./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1291886200 <...> Warning: Permanently added '10.128.0.57' (ED25519) to the list of known hosts. execve("./syz-executor1291886200", ["./syz-executor1291886200"], 0x7ffc2f8dfc30 /* 10 vars */) = 0 brk(NULL) = 0x55558eb40000 brk(0x55558eb40d00) = 0x55558eb40d00 arch_prctl(ARCH_SET_FS, 0x55558eb40380) = 0 set_tid_address(0x55558eb40650) = 290 set_robust_list(0x55558eb40660, 24) = 0 rseq(0x55558eb40ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor1291886200", 4096) = 28 getrandom("\x62\x12\x54\xd5\xa9\xaf\xb0\x6d", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55558eb40d00 brk(0x55558eb61d00) = 0x55558eb61d00 brk(0x55558eb62000) = 0x55558eb62000 mprotect(0x7f01a4fb3000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 openat(AT_FDCWD, "/proc/self/make-it-fail", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/failslab/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_futex/ignore-private", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/min-order", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558eb40650) = 291 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558eb40650) = 292 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558eb40650) = 293 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558eb40650) = 294 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558eb40650) = 295 ./strace-static-x86_64: Process 295 attached [pid 295] set_robust_list(0x55558eb40660, 24) = 0 [pid 295] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558eb40650) = 296 ./strace-static-x86_64: Process 294 attached [pid 294] set_robust_list(0x55558eb40660, 24) = 0 [pid 294] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558eb40650) = 297 executing program ./strace-static-x86_64: Process 297 attached [pid 297] set_robust_list(0x55558eb40660, 24) = 0 [pid 297] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 297] setpgid(0, 0) = 0 [pid 297] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 297] write(3, "1000", 4) = 4 [pid 297] close(3) = 0 [pid 297] write(1, "executing program\n", 18) = 18 [pid 297] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000100}) = 0 [pid 297] socket(AF_VSOCK, SOCK_STREAM, 0) = 3 [pid 297] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000140, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144./strace-static-x86_64: Process 291 attached ./strace-static-x86_64: Process 292 attached ./strace-static-x86_64: Process 293 attached [pid 291] set_robust_list(0x55558eb40660, 24) = 0 [pid 292] set_robust_list(0x55558eb40660, 24 [pid 293] set_robust_list(0x55558eb40660, 24./strace-static-x86_64: Process 296 attached ) = 0 [pid 292] <... set_robust_list resumed>) = 0 [pid 291] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 297] <... bpf resumed>) = 4 [pid 297] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="virtio_transport_alloc_pkt", prog_fd=4}}, 16) = 5 [pid 297] bind(3, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16 [pid 291] <... clone resumed>, child_tidptr=0x55558eb40650) = 298 [pid 292] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 293] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 297] <... bind resumed>) = 0 [pid 297] listen(3, 10) = 0 [pid 297] socket(AF_VSOCK, SOCK_STREAM, 0) = 6 [pid 297] connect(6, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16 [pid 292] <... clone resumed>, child_tidptr=0x55558eb40650) = 299 [pid 296] set_robust_list(0x55558eb40660, 24 [pid 293] <... clone resumed>, child_tidptr=0x55558eb40650) = 300 [pid 296] <... set_robust_list resumed>) = 0 ./strace-static-x86_64: Process 300 attached [pid 296] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 300] set_robust_list(0x55558eb40660, 24./strace-static-x86_64: Process 299 attached ) = 0 [pid 296] <... prctl resumed>) = 0 [pid 297] <... connect resumed>) = 0 [pid 297] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 7 [pid 297] write(7, "2", 1) = 1 [ 25.447592][ T28] audit: type=1400 audit(1754893373.732:64): avc: denied { execmem } for pid=290 comm="syz-executor129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 25.469154][ T28] audit: type=1400 audit(1754893373.752:65): avc: denied { create } for pid=297 comm="syz-executor129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [pid 297] close_range(0, 6, 0 [pid 300] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 299] set_robust_list(0x55558eb40660, 24 [pid 296] setpgid(0, 0 [pid 300] <... prctl resumed>) = 0 [pid 299] <... set_robust_list resumed>) = 0 [pid 296] <... setpgid resumed>) = 0 ./strace-static-x86_64: Process 298 attached [pid 298] set_robust_list(0x55558eb40660, 24) = 0 [pid 298] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 298] setpgid(0, 0) = 0 [pid 298] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 298] write(3, "1000", 4) = 4 executing program [pid 298] close(3) = 0 [pid 298] write(1, "executing program\n", 18) = 18 [pid 298] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000100} [pid 300] setpgid(0, 0 [pid 299] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 296] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 300] <... setpgid resumed>) = 0 [pid 296] <... openat resumed>) = 3 [pid 300] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 299] <... prctl resumed>) = 0 [ 25.492333][ T28] audit: type=1400 audit(1754893373.752:66): avc: denied { bpf } for pid=297 comm="syz-executor129" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 25.513582][ T28] audit: type=1400 audit(1754893373.752:67): avc: denied { prog_load } for pid=297 comm="syz-executor129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [pid 296] write(3, "1000", 4 [pid 300] <... openat resumed>) = 3 [pid 299] setpgid(0, 0 [pid 296] <... write resumed>) = 4 [pid 299] <... setpgid resumed>) = 0 [pid 296] close(3 [pid 300] write(3, "1000", 4) = 4 executing program [pid 300] close(3) = 0 [pid 300] write(1, "executing program\n", 18) = 18 [pid 300] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000100}) = 0 [pid 298] <... seccomp resumed>) = 0 [pid 300] socket(AF_VSOCK, SOCK_STREAM, 0 [pid 298] socket(AF_VSOCK, SOCK_STREAM, 0 [pid 300] <... socket resumed>) = 3 [pid 298] <... socket resumed>) = 3 [pid 300] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000140, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 298] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000140, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 298] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="virtio_transport_alloc_pkt", prog_fd=4}}, 16 [pid 300] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="virtio_transport_alloc_pkt", prog_fd=4}}, 16 [pid 299] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 296] <... close resumed>) = 0 [pid 299] <... openat resumed>) = 3 [pid 296] write(1, "executing program\n", 18executing program [pid 299] write(3, "1000", 4 [pid 296] <... write resumed>) = 18 [pid 299] <... write resumed>) = 4 [pid 296] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000100} [pid 299] close(3) = 0 [ 25.533844][ T28] audit: type=1400 audit(1754893373.752:68): avc: denied { perfmon } for pid=297 comm="syz-executor129" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 25.555253][ T28] audit: type=1400 audit(1754893373.762:69): avc: denied { prog_run } for pid=297 comm="syz-executor129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 25.575207][ T28] audit: type=1400 audit(1754893373.782:70): avc: denied { bind } for pid=297 comm="syz-executor129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [pid 299] write(1, "executing program\n", 18 [pid 296] <... seccomp resumed>) = 0 executing program [ 25.595649][ T297] FAULT_INJECTION: forcing a failure. [ 25.595649][ T297] name failslab, interval 1, probability 0, space 0, times 1 [ 25.596067][ T28] audit: type=1400 audit(1754893373.782:71): avc: denied { listen } for pid=297 comm="syz-executor129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 25.628457][ T297] CPU: 0 PID: 297 Comm: syz-executor129 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 25.628957][ T28] audit: type=1400 audit(1754893373.782:72): avc: denied { connect } for pid=297 comm="syz-executor129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 25.638633][ T297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 25.638657][ T297] Call Trace: [ 25.638664][ T297] [ 25.638670][ T297] __dump_stack+0x21/0x24 [ 25.679028][ T297] dump_stack_lvl+0xee/0x150 [ 25.683634][ T297] ? __cfi_dump_stack_lvl+0x8/0x8 [ 25.688668][ T297] ? __schedule+0xb8f/0x14e0 [ 25.693287][ T297] dump_stack+0x15/0x24 [ 25.697466][ T297] should_fail_ex+0x3d4/0x520 [ 25.702151][ T297] __should_failslab+0xac/0xf0 [ 25.706922][ T297] ? virtio_transport_alloc_pkt+0x6a/0xa00 [ 25.712750][ T297] should_failslab+0x9/0x20 [ 25.717267][ T297] __kmem_cache_alloc_node+0x3d/0x2c0 [ 25.722652][ T297] ? __kasan_check_read+0x11/0x20 [ 25.727701][ T297] ? preempt_schedule_common+0xbe/0xf0 [ 25.733176][ T297] ? virtio_transport_alloc_pkt+0x6a/0xa00 [ 25.738995][ T297] kmalloc_trace+0x29/0xb0 [ 25.743424][ T297] virtio_transport_alloc_pkt+0x6a/0xa00 [ 25.749073][ T297] ? preempt_schedule_thunk+0x16/0x18 [ 25.754465][ T297] virtio_transport_send_pkt_info+0x2d5/0x650 [ 25.760548][ T297] virtio_transport_release+0x1de/0xb40 [ 25.766107][ T297] ? _raw_spin_lock_bh+0x8e/0xe0 [ 25.771065][ T297] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 25.776540][ T297] ? __cfi_virtio_transport_release+0x10/0x10 [ 25.782626][ T297] ? __local_bh_enable_ip+0x58/0x80 [ 25.787830][ T297] ? _raw_spin_unlock_bh+0x50/0x60 [ 25.792955][ T297] ? lock_sock_nested+0x1ec/0x280 [ 25.797989][ T297] ? __kasan_check_write+0x14/0x20 [ 25.803116][ T297] ? __cfi_lock_sock_nested+0x10/0x10 [ 25.808496][ T297] ? __kasan_check_write+0x14/0x20 [ 25.813629][ T297] ? _raw_spin_lock_bh+0x8e/0xe0 [ 25.818587][ T297] ? __kasan_check_write+0x14/0x20 [ 25.823726][ T297] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 25.829540][ T297] __vsock_release+0xad/0x510 [ 25.834218][ T297] __vsock_release+0x384/0x510 [ 25.838984][ T297] vsock_release+0xb5/0x120 [ 25.843489][ T297] sock_close+0xf1/0x290 [ 25.847732][ T297] ? __cfi_sock_close+0x10/0x10 [ 25.852583][ T297] __fput+0x1fc/0x8f0 [ 25.856580][ T297] ____fput+0x15/0x20 [ 25.860578][ T297] task_work_run+0x1db/0x240 [ 25.865170][ T297] ? __cfi_task_work_run+0x10/0x10 [ 25.870283][ T297] ? fput+0x15b/0x1a0 [ 25.874270][ T297] ? filp_close+0x111/0x160 [ 25.878774][ T297] ptrace_notify+0x221/0x250 [ 25.883371][ T297] ? __cfi_ptrace_notify+0x10/0x10 [ 25.888488][ T297] ? __cfi___close_range+0x10/0x10 [ 25.893603][ T297] ? __secure_computing+0xea/0x290 [ 25.898717][ T297] syscall_exit_work+0x84/0x140 [ 25.903566][ T297] syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 25.909769][ T297] syscall_exit_to_user_mode+0xd/0x30 [ 25.915151][ T297] do_syscall_64+0x58/0xa0 [ 25.919575][ T297] ? clear_bhb_loop+0x30/0x80 [ 25.924253][ T297] ? clear_bhb_loop+0x30/0x80 [ 25.928931][ T297] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.934823][ T297] RIP: 0033:0x7f01a4f47a19 [ 25.939246][ T297] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 25.958849][ T297] RSP: 002b:00007fffd5800c68 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 25.967263][ T297] RAX: 0000000000000000 RBX: 00007fffd5800c80 RCX: 00007f01a4f47a19 [ 25.975232][ T297] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 25.983200][ T297] RBP: 0000000000000001 R08: 00007fffd5800a07 R09: 0000000000000140 [ 25.991172][ T297] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [pid 299] <... write resumed>) = 18 [pid 297] <... close_range resumed>) = 0 [pid 296] socket(AF_VSOCK, SOCK_STREAM, 0 [pid 297] exit_group(0) = ? [pid 299] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000100} [pid 297] +++ exited with 0 +++ [pid 296] <... socket resumed>) = 3 [pid 294] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=297, si_uid=0, si_status=0, si_utime=0, si_stime=12} --- [pid 294] restart_syscall(<... resuming interrupted clone ...> [pid 299] <... seccomp resumed>) = 0 [pid 296] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000140, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144 [pid 299] socket(AF_VSOCK, SOCK_STREAM, 0 [pid 300] <... bpf resumed>) = 5 [pid 300] bind(3, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16) = 0 [pid 300] listen(3, 10) = 0 [pid 300] socket(AF_VSOCK, SOCK_STREAM, 0) = 6 [pid 300] connect(6, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16) = 0 [pid 299] <... socket resumed>) = 3 [pid 296] <... bpf resumed>) = 4 [pid 300] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 7 [pid 300] write(7, "2", 1) = 1 [pid 300] close_range(0, 6, 0 [pid 299] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000140, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144 [pid 296] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="virtio_transport_alloc_pkt", prog_fd=4}}, 16 [pid 299] <... bpf resumed>) = 4 [pid 299] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="virtio_transport_alloc_pkt", prog_fd=4}}, 16 [pid 294] <... restart_syscall resumed>) = 0 [pid 298] <... bpf resumed>) = 5 [pid 298] bind(3, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16) = -1 EADDRINUSE (Address already in use) [pid 298] listen(3, 10) = -1 EINVAL (Invalid argument) [pid 298] socket(AF_VSOCK, SOCK_STREAM, 0) = 6 [pid 298] connect(6, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16) = 0 [pid 298] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 7 [pid 298] write(7, "2", 1) = 1 [pid 298] close_range(0, 6, 0 [pid 294] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55558eb40650) = 301 [ 25.999140][ T297] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 26.007109][ T297] [ 26.013845][ T300] FAULT_INJECTION: forcing a failure. [ 26.013845][ T300] name failslab, interval 1, probability 0, space 0, times 0 [ 26.026644][ T300] CPU: 0 PID: 300 Comm: syz-executor129 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 26.036818][ T300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 26.046962][ T300] Call Trace: ./strace-static-x86_64: Process 301 attached [pid 301] set_robust_list(0x55558eb40660, 24) = 0 [pid 301] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 301] setpgid(0, 0) = 0 [pid 301] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 301] write(3, "1000", 4) = 4 [pid 301] close(3) = 0 [pid 301] write(1, "executing program\n", 18executing program ) = 18 [pid 301] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000100}) = 0 [pid 301] socket(AF_VSOCK, SOCK_STREAM, 0) = 3 [pid 301] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000140, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [ 26.050264][ T300] [ 26.053189][ T300] __dump_stack+0x21/0x24 [ 26.057538][ T300] dump_stack_lvl+0xee/0x150 [ 26.062126][ T300] ? __cfi_dump_stack_lvl+0x8/0x8 [ 26.067166][ T300] ? ____fput+0x15/0x20 [ 26.071317][ T300] ? ptrace_notify+0x221/0x250 [ 26.076078][ T300] ? syscall_exit_work+0x84/0x140 [ 26.081103][ T300] ? syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 26.087472][ T300] ? do_syscall_64+0x58/0xa0 [ 26.092080][ T300] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 26.098168][ T300] dump_stack+0x15/0x24 [ 26.102324][ T300] should_fail_ex+0x3d4/0x520 [ 26.107004][ T300] __should_failslab+0xac/0xf0 [ 26.111776][ T300] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 26.117753][ T300] should_failslab+0x9/0x20 [ 26.122257][ T300] __kmem_cache_alloc_node+0x3d/0x2c0 [ 26.127623][ T300] ? __cfi_mutex_lock+0x10/0x10 [ 26.132464][ T300] ? delete_node+0x3e6/0xa60 [ 26.137048][ T300] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 26.143025][ T300] __kmalloc+0xa1/0x1e0 [ 26.147178][ T300] ? __cfi___bpf_trace_virtio_transport_alloc_pkt+0x10/0x10 [ 26.154479][ T300] tracepoint_probe_unregister+0x1e6/0x8b0 [ 26.160302][ T300] bpf_probe_unregister+0x61/0x70 [ 26.165329][ T300] bpf_raw_tp_link_release+0x63/0x90 [ 26.170654][ T300] bpf_link_free+0x13a/0x390 [ 26.175245][ T300] ? bpf_link_put_deferred+0x20/0x20 [ 26.180530][ T300] ? security_file_free+0xd8/0xf0 [ 26.185554][ T300] bpf_link_release+0x15f/0x170 [ 26.190399][ T300] ? __cfi_bpf_link_release+0x10/0x10 [ 26.195772][ T300] __fput+0x1fc/0x8f0 [ 26.199757][ T300] ____fput+0x15/0x20 [ 26.203748][ T300] task_work_run+0x1db/0x240 [ 26.208349][ T300] ? __cfi_task_work_run+0x10/0x10 [ 26.213466][ T300] ? fput+0x15b/0x1a0 [ 26.217447][ T300] ? filp_close+0x111/0x160 [ 26.221952][ T300] ptrace_notify+0x221/0x250 [ 26.226543][ T300] ? __cfi_ptrace_notify+0x10/0x10 [ 26.231655][ T300] ? __cfi___close_range+0x10/0x10 [ 26.236768][ T300] ? __secure_computing+0xea/0x290 [ 26.241884][ T300] syscall_exit_work+0x84/0x140 [ 26.246745][ T300] syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 26.252898][ T300] syscall_exit_to_user_mode+0xd/0x30 [ 26.258270][ T300] do_syscall_64+0x58/0xa0 [ 26.262693][ T300] ? clear_bhb_loop+0x30/0x80 [ 26.267372][ T300] ? clear_bhb_loop+0x30/0x80 [ 26.272057][ T300] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 26.277944][ T300] RIP: 0033:0x7f01a4f47a19 [ 26.282535][ T300] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 26.302146][ T300] RSP: 002b:00007fffd5800c68 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 26.310553][ T300] RAX: 0000000000000000 RBX: 00007fffd5800c80 RCX: 00007f01a4f47a19 [ 26.318518][ T300] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 26.326482][ T300] RBP: 0000000000000001 R08: 00007fffd5800a07 R09: 0000000000000140 [ 26.334445][ T300] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 26.342406][ T300] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [pid 301] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="virtio_transport_alloc_pkt", prog_fd=4}}, 16 [pid 299] <... bpf resumed>) = 5 [pid 296] <... bpf resumed>) = 5 [pid 299] bind(3, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16 [pid 296] bind(3, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16 [pid 299] <... bind resumed>) = 0 [pid 296] <... bind resumed>) = -1 EADDRINUSE (Address already in use) [pid 299] listen(3, 10 [pid 296] listen(3, 10 [pid 299] <... listen resumed>) = 0 [pid 296] <... listen resumed>) = -1 EINVAL (Invalid argument) [pid 299] socket(AF_VSOCK, SOCK_STREAM, 0 [pid 296] socket(AF_VSOCK, SOCK_STREAM, 0 [pid 299] <... socket resumed>) = 6 [pid 296] <... socket resumed>) = 6 [pid 299] connect(6, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16 [pid 296] connect(6, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16 [pid 299] <... connect resumed>) = 0 [pid 296] <... connect resumed>) = 0 [pid 299] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR [pid 296] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR [pid 299] <... openat resumed>) = 7 [pid 296] <... openat resumed>) = 7 [pid 299] write(7, "2", 1 [pid 296] write(7, "2", 1 [pid 299] <... write resumed>) = 1 [pid 296] <... write resumed>) = 1 [pid 299] close_range(0, 6, 0 [ 26.350394][ T300] [ 26.354135][ T300] CFI failure at __traceiter_virtio_transport_alloc_pkt+0xac/0x110 (target: 0xffffc90000eb77a8; expected type: 0x7d8401ab) [ 26.354179][ T298] FAULT_INJECTION: forcing a failure. [ 26.354179][ T298] name failslab, interval 1, probability 0, space 0, times 0 [ 26.367053][ T300] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 26.385639][ T300] CPU: 0 PID: 300 Comm: syz-executor129 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 26.393526][ T298] CPU: 1 PID: 298 Comm: syz-executor129 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 26.395802][ T300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 26.405942][ T298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 26.415996][ T300] RIP: 0010:__traceiter_virtio_transport_alloc_pkt+0xac/0x110 [ 26.426050][ T298] Call Trace: [ 26.426059][ T298] [ 26.433493][ T300] Code: 8b 7e 08 8b 75 d4 8b 55 d0 8b 4d cc 44 8b 45 c8 44 8b 4d c4 8b 45 20 50 ff 75 b8 41 55 41 ba 55 fe 7b 82 45 03 54 24 fc 74 02 <0f> 0b 41 ff d4 48 83 c4 18 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 [ 26.436772][ T298] __dump_stack+0x21/0x24 [ 26.439702][ T300] RSP: 0018:ffffc90000eb77a8 EFLAGS: 00010a13 [ 26.459293][ T298] dump_stack_lvl+0xee/0x150 [ 26.463610][ T300] [ 26.463617][ T300] RAX: 0000000000000000 RBX: ffff8881034ddf28 RCX: 0000000000000001 [ 26.469667][ T298] ? __cfi_dump_stack_lvl+0x8/0x8 [ 26.474245][ T300] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffc900000ed000 [ 26.476561][ T298] ? ____fput+0x15/0x20 [ 26.484519][ T300] RBP: ffffc90000eb7808 R08: 000000008caef9d3 R09: 0000000000000000 [ 26.489527][ T298] ? ptrace_notify+0x221/0x250 [ 26.497487][ T300] R10: 0000000027bc6561 R11: 1ffff920001d6ec5 R12: ffffffff81711ed0 [ 26.501629][ T298] ? syscall_exit_work+0x84/0x140 [ 26.509591][ T300] R13: 0000000000000001 R14: ffff8881034ddf28 R15: dffffc0000000000 [ 26.514360][ T298] ? syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 26.522324][ T300] FS: 000055558eb40380(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 26.527335][ T298] ? do_syscall_64+0x58/0xa0 [ 26.535312][ T300] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.541625][ T298] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 26.550533][ T300] CR2: 000000002000ffff CR3: 00000001220ac000 CR4: 00000000003506b0 [ 26.555143][ T298] dump_stack+0x15/0x24 [ 26.561816][ T300] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.567861][ T298] should_fail_ex+0x3d4/0x520 [ 26.575822][ T300] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.579968][ T298] __should_failslab+0xac/0xf0 [ 26.587931][ T300] Call Trace: [ 26.587938][ T300] [ 26.592592][ T298] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 26.600552][ T300] virtio_transport_alloc_pkt+0x9ad/0xa00 [ 26.605308][ T298] should_failslab+0x9/0x20 [ 26.608604][ T300] ? __kasan_check_write+0x14/0x20 [ 26.611528][ T298] __kmem_cache_alloc_node+0x3d/0x2c0 [ 26.617492][ T300] ? _raw_spin_lock_bh+0x8e/0xe0 [ 26.623373][ T298] ? __cfi_mutex_lock+0x10/0x10 [ 26.627866][ T300] virtio_transport_send_pkt_info+0x2d5/0x650 [ 26.632958][ T298] ? delete_node+0x3dc/0xa60 [ 26.638314][ T300] virtio_transport_release+0x1de/0xb40 [ 26.643231][ T298] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 26.648064][ T300] ? _raw_spin_lock_bh+0x8e/0xe0 [ 26.654118][ T298] __kmalloc+0xa1/0x1e0 [ 26.658691][ T300] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 26.664220][ T298] ? __cfi___bpf_trace_virtio_transport_alloc_pkt+0x10/0x10 [ 26.670187][ T300] ? __cfi_virtio_transport_release+0x10/0x10 [ 26.675113][ T298] tracepoint_probe_unregister+0x1e6/0x8b0 [ 26.679261][ T300] ? __local_bh_enable_ip+0x58/0x80 [ 26.684707][ T298] bpf_probe_unregister+0x61/0x70 [ 26.691974][ T300] ? _raw_spin_unlock_bh+0x50/0x60 [ 26.698033][ T298] bpf_raw_tp_link_release+0x63/0x90 [ 26.703836][ T300] ? lock_sock_nested+0x1ec/0x280 [ 26.709031][ T298] bpf_link_free+0x13a/0x390 [ 26.714045][ T300] ? __kasan_check_write+0x14/0x20 [ 26.719145][ T298] ? bpf_link_put_deferred+0x20/0x20 [ 26.724419][ T300] ? __cfi_lock_sock_nested+0x10/0x10 [ 26.729425][ T298] ? security_file_free+0xd8/0xf0 [ 26.734015][ T300] ? __kasan_check_write+0x14/0x20 [ 26.739118][ T298] bpf_link_release+0x15f/0x170 [ 26.744386][ T300] ? _raw_spin_lock_bh+0x8e/0xe0 [ 26.749748][ T298] ? __cfi_bpf_link_release+0x10/0x10 [ 26.754769][ T300] ? __kasan_check_write+0x14/0x20 [ 26.759865][ T298] __fput+0x1fc/0x8f0 [ 26.764702][ T300] ? _raw_spin_unlock_irqrestore+0x5a/0x80 [ 26.769629][ T298] ____fput+0x15/0x20 [ 26.774983][ T300] __vsock_release+0xad/0x510 [ 26.780085][ T298] task_work_run+0x1db/0x240 [ 26.784065][ T300] __vsock_release+0x384/0x510 [ 26.789856][ T298] ? __cfi_task_work_run+0x10/0x10 [ 26.793824][ T300] vsock_release+0xb5/0x120 [ 26.798490][ T298] ? fput+0x15b/0x1a0 [ 26.803066][ T300] sock_close+0xf1/0x290 [ 26.807817][ T298] ? filp_close+0x111/0x160 [ 26.812916][ T300] ? __cfi_sock_close+0x10/0x10 [ 26.817407][ T298] ptrace_notify+0x221/0x250 [ 26.821374][ T300] __fput+0x1fc/0x8f0 [ 26.825602][ T298] ? __cfi_ptrace_notify+0x10/0x10 [ 26.830102][ T300] ____fput+0x15/0x20 [ 26.834933][ T298] ? __cfi___close_range+0x10/0x10 [ 26.839513][ T300] task_work_run+0x1db/0x240 [ 26.843493][ T298] ? __secure_computing+0xea/0x290 [ 26.848603][ T300] ? __cfi_task_work_run+0x10/0x10 [ 26.852571][ T298] syscall_exit_work+0x84/0x140 [ 26.857665][ T300] ? fput+0x15b/0x1a0 [ 26.862238][ T298] syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 26.867333][ T300] ? filp_close+0x111/0x160 [ 26.872434][ T298] syscall_exit_to_user_mode+0xd/0x30 [ 26.877272][ T300] ptrace_notify+0x221/0x250 [ 26.881236][ T298] do_syscall_64+0x58/0xa0 [ 26.887374][ T300] ? __cfi_ptrace_notify+0x10/0x10 [ 26.891871][ T298] ? clear_bhb_loop+0x30/0x80 [ 26.897230][ T300] ? __cfi___close_range+0x10/0x10 [ 26.901809][ T298] ? clear_bhb_loop+0x30/0x80 [ 26.906215][ T300] ? __secure_computing+0xea/0x290 [ 26.911313][ T298] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 26.915983][ T300] syscall_exit_work+0x84/0x140 [ 26.921080][ T298] RIP: 0033:0x7f01a4f47a19 [ 26.925769][ T300] syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 26.930865][ T298] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 26.936745][ T300] syscall_exit_to_user_mode+0xd/0x30 [ 26.941579][ T298] RSP: 002b:00007fffd5800c68 EFLAGS: 00000246 [ 26.945981][ T300] do_syscall_64+0x58/0xa0 [ 26.952124][ T298] ORIG_RAX: 00000000000001b4 [ 26.971718][ T300] ? clear_bhb_loop+0x30/0x80 [ 26.977080][ T298] RAX: 0000000000000000 RBX: 00007fffd5800c80 RCX: 00007f01a4f47a19 [ 26.983133][ T300] ? clear_bhb_loop+0x30/0x80 [ 26.987538][ T298] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 26.992221][ T300] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 26.996881][ T298] RBP: 0000000000000001 R08: 00007fffd5800a07 R09: 0000000000000140 [ 27.004843][ T300] RIP: 0033:0x7f01a4f47a19 [ 27.009505][ T298] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [pid 296] close_range(0, 6, 0 [pid 301] <... bpf resumed>) = 5 [pid 301] bind(3, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16) = -1 EADDRINUSE (Address already in use) [pid 301] listen(3, 10) = -1 EINVAL (Invalid argument) [pid 301] socket(AF_VSOCK, SOCK_STREAM, 0) = 6 [pid 301] connect(6, {sa_family=AF_VSOCK, svm_cid=VMADDR_CID_LOCAL, svm_port=0, svm_flags=0}, 16) = 0 [pid 301] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 7 [pid 301] write(7, "2", 1) = 1 [pid 301] close_range(0, 6, 0 [pid 298] <... close_range resumed>) = 0 [pid 298] exit_group(0) = ? [pid 298] +++ exited with 0 +++ [pid 291] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=298, si_uid=0, si_status=0, si_utime=0, si_stime=36} --- [ 27.017464][ T300] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 27.023336][ T298] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 27.031300][ T300] RSP: 002b:00007fffd5800c68 EFLAGS: 00000246 [ 27.035711][ T298] [ 27.043675][ T300] ORIG_RAX: 00000000000001b4 [ 27.043685][ T300] RAX: 0000000000000000 RBX: 00007fffd5800c80 RCX: 00007f01a4f47a19 [ 27.069825][ T299] FAULT_INJECTION: forcing a failure. [ 27.069825][ T299] name failslab, interval 1, probability 0, space 0, times 0 [ 27.071237][ T300] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 27.083548][ T299] CPU: 1 PID: 299 Comm: syz-executor129 Not tainted 6.1.145-syzkaller-00002-gc750dc582629 #0 [ 27.085003][ T300] RBP: 0000000000000001 R08: 00007fffd5800a07 R09: 0000000000000140 [ 27.092983][ T299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 27.105546][ T300] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 27.113530][ T299] Call Trace: [ 27.113537][ T299] [ 27.123662][ T300] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 27.131628][ T299] __dump_stack+0x21/0x24 [ 27.141679][ T300] [ 27.149637][ T299] dump_stack_lvl+0xee/0x150 [ 27.152913][ T300] Modules linked in: [ 27.155838][ T299] ? __cfi_dump_stack_lvl+0x8/0x8 [ 27.163936][ T300] ---[ end trace 0000000000000000 ]--- [ 27.168118][ T299] ? ____fput+0x15/0x20 [ 27.168143][ T299] ? ptrace_notify+0x221/0x250 [ 27.171153][ T300] RIP: 0010:__traceiter_virtio_transport_alloc_pkt+0xac/0x110 [ 27.175770][ T299] ? syscall_exit_work+0x84/0x140 [ 27.179681][ T300] Code: 8b 7e 08 8b 75 d4 8b 55 d0 8b 4d cc 44 8b 45 c8 44 8b 4d c4 8b 45 20 50 ff 75 b8 41 55 41 ba 55 fe 7b 82 45 03 54 24 fc 74 02 <0f> 0b 41 ff d4 48 83 c4 18 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 [ 27.184671][ T299] ? syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 27.190141][ T300] RSP: 0018:ffffc90000eb77a8 EFLAGS: 00010a13 [ 27.194262][ T299] ? do_syscall_64+0x58/0xa0 [ 27.199035][ T300] [ 27.206462][ T299] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 27.211587][ T300] RAX: 0000000000000000 RBX: ffff8881034ddf28 RCX: 0000000000000001 [ 27.231168][ T299] dump_stack+0x15/0x24 [ 27.231198][ T299] should_fail_ex+0x3d4/0x520 [ 27.237525][ T300] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffc900000ed000 [ 27.243582][ T299] __should_failslab+0xac/0xf0 [ 27.243607][ T299] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 27.248193][ T300] RBP: ffffc90000eb7808 R08: 000000008caef9d3 R09: 0000000000000000 [ 27.250525][ T299] should_failslab+0x9/0x20 [ 27.256578][ T300] R10: 0000000027bc6561 R11: 1ffff920001d6ec5 R12: ffffffff81711ed0 [ 27.264542][ T299] __kmem_cache_alloc_node+0x3d/0x2c0 [ 27.268724][ T300] R13: 0000000000000001 R14: ffff8881034ddf28 R15: dffffc0000000000 [ 27.273368][ T299] ? __cfi_mutex_lock+0x10/0x10 [ 27.281349][ T300] FS: 000055558eb40380(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 27.286084][ T299] ? delete_node+0x3dc/0xa60 [ 27.292080][ T300] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 27.300020][ T299] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 27.304525][ T300] CR2: 000000002000ffff CR3: 00000001220ac000 CR4: 00000000003506b0 [ 27.312487][ T299] __kmalloc+0xa1/0x1e0 [ 27.317869][ T300] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 27.325829][ T299] ? __cfi___bpf_trace_virtio_transport_alloc_pkt+0x10/0x10 [ 27.330699][ T300] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 27.339608][ T299] tracepoint_probe_unregister+0x1e6/0x8b0 [ 27.344198][ T300] Kernel panic - not syncing: Fatal exception [ 27.350784][ T299] bpf_probe_unregister+0x61/0x70 [ 27.350810][ T299] bpf_raw_tp_link_release+0x63/0x90 [ 27.350830][ T299] bpf_link_free+0x13a/0x390 [ 27.350854][ T299] ? bpf_link_put_deferred+0x20/0x20 [ 27.350878][ T299] ? security_file_free+0xd8/0xf0 [ 27.350899][ T299] bpf_link_release+0x15f/0x170 [ 27.350914][ T299] ? __cfi_bpf_link_release+0x10/0x10 [ 27.350930][ T299] __fput+0x1fc/0x8f0 [ 27.350957][ T299] ____fput+0x15/0x20 [ 27.350975][ T299] task_work_run+0x1db/0x240 [ 27.350997][ T299] ? __cfi_task_work_run+0x10/0x10 [ 27.351017][ T299] ? fput+0x15b/0x1a0 [ 27.351035][ T299] ? filp_close+0x111/0x160 [ 27.351055][ T299] ptrace_notify+0x221/0x250 [ 27.351079][ T299] ? __cfi_ptrace_notify+0x10/0x10 [ 27.351104][ T299] ? __cfi___close_range+0x10/0x10 [ 27.351130][ T299] ? __secure_computing+0xea/0x290 [ 27.351149][ T299] syscall_exit_work+0x84/0x140 [ 27.351168][ T299] syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 27.351186][ T299] syscall_exit_to_user_mode+0xd/0x30 [ 27.351208][ T299] do_syscall_64+0x58/0xa0 [ 27.351233][ T299] ? clear_bhb_loop+0x30/0x80 [ 27.351252][ T299] ? clear_bhb_loop+0x30/0x80 [ 27.351272][ T299] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 27.351290][ T299] RIP: 0033:0x7f01a4f47a19 [ 27.351305][ T299] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 27.351320][ T299] RSP: 002b:00007fffd5800c68 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 27.351338][ T299] RAX: 0000000000000000 RBX: 00007fffd5800c80 RCX: 00007f01a4f47a19 [ 27.351350][ T299] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 27.351360][ T299] RBP: 0000000000000001 R08: 00007fffd5800a07 R09: 0000000000000140 [ 27.351371][ T299] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 27.351381][ T299] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 27.351395][ T299] [ 27.351728][ T300] Kernel Offset: disabled [ 27.601424][ T300] Rebooting in 86400 seconds..