./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2278319158 <...> Warning: Permanently added '10.128.10.6' (ED25519) to the list of known hosts. execve("./syz-executor2278319158", ["./syz-executor2278319158"], 0x7fffc7a20850 /* 10 vars */) = 0 brk(NULL) = 0x555580cd6000 brk(0x555580cd6d00) = 0x555580cd6d00 arch_prctl(ARCH_SET_FS, 0x555580cd6380) = 0 set_tid_address(0x555580cd6650) = 5225 set_robust_list(0x555580cd6660, 24) = 0 rseq(0x555580cd6ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2278319158", 4096) = 28 getrandom("\x90\xf2\x5f\xde\x20\x08\x3e\xe6", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555580cd6d00 brk(0x555580cf7d00) = 0x555580cf7d00 brk(0x555580cf8000) = 0x555580cf8000 mprotect(0x7f409a8c5000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 openat(AT_FDCWD, "/proc/self/make-it-fail", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/failslab/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_futex/ignore-private", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/min-order", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5226 attached [pid 5226] set_robust_list(0x555580cd6660, 24 [pid 5225] <... clone resumed>, child_tidptr=0x555580cd6650) = 5226 [pid 5226] <... set_robust_list resumed>) = 0 [pid 5226] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5226] setpgid(0, 0) = 0 [pid 5226] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5226] write(3, "1000", 4) = 4 [pid 5226] close(3) = 0 executing program [pid 5226] write(1, "executing program\n", 18) = 18 [pid 5226] creat("./file0", 000) = 3 [pid 5226] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_PROG_ARRAY, key_size=4, value_size=4, max_entries=10, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 4 [pid 5226] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_KPROBE, insn_cnt=8, insns=0x20000000, license="syzkaller", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=0x30 /* BPF_??? */, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 5 [pid 5226] bpf(BPF_LINK_CREATE, {link_create={prog_fd=5, target_fd=-1, attach_type=0x30 /* BPF_??? */, flags=0}, ...}, 64) = 6 [pid 5226] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_KPROBE, insn_cnt=8, insns=0x20000000, license="syzkaller", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=0x30 /* BPF_??? */, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 7 [pid 5226] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 8 [pid 5226] write(8, "8", 1) = 1 [ 54.092440][ T5226] FAULT_INJECTION: forcing a failure. [ 54.092440][ T5226] name failslab, interval 1, probability 0, space 0, times 1 [ 54.105212][ T5226] CPU: 1 UID: 0 PID: 5226 Comm: syz-executor227 Not tainted 6.11.0-rc3-next-20240816-syzkaller #0 [ 54.115787][ T5226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 54.125852][ T5226] Call Trace: [ 54.129119][ T5226] [ 54.132036][ T5226] dump_stack_lvl+0x241/0x360 [ 54.136727][ T5226] ? __pfx_dump_stack_lvl+0x10/0x10 [ 54.141911][ T5226] ? __pfx__printk+0x10/0x10 [ 54.146489][ T5226] ? kmem_cache_alloc_lru_noprof+0x49/0x2b0 [ 54.152368][ T5226] ? __pfx___might_resched+0x10/0x10 [ 54.157643][ T5226] should_fail_ex+0x3b0/0x4e0 [ 54.162316][ T5226] ? __d_alloc+0x31/0x700 [ 54.166634][ T5226] should_failslab+0xac/0x100 [ 54.171301][ T5226] ? __d_alloc+0x31/0x700 [ 54.175614][ T5226] kmem_cache_alloc_lru_noprof+0x71/0x2b0 [ 54.181328][ T5226] ? mark_lock+0x9a/0x350 [ 54.185660][ T5226] __d_alloc+0x31/0x700 [ 54.189822][ T5226] d_alloc_pseudo+0x1f/0xb0 [ 54.194312][ T5226] alloc_file_pseudo+0x123/0x290 [ 54.199235][ T5226] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 54.204678][ T5226] ? __local_bh_enable_ip+0x168/0x200 [ 54.210038][ T5226] ? bpf_link_prime+0x7a/0x240 [ 54.214796][ T5226] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 54.220513][ T5226] anon_inode_getfile+0xc8/0x180 [ 54.225443][ T5226] bpf_link_prime+0xff/0x240 [ 54.230021][ T5226] bpf_uprobe_multi_link_attach+0xa46/0xb90 [ 54.235912][ T5226] ? __pfx_bpf_uprobe_multi_link_attach+0x10/0x10 [ 54.242321][ T5226] ? __pfx_lock_release+0x10/0x10 [ 54.247351][ T5226] ? bpf_prog_attach_check_attach_type+0x3e7/0x4b0 [ 54.253840][ T5226] link_create+0x6e9/0x870 [ 54.258248][ T5226] __sys_bpf+0x4bc/0x810 [ 54.262481][ T5226] ? __pfx___sys_bpf+0x10/0x10 [ 54.267238][ T5226] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 54.273554][ T5226] ? do_syscall_64+0x100/0x230 [ 54.278312][ T5226] __x64_sys_bpf+0x7c/0x90 [ 54.282731][ T5226] do_syscall_64+0xf3/0x230 [ 54.287223][ T5226] ? clear_bhb_loop+0x35/0x90 [ 54.291887][ T5226] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 54.297780][ T5226] RIP: 0033:0x7f409a859b29 [ 54.302181][ T5226] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.321771][ T5226] RSP: 002b:00007fff689d0ba8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 54.330171][ T5226] RAX: ffffffffffffffda RBX: 00007fff689d0bc0 RCX: 00007f409a859b29 [pid 5226] bpf(BPF_LINK_CREATE, {link_create={prog_fd=7, target_fd=-1, attach_type=0x30 /* BPF_??? */, flags=0}, ...}, 64) = -1 ENOMEM (Cannot allocate memory) [pid 5226] exit_group(0) = ? [ 54.338126][ T5226] RDX: 0000000000000040 RSI: 00000000200002c0 RDI: 000000000000001c [ 54.346083][ T5226] RBP: 0000000000000001 R08: 00007fff689d0947 R09: 00000000000000a0 [ 54.354044][ T5226] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 54.361999][ T5226] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 [ 54.369961][ T5226] [ 54.383053][ T5226] ================================================================== [ 54.391123][ T5226] BUG: KASAN: slab-use-after-free in uprobe_unregister+0x99/0x220 [ 54.398933][ T5226] Read of size 8 at addr ffff888022b9eb40 by task syz-executor227/5226 [ 54.407165][ T5226] [ 54.409469][ T5226] CPU: 0 UID: 0 PID: 5226 Comm: syz-executor227 Not tainted 6.11.0-rc3-next-20240816-syzkaller #0 [ 54.420026][ T5226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 54.430089][ T5226] Call Trace: [ 54.433353][ T5226] [ 54.436272][ T5226] dump_stack_lvl+0x241/0x360 [ 54.440935][ T5226] ? __pfx_dump_stack_lvl+0x10/0x10 [ 54.446118][ T5226] ? __pfx__printk+0x10/0x10 [ 54.450689][ T5226] ? _printk+0xd5/0x120 [ 54.454829][ T5226] ? __virt_addr_valid+0x183/0x530 [ 54.459929][ T5226] ? __virt_addr_valid+0x183/0x530 [ 54.465035][ T5226] print_report+0x169/0x550 [ 54.469528][ T5226] ? __virt_addr_valid+0x183/0x530 [ 54.474623][ T5226] ? __virt_addr_valid+0x183/0x530 [ 54.479733][ T5226] ? __virt_addr_valid+0x45f/0x530 [ 54.484834][ T5226] ? __phys_addr+0xba/0x170 [ 54.489324][ T5226] ? uprobe_unregister+0x99/0x220 [ 54.494337][ T5226] kasan_report+0x143/0x180 [ 54.498830][ T5226] ? uprobe_unregister+0x99/0x220 [ 54.503843][ T5226] uprobe_unregister+0x99/0x220 [ 54.508683][ T5226] bpf_uprobe_multi_link_release+0x8c/0x1b0 [ 54.514572][ T5226] bpf_link_free+0xf5/0x250 [ 54.519066][ T5226] bpf_link_release+0x7b/0x90 [ 54.523738][ T5226] ? __pfx_bpf_link_release+0x10/0x10 [ 54.529101][ T5226] __fput+0x24b/0x890 [ 54.533078][ T5226] task_work_run+0x24f/0x310 [ 54.537656][ T5226] ? __pfx_task_work_run+0x10/0x10 [ 54.542758][ T5226] ? switch_task_namespaces+0xe4/0x110 [ 54.548207][ T5226] do_exit+0xa2f/0x28e0 [ 54.552352][ T5226] ? __pfx_do_exit+0x10/0x10 [ 54.556927][ T5226] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 54.562895][ T5226] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 54.569213][ T5226] ? _raw_spin_unlock_irq+0x23/0x50 [ 54.574413][ T5226] ? lockdep_hardirqs_on+0x99/0x150 [ 54.579608][ T5226] do_group_exit+0x207/0x2c0 [ 54.584187][ T5226] __x64_sys_exit_group+0x3f/0x40 [ 54.589198][ T5226] x64_sys_call+0x26a8/0x26b0 [ 54.593864][ T5226] do_syscall_64+0xf3/0x230 [ 54.598355][ T5226] ? clear_bhb_loop+0x35/0x90 [ 54.603029][ T5226] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 54.608917][ T5226] RIP: 0033:0x7f409a857c79 [ 54.613316][ T5226] Code: Unable to access opcode bytes at 0x7f409a857c4f. [ 54.620314][ T5226] RSP: 002b:00007fff689d0b48 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 54.628717][ T5226] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f409a857c79 [ 54.636693][ T5226] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 54.644667][ T5226] RBP: 00007f409a8cb370 R08: ffffffffffffffb8 R09: 00000000000000a0 [ 54.652630][ T5226] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f409a8cb370 [ 54.660589][ T5226] R13: 0000000000000000 R14: 00007f409a8cbdc0 R15: 00007f409a821340 [ 54.668556][ T5226] [ 54.671562][ T5226] [ 54.673870][ T5226] Allocated by task 5226: [ 54.678176][ T5226] kasan_save_track+0x3f/0x80 [ 54.682842][ T5226] __kasan_kmalloc+0x98/0xb0 [ 54.687417][ T5226] __kmalloc_node_noprof+0x22a/0x440 [ 54.692689][ T5226] __kvmalloc_node_noprof+0x72/0x1b0 [ 54.697959][ T5226] bpf_uprobe_multi_link_attach+0x43e/0xb90 [ 54.703842][ T5226] link_create+0x6e9/0x870 [ 54.708245][ T5226] __sys_bpf+0x4bc/0x810 [ 54.712474][ T5226] __x64_sys_bpf+0x7c/0x90 [ 54.716876][ T5226] do_syscall_64+0xf3/0x230 [ 54.721368][ T5226] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 54.727251][ T5226] [ 54.729555][ T5226] Freed by task 5226: [ 54.733514][ T5226] kasan_save_track+0x3f/0x80 [ 54.738174][ T5226] kasan_save_free_info+0x40/0x50 [ 54.743185][ T5226] __kasan_slab_free+0x59/0x70 [ 54.747933][ T5226] kfree+0x196/0x3e0 [ 54.751811][ T5226] bpf_uprobe_multi_link_attach+0xa7d/0xb90 [ 54.757693][ T5226] link_create+0x6e9/0x870 [ 54.762097][ T5226] __sys_bpf+0x4bc/0x810 [ 54.766328][ T5226] __x64_sys_bpf+0x7c/0x90 [ 54.770728][ T5226] do_syscall_64+0xf3/0x230 [ 54.775223][ T5226] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 54.781110][ T5226] [ 54.783419][ T5226] The buggy address belongs to the object at ffff888022b9eb00 [ 54.783419][ T5226] which belongs to the cache kmalloc-96 of size 96 [ 54.797277][ T5226] The buggy address is located 64 bytes inside of [ 54.797277][ T5226] freed 96-byte region [ffff888022b9eb00, ffff888022b9eb60) [ 54.810882][ T5226] [ 54.813188][ T5226] The buggy address belongs to the physical page: [ 54.819593][ T5226] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888022b9e400 pfn:0x22b9e [ 54.829640][ T5226] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 54.836730][ T5226] page_type: 0xfdffffff(slab) [ 54.841395][ T5226] raw: 00fff00000000000 ffff888015841280 ffffea000061ec40 dead000000000004 [ 54.849962][ T5226] raw: ffff888022b9e400 000000008020001f 00000001fdffffff 0000000000000000 [ 54.858523][ T5226] page dumped because: kasan: bad access detected [ 54.864922][ T5226] page_owner tracks the page as allocated [ 54.870616][ T5226] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52c40(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 4681, tgid 4681 (udevd), ts 17930004975, free_ts 17928166567 [ 54.889086][ T5226] post_alloc_hook+0x1f3/0x230 [ 54.893841][ T5226] get_page_from_freelist+0x3004/0x30c0 [ 54.899370][ T5226] __alloc_pages_noprof+0x29e/0x780 [ 54.904552][ T5226] alloc_slab_page+0x5f/0x120 [ 54.909211][ T5226] allocate_slab+0x5a/0x2f0 [ 54.913697][ T5226] ___slab_alloc+0xcd1/0x14b0 [ 54.918362][ T5226] __slab_alloc+0x58/0xa0 [ 54.922679][ T5226] __kmalloc_noprof+0x25a/0x400 [ 54.927518][ T5226] tomoyo_encode+0x26f/0x540 [ 54.932096][ T5226] tomoyo_realpath_from_path+0x59e/0x5e0 [ 54.937715][ T5226] tomoyo_check_open_permission+0x255/0x500 [ 54.943599][ T5226] security_file_open+0x6a/0x750 [ 54.948520][ T5226] do_dentry_open+0x359/0x13f0 [ 54.953271][ T5226] vfs_open+0x3e/0x330 [ 54.957325][ T5226] path_openat+0x2c87/0x3590 [ 54.961901][ T5226] do_filp_open+0x235/0x490 [ 54.966387][ T5226] page last free pid 4688 tgid 4688 stack trace: [ 54.972693][ T5226] free_unref_page+0xc07/0xd90 [ 54.977441][ T5226] __slab_free+0x31b/0x3d0 [ 54.981839][ T5226] qlist_free_all+0x9e/0x140 [ 54.986412][ T5226] kasan_quarantine_reduce+0x14f/0x170 [ 54.991853][ T5226] __kasan_slab_alloc+0x23/0x80 [ 54.996687][ T5226] __kmalloc_cache_noprof+0x132/0x2c0 [ 55.002047][ T5226] kernfs_fop_open+0x3e0/0xd10 [ 55.006796][ T5226] do_dentry_open+0x928/0x13f0 [ 55.011544][ T5226] vfs_open+0x3e/0x330 [ 55.015598][ T5226] path_openat+0x2c87/0x3590 [ 55.020170][ T5226] do_filp_open+0x235/0x490 [ 55.024657][ T5226] do_sys_openat2+0x13e/0x1d0 [ 55.029322][ T5226] __x64_sys_openat+0x247/0x2a0 [ 55.034158][ T5226] do_syscall_64+0xf3/0x230 [ 55.038647][ T5226] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.044528][ T5226] [ 55.046835][ T5226] Memory state around the buggy address: [ 55.052445][ T5226] ffff888022b9ea00: 00 00 00 00 00 00 00 00 00 00 00 06 fc fc fc fc [ 55.060486][ T5226] ffff888022b9ea80: 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc [ 55.068526][ T5226] >ffff888022b9eb00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 55.076562][ T5226] ^ [ 55.082696][ T5226] ffff888022b9eb80: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc [ 55.090737][ T5226] ffff888022b9ec00: 00 00 00 00 00 00 00 00 00 00 00 06 fc fc fc fc [ 55.098778][ T5226] ================================================================== [ 55.107115][ T5226] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 55.114312][ T5226] CPU: 1 UID: 0 PID: 5226 Comm: syz-executor227 Not tainted 6.11.0-rc3-next-20240816-syzkaller #0 [ 55.124881][ T5226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 55.134918][ T5226] Call Trace: [ 55.138180][ T5226] [ 55.141101][ T5226] dump_stack_lvl+0x241/0x360 [ 55.145772][ T5226] ? __pfx_dump_stack_lvl+0x10/0x10 [ 55.150958][ T5226] ? __pfx__printk+0x10/0x10 [ 55.155539][ T5226] ? preempt_schedule+0xe1/0xf0 [ 55.160376][ T5226] ? vscnprintf+0x5d/0x90 [ 55.164692][ T5226] panic+0x349/0x870 [ 55.168580][ T5226] ? check_panic_on_warn+0x21/0xb0 [ 55.173678][ T5226] ? __pfx_panic+0x10/0x10 [ 55.178087][ T5226] ? _raw_spin_unlock_irqrestore+0x130/0x140 [ 55.184053][ T5226] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 55.190366][ T5226] ? print_report+0x502/0x550 [ 55.195031][ T5226] check_panic_on_warn+0x86/0xb0 [ 55.199952][ T5226] ? uprobe_unregister+0x99/0x220 [ 55.204980][ T5226] end_report+0x77/0x160 [ 55.209218][ T5226] kasan_report+0x154/0x180 [ 55.213723][ T5226] ? uprobe_unregister+0x99/0x220 [ 55.218749][ T5226] uprobe_unregister+0x99/0x220 [ 55.223592][ T5226] bpf_uprobe_multi_link_release+0x8c/0x1b0 [ 55.229479][ T5226] bpf_link_free+0xf5/0x250 [ 55.233980][ T5226] bpf_link_release+0x7b/0x90 [ 55.238644][ T5226] ? __pfx_bpf_link_release+0x10/0x10 [ 55.244008][ T5226] __fput+0x24b/0x890 [ 55.247979][ T5226] task_work_run+0x24f/0x310 [ 55.252555][ T5226] ? __pfx_task_work_run+0x10/0x10 [ 55.257656][ T5226] ? switch_task_namespaces+0xe4/0x110 [ 55.263110][ T5226] do_exit+0xa2f/0x28e0 [ 55.267259][ T5226] ? __pfx_do_exit+0x10/0x10 [ 55.271842][ T5226] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 55.277820][ T5226] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 55.284141][ T5226] ? _raw_spin_unlock_irq+0x23/0x50 [ 55.289324][ T5226] ? lockdep_hardirqs_on+0x99/0x150 [ 55.294510][ T5226] do_group_exit+0x207/0x2c0 [ 55.299088][ T5226] __x64_sys_exit_group+0x3f/0x40 [ 55.304099][ T5226] x64_sys_call+0x26a8/0x26b0 [ 55.308765][ T5226] do_syscall_64+0xf3/0x230 [ 55.313257][ T5226] ? clear_bhb_loop+0x35/0x90 [ 55.317919][ T5226] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.323806][ T5226] RIP: 0033:0x7f409a857c79 [ 55.328206][ T5226] Code: Unable to access opcode bytes at 0x7f409a857c4f. [ 55.335205][ T5226] RSP: 002b:00007fff689d0b48 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 55.343605][ T5226] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f409a857c79 [ 55.351565][ T5226] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 55.359520][ T5226] RBP: 00007f409a8cb370 R08: ffffffffffffffb8 R09: 00000000000000a0 [ 55.367476][ T5226] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f409a8cb370 [ 55.375430][ T5226] R13: 0000000000000000 R14: 00007f409a8cbdc0 R15: 00007f409a821340 [ 55.383389][ T5226] [ 55.386600][ T5226] Kernel Offset: disabled [ 55.390908][ T5226] Rebooting in 86400 seconds..