.789136] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.789137] Call Trace: <4>[ 6.789137] <4>[ 6.789139] dump_stack_lvl+0xc1/0xf0 <4>[ 6.789142] dump_stack+0x10/0x20 <4>[ 6.789144] paint_ptr+0x8d/0xa0 <4>[ 6.789148] kmemleak_not_leak+0x33/0x70 <4>[ 6.789151] load_module+0xa20/0x2d10 <4>[ 6.789164] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.789169] ? kernel_read_file+0x2ac/0x330 <4>[ 6.789176] init_module_from_file+0x97/0xe0 <4>[ 6.789178] ? init_module_from_file+0x97/0xe0 <4>[ 6.789191] idempotent_init_module+0x134/0x350 <4>[ 6.789204] __x64_sys_finit_module+0x77/0x100 <4>[ 6.789222] x64_sys_call+0x24e3/0x2670 <4>[ 6.789224] do_syscall_64+0x91/0x180 <4>[ 6.789230] ? ext4_llseek+0xc0/0x120 <4>[ 6.789234] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.789238] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.789243] ? do_syscall_64+0x9d/0x180 <4>[ 6.789245] ? do_syscall_64+0x9d/0x180 <4>[ 6.789247] ? __might_fault+0x53/0xb0 <4>[ 6.789250] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.789256] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.789260] ? switch_fpu_return+0xe0/0x130 <4>[ 6.789265] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.789269] ? do_syscall_64+0x9d/0x180 <4>[ 6.789273] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.789277] ? irqentry_exit+0x77/0xb0 <4>[ 6.789280] ? exc_page_fault+0xb1/0x300 <4>[ 6.789285] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.789287] RIP: 0033:0x74c9bdd2725d <4>[ 6.789289] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.789290] RSP: 002b:00007fffd9e21ed8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.789292] RAX: ffffffffffffffda RBX: 000064593d706060 RCX: 000074c9bdd2725d <4>[ 6.789293] RDX: 0000000000000000 RSI: 000064591f393e52 RDI: 0000000000000000 <4>[ 6.789294] RBP: 00007fffd9e21f90 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.789295] R10: 000074c9bde03b20 R11: 0000000000000246 R12: 000064591f393e52 <4>[ 6.789296] R13: 0000000000040000 R14: 000064593d706100 R15: 0000000000000000 <4>[ 6.789309] <4>[ 6.789320] kmemleak: Found object by alias at 0xffffffffa04ae000 <4>[ 6.789335] CPU: 2 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.789337] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.789337] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.789338] Call Trace: <4>[ 6.789339] <4>[ 6.789340] dump_stack_lvl+0x91/0xf0 <4>[ 6.789343] dump_stack+0x10/0x20 <4>[ 6.789344] __lookup_object+0x90/0xa0 <4>[ 6.789347] __find_and_get_object+0x6c/0x190 <4>[ 6.789350] paint_ptr+0x1b/0xa0 <4>[ 6.789353] kmemleak_not_leak+0x33/0x70 <4>[ 6.789355] load_module+0xa20/0x2d10 <4>[ 6.789363] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.789367] ? kernel_read_file+0x2ac/0x330 <4>[ 6.789372] init_module_from_file+0x97/0xe0 <4>[ 6.789373] ? init_module_from_file+0x97/0xe0 <4>[ 6.789381] idempotent_init_module+0x134/0x350 <4>[ 6.789389] __x64_sys_finit_module+0x77/0x100 <4>[ 6.789392] x64_sys_call+0x24e3/0x2670 <4>[ 6.789394] do_syscall_64+0x91/0x180 <4>[ 6.789397] ? do_syscall_64+0x9d/0x180 <4>[ 6.789398] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.789401] ? putname+0x60/0x80 <4>[ 6.789403] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.789406] ? switch_fpu_return+0xe0/0x130 <4>[ 6.789409] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.789412] ? do_syscall_64+0x9d/0x180 <4>[ 6.789415] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.789418] ? irqentry_exit+0x77/0xb0 <4>[ 6.789420] ? sysvec_reschedule_ipi+0xbd/0x220 <4>[ 6.789424] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.789426] RIP: 0033:0x78cf6112725d <4>[ 6.789428] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.789429] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.789430] RAX: ffffffffffffffda RBX: 000057e1920dfad0 RCX: 000078cf6112725d <4>[ 6.789431] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002b <4>[ 6.789432] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.789432] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.789433] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920dc820 <4>[ 6.789441] <5>[ 6.789441] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.789453] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.789455] kmemleak: min_count = 0 <5>[ 6.789456] kmemleak: count = 0 <5>[ 6.789457] kmemleak: flags = 0x1 <5>[ 6.789458] kmemleak: checksum = 0 <5>[ 6.789459] kmemleak: backtrace: <4>[ 6.789460] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.789463] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.789466] execmem_vmalloc+0x5a/0xf0 <4>[ 6.789468] execmem_alloc+0xc2/0x150 <4>[ 6.789471] load_module+0x9db/0x2d10 <4>[ 6.789473] init_module_from_file+0x97/0xe0 <4>[ 6.789474] idempotent_init_module+0x134/0x350 <4>[ 6.789476] __x64_sys_finit_module+0x77/0x100 <4>[ 6.789478] x64_sys_call+0x24e3/0x2670 <4>[ 6.789480] do_syscall_64+0x91/0x180 <4>[ 6.789483] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.789485] kmemleak: Trying to color unknown object at 0xffffffffa04ae000 as Grey <4>[ 6.789487] CPU: 2 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.789489] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.789490] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.789490] Call Trace: <4>[ 6.789490] <4>[ 6.789491] dump_stack_lvl+0xc1/0xf0 <4>[ 6.789493] dump_stack+0x10/0x20 <4>[ 6.789495] paint_ptr+0x8d/0xa0 <4>[ 6.789497] kmemleak_not_leak+0x33/0x70 <4>[ 6.789500] load_module+0xa20/0x2d10 <4>[ 6.789506] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.789510] ? kernel_read_file+0x2ac/0x330 <4>[ 6.789513] init_module_from_file+0x97/0xe0 <4>[ 6.789515] ? init_module_from_file+0x97/0xe0 <4>[ 6.789522] idempotent_init_module+0x134/0x350 <4>[ 6.789529] __x64_sys_finit_module+0x77/0x100 <4>[ 6.789532] x64_sys_call+0x24e3/0x2670 <4>[ 6.789534] do_syscall_64+0x91/0x180 <4>[ 6.789535] ? do_syscall_64+0x9d/0x180 <4>[ 6.789537] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.789540] ? putname+0x60/0x80 <4>[ 6.789544] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.789548] ? switch_fpu_return+0xe0/0x130 <4>[ 6.789553] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.789557] ? do_syscall_64+0x9d/0x180 <4>[ 6.789574] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.789578] ? irqentry_exit+0x77/0xb0 <4>[ 6.789581] ? sysvec_reschedule_ipi+0xbd/0x220 <4>[ 6.789585] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.789587] RIP: 0033:0x78cf6112725d <4>[ 6.789589] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.789590] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.789592] RAX: ffffffffffffffda RBX: 000057e1920dfad0 RCX: 000078cf6112725d <4>[ 6.789593] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002b <4>[ 6.789594] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.789595] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.789596] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920dc820 <4>[ 6.789608] <4>[ 6.789807] kmemleak: Found object by alias at 0xffffffffa04b1000 <4>[ 6.789811] CPU: 1 UID: 0 PID: 443 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.789826] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.789827] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.789828] Call Trace: <4>[ 6.789829] <4>[ 6.789830] dump_stack_lvl+0x91/0xf0 <4>[ 6.789834] dump_stack+0x10/0x20 <4>[ 6.789836] __lookup_object+0x90/0xa0 <4>[ 6.789839] __find_and_get_object+0x6c/0x190 <4>[ 6.789845] paint_ptr+0x1b/0xa0 <4>[ 6.789849] kmemleak_not_leak+0x33/0x70 <4>[ 6.789853] load_module+0xa20/0x2d10 <4>[ 6.789868] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.789873] ? kernel_read_file+0x2ac/0x330 <4>[ 6.789881] init_module_from_file+0x97/0xe0 <4>[ 6.789883] ? init_module_from_file+0x97/0xe0 <4>[ 6.789894] idempotent_init_module+0x134/0x350 <4>[ 6.789917] __x64_sys_finit_module+0x77/0x100 <4>[ 6.789921] x64_sys_call+0x24e3/0x2670 <4>[ 6.789923] do_syscall_64+0x91/0x180 <4>[ 6.789928] ? ext4_llseek+0xc0/0x120 <4>[ 6.789943] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.789947] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.789950] ? do_syscall_64+0x9d/0x180 <4>[ 6.789952] ? do_syscall_64+0x9d/0x180 <4>[ 6.789954] ? __might_fault+0x53/0xb0 <4>[ 6.789956] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.789961] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.789964] ? switch_fpu_return+0xe0/0x130 <4>[ 6.789968] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.789971] ? do_syscall_64+0x9d/0x180 <4>[ 6.789974] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.789978] ? irqentry_exit+0x77/0xb0 <4>[ 6.789980] ? exc_page_fault+0xb1/0x300 <4>[ 6.789984] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.789986] RIP: 0033:0x74c9bdd2725d <4>[ 6.789987] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.789988] RSP: 002b:00007fffd9e21ed8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.789990] RAX: ffffffffffffffda RBX: 000064593d706060 RCX: 000074c9bdd2725d <4>[ 6.789991] RDX: 0000000000000000 RSI: 000064591f393e52 RDI: 0000000000000000 <4>[ 6.789992] RBP: 00007fffd9e21f90 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.789992] R10: 000074c9bde03b20 R11: 0000000000000246 R12: 000064591f393e52 <4>[ 6.789993] R13: 0000000000040000 R14: 000064593d706100 R15: 0000000000000000 <4>[ 6.790003] <5>[ 6.790003] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.790019] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.790020] kmemleak: min_count = 0 <5>[ 6.790022] kmemleak: count = 0 <5>[ 6.790023] kmemleak: flags = 0x1 <5>[ 6.790024] kmemleak: checksum = 0 <5>[ 6.790025] kmemleak: backtrace: <4>[ 6.790027] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.790029] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.790032] execmem_vmalloc+0x5a/0xf0 <4>[ 6.790035] execmem_alloc+0xc2/0x150 <4>[ 6.790037] load_module+0x9db/0x2d10 <4>[ 6.790039] init_module_from_file+0x97/0xe0 <4>[ 6.790041] idempotent_init_module+0x134/0x350 <4>[ 6.790043] __x64_sys_finit_module+0x77/0x100 <4>[ 6.790045] x64_sys_call+0x24e3/0x2670 <4>[ 6.790047] do_syscall_64+0x91/0x180 <4>[ 6.790050] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.790053] kmemleak: Trying to color unknown object at 0xffffffffa04b1000 as Grey <4>[ 6.790056] CPU: 1 UID: 0 PID: 443 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.790058] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.790059] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.790060] Call Trace: <4>[ 6.790060] <4>[ 6.790062] dump_stack_lvl+0xc1/0xf0 <4>[ 6.790064] dump_stack+0x10/0x20 <4>[ 6.790066] paint_ptr+0x8d/0xa0 <4>[ 6.790069] kmemleak_not_leak+0x33/0x70 <4>[ 6.790071] load_module+0xa20/0x2d10 <4>[ 6.790093] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.790097] ? kernel_read_file+0x2ac/0x330 <4>[ 6.790102] init_module_from_file+0x97/0xe0 <4>[ 6.790103] ? init_module_from_file+0x97/0xe0 <4>[ 6.790112] idempotent_init_module+0x134/0x350 <4>[ 6.790122] __x64_sys_finit_module+0x77/0x100 <4>[ 6.790125] x64_sys_call+0x24e3/0x2670 <4>[ 6.790127] do_syscall_64+0x91/0x180 <4>[ 6.790132] ? ext4_llseek+0xc0/0x120 <4>[ 6.790135] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.790138] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.790141] ? do_syscall_64+0x9d/0x180 <4>[ 6.790144] ? do_syscall_64+0x9d/0x180 <4>[ 6.790145] ? __might_fault+0x53/0xb0 <4>[ 6.790147] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.790152] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.790155] ? switch_fpu_return+0xe0/0x130 <4>[ 6.790158] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.790161] ? do_syscall_64+0x9d/0x180 <4>[ 6.790164] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.790168] ? irqentry_exit+0x77/0xb0 <4>[ 6.790170] ? exc_page_fault+0xb1/0x300 <4>[ 6.790174] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.790175] RIP: 0033:0x74c9bdd2725d <4>[ 6.790177] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.790178] RSP: 002b:00007fffd9e21ed8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.790179] RAX: ffffffffffffffda RBX: 000064593d706060 RCX: 000074c9bdd2725d <4>[ 6.790180] RDX: 0000000000000000 RSI: 000064591f393e52 RDI: 0000000000000000 <4>[ 6.790180] RBP: 00007fffd9e21f90 R08: 0000000000000040 R09: 0000000000000002 <4>[ 6.790181] R10: 000074c9bde03b20 R11: 0000000000000246 R12: 000064591f393e52 <4>[ 6.790182] R13: 0000000000040000 R14: 000064593d706100 R15: 0000000000000000 <4>[ 6.790191] <4>[ 6.790200] kmemleak: Found object by alias at 0xffffffffa04b2000 <4>[ 6.790214] CPU: 2 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.790215] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.790216] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.790216] Call Trace: <4>[ 6.790217] <4>[ 6.790218] dump_stack_lvl+0x91/0xf0 <4>[ 6.790220] dump_stack+0x10/0x20 <4>[ 6.790221] __lookup_object+0x90/0xa0 <4>[ 6.790224] __find_and_get_object+0x6c/0x190 <4>[ 6.790227] paint_ptr+0x1b/0xa0 <4>[ 6.790230] kmemleak_not_leak+0x33/0x70 <4>[ 6.790232] load_module+0xa20/0x2d10 <4>[ 6.790240] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.790243] ? kernel_read_file+0x2ac/0x330 <4>[ 6.790248] init_module_from_file+0x97/0xe0 <4>[ 6.790249] ? init_module_from_file+0x97/0xe0 <4>[ 6.790257] idempotent_init_module+0x134/0x350 <4>[ 6.790265] __x64_sys_finit_module+0x77/0x100 <4>[ 6.790268] x64_sys_call+0x24e3/0x2670 <4>[ 6.790270] do_syscall_64+0x91/0x180 <4>[ 6.790272] ? do_syscall_64+0x9d/0x180 <4>[ 6.790274] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.790276] ? putname+0x60/0x80 <4>[ 6.790278] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.790281] ? switch_fpu_return+0xe0/0x130 <4>[ 6.790284] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.790287] ? do_syscall_64+0x9d/0x180 <4>[ 6.790290] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.790293] ? irqentry_exit+0x77/0xb0 <4>[ 6.790295] ? sysvec_reschedule_ipi+0xbd/0x220 <4>[ 6.790299] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.790300] RIP: 0033:0x78cf6112725d <4>[ 6.790302] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.790303] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.790304] RAX: ffffffffffffffda RBX: 000057e1920dfad0 RCX: 000078cf6112725d <4>[ 6.790305] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002b <4>[ 6.790305] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.790306] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.790306] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920dc820 <4>[ 6.790314] <5>[ 6.790314] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.790326] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.790328] kmemleak: min_count = 0 <5>[ 6.790329] kmemleak: count = 0 <5>[ 6.790330] kmemleak: flags = 0x1 <5>[ 6.790331] kmemleak: checksum = 0 <5>[ 6.790332] kmemleak: backtrace: <4>[ 6.790333] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.790336] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.790338] execmem_vmalloc+0x5a/0xf0 <4>[ 6.790341] execmem_alloc+0xc2/0x150 <4>[ 6.790343] load_module+0x9db/0x2d10 <4>[ 6.790345] init_module_from_file+0x97/0xe0 <4>[ 6.790347] idempotent_init_module+0x134/0x350 <4>[ 6.790349] __x64_sys_finit_module+0x77/0x100 <4>[ 6.790350] x64_sys_call+0x24e3/0x2670 <4>[ 6.790353] do_syscall_64+0x91/0x180 <4>[ 6.790355] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.790357] kmemleak: Trying to color unknown object at 0xffffffffa04b2000 as Grey <4>[ 6.790359] CPU: 2 UID: 0 PID: 348 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.790361] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.790361] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.790362] Call Trace: <4>[ 6.790362] <4>[ 6.790363] dump_stack_lvl+0xc1/0xf0 <4>[ 6.790365] dump_stack+0x10/0x20 <4>[ 6.790366] paint_ptr+0x8d/0xa0 <4>[ 6.790369] kmemleak_not_leak+0x33/0x70 <4>[ 6.790371] load_module+0xa20/0x2d10 <4>[ 6.790378] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.790381] ? kernel_read_file+0x2ac/0x330 <4>[ 6.790385] init_module_from_file+0x97/0xe0 <4>[ 6.790386] ? init_module_from_file+0x97/0xe0 <4>[ 6.790393] idempotent_init_module+0x134/0x350 <4>[ 6.790400] __x64_sys_finit_module+0x77/0x100 <4>[ 6.790403] x64_sys_call+0x24e3/0x2670 <4>[ 6.790405] do_syscall_64+0x91/0x180 <4>[ 6.790407] ? do_syscall_64+0x9d/0x180 <4>[ 6.790408] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 6.790411] ? putname+0x60/0x80 <4>[ 6.790413] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.790415] ? switch_fpu_return+0xe0/0x130 <4>[ 6.790418] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.790420] ? do_syscall_64+0x9d/0x180 <4>[ 6.790423] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.790426] ? irqentry_exit+0x77/0xb0 <4>[ 6.790428] ? sysvec_reschedule_ipi+0xbd/0x220 <4>[ 6.790431] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.790433] RIP: 0033:0x78cf6112725d <4>[ 6.790434] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.790435] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.790436] RAX: ffffffffffffffda RBX: 000057e1920dfad0 RCX: 000078cf6112725d <4>[ 6.790436] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002b <4>[ 6.790437] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.790438] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.790438] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920dc820 <4>[ 6.790445] <6>[ 6.791479] ipmi_si: IPMI System Interface driver <6>[ 6.792748] ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS <6>[ 6.792752] ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 <6>[ 6.792800] ipmi_si: Adding SMBIOS-specified kcs state machine <6>[ 6.793399] ipmi_si: Trying SMBIOS-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 <6>[ 6.794201] hid: raw HID events driver (C) Jiri Kosina <4>[ 6.796663] kmemleak: Found object by alias at 0xffffffffa04b3000 <4>[ 6.796667] CPU: 5 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.796670] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.796671] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.796672] Call Trace: <4>[ 6.796672] <4>[ 6.796673] dump_stack_lvl+0x91/0xf0 <4>[ 6.796677] dump_stack+0x10/0x20 <4>[ 6.796679] __lookup_object+0x90/0xa0 <4>[ 6.796683] __find_and_get_object+0x6c/0x190 <4>[ 6.796686] paint_ptr+0x1b/0xa0 <4>[ 6.796689] kmemleak_not_leak+0x33/0x70 <4>[ 6.796692] load_module+0xa20/0x2d10 <4>[ 6.796700] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.796704] ? kernel_read_file+0x2ac/0x330 <4>[ 6.796709] init_module_from_file+0x97/0xe0 <4>[ 6.796710] ? init_module_from_file+0x97/0xe0 <4>[ 6.796718] idempotent_init_module+0x134/0x350 <4>[ 6.796726] __x64_sys_finit_module+0x77/0x100 <4>[ 6.796729] x64_sys_call+0x24e3/0x2670 <4>[ 6.796732] do_syscall_64+0x91/0x180 <4>[ 6.796734] ? switch_fpu_return+0xe0/0x130 <4>[ 6.796738] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.796741] ? do_syscall_64+0x9d/0x180 <4>[ 6.796743] ? switch_fpu_return+0xe0/0x130 <4>[ 6.796746] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.796749] ? do_syscall_64+0x9d/0x180 <4>[ 6.796751] ? irqentry_exit+0x77/0xb0 <4>[ 6.796754] ? exc_page_fault+0xb1/0x300 <4>[ 6.796757] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.796759] RIP: 0033:0x78cf6112725d <4>[ 6.796761] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.796762] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.796764] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.796765] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000024 <4>[ 6.796766] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.796767] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.796768] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920d5910 <4>[ 6.796775] <5>[ 6.796776] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.796787] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.796789] kmemleak: min_count = 0 <5>[ 6.796790] kmemleak: count = 0 <5>[ 6.796791] kmemleak: flags = 0x1 <5>[ 6.796792] kmemleak: checksum = 0 <5>[ 6.796793] kmemleak: backtrace: <4>[ 6.796795] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.796797] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.796800] execmem_vmalloc+0x5a/0xf0 <4>[ 6.796803] execmem_alloc+0xc2/0x150 <4>[ 6.796806] load_module+0x9db/0x2d10 <4>[ 6.796807] init_module_from_file+0x97/0xe0 <4>[ 6.796809] idempotent_init_module+0x134/0x350 <4>[ 6.796811] __x64_sys_finit_module+0x77/0x100 <4>[ 6.796813] x64_sys_call+0x24e3/0x2670 <4>[ 6.796815] do_syscall_64+0x91/0x180 <4>[ 6.796817] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.796820] kmemleak: Trying to color unknown object at 0xffffffffa04b3000 as Grey <4>[ 6.796822] CPU: 5 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.796824] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.796824] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.796825] Call Trace: <4>[ 6.796825] <4>[ 6.796826] dump_stack_lvl+0xc1/0xf0 <4>[ 6.796828] dump_stack+0x10/0x20 <4>[ 6.796829] paint_ptr+0x8d/0xa0 <4>[ 6.796832] kmemleak_not_leak+0x33/0x70 <4>[ 6.796834] load_module+0xa20/0x2d10 <4>[ 6.796843] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.796846] ? kernel_read_file+0x2ac/0x330 <4>[ 6.796850] init_module_from_file+0x97/0xe0 <4>[ 6.796851] ? init_module_from_file+0x97/0xe0 <4>[ 6.796858] idempotent_init_module+0x134/0x350 <4>[ 6.796865] __x64_sys_finit_module+0x77/0x100 <4>[ 6.796868] x64_sys_call+0x24e3/0x2670 <4>[ 6.796870] do_syscall_64+0x91/0x180 <4>[ 6.796872] ? switch_fpu_return+0xe0/0x130 <4>[ 6.796875] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.796878] ? do_syscall_64+0x9d/0x180 <4>[ 6.796879] ? switch_fpu_return+0xe0/0x130 <4>[ 6.796882] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.796885] ? do_syscall_64+0x9d/0x180 <4>[ 6.796888] ? irqentry_exit+0x77/0xb0 <4>[ 6.796890] ? exc_page_fault+0xb1/0x300 <4>[ 6.796893] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.796894] RIP: 0033:0x78cf6112725d <4>[ 6.796896] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.796896] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.796898] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.796898] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000024 <4>[ 6.796899] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.796899] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.796900] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920d5910 <4>[ 6.796913] <4>[ 6.797025] kmemleak: Found object by alias at 0xffffffffa046e000 <4>[ 6.797037] CPU: 5 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.797039] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.797039] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.797040] Call Trace: <4>[ 6.797040] <4>[ 6.797041] dump_stack_lvl+0x91/0xf0 <4>[ 6.797044] dump_stack+0x10/0x20 <4>[ 6.797045] __lookup_object+0x90/0xa0 <4>[ 6.797048] __find_and_get_object+0x6c/0x190 <4>[ 6.797051] paint_ptr+0x1b/0xa0 <4>[ 6.797054] kmemleak_not_leak+0x33/0x70 <4>[ 6.797057] load_module+0xa20/0x2d10 <4>[ 6.797065] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.797068] ? kernel_read_file+0x2ac/0x330 <4>[ 6.797072] init_module_from_file+0x97/0xe0 <4>[ 6.797074] ? init_module_from_file+0x97/0xe0 <4>[ 6.797082] idempotent_init_module+0x134/0x350 <4>[ 6.797090] __x64_sys_finit_module+0x77/0x100 <4>[ 6.797093] x64_sys_call+0x24e3/0x2670 <4>[ 6.797095] do_syscall_64+0x91/0x180 <4>[ 6.797097] ? switch_fpu_return+0xe0/0x130 <4>[ 6.797101] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.797104] ? do_syscall_64+0x9d/0x180 <4>[ 6.797105] ? switch_fpu_return+0xe0/0x130 <4>[ 6.797108] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.797112] ? do_syscall_64+0x9d/0x180 <4>[ 6.797114] ? irqentry_exit+0x77/0xb0 <4>[ 6.797116] ? exc_page_fault+0xb1/0x300 <4>[ 6.797120] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.797122] RIP: 0033:0x78cf6112725d <4>[ 6.797123] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.797124] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.797125] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.797126] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000024 <4>[ 6.797126] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.797127] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.797128] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920d5910 <4>[ 6.797135] <5>[ 6.797136] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.797147] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.797148] kmemleak: min_count = 0 <5>[ 6.797149] kmemleak: count = 0 <5>[ 6.797151] kmemleak: flags = 0x1 <5>[ 6.797152] kmemleak: checksum = 0 <5>[ 6.797153] kmemleak: backtrace: <4>[ 6.797154] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.797156] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.797159] execmem_vmalloc+0x5a/0xf0 <4>[ 6.797162] execmem_alloc+0xc2/0x150 <4>[ 6.797164] load_module+0x9db/0x2d10 <4>[ 6.797166] init_module_from_file+0x97/0xe0 <4>[ 6.797168] idempotent_init_module+0x134/0x350 <4>[ 6.797169] __x64_sys_finit_module+0x77/0x100 <4>[ 6.797171] x64_sys_call+0x24e3/0x2670 <4>[ 6.797173] do_syscall_64+0x91/0x180 <4>[ 6.797176] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.797178] kmemleak: Trying to color unknown object at 0xffffffffa046e000 as Grey <4>[ 6.797180] CPU: 5 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.797182] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.797182] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.797183] Call Trace: <4>[ 6.797183] <4>[ 6.797184] dump_stack_lvl+0xc1/0xf0 <4>[ 6.797186] dump_stack+0x10/0x20 <4>[ 6.797187] paint_ptr+0x8d/0xa0 <4>[ 6.797190] kmemleak_not_leak+0x33/0x70 <4>[ 6.797192] load_module+0xa20/0x2d10 <4>[ 6.797199] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.797202] ? kernel_read_file+0x2ac/0x330 <4>[ 6.797206] init_module_from_file+0x97/0xe0 <4>[ 6.797207] ? init_module_from_file+0x97/0xe0 <4>[ 6.797214] idempotent_init_module+0x134/0x350 <4>[ 6.797221] __x64_sys_finit_module+0x77/0x100 <4>[ 6.797224] x64_sys_call+0x24e3/0x2670 <4>[ 6.797226] do_syscall_64+0x91/0x180 <4>[ 6.797228] ? switch_fpu_return+0xe0/0x130 <4>[ 6.797231] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.797234] ? do_syscall_64+0x9d/0x180 <4>[ 6.797235] ? switch_fpu_return+0xe0/0x130 <4>[ 6.797238] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.797241] ? do_syscall_64+0x9d/0x180 <4>[ 6.797244] ? irqentry_exit+0x77/0xb0 <4>[ 6.797246] ? exc_page_fault+0xb1/0x300 <4>[ 6.797249] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.797251] RIP: 0033:0x78cf6112725d <4>[ 6.797252] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.797252] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.797253] RAX: ffffffffffffffda RBX: 000057e1920c3120 RCX: 000078cf6112725d <4>[ 6.797254] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000024 <4>[ 6.797254] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.797255] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.797256] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920d5910 <4>[ 6.797262] <4>[ 6.797677] kmemleak: Found object by alias at 0xffffffffa04b4000 <4>[ 6.797680] CPU: 4 UID: 0 PID: 328 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.797682] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.797683] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.797684] Call Trace: <4>[ 6.797684] <4>[ 6.797685] dump_stack_lvl+0x91/0xf0 <4>[ 6.797688] dump_stack+0x10/0x20 <4>[ 6.797689] __lookup_object+0x90/0xa0 <4>[ 6.797694] __find_and_get_object+0x6c/0x190 <4>[ 6.797699] paint_ptr+0x1b/0xa0 <4>[ 6.797704] kmemleak_not_leak+0x33/0x70 <4>[ 6.797707] load_module+0xa20/0x2d10 <4>[ 6.797722] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.797726] ? kernel_read_file+0x2ac/0x330 <4>[ 6.797732] init_module_from_file+0x97/0xe0 <4>[ 6.797733] ? init_module_from_file+0x97/0xe0 <4>[ 6.797744] idempotent_init_module+0x134/0x350 <4>[ 6.797755] __x64_sys_finit_module+0x77/0x100 <4>[ 6.797758] x64_sys_call+0x24e3/0x2670 <4>[ 6.797761] do_syscall_64+0x91/0x180 <4>[ 6.797763] ? irqentry_exit+0x77/0xb0 <4>[ 6.797766] ? exc_page_fault+0xb1/0x300 <4>[ 6.797770] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.797772] RIP: 0033:0x78cf6112725d <4>[ 6.797774] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.797775] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.797777] RAX: ffffffffffffffda RBX: 000057e1920dc030 RCX: 000078cf6112725d <4>[ 6.797778] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.797779] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.797779] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.797780] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920de8c0 <4>[ 6.797790] <5>[ 6.797791] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.797803] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.797805] kmemleak: min_count = 0 <5>[ 6.797806] kmemleak: count = 0 <5>[ 6.797808] kmemleak: flags = 0x1 <5>[ 6.797809] kmemleak: checksum = 0 <5>[ 6.797810] kmemleak: backtrace: <4>[ 6.797811] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.797814] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.797817] execmem_vmalloc+0x5a/0xf0 <4>[ 6.797820] execmem_alloc+0xc2/0x150 <4>[ 6.797823] load_module+0x9db/0x2d10 <4>[ 6.797825] init_module_from_file+0x97/0xe0 <4>[ 6.797827] idempotent_init_module+0x134/0x350 <4>[ 6.797829] __x64_sys_finit_module+0x77/0x100 <4>[ 6.797831] x64_sys_call+0x24e3/0x2670 <4>[ 6.797833] do_syscall_64+0x91/0x180 <4>[ 6.797836] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.797838] kmemleak: Trying to color unknown object at 0xffffffffa04b4000 as Grey <4>[ 6.797841] CPU: 4 UID: 0 PID: 328 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.797843] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.797844] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.797845] Call Trace: <4>[ 6.797845] <4>[ 6.797846] dump_stack_lvl+0xc1/0xf0 <4>[ 6.797850] dump_stack+0x10/0x20 <4>[ 6.797852] paint_ptr+0x8d/0xa0 <4>[ 6.797856] kmemleak_not_leak+0x33/0x70 <4>[ 6.797859] load_module+0xa20/0x2d10 <4>[ 6.797873] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.797878] ? kernel_read_file+0x2ac/0x330 <4>[ 6.797885] init_module_from_file+0x97/0xe0 <4>[ 6.797887] ? init_module_from_file+0x97/0xe0 <4>[ 6.797901] idempotent_init_module+0x134/0x350 <4>[ 6.797915] __x64_sys_finit_module+0x77/0x100 <4>[ 6.797920] x64_sys_call+0x24e3/0x2670 <4>[ 6.797923] do_syscall_64+0x91/0x180 <4>[ 6.797926] ? irqentry_exit+0x77/0xb0 <4>[ 6.797929] ? exc_page_fault+0xb1/0x300 <4>[ 6.797935] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.797937] RIP: 0033:0x78cf6112725d <4>[ 6.797939] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.797940] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.797942] RAX: ffffffffffffffda RBX: 000057e1920dc030 RCX: 000078cf6112725d <4>[ 6.797943] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.797944] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.797945] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.797946] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920de8c0 <4>[ 6.797959] <4>[ 6.798085] kmemleak: Found object by alias at 0xffffffffa04bd000 <4>[ 6.798095] CPU: 4 UID: 0 PID: 328 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.798097] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.798097] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.798098] Call Trace: <4>[ 6.798098] <4>[ 6.798099] dump_stack_lvl+0x91/0xf0 <4>[ 6.798101] dump_stack+0x10/0x20 <4>[ 6.798103] __lookup_object+0x90/0xa0 <4>[ 6.798105] __find_and_get_object+0x6c/0x190 <4>[ 6.798108] paint_ptr+0x1b/0xa0 <4>[ 6.798111] kmemleak_not_leak+0x33/0x70 <4>[ 6.798113] load_module+0xa20/0x2d10 <4>[ 6.798121] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.798125] ? kernel_read_file+0x2ac/0x330 <4>[ 6.798129] init_module_from_file+0x97/0xe0 <4>[ 6.798130] ? init_module_from_file+0x97/0xe0 <4>[ 6.798138] idempotent_init_module+0x134/0x350 <4>[ 6.798146] __x64_sys_finit_module+0x77/0x100 <4>[ 6.798149] x64_sys_call+0x24e3/0x2670 <4>[ 6.798151] do_syscall_64+0x91/0x180 <4>[ 6.798154] ? irqentry_exit+0x77/0xb0 <4>[ 6.798156] ? exc_page_fault+0xb1/0x300 <4>[ 6.798159] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.798161] RIP: 0033:0x78cf6112725d <4>[ 6.798162] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.798163] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.798164] RAX: ffffffffffffffda RBX: 000057e1920dc030 RCX: 000078cf6112725d <4>[ 6.798165] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.798166] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.798166] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.798167] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920de8c0 <4>[ 6.798175] <5>[ 6.798175] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.798185] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.798186] kmemleak: min_count = 0 <5>[ 6.798187] kmemleak: count = 0 <5>[ 6.798188] kmemleak: flags = 0x1 <5>[ 6.798190] kmemleak: checksum = 0 <5>[ 6.798191] kmemleak: backtrace: <4>[ 6.798192] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.798194] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.798197] execmem_vmalloc+0x5a/0xf0 <4>[ 6.798199] execmem_alloc+0xc2/0x150 <4>[ 6.798202] load_module+0x9db/0x2d10 <4>[ 6.798204] init_module_from_file+0x97/0xe0 <4>[ 6.798205] idempotent_init_module+0x134/0x350 <4>[ 6.798207] __x64_sys_finit_module+0x77/0x100 <4>[ 6.798209] x64_sys_call+0x24e3/0x2670 <4>[ 6.798211] do_syscall_64+0x91/0x180 <4>[ 6.798213] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.798216] kmemleak: Trying to color unknown object at 0xffffffffa04bd000 as Grey <4>[ 6.798218] CPU: 4 UID: 0 PID: 328 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.798219] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.798220] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.798220] Call Trace: <4>[ 6.798220] <4>[ 6.798221] dump_stack_lvl+0xc1/0xf0 <4>[ 6.798223] dump_stack+0x10/0x20 <4>[ 6.798224] paint_ptr+0x8d/0xa0 <4>[ 6.798227] kmemleak_not_leak+0x33/0x70 <4>[ 6.798229] load_module+0xa20/0x2d10 <4>[ 6.798236] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.798239] ? kernel_read_file+0x2ac/0x330 <4>[ 6.798243] init_module_from_file+0x97/0xe0 <4>[ 6.798244] ? init_module_from_file+0x97/0xe0 <4>[ 6.798251] idempotent_init_module+0x134/0x350 <4>[ 6.798258] __x64_sys_finit_module+0x77/0x100 <4>[ 6.798261] x64_sys_call+0x24e3/0x2670 <4>[ 6.798263] do_syscall_64+0x91/0x180 <4>[ 6.798265] ? irqentry_exit+0x77/0xb0 <4>[ 6.798267] ? exc_page_fault+0xb1/0x300 <4>[ 6.798271] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.798272] RIP: 0033:0x78cf6112725d <4>[ 6.798273] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.798274] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.798275] RAX: ffffffffffffffda RBX: 000057e1920dc030 RCX: 000078cf6112725d <4>[ 6.798276] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.798276] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.798277] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.798277] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920de8c0 <4>[ 6.798284] <4>[ 6.811886] kmemleak: Found object by alias at 0xffffffffa044d000 <4>[ 6.811892] CPU: 5 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.811895] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.811895] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.811896] Call Trace: <4>[ 6.811897] <4>[ 6.811898] dump_stack_lvl+0x91/0xf0 <4>[ 6.811903] dump_stack+0x10/0x20 <4>[ 6.811905] __lookup_object+0x90/0xa0 <4>[ 6.811909] __find_and_get_object+0x6c/0x190 <4>[ 6.811913] paint_ptr+0x1b/0xa0 <4>[ 6.811916] kmemleak_not_leak+0x33/0x70 <4>[ 6.811919] load_module+0xa20/0x2d10 <4>[ 6.811930] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.811935] ? kernel_read_file+0x2ac/0x330 <4>[ 6.811940] init_module_from_file+0x97/0xe0 <4>[ 6.811942] ? init_module_from_file+0x97/0xe0 <4>[ 6.811952] idempotent_init_module+0x134/0x350 <4>[ 6.811963] __x64_sys_finit_module+0x77/0x100 <4>[ 6.811967] x64_sys_call+0x24e3/0x2670 <4>[ 6.811970] do_syscall_64+0x91/0x180 <4>[ 6.811975] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.811979] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.811983] ? irqentry_exit+0x77/0xb0 <4>[ 6.811985] ? exc_page_fault+0xb1/0x300 <4>[ 6.811990] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.811992] RIP: 0033:0x78cf6112725d <4>[ 6.811994] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.811996] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.811997] RAX: ffffffffffffffda RBX: 000057e1920e3710 RCX: 000078cf6112725d <4>[ 6.811998] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002d <4>[ 6.811999] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 6.812000] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.812001] R13: 0000000000020000 R14: 000057e1920be3e0 R15: 000057e1920de9a0 <4>[ 6.812011] <5>[ 6.812011] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.812024] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.812026] kmemleak: min_count = 0 <5>[ 6.812027] kmemleak: count = 0 <5>[ 6.812029] kmemleak: flags = 0x1 <5>[ 6.812030] kmemleak: checksum = 0 <5>[ 6.812031] kmemleak: backtrace: <4>[ 6.812033] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.812035] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.812039] execmem_vmalloc+0x5a/0xf0 <4>[ 6.812042] execmem_alloc+0xc2/0x150 <4>[ 6.812044] load_module+0x9db/0x2d10 <4>[ 6.812046] init_module_from_file+0x97/0xe0 <4>[ 6.812048] idempotent_init_module+0x134/0x350 <4>[ 6.812051] __x64_sys_finit_module+0x77/0x100 <4>[ 6.812053] x64_sys_call+0x24e3/0x2670 <4>[ 6.812055] do_syscall_64+0x91/0x180 <4>[ 6.812057] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.812060] kmemleak: Trying to color unknown object at 0xffffffffa044d000 as Grey <4>[ 6.812064] CPU: 5 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.812066] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.812067] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.812068] Call Trace: <4>[ 6.812068] <4>[ 6.812069] dump_stack_lvl+0xc1/0xf0 <4>[ 6.812073] dump_stack+0x10/0x20 <4>[ 6.812075] paint_ptr+0x8d/0xa0 <4>[ 6.812079] kmemleak_not_leak+0x33/0x70 <4>[ 6.812082] load_module+0xa20/0x2d10 <4>[ 6.812096] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.812102] ? kernel_read_file+0x2ac/0x330 <4>[ 6.812109] init_module_from_file+0x97/0xe0 <4>[ 6.812110] ? init_module_from_file+0x97/0xe0 <4>[ 6.812124] idempotent_init_module+0x134/0x350 <4>[ 6.812139] __x64_sys_finit_module+0x77/0x100 <4>[ 6.812144] x64_sys_call+0x24e3/0x2670 <4>[ 6.812147] do_syscall_64+0x91/0x180 <4>[ 6.812152] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.812156] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.812159] ? irqentry_exit+0x77/0xb0 <4>[ 6.812161] ? exc_page_fault+0xb1/0x300 <4>[ 6.812164] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.812166] RIP: 0033:0x78cf6112725d <4>[ 6.812167] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.812168] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.812169] RAX: ffffffffffffffda RBX: 000057e1920e3710 RCX: 000078cf6112725d <4>[ 6.812170] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002d <4>[ 6.812170] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 6.812171] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.812171] R13: 0000000000020000 R14: 000057e1920be3e0 R15: 000057e1920de9a0 <4>[ 6.812178] <4>[ 6.812254] kmemleak: Found object by alias at 0xffffffffa04be000 <4>[ 6.812265] CPU: 5 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.812266] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.812267] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.812267] Call Trace: <4>[ 6.812268] <4>[ 6.812269] dump_stack_lvl+0x91/0xf0 <4>[ 6.812271] dump_stack+0x10/0x20 <4>[ 6.812272] __lookup_object+0x90/0xa0 <4>[ 6.812275] __find_and_get_object+0x6c/0x190 <4>[ 6.812278] paint_ptr+0x1b/0xa0 <4>[ 6.812281] kmemleak_not_leak+0x33/0x70 <4>[ 6.812284] load_module+0xa20/0x2d10 <4>[ 6.812291] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.812295] ? kernel_read_file+0x2ac/0x330 <4>[ 6.812299] init_module_from_file+0x97/0xe0 <4>[ 6.812300] ? init_module_from_file+0x97/0xe0 <4>[ 6.812308] idempotent_init_module+0x134/0x350 <4>[ 6.812317] __x64_sys_finit_module+0x77/0x100 <4>[ 6.812320] x64_sys_call+0x24e3/0x2670 <4>[ 6.812322] do_syscall_64+0x91/0x180 <4>[ 6.812326] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.812329] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.812332] ? irqentry_exit+0x77/0xb0 <4>[ 6.812334] ? exc_page_fault+0xb1/0x300 <4>[ 6.812338] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.812339] RIP: 0033:0x78cf6112725d <4>[ 6.812340] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.812341] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.812342] RAX: ffffffffffffffda RBX: 000057e1920e3710 RCX: 000078cf6112725d <4>[ 6.812343] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002d <4>[ 6.812344] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 6.812344] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.812345] R13: 0000000000020000 R14: 000057e1920be3e0 R15: 000057e1920de9a0 <4>[ 6.812352] <5>[ 6.812353] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.812363] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.812365] kmemleak: min_count = 0 <5>[ 6.812366] kmemleak: count = 0 <5>[ 6.812367] kmemleak: flags = 0x1 <5>[ 6.812368] kmemleak: checksum = 0 <5>[ 6.812369] kmemleak: backtrace: <4>[ 6.812370] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.812372] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.812375] execmem_vmalloc+0x5a/0xf0 <4>[ 6.812378] execmem_alloc+0xc2/0x150 <4>[ 6.812380] load_module+0x9db/0x2d10 <4>[ 6.812382] init_module_from_file+0x97/0xe0 <4>[ 6.812384] idempotent_init_module+0x134/0x350 <4>[ 6.812385] __x64_sys_finit_module+0x77/0x100 <4>[ 6.812387] x64_sys_call+0x24e3/0x2670 <4>[ 6.812389] do_syscall_64+0x91/0x180 <4>[ 6.812392] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.812394] kmemleak: Trying to color unknown object at 0xffffffffa04be000 as Grey <4>[ 6.812396] CPU: 5 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.812397] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.812398] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.812398] Call Trace: <4>[ 6.812399] <4>[ 6.812399] dump_stack_lvl+0xc1/0xf0 <4>[ 6.812401] dump_stack+0x10/0x20 <4>[ 6.812403] paint_ptr+0x8d/0xa0 <4>[ 6.812406] kmemleak_not_leak+0x33/0x70 <4>[ 6.812408] load_module+0xa20/0x2d10 <4>[ 6.812414] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.812418] ? kernel_read_file+0x2ac/0x330 <4>[ 6.812422] init_module_from_file+0x97/0xe0 <4>[ 6.812423] ? init_module_from_file+0x97/0xe0 <4>[ 6.812430] idempotent_init_module+0x134/0x350 <4>[ 6.812437] __x64_sys_finit_module+0x77/0x100 <4>[ 6.812440] x64_sys_call+0x24e3/0x2670 <4>[ 6.812442] do_syscall_64+0x91/0x180 <4>[ 6.812445] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.812448] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.812451] ? irqentry_exit+0x77/0xb0 <4>[ 6.812453] ? exc_page_fault+0xb1/0x300 <4>[ 6.812457] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.812458] RIP: 0033:0x78cf6112725d <4>[ 6.812459] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.812460] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.812461] RAX: ffffffffffffffda RBX: 000057e1920e3710 RCX: 000078cf6112725d <4>[ 6.812461] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002d <4>[ 6.812462] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 6.812463] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.812463] R13: 0000000000020000 R14: 000057e1920be3e0 R15: 000057e1920de9a0 <4>[ 6.812470] <6>[ 6.815561] dca service started, version 1.12.1 <6>[ 6.817949] i801_smbus 0000:00:1f.4: enabling device (0000 -> 0003) <6>[ 6.819468] i801_smbus 0000:00:1f.4: SPD Write Disable is set <6>[ 6.820179] i801_smbus 0000:00:1f.4: SMBus using PCI interrupt <6>[ 6.863992] usbcore: registered new interface driver usbhid <6>[ 6.863998] usbhid: USB HID core driver <6>[ 6.879087] i2c i2c-0: Successfully instantiated SPD at 0x51 <6>[ 6.881864] i2c i2c-0: Successfully instantiated SPD at 0x53 <4>[ 6.883588] kmemleak: Found object by alias at 0xffffffffa04b1000 <4>[ 6.883594] CPU: 1 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.883597] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.883598] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.883599] Call Trace: <4>[ 6.883599] <4>[ 6.883601] dump_stack_lvl+0x91/0xf0 <4>[ 6.883605] dump_stack+0x10/0x20 <4>[ 6.883607] __lookup_object+0x90/0xa0 <4>[ 6.883611] __find_and_get_object+0x6c/0x190 <4>[ 6.883615] paint_ptr+0x1b/0xa0 <4>[ 6.883618] kmemleak_not_leak+0x33/0x70 <4>[ 6.883621] load_module+0xa20/0x2d10 <4>[ 6.883632] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.883637] ? kernel_read_file+0x2ac/0x330 <4>[ 6.883642] init_module_from_file+0x97/0xe0 <4>[ 6.883644] ? init_module_from_file+0x97/0xe0 <4>[ 6.883654] idempotent_init_module+0x134/0x350 <4>[ 6.883665] __x64_sys_finit_module+0x77/0x100 <4>[ 6.883669] x64_sys_call+0x24e3/0x2670 <4>[ 6.883672] do_syscall_64+0x91/0x180 <4>[ 6.883674] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.883678] ? do_syscall_64+0x9d/0x180 <4>[ 6.883680] ? do_syscall_64+0x9d/0x180 <4>[ 6.883683] ? __lock_acquire+0x437/0x2600 <4>[ 6.883690] ? reacquire_held_locks+0xe3/0x210 <4>[ 6.883692] ? do_user_addr_fault+0x5e6/0x9d0 <4>[ 6.883699] ? find_held_lock+0x31/0x90 <4>[ 6.883701] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.883705] ? lock_release+0xd3/0x2c0 <4>[ 6.883710] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.883714] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.883717] ? irqentry_exit+0x77/0xb0 <4>[ 6.883720] ? exc_page_fault+0xb1/0x300 <4>[ 6.883724] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.883726] RIP: 0033:0x78cf6112725d <4>[ 6.883729] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.883730] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.883732] RAX: ffffffffffffffda RBX: 000057e1920e3d00 RCX: 000078cf6112725d <4>[ 6.883733] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002e <4>[ 6.883734] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 6.883735] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.883735] R13: 0000000000020000 R14: 000057e1920dd860 R15: 000057e1920e0210 <4>[ 6.883745] <5>[ 6.883746] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.883761] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.883763] kmemleak: min_count = 0 <5>[ 6.883765] kmemleak: count = 0 <5>[ 6.883766] kmemleak: flags = 0x1 <5>[ 6.883767] kmemleak: checksum = 0 <5>[ 6.883768] kmemleak: backtrace: <4>[ 6.883770] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.883773] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.883776] execmem_vmalloc+0x5a/0xf0 <4>[ 6.883779] execmem_alloc+0xc2/0x150 <4>[ 6.883782] load_module+0x9db/0x2d10 <4>[ 6.883784] init_module_from_file+0x97/0xe0 <4>[ 6.883786] idempotent_init_module+0x134/0x350 <4>[ 6.883788] __x64_sys_finit_module+0x77/0x100 <4>[ 6.883790] x64_sys_call+0x24e3/0x2670 <4>[ 6.883792] do_syscall_64+0x91/0x180 <4>[ 6.883795] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.883798] kmemleak: Trying to color unknown object at 0xffffffffa04b1000 as Grey <4>[ 6.883801] CPU: 1 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.883803] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.883804] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.883804] Call Trace: <4>[ 6.883805] <4>[ 6.883806] dump_stack_lvl+0xc1/0xf0 <4>[ 6.883809] dump_stack+0x10/0x20 <4>[ 6.883811] paint_ptr+0x8d/0xa0 <4>[ 6.883816] kmemleak_not_leak+0x33/0x70 <4>[ 6.883819] load_module+0xa20/0x2d10 <4>[ 6.883832] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.883837] ? kernel_read_file+0x2ac/0x330 <4>[ 6.883845] init_module_from_file+0x97/0xe0 <4>[ 6.883846] ? init_module_from_file+0x97/0xe0 <4>[ 6.883859] idempotent_init_module+0x134/0x350 <4>[ 6.883874] __x64_sys_finit_module+0x77/0x100 <4>[ 6.883879] x64_sys_call+0x24e3/0x2670 <4>[ 6.883882] do_syscall_64+0x91/0x180 <4>[ 6.883885] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.883889] ? do_syscall_64+0x9d/0x180 <4>[ 6.883892] ? do_syscall_64+0x9d/0x180 <4>[ 6.883896] ? __lock_acquire+0x437/0x2600 <4>[ 6.883904] ? reacquire_held_locks+0xe3/0x210 <4>[ 6.883907] ? do_user_addr_fault+0x5e6/0x9d0 <4>[ 6.883916] ? find_held_lock+0x31/0x90 <4>[ 6.883919] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.883923] ? lock_release+0xd3/0x2c0 <4>[ 6.883930] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.883934] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.883939] ? irqentry_exit+0x77/0xb0 <4>[ 6.883942] ? exc_page_fault+0xb1/0x300 <4>[ 6.883947] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.883950] RIP: 0033:0x78cf6112725d <4>[ 6.883952] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.883953] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.883955] RAX: ffffffffffffffda RBX: 000057e1920e3d00 RCX: 000078cf6112725d <4>[ 6.883956] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002e <4>[ 6.883957] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 6.883959] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.883960] R13: 0000000000020000 R14: 000057e1920dd860 R15: 000057e1920e0210 <4>[ 6.883972] <4>[ 6.884088] kmemleak: Found object by alias at 0xffffffffa04bf000 <4>[ 6.884106] CPU: 1 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.884109] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.884109] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.884110] Call Trace: <4>[ 6.884110] <4>[ 6.884111] dump_stack_lvl+0x91/0xf0 <4>[ 6.884114] dump_stack+0x10/0x20 <4>[ 6.884115] __lookup_object+0x90/0xa0 <4>[ 6.884118] __find_and_get_object+0x6c/0x190 <4>[ 6.884122] paint_ptr+0x1b/0xa0 <4>[ 6.884125] kmemleak_not_leak+0x33/0x70 <4>[ 6.884128] load_module+0xa20/0x2d10 <4>[ 6.884138] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.884142] ? kernel_read_file+0x2ac/0x330 <4>[ 6.884147] init_module_from_file+0x97/0xe0 <4>[ 6.884149] ? init_module_from_file+0x97/0xe0 <4>[ 6.884159] idempotent_init_module+0x134/0x350 <4>[ 6.884170] __x64_sys_finit_module+0x77/0x100 <4>[ 6.884174] x64_sys_call+0x24e3/0x2670 <4>[ 6.884176] do_syscall_64+0x91/0x180 <4>[ 6.884178] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.884181] ? do_syscall_64+0x9d/0x180 <4>[ 6.884183] ? do_syscall_64+0x9d/0x180 <4>[ 6.884186] ? __lock_acquire+0x437/0x2600 <4>[ 6.884192] ? reacquire_held_locks+0xe3/0x210 <4>[ 6.884195] ? do_user_addr_fault+0x5e6/0x9d0 <4>[ 6.884201] ? find_held_lock+0x31/0x90 <4>[ 6.884204] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.884207] ? lock_release+0xd3/0x2c0 <4>[ 6.884212] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.884216] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.884219] ? irqentry_exit+0x77/0xb0 <4>[ 6.884222] ? exc_page_fault+0xb1/0x300 <4>[ 6.884226] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.884228] RIP: 0033:0x78cf6112725d <4>[ 6.884229] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.884230] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.884232] RAX: ffffffffffffffda RBX: 000057e1920e3d00 RCX: 000078cf6112725d <4>[ 6.884232] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002e <4>[ 6.884233] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 6.884234] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.884234] R13: 0000000000020000 R14: 000057e1920dd860 R15: 000057e1920e0210 <4>[ 6.884244] <5>[ 6.884245] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.884260] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.884262] kmemleak: min_count = 0 <5>[ 6.884263] kmemleak: count = 0 <5>[ 6.884264] kmemleak: flags = 0x1 <5>[ 6.884266] kmemleak: checksum = 0 <5>[ 6.884267] kmemleak: backtrace: <4>[ 6.884268] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.884271] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.884274] execmem_vmalloc+0x5a/0xf0 <4>[ 6.884277] execmem_alloc+0xc2/0x150 <4>[ 6.884279] load_module+0x9db/0x2d10 <4>[ 6.884281] init_module_from_file+0x97/0xe0 <4>[ 6.884283] idempotent_init_module+0x134/0x350 <4>[ 6.884285] __x64_sys_finit_module+0x77/0x100 <4>[ 6.884287] x64_sys_call+0x24e3/0x2670 <4>[ 6.884290] do_syscall_64+0x91/0x180 <4>[ 6.884292] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.884295] kmemleak: Trying to color unknown object at 0xffffffffa04bf000 as Grey <4>[ 6.884297] CPU: 1 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.884300] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.884300] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.884301] Call Trace: <4>[ 6.884302] <4>[ 6.884303] dump_stack_lvl+0xc1/0xf0 <4>[ 6.884306] dump_stack+0x10/0x20 <4>[ 6.884308] paint_ptr+0x8d/0xa0 <4>[ 6.884313] kmemleak_not_leak+0x33/0x70 <4>[ 6.884316] load_module+0xa20/0x2d10 <4>[ 6.884329] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.884334] ? kernel_read_file+0x2ac/0x330 <4>[ 6.884341] init_module_from_file+0x97/0xe0 <4>[ 6.884343] ? init_module_from_file+0x97/0xe0 <4>[ 6.884357] idempotent_init_module+0x134/0x350 <4>[ 6.884372] __x64_sys_finit_module+0x77/0x100 <4>[ 6.884377] x64_sys_call+0x24e3/0x2670 <4>[ 6.884380] do_syscall_64+0x91/0x180 <4>[ 6.884382] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.884386] ? do_syscall_64+0x9d/0x180 <4>[ 6.884389] ? do_syscall_64+0x9d/0x180 <4>[ 6.884393] ? __lock_acquire+0x437/0x2600 <4>[ 6.884400] ? reacquire_held_locks+0xe3/0x210 <4>[ 6.884403] ? do_user_addr_fault+0x5e6/0x9d0 <4>[ 6.884412] ? find_held_lock+0x31/0x90 <4>[ 6.884415] ? do_user_addr_fault+0x640/0x9d0 <4>[ 6.884419] ? lock_release+0xd3/0x2c0 <4>[ 6.884427] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 6.884431] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 6.884436] ? irqentry_exit+0x77/0xb0 <4>[ 6.884438] ? exc_page_fault+0xb1/0x300 <4>[ 6.884444] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.884446] RIP: 0033:0x78cf6112725d <4>[ 6.884448] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.884450] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.884452] RAX: ffffffffffffffda RBX: 000057e1920e3d00 RCX: 000078cf6112725d <4>[ 6.884453] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002e <4>[ 6.884454] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 6.884455] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.884455] R13: 0000000000020000 R14: 000057e1920dd860 R15: 000057e1920e0210 <4>[ 6.884468] <4>[ 6.894309] kmemleak: Found object by alias at 0xffffffffa04c0000 <4>[ 6.894315] CPU: 5 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.894317] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.894318] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.894319] Call Trace: <4>[ 6.894320] <4>[ 6.894321] dump_stack_lvl+0x91/0xf0 <4>[ 6.894325] dump_stack+0x10/0x20 <4>[ 6.894327] __lookup_object+0x90/0xa0 <4>[ 6.894331] __find_and_get_object+0x6c/0x190 <4>[ 6.894335] paint_ptr+0x1b/0xa0 <4>[ 6.894339] kmemleak_not_leak+0x33/0x70 <4>[ 6.894342] load_module+0xa20/0x2d10 <4>[ 6.894353] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.894357] ? kernel_read_file+0x2ac/0x330 <4>[ 6.894363] init_module_from_file+0x97/0xe0 <4>[ 6.894365] ? init_module_from_file+0x97/0xe0 <4>[ 6.894375] idempotent_init_module+0x134/0x350 <4>[ 6.894386] __x64_sys_finit_module+0x77/0x100 <4>[ 6.894390] x64_sys_call+0x24e3/0x2670 <4>[ 6.894393] do_syscall_64+0x91/0x180 <4>[ 6.894395] ? ext4_llseek+0xc0/0x120 <4>[ 6.894399] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.894403] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.894407] ? do_syscall_64+0x9d/0x180 <4>[ 6.894410] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.894414] ? switch_fpu_return+0xe0/0x130 <4>[ 6.894418] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.894421] ? do_syscall_64+0x9d/0x180 <4>[ 6.894424] ? __do_sys_newfstatat+0x44/0x90 <4>[ 6.894435] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.894438] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.894442] ? do_syscall_64+0x9d/0x180 <4>[ 6.894445] ? do_syscall_64+0x9d/0x180 <4>[ 6.894449] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.894452] ? do_syscall_64+0x9d/0x180 <4>[ 6.894456] ? irqentry_exit+0x77/0xb0 <4>[ 6.894458] ? exc_page_fault+0xb1/0x300 <4>[ 6.894462] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.894465] RIP: 0033:0x78cf6112725d <4>[ 6.894467] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.894469] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.894470] RAX: ffffffffffffffda RBX: 000057e1920d2b60 RCX: 000078cf6112725d <4>[ 6.894471] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.894472] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.894473] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.894474] R13: 0000000000020000 R14: 000057e1920be3e0 R15: 000057e1920d5950 <4>[ 6.894484] <5>[ 6.894484] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.894501] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.894503] kmemleak: min_count = 0 <5>[ 6.894505] kmemleak: count = 0 <5>[ 6.894506] kmemleak: flags = 0x1 <5>[ 6.894507] kmemleak: checksum = 0 <5>[ 6.894508] kmemleak: backtrace: <4>[ 6.894510] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.894513] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.894516] execmem_vmalloc+0x5a/0xf0 <4>[ 6.894519] execmem_alloc+0xc2/0x150 <4>[ 6.894522] load_module+0x9db/0x2d10 <4>[ 6.894524] init_module_from_file+0x97/0xe0 <4>[ 6.894526] idempotent_init_module+0x134/0x350 <4>[ 6.894528] __x64_sys_finit_module+0x77/0x100 <4>[ 6.894530] x64_sys_call+0x24e3/0x2670 <4>[ 6.894532] do_syscall_64+0x91/0x180 <4>[ 6.894535] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.894547] kmemleak: Trying to color unknown object at 0xffffffffa04c0000 as Grey <4>[ 6.894550] CPU: 5 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.894553] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.894553] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.894554] Call Trace: <4>[ 6.894555] <4>[ 6.894556] dump_stack_lvl+0xc1/0xf0 <4>[ 6.894560] dump_stack+0x10/0x20 <4>[ 6.894562] paint_ptr+0x8d/0xa0 <4>[ 6.894566] kmemleak_not_leak+0x33/0x70 <4>[ 6.894570] load_module+0xa20/0x2d10 <4>[ 6.894583] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.894588] ? kernel_read_file+0x2ac/0x330 <4>[ 6.894595] init_module_from_file+0x97/0xe0 <4>[ 6.894597] ? init_module_from_file+0x97/0xe0 <4>[ 6.894610] idempotent_init_module+0x134/0x350 <4>[ 6.894623] __x64_sys_finit_module+0x77/0x100 <4>[ 6.894628] x64_sys_call+0x24e3/0x2670 <4>[ 6.894631] do_syscall_64+0x91/0x180 <4>[ 6.894634] ? ext4_llseek+0xc0/0x120 <4>[ 6.894638] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.894643] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.894647] ? do_syscall_64+0x9d/0x180 <4>[ 6.894652] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.894656] ? switch_fpu_return+0xe0/0x130 <4>[ 6.894661] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.894665] ? do_syscall_64+0x9d/0x180 <4>[ 6.894669] ? __do_sys_newfstatat+0x44/0x90 <4>[ 6.894682] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.894687] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.894691] ? do_syscall_64+0x9d/0x180 <4>[ 6.894695] ? do_syscall_64+0x9d/0x180 <4>[ 6.894700] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.894705] ? do_syscall_64+0x9d/0x180 <4>[ 6.894709] ? irqentry_exit+0x77/0xb0 <4>[ 6.894712] ? exc_page_fault+0xb1/0x300 <4>[ 6.894717] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.894720] RIP: 0033:0x78cf6112725d <4>[ 6.894722] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.894724] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.894726] RAX: ffffffffffffffda RBX: 000057e1920d2b60 RCX: 000078cf6112725d <4>[ 6.894727] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.894728] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.894729] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.894730] R13: 0000000000020000 R14: 000057e1920be3e0 R15: 000057e1920d5950 <4>[ 6.894743] <4>[ 6.894903] kmemleak: Found object by alias at 0xffffffffa04be000 <4>[ 6.894920] CPU: 5 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.894922] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.894922] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.894923] Call Trace: <4>[ 6.894924] <4>[ 6.894925] dump_stack_lvl+0x91/0xf0 <4>[ 6.894927] dump_stack+0x10/0x20 <4>[ 6.894929] __lookup_object+0x90/0xa0 <4>[ 6.894932] __find_and_get_object+0x6c/0x190 <4>[ 6.894935] paint_ptr+0x1b/0xa0 <4>[ 6.894939] kmemleak_not_leak+0x33/0x70 <4>[ 6.894941] load_module+0xa20/0x2d10 <4>[ 6.894951] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.894956] ? kernel_read_file+0x2ac/0x330 <4>[ 6.894961] init_module_from_file+0x97/0xe0 <4>[ 6.894962] ? init_module_from_file+0x97/0xe0 <4>[ 6.894973] idempotent_init_module+0x134/0x350 <4>[ 6.894984] __x64_sys_finit_module+0x77/0x100 <4>[ 6.894987] x64_sys_call+0x24e3/0x2670 <4>[ 6.894990] do_syscall_64+0x91/0x180 <4>[ 6.894992] ? ext4_llseek+0xc0/0x120 <4>[ 6.894995] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.894999] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.895002] ? do_syscall_64+0x9d/0x180 <4>[ 6.895006] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.895009] ? switch_fpu_return+0xe0/0x130 <4>[ 6.895013] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.895016] ? do_syscall_64+0x9d/0x180 <4>[ 6.895019] ? __do_sys_newfstatat+0x44/0x90 <4>[ 6.895029] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.895033] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.895036] ? do_syscall_64+0x9d/0x180 <4>[ 6.895039] ? do_syscall_64+0x9d/0x180 <4>[ 6.895043] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.895047] ? do_syscall_64+0x9d/0x180 <4>[ 6.895050] ? irqentry_exit+0x77/0xb0 <4>[ 6.895052] ? exc_page_fault+0xb1/0x300 <4>[ 6.895056] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.895058] RIP: 0033:0x78cf6112725d <4>[ 6.895060] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.895061] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.895062] RAX: ffffffffffffffda RBX: 000057e1920d2b60 RCX: 000078cf6112725d <4>[ 6.895063] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.895064] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.895064] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.895065] R13: 0000000000020000 R14: 000057e1920be3e0 R15: 000057e1920d5950 <4>[ 6.895075] <5>[ 6.895076] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.895092] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.895094] kmemleak: min_count = 0 <5>[ 6.895095] kmemleak: count = 0 <5>[ 6.895096] kmemleak: flags = 0x1 <5>[ 6.895097] kmemleak: checksum = 0 <5>[ 6.895099] kmemleak: backtrace: <4>[ 6.895100] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.895103] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.895105] execmem_vmalloc+0x5a/0xf0 <4>[ 6.895108] execmem_alloc+0xc2/0x150 <4>[ 6.895111] load_module+0x9db/0x2d10 <4>[ 6.895113] init_module_from_file+0x97/0xe0 <4>[ 6.895115] idempotent_init_module+0x134/0x350 <4>[ 6.895117] __x64_sys_finit_module+0x77/0x100 <4>[ 6.895119] x64_sys_call+0x24e3/0x2670 <4>[ 6.895121] do_syscall_64+0x91/0x180 <4>[ 6.895124] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.895127] kmemleak: Trying to color unknown object at 0xffffffffa04be000 as Grey <4>[ 6.895130] CPU: 5 UID: 0 PID: 326 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.895132] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.895132] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.895133] Call Trace: <4>[ 6.895134] <4>[ 6.895135] dump_stack_lvl+0xc1/0xf0 <4>[ 6.895138] dump_stack+0x10/0x20 <4>[ 6.895140] paint_ptr+0x8d/0xa0 <4>[ 6.895145] kmemleak_not_leak+0x33/0x70 <4>[ 6.895148] load_module+0xa20/0x2d10 <4>[ 6.895161] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.895166] ? kernel_read_file+0x2ac/0x330 <4>[ 6.895173] init_module_from_file+0x97/0xe0 <4>[ 6.895175] ? init_module_from_file+0x97/0xe0 <4>[ 6.895189] idempotent_init_module+0x134/0x350 <4>[ 6.895204] __x64_sys_finit_module+0x77/0x100 <4>[ 6.895209] x64_sys_call+0x24e3/0x2670 <4>[ 6.895211] do_syscall_64+0x91/0x180 <4>[ 6.895214] ? ext4_llseek+0xc0/0x120 <4>[ 6.895218] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.895223] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.895228] ? do_syscall_64+0x9d/0x180 <4>[ 6.895232] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 6.895236] ? switch_fpu_return+0xe0/0x130 <4>[ 6.895241] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.895246] ? do_syscall_64+0x9d/0x180 <4>[ 6.895249] ? __do_sys_newfstatat+0x44/0x90 <4>[ 6.895263] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.895268] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.895272] ? do_syscall_64+0x9d/0x180 <4>[ 6.895276] ? do_syscall_64+0x9d/0x180 <4>[ 6.895281] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.895286] ? do_syscall_64+0x9d/0x180 <4>[ 6.895290] ? irqentry_exit+0x77/0xb0 <4>[ 6.895293] ? exc_page_fault+0xb1/0x300 <4>[ 6.895299] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.895301] RIP: 0033:0x78cf6112725d <4>[ 6.895303] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.895304] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.895306] RAX: ffffffffffffffda RBX: 000057e1920d2b60 RCX: 000078cf6112725d <4>[ 6.895307] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 6.895308] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.895310] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.895310] R13: 0000000000020000 R14: 000057e1920be3e0 R15: 000057e1920d5950 <4>[ 6.895324] <6>[ 6.926162] RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer <6>[ 6.926167] RAPL PMU: hw unit of domain pp0-core 2^-14 Joules <6>[ 6.926169] RAPL PMU: hw unit of domain package 2^-14 Joules <6>[ 6.926170] RAPL PMU: hw unit of domain dram 2^-14 Joules <6>[ 6.926171] RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules <4>[ 6.932686] kmemleak: Found object by alias at 0xffffffffa046e000 <4>[ 6.932692] CPU: 4 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.932696] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.932696] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.932698] Call Trace: <4>[ 6.932698] <4>[ 6.932699] dump_stack_lvl+0x91/0xf0 <4>[ 6.932704] dump_stack+0x10/0x20 <4>[ 6.932705] __lookup_object+0x90/0xa0 <4>[ 6.932710] __find_and_get_object+0x6c/0x190 <4>[ 6.932714] paint_ptr+0x1b/0xa0 <4>[ 6.932717] kmemleak_not_leak+0x33/0x70 <4>[ 6.932721] load_module+0xa20/0x2d10 <4>[ 6.932732] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.932736] ? kernel_read_file+0x2ac/0x330 <4>[ 6.932742] init_module_from_file+0x97/0xe0 <4>[ 6.932744] ? init_module_from_file+0x97/0xe0 <4>[ 6.932754] idempotent_init_module+0x134/0x350 <4>[ 6.932765] __x64_sys_finit_module+0x77/0x100 <4>[ 6.932769] x64_sys_call+0x24e3/0x2670 <4>[ 6.932772] do_syscall_64+0x91/0x180 <4>[ 6.932778] ? ext4_llseek+0xc0/0x120 <4>[ 6.932782] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.932786] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.932790] ? do_syscall_64+0x9d/0x180 <4>[ 6.932793] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.932796] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.932800] ? do_syscall_64+0x9d/0x180 <4>[ 6.932801] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.932808] ? putname+0x60/0x80 <4>[ 6.932810] ? do_sys_openat2+0xab/0xf0 <4>[ 6.932816] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.932819] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.932823] ? do_syscall_64+0x9d/0x180 <4>[ 6.932825] ? vfs_fstatat+0x99/0xe0 <4>[ 6.932829] ? __do_sys_newfstatat+0x44/0x90 <4>[ 6.932839] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.932842] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.932846] ? do_syscall_64+0x9d/0x180 <4>[ 6.932847] ? irqentry_exit+0x77/0xb0 <4>[ 6.932850] ? exc_page_fault+0xb1/0x300 <4>[ 6.932854] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.932856] RIP: 0033:0x78cf6112725d <4>[ 6.932859] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.932860] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.932862] RAX: ffffffffffffffda RBX: 000057e192033a60 RCX: 000078cf6112725d <4>[ 6.932863] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002f <4>[ 6.932864] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.932865] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.932866] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920e9bd0 <4>[ 6.932876] <5>[ 6.932876] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.932894] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.932896] kmemleak: min_count = 0 <5>[ 6.932897] kmemleak: count = 0 <5>[ 6.932898] kmemleak: flags = 0x1 <5>[ 6.932900] kmemleak: checksum = 0 <5>[ 6.932901] kmemleak: backtrace: <4>[ 6.932902] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.932905] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.932909] execmem_vmalloc+0x5a/0xf0 <4>[ 6.932911] execmem_alloc+0xc2/0x150 <4>[ 6.932914] load_module+0x9db/0x2d10 <4>[ 6.932916] init_module_from_file+0x97/0xe0 <4>[ 6.932918] idempotent_init_module+0x134/0x350 <4>[ 6.932920] __x64_sys_finit_module+0x77/0x100 <4>[ 6.932922] x64_sys_call+0x24e3/0x2670 <4>[ 6.932925] do_syscall_64+0x91/0x180 <4>[ 6.932927] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.932930] kmemleak: Trying to color unknown object at 0xffffffffa046e000 as Grey <4>[ 6.932932] CPU: 4 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.932934] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.932935] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.932936] Call Trace: <4>[ 6.932936] <4>[ 6.932938] dump_stack_lvl+0xc1/0xf0 <4>[ 6.932941] dump_stack+0x10/0x20 <4>[ 6.932943] paint_ptr+0x8d/0xa0 <4>[ 6.932947] kmemleak_not_leak+0x33/0x70 <4>[ 6.932951] load_module+0xa20/0x2d10 <4>[ 6.932964] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.932969] ? kernel_read_file+0x2ac/0x330 <4>[ 6.932976] init_module_from_file+0x97/0xe0 <4>[ 6.932977] ? init_module_from_file+0x97/0xe0 <4>[ 6.932992] idempotent_init_module+0x134/0x350 <4>[ 6.933006] __x64_sys_finit_module+0x77/0x100 <4>[ 6.933011] x64_sys_call+0x24e3/0x2670 <4>[ 6.933014] do_syscall_64+0x91/0x180 <4>[ 6.933022] ? ext4_llseek+0xc0/0x120 <4>[ 6.933027] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933031] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933036] ? do_syscall_64+0x9d/0x180 <4>[ 6.933040] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933044] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933049] ? do_syscall_64+0x9d/0x180 <4>[ 6.933051] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.933058] ? putname+0x60/0x80 <4>[ 6.933061] ? do_sys_openat2+0xab/0xf0 <4>[ 6.933068] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933072] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933077] ? do_syscall_64+0x9d/0x180 <4>[ 6.933080] ? vfs_fstatat+0x99/0xe0 <4>[ 6.933084] ? __do_sys_newfstatat+0x44/0x90 <4>[ 6.933097] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933101] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933106] ? do_syscall_64+0x9d/0x180 <4>[ 6.933108] ? irqentry_exit+0x77/0xb0 <4>[ 6.933111] ? exc_page_fault+0xb1/0x300 <4>[ 6.933117] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.933119] RIP: 0033:0x78cf6112725d <4>[ 6.933122] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.933123] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.933125] RAX: ffffffffffffffda RBX: 000057e192033a60 RCX: 000078cf6112725d <4>[ 6.933126] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002f <4>[ 6.933127] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.933129] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.933130] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920e9bd0 <4>[ 6.933143] <4>[ 6.933643] kmemleak: Found object by alias at 0xffffffffa04b2000 <4>[ 6.933647] CPU: 7 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.933649] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.933650] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.933650] Call Trace: <4>[ 6.933651] <4>[ 6.933652] dump_stack_lvl+0x91/0xf0 <4>[ 6.933655] dump_stack+0x10/0x20 <4>[ 6.933656] __lookup_object+0x90/0xa0 <4>[ 6.933660] __find_and_get_object+0x6c/0x190 <4>[ 6.933663] paint_ptr+0x1b/0xa0 <4>[ 6.933666] kmemleak_not_leak+0x33/0x70 <4>[ 6.933669] load_module+0xa20/0x2d10 <4>[ 6.933677] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.933681] ? kernel_read_file+0x2ac/0x330 <4>[ 6.933685] init_module_from_file+0x97/0xe0 <4>[ 6.933686] ? init_module_from_file+0x97/0xe0 <4>[ 6.933694] idempotent_init_module+0x134/0x350 <4>[ 6.933703] __x64_sys_finit_module+0x77/0x100 <4>[ 6.933706] x64_sys_call+0x24e3/0x2670 <4>[ 6.933708] do_syscall_64+0x91/0x180 <4>[ 6.933713] ? ext4_llseek+0xc0/0x120 <4>[ 6.933716] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933719] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933723] ? do_syscall_64+0x9d/0x180 <4>[ 6.933725] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933728] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933731] ? do_syscall_64+0x9d/0x180 <4>[ 6.933733] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.933737] ? putname+0x60/0x80 <4>[ 6.933739] ? do_sys_openat2+0xab/0xf0 <4>[ 6.933744] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933747] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933750] ? do_syscall_64+0x9d/0x180 <4>[ 6.933752] ? vfs_fstatat+0x99/0xe0 <4>[ 6.933755] ? __do_sys_newfstatat+0x44/0x90 <4>[ 6.933763] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933766] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933769] ? do_syscall_64+0x9d/0x180 <4>[ 6.933770] ? irqentry_exit+0x77/0xb0 <4>[ 6.933772] ? exc_page_fault+0xb1/0x300 <4>[ 6.933776] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.933778] RIP: 0033:0x78cf6112725d <4>[ 6.933780] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.933781] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.933782] RAX: ffffffffffffffda RBX: 000057e192033a60 RCX: 000078cf6112725d <4>[ 6.933783] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002f <4>[ 6.933784] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.933784] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.933785] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920e9bd0 <4>[ 6.933793] <5>[ 6.933793] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.933808] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.933809] kmemleak: min_count = 0 <5>[ 6.933811] kmemleak: count = 0 <5>[ 6.933812] kmemleak: flags = 0x1 <5>[ 6.933813] kmemleak: checksum = 0 <5>[ 6.933814] kmemleak: backtrace: <4>[ 6.933815] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.933818] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.933820] execmem_vmalloc+0x5a/0xf0 <4>[ 6.933823] execmem_alloc+0xc2/0x150 <4>[ 6.933825] load_module+0x9db/0x2d10 <4>[ 6.933827] init_module_from_file+0x97/0xe0 <4>[ 6.933829] idempotent_init_module+0x134/0x350 <4>[ 6.933831] __x64_sys_finit_module+0x77/0x100 <4>[ 6.933833] x64_sys_call+0x24e3/0x2670 <4>[ 6.933835] do_syscall_64+0x91/0x180 <4>[ 6.933837] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.933840] kmemleak: Trying to color unknown object at 0xffffffffa04b2000 as Grey <4>[ 6.933842] CPU: 7 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.933844] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.933844] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.933844] Call Trace: <4>[ 6.933845] <4>[ 6.933846] dump_stack_lvl+0xc1/0xf0 <4>[ 6.933848] dump_stack+0x10/0x20 <4>[ 6.933849] paint_ptr+0x8d/0xa0 <4>[ 6.933852] kmemleak_not_leak+0x33/0x70 <4>[ 6.933854] load_module+0xa20/0x2d10 <4>[ 6.933861] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.933864] ? kernel_read_file+0x2ac/0x330 <4>[ 6.933868] init_module_from_file+0x97/0xe0 <4>[ 6.933869] ? init_module_from_file+0x97/0xe0 <4>[ 6.933876] idempotent_init_module+0x134/0x350 <4>[ 6.933883] __x64_sys_finit_module+0x77/0x100 <4>[ 6.933886] x64_sys_call+0x24e3/0x2670 <4>[ 6.933888] do_syscall_64+0x91/0x180 <4>[ 6.933892] ? ext4_llseek+0xc0/0x120 <4>[ 6.933895] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933898] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933901] ? do_syscall_64+0x9d/0x180 <4>[ 6.933903] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933906] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933909] ? do_syscall_64+0x9d/0x180 <4>[ 6.933911] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 6.933918] ? putname+0x60/0x80 <4>[ 6.933920] ? do_sys_openat2+0xab/0xf0 <4>[ 6.933927] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933931] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933936] ? do_syscall_64+0x9d/0x180 <4>[ 6.933938] ? vfs_fstatat+0x99/0xe0 <4>[ 6.933943] ? __do_sys_newfstatat+0x44/0x90 <4>[ 6.933956] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 6.933961] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.933965] ? do_syscall_64+0x9d/0x180 <4>[ 6.933967] ? irqentry_exit+0x77/0xb0 <4>[ 6.933970] ? exc_page_fault+0xb1/0x300 <4>[ 6.933976] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.933978] RIP: 0033:0x78cf6112725d <4>[ 6.933980] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.933982] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.933983] RAX: ffffffffffffffda RBX: 000057e192033a60 RCX: 000078cf6112725d <4>[ 6.933985] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000002f <4>[ 6.933986] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 6.933987] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.933988] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920e9bd0 <4>[ 6.934001] <6>[ 6.948360] igb: Intel(R) Gigabit Ethernet Network Driver <6>[ 6.948366] igb: Copyright (c) 2007-2014 Intel Corporation. <6>[ 6.954126] cryptd: max_cpu_qlen set to 1000 <4>[ 6.955891] kmemleak: Found object by alias at 0xffffffffa04bd000 <4>[ 6.955897] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.955900] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.955901] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.955902] Call Trace: <4>[ 6.955903] <4>[ 6.955904] dump_stack_lvl+0x91/0xf0 <4>[ 6.955909] dump_stack+0x10/0x20 <4>[ 6.955911] __lookup_object+0x90/0xa0 <4>[ 6.955915] __find_and_get_object+0x6c/0x190 <4>[ 6.955919] paint_ptr+0x1b/0xa0 <4>[ 6.955922] kmemleak_not_leak+0x33/0x70 <4>[ 6.955925] load_module+0xa20/0x2d10 <4>[ 6.955936] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.955941] ? kernel_read_file+0x2ac/0x330 <4>[ 6.955947] init_module_from_file+0x97/0xe0 <4>[ 6.955948] ? init_module_from_file+0x97/0xe0 <4>[ 6.955958] idempotent_init_module+0x134/0x350 <4>[ 6.955970] __x64_sys_finit_module+0x77/0x100 <4>[ 6.955973] x64_sys_call+0x24e3/0x2670 <4>[ 6.955976] do_syscall_64+0x91/0x180 <4>[ 6.955979] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.955983] ? do_syscall_64+0x9d/0x180 <4>[ 6.955986] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.955989] RIP: 0033:0x78cf6112725d <4>[ 6.955991] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.955993] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.955995] RAX: ffffffffffffffda RBX: 000057e1920c7410 RCX: 000078cf6112725d <4>[ 6.955996] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000033 <4>[ 6.955997] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23870 <4>[ 6.955997] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.955998] R13: 0000000000020000 R14: 000057e1920c4790 R15: 000057e1920effd0 <4>[ 6.956008] <5>[ 6.956009] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 6.956021] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 6.956023] kmemleak: min_count = 0 <5>[ 6.956024] kmemleak: count = 0 <5>[ 6.956025] kmemleak: flags = 0x1 <5>[ 6.956027] kmemleak: checksum = 0 <5>[ 6.956028] kmemleak: backtrace: <4>[ 6.956029] kmemleak_vmalloc+0x7c/0xf0 <4>[ 6.956032] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 6.956035] execmem_vmalloc+0x5a/0xf0 <4>[ 6.956039] execmem_alloc+0xc2/0x150 <4>[ 6.956041] load_module+0x9db/0x2d10 <4>[ 6.956043] init_module_from_file+0x97/0xe0 <4>[ 6.956045] idempotent_init_module+0x134/0x350 <4>[ 6.956047] __x64_sys_finit_module+0x77/0x100 <4>[ 6.956049] x64_sys_call+0x24e3/0x2670 <4>[ 6.956052] do_syscall_64+0x91/0x180 <4>[ 6.956054] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.956057] kmemleak: Trying to color unknown object at 0xffffffffa04bd000 as Grey <4>[ 6.956060] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 6.956062] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 6.956063] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 6.956063] Call Trace: <4>[ 6.956064] <4>[ 6.956065] dump_stack_lvl+0xc1/0xf0 <4>[ 6.956068] dump_stack+0x10/0x20 <4>[ 6.956070] paint_ptr+0x8d/0xa0 <4>[ 6.956075] kmemleak_not_leak+0x33/0x70 <4>[ 6.956078] load_module+0xa20/0x2d10 <4>[ 6.956091] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 6.956097] ? kernel_read_file+0x2ac/0x330 <4>[ 6.956104] init_module_from_file+0x97/0xe0 <4>[ 6.956106] ? init_module_from_file+0x97/0xe0 <4>[ 6.956120] idempotent_init_module+0x134/0x350 <4>[ 6.956136] __x64_sys_finit_module+0x77/0x100 <4>[ 6.956141] x64_sys_call+0x24e3/0x2670 <4>[ 6.956143] do_syscall_64+0x91/0x180 <4>[ 6.956147] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 6.956152] ? do_syscall_64+0x9d/0x180 <4>[ 6.956157] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 6.956159] RIP: 0033:0x78cf6112725d <4>[ 6.956161] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 6.956163] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 6.956164] RAX: ffffffffffffffda RBX: 000057e1920c7410 RCX: 000078cf6112725d <4>[ 6.956166] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000033 <4>[ 6.956167] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23870 <4>[ 6.956168] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 6.956169] R13: 0000000000020000 R14: 000057e1920c4790 R15: 000057e1920effd0 <4>[ 6.956183] <5>[ 6.998149] audit: type=1400 audit(1739167795.662:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="Discord" pid=465 comm="apparmor_parser" <5>[ 6.999334] audit: type=1400 audit(1739167795.662:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="balena-etcher" pid=468 comm="apparmor_parser" <5>[ 7.000022] audit: type=1400 audit(1739167795.664:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="QtWebEngineProcess" pid=467 comm="apparmor_parser" <5>[ 7.000458] audit: type=1400 audit(1739167795.664:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="1password" pid=463 comm="apparmor_parser" <5>[ 7.002874] audit: type=1400 audit(1739167795.667:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="brave" pid=469 comm="apparmor_parser" <5>[ 7.003812] audit: type=1400 audit(1739167795.668:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name=4D6F6E676F444220436F6D70617373 pid=466 comm="apparmor_parser" <6>[ 7.004311] ipmi_si dmi-ipmi-si.0: IPMI message handler: Found new BMC (man_id: 0x000157, prod_id: 0x0078, dev_id: 0x21) <5>[ 7.006633] audit: type=1400 audit(1739167795.671:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="busybox" pid=471 comm="apparmor_parser" <5>[ 7.007022] audit: type=1400 audit(1739167795.671:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="buildah" pid=470 comm="apparmor_parser" <5>[ 7.008507] audit: type=1400 audit(1739167795.672:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="cam" pid=472 comm="apparmor_parser" <5>[ 7.010274] audit: type=1400 audit(1739167795.674:11): apparmor="STATUS" operation="profile_load" profile="unconfined" name="ch-checkns" pid=473 comm="apparmor_parser" <4>[ 7.013667] kmemleak: Found object by alias at 0xffffffffa04ec000 <4>[ 7.013672] CPU: 5 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.013675] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.013676] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.013677] Call Trace: <4>[ 7.013677] <4>[ 7.013678] dump_stack_lvl+0x91/0xf0 <4>[ 7.013683] dump_stack+0x10/0x20 <4>[ 7.013685] __lookup_object+0x90/0xa0 <4>[ 7.013689] __find_and_get_object+0x6c/0x190 <4>[ 7.013693] paint_ptr+0x1b/0xa0 <4>[ 7.013696] kmemleak_not_leak+0x33/0x70 <4>[ 7.013699] load_module+0xa20/0x2d10 <4>[ 7.013710] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.013715] ? kernel_read_file+0x2ac/0x330 <4>[ 7.013721] init_module_from_file+0x97/0xe0 <4>[ 7.013722] ? init_module_from_file+0x97/0xe0 <4>[ 7.013733] idempotent_init_module+0x134/0x350 <4>[ 7.013744] __x64_sys_finit_module+0x77/0x100 <4>[ 7.013747] x64_sys_call+0x24e3/0x2670 <4>[ 7.013750] do_syscall_64+0x91/0x180 <4>[ 7.013752] ? irqentry_exit+0x77/0xb0 <4>[ 7.013755] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.013758] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.013761] RIP: 0033:0x78cf6112725d <4>[ 7.013763] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.013765] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.013766] RAX: ffffffffffffffda RBX: 000057e1920f1f30 RCX: 000078cf6112725d <4>[ 7.013767] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000031 <4>[ 7.013768] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.013769] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.013770] R13: 0000000000020000 R14: 000057e1920c3120 R15: 000057e1920ee580 <4>[ 7.013780] <5>[ 7.013780] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.013792] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.013794] kmemleak: min_count = 0 <5>[ 7.013796] kmemleak: count = 0 <5>[ 7.013797] kmemleak: flags = 0x1 <5>[ 7.013798] kmemleak: checksum = 0 <5>[ 7.013799] kmemleak: backtrace: <4>[ 7.013801] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.013804] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.013807] execmem_vmalloc+0x5a/0xf0 <4>[ 7.013810] execmem_alloc+0xc2/0x150 <4>[ 7.013813] load_module+0x9db/0x2d10 <4>[ 7.013815] init_module_from_file+0x97/0xe0 <4>[ 7.013817] idempotent_init_module+0x134/0x350 <4>[ 7.013819] __x64_sys_finit_module+0x77/0x100 <4>[ 7.013821] x64_sys_call+0x24e3/0x2670 <4>[ 7.013823] do_syscall_64+0x91/0x180 <4>[ 7.013826] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.013834] kmemleak: Trying to color unknown object at 0xffffffffa04ec000 as Grey <4>[ 7.013837] CPU: 5 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.013840] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.013841] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.013842] Call Trace: <4>[ 7.013842] <4>[ 7.013843] dump_stack_lvl+0xc1/0xf0 <4>[ 7.013847] dump_stack+0x10/0x20 <4>[ 7.013849] paint_ptr+0x8d/0xa0 <4>[ 7.013853] kmemleak_not_leak+0x33/0x70 <4>[ 7.013857] load_module+0xa20/0x2d10 <4>[ 7.013871] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.013876] ? kernel_read_file+0x2ac/0x330 <4>[ 7.013884] init_module_from_file+0x97/0xe0 <4>[ 7.013886] ? init_module_from_file+0x97/0xe0 <4>[ 7.013900] idempotent_init_module+0x134/0x350 <4>[ 7.013916] __x64_sys_finit_module+0x77/0x100 <4>[ 7.013921] x64_sys_call+0x24e3/0x2670 <4>[ 7.013923] do_syscall_64+0x91/0x180 <4>[ 7.013926] ? irqentry_exit+0x77/0xb0 <4>[ 7.013929] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.013933] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.013936] RIP: 0033:0x78cf6112725d <4>[ 7.013938] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.013939] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.013941] RAX: ffffffffffffffda RBX: 000057e1920f1f30 RCX: 000078cf6112725d <4>[ 7.013942] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000031 <4>[ 7.013943] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.013945] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.013946] R13: 0000000000020000 R14: 000057e1920c3120 R15: 000057e1920ee580 <4>[ 7.013960] <4>[ 7.014496] kmemleak: Found object by alias at 0xffffffffa04b2000 <4>[ 7.014511] CPU: 5 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.014514] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.014514] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.014515] Call Trace: <4>[ 7.014515] <4>[ 7.014517] dump_stack_lvl+0x91/0xf0 <4>[ 7.014520] dump_stack+0x10/0x20 <4>[ 7.014521] __lookup_object+0x90/0xa0 <4>[ 7.014524] __find_and_get_object+0x6c/0x190 <4>[ 7.014528] paint_ptr+0x1b/0xa0 <4>[ 7.014532] kmemleak_not_leak+0x33/0x70 <4>[ 7.014534] load_module+0xa20/0x2d10 <4>[ 7.014546] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.014550] ? kernel_read_file+0x2ac/0x330 <4>[ 7.014557] init_module_from_file+0x97/0xe0 <4>[ 7.014558] ? init_module_from_file+0x97/0xe0 <4>[ 7.014570] idempotent_init_module+0x134/0x350 <4>[ 7.014582] __x64_sys_finit_module+0x77/0x100 <4>[ 7.014586] x64_sys_call+0x24e3/0x2670 <4>[ 7.014588] do_syscall_64+0x91/0x180 <4>[ 7.014590] ? irqentry_exit+0x77/0xb0 <4>[ 7.014593] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.014597] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.014599] RIP: 0033:0x78cf6112725d <4>[ 7.014601] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.014602] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.014604] RAX: ffffffffffffffda RBX: 000057e1920f1f30 RCX: 000078cf6112725d <4>[ 7.014605] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000031 <4>[ 7.014605] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.014606] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.014607] R13: 0000000000020000 R14: 000057e1920c3120 R15: 000057e1920ee580 <4>[ 7.014618] <5>[ 7.014619] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.014633] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.014635] kmemleak: min_count = 0 <5>[ 7.014637] kmemleak: count = 0 <5>[ 7.014638] kmemleak: flags = 0x1 <5>[ 7.014640] kmemleak: checksum = 0 <5>[ 7.014641] kmemleak: backtrace: <4>[ 7.014643] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.014646] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.014649] execmem_vmalloc+0x5a/0xf0 <4>[ 7.014652] execmem_alloc+0xc2/0x150 <4>[ 7.014655] load_module+0x9db/0x2d10 <4>[ 7.014657] init_module_from_file+0x97/0xe0 <4>[ 7.014660] idempotent_init_module+0x134/0x350 <4>[ 7.014662] __x64_sys_finit_module+0x77/0x100 <4>[ 7.014664] x64_sys_call+0x24e3/0x2670 <4>[ 7.014667] do_syscall_64+0x91/0x180 <4>[ 7.014670] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.014681] kmemleak: Trying to color unknown object at 0xffffffffa04b2000 as Grey <4>[ 7.014685] CPU: 5 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.014688] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.014688] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.014689] Call Trace: <4>[ 7.014690] <4>[ 7.014691] dump_stack_lvl+0xc1/0xf0 <4>[ 7.014694] dump_stack+0x10/0x20 <4>[ 7.014696] paint_ptr+0x8d/0xa0 <4>[ 7.014701] kmemleak_not_leak+0x33/0x70 <4>[ 7.014704] load_module+0xa20/0x2d10 <4>[ 7.014717] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.014722] ? kernel_read_file+0x2ac/0x330 <4>[ 7.014729] init_module_from_file+0x97/0xe0 <4>[ 7.014731] ? init_module_from_file+0x97/0xe0 <4>[ 7.014745] idempotent_init_module+0x134/0x350 <4>[ 7.014759] __x64_sys_finit_module+0x77/0x100 <4>[ 7.014763] x64_sys_call+0x24e3/0x2670 <4>[ 7.014765] do_syscall_64+0x91/0x180 <4>[ 7.014768] ? irqentry_exit+0x77/0xb0 <4>[ 7.014770] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.014775] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.014777] RIP: 0033:0x78cf6112725d <4>[ 7.014780] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.014781] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.014783] RAX: ffffffffffffffda RBX: 000057e1920f1f30 RCX: 000078cf6112725d <4>[ 7.014784] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000031 <4>[ 7.014785] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.014786] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.014786] R13: 0000000000020000 R14: 000057e1920c3120 R15: 000057e1920ee580 <4>[ 7.014799] <6>[ 7.038211] AES CTR mode by8 optimization enabled <4>[ 7.041737] kmemleak: Found object by alias at 0xffffffffa0500000 <4>[ 7.041744] CPU: 4 UID: 0 PID: 378 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.041747] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.041748] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.041749] Call Trace: <4>[ 7.041749] <4>[ 7.041751] dump_stack_lvl+0x91/0xf0 <4>[ 7.041755] dump_stack+0x10/0x20 <4>[ 7.041757] __lookup_object+0x90/0xa0 <4>[ 7.041761] __find_and_get_object+0x6c/0x190 <4>[ 7.041778] paint_ptr+0x1b/0xa0 <4>[ 7.041781] kmemleak_not_leak+0x33/0x70 <4>[ 7.041784] load_module+0xa20/0x2d10 <4>[ 7.041794] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.041799] ? kernel_read_file+0x2ac/0x330 <4>[ 7.041805] init_module_from_file+0x97/0xe0 <4>[ 7.041806] ? init_module_from_file+0x97/0xe0 <4>[ 7.041817] idempotent_init_module+0x134/0x350 <4>[ 7.041827] __x64_sys_finit_module+0x77/0x100 <4>[ 7.041831] x64_sys_call+0x24e3/0x2670 <4>[ 7.041834] do_syscall_64+0x91/0x180 <4>[ 7.041836] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.041840] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.041844] ? irqentry_exit+0x77/0xb0 <4>[ 7.041846] ? exc_page_fault+0xb1/0x300 <4>[ 7.041851] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.041853] RIP: 0033:0x78cf6112725d <4>[ 7.041855] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.041857] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.041859] RAX: ffffffffffffffda RBX: 000057e1920f4ba0 RCX: 000078cf6112725d <4>[ 7.041859] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000036 <4>[ 7.041860] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 7.041861] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.041862] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920be480 <4>[ 7.041872] <5>[ 7.041872] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.041885] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.041887] kmemleak: min_count = 0 <5>[ 7.041888] kmemleak: count = 0 <5>[ 7.041890] kmemleak: flags = 0x1 <5>[ 7.041891] kmemleak: checksum = 0 <5>[ 7.041892] kmemleak: backtrace: <4>[ 7.041894] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.041896] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.041900] execmem_vmalloc+0x5a/0xf0 <4>[ 7.041903] execmem_alloc+0xc2/0x150 <4>[ 7.041920] load_module+0x9db/0x2d10 <4>[ 7.041922] init_module_from_file+0x97/0xe0 <4>[ 7.041924] idempotent_init_module+0x134/0x350 <4>[ 7.041926] __x64_sys_finit_module+0x77/0x100 <4>[ 7.041928] x64_sys_call+0x24e3/0x2670 <4>[ 7.041930] do_syscall_64+0x91/0x180 <4>[ 7.041933] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.041937] kmemleak: Trying to color unknown object at 0xffffffffa0500000 as Grey <4>[ 7.041940] CPU: 4 UID: 0 PID: 378 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.041943] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.041943] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.041944] Call Trace: <4>[ 7.041945] <4>[ 7.041946] dump_stack_lvl+0xc1/0xf0 <4>[ 7.041949] dump_stack+0x10/0x20 <4>[ 7.041952] paint_ptr+0x8d/0xa0 <4>[ 7.041956] kmemleak_not_leak+0x33/0x70 <4>[ 7.041960] load_module+0xa20/0x2d10 <4>[ 7.041973] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.041978] ? kernel_read_file+0x2ac/0x330 <4>[ 7.041986] init_module_from_file+0x97/0xe0 <4>[ 7.041987] ? init_module_from_file+0x97/0xe0 <4>[ 7.042002] idempotent_init_module+0x134/0x350 <4>[ 7.042017] __x64_sys_finit_module+0x77/0x100 <4>[ 7.042022] x64_sys_call+0x24e3/0x2670 <4>[ 7.042024] do_syscall_64+0x91/0x180 <4>[ 7.042027] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.042032] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.042036] ? irqentry_exit+0x77/0xb0 <4>[ 7.042039] ? exc_page_fault+0xb1/0x300 <4>[ 7.042045] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.042047] RIP: 0033:0x78cf6112725d <4>[ 7.042050] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.042051] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.042053] RAX: ffffffffffffffda RBX: 000057e1920f4ba0 RCX: 000078cf6112725d <4>[ 7.042054] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000036 <4>[ 7.042055] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 7.042056] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.042057] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920be480 <4>[ 7.042071] <4>[ 7.042162] kmemleak: Found object by alias at 0xffffffffa04bf000 <4>[ 7.042177] CPU: 4 UID: 0 PID: 378 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.042179] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.042179] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.042180] Call Trace: <4>[ 7.042180] <4>[ 7.042181] dump_stack_lvl+0x91/0xf0 <4>[ 7.042184] dump_stack+0x10/0x20 <4>[ 7.042185] __lookup_object+0x90/0xa0 <4>[ 7.042188] __find_and_get_object+0x6c/0x190 <4>[ 7.042192] paint_ptr+0x1b/0xa0 <4>[ 7.042195] kmemleak_not_leak+0x33/0x70 <4>[ 7.042198] load_module+0xa20/0x2d10 <4>[ 7.042209] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.042213] ? kernel_read_file+0x2ac/0x330 <4>[ 7.042218] init_module_from_file+0x97/0xe0 <4>[ 7.042219] ? init_module_from_file+0x97/0xe0 <4>[ 7.042230] idempotent_init_module+0x134/0x350 <4>[ 7.042241] __x64_sys_finit_module+0x77/0x100 <4>[ 7.042245] x64_sys_call+0x24e3/0x2670 <4>[ 7.042247] do_syscall_64+0x91/0x180 <4>[ 7.042248] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.042252] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.042256] ? irqentry_exit+0x77/0xb0 <4>[ 7.042258] ? exc_page_fault+0xb1/0x300 <4>[ 7.042262] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.042264] RIP: 0033:0x78cf6112725d <4>[ 7.042266] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.042267] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.042268] RAX: ffffffffffffffda RBX: 000057e1920f4ba0 RCX: 000078cf6112725d <4>[ 7.042269] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000036 <4>[ 7.042269] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 7.042270] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.042271] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920be480 <4>[ 7.042281] <5>[ 7.042281] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.042294] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.042295] kmemleak: min_count = 0 <5>[ 7.042297] kmemleak: count = 0 <5>[ 7.042298] kmemleak: flags = 0x1 <5>[ 7.042299] kmemleak: checksum = 0 <5>[ 7.042300] kmemleak: backtrace: <4>[ 7.042302] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.042304] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.042307] execmem_vmalloc+0x5a/0xf0 <4>[ 7.042310] execmem_alloc+0xc2/0x150 <4>[ 7.042313] load_module+0x9db/0x2d10 <4>[ 7.042314] init_module_from_file+0x97/0xe0 <4>[ 7.042316] idempotent_init_module+0x134/0x350 <4>[ 7.042319] __x64_sys_finit_module+0x77/0x100 <4>[ 7.042320] x64_sys_call+0x24e3/0x2670 <4>[ 7.042323] do_syscall_64+0x91/0x180 <4>[ 7.042325] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.042328] kmemleak: Trying to color unknown object at 0xffffffffa04bf000 as Grey <4>[ 7.042330] CPU: 4 UID: 0 PID: 378 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.042332] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.042332] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.042333] Call Trace: <4>[ 7.042334] <4>[ 7.042335] dump_stack_lvl+0xc1/0xf0 <4>[ 7.042338] dump_stack+0x10/0x20 <4>[ 7.042340] paint_ptr+0x8d/0xa0 <4>[ 7.042344] kmemleak_not_leak+0x33/0x70 <4>[ 7.042348] load_module+0xa20/0x2d10 <4>[ 7.042361] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.042366] ? kernel_read_file+0x2ac/0x330 <4>[ 7.042373] init_module_from_file+0x97/0xe0 <4>[ 7.042375] ? init_module_from_file+0x97/0xe0 <4>[ 7.042390] idempotent_init_module+0x134/0x350 <4>[ 7.042405] __x64_sys_finit_module+0x77/0x100 <4>[ 7.042410] x64_sys_call+0x24e3/0x2670 <4>[ 7.042412] do_syscall_64+0x91/0x180 <4>[ 7.042415] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.042419] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.042424] ? irqentry_exit+0x77/0xb0 <4>[ 7.042427] ? exc_page_fault+0xb1/0x300 <4>[ 7.042433] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.042435] RIP: 0033:0x78cf6112725d <4>[ 7.042437] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.042438] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.042440] RAX: ffffffffffffffda RBX: 000057e1920f4ba0 RCX: 000078cf6112725d <4>[ 7.042441] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000036 <4>[ 7.042442] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23890 <4>[ 7.042443] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.042444] R13: 0000000000020000 R14: 000057e1920cca60 R15: 000057e1920be480 <4>[ 7.042458] <4>[ 7.103418] kmemleak: Found object by alias at 0xffffffffa04b2000 <4>[ 7.103423] CPU: 3 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.103426] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.103426] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.103427] Call Trace: <4>[ 7.103428] <4>[ 7.103429] dump_stack_lvl+0x91/0xf0 <4>[ 7.103434] dump_stack+0x10/0x20 <4>[ 7.103436] __lookup_object+0x90/0xa0 <4>[ 7.103440] __find_and_get_object+0x6c/0x190 <4>[ 7.103444] paint_ptr+0x1b/0xa0 <4>[ 7.103447] kmemleak_not_leak+0x33/0x70 <4>[ 7.103450] load_module+0xa20/0x2d10 <4>[ 7.103461] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.103466] ? kernel_read_file+0x2ac/0x330 <4>[ 7.103472] init_module_from_file+0x97/0xe0 <4>[ 7.103473] ? init_module_from_file+0x97/0xe0 <4>[ 7.103484] idempotent_init_module+0x134/0x350 <4>[ 7.103495] __x64_sys_finit_module+0x77/0x100 <4>[ 7.103498] x64_sys_call+0x24e3/0x2670 <4>[ 7.103501] do_syscall_64+0x91/0x180 <4>[ 7.103505] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.103509] ? do_syscall_64+0x9d/0x180 <4>[ 7.103512] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.103515] ? switch_fpu_return+0xe0/0x130 <4>[ 7.103519] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.103522] ? do_syscall_64+0x9d/0x180 <4>[ 7.103528] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.103532] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.103535] ? do_syscall_64+0x9d/0x180 <4>[ 7.103538] ? do_syscall_64+0x9d/0x180 <4>[ 7.103540] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.103544] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.103546] RIP: 0033:0x78cf6112725d <4>[ 7.103549] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.103550] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.103552] RAX: ffffffffffffffda RBX: 000057e1920ca430 RCX: 000078cf6112725d <4>[ 7.103553] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.103554] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.103555] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.103556] R13: 0000000000020000 R14: 000057e1920c7020 R15: 000057e1920bdb80 <4>[ 7.103568] <5>[ 7.103568] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.103586] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.103588] kmemleak: min_count = 0 <5>[ 7.103590] kmemleak: count = 0 <5>[ 7.103591] kmemleak: flags = 0x1 <5>[ 7.103593] kmemleak: checksum = 0 <5>[ 7.103594] kmemleak: backtrace: <4>[ 7.103596] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.103599] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.103603] execmem_vmalloc+0x5a/0xf0 <4>[ 7.103606] execmem_alloc+0xc2/0x150 <4>[ 7.103609] load_module+0x9db/0x2d10 <4>[ 7.103611] init_module_from_file+0x97/0xe0 <4>[ 7.103614] idempotent_init_module+0x134/0x350 <4>[ 7.103616] __x64_sys_finit_module+0x77/0x100 <4>[ 7.103618] x64_sys_call+0x24e3/0x2670 <4>[ 7.103621] do_syscall_64+0x91/0x180 <4>[ 7.103624] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.103871] kmemleak: Trying to color unknown object at 0xffffffffa04b2000 as Grey <4>[ 7.103875] CPU: 3 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.103878] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.103878] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.103879] Call Trace: <4>[ 7.103880] <4>[ 7.103881] dump_stack_lvl+0xc1/0xf0 <4>[ 7.103885] dump_stack+0x10/0x20 <4>[ 7.103888] paint_ptr+0x8d/0xa0 <4>[ 7.103893] kmemleak_not_leak+0x33/0x70 <4>[ 7.103896] load_module+0xa20/0x2d10 <4>[ 7.103911] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.103917] ? kernel_read_file+0x2ac/0x330 <4>[ 7.103924] init_module_from_file+0x97/0xe0 <4>[ 7.103926] ? init_module_from_file+0x97/0xe0 <4>[ 7.103940] idempotent_init_module+0x134/0x350 <4>[ 7.103956] __x64_sys_finit_module+0x77/0x100 <4>[ 7.103961] x64_sys_call+0x24e3/0x2670 <4>[ 7.103964] do_syscall_64+0x91/0x180 <4>[ 7.103969] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.103974] ? do_syscall_64+0x9d/0x180 <4>[ 7.103978] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.103982] ? switch_fpu_return+0xe0/0x130 <4>[ 7.103987] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.103992] ? do_syscall_64+0x9d/0x180 <4>[ 7.104000] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.104005] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.104009] ? do_syscall_64+0x9d/0x180 <4>[ 7.104013] ? do_syscall_64+0x9d/0x180 <4>[ 7.104015] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.104020] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.104023] RIP: 0033:0x78cf6112725d <4>[ 7.104025] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.104027] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.104029] RAX: ffffffffffffffda RBX: 000057e1920ca430 RCX: 000078cf6112725d <4>[ 7.104030] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.104031] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.104032] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.104034] R13: 0000000000020000 R14: 000057e1920c7020 R15: 000057e1920bdb80 <4>[ 7.104048] <4>[ 7.105868] kmemleak: Found object by alias at 0xffffffffa0505000 <4>[ 7.105873] CPU: 3 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.105875] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.105876] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.105877] Call Trace: <4>[ 7.105877] <4>[ 7.105878] dump_stack_lvl+0x91/0xf0 <4>[ 7.105882] dump_stack+0x10/0x20 <4>[ 7.105884] __lookup_object+0x90/0xa0 <4>[ 7.105888] __find_and_get_object+0x6c/0x190 <4>[ 7.105892] paint_ptr+0x1b/0xa0 <4>[ 7.105895] kmemleak_not_leak+0x33/0x70 <4>[ 7.105898] load_module+0xa20/0x2d10 <4>[ 7.105909] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.105913] ? kernel_read_file+0x2ac/0x330 <4>[ 7.105919] init_module_from_file+0x97/0xe0 <4>[ 7.105920] ? init_module_from_file+0x97/0xe0 <4>[ 7.105930] idempotent_init_module+0x134/0x350 <4>[ 7.105941] __x64_sys_finit_module+0x77/0x100 <4>[ 7.105945] x64_sys_call+0x24e3/0x2670 <4>[ 7.105948] do_syscall_64+0x91/0x180 <4>[ 7.105951] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.105955] ? do_syscall_64+0x9d/0x180 <4>[ 7.105958] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.105961] ? switch_fpu_return+0xe0/0x130 <4>[ 7.105965] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.105969] ? do_syscall_64+0x9d/0x180 <4>[ 7.105974] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.105978] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.105981] ? do_syscall_64+0x9d/0x180 <4>[ 7.105984] ? do_syscall_64+0x9d/0x180 <4>[ 7.105986] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.105989] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.105992] RIP: 0033:0x78cf6112725d <4>[ 7.105994] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.105995] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.105997] RAX: ffffffffffffffda RBX: 000057e1920ca430 RCX: 000078cf6112725d <4>[ 7.105997] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.105998] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.105999] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.106000] R13: 0000000000020000 R14: 000057e1920c7020 R15: 000057e1920bdb80 <4>[ 7.106010] <5>[ 7.106011] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.106025] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.106027] kmemleak: min_count = 0 <5>[ 7.106029] kmemleak: count = 0 <5>[ 7.106030] kmemleak: flags = 0x1 <5>[ 7.106031] kmemleak: checksum = 0 <5>[ 7.106032] kmemleak: backtrace: <4>[ 7.106034] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.106037] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.106040] execmem_vmalloc+0x5a/0xf0 <4>[ 7.106043] execmem_alloc+0xc2/0x150 <4>[ 7.106045] load_module+0x9db/0x2d10 <4>[ 7.106047] init_module_from_file+0x97/0xe0 <4>[ 7.106050] idempotent_init_module+0x134/0x350 <4>[ 7.106052] __x64_sys_finit_module+0x77/0x100 <4>[ 7.106054] x64_sys_call+0x24e3/0x2670 <4>[ 7.106056] do_syscall_64+0x91/0x180 <4>[ 7.106058] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.106061] kmemleak: Trying to color unknown object at 0xffffffffa0505000 as Grey <4>[ 7.106064] CPU: 3 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.106066] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.106067] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.106067] Call Trace: <4>[ 7.106068] <4>[ 7.106069] dump_stack_lvl+0xc1/0xf0 <4>[ 7.106072] dump_stack+0x10/0x20 <4>[ 7.106075] paint_ptr+0x8d/0xa0 <4>[ 7.106079] kmemleak_not_leak+0x33/0x70 <4>[ 7.106082] load_module+0xa20/0x2d10 <4>[ 7.106095] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.106101] ? kernel_read_file+0x2ac/0x330 <4>[ 7.106108] init_module_from_file+0x97/0xe0 <4>[ 7.106110] ? init_module_from_file+0x97/0xe0 <4>[ 7.106124] idempotent_init_module+0x134/0x350 <4>[ 7.106139] __x64_sys_finit_module+0x77/0x100 <4>[ 7.106144] x64_sys_call+0x24e3/0x2670 <4>[ 7.106147] do_syscall_64+0x91/0x180 <4>[ 7.106151] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.106155] ? do_syscall_64+0x9d/0x180 <4>[ 7.106159] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.106163] ? switch_fpu_return+0xe0/0x130 <4>[ 7.106168] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.106173] ? do_syscall_64+0x9d/0x180 <4>[ 7.106180] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.106185] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.106189] ? do_syscall_64+0x9d/0x180 <4>[ 7.106193] ? do_syscall_64+0x9d/0x180 <4>[ 7.106195] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.106199] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.106202] RIP: 0033:0x78cf6112725d <4>[ 7.106204] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.106205] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.106207] RAX: ffffffffffffffda RBX: 000057e1920ca430 RCX: 000078cf6112725d <4>[ 7.106208] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.106209] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.106211] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.106212] R13: 0000000000020000 R14: 000057e1920c7020 R15: 000057e1920bdb80 <4>[ 7.106225] <4>[ 7.106296] kmemleak: Found object by alias at 0xffffffffa0506000 <4>[ 7.106312] CPU: 1 UID: 0 PID: 522 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.106315] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.106315] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.106316] Call Trace: <4>[ 7.106316] <4>[ 7.106318] dump_stack_lvl+0x91/0xf0 <4>[ 7.106321] dump_stack+0x10/0x20 <4>[ 7.106323] __lookup_object+0x90/0xa0 <4>[ 7.106326] __find_and_get_object+0x6c/0x190 <4>[ 7.106330] paint_ptr+0x1b/0xa0 <4>[ 7.106333] kmemleak_not_leak+0x33/0x70 <4>[ 7.106336] load_module+0xa20/0x2d10 <4>[ 7.106346] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.106350] ? kernel_read_file+0x2ac/0x330 <4>[ 7.106356] init_module_from_file+0x97/0xe0 <4>[ 7.106357] ? init_module_from_file+0x97/0xe0 <4>[ 7.106368] idempotent_init_module+0x134/0x350 <4>[ 7.106379] __x64_sys_finit_module+0x77/0x100 <4>[ 7.106380] ? do_syscall_64+0x9d/0x180 <4>[ 7.106384] x64_sys_call+0x24e3/0x2670 <4>[ 7.106386] do_syscall_64+0x91/0x180 <4>[ 7.106388] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.106395] ? putname+0x60/0x80 <4>[ 7.106398] ? vfs_fstatat+0x99/0xe0 <4>[ 7.106402] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.106412] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.106416] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.106419] ? do_syscall_64+0x9d/0x180 <4>[ 7.106421] ? irqentry_exit+0x77/0xb0 <4>[ 7.106423] ? exc_page_fault+0xb1/0x300 <4>[ 7.106428] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.106430] RIP: 0033:0x718303d2725d <4>[ 7.106432] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.106433] RSP: 002b:00007ffc894a9838 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.106435] RAX: ffffffffffffffda RBX: 0000589964ad2130 RCX: 0000718303d2725d <4>[ 7.106436] RDX: 0000000000000000 RSI: 000058994f6a9e52 RDI: 0000000000000000 <4>[ 7.106437] RBP: 00007ffc894a98f0 R08: 0000000000000040 R09: 00007ffc894a9970 <4>[ 7.106437] R10: 0000718303e03b20 R11: 0000000000000246 R12: 000058994f6a9e52 <4>[ 7.106438] R13: 0000000000040000 R14: 0000589964ad1ed0 R15: 0000000000000000 <4>[ 7.106448] <5>[ 7.106449] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.106463] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.106465] kmemleak: min_count = 0 <5>[ 7.106467] kmemleak: count = 0 <5>[ 7.106468] kmemleak: flags = 0x1 <5>[ 7.106469] kmemleak: checksum = 0 <5>[ 7.106470] kmemleak: backtrace: <4>[ 7.106472] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.106474] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.106477] execmem_vmalloc+0x5a/0xf0 <4>[ 7.106480] execmem_alloc+0xc2/0x150 <4>[ 7.106483] load_module+0x9db/0x2d10 <4>[ 7.106485] init_module_from_file+0x97/0xe0 <4>[ 7.106487] idempotent_init_module+0x134/0x350 <4>[ 7.106489] __x64_sys_finit_module+0x77/0x100 <4>[ 7.106491] x64_sys_call+0x24e3/0x2670 <4>[ 7.106493] do_syscall_64+0x91/0x180 <4>[ 7.106496] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.106504] kmemleak: Trying to color unknown object at 0xffffffffa0506000 as Grey <4>[ 7.106508] CPU: 1 UID: 0 PID: 522 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.106510] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.106511] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.106511] Call Trace: <4>[ 7.106512] <4>[ 7.106513] dump_stack_lvl+0xc1/0xf0 <4>[ 7.106516] dump_stack+0x10/0x20 <4>[ 7.106518] paint_ptr+0x8d/0xa0 <4>[ 7.106523] kmemleak_not_leak+0x33/0x70 <4>[ 7.106526] load_module+0xa20/0x2d10 <4>[ 7.106540] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.106546] ? kernel_read_file+0x2ac/0x330 <4>[ 7.106553] init_module_from_file+0x97/0xe0 <4>[ 7.106555] ? init_module_from_file+0x97/0xe0 <4>[ 7.106568] idempotent_init_module+0x134/0x350 <4>[ 7.106582] __x64_sys_finit_module+0x77/0x100 <4>[ 7.106584] ? do_syscall_64+0x9d/0x180 <4>[ 7.106588] x64_sys_call+0x24e3/0x2670 <4>[ 7.106591] do_syscall_64+0x91/0x180 <4>[ 7.106594] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.106603] ? putname+0x60/0x80 <4>[ 7.106606] ? vfs_fstatat+0x99/0xe0 <4>[ 7.106611] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.106625] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.106629] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.106634] ? do_syscall_64+0x9d/0x180 <4>[ 7.106636] ? irqentry_exit+0x77/0xb0 <4>[ 7.106638] ? exc_page_fault+0xb1/0x300 <4>[ 7.106644] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.106646] RIP: 0033:0x718303d2725d <4>[ 7.106648] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.106650] RSP: 002b:00007ffc894a9838 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.106652] RAX: ffffffffffffffda RBX: 0000589964ad2130 RCX: 0000718303d2725d <4>[ 7.106653] RDX: 0000000000000000 RSI: 000058994f6a9e52 RDI: 0000000000000000 <4>[ 7.106654] RBP: 00007ffc894a98f0 R08: 0000000000000040 R09: 00007ffc894a9970 <4>[ 7.106655] R10: 0000718303e03b20 R11: 0000000000000246 R12: 000058994f6a9e52 <4>[ 7.106656] R13: 0000000000040000 R14: 0000589964ad1ed0 R15: 0000000000000000 <4>[ 7.106670] <4>[ 7.107110] kmemleak: Found object by alias at 0xffffffffa0508000 <4>[ 7.107113] CPU: 1 UID: 0 PID: 522 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.107116] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.107116] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.107117] Call Trace: <4>[ 7.107118] <4>[ 7.107118] dump_stack_lvl+0x91/0xf0 <4>[ 7.107121] dump_stack+0x10/0x20 <4>[ 7.107123] __lookup_object+0x90/0xa0 <4>[ 7.107126] __find_and_get_object+0x6c/0x190 <4>[ 7.107130] paint_ptr+0x1b/0xa0 <4>[ 7.107133] kmemleak_not_leak+0x33/0x70 <4>[ 7.107136] load_module+0xa20/0x2d10 <4>[ 7.107146] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.107150] ? kernel_read_file+0x2ac/0x330 <4>[ 7.107156] init_module_from_file+0x97/0xe0 <4>[ 7.107157] ? init_module_from_file+0x97/0xe0 <4>[ 7.107167] idempotent_init_module+0x134/0x350 <4>[ 7.107178] __x64_sys_finit_module+0x77/0x100 <4>[ 7.107180] ? do_syscall_64+0x9d/0x180 <4>[ 7.107183] x64_sys_call+0x24e3/0x2670 <4>[ 7.107186] do_syscall_64+0x91/0x180 <4>[ 7.107188] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.107194] ? putname+0x60/0x80 <4>[ 7.107196] ? vfs_fstatat+0x99/0xe0 <4>[ 7.107200] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.107210] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.107214] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.107218] ? do_syscall_64+0x9d/0x180 <4>[ 7.107220] ? irqentry_exit+0x77/0xb0 <4>[ 7.107222] ? exc_page_fault+0xb1/0x300 <4>[ 7.107226] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.107228] RIP: 0033:0x718303d2725d <4>[ 7.107230] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.107231] RSP: 002b:00007ffc894a9838 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.107232] RAX: ffffffffffffffda RBX: 0000589964ad2130 RCX: 0000718303d2725d <4>[ 7.107233] RDX: 0000000000000000 RSI: 000058994f6a9e52 RDI: 0000000000000000 <4>[ 7.107234] RBP: 00007ffc894a98f0 R08: 0000000000000040 R09: 00007ffc894a9970 <4>[ 7.107235] R10: 0000718303e03b20 R11: 0000000000000246 R12: 000058994f6a9e52 <4>[ 7.107236] R13: 0000000000040000 R14: 0000589964ad1ed0 R15: 0000000000000000 <4>[ 7.107246] <5>[ 7.107246] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.107261] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.107263] kmemleak: min_count = 0 <5>[ 7.107264] kmemleak: count = 0 <5>[ 7.107265] kmemleak: flags = 0x1 <5>[ 7.107266] kmemleak: checksum = 0 <5>[ 7.107267] kmemleak: backtrace: <4>[ 7.107269] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.107272] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.107274] execmem_vmalloc+0x5a/0xf0 <4>[ 7.107277] execmem_alloc+0xc2/0x150 <4>[ 7.107280] load_module+0x9db/0x2d10 <4>[ 7.107282] init_module_from_file+0x97/0xe0 <4>[ 7.107284] idempotent_init_module+0x134/0x350 <4>[ 7.107286] __x64_sys_finit_module+0x77/0x100 <4>[ 7.107288] x64_sys_call+0x24e3/0x2670 <4>[ 7.107290] do_syscall_64+0x91/0x180 <4>[ 7.107293] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.107301] kmemleak: Trying to color unknown object at 0xffffffffa0508000 as Grey <4>[ 7.107304] CPU: 1 UID: 0 PID: 522 Comm: modprobe Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.107307] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.107307] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.107308] Call Trace: <4>[ 7.107309] <4>[ 7.107310] dump_stack_lvl+0xc1/0xf0 <4>[ 7.107314] dump_stack+0x10/0x20 <4>[ 7.107316] paint_ptr+0x8d/0xa0 <4>[ 7.107320] kmemleak_not_leak+0x33/0x70 <4>[ 7.107324] load_module+0xa20/0x2d10 <4>[ 7.107336] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.107342] ? kernel_read_file+0x2ac/0x330 <4>[ 7.107348] init_module_from_file+0x97/0xe0 <4>[ 7.107350] ? init_module_from_file+0x97/0xe0 <4>[ 7.107363] idempotent_init_module+0x134/0x350 <4>[ 7.107377] __x64_sys_finit_module+0x77/0x100 <4>[ 7.107379] ? do_syscall_64+0x9d/0x180 <4>[ 7.107384] x64_sys_call+0x24e3/0x2670 <4>[ 7.107387] do_syscall_64+0x91/0x180 <4>[ 7.107390] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.107398] ? putname+0x60/0x80 <4>[ 7.107401] ? vfs_fstatat+0x99/0xe0 <4>[ 7.107406] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.107419] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.107424] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.107429] ? do_syscall_64+0x9d/0x180 <4>[ 7.107431] ? irqentry_exit+0x77/0xb0 <4>[ 7.107434] ? exc_page_fault+0xb1/0x300 <4>[ 7.107439] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.107442] RIP: 0033:0x718303d2725d <4>[ 7.107444] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.107445] RSP: 002b:00007ffc894a9838 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.107447] RAX: ffffffffffffffda RBX: 0000589964ad2130 RCX: 0000718303d2725d <4>[ 7.107448] RDX: 0000000000000000 RSI: 000058994f6a9e52 RDI: 0000000000000000 <4>[ 7.107449] RBP: 00007ffc894a98f0 R08: 0000000000000040 R09: 00007ffc894a9970 <4>[ 7.107450] R10: 0000718303e03b20 R11: 0000000000000246 R12: 000058994f6a9e52 <4>[ 7.107451] R13: 0000000000040000 R14: 0000589964ad1ed0 R15: 0000000000000000 <4>[ 7.107465] <4>[ 7.127590] kmemleak: Found object by alias at 0xffffffffa0508000 <4>[ 7.127596] CPU: 1 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.127599] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.127600] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.127601] Call Trace: <4>[ 7.127601] <4>[ 7.127603] dump_stack_lvl+0x91/0xf0 <4>[ 7.127607] dump_stack+0x10/0x20 <4>[ 7.127609] __lookup_object+0x90/0xa0 <4>[ 7.127613] __find_and_get_object+0x6c/0x190 <4>[ 7.127617] paint_ptr+0x1b/0xa0 <4>[ 7.127620] kmemleak_not_leak+0x33/0x70 <4>[ 7.127624] load_module+0xa20/0x2d10 <4>[ 7.127634] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.127639] ? kernel_read_file+0x2ac/0x330 <4>[ 7.127645] init_module_from_file+0x97/0xe0 <4>[ 7.127646] ? init_module_from_file+0x97/0xe0 <4>[ 7.127657] idempotent_init_module+0x134/0x350 <4>[ 7.127668] __x64_sys_finit_module+0x77/0x100 <4>[ 7.127671] x64_sys_call+0x24e3/0x2670 <4>[ 7.127674] do_syscall_64+0x91/0x180 <4>[ 7.127681] ? ext4_llseek+0xc0/0x120 <4>[ 7.127685] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.127689] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.127693] ? do_syscall_64+0x9d/0x180 <4>[ 7.127695] ? find_held_lock+0x31/0x90 <4>[ 7.127697] ? __might_fault+0x53/0xb0 <4>[ 7.127700] ? lock_release+0xd3/0x2c0 <4>[ 7.127704] ? __might_fault+0x53/0xb0 <4>[ 7.127706] ? __might_fault+0x89/0xb0 <4>[ 7.127707] ? __might_fault+0x53/0xb0 <4>[ 7.127709] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.127714] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.127718] ? switch_fpu_return+0xe0/0x130 <4>[ 7.127722] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.127725] ? do_syscall_64+0x9d/0x180 <4>[ 7.127728] ? do_syscall_64+0x9d/0x180 <4>[ 7.127730] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.127734] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.127737] ? do_syscall_64+0x9d/0x180 <4>[ 7.127740] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.127743] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.127747] ? do_syscall_64+0x9d/0x180 <4>[ 7.127750] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.127753] RIP: 0033:0x78cf6112725d <4>[ 7.127755] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.127757] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.127759] RAX: ffffffffffffffda RBX: 000057e1920f2b10 RCX: 000078cf6112725d <4>[ 7.127760] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000033 <4>[ 7.127760] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.127761] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.127762] R13: 0000000000020000 R14: 000057e1920c6030 R15: 000057e1920f0310 <4>[ 7.127772] <5>[ 7.127773] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.127791] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.127793] kmemleak: min_count = 0 <5>[ 7.127794] kmemleak: count = 0 <5>[ 7.127795] kmemleak: flags = 0x1 <5>[ 7.127797] kmemleak: checksum = 0 <5>[ 7.127798] kmemleak: backtrace: <4>[ 7.127799] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.127802] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.127805] execmem_vmalloc+0x5a/0xf0 <4>[ 7.127808] execmem_alloc+0xc2/0x150 <4>[ 7.127811] load_module+0x9db/0x2d10 <4>[ 7.127813] init_module_from_file+0x97/0xe0 <4>[ 7.127815] idempotent_init_module+0x134/0x350 <4>[ 7.127817] __x64_sys_finit_module+0x77/0x100 <4>[ 7.127819] x64_sys_call+0x24e3/0x2670 <4>[ 7.127822] do_syscall_64+0x91/0x180 <4>[ 7.127824] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.127827] kmemleak: Trying to color unknown object at 0xffffffffa0508000 as Grey <4>[ 7.127830] CPU: 1 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.127841] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.127841] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.127842] Call Trace: <4>[ 7.127843] <4>[ 7.127844] dump_stack_lvl+0xc1/0xf0 <4>[ 7.127847] dump_stack+0x10/0x20 <4>[ 7.127849] paint_ptr+0x8d/0xa0 <4>[ 7.127854] kmemleak_not_leak+0x33/0x70 <4>[ 7.127857] load_module+0xa20/0x2d10 <4>[ 7.127869] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.127875] ? kernel_read_file+0x2ac/0x330 <4>[ 7.127882] init_module_from_file+0x97/0xe0 <4>[ 7.127883] ? init_module_from_file+0x97/0xe0 <4>[ 7.127897] idempotent_init_module+0x134/0x350 <4>[ 7.127911] __x64_sys_finit_module+0x77/0x100 <4>[ 7.127916] x64_sys_call+0x24e3/0x2670 <4>[ 7.127919] do_syscall_64+0x91/0x180 <4>[ 7.127927] ? ext4_llseek+0xc0/0x120 <4>[ 7.127931] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.127935] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.127940] ? do_syscall_64+0x9d/0x180 <4>[ 7.127942] ? find_held_lock+0x31/0x90 <4>[ 7.127945] ? __might_fault+0x53/0xb0 <4>[ 7.127949] ? lock_release+0xd3/0x2c0 <4>[ 7.127953] ? __might_fault+0x53/0xb0 <4>[ 7.127956] ? __might_fault+0x89/0xb0 <4>[ 7.127958] ? __might_fault+0x53/0xb0 <4>[ 7.127961] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.127966] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.127970] ? switch_fpu_return+0xe0/0x130 <4>[ 7.127975] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.127980] ? do_syscall_64+0x9d/0x180 <4>[ 7.127983] ? do_syscall_64+0x9d/0x180 <4>[ 7.127986] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.127990] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.127995] ? do_syscall_64+0x9d/0x180 <4>[ 7.127998] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.128003] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.128007] ? do_syscall_64+0x9d/0x180 <4>[ 7.128011] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.128014] RIP: 0033:0x78cf6112725d <4>[ 7.128016] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.128018] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.128019] RAX: ffffffffffffffda RBX: 000057e1920f2b10 RCX: 000078cf6112725d <4>[ 7.128021] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000033 <4>[ 7.128022] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.128023] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.128024] R13: 0000000000020000 R14: 000057e1920c6030 R15: 000057e1920f0310 <4>[ 7.128037] <4>[ 7.128186] kmemleak: Found object by alias at 0xffffffffa050c000 <4>[ 7.128212] CPU: 1 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.128214] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.128214] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.128215] Call Trace: <4>[ 7.128216] <4>[ 7.128217] dump_stack_lvl+0x91/0xf0 <4>[ 7.128219] dump_stack+0x10/0x20 <4>[ 7.128221] __lookup_object+0x90/0xa0 <4>[ 7.128224] __find_and_get_object+0x6c/0x190 <4>[ 7.128228] paint_ptr+0x1b/0xa0 <4>[ 7.128231] kmemleak_not_leak+0x33/0x70 <4>[ 7.128233] load_module+0xa20/0x2d10 <4>[ 7.128243] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.128248] ? kernel_read_file+0x2ac/0x330 <4>[ 7.128253] init_module_from_file+0x97/0xe0 <4>[ 7.128254] ? init_module_from_file+0x97/0xe0 <4>[ 7.128265] idempotent_init_module+0x134/0x350 <4>[ 7.128276] __x64_sys_finit_module+0x77/0x100 <4>[ 7.128279] x64_sys_call+0x24e3/0x2670 <4>[ 7.128282] do_syscall_64+0x91/0x180 <4>[ 7.128288] ? ext4_llseek+0xc0/0x120 <4>[ 7.128291] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.128295] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.128298] ? do_syscall_64+0x9d/0x180 <4>[ 7.128300] ? find_held_lock+0x31/0x90 <4>[ 7.128302] ? __might_fault+0x53/0xb0 <4>[ 7.128305] ? lock_release+0xd3/0x2c0 <4>[ 7.128308] ? __might_fault+0x53/0xb0 <4>[ 7.128311] ? __might_fault+0x89/0xb0 <4>[ 7.128312] ? __might_fault+0x53/0xb0 <4>[ 7.128314] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.128318] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.128321] ? switch_fpu_return+0xe0/0x130 <4>[ 7.128325] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.128329] ? do_syscall_64+0x9d/0x180 <4>[ 7.128331] ? do_syscall_64+0x9d/0x180 <4>[ 7.128333] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.128337] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.128340] ? do_syscall_64+0x9d/0x180 <4>[ 7.128343] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.128347] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.128350] ? do_syscall_64+0x9d/0x180 <4>[ 7.128354] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.128356] RIP: 0033:0x78cf6112725d <4>[ 7.128357] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.128358] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.128359] RAX: ffffffffffffffda RBX: 000057e1920f2b10 RCX: 000078cf6112725d <4>[ 7.128360] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000033 <4>[ 7.128361] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.128362] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.128362] R13: 0000000000020000 R14: 000057e1920c6030 R15: 000057e1920f0310 <4>[ 7.128372] <5>[ 7.128373] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.128391] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.128393] kmemleak: min_count = 0 <5>[ 7.128394] kmemleak: count = 0 <5>[ 7.128395] kmemleak: flags = 0x1 <5>[ 7.128396] kmemleak: checksum = 0 <5>[ 7.128398] kmemleak: backtrace: <4>[ 7.128399] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.128401] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.128404] execmem_vmalloc+0x5a/0xf0 <4>[ 7.128407] execmem_alloc+0xc2/0x150 <4>[ 7.128410] load_module+0x9db/0x2d10 <4>[ 7.128412] init_module_from_file+0x97/0xe0 <4>[ 7.128414] idempotent_init_module+0x134/0x350 <4>[ 7.128416] __x64_sys_finit_module+0x77/0x100 <4>[ 7.128418] x64_sys_call+0x24e3/0x2670 <4>[ 7.128420] do_syscall_64+0x91/0x180 <4>[ 7.128423] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.128425] kmemleak: Trying to color unknown object at 0xffffffffa050c000 as Grey <4>[ 7.128428] CPU: 1 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.128430] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.128431] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.128431] Call Trace: <4>[ 7.128432] <4>[ 7.128433] dump_stack_lvl+0xc1/0xf0 <4>[ 7.128437] dump_stack+0x10/0x20 <4>[ 7.128439] paint_ptr+0x8d/0xa0 <4>[ 7.128443] kmemleak_not_leak+0x33/0x70 <4>[ 7.128447] load_module+0xa20/0x2d10 <4>[ 7.128461] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.128466] ? kernel_read_file+0x2ac/0x330 <4>[ 7.128474] init_module_from_file+0x97/0xe0 <4>[ 7.128475] ? init_module_from_file+0x97/0xe0 <4>[ 7.128489] idempotent_init_module+0x134/0x350 <4>[ 7.128503] __x64_sys_finit_module+0x77/0x100 <4>[ 7.128508] x64_sys_call+0x24e3/0x2670 <4>[ 7.128510] do_syscall_64+0x91/0x180 <4>[ 7.128519] ? ext4_llseek+0xc0/0x120 <4>[ 7.128523] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.128528] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.128532] ? do_syscall_64+0x9d/0x180 <4>[ 7.128534] ? find_held_lock+0x31/0x90 <4>[ 7.128537] ? __might_fault+0x53/0xb0 <4>[ 7.128540] ? lock_release+0xd3/0x2c0 <4>[ 7.128545] ? __might_fault+0x53/0xb0 <4>[ 7.128548] ? __might_fault+0x89/0xb0 <4>[ 7.128550] ? __might_fault+0x53/0xb0 <4>[ 7.128553] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.128558] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.128562] ? switch_fpu_return+0xe0/0x130 <4>[ 7.128566] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.128571] ? do_syscall_64+0x9d/0x180 <4>[ 7.128574] ? do_syscall_64+0x9d/0x180 <4>[ 7.128577] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.128580] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.128585] ? do_syscall_64+0x9d/0x180 <4>[ 7.128588] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.128593] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.128597] ? do_syscall_64+0x9d/0x180 <4>[ 7.128602] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.128604] RIP: 0033:0x78cf6112725d <4>[ 7.128606] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.128607] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.128609] RAX: ffffffffffffffda RBX: 000057e1920f2b10 RCX: 000078cf6112725d <4>[ 7.128610] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000033 <4>[ 7.128611] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.128612] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.128613] R13: 0000000000020000 R14: 000057e1920c6030 R15: 000057e1920f0310 <4>[ 7.128624] <6>[ 7.152701] ipmi_si dmi-ipmi-si.0: IPMI kcs interface initialized <4>[ 7.182183] kmemleak: Found object by alias at 0xffffffffa0498000 <4>[ 7.182190] CPU: 3 UID: 0 PID: 322 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.182193] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.182194] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.182195] Call Trace: <4>[ 7.182195] <4>[ 7.182196] dump_stack_lvl+0x91/0xf0 <4>[ 7.182202] dump_stack+0x10/0x20 <4>[ 7.182203] __lookup_object+0x90/0xa0 <4>[ 7.182208] __find_and_get_object+0x6c/0x190 <4>[ 7.182212] paint_ptr+0x1b/0xa0 <4>[ 7.182215] kmemleak_not_leak+0x33/0x70 <4>[ 7.182218] load_module+0xa20/0x2d10 <4>[ 7.182229] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.182234] ? kernel_read_file+0x2ac/0x330 <4>[ 7.182240] init_module_from_file+0x97/0xe0 <4>[ 7.182241] ? init_module_from_file+0x97/0xe0 <4>[ 7.182252] idempotent_init_module+0x134/0x350 <4>[ 7.182263] __x64_sys_finit_module+0x77/0x100 <4>[ 7.182267] x64_sys_call+0x24e3/0x2670 <4>[ 7.182269] do_syscall_64+0x91/0x180 <4>[ 7.182275] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.182280] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.182283] ? do_syscall_64+0x9d/0x180 <4>[ 7.182287] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.182291] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.182295] ? irqentry_exit+0x77/0xb0 <4>[ 7.182297] ? exc_page_fault+0xb1/0x300 <4>[ 7.182301] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.182304] RIP: 0033:0x78cf6112725d <4>[ 7.182306] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.182308] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.182310] RAX: ffffffffffffffda RBX: 000057e1920cd010 RCX: 000078cf6112725d <4>[ 7.182311] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000001f <4>[ 7.182311] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.182312] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.182313] R13: 0000000000020000 R14: 000057e1920cdf50 R15: 000057e1920d2990 <4>[ 7.182323] <5>[ 7.182323] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.182337] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.182339] kmemleak: min_count = 0 <5>[ 7.182341] kmemleak: count = 0 <5>[ 7.182342] kmemleak: flags = 0x1 <5>[ 7.182343] kmemleak: checksum = 0 <5>[ 7.182344] kmemleak: backtrace: <4>[ 7.182346] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.182349] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.182352] execmem_vmalloc+0x5a/0xf0 <4>[ 7.182355] execmem_alloc+0xc2/0x150 <4>[ 7.182358] load_module+0x9db/0x2d10 <4>[ 7.182360] init_module_from_file+0x97/0xe0 <4>[ 7.182362] idempotent_init_module+0x134/0x350 <4>[ 7.182364] __x64_sys_finit_module+0x77/0x100 <4>[ 7.182366] x64_sys_call+0x24e3/0x2670 <4>[ 7.182368] do_syscall_64+0x91/0x180 <4>[ 7.182371] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.182373] kmemleak: Trying to color unknown object at 0xffffffffa0498000 as Grey <4>[ 7.182376] CPU: 3 UID: 0 PID: 322 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.182379] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.182379] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.182380] Call Trace: <4>[ 7.182380] <4>[ 7.182381] dump_stack_lvl+0xc1/0xf0 <4>[ 7.182385] dump_stack+0x10/0x20 <4>[ 7.182387] paint_ptr+0x8d/0xa0 <4>[ 7.182391] kmemleak_not_leak+0x33/0x70 <4>[ 7.182394] load_module+0xa20/0x2d10 <4>[ 7.182408] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.182413] ? kernel_read_file+0x2ac/0x330 <4>[ 7.182420] init_module_from_file+0x97/0xe0 <4>[ 7.182422] ? init_module_from_file+0x97/0xe0 <4>[ 7.182436] idempotent_init_module+0x134/0x350 <4>[ 7.182450] __x64_sys_finit_module+0x77/0x100 <4>[ 7.182456] x64_sys_call+0x24e3/0x2670 <4>[ 7.182458] do_syscall_64+0x91/0x180 <4>[ 7.182465] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.182470] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.182475] ? do_syscall_64+0x9d/0x180 <4>[ 7.182479] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.182484] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.182489] ? irqentry_exit+0x77/0xb0 <4>[ 7.182492] ? exc_page_fault+0xb1/0x300 <4>[ 7.182497] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.182500] RIP: 0033:0x78cf6112725d <4>[ 7.182502] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.182503] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.182505] RAX: ffffffffffffffda RBX: 000057e1920cd010 RCX: 000078cf6112725d <4>[ 7.182506] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000001f <4>[ 7.182507] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.182508] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.182510] R13: 0000000000020000 R14: 000057e1920cdf50 R15: 000057e1920d2990 <4>[ 7.182522] <4>[ 7.182825] kmemleak: Found object by alias at 0xffffffffa04bf000 <4>[ 7.182828] CPU: 3 UID: 0 PID: 322 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.182830] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.182831] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.182832] Call Trace: <4>[ 7.182832] <4>[ 7.182833] dump_stack_lvl+0x91/0xf0 <4>[ 7.182836] dump_stack+0x10/0x20 <4>[ 7.182838] __lookup_object+0x90/0xa0 <4>[ 7.182841] __find_and_get_object+0x6c/0x190 <4>[ 7.182845] paint_ptr+0x1b/0xa0 <4>[ 7.182848] kmemleak_not_leak+0x33/0x70 <4>[ 7.182851] load_module+0xa20/0x2d10 <4>[ 7.182861] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.182865] ? kernel_read_file+0x2ac/0x330 <4>[ 7.182871] init_module_from_file+0x97/0xe0 <4>[ 7.182872] ? init_module_from_file+0x97/0xe0 <4>[ 7.182882] idempotent_init_module+0x134/0x350 <4>[ 7.182893] __x64_sys_finit_module+0x77/0x100 <4>[ 7.182897] x64_sys_call+0x24e3/0x2670 <4>[ 7.182899] do_syscall_64+0x91/0x180 <4>[ 7.182905] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.182908] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.182912] ? do_syscall_64+0x9d/0x180 <4>[ 7.182915] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.182919] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.182923] ? irqentry_exit+0x77/0xb0 <4>[ 7.182925] ? exc_page_fault+0xb1/0x300 <4>[ 7.182929] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.182931] RIP: 0033:0x78cf6112725d <4>[ 7.182933] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.182934] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.182935] RAX: ffffffffffffffda RBX: 000057e1920cd010 RCX: 000078cf6112725d <4>[ 7.182936] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000001f <4>[ 7.182937] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.182938] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.182939] R13: 0000000000020000 R14: 000057e1920cdf50 R15: 000057e1920d2990 <4>[ 7.182949] <5>[ 7.182949] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.182963] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.182965] kmemleak: min_count = 0 <5>[ 7.182966] kmemleak: count = 0 <5>[ 7.182967] kmemleak: flags = 0x1 <5>[ 7.182969] kmemleak: checksum = 0 <5>[ 7.182970] kmemleak: backtrace: <4>[ 7.182971] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.182974] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.182977] execmem_vmalloc+0x5a/0xf0 <4>[ 7.182979] execmem_alloc+0xc2/0x150 <4>[ 7.182982] load_module+0x9db/0x2d10 <4>[ 7.182984] init_module_from_file+0x97/0xe0 <4>[ 7.182986] idempotent_init_module+0x134/0x350 <4>[ 7.182988] __x64_sys_finit_module+0x77/0x100 <4>[ 7.182990] x64_sys_call+0x24e3/0x2670 <4>[ 7.182993] do_syscall_64+0x91/0x180 <4>[ 7.182995] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.182998] kmemleak: Trying to color unknown object at 0xffffffffa04bf000 as Grey <4>[ 7.183001] CPU: 3 UID: 0 PID: 322 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.183003] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.183004] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.183005] Call Trace: <4>[ 7.183005] <4>[ 7.183007] dump_stack_lvl+0xc1/0xf0 <4>[ 7.183010] dump_stack+0x10/0x20 <4>[ 7.183012] paint_ptr+0x8d/0xa0 <4>[ 7.183016] kmemleak_not_leak+0x33/0x70 <4>[ 7.183019] load_module+0xa20/0x2d10 <4>[ 7.183031] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.183037] ? kernel_read_file+0x2ac/0x330 <4>[ 7.183043] init_module_from_file+0x97/0xe0 <4>[ 7.183045] ? init_module_from_file+0x97/0xe0 <4>[ 7.183058] idempotent_init_module+0x134/0x350 <4>[ 7.183069] __x64_sys_finit_module+0x77/0x100 <4>[ 7.183074] x64_sys_call+0x24e3/0x2670 <4>[ 7.183077] do_syscall_64+0x91/0x180 <4>[ 7.183084] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.183088] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.183093] ? do_syscall_64+0x9d/0x180 <4>[ 7.183096] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.183101] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.183105] ? irqentry_exit+0x77/0xb0 <4>[ 7.183108] ? exc_page_fault+0xb1/0x300 <4>[ 7.183114] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.183116] RIP: 0033:0x78cf6112725d <4>[ 7.183118] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.183119] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.183121] RAX: ffffffffffffffda RBX: 000057e1920cd010 RCX: 000078cf6112725d <4>[ 7.183123] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000001f <4>[ 7.183123] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.183124] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.183125] R13: 0000000000020000 R14: 000057e1920cdf50 R15: 000057e1920d2990 <4>[ 7.183135] <4>[ 7.185520] kmemleak: Found object by alias at 0xffffffffa050d000 <4>[ 7.185525] CPU: 3 UID: 0 PID: 343 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.185529] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.185529] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.185530] Call Trace: <4>[ 7.185531] <4>[ 7.185532] dump_stack_lvl+0x91/0xf0 <4>[ 7.185536] dump_stack+0x10/0x20 <4>[ 7.185537] __lookup_object+0x90/0xa0 <4>[ 7.185541] __find_and_get_object+0x6c/0x190 <4>[ 7.185545] paint_ptr+0x1b/0xa0 <4>[ 7.185549] kmemleak_not_leak+0x33/0x70 <4>[ 7.185552] load_module+0xa20/0x2d10 <4>[ 7.185564] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.185569] ? kernel_read_file+0x2ac/0x330 <4>[ 7.185575] init_module_from_file+0x97/0xe0 <4>[ 7.185577] ? init_module_from_file+0x97/0xe0 <4>[ 7.185588] idempotent_init_module+0x134/0x350 <4>[ 7.185601] __x64_sys_finit_module+0x77/0x100 <4>[ 7.185605] x64_sys_call+0x24e3/0x2670 <4>[ 7.185608] do_syscall_64+0x91/0x180 <4>[ 7.185612] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.185616] ? switch_fpu_return+0xe0/0x130 <4>[ 7.185620] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.185625] ? do_syscall_64+0x9d/0x180 <4>[ 7.185628] ? do_syscall_64+0x9d/0x180 <4>[ 7.185634] ? __fput+0x1bf/0x2f0 <4>[ 7.185638] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.185642] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.185646] ? do_syscall_64+0x9d/0x180 <4>[ 7.185649] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.185653] ? do_syscall_64+0x9d/0x180 <4>[ 7.185655] ? exc_page_fault+0xb1/0x300 <4>[ 7.185660] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.185662] RIP: 0033:0x78cf6112725d <4>[ 7.185664] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.185666] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.185668] RAX: ffffffffffffffda RBX: 000057e1920c7410 RCX: 000078cf6112725d <4>[ 7.185669] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000027 <4>[ 7.185670] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.185671] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.185671] R13: 0000000000020000 R14: 000057e1920dab50 R15: 000057e1920df8b0 <4>[ 7.185683] <5>[ 7.185683] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.185701] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.185703] kmemleak: min_count = 0 <5>[ 7.185705] kmemleak: count = 0 <5>[ 7.185706] kmemleak: flags = 0x1 <5>[ 7.185708] kmemleak: checksum = 0 <5>[ 7.185709] kmemleak: backtrace: <4>[ 7.185711] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.185714] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.185718] execmem_vmalloc+0x5a/0xf0 <4>[ 7.185721] execmem_alloc+0xc2/0x150 <4>[ 7.185724] load_module+0x9db/0x2d10 <4>[ 7.185726] init_module_from_file+0x97/0xe0 <4>[ 7.185729] idempotent_init_module+0x134/0x350 <4>[ 7.185731] __x64_sys_finit_module+0x77/0x100 <4>[ 7.185733] x64_sys_call+0x24e3/0x2670 <4>[ 7.185736] do_syscall_64+0x91/0x180 <4>[ 7.185739] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.185754] kmemleak: Trying to color unknown object at 0xffffffffa050d000 as Grey <4>[ 7.185757] CPU: 3 UID: 0 PID: 343 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.185760] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.185760] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.185761] Call Trace: <4>[ 7.185762] <4>[ 7.185763] dump_stack_lvl+0xc1/0xf0 <4>[ 7.185766] dump_stack+0x10/0x20 <4>[ 7.185768] paint_ptr+0x8d/0xa0 <4>[ 7.185772] kmemleak_not_leak+0x33/0x70 <4>[ 7.185776] load_module+0xa20/0x2d10 <4>[ 7.185788] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.185793] ? kernel_read_file+0x2ac/0x330 <4>[ 7.185800] init_module_from_file+0x97/0xe0 <4>[ 7.185802] ? init_module_from_file+0x97/0xe0 <4>[ 7.185815] idempotent_init_module+0x134/0x350 <4>[ 7.185829] __x64_sys_finit_module+0x77/0x100 <4>[ 7.185834] x64_sys_call+0x24e3/0x2670 <4>[ 7.185837] do_syscall_64+0x91/0x180 <4>[ 7.185842] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.185846] ? switch_fpu_return+0xe0/0x130 <4>[ 7.185852] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.185856] ? do_syscall_64+0x9d/0x180 <4>[ 7.185860] ? do_syscall_64+0x9d/0x180 <4>[ 7.185867] ? __fput+0x1bf/0x2f0 <4>[ 7.185872] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.185877] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.185882] ? do_syscall_64+0x9d/0x180 <4>[ 7.185885] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.185890] ? do_syscall_64+0x9d/0x180 <4>[ 7.185892] ? exc_page_fault+0xb1/0x300 <4>[ 7.185897] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.185900] RIP: 0033:0x78cf6112725d <4>[ 7.185902] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.185903] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.185905] RAX: ffffffffffffffda RBX: 000057e1920c7410 RCX: 000078cf6112725d <4>[ 7.185906] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000027 <4>[ 7.185907] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.185907] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.185908] R13: 0000000000020000 R14: 000057e1920dab50 R15: 000057e1920df8b0 <4>[ 7.185919] <4>[ 7.186117] kmemleak: Found object by alias at 0xffffffffa0505000 <4>[ 7.186135] CPU: 3 UID: 0 PID: 343 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.186137] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.186138] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.186138] Call Trace: <4>[ 7.186139] <4>[ 7.186140] dump_stack_lvl+0x91/0xf0 <4>[ 7.186142] dump_stack+0x10/0x20 <4>[ 7.186144] __lookup_object+0x90/0xa0 <4>[ 7.186147] __find_and_get_object+0x6c/0x190 <4>[ 7.186151] paint_ptr+0x1b/0xa0 <4>[ 7.186154] kmemleak_not_leak+0x33/0x70 <4>[ 7.186157] load_module+0xa20/0x2d10 <4>[ 7.186167] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.186171] ? kernel_read_file+0x2ac/0x330 <4>[ 7.186177] init_module_from_file+0x97/0xe0 <4>[ 7.186178] ? init_module_from_file+0x97/0xe0 <4>[ 7.186189] idempotent_init_module+0x134/0x350 <4>[ 7.186200] __x64_sys_finit_module+0x77/0x100 <4>[ 7.186203] x64_sys_call+0x24e3/0x2670 <4>[ 7.186206] do_syscall_64+0x91/0x180 <4>[ 7.186209] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.186212] ? switch_fpu_return+0xe0/0x130 <4>[ 7.186216] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.186220] ? do_syscall_64+0x9d/0x180 <4>[ 7.186223] ? do_syscall_64+0x9d/0x180 <4>[ 7.186228] ? __fput+0x1bf/0x2f0 <4>[ 7.186231] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.186235] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.186238] ? do_syscall_64+0x9d/0x180 <4>[ 7.186242] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.186245] ? do_syscall_64+0x9d/0x180 <4>[ 7.186247] ? exc_page_fault+0xb1/0x300 <4>[ 7.186251] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.186253] RIP: 0033:0x78cf6112725d <4>[ 7.186255] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.186256] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.186257] RAX: ffffffffffffffda RBX: 000057e1920c7410 RCX: 000078cf6112725d <4>[ 7.186258] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000027 <4>[ 7.186259] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.186260] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.186261] R13: 0000000000020000 R14: 000057e1920dab50 R15: 000057e1920df8b0 <4>[ 7.186271] <5>[ 7.186271] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.186286] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.186288] kmemleak: min_count = 0 <5>[ 7.186289] kmemleak: count = 0 <5>[ 7.186290] kmemleak: flags = 0x1 <5>[ 7.186292] kmemleak: checksum = 0 <5>[ 7.186293] kmemleak: backtrace: <4>[ 7.186294] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.186297] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.186300] execmem_vmalloc+0x5a/0xf0 <4>[ 7.186302] execmem_alloc+0xc2/0x150 <4>[ 7.186305] load_module+0x9db/0x2d10 <4>[ 7.186307] init_module_from_file+0x97/0xe0 <4>[ 7.186309] idempotent_init_module+0x134/0x350 <4>[ 7.186311] __x64_sys_finit_module+0x77/0x100 <4>[ 7.186313] x64_sys_call+0x24e3/0x2670 <4>[ 7.186315] do_syscall_64+0x91/0x180 <4>[ 7.186318] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.186321] kmemleak: Trying to color unknown object at 0xffffffffa0505000 as Grey <4>[ 7.186323] CPU: 3 UID: 0 PID: 343 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.186325] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.186326] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.186326] Call Trace: <4>[ 7.186327] <4>[ 7.186328] dump_stack_lvl+0xc1/0xf0 <4>[ 7.186331] dump_stack+0x10/0x20 <4>[ 7.186333] paint_ptr+0x8d/0xa0 <4>[ 7.186337] kmemleak_not_leak+0x33/0x70 <4>[ 7.186340] load_module+0xa20/0x2d10 <4>[ 7.186354] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.186359] ? kernel_read_file+0x2ac/0x330 <4>[ 7.186366] init_module_from_file+0x97/0xe0 <4>[ 7.186368] ? init_module_from_file+0x97/0xe0 <4>[ 7.186382] idempotent_init_module+0x134/0x350 <4>[ 7.186395] __x64_sys_finit_module+0x77/0x100 <4>[ 7.186399] x64_sys_call+0x24e3/0x2670 <4>[ 7.186402] do_syscall_64+0x91/0x180 <4>[ 7.186406] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.186410] ? switch_fpu_return+0xe0/0x130 <4>[ 7.186415] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.186419] ? do_syscall_64+0x9d/0x180 <4>[ 7.186422] ? do_syscall_64+0x9d/0x180 <4>[ 7.186429] ? __fput+0x1bf/0x2f0 <4>[ 7.186433] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.186438] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.186442] ? do_syscall_64+0x9d/0x180 <4>[ 7.186447] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.186451] ? do_syscall_64+0x9d/0x180 <4>[ 7.186453] ? exc_page_fault+0xb1/0x300 <4>[ 7.186458] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.186461] RIP: 0033:0x78cf6112725d <4>[ 7.186463] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.186464] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.186466] RAX: ffffffffffffffda RBX: 000057e1920c7410 RCX: 000078cf6112725d <4>[ 7.186467] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000027 <4>[ 7.186468] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.186469] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.186470] R13: 0000000000020000 R14: 000057e1920dab50 R15: 000057e1920df8b0 <4>[ 7.186482] <6>[ 7.199156] igb 0000:02:00.0: added PHC on eth0 <6>[ 7.199239] igb 0000:02:00.0: Intel(R) Gigabit Ethernet Network Connection <6>[ 7.199242] igb 0000:02:00.0: eth0: (PCIe:2.5Gb/s:Width x1) a4:bf:01:2b:35:1f <4>[ 7.199246] kmemleak: Found object by alias at 0xffffffffa050c000 <4>[ 7.199251] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.199255] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.199255] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.199257] Call Trace: <4>[ 7.199258] <4>[ 7.199260] dump_stack_lvl+0x91/0xf0 <4>[ 7.199265] dump_stack+0x10/0x20 <4>[ 7.199267] __lookup_object+0x90/0xa0 <4>[ 7.199272] __find_and_get_object+0x6c/0x190 <4>[ 7.199275] paint_ptr+0x1b/0xa0 <4>[ 7.199278] kmemleak_not_leak+0x33/0x70 <4>[ 7.199281] load_module+0xa20/0x2d10 <6>[ 7.199286] igb 0000:02:00.0: eth0: PBA No: 006200-000 <4>[ 7.199289] ? security_kernel_post_read_file+0xab/0x1a0 <6>[ 7.199292] igb 0000:02:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) <4>[ 7.199294] ? kernel_read_file+0x2ac/0x330 <4>[ 7.199299] init_module_from_file+0x97/0xe0 <4>[ 7.199300] ? init_module_from_file+0x97/0xe0 <4>[ 7.199308] idempotent_init_module+0x134/0x350 <4>[ 7.199316] __x64_sys_finit_module+0x77/0x100 <4>[ 7.199319] x64_sys_call+0x24e3/0x2670 <4>[ 7.199322] do_syscall_64+0x91/0x180 <4>[ 7.199326] ? ext4_llseek+0xc0/0x120 <4>[ 7.199330] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.199333] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.199337] ? do_syscall_64+0x9d/0x180 <4>[ 7.199341] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.199344] ? do_syscall_64+0x9d/0x180 <4>[ 7.199347] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.199350] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.199353] ? do_syscall_64+0x9d/0x180 <4>[ 7.199355] ? do_syscall_64+0x9d/0x180 <4>[ 7.199358] ? do_syscall_64+0x9d/0x180 <4>[ 7.199359] ? irqentry_exit+0x77/0xb0 <4>[ 7.199361] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.199364] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.199367] RIP: 0033:0x78cf6112725d <4>[ 7.199369] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.199370] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.199372] RAX: ffffffffffffffda RBX: 000057e1920f40b0 RCX: 000078cf6112725d <4>[ 7.199373] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000037 <4>[ 7.199373] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23870 <4>[ 7.199374] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.199375] R13: 0000000000020000 R14: 000057e1920c6170 R15: 000057e1920f0b20 <4>[ 7.199382] <5>[ 7.199383] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.199392] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.199394] kmemleak: min_count = 0 <5>[ 7.199395] kmemleak: count = 0 <5>[ 7.199396] kmemleak: flags = 0x1 <5>[ 7.199398] kmemleak: checksum = 0 <5>[ 7.199399] kmemleak: backtrace: <4>[ 7.199400] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.199403] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.199406] execmem_vmalloc+0x5a/0xf0 <4>[ 7.199408] execmem_alloc+0xc2/0x150 <4>[ 7.199411] load_module+0x9db/0x2d10 <4>[ 7.199413] init_module_from_file+0x97/0xe0 <4>[ 7.199415] idempotent_init_module+0x134/0x350 <4>[ 7.199416] __x64_sys_finit_module+0x77/0x100 <4>[ 7.199418] x64_sys_call+0x24e3/0x2670 <4>[ 7.199420] do_syscall_64+0x91/0x180 <4>[ 7.199423] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.199425] kmemleak: Trying to color unknown object at 0xffffffffa050c000 as Grey <4>[ 7.199428] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.199429] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.199430] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.199430] Call Trace: <4>[ 7.199431] <4>[ 7.199431] dump_stack_lvl+0xc1/0xf0 <4>[ 7.199433] dump_stack+0x10/0x20 <4>[ 7.199435] paint_ptr+0x8d/0xa0 <4>[ 7.199437] kmemleak_not_leak+0x33/0x70 <4>[ 7.199440] load_module+0xa20/0x2d10 <4>[ 7.199446] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.199450] ? kernel_read_file+0x2ac/0x330 <4>[ 7.199454] init_module_from_file+0x97/0xe0 <4>[ 7.199455] ? init_module_from_file+0x97/0xe0 <4>[ 7.199462] idempotent_init_module+0x134/0x350 <4>[ 7.199469] __x64_sys_finit_module+0x77/0x100 <4>[ 7.199472] x64_sys_call+0x24e3/0x2670 <4>[ 7.199474] do_syscall_64+0x91/0x180 <4>[ 7.199477] ? ext4_llseek+0xc0/0x120 <4>[ 7.199480] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.199482] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.199485] ? do_syscall_64+0x9d/0x180 <4>[ 7.199489] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.199492] ? do_syscall_64+0x9d/0x180 <4>[ 7.199495] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.199498] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.199501] ? do_syscall_64+0x9d/0x180 <4>[ 7.199503] ? do_syscall_64+0x9d/0x180 <4>[ 7.199505] ? do_syscall_64+0x9d/0x180 <4>[ 7.199506] ? irqentry_exit+0x77/0xb0 <4>[ 7.199509] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.199511] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.199513] RIP: 0033:0x78cf6112725d <4>[ 7.199514] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.199515] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.199516] RAX: ffffffffffffffda RBX: 000057e1920f40b0 RCX: 000078cf6112725d <4>[ 7.199517] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000037 <4>[ 7.199517] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23870 <4>[ 7.199518] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.199518] R13: 0000000000020000 R14: 000057e1920c6170 R15: 000057e1920f0b20 <4>[ 7.199525] <4>[ 7.199831] kmemleak: Found object by alias at 0xffffffffa050f000 <4>[ 7.199834] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.199836] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.199836] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.199837] Call Trace: <4>[ 7.199837] <4>[ 7.199838] dump_stack_lvl+0x91/0xf0 <4>[ 7.199841] dump_stack+0x10/0x20 <4>[ 7.199842] __lookup_object+0x90/0xa0 <4>[ 7.199847] __find_and_get_object+0x6c/0x190 <4>[ 7.199852] paint_ptr+0x1b/0xa0 <4>[ 7.199857] kmemleak_not_leak+0x33/0x70 <4>[ 7.199860] load_module+0xa20/0x2d10 <4>[ 7.199876] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.199883] ? kernel_read_file+0x2ac/0x330 <4>[ 7.199892] init_module_from_file+0x97/0xe0 <4>[ 7.199894] ? init_module_from_file+0x97/0xe0 <4>[ 7.199910] idempotent_init_module+0x134/0x350 <4>[ 7.199928] __x64_sys_finit_module+0x77/0x100 <4>[ 7.199933] x64_sys_call+0x24e3/0x2670 <4>[ 7.199937] do_syscall_64+0x91/0x180 <4>[ 7.199943] ? ext4_llseek+0xc0/0x120 <4>[ 7.199946] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.199950] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.199954] ? do_syscall_64+0x9d/0x180 <4>[ 7.199959] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.199962] ? do_syscall_64+0x9d/0x180 <4>[ 7.199967] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.199970] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.199973] ? do_syscall_64+0x9d/0x180 <4>[ 7.199975] ? do_syscall_64+0x9d/0x180 <4>[ 7.199978] ? do_syscall_64+0x9d/0x180 <4>[ 7.199980] ? irqentry_exit+0x77/0xb0 <4>[ 7.199982] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.199986] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.199988] RIP: 0033:0x78cf6112725d <4>[ 7.199990] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.199991] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.199992] RAX: ffffffffffffffda RBX: 000057e1920f40b0 RCX: 000078cf6112725d <4>[ 7.199993] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000037 <4>[ 7.199994] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23870 <4>[ 7.199995] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.199995] R13: 0000000000020000 R14: 000057e1920c6170 R15: 000057e1920f0b20 <4>[ 7.200006] <5>[ 7.200006] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.200022] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.200023] kmemleak: min_count = 0 <5>[ 7.200025] kmemleak: count = 0 <5>[ 7.200026] kmemleak: flags = 0x1 <5>[ 7.200027] kmemleak: checksum = 0 <5>[ 7.200028] kmemleak: backtrace: <4>[ 7.200030] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.200032] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.200035] execmem_vmalloc+0x5a/0xf0 <4>[ 7.200038] execmem_alloc+0xc2/0x150 <4>[ 7.200041] load_module+0x9db/0x2d10 <4>[ 7.200043] init_module_from_file+0x97/0xe0 <4>[ 7.200045] idempotent_init_module+0x134/0x350 <4>[ 7.200047] __x64_sys_finit_module+0x77/0x100 <4>[ 7.200049] x64_sys_call+0x24e3/0x2670 <4>[ 7.200051] do_syscall_64+0x91/0x180 <4>[ 7.200054] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.200056] kmemleak: Trying to color unknown object at 0xffffffffa050f000 as Grey <4>[ 7.200059] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.200061] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.200061] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.200062] Call Trace: <4>[ 7.200062] <4>[ 7.200064] dump_stack_lvl+0xc1/0xf0 <4>[ 7.200067] dump_stack+0x10/0x20 <4>[ 7.200069] paint_ptr+0x8d/0xa0 <4>[ 7.200074] kmemleak_not_leak+0x33/0x70 <4>[ 7.200077] load_module+0xa20/0x2d10 <4>[ 7.200089] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.200095] ? kernel_read_file+0x2ac/0x330 <4>[ 7.200102] init_module_from_file+0x97/0xe0 <4>[ 7.200103] ? init_module_from_file+0x97/0xe0 <4>[ 7.200115] idempotent_init_module+0x134/0x350 <4>[ 7.200129] __x64_sys_finit_module+0x77/0x100 <4>[ 7.200134] x64_sys_call+0x24e3/0x2670 <4>[ 7.200137] do_syscall_64+0x91/0x180 <4>[ 7.200143] ? ext4_llseek+0xc0/0x120 <4>[ 7.200147] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.200152] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.200157] ? do_syscall_64+0x9d/0x180 <4>[ 7.200163] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.200168] ? do_syscall_64+0x9d/0x180 <4>[ 7.200174] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.200177] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.200181] ? do_syscall_64+0x9d/0x180 <4>[ 7.200184] ? do_syscall_64+0x9d/0x180 <4>[ 7.200187] ? do_syscall_64+0x9d/0x180 <4>[ 7.200189] ? irqentry_exit+0x77/0xb0 <4>[ 7.200191] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.200196] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.200199] RIP: 0033:0x78cf6112725d <4>[ 7.200201] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.200202] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.200204] RAX: ffffffffffffffda RBX: 000057e1920f40b0 RCX: 000078cf6112725d <4>[ 7.200205] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000037 <4>[ 7.200206] RBP: 00007ffe24e238e0 R08: 000078cf61203ad0 R09: 00007ffe24e23870 <4>[ 7.200207] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.200208] R13: 0000000000020000 R14: 000057e1920c6170 R15: 000057e1920f0b20 <4>[ 7.200221] <4>[ 7.220379] kmemleak: Found object by alias at 0xffffffffa0510000 <4>[ 7.220386] CPU: 5 UID: 0 PID: 378 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.220389] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.220390] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.220391] Call Trace: <4>[ 7.220392] <4>[ 7.220394] dump_stack_lvl+0x91/0xf0 <4>[ 7.220400] dump_stack+0x10/0x20 <4>[ 7.220402] __lookup_object+0x90/0xa0 <4>[ 7.220407] __find_and_get_object+0x6c/0x190 <4>[ 7.220412] paint_ptr+0x1b/0xa0 <4>[ 7.220417] kmemleak_not_leak+0x33/0x70 <4>[ 7.220420] load_module+0xa20/0x2d10 <4>[ 7.220435] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.220441] ? kernel_read_file+0x2ac/0x330 <4>[ 7.220449] init_module_from_file+0x97/0xe0 <4>[ 7.220451] ? init_module_from_file+0x97/0xe0 <4>[ 7.220465] idempotent_init_module+0x134/0x350 <4>[ 7.220481] __x64_sys_finit_module+0x77/0x100 <4>[ 7.220486] x64_sys_call+0x24e3/0x2670 <4>[ 7.220489] do_syscall_64+0x91/0x180 <4>[ 7.220492] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.220497] ? do_syscall_64+0x9d/0x180 <4>[ 7.220500] ? irqentry_exit+0x77/0xb0 <4>[ 7.220503] ? exc_page_fault+0xb1/0x300 <4>[ 7.220508] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.220511] RIP: 0033:0x78cf6112725d <4>[ 7.220514] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.220516] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.220518] RAX: ffffffffffffffda RBX: 000057e1920f9c20 RCX: 000078cf6112725d <4>[ 7.220520] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.220521] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.220522] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.220523] R13: 0000000000020000 R14: 000057e1920c3d80 R15: 000057e1920eec90 <4>[ 7.220533] <5>[ 7.220534] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.220548] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.220550] kmemleak: min_count = 0 <5>[ 7.220552] kmemleak: count = 0 <5>[ 7.220554] kmemleak: flags = 0x1 <5>[ 7.220555] kmemleak: checksum = 0 <5>[ 7.220557] kmemleak: backtrace: <4>[ 7.220559] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.220562] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.220565] execmem_vmalloc+0x5a/0xf0 <4>[ 7.220569] execmem_alloc+0xc2/0x150 <4>[ 7.220572] load_module+0x9db/0x2d10 <4>[ 7.220574] init_module_from_file+0x97/0xe0 <4>[ 7.220577] idempotent_init_module+0x134/0x350 <4>[ 7.220579] __x64_sys_finit_module+0x77/0x100 <4>[ 7.220581] x64_sys_call+0x24e3/0x2670 <4>[ 7.220584] do_syscall_64+0x91/0x180 <4>[ 7.220587] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.220600] kmemleak: Trying to color unknown object at 0xffffffffa0510000 as Grey <4>[ 7.220603] CPU: 5 UID: 0 PID: 378 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.220606] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.220606] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.220607] Call Trace: <4>[ 7.220608] <4>[ 7.220609] dump_stack_lvl+0xc1/0xf0 <4>[ 7.220613] dump_stack+0x10/0x20 <4>[ 7.220615] paint_ptr+0x8d/0xa0 <4>[ 7.220619] kmemleak_not_leak+0x33/0x70 <4>[ 7.220622] load_module+0xa20/0x2d10 <4>[ 7.220635] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.220641] ? kernel_read_file+0x2ac/0x330 <4>[ 7.220647] init_module_from_file+0x97/0xe0 <4>[ 7.220649] ? init_module_from_file+0x97/0xe0 <4>[ 7.220662] idempotent_init_module+0x134/0x350 <4>[ 7.220677] __x64_sys_finit_module+0x77/0x100 <4>[ 7.220681] x64_sys_call+0x24e3/0x2670 <4>[ 7.220684] do_syscall_64+0x91/0x180 <4>[ 7.220686] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.220691] ? do_syscall_64+0x9d/0x180 <4>[ 7.220694] ? irqentry_exit+0x77/0xb0 <4>[ 7.220696] ? exc_page_fault+0xb1/0x300 <4>[ 7.220702] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.220704] RIP: 0033:0x78cf6112725d <4>[ 7.220706] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.220707] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.220709] RAX: ffffffffffffffda RBX: 000057e1920f9c20 RCX: 000078cf6112725d <4>[ 7.220710] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.220711] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.220712] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.220713] R13: 0000000000020000 R14: 000057e1920c3d80 R15: 000057e1920eec90 <4>[ 7.220726] <4>[ 7.221889] kmemleak: Found object by alias at 0xffffffffa050f000 <4>[ 7.221893] CPU: 5 UID: 0 PID: 378 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.221896] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.221897] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.221898] Call Trace: <4>[ 7.221899] <4>[ 7.221900] dump_stack_lvl+0x91/0xf0 <4>[ 7.221904] dump_stack+0x10/0x20 <4>[ 7.221906] __lookup_object+0x90/0xa0 <4>[ 7.221911] __find_and_get_object+0x6c/0x190 <4>[ 7.221916] paint_ptr+0x1b/0xa0 <4>[ 7.221921] kmemleak_not_leak+0x33/0x70 <4>[ 7.221925] load_module+0xa20/0x2d10 <4>[ 7.221940] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.221946] ? kernel_read_file+0x2ac/0x330 <4>[ 7.221955] init_module_from_file+0x97/0xe0 <4>[ 7.221956] ? init_module_from_file+0x97/0xe0 <4>[ 7.221970] idempotent_init_module+0x134/0x350 <4>[ 7.221982] __x64_sys_finit_module+0x77/0x100 <4>[ 7.221986] x64_sys_call+0x24e3/0x2670 <4>[ 7.221988] do_syscall_64+0x91/0x180 <4>[ 7.221990] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.221994] ? do_syscall_64+0x9d/0x180 <4>[ 7.221996] ? irqentry_exit+0x77/0xb0 <4>[ 7.221999] ? exc_page_fault+0xb1/0x300 <4>[ 7.222003] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.222005] RIP: 0033:0x78cf6112725d <4>[ 7.222007] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.222008] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.222010] RAX: ffffffffffffffda RBX: 000057e1920f9c20 RCX: 000078cf6112725d <4>[ 7.222011] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.222011] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.222012] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.222013] R13: 0000000000020000 R14: 000057e1920c3d80 R15: 000057e1920eec90 <4>[ 7.222023] <5>[ 7.222024] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.222036] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.222038] kmemleak: min_count = 0 <5>[ 7.222040] kmemleak: count = 0 <5>[ 7.222041] kmemleak: flags = 0x1 <5>[ 7.222042] kmemleak: checksum = 0 <5>[ 7.222043] kmemleak: backtrace: <4>[ 7.222045] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.222048] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.222051] execmem_vmalloc+0x5a/0xf0 <4>[ 7.222054] execmem_alloc+0xc2/0x150 <4>[ 7.222057] load_module+0x9db/0x2d10 <4>[ 7.222059] init_module_from_file+0x97/0xe0 <4>[ 7.222061] idempotent_init_module+0x134/0x350 <4>[ 7.222063] __x64_sys_finit_module+0x77/0x100 <4>[ 7.222065] x64_sys_call+0x24e3/0x2670 <4>[ 7.222067] do_syscall_64+0x91/0x180 <4>[ 7.222070] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.222098] kmemleak: Trying to color unknown object at 0xffffffffa050f000 as Grey <4>[ 7.222101] CPU: 5 UID: 0 PID: 378 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.222103] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.222103] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.222104] Call Trace: <4>[ 7.222105] <4>[ 7.222106] dump_stack_lvl+0xc1/0xf0 <4>[ 7.222109] dump_stack+0x10/0x20 <4>[ 7.222111] paint_ptr+0x8d/0xa0 <4>[ 7.222116] kmemleak_not_leak+0x33/0x70 <4>[ 7.222119] load_module+0xa20/0x2d10 <4>[ 7.222133] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.222138] ? kernel_read_file+0x2ac/0x330 <4>[ 7.222145] init_module_from_file+0x97/0xe0 <4>[ 7.222147] ? init_module_from_file+0x97/0xe0 <4>[ 7.222162] idempotent_init_module+0x134/0x350 <4>[ 7.222177] __x64_sys_finit_module+0x77/0x100 <4>[ 7.222182] x64_sys_call+0x24e3/0x2670 <4>[ 7.222185] do_syscall_64+0x91/0x180 <4>[ 7.222187] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.222192] ? do_syscall_64+0x9d/0x180 <4>[ 7.222195] ? irqentry_exit+0x77/0xb0 <4>[ 7.222198] ? exc_page_fault+0xb1/0x300 <4>[ 7.222204] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.222206] RIP: 0033:0x78cf6112725d <4>[ 7.222208] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.222210] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.222212] RAX: ffffffffffffffda RBX: 000057e1920f9c20 RCX: 000078cf6112725d <4>[ 7.222213] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.222214] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.222215] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.222216] R13: 0000000000020000 R14: 000057e1920c3d80 R15: 000057e1920eec90 <4>[ 7.222231] <4>[ 7.226710] kmemleak: Found object by alias at 0xffffffffa0511000 <4>[ 7.226717] CPU: 4 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.226721] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.226721] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.226722] Call Trace: <4>[ 7.226723] <4>[ 7.226724] dump_stack_lvl+0x91/0xf0 <4>[ 7.226729] dump_stack+0x10/0x20 <4>[ 7.226730] __lookup_object+0x90/0xa0 <4>[ 7.226735] __find_and_get_object+0x6c/0x190 <4>[ 7.226739] paint_ptr+0x1b/0xa0 <4>[ 7.226742] kmemleak_not_leak+0x33/0x70 <4>[ 7.226745] load_module+0xa20/0x2d10 <4>[ 7.226756] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.226761] ? kernel_read_file+0x2ac/0x330 <4>[ 7.226767] init_module_from_file+0x97/0xe0 <4>[ 7.226768] ? init_module_from_file+0x97/0xe0 <4>[ 7.226778] idempotent_init_module+0x134/0x350 <4>[ 7.226789] __x64_sys_finit_module+0x77/0x100 <4>[ 7.226793] x64_sys_call+0x24e3/0x2670 <4>[ 7.226796] do_syscall_64+0x91/0x180 <4>[ 7.226800] ? putname+0x60/0x80 <4>[ 7.226802] ? do_sys_openat2+0xab/0xf0 <4>[ 7.226808] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.226812] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.226816] ? do_syscall_64+0x9d/0x180 <4>[ 7.226819] ? do_syscall_64+0x9d/0x180 <4>[ 7.226821] ? do_syscall_64+0x9d/0x180 <4>[ 7.226823] ? do_syscall_64+0x9d/0x180 <4>[ 7.226825] ? irqentry_exit+0x77/0xb0 <4>[ 7.226827] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.226831] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.226833] RIP: 0033:0x78cf6112725d <4>[ 7.226836] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.226837] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.226839] RAX: ffffffffffffffda RBX: 000057e1920f46b0 RCX: 000078cf6112725d <4>[ 7.226840] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.226841] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.226842] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.226842] R13: 0000000000020000 R14: 000057e1920c3f30 R15: 000057e1920f8490 <4>[ 7.226852] <5>[ 7.226853] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.226867] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.226869] kmemleak: min_count = 0 <5>[ 7.226871] kmemleak: count = 0 <5>[ 7.226872] kmemleak: flags = 0x1 <5>[ 7.226873] kmemleak: checksum = 0 <5>[ 7.226874] kmemleak: backtrace: <4>[ 7.226876] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.226879] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.226882] execmem_vmalloc+0x5a/0xf0 <4>[ 7.226885] execmem_alloc+0xc2/0x150 <4>[ 7.226888] load_module+0x9db/0x2d10 <4>[ 7.226890] init_module_from_file+0x97/0xe0 <4>[ 7.226892] idempotent_init_module+0x134/0x350 <4>[ 7.226894] __x64_sys_finit_module+0x77/0x100 <4>[ 7.226896] x64_sys_call+0x24e3/0x2670 <4>[ 7.226898] do_syscall_64+0x91/0x180 <4>[ 7.226901] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.226904] kmemleak: Trying to color unknown object at 0xffffffffa0511000 as Grey <4>[ 7.226906] CPU: 4 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.226908] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.226909] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.226910] Call Trace: <4>[ 7.226910] <4>[ 7.226911] dump_stack_lvl+0xc1/0xf0 <4>[ 7.226915] dump_stack+0x10/0x20 <4>[ 7.226917] paint_ptr+0x8d/0xa0 <4>[ 7.226921] kmemleak_not_leak+0x33/0x70 <4>[ 7.226924] load_module+0xa20/0x2d10 <4>[ 7.226936] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.226941] ? kernel_read_file+0x2ac/0x330 <4>[ 7.226947] init_module_from_file+0x97/0xe0 <4>[ 7.226949] ? init_module_from_file+0x97/0xe0 <4>[ 7.226963] idempotent_init_module+0x134/0x350 <4>[ 7.226977] __x64_sys_finit_module+0x77/0x100 <4>[ 7.226982] x64_sys_call+0x24e3/0x2670 <4>[ 7.226985] do_syscall_64+0x91/0x180 <4>[ 7.226990] ? putname+0x60/0x80 <4>[ 7.226993] ? do_sys_openat2+0xab/0xf0 <4>[ 7.227000] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.227004] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.227009] ? do_syscall_64+0x9d/0x180 <4>[ 7.227012] ? do_syscall_64+0x9d/0x180 <4>[ 7.227015] ? do_syscall_64+0x9d/0x180 <4>[ 7.227018] ? do_syscall_64+0x9d/0x180 <4>[ 7.227020] ? irqentry_exit+0x77/0xb0 <4>[ 7.227023] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.227027] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.227030] RIP: 0033:0x78cf6112725d <4>[ 7.227033] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.227034] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.227036] RAX: ffffffffffffffda RBX: 000057e1920f46b0 RCX: 000078cf6112725d <4>[ 7.227037] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.227038] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.227039] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.227040] R13: 0000000000020000 R14: 000057e1920c3f30 R15: 000057e1920f8490 <4>[ 7.227054] <4>[ 7.227158] kmemleak: Found object by alias at 0xffffffffa0512000 <4>[ 7.227173] CPU: 4 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.227176] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.227176] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.227177] Call Trace: <4>[ 7.227177] <4>[ 7.227178] dump_stack_lvl+0x91/0xf0 <4>[ 7.227181] dump_stack+0x10/0x20 <4>[ 7.227182] __lookup_object+0x90/0xa0 <4>[ 7.227186] __find_and_get_object+0x6c/0x190 <4>[ 7.227189] paint_ptr+0x1b/0xa0 <4>[ 7.227193] kmemleak_not_leak+0x33/0x70 <4>[ 7.227195] load_module+0xa20/0x2d10 <4>[ 7.227205] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.227209] ? kernel_read_file+0x2ac/0x330 <4>[ 7.227215] init_module_from_file+0x97/0xe0 <4>[ 7.227216] ? init_module_from_file+0x97/0xe0 <4>[ 7.227227] idempotent_init_module+0x134/0x350 <4>[ 7.227238] __x64_sys_finit_module+0x77/0x100 <4>[ 7.227241] x64_sys_call+0x24e3/0x2670 <4>[ 7.227243] do_syscall_64+0x91/0x180 <4>[ 7.227247] ? putname+0x60/0x80 <4>[ 7.227249] ? do_sys_openat2+0xab/0xf0 <4>[ 7.227254] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.227258] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.227262] ? do_syscall_64+0x9d/0x180 <4>[ 7.227265] ? do_syscall_64+0x9d/0x180 <4>[ 7.227267] ? do_syscall_64+0x9d/0x180 <4>[ 7.227269] ? do_syscall_64+0x9d/0x180 <4>[ 7.227271] ? irqentry_exit+0x77/0xb0 <4>[ 7.227273] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.227277] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.227279] RIP: 0033:0x78cf6112725d <4>[ 7.227280] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.227281] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.227282] RAX: ffffffffffffffda RBX: 000057e1920f46b0 RCX: 000078cf6112725d <4>[ 7.227283] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.227284] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.227285] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.227285] R13: 0000000000020000 R14: 000057e1920c3f30 R15: 000057e1920f8490 <4>[ 7.227296] <5>[ 7.227296] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.227310] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.227312] kmemleak: min_count = 0 <5>[ 7.227313] kmemleak: count = 0 <5>[ 7.227315] kmemleak: flags = 0x1 <5>[ 7.227316] kmemleak: checksum = 0 <5>[ 7.227317] kmemleak: backtrace: <4>[ 7.227318] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.227321] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.227324] execmem_vmalloc+0x5a/0xf0 <4>[ 7.227327] execmem_alloc+0xc2/0x150 <4>[ 7.227329] load_module+0x9db/0x2d10 <4>[ 7.227331] init_module_from_file+0x97/0xe0 <4>[ 7.227333] idempotent_init_module+0x134/0x350 <4>[ 7.227335] __x64_sys_finit_module+0x77/0x100 <4>[ 7.227337] x64_sys_call+0x24e3/0x2670 <4>[ 7.227340] do_syscall_64+0x91/0x180 <4>[ 7.227342] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.227345] kmemleak: Trying to color unknown object at 0xffffffffa0512000 as Grey <4>[ 7.227348] CPU: 4 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.227351] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.227351] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.227352] Call Trace: <4>[ 7.227353] <4>[ 7.227354] dump_stack_lvl+0xc1/0xf0 <4>[ 7.227357] dump_stack+0x10/0x20 <4>[ 7.227359] paint_ptr+0x8d/0xa0 <4>[ 7.227364] kmemleak_not_leak+0x33/0x70 <4>[ 7.227367] load_module+0xa20/0x2d10 <4>[ 7.227381] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.227386] ? kernel_read_file+0x2ac/0x330 <4>[ 7.227392] init_module_from_file+0x97/0xe0 <4>[ 7.227393] ? init_module_from_file+0x97/0xe0 <4>[ 7.227402] idempotent_init_module+0x134/0x350 <4>[ 7.227412] __x64_sys_finit_module+0x77/0x100 <4>[ 7.227416] x64_sys_call+0x24e3/0x2670 <4>[ 7.227418] do_syscall_64+0x91/0x180 <4>[ 7.227421] ? putname+0x60/0x80 <4>[ 7.227423] ? do_sys_openat2+0xab/0xf0 <4>[ 7.227428] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.227431] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.227435] ? do_syscall_64+0x9d/0x180 <4>[ 7.227437] ? do_syscall_64+0x9d/0x180 <4>[ 7.227439] ? do_syscall_64+0x9d/0x180 <4>[ 7.227442] ? do_syscall_64+0x9d/0x180 <4>[ 7.227444] ? irqentry_exit+0x77/0xb0 <4>[ 7.227446] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.227449] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.227451] RIP: 0033:0x78cf6112725d <4>[ 7.227452] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.227453] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.227454] RAX: ffffffffffffffda RBX: 000057e1920f46b0 RCX: 000078cf6112725d <4>[ 7.227455] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.227456] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.227456] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.227457] R13: 0000000000020000 R14: 000057e1920c3f30 R15: 000057e1920f8490 <4>[ 7.227466] <6>[ 7.228420] input: American Megatrends Inc. Virtual Keyboard and Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.0/0003:046B:FF10.0001/input/input4 <6>[ 7.244153] ppdev: user-space parallel port driver <4>[ 7.246944] kmemleak: Found object by alias at 0xffffffffa050f000 <4>[ 7.246948] CPU: 1 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.246951] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.246951] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.246952] Call Trace: <4>[ 7.246953] <4>[ 7.246954] dump_stack_lvl+0x91/0xf0 <4>[ 7.246959] dump_stack+0x10/0x20 <4>[ 7.246960] __lookup_object+0x90/0xa0 <4>[ 7.246965] __find_and_get_object+0x6c/0x190 <4>[ 7.246968] paint_ptr+0x1b/0xa0 <4>[ 7.246971] kmemleak_not_leak+0x33/0x70 <4>[ 7.246974] load_module+0xa20/0x2d10 <4>[ 7.246982] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.246987] ? kernel_read_file+0x2ac/0x330 <4>[ 7.246991] init_module_from_file+0x97/0xe0 <4>[ 7.246993] ? init_module_from_file+0x97/0xe0 <4>[ 7.247001] idempotent_init_module+0x134/0x350 <4>[ 7.247009] __x64_sys_finit_module+0x77/0x100 <4>[ 7.247012] x64_sys_call+0x24e3/0x2670 <4>[ 7.247015] do_syscall_64+0x91/0x180 <4>[ 7.247020] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.247023] ? do_syscall_64+0x9d/0x180 <4>[ 7.247026] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.247030] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.247033] ? do_syscall_64+0x9d/0x180 <4>[ 7.247035] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.247038] ? irqentry_exit+0x77/0xb0 <4>[ 7.247040] ? exc_page_fault+0xb1/0x300 <4>[ 7.247044] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.247046] RIP: 0033:0x78cf6112725d <4>[ 7.247048] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.247049] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.247051] RAX: ffffffffffffffda RBX: 000057e1920c7f40 RCX: 000078cf6112725d <4>[ 7.247052] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.247052] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.247053] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.247054] R13: 0000000000020000 R14: 000057e1920c8cd0 R15: 000057e1920c7a30 <4>[ 7.247061] <5>[ 7.247062] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.247074] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.247075] kmemleak: min_count = 0 <5>[ 7.247076] kmemleak: count = 0 <5>[ 7.247078] kmemleak: flags = 0x1 <5>[ 7.247079] kmemleak: checksum = 0 <5>[ 7.247080] kmemleak: backtrace: <4>[ 7.247081] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.247084] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.247087] execmem_vmalloc+0x5a/0xf0 <4>[ 7.247089] execmem_alloc+0xc2/0x150 <4>[ 7.247092] load_module+0x9db/0x2d10 <4>[ 7.247094] init_module_from_file+0x97/0xe0 <4>[ 7.247096] idempotent_init_module+0x134/0x350 <4>[ 7.247097] __x64_sys_finit_module+0x77/0x100 <4>[ 7.247099] x64_sys_call+0x24e3/0x2670 <4>[ 7.247101] do_syscall_64+0x91/0x180 <4>[ 7.247104] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.247106] kmemleak: Trying to color unknown object at 0xffffffffa050f000 as Grey <4>[ 7.247109] CPU: 1 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.247110] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.247111] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.247111] Call Trace: <4>[ 7.247112] <4>[ 7.247112] dump_stack_lvl+0xc1/0xf0 <4>[ 7.247114] dump_stack+0x10/0x20 <4>[ 7.247116] paint_ptr+0x8d/0xa0 <4>[ 7.247119] kmemleak_not_leak+0x33/0x70 <4>[ 7.247121] load_module+0xa20/0x2d10 <4>[ 7.247128] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.247131] ? kernel_read_file+0x2ac/0x330 <4>[ 7.247135] init_module_from_file+0x97/0xe0 <4>[ 7.247136] ? init_module_from_file+0x97/0xe0 <4>[ 7.247143] idempotent_init_module+0x134/0x350 <4>[ 7.247150] __x64_sys_finit_module+0x77/0x100 <4>[ 7.247153] x64_sys_call+0x24e3/0x2670 <4>[ 7.247155] do_syscall_64+0x91/0x180 <4>[ 7.247159] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.247162] ? do_syscall_64+0x9d/0x180 <4>[ 7.247165] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.247168] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.247171] ? do_syscall_64+0x9d/0x180 <4>[ 7.247172] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.247175] ? irqentry_exit+0x77/0xb0 <4>[ 7.247177] ? exc_page_fault+0xb1/0x300 <4>[ 7.247181] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.247182] RIP: 0033:0x78cf6112725d <4>[ 7.247183] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.247184] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.247185] RAX: ffffffffffffffda RBX: 000057e1920c7f40 RCX: 000078cf6112725d <4>[ 7.247186] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.247187] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.247187] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.247188] R13: 0000000000020000 R14: 000057e1920c8cd0 R15: 000057e1920c7a30 <4>[ 7.247194] <4>[ 7.247322] kmemleak: Found object by alias at 0xffffffffa0513000 <4>[ 7.247334] CPU: 1 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.247335] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.247335] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.247336] Call Trace: <4>[ 7.247336] <4>[ 7.247337] dump_stack_lvl+0x91/0xf0 <4>[ 7.247339] dump_stack+0x10/0x20 <4>[ 7.247341] __lookup_object+0x90/0xa0 <4>[ 7.247343] __find_and_get_object+0x6c/0x190 <4>[ 7.247347] paint_ptr+0x1b/0xa0 <4>[ 7.247350] kmemleak_not_leak+0x33/0x70 <4>[ 7.247352] load_module+0xa20/0x2d10 <4>[ 7.247360] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.247363] ? kernel_read_file+0x2ac/0x330 <4>[ 7.247368] init_module_from_file+0x97/0xe0 <4>[ 7.247369] ? init_module_from_file+0x97/0xe0 <4>[ 7.247377] idempotent_init_module+0x134/0x350 <4>[ 7.247385] __x64_sys_finit_module+0x77/0x100 <4>[ 7.247388] x64_sys_call+0x24e3/0x2670 <4>[ 7.247390] do_syscall_64+0x91/0x180 <4>[ 7.247395] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.247398] ? do_syscall_64+0x9d/0x180 <4>[ 7.247401] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.247404] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.247407] ? do_syscall_64+0x9d/0x180 <4>[ 7.247409] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.247412] ? irqentry_exit+0x77/0xb0 <4>[ 7.247415] ? exc_page_fault+0xb1/0x300 <4>[ 7.247418] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.247420] RIP: 0033:0x78cf6112725d <4>[ 7.247421] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.247422] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.247423] RAX: ffffffffffffffda RBX: 000057e1920c7f40 RCX: 000078cf6112725d <4>[ 7.247424] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.247424] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.247425] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.247425] R13: 0000000000020000 R14: 000057e1920c8cd0 R15: 000057e1920c7a30 <4>[ 7.247433] <5>[ 7.247433] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.247445] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.247446] kmemleak: min_count = 0 <5>[ 7.247447] kmemleak: count = 0 <5>[ 7.247448] kmemleak: flags = 0x1 <5>[ 7.247449] kmemleak: checksum = 0 <5>[ 7.247450] kmemleak: backtrace: <4>[ 7.247452] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.247454] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.247457] execmem_vmalloc+0x5a/0xf0 <4>[ 7.247459] execmem_alloc+0xc2/0x150 <4>[ 7.247462] load_module+0x9db/0x2d10 <4>[ 7.247463] init_module_from_file+0x97/0xe0 <4>[ 7.247465] idempotent_init_module+0x134/0x350 <4>[ 7.247467] __x64_sys_finit_module+0x77/0x100 <4>[ 7.247469] x64_sys_call+0x24e3/0x2670 <4>[ 7.247471] do_syscall_64+0x91/0x180 <4>[ 7.247473] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.247476] kmemleak: Trying to color unknown object at 0xffffffffa0513000 as Grey <4>[ 7.247478] CPU: 1 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.247479] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.247479] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.247480] Call Trace: <4>[ 7.247480] <4>[ 7.247481] dump_stack_lvl+0xc1/0xf0 <4>[ 7.247483] dump_stack+0x10/0x20 <4>[ 7.247484] paint_ptr+0x8d/0xa0 <4>[ 7.247487] kmemleak_not_leak+0x33/0x70 <4>[ 7.247489] load_module+0xa20/0x2d10 <4>[ 7.247496] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.247499] ? kernel_read_file+0x2ac/0x330 <4>[ 7.247503] init_module_from_file+0x97/0xe0 <4>[ 7.247504] ? init_module_from_file+0x97/0xe0 <4>[ 7.247511] idempotent_init_module+0x134/0x350 <4>[ 7.247518] __x64_sys_finit_module+0x77/0x100 <4>[ 7.247521] x64_sys_call+0x24e3/0x2670 <4>[ 7.247523] do_syscall_64+0x91/0x180 <4>[ 7.247527] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.247530] ? do_syscall_64+0x9d/0x180 <4>[ 7.247533] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.247536] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.247540] ? do_syscall_64+0x9d/0x180 <4>[ 7.247543] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.247547] ? irqentry_exit+0x77/0xb0 <4>[ 7.247550] ? exc_page_fault+0xb1/0x300 <4>[ 7.247555] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.247557] RIP: 0033:0x78cf6112725d <4>[ 7.247559] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.247561] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.247562] RAX: ffffffffffffffda RBX: 000057e1920c7f40 RCX: 000078cf6112725d <4>[ 7.247563] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.247564] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.247565] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.247566] R13: 0000000000020000 R14: 000057e1920c8cd0 R15: 000057e1920c7a30 <4>[ 7.247577] <6>[ 7.261825] hid-generic 0003:046B:FF10.0001: input,hidraw0: USB HID v1.10 Keyboard [American Megatrends Inc. Virtual Keyboard and Mouse] on usb-0000:00:14.0-1/input0 <6>[ 7.265509] input: American Megatrends Inc. Virtual Keyboard and Mouse as /devices/pci0000:00/0000:00:14.0/usb1/1-1/1-1:1.1/0003:046B:FF10.0002/input/input5 <6>[ 7.266419] igb 0000:03:00.0: added PHC on eth1 <6>[ 7.266452] igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection <6>[ 7.266455] igb 0000:03:00.0: eth1: (PCIe:2.5Gb/s:Width x1) a4:bf:01:2b:35:20 <6>[ 7.266498] igb 0000:03:00.0: eth1: PBA No: 006200-000 <6>[ 7.266501] igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) <4>[ 7.268274] kmemleak: Found object by alias at 0xffffffffa0514000 <4>[ 7.268277] CPU: 7 UID: 0 PID: 350 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.268280] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.268281] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.268281] Call Trace: <4>[ 7.268282] <4>[ 7.268283] dump_stack_lvl+0x91/0xf0 <4>[ 7.268287] dump_stack+0x10/0x20 <4>[ 7.268289] __lookup_object+0x90/0xa0 <4>[ 7.268293] __find_and_get_object+0x6c/0x190 <4>[ 7.268296] paint_ptr+0x1b/0xa0 <4>[ 7.268299] kmemleak_not_leak+0x33/0x70 <4>[ 7.268302] load_module+0xa20/0x2d10 <4>[ 7.268310] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.268315] ? kernel_read_file+0x2ac/0x330 <4>[ 7.268320] init_module_from_file+0x97/0xe0 <4>[ 7.268321] ? init_module_from_file+0x97/0xe0 <4>[ 7.268328] idempotent_init_module+0x134/0x350 <4>[ 7.268337] __x64_sys_finit_module+0x77/0x100 <4>[ 7.268340] x64_sys_call+0x24e3/0x2670 <4>[ 7.268343] do_syscall_64+0x91/0x180 <4>[ 7.268346] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.268349] ? do_syscall_64+0x9d/0x180 <4>[ 7.268351] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.268354] ? do_syscall_64+0x9d/0x180 <4>[ 7.268355] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.268359] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.268362] ? irqentry_exit+0x77/0xb0 <4>[ 7.268364] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.268367] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.268369] RIP: 0033:0x78cf6112725d <4>[ 7.268372] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.268373] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.268374] RAX: ffffffffffffffda RBX: 000057e1920e9880 RCX: 000078cf6112725d <4>[ 7.268375] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000034 <4>[ 7.268376] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.268377] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.268377] R13: 0000000000020000 R14: 000057e1920c3510 R15: 000057e1920e99b0 <4>[ 7.268385] <5>[ 7.268386] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.268397] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.268399] kmemleak: min_count = 0 <5>[ 7.268400] kmemleak: count = 0 <5>[ 7.268401] kmemleak: flags = 0x1 <5>[ 7.268402] kmemleak: checksum = 0 <5>[ 7.268403] kmemleak: backtrace: <4>[ 7.268405] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.268407] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.268411] execmem_vmalloc+0x5a/0xf0 <4>[ 7.268413] execmem_alloc+0xc2/0x150 <4>[ 7.268416] load_module+0x9db/0x2d10 <4>[ 7.268418] init_module_from_file+0x97/0xe0 <4>[ 7.268419] idempotent_init_module+0x134/0x350 <4>[ 7.268421] __x64_sys_finit_module+0x77/0x100 <4>[ 7.268423] x64_sys_call+0x24e3/0x2670 <4>[ 7.268425] do_syscall_64+0x91/0x180 <4>[ 7.268428] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.268460] kmemleak: Trying to color unknown object at 0xffffffffa0514000 as Grey <4>[ 7.268464] CPU: 7 UID: 0 PID: 350 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.268466] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.268467] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.268468] Call Trace: <4>[ 7.268468] <4>[ 7.268469] dump_stack_lvl+0xc1/0xf0 <4>[ 7.268476] dump_stack+0x10/0x20 <4>[ 7.268478] paint_ptr+0x8d/0xa0 <4>[ 7.268481] kmemleak_not_leak+0x33/0x70 <4>[ 7.268484] load_module+0xa20/0x2d10 <4>[ 7.268498] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.268503] ? kernel_read_file+0x2ac/0x330 <4>[ 7.268509] init_module_from_file+0x97/0xe0 <4>[ 7.268511] ? init_module_from_file+0x97/0xe0 <4>[ 7.268525] idempotent_init_module+0x134/0x350 <4>[ 7.268536] __x64_sys_finit_module+0x77/0x100 <4>[ 7.268540] x64_sys_call+0x24e3/0x2670 <4>[ 7.268542] do_syscall_64+0x91/0x180 <4>[ 7.268546] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.268550] ? do_syscall_64+0x9d/0x180 <4>[ 7.268552] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.268557] ? do_syscall_64+0x9d/0x180 <4>[ 7.268572] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.268576] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.268581] ? irqentry_exit+0x77/0xb0 <4>[ 7.268584] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.268588] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.268590] RIP: 0033:0x78cf6112725d <4>[ 7.268592] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.268594] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.268596] RAX: ffffffffffffffda RBX: 000057e1920e9880 RCX: 000078cf6112725d <4>[ 7.268597] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000034 <4>[ 7.268598] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.268599] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.268600] R13: 0000000000020000 R14: 000057e1920c3510 R15: 000057e1920e99b0 <4>[ 7.268612] <4>[ 7.269360] kmemleak: Found object by alias at 0xffffffffa0505000 <4>[ 7.269364] CPU: 7 UID: 0 PID: 350 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.269367] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.269367] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.269368] Call Trace: <4>[ 7.269369] <4>[ 7.269371] dump_stack_lvl+0x91/0xf0 <4>[ 7.269375] dump_stack+0x10/0x20 <4>[ 7.269377] __lookup_object+0x90/0xa0 <4>[ 7.269381] __find_and_get_object+0x6c/0x190 <4>[ 7.269387] paint_ptr+0x1b/0xa0 <4>[ 7.269392] kmemleak_not_leak+0x33/0x70 <4>[ 7.269396] load_module+0xa20/0x2d10 <4>[ 7.269409] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.269413] ? kernel_read_file+0x2ac/0x330 <4>[ 7.269419] init_module_from_file+0x97/0xe0 <4>[ 7.269420] ? init_module_from_file+0x97/0xe0 <4>[ 7.269431] idempotent_init_module+0x134/0x350 <4>[ 7.269442] __x64_sys_finit_module+0x77/0x100 <4>[ 7.269445] x64_sys_call+0x24e3/0x2670 <4>[ 7.269448] do_syscall_64+0x91/0x180 <4>[ 7.269450] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.269454] ? do_syscall_64+0x9d/0x180 <4>[ 7.269456] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.269459] ? do_syscall_64+0x9d/0x180 <4>[ 7.269461] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.269465] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.269468] ? irqentry_exit+0x77/0xb0 <4>[ 7.269471] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.269474] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.269476] RIP: 0033:0x78cf6112725d <4>[ 7.269478] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.269479] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.269481] RAX: ffffffffffffffda RBX: 000057e1920e9880 RCX: 000078cf6112725d <4>[ 7.269482] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000034 <4>[ 7.269482] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.269483] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.269484] R13: 0000000000020000 R14: 000057e1920c3510 R15: 000057e1920e99b0 <4>[ 7.269494] <5>[ 7.269495] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.269509] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.269511] kmemleak: min_count = 0 <5>[ 7.269512] kmemleak: count = 0 <5>[ 7.269513] kmemleak: flags = 0x1 <5>[ 7.269514] kmemleak: checksum = 0 <5>[ 7.269516] kmemleak: backtrace: <4>[ 7.269517] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.269520] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.269523] execmem_vmalloc+0x5a/0xf0 <4>[ 7.269526] execmem_alloc+0xc2/0x150 <4>[ 7.269529] load_module+0x9db/0x2d10 <4>[ 7.269530] init_module_from_file+0x97/0xe0 <4>[ 7.269532] idempotent_init_module+0x134/0x350 <4>[ 7.269534] __x64_sys_finit_module+0x77/0x100 <4>[ 7.269536] x64_sys_call+0x24e3/0x2670 <4>[ 7.269539] do_syscall_64+0x91/0x180 <4>[ 7.269542] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.269552] kmemleak: Trying to color unknown object at 0xffffffffa0505000 as Grey <4>[ 7.269556] CPU: 7 UID: 0 PID: 350 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.269558] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.269559] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.269560] Call Trace: <4>[ 7.269560] <4>[ 7.269562] dump_stack_lvl+0xc1/0xf0 <4>[ 7.269565] dump_stack+0x10/0x20 <4>[ 7.269567] paint_ptr+0x8d/0xa0 <4>[ 7.269572] kmemleak_not_leak+0x33/0x70 <4>[ 7.269575] load_module+0xa20/0x2d10 <4>[ 7.269589] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.269595] ? kernel_read_file+0x2ac/0x330 <4>[ 7.269602] init_module_from_file+0x97/0xe0 <4>[ 7.269604] ? init_module_from_file+0x97/0xe0 <4>[ 7.269618] idempotent_init_module+0x134/0x350 <4>[ 7.269631] __x64_sys_finit_module+0x77/0x100 <4>[ 7.269636] x64_sys_call+0x24e3/0x2670 <4>[ 7.269639] do_syscall_64+0x91/0x180 <4>[ 7.269643] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.269647] ? do_syscall_64+0x9d/0x180 <4>[ 7.269649] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.269654] ? do_syscall_64+0x9d/0x180 <4>[ 7.269656] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.269661] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.269665] ? irqentry_exit+0x77/0xb0 <4>[ 7.269668] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.269673] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.269675] RIP: 0033:0x78cf6112725d <4>[ 7.269678] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.269679] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.269681] RAX: ffffffffffffffda RBX: 000057e1920e9880 RCX: 000078cf6112725d <4>[ 7.269682] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000034 <4>[ 7.269683] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.269684] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.269685] R13: 0000000000020000 R14: 000057e1920c3510 R15: 000057e1920e99b0 <4>[ 7.269700] <6>[ 7.275110] hid-generic 0003:046B:FF10.0002: input,hidraw1: USB HID v1.10 Mouse [American Megatrends Inc. Virtual Keyboard and Mouse] on usb-0000:00:14.0-1/input1 <6>[ 7.276153] ee1004 0-0051: 512 byte EE1004-compliant SPD EEPROM, read-only <6>[ 7.281496] ee1004 0-0053: 512 byte EE1004-compliant SPD EEPROM, read-only <6>[ 7.289012] igb 0000:03:00.0 eno2: renamed from eth1 <6>[ 7.290495] igb 0000:02:00.0 eno1: renamed from eth0 <4>[ 7.392029] kmemleak: Found object by alias at 0xffffffffa05b8000 <4>[ 7.392035] CPU: 5 UID: 0 PID: 343 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.392038] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.392039] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.392040] Call Trace: <4>[ 7.392041] <4>[ 7.392042] dump_stack_lvl+0x91/0xf0 <4>[ 7.392047] dump_stack+0x10/0x20 <4>[ 7.392048] __lookup_object+0x90/0xa0 <4>[ 7.392053] __find_and_get_object+0x6c/0x190 <4>[ 7.392057] paint_ptr+0x1b/0xa0 <4>[ 7.392061] kmemleak_not_leak+0x33/0x70 <4>[ 7.392064] load_module+0xa20/0x2d10 <4>[ 7.392075] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.392080] ? kernel_read_file+0x2ac/0x330 <4>[ 7.392086] init_module_from_file+0x97/0xe0 <4>[ 7.392087] ? init_module_from_file+0x97/0xe0 <4>[ 7.392097] idempotent_init_module+0x134/0x350 <4>[ 7.392109] __x64_sys_finit_module+0x77/0x100 <4>[ 7.392112] x64_sys_call+0x24e3/0x2670 <4>[ 7.392115] do_syscall_64+0x91/0x180 <4>[ 7.392122] ? ext4_llseek+0xc0/0x120 <4>[ 7.392125] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.392130] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392134] ? do_syscall_64+0x9d/0x180 <4>[ 7.392136] ? putname+0x60/0x80 <4>[ 7.392139] ? do_sys_openat2+0xab/0xf0 <4>[ 7.392144] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.392148] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392151] ? do_syscall_64+0x9d/0x180 <4>[ 7.392154] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392158] ? do_syscall_64+0x9d/0x180 <4>[ 7.392160] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392164] ? do_syscall_64+0x9d/0x180 <4>[ 7.392167] ? find_held_lock+0x31/0x90 <4>[ 7.392170] ? do_user_addr_fault+0x640/0x9d0 <4>[ 7.392173] ? lock_release+0xd3/0x2c0 <4>[ 7.392179] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.392183] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.392186] ? irqentry_exit+0x77/0xb0 <4>[ 7.392189] ? exc_page_fault+0xb1/0x300 <4>[ 7.392193] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.392195] RIP: 0033:0x78cf6112725d <4>[ 7.392197] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.392199] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.392201] RAX: ffffffffffffffda RBX: 000057e1920e1100 RCX: 000078cf6112725d <4>[ 7.392202] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 7.392203] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.392203] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.392204] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920e8e10 <4>[ 7.392214] <5>[ 7.392215] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.392233] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.392234] kmemleak: min_count = 0 <5>[ 7.392236] kmemleak: count = 0 <5>[ 7.392237] kmemleak: flags = 0x1 <5>[ 7.392238] kmemleak: checksum = 0 <5>[ 7.392239] kmemleak: backtrace: <4>[ 7.392241] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.392244] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.392247] execmem_vmalloc+0x5a/0xf0 <4>[ 7.392250] execmem_alloc+0xc2/0x150 <4>[ 7.392253] load_module+0x9db/0x2d10 <4>[ 7.392255] init_module_from_file+0x97/0xe0 <4>[ 7.392257] idempotent_init_module+0x134/0x350 <4>[ 7.392259] __x64_sys_finit_module+0x77/0x100 <4>[ 7.392261] x64_sys_call+0x24e3/0x2670 <4>[ 7.392263] do_syscall_64+0x91/0x180 <4>[ 7.392266] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.392269] kmemleak: Trying to color unknown object at 0xffffffffa05b8000 as Grey <4>[ 7.392272] CPU: 5 UID: 0 PID: 343 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.392275] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.392275] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.392276] Call Trace: <4>[ 7.392277] <4>[ 7.392278] dump_stack_lvl+0xc1/0xf0 <4>[ 7.392281] dump_stack+0x10/0x20 <4>[ 7.392284] paint_ptr+0x8d/0xa0 <4>[ 7.392288] kmemleak_not_leak+0x33/0x70 <4>[ 7.392291] load_module+0xa20/0x2d10 <4>[ 7.392305] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.392310] ? kernel_read_file+0x2ac/0x330 <4>[ 7.392317] init_module_from_file+0x97/0xe0 <4>[ 7.392319] ? init_module_from_file+0x97/0xe0 <4>[ 7.392334] idempotent_init_module+0x134/0x350 <4>[ 7.392349] __x64_sys_finit_module+0x77/0x100 <4>[ 7.392354] x64_sys_call+0x24e3/0x2670 <4>[ 7.392357] do_syscall_64+0x91/0x180 <4>[ 7.392365] ? ext4_llseek+0xc0/0x120 <4>[ 7.392370] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.392374] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392379] ? do_syscall_64+0x9d/0x180 <4>[ 7.392383] ? putname+0x60/0x80 <4>[ 7.392385] ? do_sys_openat2+0xab/0xf0 <4>[ 7.392392] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.392397] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392401] ? do_syscall_64+0x9d/0x180 <4>[ 7.392406] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392410] ? do_syscall_64+0x9d/0x180 <4>[ 7.392413] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392418] ? do_syscall_64+0x9d/0x180 <4>[ 7.392422] ? find_held_lock+0x31/0x90 <4>[ 7.392425] ? do_user_addr_fault+0x640/0x9d0 <4>[ 7.392429] ? lock_release+0xd3/0x2c0 <4>[ 7.392436] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.392441] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.392446] ? irqentry_exit+0x77/0xb0 <4>[ 7.392449] ? exc_page_fault+0xb1/0x300 <4>[ 7.392455] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.392457] RIP: 0033:0x78cf6112725d <4>[ 7.392460] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.392461] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.392463] RAX: ffffffffffffffda RBX: 000057e1920e1100 RCX: 000078cf6112725d <4>[ 7.392464] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 7.392465] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.392466] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.392467] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920e8e10 <4>[ 7.392481] <4>[ 7.392634] kmemleak: Found object by alias at 0xffffffffa04be000 <4>[ 7.392637] CPU: 5 UID: 0 PID: 343 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.392639] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.392640] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.392640] Call Trace: <4>[ 7.392641] <4>[ 7.392642] dump_stack_lvl+0x91/0xf0 <4>[ 7.392645] dump_stack+0x10/0x20 <4>[ 7.392646] __lookup_object+0x90/0xa0 <4>[ 7.392649] __find_and_get_object+0x6c/0x190 <4>[ 7.392653] paint_ptr+0x1b/0xa0 <4>[ 7.392656] kmemleak_not_leak+0x33/0x70 <4>[ 7.392659] load_module+0xa20/0x2d10 <4>[ 7.392669] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.392674] ? kernel_read_file+0x2ac/0x330 <4>[ 7.392679] init_module_from_file+0x97/0xe0 <4>[ 7.392680] ? init_module_from_file+0x97/0xe0 <4>[ 7.392691] idempotent_init_module+0x134/0x350 <4>[ 7.392702] __x64_sys_finit_module+0x77/0x100 <4>[ 7.392706] x64_sys_call+0x24e3/0x2670 <4>[ 7.392708] do_syscall_64+0x91/0x180 <4>[ 7.392714] ? ext4_llseek+0xc0/0x120 <4>[ 7.392717] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.392721] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392725] ? do_syscall_64+0x9d/0x180 <4>[ 7.392727] ? putname+0x60/0x80 <4>[ 7.392730] ? do_sys_openat2+0xab/0xf0 <4>[ 7.392734] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.392738] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392741] ? do_syscall_64+0x9d/0x180 <4>[ 7.392745] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392748] ? do_syscall_64+0x9d/0x180 <4>[ 7.392751] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392754] ? do_syscall_64+0x9d/0x180 <4>[ 7.392757] ? find_held_lock+0x31/0x90 <4>[ 7.392759] ? do_user_addr_fault+0x640/0x9d0 <4>[ 7.392763] ? lock_release+0xd3/0x2c0 <4>[ 7.392768] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.392772] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.392775] ? irqentry_exit+0x77/0xb0 <4>[ 7.392778] ? exc_page_fault+0xb1/0x300 <4>[ 7.392782] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.392784] RIP: 0033:0x78cf6112725d <4>[ 7.392785] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.392786] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.392787] RAX: ffffffffffffffda RBX: 000057e1920e1100 RCX: 000078cf6112725d <4>[ 7.392788] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 7.392789] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.392790] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.392790] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920e8e10 <4>[ 7.392801] <5>[ 7.392801] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.392818] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.392820] kmemleak: min_count = 0 <5>[ 7.392821] kmemleak: count = 0 <5>[ 7.392823] kmemleak: flags = 0x1 <5>[ 7.392824] kmemleak: checksum = 0 <5>[ 7.392825] kmemleak: backtrace: <4>[ 7.392826] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.392829] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.392832] execmem_vmalloc+0x5a/0xf0 <4>[ 7.392835] execmem_alloc+0xc2/0x150 <4>[ 7.392838] load_module+0x9db/0x2d10 <4>[ 7.392840] init_module_from_file+0x97/0xe0 <4>[ 7.392842] idempotent_init_module+0x134/0x350 <4>[ 7.392844] __x64_sys_finit_module+0x77/0x100 <4>[ 7.392846] x64_sys_call+0x24e3/0x2670 <4>[ 7.392848] do_syscall_64+0x91/0x180 <4>[ 7.392850] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.392853] kmemleak: Trying to color unknown object at 0xffffffffa04be000 as Grey <4>[ 7.392856] CPU: 5 UID: 0 PID: 343 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.392859] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.392859] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.392860] Call Trace: <4>[ 7.392861] <4>[ 7.392862] dump_stack_lvl+0xc1/0xf0 <4>[ 7.392865] dump_stack+0x10/0x20 <4>[ 7.392867] paint_ptr+0x8d/0xa0 <4>[ 7.392872] kmemleak_not_leak+0x33/0x70 <4>[ 7.392875] load_module+0xa20/0x2d10 <4>[ 7.392889] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.392894] ? kernel_read_file+0x2ac/0x330 <4>[ 7.392901] init_module_from_file+0x97/0xe0 <4>[ 7.392903] ? init_module_from_file+0x97/0xe0 <4>[ 7.392917] idempotent_init_module+0x134/0x350 <4>[ 7.392932] __x64_sys_finit_module+0x77/0x100 <4>[ 7.392937] x64_sys_call+0x24e3/0x2670 <4>[ 7.392940] do_syscall_64+0x91/0x180 <4>[ 7.392948] ? ext4_llseek+0xc0/0x120 <4>[ 7.392952] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.392957] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392962] ? do_syscall_64+0x9d/0x180 <4>[ 7.392966] ? putname+0x60/0x80 <4>[ 7.392968] ? do_sys_openat2+0xab/0xf0 <4>[ 7.392975] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.392979] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392984] ? do_syscall_64+0x9d/0x180 <4>[ 7.392989] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.392993] ? do_syscall_64+0x9d/0x180 <4>[ 7.392996] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.393001] ? do_syscall_64+0x9d/0x180 <4>[ 7.393005] ? find_held_lock+0x31/0x90 <4>[ 7.393008] ? do_user_addr_fault+0x640/0x9d0 <4>[ 7.393012] ? lock_release+0xd3/0x2c0 <4>[ 7.393019] ? do_user_addr_fault+0x64a/0x9d0 <4>[ 7.393024] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.393029] ? irqentry_exit+0x77/0xb0 <4>[ 7.393032] ? exc_page_fault+0xb1/0x300 <4>[ 7.393037] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.393040] RIP: 0033:0x78cf6112725d <4>[ 7.393042] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.393043] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.393045] RAX: ffffffffffffffda RBX: 000057e1920e1100 RCX: 000078cf6112725d <4>[ 7.393046] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 7.393047] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.393048] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.393049] R13: 0000000000020000 R14: 000057e1920c58e0 R15: 000057e1920e8e10 <4>[ 7.393063] <4>[ 7.418096] kmemleak: Found object by alias at 0xffffffffa04be000 <4>[ 7.418103] CPU: 7 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.418106] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.418106] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.418108] Call Trace: <4>[ 7.418108] <4>[ 7.418109] dump_stack_lvl+0x91/0xf0 <4>[ 7.418115] dump_stack+0x10/0x20 <4>[ 7.418116] __lookup_object+0x90/0xa0 <4>[ 7.418121] __find_and_get_object+0x6c/0x190 <4>[ 7.418125] paint_ptr+0x1b/0xa0 <4>[ 7.418128] kmemleak_not_leak+0x33/0x70 <4>[ 7.418131] load_module+0xa20/0x2d10 <4>[ 7.418142] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.418147] ? kernel_read_file+0x2ac/0x330 <4>[ 7.418153] init_module_from_file+0x97/0xe0 <4>[ 7.418154] ? init_module_from_file+0x97/0xe0 <4>[ 7.418165] idempotent_init_module+0x134/0x350 <4>[ 7.418176] __x64_sys_finit_module+0x77/0x100 <4>[ 7.418180] x64_sys_call+0x24e3/0x2670 <4>[ 7.418182] do_syscall_64+0x91/0x180 <4>[ 7.418185] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418189] ? do_syscall_64+0x9d/0x180 <4>[ 7.418193] ? putname+0x60/0x80 <4>[ 7.418196] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.418201] ? __seccomp_filter+0x379/0x580 <4>[ 7.418203] ? putname+0x60/0x80 <4>[ 7.418208] ? ext4_llseek+0xc0/0x120 <4>[ 7.418212] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.418216] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418219] ? do_syscall_64+0x9d/0x180 <4>[ 7.418222] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.418226] ? switch_fpu_return+0xe0/0x130 <4>[ 7.418230] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418233] ? do_syscall_64+0x9d/0x180 <4>[ 7.418236] ? do_syscall_64+0x9d/0x180 <4>[ 7.418238] ? irqentry_exit+0x77/0xb0 <4>[ 7.418240] ? sysvec_call_function+0x57/0xc0 <4>[ 7.418243] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.418246] RIP: 0033:0x78cf6112725d <4>[ 7.418248] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.418250] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.418252] RAX: ffffffffffffffda RBX: 000057e1920cab10 RCX: 000078cf6112725d <4>[ 7.418253] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.418253] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.418254] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.418255] R13: 0000000000020000 R14: 000057e1920cb5b0 R15: 000057e1920d0c30 <4>[ 7.418265] <5>[ 7.418266] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.418283] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.418284] kmemleak: min_count = 0 <5>[ 7.418286] kmemleak: count = 0 <5>[ 7.418287] kmemleak: flags = 0x1 <5>[ 7.418288] kmemleak: checksum = 0 <5>[ 7.418289] kmemleak: backtrace: <4>[ 7.418291] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.418294] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.418297] execmem_vmalloc+0x5a/0xf0 <4>[ 7.418300] execmem_alloc+0xc2/0x150 <4>[ 7.418302] load_module+0x9db/0x2d10 <4>[ 7.418304] init_module_from_file+0x97/0xe0 <4>[ 7.418306] idempotent_init_module+0x134/0x350 <4>[ 7.418308] __x64_sys_finit_module+0x77/0x100 <4>[ 7.418310] x64_sys_call+0x24e3/0x2670 <4>[ 7.418313] do_syscall_64+0x91/0x180 <4>[ 7.418315] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.418318] kmemleak: Trying to color unknown object at 0xffffffffa04be000 as Grey <4>[ 7.418321] CPU: 7 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.418324] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.418325] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.418326] Call Trace: <4>[ 7.418326] <4>[ 7.418327] dump_stack_lvl+0xc1/0xf0 <4>[ 7.418330] dump_stack+0x10/0x20 <4>[ 7.418333] paint_ptr+0x8d/0xa0 <4>[ 7.418337] kmemleak_not_leak+0x33/0x70 <4>[ 7.418341] load_module+0xa20/0x2d10 <4>[ 7.418354] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.418359] ? kernel_read_file+0x2ac/0x330 <4>[ 7.418366] init_module_from_file+0x97/0xe0 <4>[ 7.418368] ? init_module_from_file+0x97/0xe0 <4>[ 7.418381] idempotent_init_module+0x134/0x350 <4>[ 7.418396] __x64_sys_finit_module+0x77/0x100 <4>[ 7.418402] x64_sys_call+0x24e3/0x2670 <4>[ 7.418404] do_syscall_64+0x91/0x180 <4>[ 7.418407] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418412] ? do_syscall_64+0x9d/0x180 <4>[ 7.418417] ? putname+0x60/0x80 <4>[ 7.418420] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.418426] ? __seccomp_filter+0x379/0x580 <4>[ 7.418428] ? putname+0x60/0x80 <4>[ 7.418435] ? ext4_llseek+0xc0/0x120 <4>[ 7.418439] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.418444] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418448] ? do_syscall_64+0x9d/0x180 <4>[ 7.418452] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.418456] ? switch_fpu_return+0xe0/0x130 <4>[ 7.418461] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418466] ? do_syscall_64+0x9d/0x180 <4>[ 7.418470] ? do_syscall_64+0x9d/0x180 <4>[ 7.418472] ? irqentry_exit+0x77/0xb0 <4>[ 7.418475] ? sysvec_call_function+0x57/0xc0 <4>[ 7.418479] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.418482] RIP: 0033:0x78cf6112725d <4>[ 7.418484] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.418485] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.418487] RAX: ffffffffffffffda RBX: 000057e1920cab10 RCX: 000078cf6112725d <4>[ 7.418488] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.418490] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.418491] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.418492] R13: 0000000000020000 R14: 000057e1920cb5b0 R15: 000057e1920d0c30 <4>[ 7.418505] <4>[ 7.418701] kmemleak: Found object by alias at 0xffffffffa04bf000 <4>[ 7.418704] CPU: 7 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.418706] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.418706] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.418707] Call Trace: <4>[ 7.418707] <4>[ 7.418708] dump_stack_lvl+0x91/0xf0 <4>[ 7.418711] dump_stack+0x10/0x20 <4>[ 7.418713] __lookup_object+0x90/0xa0 <4>[ 7.418716] __find_and_get_object+0x6c/0x190 <4>[ 7.418720] paint_ptr+0x1b/0xa0 <4>[ 7.418723] kmemleak_not_leak+0x33/0x70 <4>[ 7.418726] load_module+0xa20/0x2d10 <4>[ 7.418736] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.418740] ? kernel_read_file+0x2ac/0x330 <4>[ 7.418746] init_module_from_file+0x97/0xe0 <4>[ 7.418747] ? init_module_from_file+0x97/0xe0 <4>[ 7.418757] idempotent_init_module+0x134/0x350 <4>[ 7.418769] __x64_sys_finit_module+0x77/0x100 <4>[ 7.418772] x64_sys_call+0x24e3/0x2670 <4>[ 7.418774] do_syscall_64+0x91/0x180 <4>[ 7.418777] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418781] ? do_syscall_64+0x9d/0x180 <4>[ 7.418784] ? putname+0x60/0x80 <4>[ 7.418786] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.418791] ? __seccomp_filter+0x379/0x580 <4>[ 7.418793] ? putname+0x60/0x80 <4>[ 7.418798] ? ext4_llseek+0xc0/0x120 <4>[ 7.418801] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.418805] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418808] ? do_syscall_64+0x9d/0x180 <4>[ 7.418811] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.418814] ? switch_fpu_return+0xe0/0x130 <4>[ 7.418818] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418822] ? do_syscall_64+0x9d/0x180 <4>[ 7.418824] ? do_syscall_64+0x9d/0x180 <4>[ 7.418826] ? irqentry_exit+0x77/0xb0 <4>[ 7.418828] ? sysvec_call_function+0x57/0xc0 <4>[ 7.418832] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.418834] RIP: 0033:0x78cf6112725d <4>[ 7.418835] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.418836] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.418838] RAX: ffffffffffffffda RBX: 000057e1920cab10 RCX: 000078cf6112725d <4>[ 7.418839] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.418839] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.418840] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.418841] R13: 0000000000020000 R14: 000057e1920cb5b0 R15: 000057e1920d0c30 <4>[ 7.418851] <5>[ 7.418851] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.418868] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.418870] kmemleak: min_count = 0 <5>[ 7.418871] kmemleak: count = 0 <5>[ 7.418873] kmemleak: flags = 0x1 <5>[ 7.418874] kmemleak: checksum = 0 <5>[ 7.418875] kmemleak: backtrace: <4>[ 7.418876] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.418879] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.418882] execmem_vmalloc+0x5a/0xf0 <4>[ 7.418885] execmem_alloc+0xc2/0x150 <4>[ 7.418887] load_module+0x9db/0x2d10 <4>[ 7.418889] init_module_from_file+0x97/0xe0 <4>[ 7.418891] idempotent_init_module+0x134/0x350 <4>[ 7.418893] __x64_sys_finit_module+0x77/0x100 <4>[ 7.418895] x64_sys_call+0x24e3/0x2670 <4>[ 7.418898] do_syscall_64+0x91/0x180 <4>[ 7.418900] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.418903] kmemleak: Trying to color unknown object at 0xffffffffa04bf000 as Grey <4>[ 7.418906] CPU: 7 UID: 0 PID: 315 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.418908] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.418909] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.418910] Call Trace: <4>[ 7.418910] <4>[ 7.418912] dump_stack_lvl+0xc1/0xf0 <4>[ 7.418914] dump_stack+0x10/0x20 <4>[ 7.418916] paint_ptr+0x8d/0xa0 <4>[ 7.418921] kmemleak_not_leak+0x33/0x70 <4>[ 7.418924] load_module+0xa20/0x2d10 <4>[ 7.418936] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.418942] ? kernel_read_file+0x2ac/0x330 <4>[ 7.418949] init_module_from_file+0x97/0xe0 <4>[ 7.418950] ? init_module_from_file+0x97/0xe0 <4>[ 7.418964] idempotent_init_module+0x134/0x350 <4>[ 7.418979] __x64_sys_finit_module+0x77/0x100 <4>[ 7.418984] x64_sys_call+0x24e3/0x2670 <4>[ 7.418987] do_syscall_64+0x91/0x180 <4>[ 7.418990] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.418995] ? do_syscall_64+0x9d/0x180 <4>[ 7.419000] ? putname+0x60/0x80 <4>[ 7.419003] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.419009] ? __seccomp_filter+0x379/0x580 <4>[ 7.419011] ? putname+0x60/0x80 <4>[ 7.419018] ? ext4_llseek+0xc0/0x120 <4>[ 7.419023] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.419028] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.419032] ? do_syscall_64+0x9d/0x180 <4>[ 7.419036] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.419040] ? switch_fpu_return+0xe0/0x130 <4>[ 7.419045] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.419050] ? do_syscall_64+0x9d/0x180 <4>[ 7.419054] ? do_syscall_64+0x9d/0x180 <4>[ 7.419056] ? irqentry_exit+0x77/0xb0 <4>[ 7.419058] ? sysvec_call_function+0x57/0xc0 <4>[ 7.419063] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.419065] RIP: 0033:0x78cf6112725d <4>[ 7.419067] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.419069] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.419071] RAX: ffffffffffffffda RBX: 000057e1920cab10 RCX: 000078cf6112725d <4>[ 7.419072] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000018 <4>[ 7.419073] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.419074] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.419075] R13: 0000000000020000 R14: 000057e1920cb5b0 R15: 000057e1920d0c30 <4>[ 7.419089] <4>[ 7.427592] kmemleak: Found object by alias at 0xffffffffa0512000 <4>[ 7.427597] CPU: 7 UID: 0 PID: 354 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.427599] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.427600] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.427601] Call Trace: <4>[ 7.427601] <4>[ 7.427603] dump_stack_lvl+0x91/0xf0 <4>[ 7.427607] dump_stack+0x10/0x20 <4>[ 7.427608] __lookup_object+0x90/0xa0 <4>[ 7.427613] __find_and_get_object+0x6c/0x190 <4>[ 7.427617] paint_ptr+0x1b/0xa0 <4>[ 7.427619] kmemleak_not_leak+0x33/0x70 <4>[ 7.427622] load_module+0xa20/0x2d10 <4>[ 7.427631] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.427635] ? kernel_read_file+0x2ac/0x330 <4>[ 7.427640] init_module_from_file+0x97/0xe0 <4>[ 7.427641] ? init_module_from_file+0x97/0xe0 <4>[ 7.427649] idempotent_init_module+0x134/0x350 <4>[ 7.427658] __x64_sys_finit_module+0x77/0x100 <4>[ 7.427661] x64_sys_call+0x24e3/0x2670 <4>[ 7.427663] do_syscall_64+0x91/0x180 <4>[ 7.427671] ? putname+0x60/0x80 <4>[ 7.427673] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.427678] ? putname+0x60/0x80 <4>[ 7.427680] ? do_sys_openat2+0xab/0xf0 <4>[ 7.427684] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.427688] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.427692] ? do_syscall_64+0x9d/0x180 <4>[ 7.427695] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.427697] RIP: 0033:0x78cf6112725d <4>[ 7.427699] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.427701] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.427702] RAX: ffffffffffffffda RBX: 000057e1920e6750 RCX: 000078cf6112725d <4>[ 7.427703] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000037 <4>[ 7.427704] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.427705] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.427705] R13: 0000000000020000 R14: 000057e1920c7790 R15: 000057e1920ea310 <4>[ 7.427713] <5>[ 7.427714] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.427725] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.427727] kmemleak: min_count = 0 <5>[ 7.427728] kmemleak: count = 0 <5>[ 7.427729] kmemleak: flags = 0x1 <5>[ 7.427730] kmemleak: checksum = 0 <5>[ 7.427731] kmemleak: backtrace: <4>[ 7.427733] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.427735] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.427738] execmem_vmalloc+0x5a/0xf0 <4>[ 7.427741] execmem_alloc+0xc2/0x150 <4>[ 7.427744] load_module+0x9db/0x2d10 <4>[ 7.427745] init_module_from_file+0x97/0xe0 <4>[ 7.427747] idempotent_init_module+0x134/0x350 <4>[ 7.427749] __x64_sys_finit_module+0x77/0x100 <4>[ 7.427751] x64_sys_call+0x24e3/0x2670 <4>[ 7.427753] do_syscall_64+0x91/0x180 <4>[ 7.427755] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.427758] kmemleak: Trying to color unknown object at 0xffffffffa0512000 as Grey <4>[ 7.427760] CPU: 7 UID: 0 PID: 354 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.427762] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.427762] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.427763] Call Trace: <4>[ 7.427763] <4>[ 7.427764] dump_stack_lvl+0xc1/0xf0 <4>[ 7.427766] dump_stack+0x10/0x20 <4>[ 7.427767] paint_ptr+0x8d/0xa0 <4>[ 7.427770] kmemleak_not_leak+0x33/0x70 <4>[ 7.427772] load_module+0xa20/0x2d10 <4>[ 7.427779] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.427782] ? kernel_read_file+0x2ac/0x330 <4>[ 7.427786] init_module_from_file+0x97/0xe0 <4>[ 7.427787] ? init_module_from_file+0x97/0xe0 <4>[ 7.427794] idempotent_init_module+0x134/0x350 <4>[ 7.427802] __x64_sys_finit_module+0x77/0x100 <4>[ 7.427805] x64_sys_call+0x24e3/0x2670 <4>[ 7.427807] do_syscall_64+0x91/0x180 <4>[ 7.427813] ? putname+0x60/0x80 <4>[ 7.427815] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.427819] ? putname+0x60/0x80 <4>[ 7.427821] ? do_sys_openat2+0xab/0xf0 <4>[ 7.427824] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.427827] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.427830] ? do_syscall_64+0x9d/0x180 <4>[ 7.427833] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.427835] RIP: 0033:0x78cf6112725d <4>[ 7.427836] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.427837] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.427838] RAX: ffffffffffffffda RBX: 000057e1920e6750 RCX: 000078cf6112725d <4>[ 7.427839] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000037 <4>[ 7.427839] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.427840] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.427841] R13: 0000000000020000 R14: 000057e1920c7790 R15: 000057e1920ea310 <4>[ 7.427847] <4>[ 7.447034] kmemleak: Found object by alias at 0xffffffffa05bb000 <4>[ 7.447041] CPU: 1 UID: 0 PID: 319 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.447043] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.447044] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.447045] Call Trace: <4>[ 7.447045] <4>[ 7.447047] dump_stack_lvl+0x91/0xf0 <4>[ 7.447052] dump_stack+0x10/0x20 <4>[ 7.447054] __lookup_object+0x90/0xa0 <4>[ 7.447058] __find_and_get_object+0x6c/0x190 <4>[ 7.447062] paint_ptr+0x1b/0xa0 <4>[ 7.447065] kmemleak_not_leak+0x33/0x70 <4>[ 7.447068] load_module+0xa20/0x2d10 <4>[ 7.447079] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.447084] ? kernel_read_file+0x2ac/0x330 <4>[ 7.447090] init_module_from_file+0x97/0xe0 <4>[ 7.447091] ? init_module_from_file+0x97/0xe0 <4>[ 7.447101] idempotent_init_module+0x134/0x350 <4>[ 7.447112] __x64_sys_finit_module+0x77/0x100 <4>[ 7.447116] x64_sys_call+0x24e3/0x2670 <4>[ 7.447119] do_syscall_64+0x91/0x180 <4>[ 7.447124] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447128] ? do_syscall_64+0x9d/0x180 <4>[ 7.447131] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.447137] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.447140] ? switch_fpu_return+0xe0/0x130 <4>[ 7.447144] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447147] ? do_syscall_64+0x9d/0x180 <4>[ 7.447150] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.447154] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447157] ? do_syscall_64+0x9d/0x180 <4>[ 7.447159] ? do_syscall_64+0x9d/0x180 <4>[ 7.447161] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447165] ? do_syscall_64+0x9d/0x180 <4>[ 7.447168] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447171] ? do_syscall_64+0x9d/0x180 <4>[ 7.447173] ? do_syscall_64+0x9d/0x180 <4>[ 7.447175] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.447178] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.447181] RIP: 0033:0x78cf6112725d <4>[ 7.447183] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.447184] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.447186] RAX: ffffffffffffffda RBX: 000057e1920d1ee0 RCX: 000078cf6112725d <4>[ 7.447187] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 7.447188] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.447189] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.447190] R13: 0000000000020000 R14: 000057e1920d54b0 R15: 000057e1920d5520 <4>[ 7.447200] <5>[ 7.447200] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.447217] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.447219] kmemleak: min_count = 0 <5>[ 7.447220] kmemleak: count = 0 <5>[ 7.447222] kmemleak: flags = 0x1 <5>[ 7.447223] kmemleak: checksum = 0 <5>[ 7.447224] kmemleak: backtrace: <4>[ 7.447226] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.447228] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.447232] execmem_vmalloc+0x5a/0xf0 <4>[ 7.447235] execmem_alloc+0xc2/0x150 <4>[ 7.447237] load_module+0x9db/0x2d10 <4>[ 7.447239] init_module_from_file+0x97/0xe0 <4>[ 7.447241] idempotent_init_module+0x134/0x350 <4>[ 7.447243] __x64_sys_finit_module+0x77/0x100 <4>[ 7.447245] x64_sys_call+0x24e3/0x2670 <4>[ 7.447248] do_syscall_64+0x91/0x180 <4>[ 7.447250] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.447253] kmemleak: Trying to color unknown object at 0xffffffffa05bb000 as Grey <4>[ 7.447257] CPU: 1 UID: 0 PID: 319 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.447259] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.447260] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.447261] Call Trace: <4>[ 7.447261] <4>[ 7.447262] dump_stack_lvl+0xc1/0xf0 <4>[ 7.447266] dump_stack+0x10/0x20 <4>[ 7.447268] paint_ptr+0x8d/0xa0 <4>[ 7.447272] kmemleak_not_leak+0x33/0x70 <4>[ 7.447276] load_module+0xa20/0x2d10 <4>[ 7.447289] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.447295] ? kernel_read_file+0x2ac/0x330 <4>[ 7.447302] init_module_from_file+0x97/0xe0 <4>[ 7.447304] ? init_module_from_file+0x97/0xe0 <4>[ 7.447318] idempotent_init_module+0x134/0x350 <4>[ 7.447334] __x64_sys_finit_module+0x77/0x100 <4>[ 7.447339] x64_sys_call+0x24e3/0x2670 <4>[ 7.447341] do_syscall_64+0x91/0x180 <4>[ 7.447348] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447353] ? do_syscall_64+0x9d/0x180 <4>[ 7.447356] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.447363] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.447367] ? switch_fpu_return+0xe0/0x130 <4>[ 7.447372] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447377] ? do_syscall_64+0x9d/0x180 <4>[ 7.447379] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.447384] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447389] ? do_syscall_64+0x9d/0x180 <4>[ 7.447391] ? do_syscall_64+0x9d/0x180 <4>[ 7.447393] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447398] ? do_syscall_64+0x9d/0x180 <4>[ 7.447402] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447407] ? do_syscall_64+0x9d/0x180 <4>[ 7.447410] ? do_syscall_64+0x9d/0x180 <4>[ 7.447412] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.447416] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.447419] RIP: 0033:0x78cf6112725d <4>[ 7.447421] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.447422] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.447424] RAX: ffffffffffffffda RBX: 000057e1920d1ee0 RCX: 000078cf6112725d <4>[ 7.447425] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 7.447427] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.447428] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.447429] R13: 0000000000020000 R14: 000057e1920d54b0 R15: 000057e1920d5520 <4>[ 7.447443] <4>[ 7.447675] kmemleak: Found object by alias at 0xffffffffa0505000 <4>[ 7.447679] CPU: 1 UID: 0 PID: 319 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.447681] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.447682] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.447682] Call Trace: <4>[ 7.447683] <4>[ 7.447684] dump_stack_lvl+0x91/0xf0 <4>[ 7.447687] dump_stack+0x10/0x20 <4>[ 7.447689] __lookup_object+0x90/0xa0 <4>[ 7.447704] __find_and_get_object+0x6c/0x190 <4>[ 7.447708] paint_ptr+0x1b/0xa0 <4>[ 7.447711] kmemleak_not_leak+0x33/0x70 <4>[ 7.447714] load_module+0xa20/0x2d10 <4>[ 7.447724] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.447728] ? kernel_read_file+0x2ac/0x330 <4>[ 7.447734] init_module_from_file+0x97/0xe0 <4>[ 7.447735] ? init_module_from_file+0x97/0xe0 <4>[ 7.447745] idempotent_init_module+0x134/0x350 <4>[ 7.447756] __x64_sys_finit_module+0x77/0x100 <4>[ 7.447759] x64_sys_call+0x24e3/0x2670 <4>[ 7.447762] do_syscall_64+0x91/0x180 <4>[ 7.447767] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447770] ? do_syscall_64+0x9d/0x180 <4>[ 7.447773] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.447778] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.447781] ? switch_fpu_return+0xe0/0x130 <4>[ 7.447784] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447788] ? do_syscall_64+0x9d/0x180 <4>[ 7.447790] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.447793] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447797] ? do_syscall_64+0x9d/0x180 <4>[ 7.447799] ? do_syscall_64+0x9d/0x180 <4>[ 7.447800] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447804] ? do_syscall_64+0x9d/0x180 <4>[ 7.447807] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447810] ? do_syscall_64+0x9d/0x180 <4>[ 7.447812] ? do_syscall_64+0x9d/0x180 <4>[ 7.447814] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.447817] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.447819] RIP: 0033:0x78cf6112725d <4>[ 7.447821] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.447822] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.447823] RAX: ffffffffffffffda RBX: 000057e1920d1ee0 RCX: 000078cf6112725d <4>[ 7.447824] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 7.447825] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.447825] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.447826] R13: 0000000000020000 R14: 000057e1920d54b0 R15: 000057e1920d5520 <4>[ 7.447836] <5>[ 7.447836] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.447852] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.447854] kmemleak: min_count = 0 <5>[ 7.447855] kmemleak: count = 0 <5>[ 7.447857] kmemleak: flags = 0x1 <5>[ 7.447858] kmemleak: checksum = 0 <5>[ 7.447859] kmemleak: backtrace: <4>[ 7.447860] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.447863] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.447866] execmem_vmalloc+0x5a/0xf0 <4>[ 7.447868] execmem_alloc+0xc2/0x150 <4>[ 7.447871] load_module+0x9db/0x2d10 <4>[ 7.447873] init_module_from_file+0x97/0xe0 <4>[ 7.447875] idempotent_init_module+0x134/0x350 <4>[ 7.447877] __x64_sys_finit_module+0x77/0x100 <4>[ 7.447879] x64_sys_call+0x24e3/0x2670 <4>[ 7.447881] do_syscall_64+0x91/0x180 <4>[ 7.447883] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.447886] kmemleak: Trying to color unknown object at 0xffffffffa0505000 as Grey <4>[ 7.447889] CPU: 1 UID: 0 PID: 319 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.447891] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.447892] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.447893] Call Trace: <4>[ 7.447893] <4>[ 7.447894] dump_stack_lvl+0xc1/0xf0 <4>[ 7.447898] dump_stack+0x10/0x20 <4>[ 7.447900] paint_ptr+0x8d/0xa0 <4>[ 7.447904] kmemleak_not_leak+0x33/0x70 <4>[ 7.447907] load_module+0xa20/0x2d10 <4>[ 7.447921] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.447926] ? kernel_read_file+0x2ac/0x330 <4>[ 7.447933] init_module_from_file+0x97/0xe0 <4>[ 7.447934] ? init_module_from_file+0x97/0xe0 <4>[ 7.447948] idempotent_init_module+0x134/0x350 <4>[ 7.447963] __x64_sys_finit_module+0x77/0x100 <4>[ 7.447968] x64_sys_call+0x24e3/0x2670 <4>[ 7.447971] do_syscall_64+0x91/0x180 <4>[ 7.447977] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.447982] ? do_syscall_64+0x9d/0x180 <4>[ 7.447985] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.447992] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.447996] ? switch_fpu_return+0xe0/0x130 <4>[ 7.448002] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.448006] ? do_syscall_64+0x9d/0x180 <4>[ 7.448009] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.448013] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.448018] ? do_syscall_64+0x9d/0x180 <4>[ 7.448020] ? do_syscall_64+0x9d/0x180 <4>[ 7.448022] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.448027] ? do_syscall_64+0x9d/0x180 <4>[ 7.448031] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.448036] ? do_syscall_64+0x9d/0x180 <4>[ 7.448038] ? do_syscall_64+0x9d/0x180 <4>[ 7.448040] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.448044] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.448047] RIP: 0033:0x78cf6112725d <4>[ 7.448049] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.448050] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.448052] RAX: ffffffffffffffda RBX: 000057e1920d1ee0 RCX: 000078cf6112725d <4>[ 7.448053] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000028 <4>[ 7.448054] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.448055] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.448056] R13: 0000000000020000 R14: 000057e1920d54b0 R15: 000057e1920d5520 <4>[ 7.448068] <4>[ 7.451626] kmemleak: Found object by alias at 0xffffffffa05bd000 <4>[ 7.451631] CPU: 6 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.451633] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.451634] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.451635] Call Trace: <4>[ 7.451635] <4>[ 7.451637] dump_stack_lvl+0x91/0xf0 <4>[ 7.451641] dump_stack+0x10/0x20 <4>[ 7.451643] __lookup_object+0x90/0xa0 <4>[ 7.451647] __find_and_get_object+0x6c/0x190 <4>[ 7.451651] paint_ptr+0x1b/0xa0 <4>[ 7.451654] kmemleak_not_leak+0x33/0x70 <4>[ 7.451657] load_module+0xa20/0x2d10 <4>[ 7.451668] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.451672] ? kernel_read_file+0x2ac/0x330 <4>[ 7.451678] init_module_from_file+0x97/0xe0 <4>[ 7.451679] ? init_module_from_file+0x97/0xe0 <4>[ 7.451690] idempotent_init_module+0x134/0x350 <4>[ 7.451701] __x64_sys_finit_module+0x77/0x100 <4>[ 7.451705] x64_sys_call+0x24e3/0x2670 <4>[ 7.451707] do_syscall_64+0x91/0x180 <4>[ 7.451711] ? vfs_read+0x17b/0x390 <4>[ 7.451713] ? vfs_read+0x17b/0x390 <4>[ 7.451716] ? __seccomp_filter+0x379/0x580 <4>[ 7.451722] ? ext4_llseek+0xc0/0x120 <4>[ 7.451726] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.451730] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.451734] ? do_syscall_64+0x9d/0x180 <4>[ 7.451735] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.451739] ? do_syscall_64+0x9d/0x180 <4>[ 7.451744] ? putname+0x60/0x80 <4>[ 7.451746] ? vfs_fstatat+0x99/0xe0 <4>[ 7.451750] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.451760] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.451764] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.451767] ? do_syscall_64+0x9d/0x180 <4>[ 7.451771] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.451773] RIP: 0033:0x78cf6112725d <4>[ 7.451775] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.451777] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.451779] RAX: ffffffffffffffda RBX: 000057e1920e6c90 RCX: 000078cf6112725d <4>[ 7.451780] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003a <4>[ 7.451781] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.451781] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.451782] R13: 0000000000020000 R14: 000057e1920ea090 R15: 000057e1920ea250 <4>[ 7.451792] <5>[ 7.451793] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.451809] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.451811] kmemleak: min_count = 0 <5>[ 7.451812] kmemleak: count = 0 <5>[ 7.451813] kmemleak: flags = 0x1 <5>[ 7.451815] kmemleak: checksum = 0 <5>[ 7.451816] kmemleak: backtrace: <4>[ 7.451817] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.451820] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.451824] execmem_vmalloc+0x5a/0xf0 <4>[ 7.451826] execmem_alloc+0xc2/0x150 <4>[ 7.451829] load_module+0x9db/0x2d10 <4>[ 7.451831] init_module_from_file+0x97/0xe0 <4>[ 7.451833] idempotent_init_module+0x134/0x350 <4>[ 7.451835] __x64_sys_finit_module+0x77/0x100 <4>[ 7.451837] x64_sys_call+0x24e3/0x2670 <4>[ 7.451840] do_syscall_64+0x91/0x180 <4>[ 7.451842] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.451845] kmemleak: Trying to color unknown object at 0xffffffffa05bd000 as Grey <4>[ 7.451848] CPU: 6 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.451851] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.451851] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.451852] Call Trace: <4>[ 7.451853] <4>[ 7.451854] dump_stack_lvl+0xc1/0xf0 <4>[ 7.451858] dump_stack+0x10/0x20 <4>[ 7.451860] paint_ptr+0x8d/0xa0 <4>[ 7.451865] kmemleak_not_leak+0x33/0x70 <4>[ 7.451868] load_module+0xa20/0x2d10 <4>[ 7.451880] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.451886] ? kernel_read_file+0x2ac/0x330 <4>[ 7.451893] init_module_from_file+0x97/0xe0 <4>[ 7.451895] ? init_module_from_file+0x97/0xe0 <4>[ 7.451909] idempotent_init_module+0x134/0x350 <4>[ 7.451924] __x64_sys_finit_module+0x77/0x100 <4>[ 7.451929] x64_sys_call+0x24e3/0x2670 <4>[ 7.451932] do_syscall_64+0x91/0x180 <4>[ 7.451936] ? vfs_read+0x17b/0x390 <4>[ 7.451938] ? vfs_read+0x17b/0x390 <4>[ 7.451942] ? __seccomp_filter+0x379/0x580 <4>[ 7.451950] ? ext4_llseek+0xc0/0x120 <4>[ 7.451954] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.451959] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.451964] ? do_syscall_64+0x9d/0x180 <4>[ 7.451966] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.451970] ? do_syscall_64+0x9d/0x180 <4>[ 7.451976] ? putname+0x60/0x80 <4>[ 7.451979] ? vfs_fstatat+0x99/0xe0 <4>[ 7.451984] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.451998] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.452002] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.452007] ? do_syscall_64+0x9d/0x180 <4>[ 7.452012] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.452015] RIP: 0033:0x78cf6112725d <4>[ 7.452017] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.452018] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.452020] RAX: ffffffffffffffda RBX: 000057e1920e6c90 RCX: 000078cf6112725d <4>[ 7.452021] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003a <4>[ 7.452023] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.452023] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.452025] R13: 0000000000020000 R14: 000057e1920ea090 R15: 000057e1920ea250 <4>[ 7.452039] <4>[ 7.452127] kmemleak: Found object by alias at 0xffffffffa05bf000 <4>[ 7.452152] CPU: 6 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.452155] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.452156] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.452157] Call Trace: <4>[ 7.452157] <4>[ 7.452159] dump_stack_lvl+0x91/0xf0 <4>[ 7.452162] dump_stack+0x10/0x20 <4>[ 7.452165] __lookup_object+0x90/0xa0 <4>[ 7.452169] __find_and_get_object+0x6c/0x190 <4>[ 7.452175] paint_ptr+0x1b/0xa0 <4>[ 7.452179] kmemleak_not_leak+0x33/0x70 <4>[ 7.452183] load_module+0xa20/0x2d10 <4>[ 7.452198] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.452204] ? kernel_read_file+0x2ac/0x330 <4>[ 7.452213] init_module_from_file+0x97/0xe0 <4>[ 7.452215] ? init_module_from_file+0x97/0xe0 <4>[ 7.452231] idempotent_init_module+0x134/0x350 <4>[ 7.452248] __x64_sys_finit_module+0x77/0x100 <4>[ 7.452254] x64_sys_call+0x24e3/0x2670 <4>[ 7.452257] do_syscall_64+0x91/0x180 <4>[ 7.452261] ? vfs_read+0x17b/0x390 <4>[ 7.452263] ? vfs_read+0x17b/0x390 <4>[ 7.452268] ? __seccomp_filter+0x379/0x580 <4>[ 7.452276] ? ext4_llseek+0xc0/0x120 <4>[ 7.452282] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.452287] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.452292] ? do_syscall_64+0x9d/0x180 <4>[ 7.452294] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.452299] ? do_syscall_64+0x9d/0x180 <4>[ 7.452306] ? putname+0x60/0x80 <4>[ 7.452309] ? vfs_fstatat+0x99/0xe0 <4>[ 7.452315] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.452330] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.452335] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.452341] ? do_syscall_64+0x9d/0x180 <4>[ 7.452346] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.452349] RIP: 0033:0x78cf6112725d <4>[ 7.452351] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.452352] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.452354] RAX: ffffffffffffffda RBX: 000057e1920e6c90 RCX: 000078cf6112725d <4>[ 7.452355] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003a <4>[ 7.452356] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.452357] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.452358] R13: 0000000000020000 R14: 000057e1920ea090 R15: 000057e1920ea250 <4>[ 7.452374] <5>[ 7.452375] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.452400] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.452402] kmemleak: min_count = 0 <5>[ 7.452405] kmemleak: count = 0 <5>[ 7.452407] kmemleak: flags = 0x1 <5>[ 7.452409] kmemleak: checksum = 0 <5>[ 7.452411] kmemleak: backtrace: <4>[ 7.452413] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.452417] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.452421] execmem_vmalloc+0x5a/0xf0 <4>[ 7.452425] execmem_alloc+0xc2/0x150 <4>[ 7.452429] load_module+0x9db/0x2d10 <4>[ 7.452432] init_module_from_file+0x97/0xe0 <4>[ 7.452435] idempotent_init_module+0x134/0x350 <4>[ 7.452438] __x64_sys_finit_module+0x77/0x100 <4>[ 7.452441] x64_sys_call+0x24e3/0x2670 <4>[ 7.452445] do_syscall_64+0x91/0x180 <4>[ 7.452448] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.452452] kmemleak: Trying to color unknown object at 0xffffffffa05bf000 as Grey <4>[ 7.452455] CPU: 6 UID: 0 PID: 353 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.452458] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.452458] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.452459] Call Trace: <4>[ 7.452460] <4>[ 7.452461] dump_stack_lvl+0xc1/0xf0 <4>[ 7.452465] dump_stack+0x10/0x20 <4>[ 7.452467] paint_ptr+0x8d/0xa0 <4>[ 7.452471] kmemleak_not_leak+0x33/0x70 <4>[ 7.452475] load_module+0xa20/0x2d10 <4>[ 7.452488] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.452494] ? kernel_read_file+0x2ac/0x330 <4>[ 7.452501] init_module_from_file+0x97/0xe0 <4>[ 7.452503] ? init_module_from_file+0x97/0xe0 <4>[ 7.452518] idempotent_init_module+0x134/0x350 <4>[ 7.452533] __x64_sys_finit_module+0x77/0x100 <4>[ 7.452538] x64_sys_call+0x24e3/0x2670 <4>[ 7.452541] do_syscall_64+0x91/0x180 <4>[ 7.452545] ? vfs_read+0x17b/0x390 <4>[ 7.452547] ? vfs_read+0x17b/0x390 <4>[ 7.452551] ? __seccomp_filter+0x379/0x580 <4>[ 7.452559] ? ext4_llseek+0xc0/0x120 <4>[ 7.452564] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.452569] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.452573] ? do_syscall_64+0x9d/0x180 <4>[ 7.452576] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.452580] ? do_syscall_64+0x9d/0x180 <4>[ 7.452587] ? putname+0x60/0x80 <4>[ 7.452590] ? vfs_fstatat+0x99/0xe0 <4>[ 7.452595] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.452609] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.452613] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.452618] ? do_syscall_64+0x9d/0x180 <4>[ 7.452623] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.452625] RIP: 0033:0x78cf6112725d <4>[ 7.452627] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.452629] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.452630] RAX: ffffffffffffffda RBX: 000057e1920e6c90 RCX: 000078cf6112725d <4>[ 7.452632] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003a <4>[ 7.452633] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.452634] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.452635] R13: 0000000000020000 R14: 000057e1920ea090 R15: 000057e1920ea250 <4>[ 7.452649] <4>[ 7.455921] kmemleak: Found object by alias at 0xffffffffa05c0000 <4>[ 7.455926] CPU: 6 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.455929] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.455930] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.455931] Call Trace: <4>[ 7.455932] <4>[ 7.455934] dump_stack_lvl+0x91/0xf0 <4>[ 7.455938] dump_stack+0x10/0x20 <4>[ 7.455941] __lookup_object+0x90/0xa0 <4>[ 7.455945] __find_and_get_object+0x6c/0x190 <4>[ 7.455951] paint_ptr+0x1b/0xa0 <4>[ 7.455956] kmemleak_not_leak+0x33/0x70 <4>[ 7.455959] load_module+0xa20/0x2d10 <4>[ 7.455975] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.455981] ? kernel_read_file+0x2ac/0x330 <4>[ 7.455990] init_module_from_file+0x97/0xe0 <4>[ 7.455991] ? init_module_from_file+0x97/0xe0 <4>[ 7.456006] idempotent_init_module+0x134/0x350 <4>[ 7.456023] __x64_sys_finit_module+0x77/0x100 <4>[ 7.456028] x64_sys_call+0x24e3/0x2670 <4>[ 7.456031] do_syscall_64+0x91/0x180 <4>[ 7.456037] ? generic_file_read_iter+0xbe/0x110 <4>[ 7.456049] ? vfs_read+0x17b/0x390 <4>[ 7.456051] ? vfs_read+0x17b/0x390 <4>[ 7.456062] ? __seccomp_filter+0x379/0x580 <4>[ 7.456070] ? ext4_llseek+0xc0/0x120 <4>[ 7.456075] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.456081] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456086] ? do_syscall_64+0x9d/0x180 <4>[ 7.456092] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.456096] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456101] ? do_syscall_64+0x9d/0x180 <4>[ 7.456104] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456109] ? do_syscall_64+0x9d/0x180 <4>[ 7.456113] ? do_syscall_64+0x9d/0x180 <4>[ 7.456118] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.456121] RIP: 0033:0x78cf6112725d <4>[ 7.456124] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.456126] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.456128] RAX: ffffffffffffffda RBX: 000057e1920f4ee0 RCX: 000078cf6112725d <4>[ 7.456129] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.456131] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.456132] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.456133] R13: 0000000000020000 R14: 000057e1920f7b30 R15: 000057e1920f7bb0 <4>[ 7.456148] <5>[ 7.456148] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.456171] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.456174] kmemleak: min_count = 0 <5>[ 7.456176] kmemleak: count = 0 <5>[ 7.456178] kmemleak: flags = 0x1 <5>[ 7.456180] kmemleak: checksum = 0 <5>[ 7.456181] kmemleak: backtrace: <4>[ 7.456183] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.456187] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.456191] execmem_vmalloc+0x5a/0xf0 <4>[ 7.456195] execmem_alloc+0xc2/0x150 <4>[ 7.456199] load_module+0x9db/0x2d10 <4>[ 7.456201] init_module_from_file+0x97/0xe0 <4>[ 7.456204] idempotent_init_module+0x134/0x350 <4>[ 7.456207] __x64_sys_finit_module+0x77/0x100 <4>[ 7.456210] x64_sys_call+0x24e3/0x2670 <4>[ 7.456214] do_syscall_64+0x91/0x180 <4>[ 7.456217] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.456221] kmemleak: Trying to color unknown object at 0xffffffffa05c0000 as Grey <4>[ 7.456224] CPU: 6 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.456227] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.456227] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.456228] Call Trace: <4>[ 7.456229] <4>[ 7.456230] dump_stack_lvl+0xc1/0xf0 <4>[ 7.456233] dump_stack+0x10/0x20 <4>[ 7.456235] paint_ptr+0x8d/0xa0 <4>[ 7.456240] kmemleak_not_leak+0x33/0x70 <4>[ 7.456243] load_module+0xa20/0x2d10 <4>[ 7.456255] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.456261] ? kernel_read_file+0x2ac/0x330 <4>[ 7.456268] init_module_from_file+0x97/0xe0 <4>[ 7.456270] ? init_module_from_file+0x97/0xe0 <4>[ 7.456283] idempotent_init_module+0x134/0x350 <4>[ 7.456298] __x64_sys_finit_module+0x77/0x100 <4>[ 7.456303] x64_sys_call+0x24e3/0x2670 <4>[ 7.456306] do_syscall_64+0x91/0x180 <4>[ 7.456311] ? generic_file_read_iter+0xbe/0x110 <4>[ 7.456321] ? vfs_read+0x17b/0x390 <4>[ 7.456323] ? vfs_read+0x17b/0x390 <4>[ 7.456332] ? __seccomp_filter+0x379/0x580 <4>[ 7.456340] ? ext4_llseek+0xc0/0x120 <4>[ 7.456344] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.456349] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456353] ? do_syscall_64+0x9d/0x180 <4>[ 7.456359] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.456363] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456368] ? do_syscall_64+0x9d/0x180 <4>[ 7.456371] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456375] ? do_syscall_64+0x9d/0x180 <4>[ 7.456379] ? do_syscall_64+0x9d/0x180 <4>[ 7.456383] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.456386] RIP: 0033:0x78cf6112725d <4>[ 7.456388] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.456389] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.456391] RAX: ffffffffffffffda RBX: 000057e1920f4ee0 RCX: 000078cf6112725d <4>[ 7.456392] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.456393] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.456394] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.456395] R13: 0000000000020000 R14: 000057e1920f7b30 R15: 000057e1920f7bb0 <4>[ 7.456408] <4>[ 7.456518] kmemleak: Found object by alias at 0xffffffffa05c1000 <4>[ 7.456534] CPU: 6 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.456536] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.456536] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.456537] Call Trace: <4>[ 7.456537] <4>[ 7.456538] dump_stack_lvl+0x91/0xf0 <4>[ 7.456541] dump_stack+0x10/0x20 <4>[ 7.456543] __lookup_object+0x90/0xa0 <4>[ 7.456546] __find_and_get_object+0x6c/0x190 <4>[ 7.456550] paint_ptr+0x1b/0xa0 <4>[ 7.456554] kmemleak_not_leak+0x33/0x70 <4>[ 7.456557] load_module+0xa20/0x2d10 <4>[ 7.456568] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.456572] ? kernel_read_file+0x2ac/0x330 <4>[ 7.456578] init_module_from_file+0x97/0xe0 <4>[ 7.456580] ? init_module_from_file+0x97/0xe0 <4>[ 7.456591] idempotent_init_module+0x134/0x350 <4>[ 7.456604] __x64_sys_finit_module+0x77/0x100 <4>[ 7.456608] x64_sys_call+0x24e3/0x2670 <4>[ 7.456610] do_syscall_64+0x91/0x180 <4>[ 7.456615] ? generic_file_read_iter+0xbe/0x110 <4>[ 7.456623] ? vfs_read+0x17b/0x390 <4>[ 7.456625] ? vfs_read+0x17b/0x390 <4>[ 7.456633] ? __seccomp_filter+0x379/0x580 <4>[ 7.456639] ? ext4_llseek+0xc0/0x120 <4>[ 7.456643] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.456647] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456651] ? do_syscall_64+0x9d/0x180 <4>[ 7.456655] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.456659] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456663] ? do_syscall_64+0x9d/0x180 <4>[ 7.456666] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456670] ? do_syscall_64+0x9d/0x180 <4>[ 7.456673] ? do_syscall_64+0x9d/0x180 <4>[ 7.456677] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.456679] RIP: 0033:0x78cf6112725d <4>[ 7.456680] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.456681] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.456683] RAX: ffffffffffffffda RBX: 000057e1920f4ee0 RCX: 000078cf6112725d <4>[ 7.456684] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.456685] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.456685] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.456686] R13: 0000000000020000 R14: 000057e1920f7b30 R15: 000057e1920f7bb0 <4>[ 7.456697] <5>[ 7.456698] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.456716] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.456718] kmemleak: min_count = 0 <5>[ 7.456719] kmemleak: count = 0 <5>[ 7.456721] kmemleak: flags = 0x1 <5>[ 7.456722] kmemleak: checksum = 0 <5>[ 7.456724] kmemleak: backtrace: <4>[ 7.456725] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.456728] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.456731] execmem_vmalloc+0x5a/0xf0 <4>[ 7.456734] execmem_alloc+0xc2/0x150 <4>[ 7.456737] load_module+0x9db/0x2d10 <4>[ 7.456740] init_module_from_file+0x97/0xe0 <4>[ 7.456742] idempotent_init_module+0x134/0x350 <4>[ 7.456744] __x64_sys_finit_module+0x77/0x100 <4>[ 7.456747] x64_sys_call+0x24e3/0x2670 <4>[ 7.456749] do_syscall_64+0x91/0x180 <4>[ 7.456752] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.456767] kmemleak: Trying to color unknown object at 0xffffffffa05c1000 as Grey <4>[ 7.456770] CPU: 6 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.456773] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.456773] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.456774] Call Trace: <4>[ 7.456775] <4>[ 7.456776] dump_stack_lvl+0xc1/0xf0 <4>[ 7.456779] dump_stack+0x10/0x20 <4>[ 7.456781] paint_ptr+0x8d/0xa0 <4>[ 7.456786] kmemleak_not_leak+0x33/0x70 <4>[ 7.456789] load_module+0xa20/0x2d10 <4>[ 7.456802] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.456807] ? kernel_read_file+0x2ac/0x330 <4>[ 7.456814] init_module_from_file+0x97/0xe0 <4>[ 7.456815] ? init_module_from_file+0x97/0xe0 <4>[ 7.456828] idempotent_init_module+0x134/0x350 <4>[ 7.456843] __x64_sys_finit_module+0x77/0x100 <4>[ 7.456848] x64_sys_call+0x24e3/0x2670 <4>[ 7.456851] do_syscall_64+0x91/0x180 <4>[ 7.456856] ? generic_file_read_iter+0xbe/0x110 <4>[ 7.456866] ? vfs_read+0x17b/0x390 <4>[ 7.456868] ? vfs_read+0x17b/0x390 <4>[ 7.456878] ? __seccomp_filter+0x379/0x580 <4>[ 7.456885] ? ext4_llseek+0xc0/0x120 <4>[ 7.456890] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.456894] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456899] ? do_syscall_64+0x9d/0x180 <4>[ 7.456905] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.456909] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456914] ? do_syscall_64+0x9d/0x180 <4>[ 7.456917] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.456922] ? do_syscall_64+0x9d/0x180 <4>[ 7.456925] ? do_syscall_64+0x9d/0x180 <4>[ 7.456930] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.456932] RIP: 0033:0x78cf6112725d <4>[ 7.456934] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.456935] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.456937] RAX: ffffffffffffffda RBX: 000057e1920f4ee0 RCX: 000078cf6112725d <4>[ 7.456938] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000039 <4>[ 7.456939] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.456940] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.456941] R13: 0000000000020000 R14: 000057e1920f7b30 R15: 000057e1920f7bb0 <4>[ 7.456955] <4>[ 7.463872] kmemleak: Found object by alias at 0xffffffffa0512000 <4>[ 7.463878] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.463881] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.463882] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.463883] Call Trace: <4>[ 7.463883] <4>[ 7.463884] dump_stack_lvl+0x91/0xf0 <4>[ 7.463889] dump_stack+0x10/0x20 <4>[ 7.463890] __lookup_object+0x90/0xa0 <4>[ 7.463895] __find_and_get_object+0x6c/0x190 <4>[ 7.463899] paint_ptr+0x1b/0xa0 <4>[ 7.463902] kmemleak_not_leak+0x33/0x70 <4>[ 7.463905] load_module+0xa20/0x2d10 <4>[ 7.463916] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.463921] ? kernel_read_file+0x2ac/0x330 <4>[ 7.463927] init_module_from_file+0x97/0xe0 <4>[ 7.463928] ? init_module_from_file+0x97/0xe0 <4>[ 7.463938] idempotent_init_module+0x134/0x350 <4>[ 7.463950] __x64_sys_finit_module+0x77/0x100 <4>[ 7.463953] x64_sys_call+0x24e3/0x2670 <4>[ 7.463956] do_syscall_64+0x91/0x180 <4>[ 7.463959] ? putname+0x60/0x80 <4>[ 7.463961] ? do_sys_openat2+0xab/0xf0 <4>[ 7.463967] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.463971] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.463975] ? do_syscall_64+0x9d/0x180 <4>[ 7.463976] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.463980] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.463983] ? irqentry_exit+0x77/0xb0 <4>[ 7.463986] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.463989] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.463992] RIP: 0033:0x78cf6112725d <4>[ 7.463994] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.463995] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.463997] RAX: ffffffffffffffda RBX: 000057e1920f6490 RCX: 000078cf6112725d <4>[ 7.463998] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003f <4>[ 7.463999] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.464000] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.464001] R13: 0000000000020000 R14: 000057e1920f8930 R15: 000057e1920f89b0 <4>[ 7.464011] <5>[ 7.464011] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.464026] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.464027] kmemleak: min_count = 0 <5>[ 7.464029] kmemleak: count = 0 <5>[ 7.464030] kmemleak: flags = 0x1 <5>[ 7.464031] kmemleak: checksum = 0 <5>[ 7.464033] kmemleak: backtrace: <4>[ 7.464034] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.464037] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.464040] execmem_vmalloc+0x5a/0xf0 <4>[ 7.464043] execmem_alloc+0xc2/0x150 <4>[ 7.464046] load_module+0x9db/0x2d10 <4>[ 7.464048] init_module_from_file+0x97/0xe0 <4>[ 7.464050] idempotent_init_module+0x134/0x350 <4>[ 7.464052] __x64_sys_finit_module+0x77/0x100 <4>[ 7.464054] x64_sys_call+0x24e3/0x2670 <4>[ 7.464056] do_syscall_64+0x91/0x180 <4>[ 7.464059] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.464061] kmemleak: Trying to color unknown object at 0xffffffffa0512000 as Grey <4>[ 7.464065] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.464067] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.464068] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.464069] Call Trace: <4>[ 7.464069] <4>[ 7.464070] dump_stack_lvl+0xc1/0xf0 <4>[ 7.464074] dump_stack+0x10/0x20 <4>[ 7.464076] paint_ptr+0x8d/0xa0 <4>[ 7.464081] kmemleak_not_leak+0x33/0x70 <4>[ 7.464084] load_module+0xa20/0x2d10 <4>[ 7.464097] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.464102] ? kernel_read_file+0x2ac/0x330 <4>[ 7.464109] init_module_from_file+0x97/0xe0 <4>[ 7.464111] ? init_module_from_file+0x97/0xe0 <4>[ 7.464119] idempotent_init_module+0x134/0x350 <4>[ 7.464127] __x64_sys_finit_module+0x77/0x100 <4>[ 7.464129] x64_sys_call+0x24e3/0x2670 <4>[ 7.464131] do_syscall_64+0x91/0x180 <4>[ 7.464133] ? putname+0x60/0x80 <4>[ 7.464135] ? do_sys_openat2+0xab/0xf0 <4>[ 7.464139] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.464142] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.464145] ? do_syscall_64+0x9d/0x180 <4>[ 7.464147] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.464149] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.464152] ? irqentry_exit+0x77/0xb0 <4>[ 7.464154] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.464157] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.464159] RIP: 0033:0x78cf6112725d <4>[ 7.464160] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.464161] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.464163] RAX: ffffffffffffffda RBX: 000057e1920f6490 RCX: 000078cf6112725d <4>[ 7.464163] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003f <4>[ 7.464164] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.464164] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.464165] R13: 0000000000020000 R14: 000057e1920f8930 R15: 000057e1920f89b0 <4>[ 7.464172] <4>[ 7.464425] kmemleak: Found object by alias at 0xffffffffa0513000 <4>[ 7.464442] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.464445] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.464445] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.464446] Call Trace: <4>[ 7.464446] <4>[ 7.464447] dump_stack_lvl+0x91/0xf0 <4>[ 7.464451] dump_stack+0x10/0x20 <4>[ 7.464452] __lookup_object+0x90/0xa0 <4>[ 7.464456] __find_and_get_object+0x6c/0x190 <4>[ 7.464460] paint_ptr+0x1b/0xa0 <4>[ 7.464463] kmemleak_not_leak+0x33/0x70 <4>[ 7.464466] load_module+0xa20/0x2d10 <4>[ 7.464478] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.464482] ? kernel_read_file+0x2ac/0x330 <4>[ 7.464488] init_module_from_file+0x97/0xe0 <4>[ 7.464489] ? init_module_from_file+0x97/0xe0 <4>[ 7.464501] idempotent_init_module+0x134/0x350 <4>[ 7.464513] __x64_sys_finit_module+0x77/0x100 <4>[ 7.464517] x64_sys_call+0x24e3/0x2670 <4>[ 7.464520] do_syscall_64+0x91/0x180 <4>[ 7.464522] ? putname+0x60/0x80 <4>[ 7.464524] ? do_sys_openat2+0xab/0xf0 <4>[ 7.464530] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.464534] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.464538] ? do_syscall_64+0x9d/0x180 <4>[ 7.464539] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.464543] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.464547] ? irqentry_exit+0x77/0xb0 <4>[ 7.464550] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.464553] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.464555] RIP: 0033:0x78cf6112725d <4>[ 7.464557] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.464558] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.464560] RAX: ffffffffffffffda RBX: 000057e1920f6490 RCX: 000078cf6112725d <4>[ 7.464561] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003f <4>[ 7.464562] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.464562] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.464563] R13: 0000000000020000 R14: 000057e1920f8930 R15: 000057e1920f89b0 <4>[ 7.464575] <5>[ 7.464575] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.464591] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.464593] kmemleak: min_count = 0 <5>[ 7.464595] kmemleak: count = 0 <5>[ 7.464597] kmemleak: flags = 0x1 <5>[ 7.464598] kmemleak: checksum = 0 <5>[ 7.464599] kmemleak: backtrace: <4>[ 7.464601] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.464604] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.464607] execmem_vmalloc+0x5a/0xf0 <4>[ 7.464610] execmem_alloc+0xc2/0x150 <4>[ 7.464613] load_module+0x9db/0x2d10 <4>[ 7.464615] init_module_from_file+0x97/0xe0 <4>[ 7.464618] idempotent_init_module+0x134/0x350 <4>[ 7.464620] __x64_sys_finit_module+0x77/0x100 <4>[ 7.464622] x64_sys_call+0x24e3/0x2670 <4>[ 7.464625] do_syscall_64+0x91/0x180 <4>[ 7.464628] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.464640] kmemleak: Trying to color unknown object at 0xffffffffa0513000 as Grey <4>[ 7.464643] CPU: 2 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.464646] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.464646] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.464647] Call Trace: <4>[ 7.464648] <4>[ 7.464649] dump_stack_lvl+0xc1/0xf0 <4>[ 7.464652] dump_stack+0x10/0x20 <4>[ 7.464654] paint_ptr+0x8d/0xa0 <4>[ 7.464659] kmemleak_not_leak+0x33/0x70 <4>[ 7.464662] load_module+0xa20/0x2d10 <4>[ 7.464675] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.464680] ? kernel_read_file+0x2ac/0x330 <4>[ 7.464687] init_module_from_file+0x97/0xe0 <4>[ 7.464689] ? init_module_from_file+0x97/0xe0 <4>[ 7.464702] idempotent_init_module+0x134/0x350 <4>[ 7.464717] __x64_sys_finit_module+0x77/0x100 <4>[ 7.464723] x64_sys_call+0x24e3/0x2670 <4>[ 7.464725] do_syscall_64+0x91/0x180 <4>[ 7.464728] ? putname+0x60/0x80 <4>[ 7.464731] ? do_sys_openat2+0xab/0xf0 <4>[ 7.464737] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.464741] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.464746] ? do_syscall_64+0x9d/0x180 <4>[ 7.464748] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.464753] ? irqentry_exit_to_user_mode+0x8b/0x260 <4>[ 7.464757] ? irqentry_exit+0x77/0xb0 <4>[ 7.464760] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.464764] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.464767] RIP: 0033:0x78cf6112725d <4>[ 7.464769] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.464770] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.464772] RAX: ffffffffffffffda RBX: 000057e1920f6490 RCX: 000078cf6112725d <4>[ 7.464773] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003f <4>[ 7.464774] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.464775] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.464776] R13: 0000000000020000 R14: 000057e1920f8930 R15: 000057e1920f89b0 <4>[ 7.464789] <6>[ 7.471925] intel_tcc_cooling: Programmable TCC Offset detected <4>[ 7.473811] kmemleak: Found object by alias at 0xffffffffa0505000 <4>[ 7.473816] CPU: 6 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.473818] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.473819] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.473820] Call Trace: <4>[ 7.473821] <4>[ 7.473822] dump_stack_lvl+0x91/0xf0 <4>[ 7.473827] dump_stack+0x10/0x20 <4>[ 7.473828] __lookup_object+0x90/0xa0 <4>[ 7.473832] __find_and_get_object+0x6c/0x190 <4>[ 7.473836] paint_ptr+0x1b/0xa0 <4>[ 7.473840] kmemleak_not_leak+0x33/0x70 <4>[ 7.473843] load_module+0xa20/0x2d10 <4>[ 7.473854] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.473858] ? kernel_read_file+0x2ac/0x330 <4>[ 7.473864] init_module_from_file+0x97/0xe0 <4>[ 7.473865] ? init_module_from_file+0x97/0xe0 <4>[ 7.473876] idempotent_init_module+0x134/0x350 <4>[ 7.473887] __x64_sys_finit_module+0x77/0x100 <4>[ 7.473891] x64_sys_call+0x24e3/0x2670 <4>[ 7.473893] do_syscall_64+0x91/0x180 <4>[ 7.473896] ? __might_fault+0x53/0xb0 <4>[ 7.473898] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.473910] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.473913] ? do_syscall_64+0x9d/0x180 <4>[ 7.473916] ? __might_fault+0x89/0xb0 <4>[ 7.473917] ? __might_fault+0x53/0xb0 <4>[ 7.473919] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.473930] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.473933] ? do_syscall_64+0x9d/0x180 <4>[ 7.473935] ? do_syscall_64+0x9d/0x180 <4>[ 7.473937] ? do_syscall_64+0x9d/0x180 <4>[ 7.473940] ? do_syscall_64+0x9d/0x180 <4>[ 7.473944] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.473946] RIP: 0033:0x78cf6112725d <4>[ 7.473949] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.473950] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.473952] RAX: ffffffffffffffda RBX: 000057e1920f60d0 RCX: 000078cf6112725d <4>[ 7.473953] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003b <4>[ 7.473954] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.473955] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.473955] R13: 0000000000020000 R14: 000057e1920f79f0 R15: 000057e1920f7d30 <4>[ 7.473965] <5>[ 7.473966] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.473981] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.473983] kmemleak: min_count = 0 <5>[ 7.473984] kmemleak: count = 0 <5>[ 7.473986] kmemleak: flags = 0x1 <5>[ 7.473987] kmemleak: checksum = 0 <5>[ 7.473988] kmemleak: backtrace: <4>[ 7.473990] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.473992] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.473996] execmem_vmalloc+0x5a/0xf0 <4>[ 7.473998] execmem_alloc+0xc2/0x150 <4>[ 7.474001] load_module+0x9db/0x2d10 <4>[ 7.474003] init_module_from_file+0x97/0xe0 <4>[ 7.474005] idempotent_init_module+0x134/0x350 <4>[ 7.474007] __x64_sys_finit_module+0x77/0x100 <4>[ 7.474009] x64_sys_call+0x24e3/0x2670 <4>[ 7.474012] do_syscall_64+0x91/0x180 <4>[ 7.474014] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.474017] kmemleak: Trying to color unknown object at 0xffffffffa0505000 as Grey <4>[ 7.474021] CPU: 6 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.474023] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.474024] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.474024] Call Trace: <4>[ 7.474025] <4>[ 7.474026] dump_stack_lvl+0xc1/0xf0 <4>[ 7.474029] dump_stack+0x10/0x20 <4>[ 7.474032] paint_ptr+0x8d/0xa0 <4>[ 7.474036] kmemleak_not_leak+0x33/0x70 <4>[ 7.474039] load_module+0xa20/0x2d10 <4>[ 7.474053] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.474058] ? kernel_read_file+0x2ac/0x330 <4>[ 7.474065] init_module_from_file+0x97/0xe0 <4>[ 7.474067] ? init_module_from_file+0x97/0xe0 <4>[ 7.474080] idempotent_init_module+0x134/0x350 <4>[ 7.474096] __x64_sys_finit_module+0x77/0x100 <4>[ 7.474100] x64_sys_call+0x24e3/0x2670 <4>[ 7.474103] do_syscall_64+0x91/0x180 <4>[ 7.474105] ? __might_fault+0x53/0xb0 <4>[ 7.474109] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.474122] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.474127] ? do_syscall_64+0x9d/0x180 <4>[ 7.474130] ? __might_fault+0x89/0xb0 <4>[ 7.474131] ? __might_fault+0x53/0xb0 <4>[ 7.474134] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.474148] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.474152] ? do_syscall_64+0x9d/0x180 <4>[ 7.474154] ? do_syscall_64+0x9d/0x180 <4>[ 7.474156] ? do_syscall_64+0x9d/0x180 <4>[ 7.474158] ? do_syscall_64+0x9d/0x180 <4>[ 7.474162] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.474164] RIP: 0033:0x78cf6112725d <4>[ 7.474165] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.474166] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.474168] RAX: ffffffffffffffda RBX: 000057e1920f60d0 RCX: 000078cf6112725d <4>[ 7.474168] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003b <4>[ 7.474169] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.474170] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.474171] R13: 0000000000020000 R14: 000057e1920f79f0 R15: 000057e1920f7d30 <4>[ 7.474182] <4>[ 7.474283] kmemleak: Found object by alias at 0xffffffffa05bf000 <4>[ 7.474299] CPU: 6 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.474300] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.474301] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.474301] Call Trace: <4>[ 7.474302] <4>[ 7.474303] dump_stack_lvl+0x91/0xf0 <4>[ 7.474305] dump_stack+0x10/0x20 <4>[ 7.474307] __lookup_object+0x90/0xa0 <4>[ 7.474310] __find_and_get_object+0x6c/0x190 <4>[ 7.474314] paint_ptr+0x1b/0xa0 <4>[ 7.474317] kmemleak_not_leak+0x33/0x70 <4>[ 7.474320] load_module+0xa20/0x2d10 <4>[ 7.474330] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.474334] ? kernel_read_file+0x2ac/0x330 <4>[ 7.474339] init_module_from_file+0x97/0xe0 <4>[ 7.474341] ? init_module_from_file+0x97/0xe0 <4>[ 7.474351] idempotent_init_module+0x134/0x350 <4>[ 7.474362] __x64_sys_finit_module+0x77/0x100 <4>[ 7.474366] x64_sys_call+0x24e3/0x2670 <4>[ 7.474368] do_syscall_64+0x91/0x180 <4>[ 7.474370] ? __might_fault+0x53/0xb0 <4>[ 7.474372] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.474382] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.474386] ? do_syscall_64+0x9d/0x180 <4>[ 7.474389] ? __might_fault+0x89/0xb0 <4>[ 7.474390] ? __might_fault+0x53/0xb0 <4>[ 7.474392] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.474402] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.474406] ? do_syscall_64+0x9d/0x180 <4>[ 7.474408] ? do_syscall_64+0x9d/0x180 <4>[ 7.474410] ? do_syscall_64+0x9d/0x180 <4>[ 7.474412] ? do_syscall_64+0x9d/0x180 <4>[ 7.474416] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.474418] RIP: 0033:0x78cf6112725d <4>[ 7.474419] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.474420] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.474421] RAX: ffffffffffffffda RBX: 000057e1920f60d0 RCX: 000078cf6112725d <4>[ 7.474422] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003b <4>[ 7.474423] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.474424] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.474424] R13: 0000000000020000 R14: 000057e1920f79f0 R15: 000057e1920f7d30 <4>[ 7.474434] <5>[ 7.474435] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.474450] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.474451] kmemleak: min_count = 0 <5>[ 7.474453] kmemleak: count = 0 <5>[ 7.474454] kmemleak: flags = 0x1 <5>[ 7.474455] kmemleak: checksum = 0 <5>[ 7.474456] kmemleak: backtrace: <4>[ 7.474458] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.474460] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.474463] execmem_vmalloc+0x5a/0xf0 <4>[ 7.474466] execmem_alloc+0xc2/0x150 <4>[ 7.474468] load_module+0x9db/0x2d10 <4>[ 7.474470] init_module_from_file+0x97/0xe0 <4>[ 7.474472] idempotent_init_module+0x134/0x350 <4>[ 7.474474] __x64_sys_finit_module+0x77/0x100 <4>[ 7.474476] x64_sys_call+0x24e3/0x2670 <4>[ 7.474479] do_syscall_64+0x91/0x180 <4>[ 7.474481] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.474484] kmemleak: Trying to color unknown object at 0xffffffffa05bf000 as Grey <4>[ 7.474487] CPU: 6 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.474489] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.474489] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.474490] Call Trace: <4>[ 7.474491] <4>[ 7.474492] dump_stack_lvl+0xc1/0xf0 <4>[ 7.474495] dump_stack+0x10/0x20 <4>[ 7.474497] paint_ptr+0x8d/0xa0 <4>[ 7.474502] kmemleak_not_leak+0x33/0x70 <4>[ 7.474505] load_module+0xa20/0x2d10 <4>[ 7.474518] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.474524] ? kernel_read_file+0x2ac/0x330 <4>[ 7.474531] init_module_from_file+0x97/0xe0 <4>[ 7.474533] ? init_module_from_file+0x97/0xe0 <4>[ 7.474546] idempotent_init_module+0x134/0x350 <4>[ 7.474560] __x64_sys_finit_module+0x77/0x100 <4>[ 7.474565] x64_sys_call+0x24e3/0x2670 <4>[ 7.474568] do_syscall_64+0x91/0x180 <4>[ 7.474570] ? __might_fault+0x53/0xb0 <4>[ 7.474574] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.474587] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.474592] ? do_syscall_64+0x9d/0x180 <4>[ 7.474596] ? __might_fault+0x89/0xb0 <4>[ 7.474597] ? __might_fault+0x53/0xb0 <4>[ 7.474600] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.474614] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.474619] ? do_syscall_64+0x9d/0x180 <4>[ 7.474621] ? do_syscall_64+0x9d/0x180 <4>[ 7.474624] ? do_syscall_64+0x9d/0x180 <4>[ 7.474628] ? do_syscall_64+0x9d/0x180 <4>[ 7.474632] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.474635] RIP: 0033:0x78cf6112725d <4>[ 7.474637] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.474638] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.474639] RAX: ffffffffffffffda RBX: 000057e1920f60d0 RCX: 000078cf6112725d <4>[ 7.474641] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003b <4>[ 7.474641] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.474642] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.474643] R13: 0000000000020000 R14: 000057e1920f79f0 R15: 000057e1920f7d30 <4>[ 7.474656] <6>[ 7.576102] power_meter ACPI000D:00: Found ACPI power meter. <4>[ 7.576526] power_meter ACPI000D:00: hwmon_device_register() is deprecated. Please convert the driver to use hwmon_device_register_with_info(). <4>[ 7.611292] kmemleak: Found object by alias at 0xffffffffa046a000 <4>[ 7.611298] CPU: 2 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.611301] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.611302] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.611303] Call Trace: <4>[ 7.611304] <4>[ 7.611305] dump_stack_lvl+0x91/0xf0 <4>[ 7.611309] dump_stack+0x10/0x20 <4>[ 7.611311] __lookup_object+0x90/0xa0 <4>[ 7.611316] __find_and_get_object+0x6c/0x190 <4>[ 7.611320] paint_ptr+0x1b/0xa0 <4>[ 7.611324] kmemleak_not_leak+0x33/0x70 <4>[ 7.611327] load_module+0xa20/0x2d10 <4>[ 7.611338] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.611343] ? kernel_read_file+0x2ac/0x330 <4>[ 7.611350] init_module_from_file+0x97/0xe0 <4>[ 7.611351] ? init_module_from_file+0x97/0xe0 <4>[ 7.611362] idempotent_init_module+0x134/0x350 <4>[ 7.611374] __x64_sys_finit_module+0x77/0x100 <4>[ 7.611377] x64_sys_call+0x24e3/0x2670 <4>[ 7.611380] do_syscall_64+0x91/0x180 <4>[ 7.611383] ? __seccomp_filter+0x379/0x580 <4>[ 7.611390] ? ext4_llseek+0xc0/0x120 <4>[ 7.611394] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.611398] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.611402] ? do_syscall_64+0x9d/0x180 <4>[ 7.611405] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.611408] ? do_syscall_64+0x9d/0x180 <4>[ 7.611411] ? putname+0x60/0x80 <4>[ 7.611414] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.611421] ? putname+0x60/0x80 <4>[ 7.611423] ? vfs_fstatat+0x99/0xe0 <4>[ 7.611428] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.611438] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.611442] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.611446] ? do_syscall_64+0x9d/0x180 <4>[ 7.611448] ? do_syscall_64+0x9d/0x180 <4>[ 7.611450] ? do_syscall_64+0x9d/0x180 <4>[ 7.611452] ? do_syscall_64+0x9d/0x180 <4>[ 7.611455] ? do_syscall_64+0x9d/0x180 <4>[ 7.611459] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.611462] RIP: 0033:0x78cf6112725d <4>[ 7.611464] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.611465] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.611467] RAX: ffffffffffffffda RBX: 000057e1920f7d70 RCX: 000078cf6112725d <4>[ 7.611468] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003c <4>[ 7.611469] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.611470] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.611471] R13: 0000000000020000 R14: 000057e1920f04a0 R15: 000057e1920f7eb0 <4>[ 7.611481] <5>[ 7.611482] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.611500] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.611502] kmemleak: min_count = 0 <5>[ 7.611504] kmemleak: count = 0 <5>[ 7.611505] kmemleak: flags = 0x1 <5>[ 7.611506] kmemleak: checksum = 0 <5>[ 7.611507] kmemleak: backtrace: <4>[ 7.611509] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.611512] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.611515] execmem_vmalloc+0x5a/0xf0 <4>[ 7.611519] execmem_alloc+0xc2/0x150 <4>[ 7.611521] load_module+0x9db/0x2d10 <4>[ 7.611523] init_module_from_file+0x97/0xe0 <4>[ 7.611526] idempotent_init_module+0x134/0x350 <4>[ 7.611528] __x64_sys_finit_module+0x77/0x100 <4>[ 7.611530] x64_sys_call+0x24e3/0x2670 <4>[ 7.611532] do_syscall_64+0x91/0x180 <4>[ 7.611535] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.611548] kmemleak: Trying to color unknown object at 0xffffffffa046a000 as Grey <4>[ 7.611552] CPU: 2 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.611554] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.611555] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.611556] Call Trace: <4>[ 7.611557] <4>[ 7.611558] dump_stack_lvl+0xc1/0xf0 <4>[ 7.611562] dump_stack+0x10/0x20 <4>[ 7.611564] paint_ptr+0x8d/0xa0 <4>[ 7.611569] kmemleak_not_leak+0x33/0x70 <4>[ 7.611572] load_module+0xa20/0x2d10 <4>[ 7.611587] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.611592] ? kernel_read_file+0x2ac/0x330 <4>[ 7.611600] init_module_from_file+0x97/0xe0 <4>[ 7.611602] ? init_module_from_file+0x97/0xe0 <4>[ 7.611616] idempotent_init_module+0x134/0x350 <4>[ 7.611632] __x64_sys_finit_module+0x77/0x100 <4>[ 7.611637] x64_sys_call+0x24e3/0x2670 <4>[ 7.611640] do_syscall_64+0x91/0x180 <4>[ 7.611643] ? __seccomp_filter+0x379/0x580 <4>[ 7.611651] ? ext4_llseek+0xc0/0x120 <4>[ 7.611656] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.611661] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.611666] ? do_syscall_64+0x9d/0x180 <4>[ 7.611669] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.611674] ? do_syscall_64+0x9d/0x180 <4>[ 7.611678] ? putname+0x60/0x80 <4>[ 7.611681] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.611688] ? putname+0x60/0x80 <4>[ 7.611691] ? vfs_fstatat+0x99/0xe0 <4>[ 7.611696] ? __do_sys_newfstatat+0x44/0x90 <4>[ 7.611710] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.611715] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.611720] ? do_syscall_64+0x9d/0x180 <4>[ 7.611723] ? do_syscall_64+0x9d/0x180 <4>[ 7.611726] ? do_syscall_64+0x9d/0x180 <4>[ 7.611729] ? do_syscall_64+0x9d/0x180 <4>[ 7.611733] ? do_syscall_64+0x9d/0x180 <4>[ 7.611738] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.611741] RIP: 0033:0x78cf6112725d <4>[ 7.611743] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.611745] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.611747] RAX: ffffffffffffffda RBX: 000057e1920f7d70 RCX: 000078cf6112725d <4>[ 7.611748] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003c <4>[ 7.611749] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.611750] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.611752] R13: 0000000000020000 R14: 000057e1920f04a0 R15: 000057e1920f7eb0 <4>[ 7.611766] <4>[ 7.614125] kmemleak: Found object by alias at 0xffffffffa04bf000 <4>[ 7.614129] CPU: 2 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.614132] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.614132] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.614133] Call Trace: <4>[ 7.614133] <4>[ 7.614134] dump_stack_lvl+0x91/0xf0 <4>[ 7.614138] dump_stack+0x10/0x20 <4>[ 7.614152] __lookup_object+0x90/0xa0 <4>[ 7.614155] __find_and_get_object+0x6c/0x190 <4>[ 7.614159] paint_ptr+0x1b/0xa0 <4>[ 7.614162] kmemleak_not_leak+0x33/0x70 <4>[ 7.614165] load_module+0xa20/0x2d10 <4>[ 7.614175] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.614179] ? kernel_read_file+0x2ac/0x330 <4>[ 7.614185] init_module_from_file+0x97/0xe0 <4>[ 7.614186] ? init_module_from_file+0x97/0xe0 <4>[ 7.614196] idempotent_init_module+0x134/0x350 <4>[ 7.614207] __x64_sys_finit_module+0x77/0x100 <4>[ 7.614210] x64_sys_call+0x24e3/0x2670 <4>[ 7.614213] do_syscall_64+0x91/0x180 <4>[ 7.614215] ? __seccomp_filter+0x379/0x580 <4>[ 7.614217] ? __might_fault+0x89/0xb0 <4>[ 7.614218] ? __might_fault+0x53/0xb0 <4>[ 7.614222] ? ext4_llseek+0xc0/0x120 <4>[ 7.614226] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.614229] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.614233] ? do_syscall_64+0x9d/0x180 <4>[ 7.614235] ? do_syscall_64+0x9d/0x180 <4>[ 7.614241] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.614244] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.614247] ? do_syscall_64+0x9d/0x180 <4>[ 7.614249] ? do_syscall_64+0x9d/0x180 <4>[ 7.614251] ? do_syscall_64+0x9d/0x180 <4>[ 7.614253] ? do_syscall_64+0x9d/0x180 <4>[ 7.614256] ? do_syscall_64+0x9d/0x180 <4>[ 7.614259] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.614261] RIP: 0033:0x78cf6112725d <4>[ 7.614263] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.614264] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.614266] RAX: ffffffffffffffda RBX: 000057e1920f6760 RCX: 000078cf6112725d <4>[ 7.614267] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003d <4>[ 7.614268] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.614268] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.614269] R13: 0000000000020000 R14: 000057e1920ef6e0 R15: 000057e1920f7ef0 <4>[ 7.614279] <5>[ 7.614280] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.614295] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.614297] kmemleak: min_count = 0 <5>[ 7.614298] kmemleak: count = 0 <5>[ 7.614299] kmemleak: flags = 0x1 <5>[ 7.614301] kmemleak: checksum = 0 <5>[ 7.614302] kmemleak: backtrace: <4>[ 7.614303] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.614306] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.614308] execmem_vmalloc+0x5a/0xf0 <4>[ 7.614311] execmem_alloc+0xc2/0x150 <4>[ 7.614314] load_module+0x9db/0x2d10 <4>[ 7.614316] init_module_from_file+0x97/0xe0 <4>[ 7.614318] idempotent_init_module+0x134/0x350 <4>[ 7.614320] __x64_sys_finit_module+0x77/0x100 <4>[ 7.614322] x64_sys_call+0x24e3/0x2670 <4>[ 7.614324] do_syscall_64+0x91/0x180 <4>[ 7.614327] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.614329] kmemleak: Trying to color unknown object at 0xffffffffa04bf000 as Grey <4>[ 7.614333] CPU: 2 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.614335] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.614336] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.614336] Call Trace: <4>[ 7.614337] <4>[ 7.614338] dump_stack_lvl+0xc1/0xf0 <4>[ 7.614342] dump_stack+0x10/0x20 <4>[ 7.614344] paint_ptr+0x8d/0xa0 <4>[ 7.614349] kmemleak_not_leak+0x33/0x70 <4>[ 7.614352] load_module+0xa20/0x2d10 <4>[ 7.614365] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.614370] ? kernel_read_file+0x2ac/0x330 <4>[ 7.614378] init_module_from_file+0x97/0xe0 <4>[ 7.614379] ? init_module_from_file+0x97/0xe0 <4>[ 7.614393] idempotent_init_module+0x134/0x350 <4>[ 7.614408] __x64_sys_finit_module+0x77/0x100 <4>[ 7.614413] x64_sys_call+0x24e3/0x2670 <4>[ 7.614415] do_syscall_64+0x91/0x180 <4>[ 7.614418] ? __seccomp_filter+0x379/0x580 <4>[ 7.614420] ? __might_fault+0x89/0xb0 <4>[ 7.614421] ? __might_fault+0x53/0xb0 <4>[ 7.614427] ? ext4_llseek+0xc0/0x120 <4>[ 7.614431] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.614436] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.614440] ? do_syscall_64+0x9d/0x180 <4>[ 7.614444] ? do_syscall_64+0x9d/0x180 <4>[ 7.614451] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.614455] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.614459] ? do_syscall_64+0x9d/0x180 <4>[ 7.614461] ? do_syscall_64+0x9d/0x180 <4>[ 7.614463] ? do_syscall_64+0x9d/0x180 <4>[ 7.614466] ? do_syscall_64+0x9d/0x180 <4>[ 7.614469] ? do_syscall_64+0x9d/0x180 <4>[ 7.614474] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.614477] RIP: 0033:0x78cf6112725d <4>[ 7.614479] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.614480] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.614482] RAX: ffffffffffffffda RBX: 000057e1920f6760 RCX: 000078cf6112725d <4>[ 7.614483] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003d <4>[ 7.614484] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.614485] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.614486] R13: 0000000000020000 R14: 000057e1920ef6e0 R15: 000057e1920f7ef0 <4>[ 7.614499] <4>[ 7.614708] kmemleak: Found object by alias at 0xffffffffa0505000 <4>[ 7.614711] CPU: 2 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.614713] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.614713] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.614714] Call Trace: <4>[ 7.614714] <4>[ 7.614715] dump_stack_lvl+0x91/0xf0 <4>[ 7.614718] dump_stack+0x10/0x20 <4>[ 7.614720] __lookup_object+0x90/0xa0 <4>[ 7.614723] __find_and_get_object+0x6c/0x190 <4>[ 7.614740] paint_ptr+0x1b/0xa0 <4>[ 7.614743] kmemleak_not_leak+0x33/0x70 <4>[ 7.614745] load_module+0xa20/0x2d10 <4>[ 7.614755] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.614759] ? kernel_read_file+0x2ac/0x330 <4>[ 7.614764] init_module_from_file+0x97/0xe0 <4>[ 7.614766] ? init_module_from_file+0x97/0xe0 <4>[ 7.614776] idempotent_init_module+0x134/0x350 <4>[ 7.614787] __x64_sys_finit_module+0x77/0x100 <4>[ 7.614790] x64_sys_call+0x24e3/0x2670 <4>[ 7.614792] do_syscall_64+0x91/0x180 <4>[ 7.614794] ? __seccomp_filter+0x379/0x580 <4>[ 7.614796] ? __might_fault+0x89/0xb0 <4>[ 7.614797] ? __might_fault+0x53/0xb0 <4>[ 7.614801] ? ext4_llseek+0xc0/0x120 <4>[ 7.614804] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.614808] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.614811] ? do_syscall_64+0x9d/0x180 <4>[ 7.614814] ? do_syscall_64+0x9d/0x180 <4>[ 7.614819] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.614822] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.614826] ? do_syscall_64+0x9d/0x180 <4>[ 7.614828] ? do_syscall_64+0x9d/0x180 <4>[ 7.614830] ? do_syscall_64+0x9d/0x180 <4>[ 7.614832] ? do_syscall_64+0x9d/0x180 <4>[ 7.614834] ? do_syscall_64+0x9d/0x180 <4>[ 7.614838] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.614840] RIP: 0033:0x78cf6112725d <4>[ 7.614841] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.614842] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.614844] RAX: ffffffffffffffda RBX: 000057e1920f6760 RCX: 000078cf6112725d <4>[ 7.614845] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003d <4>[ 7.614845] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.614846] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.614847] R13: 0000000000020000 R14: 000057e1920ef6e0 R15: 000057e1920f7ef0 <4>[ 7.614857] <5>[ 7.614857] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.614872] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.614874] kmemleak: min_count = 0 <5>[ 7.614875] kmemleak: count = 0 <5>[ 7.614876] kmemleak: flags = 0x1 <5>[ 7.614878] kmemleak: checksum = 0 <5>[ 7.614879] kmemleak: backtrace: <4>[ 7.614880] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.614883] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.614885] execmem_vmalloc+0x5a/0xf0 <4>[ 7.614888] execmem_alloc+0xc2/0x150 <4>[ 7.614891] load_module+0x9db/0x2d10 <4>[ 7.614893] init_module_from_file+0x97/0xe0 <4>[ 7.614895] idempotent_init_module+0x134/0x350 <4>[ 7.614897] __x64_sys_finit_module+0x77/0x100 <4>[ 7.614899] x64_sys_call+0x24e3/0x2670 <4>[ 7.614901] do_syscall_64+0x91/0x180 <4>[ 7.614903] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.614906] kmemleak: Trying to color unknown object at 0xffffffffa0505000 as Grey <4>[ 7.614909] CPU: 2 UID: 0 PID: 358 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.614911] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.614912] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.614913] Call Trace: <4>[ 7.614913] <4>[ 7.614914] dump_stack_lvl+0xc1/0xf0 <4>[ 7.614917] dump_stack+0x10/0x20 <4>[ 7.614919] paint_ptr+0x8d/0xa0 <4>[ 7.614923] kmemleak_not_leak+0x33/0x70 <4>[ 7.614927] load_module+0xa20/0x2d10 <4>[ 7.614940] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.614945] ? kernel_read_file+0x2ac/0x330 <4>[ 7.614952] init_module_from_file+0x97/0xe0 <4>[ 7.614954] ? init_module_from_file+0x97/0xe0 <4>[ 7.614968] idempotent_init_module+0x134/0x350 <4>[ 7.614983] __x64_sys_finit_module+0x77/0x100 <4>[ 7.614988] x64_sys_call+0x24e3/0x2670 <4>[ 7.614991] do_syscall_64+0x91/0x180 <4>[ 7.614993] ? __seccomp_filter+0x379/0x580 <4>[ 7.614996] ? __might_fault+0x89/0xb0 <4>[ 7.614997] ? __might_fault+0x53/0xb0 <4>[ 7.615003] ? ext4_llseek+0xc0/0x120 <4>[ 7.615007] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.615012] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.615016] ? do_syscall_64+0x9d/0x180 <4>[ 7.615020] ? do_syscall_64+0x9d/0x180 <4>[ 7.615026] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.615031] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.615035] ? do_syscall_64+0x9d/0x180 <4>[ 7.615038] ? do_syscall_64+0x9d/0x180 <4>[ 7.615041] ? do_syscall_64+0x9d/0x180 <4>[ 7.615043] ? do_syscall_64+0x9d/0x180 <4>[ 7.615047] ? do_syscall_64+0x9d/0x180 <4>[ 7.615051] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.615054] RIP: 0033:0x78cf6112725d <4>[ 7.615056] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.615057] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.615059] RAX: ffffffffffffffda RBX: 000057e1920f6760 RCX: 000078cf6112725d <4>[ 7.615060] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 000000000000003d <4>[ 7.615061] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23870 <4>[ 7.615062] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.615063] R13: 0000000000020000 R14: 000057e1920ef6e0 R15: 000057e1920f7ef0 <4>[ 7.615076] <4>[ 7.619445] kmemleak: Found object by alias at 0xffffffffa05c1000 <4>[ 7.619449] CPU: 3 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.619452] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.619452] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.619453] Call Trace: <4>[ 7.619453] <4>[ 7.619455] dump_stack_lvl+0x91/0xf0 <4>[ 7.619459] dump_stack+0x10/0x20 <4>[ 7.619460] __lookup_object+0x90/0xa0 <4>[ 7.619464] __find_and_get_object+0x6c/0x190 <4>[ 7.619468] paint_ptr+0x1b/0xa0 <4>[ 7.619471] kmemleak_not_leak+0x33/0x70 <4>[ 7.619473] load_module+0xa20/0x2d10 <4>[ 7.619481] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.619485] ? kernel_read_file+0x2ac/0x330 <4>[ 7.619490] init_module_from_file+0x97/0xe0 <4>[ 7.619491] ? init_module_from_file+0x97/0xe0 <4>[ 7.619499] idempotent_init_module+0x134/0x350 <4>[ 7.619508] __x64_sys_finit_module+0x77/0x100 <4>[ 7.619511] x64_sys_call+0x24e3/0x2670 <4>[ 7.619513] do_syscall_64+0x91/0x180 <4>[ 7.619516] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.619520] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.619523] ? switch_fpu_return+0xe0/0x130 <4>[ 7.619527] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.619530] ? do_syscall_64+0x9d/0x180 <4>[ 7.619531] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.619535] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.619536] ? __seccomp_filter+0x379/0x580 <4>[ 7.619539] ? switch_fpu_return+0xe0/0x130 <4>[ 7.619545] ? ext4_llseek+0xc0/0x120 <4>[ 7.619550] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.619554] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.619558] ? do_syscall_64+0x9d/0x180 <4>[ 7.619560] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.619564] ? do_syscall_64+0x9d/0x180 <4>[ 7.619565] ? irqentry_exit+0x77/0xb0 <4>[ 7.619568] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.619571] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.619573] RIP: 0033:0x78cf6112725d <4>[ 7.619575] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.619577] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.619578] RAX: ffffffffffffffda RBX: 000057e1920f7c80 RCX: 000078cf6112725d <4>[ 7.619580] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000043 <4>[ 7.619580] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.619581] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.619582] R13: 0000000000020000 R14: 000057e1920f89f0 R15: 000057e1920f8d00 <4>[ 7.619592] <5>[ 7.619593] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.619610] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.619611] kmemleak: min_count = 0 <5>[ 7.619613] kmemleak: count = 0 <5>[ 7.619614] kmemleak: flags = 0x1 <5>[ 7.619615] kmemleak: checksum = 0 <5>[ 7.619617] kmemleak: backtrace: <4>[ 7.619618] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.619621] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.619624] execmem_vmalloc+0x5a/0xf0 <4>[ 7.619627] execmem_alloc+0xc2/0x150 <4>[ 7.619630] load_module+0x9db/0x2d10 <4>[ 7.619632] init_module_from_file+0x97/0xe0 <4>[ 7.619634] idempotent_init_module+0x134/0x350 <4>[ 7.619636] __x64_sys_finit_module+0x77/0x100 <4>[ 7.619638] x64_sys_call+0x24e3/0x2670 <4>[ 7.619640] do_syscall_64+0x91/0x180 <4>[ 7.619643] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.619654] kmemleak: Trying to color unknown object at 0xffffffffa05c1000 as Grey <4>[ 7.619658] CPU: 3 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.619660] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.619661] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.619662] Call Trace: <4>[ 7.619662] <4>[ 7.619664] dump_stack_lvl+0xc1/0xf0 <4>[ 7.619667] dump_stack+0x10/0x20 <4>[ 7.619669] paint_ptr+0x8d/0xa0 <4>[ 7.619674] kmemleak_not_leak+0x33/0x70 <4>[ 7.619677] load_module+0xa20/0x2d10 <4>[ 7.619687] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.619691] ? kernel_read_file+0x2ac/0x330 <4>[ 7.619695] init_module_from_file+0x97/0xe0 <4>[ 7.619696] ? init_module_from_file+0x97/0xe0 <4>[ 7.619703] idempotent_init_module+0x134/0x350 <4>[ 7.619710] __x64_sys_finit_module+0x77/0x100 <4>[ 7.619713] x64_sys_call+0x24e3/0x2670 <4>[ 7.619715] do_syscall_64+0x91/0x180 <4>[ 7.619717] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.619721] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.619723] ? switch_fpu_return+0xe0/0x130 <4>[ 7.619726] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.619729] ? do_syscall_64+0x9d/0x180 <4>[ 7.619731] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.619734] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.619735] ? __seccomp_filter+0x379/0x580 <4>[ 7.619737] ? switch_fpu_return+0xe0/0x130 <4>[ 7.619740] ? ext4_llseek+0xc0/0x120 <4>[ 7.619742] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.619745] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.619748] ? do_syscall_64+0x9d/0x180 <4>[ 7.619750] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.619753] ? do_syscall_64+0x9d/0x180 <4>[ 7.619755] ? irqentry_exit+0x77/0xb0 <4>[ 7.619757] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.619759] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.619761] RIP: 0033:0x78cf6112725d <4>[ 7.619762] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.619763] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.619764] RAX: ffffffffffffffda RBX: 000057e1920f7c80 RCX: 000078cf6112725d <4>[ 7.619765] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000043 <4>[ 7.619766] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.619766] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.619767] R13: 0000000000020000 R14: 000057e1920f89f0 R15: 000057e1920f8d00 <4>[ 7.619774] <4>[ 7.619865] kmemleak: Found object by alias at 0xffffffffa0513000 <4>[ 7.619878] CPU: 3 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.619880] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.619880] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.619881] Call Trace: <4>[ 7.619881] <4>[ 7.619882] dump_stack_lvl+0x91/0xf0 <4>[ 7.619884] dump_stack+0x10/0x20 <4>[ 7.619886] __lookup_object+0x90/0xa0 <4>[ 7.619888] __find_and_get_object+0x6c/0x190 <4>[ 7.619892] paint_ptr+0x1b/0xa0 <4>[ 7.619895] kmemleak_not_leak+0x33/0x70 <4>[ 7.619897] load_module+0xa20/0x2d10 <4>[ 7.619905] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.619908] ? kernel_read_file+0x2ac/0x330 <4>[ 7.619912] init_module_from_file+0x97/0xe0 <4>[ 7.619913] ? init_module_from_file+0x97/0xe0 <4>[ 7.619921] idempotent_init_module+0x134/0x350 <4>[ 7.619930] __x64_sys_finit_module+0x77/0x100 <4>[ 7.619933] x64_sys_call+0x24e3/0x2670 <4>[ 7.619935] do_syscall_64+0x91/0x180 <4>[ 7.619937] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.619941] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.619944] ? switch_fpu_return+0xe0/0x130 <4>[ 7.619947] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.619950] ? do_syscall_64+0x9d/0x180 <4>[ 7.619951] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.619955] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.619956] ? __seccomp_filter+0x379/0x580 <4>[ 7.619958] ? switch_fpu_return+0xe0/0x130 <4>[ 7.619961] ? ext4_llseek+0xc0/0x120 <4>[ 7.619964] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.619967] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.619970] ? do_syscall_64+0x9d/0x180 <4>[ 7.619972] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.619975] ? do_syscall_64+0x9d/0x180 <4>[ 7.619977] ? irqentry_exit+0x77/0xb0 <4>[ 7.619979] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.619982] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.619983] RIP: 0033:0x78cf6112725d <4>[ 7.619985] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.619985] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.619986] RAX: ffffffffffffffda RBX: 000057e1920f7c80 RCX: 000078cf6112725d <4>[ 7.619987] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000043 <4>[ 7.619988] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.619988] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.619989] R13: 0000000000020000 R14: 000057e1920f89f0 R15: 000057e1920f8d00 <4>[ 7.619997] <5>[ 7.619997] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.620010] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.620012] kmemleak: min_count = 0 <5>[ 7.620013] kmemleak: count = 0 <5>[ 7.620014] kmemleak: flags = 0x1 <5>[ 7.620015] kmemleak: checksum = 0 <5>[ 7.620016] kmemleak: backtrace: <4>[ 7.620017] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.620020] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.620022] execmem_vmalloc+0x5a/0xf0 <4>[ 7.620025] execmem_alloc+0xc2/0x150 <4>[ 7.620027] load_module+0x9db/0x2d10 <4>[ 7.620029] init_module_from_file+0x97/0xe0 <4>[ 7.620031] idempotent_init_module+0x134/0x350 <4>[ 7.620033] __x64_sys_finit_module+0x77/0x100 <4>[ 7.620034] x64_sys_call+0x24e3/0x2670 <4>[ 7.620036] do_syscall_64+0x91/0x180 <4>[ 7.620039] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.620041] kmemleak: Trying to color unknown object at 0xffffffffa0513000 as Grey <4>[ 7.620043] CPU: 3 UID: 0 PID: 373 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.620044] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.620045] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.620045] Call Trace: <4>[ 7.620046] <4>[ 7.620046] dump_stack_lvl+0xc1/0xf0 <4>[ 7.620048] dump_stack+0x10/0x20 <4>[ 7.620050] paint_ptr+0x8d/0xa0 <4>[ 7.620052] kmemleak_not_leak+0x33/0x70 <4>[ 7.620055] load_module+0xa20/0x2d10 <4>[ 7.620061] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.620065] ? kernel_read_file+0x2ac/0x330 <4>[ 7.620068] init_module_from_file+0x97/0xe0 <4>[ 7.620070] ? init_module_from_file+0x97/0xe0 <4>[ 7.620077] idempotent_init_module+0x134/0x350 <4>[ 7.620084] __x64_sys_finit_module+0x77/0x100 <4>[ 7.620087] x64_sys_call+0x24e3/0x2670 <4>[ 7.620089] do_syscall_64+0x91/0x180 <4>[ 7.620091] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.620095] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.620097] ? switch_fpu_return+0xe0/0x130 <4>[ 7.620099] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.620102] ? do_syscall_64+0x9d/0x180 <4>[ 7.620104] ? __rseq_handle_notify_resume+0x1d6/0x640 <4>[ 7.620107] ? restore_fpregs_from_fpstate+0x3d/0xd0 <4>[ 7.620108] ? __seccomp_filter+0x379/0x580 <4>[ 7.620110] ? switch_fpu_return+0xe0/0x130 <4>[ 7.620113] ? ext4_llseek+0xc0/0x120 <4>[ 7.620115] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.620118] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.620121] ? do_syscall_64+0x9d/0x180 <4>[ 7.620123] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.620126] ? do_syscall_64+0x9d/0x180 <4>[ 7.620127] ? irqentry_exit+0x77/0xb0 <4>[ 7.620129] ? sysvec_apic_timer_interrupt+0x57/0xc0 <4>[ 7.620132] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.620134] RIP: 0033:0x78cf6112725d <4>[ 7.620135] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.620135] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.620136] RAX: ffffffffffffffda RBX: 000057e1920f7c80 RCX: 000078cf6112725d <4>[ 7.620137] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000043 <4>[ 7.620138] RBP: 00007ffe24e238e0 R08: 0000000000000040 R09: 00007ffe24e23890 <4>[ 7.620138] R10: 000078cf61203b20 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.620139] R13: 0000000000020000 R14: 000057e1920f89f0 R15: 000057e1920f8d00 <4>[ 7.620145] <4>[ 7.625715] kmemleak: Found object by alias at 0xffffffffa05bf000 <4>[ 7.625720] CPU: 0 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.625723] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.625723] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.625724] Call Trace: <4>[ 7.625725] <4>[ 7.625726] dump_stack_lvl+0x91/0xf0 <4>[ 7.625731] dump_stack+0x10/0x20 <4>[ 7.625732] __lookup_object+0x90/0xa0 <4>[ 7.625737] __find_and_get_object+0x6c/0x190 <4>[ 7.625741] paint_ptr+0x1b/0xa0 <4>[ 7.625744] kmemleak_not_leak+0x33/0x70 <4>[ 7.625747] load_module+0xa20/0x2d10 <4>[ 7.625758] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.625763] ? kernel_read_file+0x2ac/0x330 <4>[ 7.625769] init_module_from_file+0x97/0xe0 <4>[ 7.625770] ? init_module_from_file+0x97/0xe0 <4>[ 7.625781] idempotent_init_module+0x134/0x350 <4>[ 7.625792] __x64_sys_finit_module+0x77/0x100 <4>[ 7.625795] x64_sys_call+0x24e3/0x2670 <4>[ 7.625798] do_syscall_64+0x91/0x180 <4>[ 7.625801] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.625805] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.625809] ? do_syscall_64+0x9d/0x180 <4>[ 7.625810] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.625817] ? putname+0x60/0x80 <4>[ 7.625819] ? do_sys_openat2+0xab/0xf0 <4>[ 7.625825] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.625828] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.625832] ? do_syscall_64+0x9d/0x180 <4>[ 7.625836] ? putname+0x60/0x80 <4>[ 7.625838] ? do_sys_openat2+0xab/0xf0 <4>[ 7.625843] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.625846] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.625850] ? do_syscall_64+0x9d/0x180 <4>[ 7.625853] ? putname+0x60/0x80 <4>[ 7.625855] ? do_sys_openat2+0xab/0xf0 <4>[ 7.625860] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.625863] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.625867] ? do_syscall_64+0x9d/0x180 <4>[ 7.625869] ? irqentry_exit+0x77/0xb0 <4>[ 7.625871] ? exc_page_fault+0xb1/0x300 <4>[ 7.625875] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.625878] RIP: 0033:0x78cf6112725d <4>[ 7.625880] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.625881] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.625883] RAX: ffffffffffffffda RBX: 000057e1920dcf90 RCX: 000078cf6112725d <4>[ 7.625884] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 7.625885] RBP: 00007ffe24e238e0 R08: 0000000000000007 R09: 00007ffe24e23870 <4>[ 7.625886] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.625887] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920da550 <4>[ 7.625897] <5>[ 7.625897] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.625915] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.625917] kmemleak: min_count = 0 <5>[ 7.625919] kmemleak: count = 0 <5>[ 7.625920] kmemleak: flags = 0x1 <5>[ 7.625921] kmemleak: checksum = 0 <5>[ 7.625922] kmemleak: backtrace: <4>[ 7.625924] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.625926] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.625930] execmem_vmalloc+0x5a/0xf0 <4>[ 7.625932] execmem_alloc+0xc2/0x150 <4>[ 7.625935] load_module+0x9db/0x2d10 <4>[ 7.625937] init_module_from_file+0x97/0xe0 <4>[ 7.625939] idempotent_init_module+0x134/0x350 <4>[ 7.625941] __x64_sys_finit_module+0x77/0x100 <4>[ 7.625943] x64_sys_call+0x24e3/0x2670 <4>[ 7.625946] do_syscall_64+0x91/0x180 <4>[ 7.625948] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.625951] kmemleak: Trying to color unknown object at 0xffffffffa05bf000 as Grey <4>[ 7.625955] CPU: 0 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.625957] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.625958] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.625959] Call Trace: <4>[ 7.625959] <4>[ 7.625960] dump_stack_lvl+0xc1/0xf0 <4>[ 7.625964] dump_stack+0x10/0x20 <4>[ 7.625966] paint_ptr+0x8d/0xa0 <4>[ 7.625970] kmemleak_not_leak+0x33/0x70 <4>[ 7.625973] load_module+0xa20/0x2d10 <4>[ 7.625987] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.625992] ? kernel_read_file+0x2ac/0x330 <4>[ 7.625999] init_module_from_file+0x97/0xe0 <4>[ 7.626001] ? init_module_from_file+0x97/0xe0 <4>[ 7.626015] idempotent_init_module+0x134/0x350 <4>[ 7.626030] __x64_sys_finit_module+0x77/0x100 <4>[ 7.626035] x64_sys_call+0x24e3/0x2670 <4>[ 7.626038] do_syscall_64+0x91/0x180 <4>[ 7.626040] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626045] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626050] ? do_syscall_64+0x9d/0x180 <4>[ 7.626052] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.626059] ? putname+0x60/0x80 <4>[ 7.626063] ? do_sys_openat2+0xab/0xf0 <4>[ 7.626069] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626074] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626079] ? do_syscall_64+0x9d/0x180 <4>[ 7.626085] ? putname+0x60/0x80 <4>[ 7.626088] ? do_sys_openat2+0xab/0xf0 <4>[ 7.626094] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626099] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626103] ? do_syscall_64+0x9d/0x180 <4>[ 7.626107] ? putname+0x60/0x80 <4>[ 7.626110] ? do_sys_openat2+0xab/0xf0 <4>[ 7.626117] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626121] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626126] ? do_syscall_64+0x9d/0x180 <4>[ 7.626128] ? irqentry_exit+0x77/0xb0 <4>[ 7.626131] ? exc_page_fault+0xb1/0x300 <4>[ 7.626136] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.626139] RIP: 0033:0x78cf6112725d <4>[ 7.626141] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.626143] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.626145] RAX: ffffffffffffffda RBX: 000057e1920dcf90 RCX: 000078cf6112725d <4>[ 7.626146] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 7.626147] RBP: 00007ffe24e238e0 R08: 0000000000000007 R09: 00007ffe24e23870 <4>[ 7.626148] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.626149] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920da550 <4>[ 7.626163] <4>[ 7.626278] kmemleak: Found object by alias at 0xffffffffa05c5000 <4>[ 7.626305] CPU: 0 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.626308] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.626308] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.626309] Call Trace: <4>[ 7.626310] <4>[ 7.626311] dump_stack_lvl+0x91/0xf0 <4>[ 7.626315] dump_stack+0x10/0x20 <4>[ 7.626317] __lookup_object+0x90/0xa0 <4>[ 7.626321] __find_and_get_object+0x6c/0x190 <4>[ 7.626326] paint_ptr+0x1b/0xa0 <4>[ 7.626330] kmemleak_not_leak+0x33/0x70 <4>[ 7.626333] load_module+0xa20/0x2d10 <4>[ 7.626343] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.626348] ? kernel_read_file+0x2ac/0x330 <4>[ 7.626353] init_module_from_file+0x97/0xe0 <4>[ 7.626354] ? init_module_from_file+0x97/0xe0 <4>[ 7.626365] idempotent_init_module+0x134/0x350 <4>[ 7.626376] __x64_sys_finit_module+0x77/0x100 <4>[ 7.626379] x64_sys_call+0x24e3/0x2670 <4>[ 7.626382] do_syscall_64+0x91/0x180 <4>[ 7.626384] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626387] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626391] ? do_syscall_64+0x9d/0x180 <4>[ 7.626393] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.626399] ? putname+0x60/0x80 <4>[ 7.626401] ? do_sys_openat2+0xab/0xf0 <4>[ 7.626406] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626409] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626413] ? do_syscall_64+0x9d/0x180 <4>[ 7.626417] ? putname+0x60/0x80 <4>[ 7.626419] ? do_sys_openat2+0xab/0xf0 <4>[ 7.626424] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626427] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626431] ? do_syscall_64+0x9d/0x180 <4>[ 7.626434] ? putname+0x60/0x80 <4>[ 7.626436] ? do_sys_openat2+0xab/0xf0 <4>[ 7.626441] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626444] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626448] ? do_syscall_64+0x9d/0x180 <4>[ 7.626449] ? irqentry_exit+0x77/0xb0 <4>[ 7.626452] ? exc_page_fault+0xb1/0x300 <4>[ 7.626456] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.626458] RIP: 0033:0x78cf6112725d <4>[ 7.626459] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.626461] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.626462] RAX: ffffffffffffffda RBX: 000057e1920dcf90 RCX: 000078cf6112725d <4>[ 7.626463] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 7.626463] RBP: 00007ffe24e238e0 R08: 0000000000000007 R09: 00007ffe24e23870 <4>[ 7.626464] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.626465] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920da550 <4>[ 7.626475] <5>[ 7.626475] kmemleak: Object 0xffffffffa0400000 (size 2097152): <5>[ 7.626493] kmemleak: comm "systemd", pid 1, jiffies 4294671581 <5>[ 7.626495] kmemleak: min_count = 0 <5>[ 7.626496] kmemleak: count = 0 <5>[ 7.626498] kmemleak: flags = 0x1 <5>[ 7.626499] kmemleak: checksum = 0 <5>[ 7.626500] kmemleak: backtrace: <4>[ 7.626501] kmemleak_vmalloc+0x7c/0xf0 <4>[ 7.626504] __vmalloc_node_range_noprof+0x6b6/0x790 <4>[ 7.626507] execmem_vmalloc+0x5a/0xf0 <4>[ 7.626510] execmem_alloc+0xc2/0x150 <4>[ 7.626512] load_module+0x9db/0x2d10 <4>[ 7.626514] init_module_from_file+0x97/0xe0 <4>[ 7.626516] idempotent_init_module+0x134/0x350 <4>[ 7.626518] __x64_sys_finit_module+0x77/0x100 <4>[ 7.626520] x64_sys_call+0x24e3/0x2670 <4>[ 7.626523] do_syscall_64+0x91/0x180 <4>[ 7.626525] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.626528] kmemleak: Trying to color unknown object at 0xffffffffa05c5000 as Grey <4>[ 7.626531] CPU: 0 UID: 0 PID: 334 Comm: (udev-worker) Tainted: G I 6.14.0-rc2-next-20250210-next-20250210-gdf5d6180169a+ #1 <4>[ 7.626533] Tainted: [I]=FIRMWARE_WORKAROUND <4>[ 7.626534] Hardware name: Intel Corporation S1200SP/S1200SP, BIOS S1200SP.86B.03.01.0026.092720170729 09/27/2017 <4>[ 7.626535] Call Trace: <4>[ 7.626535] <4>[ 7.626536] dump_stack_lvl+0xc1/0xf0 <4>[ 7.626540] dump_stack+0x10/0x20 <4>[ 7.626542] paint_ptr+0x8d/0xa0 <4>[ 7.626546] kmemleak_not_leak+0x33/0x70 <4>[ 7.626549] load_module+0xa20/0x2d10 <4>[ 7.626563] ? security_kernel_post_read_file+0xab/0x1a0 <4>[ 7.626568] ? kernel_read_file+0x2ac/0x330 <4>[ 7.626574] init_module_from_file+0x97/0xe0 <4>[ 7.626576] ? init_module_from_file+0x97/0xe0 <4>[ 7.626591] idempotent_init_module+0x134/0x350 <4>[ 7.626606] __x64_sys_finit_module+0x77/0x100 <4>[ 7.626611] x64_sys_call+0x24e3/0x2670 <4>[ 7.626614] do_syscall_64+0x91/0x180 <4>[ 7.626617] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626621] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626625] ? do_syscall_64+0x9d/0x180 <4>[ 7.626628] ? kmem_cache_free+0x3a4/0x4b0 <4>[ 7.626635] ? putname+0x60/0x80 <4>[ 7.626638] ? do_sys_openat2+0xab/0xf0 <4>[ 7.626645] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626650] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626654] ? do_syscall_64+0x9d/0x180 <4>[ 7.626660] ? putname+0x60/0x80 <4>[ 7.626663] ? do_sys_openat2+0xab/0xf0 <4>[ 7.626669] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626674] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626678] ? do_syscall_64+0x9d/0x180 <4>[ 7.626682] ? putname+0x60/0x80 <4>[ 7.626685] ? do_sys_openat2+0xab/0xf0 <4>[ 7.626691] ? trace_hardirqs_off+0x5d/0xe0 <4>[ 7.626696] ? syscall_exit_to_user_mode+0x95/0x260 <4>[ 7.626701] ? do_syscall_64+0x9d/0x180 <4>[ 7.626703] ? irqentry_exit+0x77/0xb0 <4>[ 7.626706] ? exc_page_fault+0xb1/0x300 <4>[ 7.626711] entry_SYSCALL_64_after_hwframe+0x76/0x7e <4>[ 7.626714] RIP: 0033:0x78cf6112725d <4>[ 7.626716] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8b bb 0d 00 f7 d8 64 89 01 48 <4>[ 7.626717] RSP: 002b:00007ffe24e23828 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 <4>[ 7.626719] RAX: ffffffffffffffda RBX: 000057e1920dcf90 RCX: 000078cf6112725d <4>[ 7.626720] RDX: 0000000000000000 RSI: 000078cf6137907d RDI: 0000000000000025 <4>[ 7.626721] RBP: 00007ffe24e238e0 R08: 0000000000000007 R09: 00007ffe24e23870 <4>[ 7.626723] R10: 000057e191fc8010 R11: 0000000000000246 R12: 000078cf6137907d <4>[ 7.626724] R13: 0000000000020000 R14: 000057e1920c7410 R15: 000057e1920da550 <4>[ 7.626737] <6>[ 7.628717] intel_rapl_common: Found RAPL domain package <6>[ 7.628729] intel_rapl_common: Found RAPL domain core <6>[ 7.628732] intel_rapl_common: Found RAPL domain uncore <6>[ 7.628735] intel_rapl_common: Found RAPL domain dram <6>[ 7.755481] power_meter ACPI000D:00: Found ACPI power meter. <4>[ 7.756265] power_meter ACPI000D:00: Ignoring unsafe software power cap! <6>[ 8.472385] loop0: detected capacity change from 0 to 8 <6>[ 10.529469] igb 0000:02:00.0 eno1: igb: eno1 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX <7>[ 15.116130] systemd-journald[219]: /var/log/journal/87673222d5fd49d697c113f49f6b17fd/user-1000.journal: Journal file uses a different sequence number ID, rotating.