./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor176920812 <...> syzkaller syzkaller login: [ 23.817208][ T28] kauditd_printk_skb: 47 callbacks suppressed [ 23.817224][ T28] audit: type=1400 audit(1752514556.779:59): avc: denied { transition } for pid=267 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.823078][ T28] audit: type=1400 audit(1752514556.779:60): avc: denied { noatsecure } for pid=267 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.826768][ T28] audit: type=1400 audit(1752514556.779:61): avc: denied { write } for pid=267 comm="sh" path="pipe:[13856]" dev="pipefs" ino=13856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 23.833080][ T28] audit: type=1400 audit(1752514556.779:62): avc: denied { rlimitinh } for pid=267 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 23.839189][ T28] audit: type=1400 audit(1752514556.779:63): avc: denied { siginh } for pid=267 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.10.22' (ED25519) to the list of known hosts. execve("./syz-executor176920812", ["./syz-executor176920812"], 0x7ffe9674fd60 /* 10 vars */) = 0 brk(NULL) = 0x555582262000 brk(0x555582262d00) = 0x555582262d00 arch_prctl(ARCH_SET_FS, 0x555582262380) = 0 set_tid_address(0x555582262650) = 291 set_robust_list(0x555582262660, 24) = 0 rseq(0x555582262ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor176920812", 4096) = 27 getrandom("\xa6\x8b\x29\x1d\xd5\xfd\x77\x1e", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555582262d00 brk(0x555582283d00) = 0x555582283d00 brk(0x555582284000) = 0x555582284000 mprotect(0x7fa47dab0000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555582262650) = 292 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555582262650) = 293 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555582262650) = 294 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555582262650) = 295 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555582262650) = 296 ./strace-static-x86_64: Process 296 attached [pid 296] set_robust_list(0x555582262660, 24) = 0 [pid 296] mkdir("./syzkaller.DviEe0", 0700) = 0 [pid 296] chmod("./syzkaller.DviEe0", 0777) = 0 [pid 296] chdir("./syzkaller.DviEe0") = 0 [pid 296] mkdir("./0", 0777) = 0 [pid 296] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555582262650) = 297 ./strace-static-x86_64: Process 297 attached [pid 297] set_robust_list(0x555582262660, 24) = 0 [pid 297] chdir("./0") = 0 [pid 297] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 297] setpgid(0, 0) = 0 [pid 297] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 297] write(3, "1000", 4) = 4 [pid 297] close(3) = 0 [pid 297] symlink("/dev/binderfs", "./binderfs") = 0 [pid 297] write(1, "executing program\n", 18./strace-static-x86_64: Process 295 attached ./strace-static-x86_64: Process 294 attached ./strace-static-x86_64: Process 293 attached ./strace-static-x86_64: Process 292 attached executing program ) = 18 [pid 297] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=65537, max_entries=8, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80 [pid 295] set_robust_list(0x555582262660, 24 [pid 294] set_robust_list(0x555582262660, 24 [pid 293] set_robust_list(0x555582262660, 24 [pid 292] set_robust_list(0x555582262660, 24) = 0 [pid 293] <... set_robust_list resumed>) = 0 [pid 295] <... set_robust_list resumed>) = 0 [pid 294] <... set_robust_list resumed>) = 0 [pid 293] mkdir("./syzkaller.eF3ycU", 0700 [pid 295] mkdir("./syzkaller.XCmzbR", 0700 [pid 294] mkdir("./syzkaller.02LHtP", 0700 [pid 293] <... mkdir resumed>) = 0 [pid 292] mkdir("./syzkaller.0bUj19", 0700 [pid 295] <... mkdir resumed>) = 0 [pid 294] <... mkdir resumed>) = 0 [pid 293] chmod("./syzkaller.eF3ycU", 0777 [pid 292] <... mkdir resumed>) = 0 [pid 295] chmod("./syzkaller.XCmzbR", 0777 [pid 294] chmod("./syzkaller.02LHtP", 0777 [pid 293] <... chmod resumed>) = 0 [pid 292] chmod("./syzkaller.0bUj19", 0777 [pid 295] <... chmod resumed>) = 0 [pid 294] <... chmod resumed>) = 0 [pid 293] chdir("./syzkaller.eF3ycU" [pid 292] <... chmod resumed>) = 0 [pid 295] chdir("./syzkaller.XCmzbR" [pid 294] chdir("./syzkaller.02LHtP" [pid 293] <... chdir resumed>) = 0 [pid 292] chdir("./syzkaller.0bUj19" [pid 295] <... chdir resumed>) = 0 [pid 294] <... chdir resumed>) = 0 [pid 293] mkdir("./0", 0777 [pid 292] <... chdir resumed>) = 0 [pid 295] mkdir("./0", 0777 [pid 294] mkdir("./0", 0777 [pid 293] <... mkdir resumed>) = 0 [pid 292] mkdir("./0", 0777 [pid 295] <... mkdir resumed>) = 0 [pid 294] <... mkdir resumed>) = 0 [pid 293] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 292] <... mkdir resumed>) = 0 [pid 295] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 294] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 292] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 293] <... clone resumed>, child_tidptr=0x555582262650) = 298 [pid 295] <... clone resumed>, child_tidptr=0x555582262650) = 299 [pid 294] <... clone resumed>, child_tidptr=0x555582262650) = 300 [pid 292] <... clone resumed>, child_tidptr=0x555582262650) = 301 [pid 297] <... bpf resumed>) = 3 [pid 297] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=65537, max_entries=8, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80) = 4 [pid 297] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=4294967293, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address) [pid 297] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148./strace-static-x86_64: Process 300 attached ./strace-static-x86_64: Process 299 attached ./strace-static-x86_64: Process 298 attached [pid 300] set_robust_list(0x555582262660, 24 [pid 299] set_robust_list(0x555582262660, 24 [pid 298] set_robust_list(0x555582262660, 24 [pid 297] <... bpf resumed>) = 5 [ 141.433983][ T28] audit: type=1400 audit(1752514674.389:64): avc: denied { execmem } for pid=291 comm="syz-executor176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 141.455812][ T28] audit: type=1400 audit(1752514674.419:65): avc: denied { bpf } for pid=297 comm="syz-executor176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [pid 297] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="timer_start", prog_fd=5}}, 16 [pid 300] <... set_robust_list resumed>) = 0 [pid 299] <... set_robust_list resumed>) = 0 [pid 298] <... set_robust_list resumed>) = 0 [pid 300] chdir("./0" [pid 299] chdir("./0" [pid 300] <... chdir resumed>) = 0 [pid 299] <... chdir resumed>) = 0 [pid 298] chdir("./0"./strace-static-x86_64: Process 301 attached [pid 301] set_robust_list(0x555582262660, 24) = 0 [pid 301] chdir("./0") = 0 [pid 301] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 301] setpgid(0, 0) = 0 [pid 301] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 301] write(3, "1000", 4) = 4 [pid 301] close(3) = 0 [pid 301] symlink("/dev/binderfs", "./binderfs") = 0 [pid 301] write(1, "executing program\n", 18executing program ) = 18 [pid 301] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=65537, max_entries=8, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80) = 3 [pid 301] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=65537, max_entries=8, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80) = 4 [pid 301] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=4294967293, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address) [pid 301] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148 [pid 300] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 299] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 298] <... chdir resumed>) = 0 [pid 300] <... prctl resumed>) = 0 [pid 299] <... prctl resumed>) = 0 [ 141.478409][ T28] audit: type=1400 audit(1752514674.439:66): avc: denied { map_create } for pid=297 comm="syz-executor176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 141.498776][ T28] audit: type=1400 audit(1752514674.439:67): avc: denied { map_read map_write } for pid=297 comm="syz-executor176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [pid 298] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 300] setpgid(0, 0 [pid 299] setpgid(0, 0 [pid 298] <... prctl resumed>) = 0 [pid 300] <... setpgid resumed>) = 0 [pid 299] <... setpgid resumed>) = 0 [pid 298] setpgid(0, 0 [pid 301] <... bpf resumed>) = 5 [pid 301] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="timer_start", prog_fd=5}}, 16 [pid 300] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 299] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 298] <... setpgid resumed>) = 0 [pid 298] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 299] <... openat resumed>) = 3 [pid 298] <... openat resumed>) = 3 [pid 300] <... openat resumed>) = 3 [pid 299] write(3, "1000", 4 [pid 298] write(3, "1000", 4 [pid 300] write(3, "1000", 4 [pid 299] <... write resumed>) = 4 [pid 298] <... write resumed>) = 4 [pid 300] <... write resumed>) = 4 [pid 298] close(3 [pid 300] close(3 [pid 299] close(3 [pid 298] <... close resumed>) = 0 [pid 297] <... bpf resumed>) = 6 [pid 301] <... bpf resumed>) = 6 [pid 300] <... close resumed>) = 0 [pid 301] bpf(BPF_MAP_UPDATE_ELEM, {map_fd=4, key=0x2000000001c0, value=0x200000000200, flags=BPF_ANY}, 32 [pid 299] <... close resumed>) = 0 [pid 300] symlink("/dev/binderfs", "./binderfs" [pid 298] symlink("/dev/binderfs", "./binderfs" [pid 297] bpf(BPF_MAP_UPDATE_ELEM, {map_fd=4, key=0x2000000001c0, value=0x200000000200, flags=BPF_ANY}, 32 [pid 301] <... bpf resumed>) = 0 [pid 299] symlink("/dev/binderfs", "./binderfs" [pid 301] exit_group(0) = ? [pid 301] +++ exited with 0 +++ [pid 300] <... symlink resumed>) = 0 [pid 299] <... symlink resumed>) = 0 [pid 298] <... symlink resumed>) = 0 [ 141.519574][ T28] audit: type=1400 audit(1752514674.439:68): avc: denied { prog_load } for pid=297 comm="syz-executor176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 141.539243][ T28] audit: type=1400 audit(1752514674.439:69): avc: denied { perfmon } for pid=297 comm="syz-executor176" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 141.561707][ T28] audit: type=1400 audit(1752514674.439:70): avc: denied { prog_run } for pid=297 comm="syz-executor176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 287.665054][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz-executor176:297] [ 287.673728][ C1] Modules linked in: [ 287.677625][ C1] CPU: 1 PID: 297 Comm: syz-executor176 Not tainted 6.1.141-syzkaller-00038-ge2deb0b42a3a #0 [ 287.687771][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 287.697863][ C1] RIP: 0010:smp_call_function_many_cond+0x872/0x960 [ 287.704488][ C1] Code: 41 8b 1f 89 de 83 e6 01 31 ff e8 39 66 09 00 83 e3 01 48 bb 00 00 00 00 00 fc ff df 75 0a e8 05 62 09 00 e9 38 ff ff ff f3 90 <41> 0f b6 44 1d 00 84 c0 75 14 41 f7 07 01 00 00 00 0f 84 1a ff ff [ 287.724705][ C1] RSP: 0018:ffffc90000ee7640 EFLAGS: 00000293 [ 287.730772][ C1] RAX: ffffffff8166958e RBX: dffffc0000000000 RCX: ffff888120c42880 [ 287.738743][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 287.746712][ C1] RBP: ffffc90000ee7778 R08: dffffc0000000000 R09: ffffed103ee27213 [ 287.754682][ C1] R10: 0000000000000000 R11: ffffffff81341b30 R12: 1ffff1103ee27210 [ 287.762651][ C1] R13: 1ffff1103ee07ab9 R14: 0000000000000000 R15: ffff8881f703d5c8 [ 287.770622][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 287.779548][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 287.786144][ C1] CR2: 00007fa47dab71f0 CR3: 0000000006e0f000 CR4: 00000000003506a0 [ 287.794116][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 287.802116][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 287.810089][ C1] Call Trace: [ 287.813393][ C1] [ 287.816344][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 287.821565][ C1] ? smp_call_function_many+0x40/0x40 [ 287.826957][ C1] ? enqueue_timer+0x16a/0x480 [ 287.831926][ C1] ? text_poke+0x30/0x30 [ 287.836172][ C1] ? text_poke_loc_init+0x349/0x570 [ 287.841373][ C1] ? __cfi_do_sync_core+0x10/0x10 [ 287.846404][ C1] on_each_cpu_cond_mask+0x43/0x80 [ 287.851520][ C1] text_poke_bp_batch+0x1cc/0x580 [ 287.856545][ C1] ? text_poke_loc_init+0x570/0x570 [ 287.861752][ C1] ? __kasan_check_write+0x14/0x20 [ 287.866874][ C1] ? mutex_lock+0x8d/0x1a0 [ 287.871288][ C1] ? __cfi_mutex_lock+0x10/0x10 [ 287.876156][ C1] ? enqueue_timer+0x16a/0x480 [ 287.880926][ C1] text_poke_finish+0x1a/0x30 [ 287.885772][ C1] arch_jump_label_transform_apply+0x15/0x30 [ 287.891790][ C1] __jump_label_update+0x37c/0x3a0 [ 287.896917][ C1] jump_label_update+0x39b/0x450 [ 287.901853][ C1] static_key_disable_cpuslocked+0xc9/0x1a0 [ 287.907741][ C1] static_key_disable+0x1a/0x30 [ 287.912592][ C1] tracepoint_probe_unregister+0x624/0x8b0 [ 287.918402][ C1] bpf_probe_unregister+0x61/0x70 [ 287.923430][ C1] bpf_raw_tp_link_release+0x63/0x90 [ 287.928720][ C1] bpf_link_free+0x13a/0x390 [ 287.933314][ C1] ? bpf_link_put_deferred+0x20/0x20 [ 287.938609][ C1] bpf_link_release+0x15f/0x170 [ 287.943467][ C1] ? __cfi_bpf_link_release+0x10/0x10 [ 287.948851][ C1] __fput+0x1fc/0x8f0 [ 287.952840][ C1] ____fput+0x15/0x20 [ 287.956837][ C1] task_work_run+0x1db/0x240 [ 287.961429][ C1] ? __cfi_task_work_run+0x10/0x10 [ 287.966544][ C1] ? disassociate_ctty+0x1f2/0x8b0 [ 287.971668][ C1] ? __kasan_check_write+0x14/0x20 [ 287.976790][ C1] do_exit+0xa1d/0x2650 [ 287.980959][ C1] ? __cfi_do_exit+0x10/0x10 [ 287.985556][ C1] ? _raw_spin_unlock_irq+0x4d/0x70 [ 287.990766][ C1] ? __kasan_check_write+0x14/0x20 [ 287.995993][ C1] ? _raw_spin_lock_irq+0x8f/0xe0 [ 288.001063][ C1] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 288.006646][ C1] ? zap_other_threads+0x2c1/0x2f0 [ 288.011780][ C1] do_group_exit+0x210/0x2d0 [ 288.016382][ C1] __x64_sys_exit_group+0x3f/0x40 [ 288.021412][ C1] x64_sys_call+0x7b4/0x9a0 [ 288.025925][ C1] do_syscall_64+0x4c/0xa0 [ 288.030336][ C1] ? clear_bhb_loop+0x30/0x80 [ 288.035018][ C1] ? clear_bhb_loop+0x30/0x80 [ 288.039701][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 288.045601][ C1] RIP: 0033:0x7fa47da3b5f9 [ 288.050031][ C1] Code: Unable to access opcode bytes at 0x7fa47da3b5cf. [ 288.057046][ C1] RSP: 002b:00007ffc8bab7108 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 288.065463][ C1] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa47da3b5f9 [ 288.073441][ C1] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 288.081412][ C1] RBP: 00007fa47dab6370 R08: ffffffffffffffb8 R09: 0000000000000007 [ 288.089389][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa47dab6370 [ 288.097361][ C1] R13: 0000000000000000 R14: 00007fa47dab6de0 R15: 00007fa47da0c530 [ 288.105353][ C1]