./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2216400208

<...>
Warning: Permanently added '10.128.0.15' (ED25519) to the list of known hosts.
execve("./syz-executor2216400208", ["./syz-executor2216400208"], 0x7fff50df5e50 /* 10 vars */) = 0
brk(NULL)                               = 0x55558f5bb000
brk(0x55558f5bbe00)                     = 0x55558f5bbe00
arch_prctl(ARCH_SET_FS, 0x55558f5bb480) = 0
set_tid_address(0x55558f5bb750)         = 296
set_robust_list(0x55558f5bb760, 24)     = 0
rseq(0x55558f5bbda0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented)
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor2216400208", 4096) = 28
getrandom("\x7d\x28\x9b\xb6\x95\xd0\x8b\x04", 8, GRND_NONBLOCK) = 8
brk(NULL)                               = 0x55558f5bbe00
brk(0x55558f5dce00)                     = 0x55558f5dce00
brk(0x55558f5dd000)                     = 0x55558f5dd000
mprotect(0x7fbf8f340000, 16384, PROT_READ) = 0
mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000
mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000
mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000
rt_sigaction(SIGRTMIN, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0
rt_sigaction(SIGSEGV, {sa_handler=0x7fbf8f29bd80, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7fbf8f2a3320}, NULL, 8) = 0
rt_sigaction(SIGBUS, {sa_handler=0x7fbf8f29bd80, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7fbf8f2a3320}, NULL, 8) = 0
unshare(CLONE_NEWPID)                   = 0
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 297 attached
 <unfinished ...>
[pid   297] set_robust_list(0x55558f5bb760, 24) = 0
[pid   297] prctl(PR_SET_PDEATHSIG, SIGKILL <unfinished ...>
[pid   296] <... clone resumed>, child_tidptr=0x55558f5bb750) = 297
[pid   297] <... prctl resumed>)        = 0
[pid   297] getppid()                   = 0
[pid   297] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0
[pid   297] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0
[pid   297] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0
[pid   297] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0
[pid   297] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0
[pid   297] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0
[pid   297] unshare(CLONE_NEWNS)        = 0
[pid   297] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0
[pid   297] unshare(CLONE_NEWIPC)       = -1 EINVAL (Invalid argument)
[pid   297] unshare(CLONE_NEWCGROUP)    = 0
[pid   297] unshare(CLONE_NEWUTS)       = 0
[pid   297] unshare(CLONE_SYSVSEM)      = 0
[pid   297] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   297] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   297] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   297] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   297] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   297] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   297] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory)
[pid   297] getpid()                    = 1
[pid   297] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0
[pid   297] capset({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0
[pid   297] unshare(CLONE_NEWNET)       = 0
[pid   297] openat(AT_FDCWD, "/proc/sys/net/ipv4/ping_group_range", O_WRONLY|O_CLOEXEC) = 3
[pid   297] write(3, "0 65535", 7)      = 7
[pid   297] close(3)                    = 0
[pid   297] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3
[pid   297] write(3, "100000", 6)       = 6
[pid   297] close(3)                    = 0
[pid   297] mkdir("./syz-tmp", 0777)    = 0
[pid   297] mount("", "./syz-tmp", "tmpfs", 0, NULL) = 0
[pid   297] mkdir("./syz-tmp/newroot", 0777) = 0
[pid   297] mkdir("./syz-tmp/newroot/dev", 0700) = 0
[pid   297] mount("/dev", "./syz-tmp/newroot/dev", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   297] mkdir("./syz-tmp/newroot/proc", 0700) = 0
[pid   297] mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL) = 0
[pid   297] mkdir("./syz-tmp/newroot/selinux", 0700) = 0
[pid   297] mount("/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid   297] mount("/sys/fs/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   297] mkdir("./syz-tmp/newroot/sys", 0700) = 0
[pid   297] mount("/sys", "./syz-tmp/newroot/sys", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   297] mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   297] mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid   297] mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid   297] mkdir("./syz-tmp/newroot/syz-inputs", 0700) = 0
[pid   297] mount("/syz-inputs", "./syz-tmp/newroot/syz-inputs", NULL, MS_RDONLY|MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid   297] mkdir("./syz-tmp/pivot", 0777) = 0
[pid   297] pivot_root("./syz-tmp", "./syz-tmp/pivot") = 0
[pid   297] chdir("/")                  = 0
[pid   297] umount2("./pivot", MNT_DETACH) = 0
[pid   297] chroot("./newroot")         = 0
[pid   297] chdir("/")                  = 0
[pid   297] mkdir("/dev/gadgetfs", 0777) = 0
[pid   297] mount("gadgetfs", "/dev/gadgetfs", "gadgetfs", 0, NULL) = -1 ENODEV (No such device)
[pid   297] mkdir("/dev/binderfs", 0777) = 0
[pid   297] mount("binder", "/dev/binderfs", "binder", 0, NULL) = 0
[pid   297] symlink("/dev/binderfs", "./binderfs") = 0
[pid   297] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy)
executing program
[pid   297] write(1, "executing program\n", 18) = 18
[pid   297] openat(AT_FDCWD, "/selinux/load", O_RDWR) = 3
[   25.927300][   T36] audit: type=1400 audit(1750306608.330:64): avc:  denied  { execmem } for  pid=296 comm="syz-executor221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   25.947291][   T36] audit: type=1400 audit(1750306608.340:65): avc:  denied  { mounton } for  pid=297 comm="syz-executor221" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[pid   297] openat(AT_FDCWD, "/selinux/policy", O_RDONLY) = 4
[pid   297] mmap(0x200000000000, 11755520, PROT_WRITE|PROT_SEM|PROT_GROWSDOWN, MAP_PRIVATE|MAP_FIXED, 4, 0) = 0x200000000000
[pid   297] --- SIGBUS {si_signo=SIGBUS, si_code=BUS_ADRERR, si_addr=0x200000000040} ---
[pid   297] openat(AT_FDCWD, 0x200000000040, O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = -1 ENOENT (No such file or directory)
[pid   297] openat(AT_FDCWD, 0x200000000040, O_RDWR|O_CREAT|O_NOCTTY|O_TRUNC|O_APPEND|FASYNC|0x18, 000) = 5
[   25.968851][   T36] audit: type=1400 audit(1750306608.360:66): avc:  denied  { mounton } for  pid=297 comm="syz-executor221" path="/root/syz-tmp" dev="sda1" ino=2024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1
[   25.982565][  T297] ------------[ cut here ]------------
[   25.991902][   T36] audit: type=1400 audit(1750306608.360:67): avc:  denied  { mount } for  pid=297 comm="syz-executor221" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[   25.997458][  T297] WARNING: CPU: 0 PID: 297 at mm/page_alloc.c:5157 __alloc_pages_noprof+0xe4/0x6c0
[   26.019628][   T36] audit: type=1400 audit(1750306608.360:68): avc:  denied  { mounton } for  pid=297 comm="syz-executor221" path="/root/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[   26.028779][  T297] Modules linked in:
[   26.052873][   T36] audit: type=1400 audit(1750306608.360:69): avc:  denied  { mount } for  pid=297 comm="syz-executor221" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[   26.056529][  T297] CPU: 0 UID: 0 PID: 297 Comm: syz-executor221 Not tainted 6.12.23-syzkaller-g30b14cdad458 #0 c708c6bafa1314b3e84c64b9f03b67766970ebbd
[   26.078566][   T36] audit: type=1400 audit(1750306608.360:70): avc:  denied  { mounton } for  pid=297 comm="syz-executor221" path="/root/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1
[   26.092220][  T297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[   26.092234][  T297] RIP: 0010:__alloc_pages_noprof+0xe4/0x6c0
[   26.117700][   T36] audit: type=1400 audit(1750306608.360:71): avc:  denied  { mounton } for  pid=297 comm="syz-executor221" path="/root/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1
[   26.127548][  T297] Code: 0f 1f 44 00 00 41 83 fd 0b 72 28 b8 00 20 00 00 23 44 24 40 75 1d 80 3d b4 7a ee 05 00 0f 85 c4 00 00 00 c6 05 a7 7a ee 05 01 <0f> 0b 31 c0 e9 b6 00 00 00 41 83 fd 0a 0f 87 aa 00 00 00 44 89 6c
[   26.133578][   T36] audit: type=1400 audit(1750306608.360:72): avc:  denied  { unmount } for  pid=297 comm="syz-executor221" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[   26.159408][  T297] RSP: 0018:ffffc9000126f680 EFLAGS: 00010246
[   26.179137][   T36] audit: type=1400 audit(1750306608.380:73): avc:  denied  { mounton } for  pid=297 comm="syz-executor221" path="/dev/gadgetfs" dev="devtmpfs" ino=434 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[   26.198640][  T297] 
[   26.198648][  T297] RAX: 0000000000000000 RBX: 1ffff9200024ded4 RCX: 0000000000000000
[   26.237859][  T297] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc9000126f728
[   26.245836][  T297] RBP: ffffc9000126f7a8 R08: ffffc9000126f727 R09: 0000000000000000
[   26.253825][  T297] R10: ffffc9000126f710 R11: fffff5200024dee5 R12: ffffc9000126f6c0
[   26.261850][  T297] R13: 0000000000000016 R14: dffffc0000000000 R15: 0000000000000000
[   26.269853][  T297] FS:  000055558f5bb480(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000
[   26.278882][  T297] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   26.285501][  T297] CR2: 0000200000006000 CR3: 0000000100680000 CR4: 00000000003526b0
[   26.293482][  T297] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   26.301650][  T297] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   26.309623][  T297] Call Trace:
[   26.312912][  T297]  <TASK>
[   26.315855][  T297]  ? __cfi___alloc_pages_noprof+0x10/0x10
[   26.321580][  T297]  ? __kasan_slab_alloc+0x73/0x90
[   26.326598][  T297]  ? hashtab_init+0xdb/0x1f0
[   26.331184][  T297]  ___kmalloc_large_node+0x9c/0x1d0
[   26.336373][  T297]  ? ebitmap_read+0x21d/0x990
[   26.341051][  T297]  ? hashtab_init+0xdb/0x1f0
[   26.345633][  T297]  __kmalloc_large_node_noprof+0x1e/0xe0
[   26.351264][  T297]  ? hashtab_init+0xdb/0x1f0
[   26.355847][  T297]  __kmalloc_noprof+0x26d/0x450
[   26.360709][  T297]  hashtab_init+0xdb/0x1f0
[   26.365119][  T297]  ? policydb_read+0x86f/0x28c0
[   26.369996][  T297]  symtab_init+0x44/0x70
[   26.374243][  T297]  policydb_read+0x8fe/0x28c0
[   26.378914][  T297]  ? kasan_save_alloc_info+0x40/0x50
[   26.384230][  T297]  ? __cfi_policydb_read+0x10/0x10
[   26.389340][  T297]  ? security_load_policy+0x128/0x12f0
[   26.394809][  T297]  security_load_policy+0x162/0x12f0
[   26.400107][  T297]  ? irqentry_exit+0x4a/0x60
[   26.404680][  T297]  ? exc_page_fault+0x66/0xc0
[   26.409330][  T297]  ? asm_exc_page_fault+0x2b/0x30
[   26.414349][  T297]  ? __cfi_security_load_policy+0x10/0x10
[   26.420165][  T297]  ? rep_movs_alternative+0x4a/0xa0
[   26.425347][  T297]  sel_write_load+0x298/0x5e0
[   26.430024][  T297]  ? __cfi_sel_write_load+0x10/0x10
[   26.435233][  T297]  ? bpf_lsm_file_permission+0xd/0x20
[   26.440604][  T297]  ? __cfi_sel_write_load+0x10/0x10
[   26.445798][  T297]  vfs_write+0x3c0/0xe80
[   26.450039][  T297]  ? __cfi__raw_spin_lock_irq+0x10/0x10
[   26.455580][  T297]  ? __cfi_vfs_write+0x10/0x10
[   26.460371][  T297]  ? __asan_memset+0x39/0x50
[   26.464955][  T297]  ? ptrace_stop+0x6c9/0x8c0
[   26.469534][  T297]  ? __kasan_check_read+0x15/0x20
[   26.474768][  T297]  ksys_write+0x141/0x250
[   26.479115][  T297]  ? __cfi_ksys_write+0x10/0x10
[   26.484059][  T297]  ? __kasan_check_write+0x18/0x20
[   26.489198][  T297]  __x64_sys_write+0x7f/0x90
[   26.493825][  T297]  x64_sys_call+0x271c/0x2ee0
[   26.498516][  T297]  do_syscall_64+0x58/0xf0
[   26.502947][  T297]  ? clear_bhb_loop+0x35/0x90
[   26.507621][  T297]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   26.513540][  T297] RIP: 0033:0x7fbf8f2cd1b9
[   26.517972][  T297] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   26.537774][  T297] RSP: 002b:00007fff7eea0508 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   26.546233][  T297] RAX: ffffffffffffffda RBX: 00007fbf8f31615d RCX: 00007fbf8f2cd1b9
[   26.554221][  T297] RDX: 000000000000606c RSI: 0000200000000000 RDI: 0000000000000003
[   26.562330][  T297] RBP: 00007fbf8f31612d R08: 00007fbf8f31b19c R09: 00007fbf8f31b19c
[   26.570340][  T297] R10: 00007fbf8f31b19c R11: 0000000000000246 R12: 00007fbf8f31b19c
[pid   297] write(3, 0x200000000000, 24684) = -1 ENOMEM (Cannot allocate memory)
[pid   297] exit_group(1)               = ?
[pid   297] +++ exited with 1 +++
--- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=297, si_uid=0, si_status=1, si_utime=0, si_stime=55} ---
exit_group(0)                           = ?
+++ exited with 0 +++
[   26.578318][  T297]