Warning: Permanently added '10.128.10.12' (ED25519) to the list of known hosts. 2025/10/24 06:13:16 parsed 1 programs [ 65.756669][ T3343] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 69.427727][ T3379] veth0_vlan: entered promiscuous mode [ 70.126267][ T3379] syz-executor (3379) used greatest stack depth: 20968 bytes left [ 70.172460][ T973] veth0_vlan: left promiscuous mode 2025/10/24 06:13:22 executed programs: 0 [ 73.087107][ T3634] veth0_vlan: entered promiscuous mode [ 73.752339][ T3863] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 73.774701][ T3863] FAULT_INJECTION: forcing a failure. [ 73.774701][ T3863] name failslab, interval 1, probability 0, space 0, times 1 [ 73.787568][ T3863] CPU: 0 UID: 0 PID: 3863 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT(none) [ 73.787575][ T3863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 73.787583][ T3863] Call Trace: [ 73.787587][ T3863] [ 73.787589][ T3863] dump_stack_lvl+0xf4/0x170 [ 73.787602][ T3863] ? __pfx_dump_stack_lvl+0x10/0x10 [ 73.787608][ T3863] ? __pfx__printk+0x10/0x10 [ 73.787616][ T3863] should_fail_ex+0x40a/0x540 [ 73.787623][ T3863] should_failslab+0xa8/0x100 [ 73.787627][ T3863] __kmalloc_cache_node_noprof+0x62/0x410 [ 73.787632][ T3863] ? __get_vm_area_node+0xde/0x230 [ 73.787637][ T3863] __get_vm_area_node+0xde/0x230 [ 73.787642][ T3863] __vmalloc_node_range_noprof+0x280/0xf50 [ 73.787646][ T3863] ? kvm_arch_prepare_memory_region+0x214/0xd20 [ 73.787651][ T3863] ? rcu_is_watching+0x1f/0xa0 [ 73.787658][ T3863] ? xas_store+0x40a/0x12a0 [ 73.787666][ T3863] ? __pfx___mutex_lock+0x10/0x10 [ 73.787672][ T3863] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 73.787676][ T3863] ? xa_store_range+0x2d3/0x470 [ 73.787682][ T3863] ? kvm_arch_prepare_memory_region+0x214/0xd20 [ 73.787686][ T3863] __vmalloc_noprof+0xb9/0xd0 [ 73.787691][ T3863] ? kvm_arch_prepare_memory_region+0x214/0xd20 [ 73.787696][ T3863] kvm_arch_prepare_memory_region+0x214/0xd20 [ 73.787699][ T3863] ? fput+0x56/0x90 [ 73.787703][ T3863] ? kvm_gmem_bind+0x36a/0x3c0 [ 73.787709][ T3863] kvm_set_memslot+0x501/0xcf0 [ 73.787715][ T3863] ? kvm_set_memory_region+0x54f/0x9c0 [ 73.787721][ T3863] kvm_set_memory_region+0x723/0x9c0 [ 73.787727][ T3863] kvm_vm_ioctl_set_memory_region+0x51/0xa0 [ 73.787732][ T3863] kvm_vm_ioctl+0x302/0x900 [ 73.787737][ T3863] ? __pfx_kvm_vm_ioctl+0x10/0x10 [ 73.787747][ T3863] ? tomoyo_path_number_perm+0x176/0x420 [ 73.787752][ T3863] ? tomoyo_path_number_perm+0x390/0x420 [ 73.787754][ T3863] ? tomoyo_path_number_perm+0x176/0x420 [ 73.787758][ T3863] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 73.787765][ T3863] ? __mutex_unlock_slowpath+0x19b/0x590 [ 73.787773][ T3863] ? __fget_files+0x2e/0x2a0 [ 73.787779][ T3863] ? __fget_files+0x23d/0x2a0 [ 73.787783][ T3863] ? __fget_files+0x2e/0x2a0 [ 73.787788][ T3863] __se_sys_ioctl+0xae/0x100 [ 73.787793][ T3863] do_syscall_64+0x8f/0xfa0 [ 73.787798][ T3863] ? clear_bhb_loop+0x60/0xb0 [ 73.787803][ T3863] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.787807][ T3863] RIP: 0033:0x7fb383f9efc9 [ 73.787815][ T3863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.787822][ T3863] RSP: 002b:00007fb383e07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 73.787830][ T3863] RAX: ffffffffffffffda RBX: 00007fb3841f5fa0 RCX: 00007fb383f9efc9 [ 73.787833][ T3863] RDX: 0000200000000180 RSI: 0000000040a0ae49 RDI: 0000000000000004 [ 73.787836][ T3863] RBP: 00007fb383e07090 R08: 0000000000000000 R09: 0000000000000000 [ 73.787838][ T3863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.787841][ T3863] R13: 00007fb3841f6038 R14: 00007fb3841f5fa0 R15: 00007fff69fbf668 [ 73.787846][ T3863] [ 73.787908][ T3863] syz.2.17: vmalloc error: size 4, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 74.105763][ T3863] CPU: 0 UID: 0 PID: 3863 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT(none) [ 74.105772][ T3863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 74.105777][ T3863] Call Trace: [ 74.105781][ T3863] [ 74.105783][ T3863] dump_stack_lvl+0xf4/0x170 [ 74.105796][ T3863] ? __pfx_dump_stack_lvl+0x10/0x10 [ 74.105803][ T3863] ? __pfx__printk+0x10/0x10 [ 74.105811][ T3863] ? cpuset_print_current_mems_allowed+0x23/0x110 [ 74.105820][ T3863] warn_alloc+0x214/0x310 [ 74.105830][ T3863] ? __pfx_warn_alloc+0x10/0x10 [ 74.105836][ T3863] ? __get_vm_area_node+0xde/0x230 [ 74.105850][ T3863] ? __get_vm_area_node+0xde/0x230 [ 74.105857][ T3863] __vmalloc_node_range_noprof+0x2a5/0xf50 [ 74.105864][ T3863] ? rcu_is_watching+0x1f/0xa0 [ 74.105874][ T3863] ? xas_store+0x40a/0x12a0 [ 74.105885][ T3863] ? __pfx___mutex_lock+0x10/0x10 [ 74.105895][ T3863] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 74.105900][ T3863] ? xa_store_range+0x2d3/0x470 [ 74.105908][ T3863] ? kvm_arch_prepare_memory_region+0x214/0xd20 [ 74.105915][ T3863] __vmalloc_noprof+0xb9/0xd0 [ 74.105921][ T3863] ? kvm_arch_prepare_memory_region+0x214/0xd20 [ 74.105927][ T3863] kvm_arch_prepare_memory_region+0x214/0xd20 [ 74.105934][ T3863] ? fput+0x56/0x90 [ 74.105940][ T3863] ? kvm_gmem_bind+0x36a/0x3c0 [ 74.105952][ T3863] kvm_set_memslot+0x501/0xcf0 [ 74.105961][ T3863] ? kvm_set_memory_region+0x54f/0x9c0 [ 74.105971][ T3863] kvm_set_memory_region+0x723/0x9c0 [ 74.105983][ T3863] kvm_vm_ioctl_set_memory_region+0x51/0xa0 [ 74.105992][ T3863] kvm_vm_ioctl+0x302/0x900 [ 74.106000][ T3863] ? __pfx_kvm_vm_ioctl+0x10/0x10 [ 74.106016][ T3863] ? tomoyo_path_number_perm+0x176/0x420 [ 74.106024][ T3863] ? tomoyo_path_number_perm+0x390/0x420 [ 74.106030][ T3863] ? tomoyo_path_number_perm+0x176/0x420 [ 74.106035][ T3863] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 74.106048][ T3863] ? __mutex_unlock_slowpath+0x19b/0x590 [ 74.106062][ T3863] ? __fget_files+0x2e/0x2a0 [ 74.106071][ T3863] ? __fget_files+0x23d/0x2a0 [ 74.106077][ T3863] ? __fget_files+0x2e/0x2a0 [ 74.106086][ T3863] __se_sys_ioctl+0xae/0x100 [ 74.106094][ T3863] do_syscall_64+0x8f/0xfa0 [ 74.106102][ T3863] ? clear_bhb_loop+0x60/0xb0 [ 74.106109][ T3863] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.106115][ T3863] RIP: 0033:0x7fb383f9efc9 [ 74.106122][ T3863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.106128][ T3863] RSP: 002b:00007fb383e07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 74.106136][ T3863] RAX: ffffffffffffffda RBX: 00007fb3841f5fa0 RCX: 00007fb383f9efc9 [ 74.106140][ T3863] RDX: 0000200000000180 RSI: 0000000040a0ae49 RDI: 0000000000000004 [ 74.106145][ T3863] RBP: 00007fb383e07090 R08: 0000000000000000 R09: 0000000000000000 [ 74.106149][ T3863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.106153][ T3863] R13: 00007fb3841f6038 R14: 00007fb3841f5fa0 R15: 00007fff69fbf668 [ 74.106162][ T3863] [ 74.106176][ T3863] Mem-Info: [ 74.405173][ T3863] active_anon:28150 inactive_anon:0 isolated_anon:0 [ 74.405173][ T3863] active_file:5471 inactive_file:14134 isolated_file:0 [ 74.405173][ T3863] unevictable:0 dirty:810 writeback:0 [ 74.405173][ T3863] slab_reclaimable:5800 slab_unreclaimable:69426 [ 74.405173][ T3863] mapped:9932 shmem:407 pagetables:591 [ 74.405173][ T3863] sec_pagetables:0 bounce:0 [ 74.405173][ T3863] kernel_misc_reclaimable:0 [ 74.405173][ T3863] free:1506094 free_pcp:9455 free_cma:0 [ 74.449963][ T3863] Node 0 active_anon:112600kB inactive_anon:0kB active_file:21884kB inactive_file:56536kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:39728kB dirty:3240kB writeback:0kB shmem:1628kB kernel_stack:6164kB pagetables:2364kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 74.477243][ T3863] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 74.505745][ T3863] lowmem_reserve[]: 0 2823 6737 6737 [ 74.511014][ T3863] Node 0 DMA32 free:2888500kB boost:0kB min:4384kB low:7264kB high:10144kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2891728kB mlocked:0kB bounce:0kB free_pcp:3228kB local_pcp:60kB free_cma:0kB [ 74.541262][ T3863] lowmem_reserve[]: 0 0 3913 3913 [ 74.546313][ T3863] Node 0 Normal free:3120516kB boost:0kB min:6096kB low:10100kB high:14104kB reserved_highatomic:0KB free_highatomic:0KB active_anon:112576kB inactive_anon:0kB active_file:21884kB inactive_file:56540kB unevictable:0kB writepending:3240kB present:5242880kB managed:4007780kB mlocked:0kB bounce:0kB free_pcp:34584kB local_pcp:22280kB free_cma:0kB [ 74.578375][ T3863] lowmem_reserve[]: 0 0 0 0 [ 74.582871][ T3863] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 74.595474][ T3863] Node 0 DMA32: 3*4kB (M) 1*8kB (M) 4*16kB (M) 1*32kB (M) 3*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (M) 3*2048kB (M) 702*4096kB (M) = 2888500kB [ 74.611377][ T3863] Node 0 Normal: 1074*4kB (UME) 414*8kB (UM) 122*16kB (UE) 167*32kB (UE) 132*64kB (UME) 33*128kB (UM) 2*256kB (UM) 0*512kB 0*1024kB 2*2048kB (UM) 754*4096kB (M) = 3120568kB [ 74.628748][ T3863] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 74.638307][ T3863] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 74.647589][ T3863] 20008 total pagecache pages [ 74.652239][ T3863] 0 pages in swap cache [ 74.656395][ T3863] Free swap = 124996kB [ 74.660528][ T3863] Total swap = 124996kB [ 74.664679][ T3863] 2097051 pages RAM [ 74.668463][ T3863] 0 pages HighMem/MovableOnly [ 74.673191][ T3863] 368334 pages reserved [ 74.677385][ T3863] 0 pages cma reserved [ 74.681513][ T3862] ================================================================== [ 74.689560][ T3862] BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x179/0x350 [ 74.697333][ T3862] Write of size 8 at addr ffff88811e95cd08 by task syz.2.17/3862 [ 74.705013][ T3862] [ 74.707313][ T3862] CPU: 1 UID: 0 PID: 3862 Comm: syz.2.17 Not tainted syzkaller #0 PREEMPT(none) [ 74.707318][ T3862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 74.707322][ T3862] Call Trace: [ 74.707325][ T3862] [ 74.707327][ T3862] dump_stack_lvl+0xf4/0x170 [ 74.707336][ T3862] ? __pfx_dump_stack_lvl+0x10/0x10 [ 74.707341][ T3862] ? rcu_is_watching+0x1f/0xa0 [ 74.707347][ T3862] ? __virt_addr_valid+0x176/0x2b0 [ 74.707351][ T3862] ? lock_release+0x42/0x2f0 [ 74.707356][ T3862] ? lock_acquire+0x69/0x210 [ 74.707361][ T3862] ? __virt_addr_valid+0x176/0x2b0 [ 74.707364][ T3862] ? __virt_addr_valid+0x262/0x2b0 [ 74.707367][ T3862] print_report+0xca/0x240 [ 74.707373][ T3862] ? kvm_gmem_release+0x179/0x350 [ 74.707377][ T3862] kasan_report+0x118/0x150 [ 74.707381][ T3862] ? kvm_gmem_release+0x179/0x350 [ 74.707386][ T3862] kvm_gmem_release+0x179/0x350 [ 74.707390][ T3862] ? __pfx_kvm_gmem_release+0x10/0x10 [ 74.707395][ T3862] ? __pfx_call_rcu+0x10/0x10 [ 74.707400][ T3862] __fput+0x30b/0x7a0 [ 74.707404][ T3862] ? task_work_run+0x149/0x1e0 [ 74.707409][ T3862] task_work_run+0x149/0x1e0 [ 74.707413][ T3862] ? __pfx_task_work_run+0x10/0x10 [ 74.707417][ T3862] ? switch_fpu_return+0xe6/0x180 [ 74.707423][ T3862] exit_to_user_mode_loop+0xbf/0xd0 [ 74.707428][ T3862] do_syscall_64+0x181/0xfa0 [ 74.707433][ T3862] ? clear_bhb_loop+0x60/0xb0 [ 74.707438][ T3862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.707442][ T3862] RIP: 0033:0x7fb383f9efc9 [ 74.707447][ T3862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.707450][ T3862] RSP: 002b:00007fff69fbf7c8 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 74.707456][ T3862] RAX: 0000000000000000 RBX: 00007fb3841f7da0 RCX: 00007fb383f9efc9 [ 74.707458][ T3862] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 74.707461][ T3862] RBP: 00007fb3841f7da0 R08: 0000000000000000 R09: 0000000469fbfabf [ 74.707463][ T3862] R10: 00007fb3841f7cb0 R11: 0000000000000246 R12: 000000000001233f [ 74.707466][ T3862] R13: 00007fff69fbf8c0 R14: ffffffffffffffff R15: 00007fff69fbf8e0 [ 74.707470][ T3862] [ 74.707472][ T3862] [ 74.925991][ T3862] Allocated by task 3863: [ 74.930294][ T3862] kasan_save_track+0x3e/0x80 [ 74.934939][ T3862] __kasan_kmalloc+0x93/0xb0 [ 74.939491][ T3862] __kmalloc_cache_noprof+0x220/0x410 [ 74.944831][ T3862] kvm_set_memory_region+0x54f/0x9c0 [ 74.950079][ T3862] kvm_vm_ioctl_set_memory_region+0x51/0xa0 [ 74.955952][ T3862] kvm_vm_ioctl+0x302/0x900 [ 74.960443][ T3862] __se_sys_ioctl+0xae/0x100 [ 74.965097][ T3862] do_syscall_64+0x8f/0xfa0 [ 74.969575][ T3862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.975453][ T3862] [ 74.977748][ T3862] Freed by task 3863: [ 74.981691][ T3862] kasan_save_track+0x3e/0x80 [ 74.986336][ T3862] kasan_save_free_info+0x46/0x50 [ 74.991324][ T3862] __kasan_slab_free+0x5b/0x80 [ 74.996052][ T3862] kfree+0x174/0x3e0 [ 74.999920][ T3862] kvm_set_memory_region+0x754/0x9c0 [ 75.005170][ T3862] kvm_vm_ioctl_set_memory_region+0x51/0xa0 [ 75.011025][ T3862] kvm_vm_ioctl+0x302/0x900 [ 75.015492][ T3862] __se_sys_ioctl+0xae/0x100 [ 75.020044][ T3862] do_syscall_64+0x8f/0xfa0 [ 75.024513][ T3862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.030380][ T3862] [ 75.032688][ T3862] The buggy address belongs to the object at ffff88811e95cc00 [ 75.032688][ T3862] which belongs to the cache kmalloc-cg-512 of size 512 [ 75.046970][ T3862] The buggy address is located 264 bytes inside of [ 75.046970][ T3862] freed 512-byte region [ffff88811e95cc00, ffff88811e95ce00) [ 75.060814][ T3862] [ 75.063108][ T3862] The buggy address belongs to the physical page: [ 75.069485][ T3862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11e95c [ 75.078297][ T3862] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 75.086850][ T3862] memcg:ffff88811b08a901 [ 75.091055][ T3862] flags: 0x200000000000040(head|node=0|zone=2) [ 75.097171][ T3862] page_type: f5(slab) [ 75.101116][ T3862] raw: 0200000000000040 ffff88810004b140 dead000000000100 dead000000000122 [ 75.109663][ T3862] raw: 0000000000000000 0000000080100010 00000000f5000000 ffff88811b08a901 [ 75.118208][ T3862] head: 0200000000000040 ffff88810004b140 dead000000000100 dead000000000122 [ 75.126857][ T3862] head: 0000000000000000 0000000080100010 00000000f5000000 ffff88811b08a901 [ 75.135491][ T3862] head: 0200000000000002 ffffea00047a5701 00000000ffffffff 00000000ffffffff [ 75.144123][ T3862] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000004 [ 75.152752][ T3862] page dumped because: kasan: bad access detected [ 75.159140][ T3862] page_owner tracks the page as allocated [ 75.164831][ T3862] page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 2747, tgid 2747 (dhcpcd-run-hook), ts 22234772235, free_ts 13339315646 [ 75.186429][ T3862] post_alloc_hook+0x168/0x1a0 [ 75.191162][ T3862] get_page_from_freelist+0x290d/0x29e0 [ 75.196673][ T3862] __alloc_frozen_pages_noprof+0x26b/0x460 [ 75.202444][ T3862] alloc_pages_mpol+0xcb/0x270 [ 75.207173][ T3862] allocate_slab+0x8a/0x320 [ 75.211643][ T3862] ___slab_alloc+0x9c6/0x10a0 [ 75.216281][ T3862] __kmalloc_cache_noprof+0x27c/0x410 [ 75.221613][ T3862] alloc_pipe_info+0xc9/0x3f0 [ 75.226257][ T3862] create_pipe_files+0x88/0x730 [ 75.231069][ T3862] __do_pipe_flags+0x2c/0x1c0 [ 75.235716][ T3862] do_pipe2+0xa1/0x150 [ 75.239754][ T3862] __x64_sys_pipe2+0x55/0x70 [ 75.244329][ T3862] do_syscall_64+0x8f/0xfa0 [ 75.248816][ T3862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.254700][ T3862] page last free pid 2440 tgid 2440 stack trace: [ 75.260992][ T3862] __free_frozen_pages+0xa32/0xba0 [ 75.266075][ T3862] __slab_free+0x2c4/0x370 [ 75.270544][ T3862] qlist_free_all+0x97/0x140 [ 75.275098][ T3862] kasan_quarantine_reduce+0x148/0x160 [ 75.280519][ T3862] __kasan_slab_alloc+0x22/0x80 [ 75.285333][ T3862] __kmalloc_cache_noprof+0x1ad/0x410 [ 75.290669][ T3862] kernfs_fop_open+0x349/0xab0 [ 75.295399][ T3862] do_dentry_open+0x731/0x1060 [ 75.300130][ T3862] vfs_open+0x36/0x2b0 [ 75.304166][ T3862] path_openat+0x23e3/0x2bb0 [ 75.308720][ T3862] do_filp_open+0x1e4/0x3c0 [ 75.313184][ T3862] do_sys_openat2+0xfa/0x180 [ 75.317734][ T3862] __x64_sys_openat+0xf3/0x120 [ 75.322455][ T3862] do_syscall_64+0x8f/0xfa0 [ 75.326923][ T3862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.332781][ T3862] [ 75.335071][ T3862] Memory state around the buggy address: [ 75.340669][ T3862] ffff88811e95cc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.348693][ T3862] ffff88811e95cc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.356717][ T3862] >ffff88811e95cd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.364739][ T3862] ^ [ 75.369031][ T3862] ffff88811e95cd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.377056][ T3862] ffff88811e95ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.385078][ T3862] ================================================================== [ 75.393684][ T3862] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 75.401116][ T3862] Kernel Offset: disabled [ 75.405414][ T3862] Rebooting in 86400 seconds..