./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3778732839 <...> Warning: Permanently added '10.128.0.104' (ED25519) to the list of known hosts. execve("./syz-executor3778732839", ["./syz-executor3778732839"], 0x7ffd31e1e8a0 /* 10 vars */) = 0 brk(NULL) = 0x55556e7e6000 brk(0x55556e7e6d00) = 0x55556e7e6d00 arch_prctl(ARCH_SET_FS, 0x55556e7e6380) = 0 set_tid_address(0x55556e7e6650) = 289 set_robust_list(0x55556e7e6660, 24) = 0 rseq(0x55556e7e6ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3778732839", 4096) = 28 getrandom("\xa1\xde\x6c\x6a\xcd\xf4\x5e\x13", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x55556e7e6d00 brk(0x55556e807d00) = 0x55556e807d00 brk(0x55556e808000) = 0x55556e808000 mprotect(0x7efff13c1000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0executing program ) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 openat(AT_FDCWD, "/proc/self/make-it-fail", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/failslab/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_futex/ignore-private", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/min-order", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55556e7e6650) = 290 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55556e7e6650) = 291 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55556e7e6650) = 292 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55556e7e6650) = 293 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55556e7e6650) = 294 ./strace-static-x86_64: Process 290 attached ./strace-static-x86_64: Process 294 attached [pid 290] set_robust_list(0x55556e7e6660, 24 [pid 294] set_robust_list(0x55556e7e6660, 24 [pid 290] <... set_robust_list resumed>) = 0 [pid 290] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 294] <... set_robust_list resumed>) = 0 [pid 294] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55556e7e6650) = 296 [pid 290] <... clone resumed>, child_tidptr=0x55556e7e6650) = 295 ./strace-static-x86_64: Process 295 attached [pid 295] set_robust_list(0x55556e7e6660, 24) = 0 [pid 295] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 295] setpgid(0, 0) = 0 [pid 295] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 295] write(3, "1000", 4) = 4 [pid 295] close(3) = 0 [pid 295] write(1, "executing program\n", 18) = 18 [pid 295] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) [pid 295] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=1024, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 295] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=0, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(20147, 186, 154), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address) [pid 295] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 295] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="percpu_free_percpu", prog_fd=4}}, 16) = 5 [pid 295] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000000}) = 0 [pid 295] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 6 [pid 295] write(6, "1", 1) = 1 [pid 295] close_range(0, 4294967295, 0./strace-static-x86_64: Process 296 attached ./strace-static-x86_64: Process 292 attached ./strace-static-x86_64: Process 291 attached [pid 296] set_robust_list(0x55556e7e6660, 24 [pid 295] <... close_range resumed>) = 0 [ 24.524133][ T28] audit: type=1400 audit(1748440934.544:64): avc: denied { execmem } for pid=289 comm="syz-executor377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 24.546668][ T295] FAULT_INJECTION: forcing a failure. [ 24.546668][ T295] name fail_page_alloc, interval 1, probability 0, space 0, times 1 ./strace-static-x86_64: Process 293 attached [pid 296] <... set_robust_list resumed>) = 0 [pid 292] set_robust_list(0x55556e7e6660, 24 [ 24.546995][ T28] audit: type=1400 audit(1748440934.554:65): avc: denied { bpf } for pid=295 comm="syz-executor377" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 24.561577][ T295] CPU: 1 PID: 295 Comm: syz-executor377 Not tainted 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 24.584098][ T28] audit: type=1400 audit(1748440934.554:66): avc: denied { prog_load } for pid=295 comm="syz-executor377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 24.593206][ T295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 24.593237][ T295] Call Trace: [ 24.593250][ T295] [ 24.593258][ T295] __dump_stack+0x21/0x24 [ 24.615858][ T28] audit: type=1400 audit(1748440934.554:67): avc: denied { map_create } for pid=295 comm="syz-executor377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 24.626454][ T295] dump_stack_lvl+0xee/0x150 [ 24.626494][ T295] ? __cfi_dump_stack_lvl+0x8/0x8 [pid 291] set_robust_list(0x55556e7e6660, 24 [pid 296] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 293] set_robust_list(0x55556e7e6660, 24 [pid 292] <... set_robust_list resumed>) = 0 [pid 291] <... set_robust_list resumed>) = 0 [pid 296] <... prctl resumed>) = 0 [pid 293] <... set_robust_list resumed>) = 0 [pid 292] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 291] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 296] setpgid(0, 0 [pid 293] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 296] <... setpgid resumed>) = 0 [pid 296] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 296] write(3, "1000", 4) = 4 [pid 293] <... clone resumed>, child_tidptr=0x55556e7e6650) = 299 [pid 291] <... clone resumed>, child_tidptr=0x55556e7e6650) = 298 [pid 296] close(3 [pid 292] <... clone resumed>, child_tidptr=0x55556e7e6650) = 297 executing program [pid 296] <... close resumed>) = 0 [pid 296] write(1, "executing program\n", 18) = 18 [pid 296] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) [pid 296] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=1024, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 296] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=0, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(20147, 186, 154), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address) [pid 296] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 296] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="percpu_free_percpu", prog_fd=4}}, 16./strace-static-x86_64: Process 299 attached [pid 299] set_robust_list(0x55556e7e6660, 24) = 0 [pid 299] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 299] setpgid(0, 0) = 0 [pid 299] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 299] write(3, "1000", 4) = 4 [pid 299] close(3) = 0 [pid 299] write(1, "executing program\n", 18executing program ) = 18 [pid 299] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) [pid 299] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=1024, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 299] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=0, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(20147, 186, 154), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address) [pid 299] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 299] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="percpu_free_percpu", prog_fd=4}}, 16./strace-static-x86_64: Process 297 attached [pid 297] set_robust_list(0x55556e7e6660, 24) = 0 [pid 297] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 297] setpgid(0, 0) = 0 [pid 297] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 297] write(3, "1000", 4) = 4 [pid 297] close(3) = 0 [pid 297] write(1, "executing program\n", 18executing program ) = 18 [pid 297] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) [pid 297] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=1024, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 297] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=0, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(20147, 186, 154), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address) [pid 297] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 297] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="percpu_free_percpu", prog_fd=4}}, 16./strace-static-x86_64: Process 298 attached [pid 298] set_robust_list(0x55556e7e6660, 24) = 0 [pid 298] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 298] setpgid(0, 0) = 0 [pid 298] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 298] write(3, "1000", 4) = 4 [pid 298] close(3) = 0 [pid 298] write(1, "executing program\n", 18executing program ) = 18 [pid 298] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) [pid 298] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=1024, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 298] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=0, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(20147, 186, 154), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address) [pid 298] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [ 24.629792][ T28] audit: type=1400 audit(1748440934.554:68): avc: denied { map_read map_write } for pid=295 comm="syz-executor377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 24.632967][ T295] ? resched_curr+0x10e/0x380 [ 24.638852][ T28] audit: type=1400 audit(1748440934.564:69): avc: denied { perfmon } for pid=295 comm="syz-executor377" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 24.660666][ T295] ? __cfi_resched_curr+0x10/0x10 [ 24.660703][ T295] dump_stack+0x15/0x24 [ 24.660729][ T295] should_fail_ex+0x3d4/0x520 [ 24.665734][ T28] audit: type=1400 audit(1748440934.564:70): avc: denied { prog_run } for pid=295 comm="syz-executor377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 24.670349][ T295] should_fail_alloc_page+0x61/0x90 [ 24.670387][ T295] prepare_alloc_pages+0x148/0x5f0 [ 24.763035][ T295] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 24.768234][ T295] ? __cfi_sched_clock_cpu+0x10/0x10 [ 24.773712][ T295] __alloc_pages+0x115/0x3a0 [ 24.778488][ T295] ? __cfi___alloc_pages+0x10/0x10 [ 24.783616][ T295] ? kvm_sched_clock_read+0x18/0x40 [ 24.788832][ T295] ? __this_cpu_preempt_check+0x13/0x20 [ 24.794463][ T295] ? xfd_validate_state+0x70/0x150 [ 24.799707][ T295] __folio_alloc+0x12/0x40 [ 24.804141][ T295] wp_page_copy+0x280/0x15b0 [ 24.808778][ T295] ? __switch_to+0x51f/0xe30 [ 24.813441][ T295] ? fault_dirty_shared_page+0x310/0x310 [ 24.819449][ T295] ? _raw_spin_unlock+0x4c/0x70 [ 24.824315][ T295] ? finish_task_switch+0x16b/0x7b0 [ 24.829531][ T295] ? vm_normal_page+0x99/0x200 [ 24.834327][ T295] do_wp_page+0x9f2/0xfc0 [ 24.838664][ T295] handle_mm_fault+0x10e4/0x2640 [ 24.843618][ T295] ? __cfi_handle_mm_fault+0x10/0x10 [ 24.849637][ T295] ? lock_vma_under_rcu+0x3eb/0x4d0 [ 24.854948][ T295] ? __this_cpu_preempt_check+0x13/0x20 [ 24.860682][ T295] ? xfd_validate_state+0x70/0x150 [ 24.866500][ T295] do_user_addr_fault+0x905/0x1050 [ 24.871643][ T295] exc_page_fault+0x51/0xb0 [ 24.876291][ T295] asm_exc_page_fault+0x27/0x30 [ 24.881415][ T295] RIP: 0033:0x7efff13243d0 [ 24.885853][ T295] Code: 41 54 55 48 89 f5 53 89 fb 48 83 ec 18 48 83 3d 1d 0c 0a 00 00 89 54 24 0c 74 08 84 c9 0f 85 09 02 00 00 31 c0 ba 01 00 00 00 0f b1 15 f0 39 0a 00 0f 85 0f 02 00 00 4c 8d 25 e3 39 0a 00 4c [ 24.905648][ T295] RSP: 002b:00007ffdaaf2e200 EFLAGS: 00010246 [ 24.912438][ T295] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001 [pid 298] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="percpu_free_percpu", prog_fd=4}}, 16 [pid 299] <... bpf resumed>) = 5 [pid 298] <... bpf resumed>) = 5 [pid 297] <... bpf resumed>) = 5 [pid 296] <... bpf resumed>) = 5 [pid 299] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000000} [pid 298] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000000} [pid 297] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000000} [pid 296] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000000} [pid 299] <... seccomp resumed>) = 0 [pid 298] <... seccomp resumed>) = 0 [pid 297] <... seccomp resumed>) = 0 [pid 296] <... seccomp resumed>) = 0 [pid 299] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR [pid 298] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR [pid 297] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR [pid 296] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR [pid 299] <... openat resumed>) = 6 [pid 298] <... openat resumed>) = 6 [pid 297] <... openat resumed>) = 6 [pid 296] <... openat resumed>) = 6 [pid 299] write(6, "1", 1 [pid 298] write(6, "1", 1 [pid 297] write(6, "1", 1 [pid 296] write(6, "1", 1 [pid 299] <... write resumed>) = 1 [pid 298] <... write resumed>) = 1 [pid 297] <... write resumed>) = 1 [ 24.921492][ T295] RDX: 0000000000000001 RSI: 00007efff13c5120 RDI: 0000000000000000 [ 24.930262][ T295] RBP: 00007efff13c5120 R08: 00007ffdaaf2dff7 R09: 0000000000000140 [ 24.939097][ T295] R10: 0000000000000001 R11: 0000000000000286 R12: 0000000000000000 [ 24.947696][ T295] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 24.957542][ T295] [ 24.963129][ T295] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [pid 296] <... write resumed>) = 1 [pid 299] close_range(0, 4294967295, 0 [pid 298] close_range(0, 4294967295, 0 [pid 297] close_range(0, 4294967295, 0 [pid 296] close_range(0, 4294967295, 0 [pid 295] exit_group(0) = ? [pid 295] +++ exited with 0 +++ [pid 290] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=295, si_uid=0, si_status=0, si_utime=0, si_stime=3} --- [ 24.979270][ T299] FAULT_INJECTION: forcing a failure. [ 24.979270][ T299] name failslab, interval 1, probability 0, space 0, times 1 [ 24.998465][ T299] CPU: 0 PID: 299 Comm: syz-executor377 Not tainted 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 25.009635][ T299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 25.022940][ T299] Call Trace: [pid 290] restart_syscall(<... resuming interrupted clone ...>executing program ) = 0 [pid 290] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x55556e7e6650) = 300 ./strace-static-x86_64: Process 300 attached [pid 300] set_robust_list(0x55556e7e6660, 24) = 0 [pid 300] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 300] setpgid(0, 0) = 0 [pid 300] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 300] write(3, "1000", 4) = 4 [pid 300] close(3) = 0 [pid 300] write(1, "executing program\n", 18) = 18 [pid 300] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = -1 EFAULT (Bad address) [pid 300] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_LPM_TRIE, key_size=5, value_size=1024, max_entries=9, map_flags=BPF_F_NO_PREALLOC, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3 [pid 300] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=0, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(20147, 186, 154), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address) [pid 300] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [ 25.027064][ T299] [ 25.030991][ T299] __dump_stack+0x21/0x24 [ 25.036464][ T299] dump_stack_lvl+0xee/0x150 [ 25.043755][ T299] ? __cfi_dump_stack_lvl+0x8/0x8 [ 25.049624][ T299] ? ____fput+0x15/0x20 [ 25.054280][ T299] ? ptrace_notify+0x221/0x250 [ 25.060253][ T299] ? syscall_exit_work+0x84/0x140 [ 25.065654][ T299] ? syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 25.072179][ T299] ? do_syscall_64+0x58/0xa0 [ 25.076873][ T299] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.083411][ T299] dump_stack+0x15/0x24 [ 25.087588][ T299] should_fail_ex+0x3d4/0x520 [ 25.092415][ T299] __should_failslab+0xac/0xf0 [ 25.097454][ T299] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 25.103966][ T299] should_failslab+0x9/0x20 [ 25.108573][ T299] __kmem_cache_alloc_node+0x3d/0x2c0 [ 25.113978][ T299] ? __cfi_mutex_lock+0x10/0x10 [ 25.119096][ T299] ? delete_node+0x3dc/0xa60 [ 25.123967][ T299] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 25.130503][ T299] __kmalloc+0xa1/0x1e0 [ 25.134790][ T299] ? __cfi___bpf_trace_percpu_free_percpu+0x10/0x10 [ 25.141861][ T299] tracepoint_probe_unregister+0x1e6/0x8b0 [ 25.147944][ T299] bpf_probe_unregister+0x61/0x70 [ 25.153337][ T299] bpf_raw_tp_link_release+0x63/0x90 [ 25.159590][ T299] bpf_link_free+0x13a/0x390 [ 25.165332][ T299] ? bpf_link_put_deferred+0x20/0x20 [ 25.171965][ T299] ? security_file_free+0xd8/0xf0 [ 25.177353][ T299] bpf_link_release+0x15f/0x170 [ 25.183558][ T299] ? __cfi_bpf_link_release+0x10/0x10 [ 25.189221][ T299] __fput+0x1fc/0x8f0 [ 25.193569][ T299] ____fput+0x15/0x20 [ 25.197556][ T299] task_work_run+0x1db/0x240 [ 25.202421][ T299] ? __cfi_task_work_run+0x10/0x10 [ 25.207794][ T299] ? fput+0x15b/0x1a0 [ 25.211773][ T299] ? filp_close+0x111/0x160 [ 25.216395][ T299] ptrace_notify+0x221/0x250 [ 25.221003][ T299] ? __cfi_ptrace_notify+0x10/0x10 [ 25.226117][ T299] ? __cfi___close_range+0x10/0x10 [ 25.231257][ T299] ? __secure_computing+0xea/0x290 [ 25.236361][ T299] syscall_exit_work+0x84/0x140 [ 25.241273][ T299] syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 25.248043][ T299] syscall_exit_to_user_mode+0xd/0x30 [ 25.254193][ T299] do_syscall_64+0x58/0xa0 [ 25.258724][ T299] ? clear_bhb_loop+0x15/0x70 [ 25.263592][ T299] ? clear_bhb_loop+0x15/0x70 [ 25.268279][ T299] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.274379][ T299] RIP: 0033:0x7efff1355c99 [ 25.278902][ T299] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 25.299547][ T299] RSP: 002b:00007ffdaaf2e258 EFLAGS: 00000286 ORIG_RAX: 00000000000001b4 [ 25.307968][ T299] RAX: 0000000000000000 RBX: 00007ffdaaf2e270 RCX: 00007efff1355c99 [ 25.316042][ T299] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000000 [pid 300] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="percpu_free_percpu", prog_fd=4}}, 16 [pid 299] <... close_range resumed>) = 0 [pid 299] exit_group(0) = ? [pid 299] +++ exited with 0 +++ [ 25.324107][ T299] RBP: 0000000000000001 R08: 00007ffdaaf2dff7 R09: 0000000000000140 [ 25.332082][ T299] R10: 0000000000000001 R11: 0000000000000286 R12: 0000000000000000 [ 25.340421][ T299] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 25.348401][ T299] [ 25.352463][ T298] FAULT_INJECTION: forcing a failure. [ 25.352463][ T298] name failslab, interval 1, probability 0, space 0, times 0 [ 25.355017][ T39] CFI failure at __traceiter_percpu_free_percpu+0x87/0xe0 (target: tp_stub_func+0x0/0x10; expected type: 0xc88d2a22) [ 25.366294][ T298] CPU: 0 PID: 298 Comm: syz-executor377 Not tainted 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 25.379523][ T39] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 25.390868][ T298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 25.397215][ T39] CPU: 1 PID: 39 Comm: kworker/1:1 Not tainted 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 25.407888][ T298] Call Trace: [ 25.407903][ T298] [ 25.417621][ T39] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 25.420984][ T298] __dump_stack+0x21/0x24 [ 25.424355][ T39] Workqueue: events bpf_prog_free_deferred [ 25.434422][ T298] dump_stack_lvl+0xee/0x150 [ 25.438735][ T39] [ 25.438744][ T39] RIP: 0010:__traceiter_percpu_free_percpu+0x87/0xe0 [ 25.444701][ T298] ? __cfi_dump_stack_lvl+0x8/0x8 [ 25.449282][ T39] Code: f8 48 c1 e8 03 80 3c 18 00 74 05 e8 a3 ff 0f 00 49 8b 7d 08 4c 89 fe 8b 55 d4 48 8b 4d c8 41 ba de d5 72 37 45 03 56 fc 74 02 <0f> 0b 41 ff d6 49 83 c4 18 4c 89 e0 48 c1 e8 03 80 3c 18 00 74 08 [ 25.451863][ T298] ? ____fput+0x15/0x20 [ 25.458878][ T39] RSP: 0018:ffffc9000028faf8 EFLAGS: 00010092 [ 25.464146][ T298] ? ptrace_notify+0x221/0x250 [ 25.484086][ T39] [ 25.484095][ T39] RAX: 1ffff11021194746 RBX: dffffc0000000000 RCX: 0000607e08c0fde0 [ 25.488349][ T298] ? syscall_exit_work+0x84/0x140 [ 25.494491][ T39] RDX: 000000000000fde0 RSI: ffffe8ffffc00000 RDI: ffffc900000f9000 [ 25.499340][ T298] ? syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 25.501834][ T39] RBP: ffffc9000028fb30 R08: dffffc0000000000 R09: fffffbfff0ee425e [ 25.510240][ T298] ? do_syscall_64+0x58/0xa0 [ 25.515286][ T39] R10: 00000000dcb33cea R11: 1ffffffff0ee425d R12: ffff888108ca3a28 [ 25.523538][ T298] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.529941][ T39] R13: ffff888108ca3a28 R14: ffffffff81710d60 R15: ffffe8ffffc00000 [ 25.538080][ T298] dump_stack+0x15/0x24 [ 25.542769][ T39] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 25.551557][ T298] should_fail_ex+0x3d4/0x520 [ 25.557790][ T39] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.565763][ T298] __should_failslab+0xac/0xf0 [ 25.569905][ T39] CR2: 00007efff13c81f0 CR3: 0000000006e0f000 CR4: 00000000003506a0 [ 25.579353][ T298] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 25.584100][ T39] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 25.590788][ T298] should_failslab+0x9/0x20 [ 25.595709][ T39] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 25.603765][ T298] __kmem_cache_alloc_node+0x3d/0x2c0 [ 25.609724][ T39] Call Trace: [ 25.609732][ T39] [ 25.617886][ T298] ? __cfi_mutex_lock+0x10/0x10 [ 25.622376][ T39] free_percpu+0xd09/0x1020 [ 25.630679][ T298] ? delete_node+0x3dc/0xa60 [ 25.636045][ T39] ? __cfi_free_percpu+0x10/0x10 [ 25.639501][ T298] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 25.642606][ T39] ? __bpf_prog_free+0x84/0xe0 [ 25.647447][ T298] __kmalloc+0xa1/0x1e0 [ 25.651938][ T39] ? __kmem_cache_free+0xb7/0x1b0 [ 25.656611][ T298] ? __cfi___bpf_trace_percpu_free_percpu+0x10/0x10 [ 25.661570][ T39] __bpf_prog_free+0xab/0xe0 [ 25.667566][ T298] tracepoint_probe_unregister+0x1e6/0x8b0 [ 25.672524][ T39] bpf_jit_free+0x1ae/0x1e0 [ 25.676785][ T298] bpf_probe_unregister+0x61/0x70 [ 25.681898][ T39] bpf_prog_free_deferred+0x614/0x720 [ 25.688482][ T298] bpf_raw_tp_link_release+0x63/0x90 [ 25.693061][ T39] process_one_work+0x71f/0xc40 [ 25.698854][ T298] bpf_link_free+0x13a/0x390 [ 25.703348][ T39] worker_thread+0xa29/0x11f0 [ 25.708369][ T298] ? bpf_link_put_deferred+0x20/0x20 [ 25.713924][ T39] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 25.719662][ T298] ? security_file_free+0xd8/0xf0 [ 25.724700][ T39] ? __kthread_parkme+0x142/0x180 [ 25.729901][ T298] bpf_link_release+0x15f/0x170 [ 25.734586][ T39] kthread+0x281/0x320 [ 25.739884][ T298] ? __cfi_bpf_link_release+0x10/0x10 [ 25.745413][ T39] ? __cfi_worker_thread+0x10/0x10 [ 25.750435][ T298] __fput+0x1fc/0x8f0 [ 25.755715][ T39] ? __cfi_kthread+0x10/0x10 [ 25.760653][ T298] ____fput+0x15/0x20 [ 25.764896][ T39] ret_from_fork+0x1f/0x30 [ 25.770248][ T298] task_work_run+0x1db/0x240 [ 25.775524][ T39] [ 25.779498][ T298] ? __cfi_task_work_run+0x10/0x10 [ 25.784322][ T39] Modules linked in: [ 25.784351][ T39] ---[ end trace 0000000000000000 ]--- [ 25.788518][ T298] ? fput+0x15b/0x1a0 [ 25.793120][ T39] RIP: 0010:__traceiter_percpu_free_percpu+0x87/0xe0 [ 25.797970][ T298] ? filp_close+0x111/0x160 [ 25.801068][ T39] Code: f8 48 c1 e8 03 80 3c 18 00 74 05 e8 a3 ff 0f 00 49 8b 7d 08 4c 89 fe 8b 55 d4 48 8b 4d c8 41 ba de d5 72 37 45 03 56 fc 74 02 <0f> 0b 41 ff d6 49 83 c4 18 4c 89 e0 48 c1 e8 03 80 3c 18 00 74 08 [ 25.806482][ T298] ptrace_notify+0x221/0x250 [ 25.810630][ T39] RSP: 0018:ffffc9000028faf8 EFLAGS: 00010092 [ 25.816631][ T298] ? __cfi_ptrace_notify+0x10/0x10 [ 25.820695][ T39] [ 25.820701][ T39] RAX: 1ffff11021194746 RBX: dffffc0000000000 RCX: 0000607e08c0fde0 [ 25.828005][ T298] ? __cfi___close_range+0x10/0x10 [ 25.832683][ T39] RDX: 000000000000fde0 RSI: ffffe8ffffc00000 RDI: ffffc900000f9000 [ 25.853300][ T298] ? __secure_computing+0xea/0x290 [ 25.858003][ T39] RBP: ffffc9000028fb30 R08: dffffc0000000000 R09: fffffbfff0ee425e [ 25.864172][ T298] syscall_exit_work+0x84/0x140 [ 25.869608][ T39] R10: 00000000dcb33cea R11: 1ffffffff0ee425d R12: ffff888108ca3a28 [ 25.872012][ T298] syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 25.880408][ T39] R13: ffff888108ca3a28 R14: ffffffff81710d60 R15: ffffe8ffffc00000 [ 25.885594][ T298] syscall_exit_to_user_mode+0xd/0x30 [ 25.893816][ T39] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 25.899021][ T298] do_syscall_64+0x58/0xa0 [ 25.907072][ T39] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.911934][ T298] ? clear_bhb_loop+0x15/0x70 [ 25.920075][ T39] CR2: 00007efff13c81f0 CR3: 0000000006e0f000 CR4: 00000000003506a0 [ 25.926263][ T298] ? clear_bhb_loop+0x15/0x70 [ 25.934250][ T39] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 25.939798][ T298] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.949622][ T39] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 25.954123][ T298] RIP: 0033:0x7efff1355c99 [ 25.961489][ T39] Kernel panic - not syncing: Fatal exception [ 25.966169][ T298] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 25.966187][ T298] RSP: 002b:00007ffdaaf2e258 EFLAGS: 00000286 ORIG_RAX: 00000000000001b4 [ 25.966212][ T298] RAX: 0000000000000000 RBX: 00007ffdaaf2e270 RCX: 00007efff1355c99 [ 25.966224][ T298] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000000 [ 25.966236][ T298] RBP: 0000000000000001 R08: 00007ffdaaf2dff7 R09: 0000000000000140 [ 25.966247][ T298] R10: 0000000000000001 R11: 0000000000000286 R12: 0000000000000000 [ 25.966257][ T298] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 25.966274][ T298] [ 25.966536][ T39] Kernel Offset: disabled [ 26.088056][ T39] Rebooting in 86400 seconds..