./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor3064310549 <...> Warning: Permanently added '10.128.0.141' (ED25519) to the list of known hosts. execve("./syz-executor3064310549", ["./syz-executor3064310549"], 0x7fff59491740 /* 10 vars */) = 0 brk(NULL) = 0x555588761000 brk(0x555588761d00) = 0x555588761d00 arch_prctl(ARCH_SET_FS, 0x555588761380) = 0 set_tid_address(0x555588761650) = 289 set_robust_list(0x555588761660, 24) = 0 rseq(0x555588761ca0, 0x20, 0, 0x53053053) = -1 ENOSYS (Function not implemented) prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor3064310549", 4096) = 28 getrandom("\xca\xf5\x69\x6d\x86\x8f\x00\x2a", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555588761d00 brk(0x555588782d00) = 0x555588782d00 brk(0x555588783000) = 0x555588783000 mprotect(0x7faaf5e67000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 openat(AT_FDCWD, "/proc/self/make-it-fail", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/failslab/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_futex/ignore-private", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/min-order", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555588761650) = 290 ./strace-static-x86_64: Process 290 attached [pid 289] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 290] set_robust_list(0x555588761660, 24) = 0 [pid 290] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 289] <... clone resumed>, child_tidptr=0x555588761650) = 291 ./strace-static-x86_64: Process 291 attached [pid 289] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 290] <... clone resumed>, child_tidptr=0x555588761650) = 292 ./strace-static-x86_64: Process 292 attached [pid 292] set_robust_list(0x555588761660, 24) = 0 [pid 292] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 291] set_robust_list(0x555588761660, 24 [pid 292] setpgid(0, 0) = 0 [pid 289] <... clone resumed>, child_tidptr=0x555588761650) = 293 [pid 292] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 291] <... set_robust_list resumed>) = 0 ./strace-static-x86_64: Process 293 attached [pid 289] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLDexecuting program [pid 292] <... openat resumed>) = 3 [pid 292] write(3, "1000", 4 [pid 291] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 292] <... write resumed>) = 4 [pid 292] close(3) = 0 [pid 292] write(1, "executing program\n", 18) = 18 [pid 292] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_BLOOM_FILTER, key_size=0, value_size=4, max_entries=255, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80./strace-static-x86_64: Process 295 attached [pid 293] set_robust_list(0x555588761660, 24 [pid 289] <... clone resumed>, child_tidptr=0x555588761650) = 294 [pid 291] <... clone resumed>, child_tidptr=0x555588761650) = 295 [pid 293] <... set_robust_list resumed>) = 0 [pid 289] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 293] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 296 attached ./strace-static-x86_64: Process 294 attached [pid 295] set_robust_list(0x555588761660, 24 [pid 292] <... bpf resumed>) = 3 [pid 289] <... clone resumed>, child_tidptr=0x555588761650) = 296 [pid 293] <... clone resumed>, child_tidptr=0x555588761650) = 297 [pid 295] <... set_robust_list resumed>) = 0 [pid 295] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 295] setpgid(0, 0) = 0 [pid 295] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 295] write(3, "1000", 4) = 4 [pid 295] close(3) = 0 [pid 295] write(1, "executing program\n", 18executing program ) = 18 [pid 295] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_BLOOM_FILTER, key_size=0, value_size=4, max_entries=255, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80) = 3 [pid 295] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(4, 17, 0), prog_flags=0x40 /* BPF_F_??? */, prog_name="", prog_ifindex=0, expected_attach_type=BPF_XDP, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL, ...}, 148) = -1 EINVAL (Invalid argument) [pid 295] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 295] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="sys_enter", prog_fd=4}}, 16 [pid 292] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(4, 17, 0), prog_flags=0x40 /* BPF_F_??? */, prog_name="", prog_ifindex=0, expected_attach_type=BPF_XDP, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL, ...}, 148) = -1 EINVAL (Invalid argument) [pid 292] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144./strace-static-x86_64: Process 297 attached [pid 294] set_robust_list(0x555588761660, 24 [pid 292] <... bpf resumed>) = 4 [pid 296] set_robust_list(0x555588761660, 24 [pid 294] <... set_robust_list resumed>) = 0 [pid 297] set_robust_list(0x555588761660, 24 [pid 296] <... set_robust_list resumed>) = 0 [ 25.135030][ T28] audit: type=1400 audit(1746887965.483:64): avc: denied { execmem } for pid=289 comm="syz-executor306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 25.159881][ T28] audit: type=1400 audit(1746887965.503:65): avc: denied { bpf } for pid=292 comm="syz-executor306" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [pid 297] <... set_robust_list resumed>) = 0 [pid 296] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 294] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD [pid 292] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="sys_enter", prog_fd=4}}, 16 [pid 297] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 292] <... bpf resumed>) = 5 [pid 292] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000000}) = 0 [pid 297] <... prctl resumed>) = 0 [pid 296] <... clone resumed>, child_tidptr=0x555588761650) = 298 [pid 292] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR./strace-static-x86_64: Process 298 attached [pid 297] setpgid(0, 0 [pid 294] <... clone resumed>, child_tidptr=0x555588761650) = 299 [pid 292] <... openat resumed>) = 6 [pid 292] write(6, "1", 1) = 1 [pid 292] close_range(0, 4294967295, 0 [pid 298] set_robust_list(0x555588761660, 24 [pid 297] <... setpgid resumed>) = 0 [pid 295] <... bpf resumed>) = 5 [ 25.182626][ T28] audit: type=1400 audit(1746887965.503:66): avc: denied { map_create } for pid=292 comm="syz-executor306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 25.203913][ T28] audit: type=1400 audit(1746887965.503:67): avc: denied { map_read map_write } for pid=292 comm="syz-executor306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 25.204797][ T292] FAULT_INJECTION: forcing a failure. [pid 295] seccomp(SECCOMP_SET_MODE_FILTER, 0, {len=1, filter=0x200000000000}) = 0 [pid 295] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 6 [pid 295] write(6, "1", 1) = 1 [pid 295] close_range(0, 4294967295, 0./strace-static-x86_64: Process 299 attached [pid 299] set_robust_list(0x555588761660, 24) = 0 [pid 299] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 299] setpgid(0, 0) = 0 [pid 299] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXECexecuting program ) = 3 [pid 299] write(3, "1000", 4) = 4 [pid 299] close(3) = 0 [pid 299] write(1, "executing program\n", 18) = 18 [pid 299] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_BLOOM_FILTER, key_size=0, value_size=4, max_entries=255, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80) = 3 [pid 299] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(4, 17, 0), prog_flags=0x40 /* BPF_F_??? */, prog_name="", prog_ifindex=0, expected_attach_type=BPF_XDP, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL, ...}, 148) = -1 EINVAL (Invalid argument) [pid 299] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [ 25.204797][ T292] name failslab, interval 1, probability 0, space 0, times 1 [ 25.224689][ T28] audit: type=1400 audit(1746887965.513:68): avc: denied { prog_load } for pid=295 comm="syz-executor306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 25.245385][ T292] CPU: 1 PID: 292 Comm: syz-executor306 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [pid 299] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="sys_enter", prog_fd=4}}, 16executing program executing program [pid 298] <... set_robust_list resumed>) = 0 [pid 297] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 298] prctl(PR_SET_PDEATHSIG, SIGKILL [pid 297] <... openat resumed>) = 3 [pid 298] <... prctl resumed>) = 0 [pid 297] write(3, "1000", 4 [pid 298] setpgid(0, 0 [pid 297] <... write resumed>) = 4 [pid 298] <... setpgid resumed>) = 0 [pid 297] close(3 [pid 298] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC [pid 297] <... close resumed>) = 0 [pid 298] <... openat resumed>) = 3 [pid 297] write(1, "executing program\n", 18 [pid 298] write(3, "1000", 4 [pid 297] <... write resumed>) = 18 [pid 298] <... write resumed>) = 4 [pid 297] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_BLOOM_FILTER, key_size=0, value_size=4, max_entries=255, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80 [pid 298] close(3 [pid 297] <... bpf resumed>) = 3 [pid 298] <... close resumed>) = 0 [pid 297] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(4, 17, 0), prog_flags=0x40 /* BPF_F_??? */, prog_name="", prog_ifindex=0, expected_attach_type=BPF_XDP, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL, ...}, 148 [pid 298] write(1, "executing program\n", 18 [pid 297] <... bpf resumed>) = -1 EINVAL (Invalid argument) [pid 298] <... write resumed>) = 18 [pid 297] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144 [pid 298] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_BLOOM_FILTER, key_size=0, value_size=4, max_entries=255, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80 [pid 297] <... bpf resumed>) = 4 [pid 298] <... bpf resumed>) = 3 [pid 297] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="sys_enter", prog_fd=4}}, 16 [pid 298] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(4, 17, 0), prog_flags=0x40 /* BPF_F_??? */, prog_name="", prog_ifindex=0, expected_attach_type=BPF_XDP, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL, ...}, 148) = -1 EINVAL (Invalid argument) [pid 298] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [ 25.257180][ T28] audit: type=1400 audit(1746887965.513:69): avc: denied { perfmon } for pid=295 comm="syz-executor306" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 25.266257][ T292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 25.266283][ T292] Call Trace: [ 25.266289][ T292] [ 25.266297][ T292] __dump_stack+0x21/0x24 [ 25.287855][ T28] audit: type=1400 audit(1746887965.513:70): avc: denied { prog_run } for pid=295 comm="syz-executor306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 25.297549][ T292] dump_stack_lvl+0xee/0x150 [ 25.297587][ T292] ? __cfi_dump_stack_lvl+0x8/0x8 [ 25.297612][ T292] ? ____fput+0x15/0x20 [ 25.341590][ T292] ? ptrace_notify+0x221/0x250 [ 25.346365][ T292] ? syscall_exit_work+0x84/0x140 [ 25.351417][ T292] ? syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 25.357738][ T292] ? do_syscall_64+0x58/0xa0 [ 25.362355][ T292] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.368453][ T292] dump_stack+0x15/0x24 [ 25.372622][ T292] should_fail_ex+0x3d4/0x520 [ 25.377388][ T292] __should_failslab+0xac/0xf0 [ 25.382329][ T292] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 25.388338][ T292] should_failslab+0x9/0x20 [ 25.392859][ T292] __kmem_cache_alloc_node+0x3d/0x2c0 [ 25.398237][ T292] ? __cfi_mutex_lock+0x10/0x10 [ 25.403103][ T292] ? delete_node+0x3e6/0xa60 [ 25.407726][ T292] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 25.413745][ T292] __kmalloc+0xa1/0x1e0 [ 25.417918][ T292] ? __cfi___bpf_trace_sys_enter+0x10/0x10 [ 25.423727][ T292] tracepoint_probe_unregister+0x1e6/0x8b0 [ 25.429551][ T292] bpf_probe_unregister+0x61/0x70 [ 25.434582][ T292] bpf_raw_tp_link_release+0x63/0x90 [ 25.439919][ T292] bpf_link_free+0x13a/0x390 [ 25.444508][ T292] ? bpf_link_put_deferred+0x20/0x20 [ 25.449892][ T292] ? security_file_free+0xd8/0xf0 [ 25.454916][ T292] bpf_link_release+0x15f/0x170 [ 25.459780][ T292] ? __cfi_bpf_link_release+0x10/0x10 [ 25.465159][ T292] __fput+0x1fc/0x8f0 [ 25.469150][ T292] ____fput+0x15/0x20 [ 25.473134][ T292] task_work_run+0x1db/0x240 [ 25.477723][ T292] ? __cfi_task_work_run+0x10/0x10 [ 25.482841][ T292] ? fput+0x15b/0x1a0 [ 25.486894][ T292] ? filp_close+0x111/0x160 [ 25.491396][ T292] ptrace_notify+0x221/0x250 [ 25.495993][ T292] ? __cfi_ptrace_notify+0x10/0x10 [ 25.501107][ T292] ? __cfi___close_range+0x10/0x10 [ 25.506223][ T292] ? __bpf_trace_sys_enter+0x62/0x70 [ 25.511505][ T292] syscall_exit_work+0x84/0x140 [ 25.516362][ T292] syscall_exit_to_user_mode_prepare+0x1c/0x20 [ 25.522514][ T292] syscall_exit_to_user_mode+0xd/0x30 [ 25.528237][ T292] do_syscall_64+0x58/0xa0 [ 25.532687][ T292] ? clear_bhb_loop+0x15/0x70 [ 25.537456][ T292] ? clear_bhb_loop+0x15/0x70 [ 25.542491][ T292] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.548474][ T292] RIP: 0033:0x7faaf5dfba99 [ 25.552913][ T292] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 25.572621][ T292] RSP: 002b:00007ffc4d28de68 EFLAGS: 00000286 ORIG_RAX: 00000000000001b4 [ 25.581037][ T292] RAX: 0000000000000000 RBX: 00007ffc4d28de80 RCX: 00007faaf5dfba99 [ 25.589188][ T292] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000000 [ 25.597201][ T292] RBP: 0000000000000001 R08: 00007ffc4d28dc07 R09: 0000000000000140 [ 25.605258][ T292] R10: 0000000000000001 R11: 0000000000000286 R12: 0000000000000000 [ 25.613228][ T292] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 25.621302][ T292] [ 25.625350][ T295] FAULT_INJECTION: forcing a failure. [ 25.625350][ T295] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 25.625371][ T84] CFI failure at __traceiter_sys_enter+0x34/0x50 (target: tp_stub_func+0x0/0x10; expected type: 0x4877830c) [ 25.640395][ T295] CPU: 1 PID: 295 Comm: syz-executor306 Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 25.650314][ T84] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 25.660477][ T295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 25.666541][ T84] CPU: 0 PID: 84 Comm: syslogd Not tainted 6.1.134-syzkaller-00012-g646380b087a5 #0 [ 25.676755][ T295] Call Trace: [ 25.676763][ T295] [ 25.686107][ T84] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 25.689379][ T295] __dump_stack+0x21/0x24 [ 25.692388][ T84] RIP: 0010:__traceiter_sys_enter+0x34/0x50 [ 25.702433][ T295] dump_stack_lvl+0xee/0x150 [ 25.706748][ T84] Code: 8b 3d 60 a2 10 06 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba f4 7c 88 b7 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f [ 25.712708][ T295] ? __cfi_dump_stack_lvl+0x8/0x8 [ 25.717280][ T84] RSP: 0018:ffffc900009b7ea8 EFLAGS: 00010a17 [ 25.736887][ T295] ? __cfi_enqueue_task_fair+0x10/0x10 [ 25.741894][ T84] [ 25.741901][ T84] RAX: ffffffff81710320 RBX: 0000000000000000 RCX: ffff88810f0d5100 [ 25.748035][ T295] dump_stack+0x15/0x24 [ 25.753473][ T84] RDX: 0000000000000000 RSI: ffffc900009b7f58 RDI: ffffc900000dd000 [ 25.755835][ T295] should_fail_ex+0x3d4/0x520 [ 25.763790][ T84] RBP: ffffc900009b7ec0 R08: dffffc0000000000 R09: ffffed1021cd443f [ 25.767930][ T295] should_fail_alloc_page+0x61/0x90 [ 25.775884][ T84] R10: 000000005cc8e400 R11: 1ffff11021cd443e R12: ffff88810f0d5100 [ 25.780548][ T295] prepare_alloc_pages+0x148/0x5f0 [ 25.788511][ T84] R13: 0000000000000000 R14: ffffc900009b7f58 R15: ffff88810999f8a8 [ 25.793697][ T295] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 25.801653][ T84] FS: 00007f616711fc80(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 25.806750][ T295] __alloc_pages+0x115/0x3a0 [ 25.814704][ T84] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.819885][ T295] ? __cfi___alloc_pages+0x10/0x10 [ 25.828795][ T84] CR2: 0000557fa8503848 CR3: 00000001100cb000 CR4: 00000000003506b0 [ 25.833515][ T295] ? kvm_sched_clock_read+0x18/0x40 [ 25.840170][ T84] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 25.845264][ T295] ? sched_clock+0x9/0x10 [ 25.853222][ T84] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 25.858507][ T295] ? sched_clock_cpu+0x6e/0x250 [ 25.866466][ T84] Call Trace: [ 25.866474][ T84] [ 25.870788][ T295] __folio_alloc+0x12/0x40 [ 25.878833][ T84] trace_sys_enter+0x3d/0x50 [ 25.883679][ T295] wp_page_copy+0x280/0x15b0 [ 25.886962][ T84] syscall_trace_enter+0xf3/0x150 [ 25.889889][ T295] ? __switch_to+0x51f/0xe30 [ 25.894290][ T84] syscall_enter_from_user_mode+0x1f/0x30 [ 25.898888][ T295] ? fault_dirty_shared_page+0x310/0x310 [ 25.903542][ T84] do_syscall_64+0x24/0xa0 [ 25.908563][ T295] ? _raw_spin_unlock+0x4c/0x70 [ 25.913407][ T84] ? clear_bhb_loop+0x15/0x70 [ 25.919148][ T295] ? finish_task_switch+0x16b/0x7b0 [ 25.924772][ T84] ? clear_bhb_loop+0x15/0x70 [ 25.929175][ T295] ? vm_normal_page+0x99/0x200 [ 25.934009][ T84] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 25.938670][ T295] do_wp_page+0x9f2/0xfc0 [ 25.943846][ T84] RIP: 0033:0x7f616726f407 [ 25.948513][ T295] handle_mm_fault+0x10e4/0x2640 [ 25.953253][ T84] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 25.959249][ T295] ? __cfi_handle_mm_fault+0x10/0x10 [ 25.963556][ T84] RSP: 002b:00007ffebc3d1880 EFLAGS: 00000202 [ 25.967952][ T295] ? lock_vma_under_rcu+0x3eb/0x4d0 [ 25.972958][ T84] ORIG_RAX: 0000000000000000 [ 25.992552][ T295] ? __this_cpu_preempt_check+0x13/0x20 [ 25.997814][ T84] RAX: ffffffffffffffda RBX: 00007f616711fc80 RCX: 00007f616726f407 [ 26.003964][ T295] ? xfd_validate_state+0x70/0x150 [ 26.009255][ T84] RDX: 00000000000000ff RSI: 0000555e648f1300 RDI: 0000000000000000 [ 26.013914][ T295] do_user_addr_fault+0x905/0x1050 [ 26.019443][ T84] RBP: 0000555e648f12c0 R08: 0000000000000000 R09: 0000000000000000 [ 26.027412][ T295] exc_page_fault+0x51/0xb0 [ 26.032503][ T84] R10: 0000000000000000 R11: 0000000000000202 R12: 0000555e648f134c [ 26.040559][ T295] asm_exc_page_fault+0x27/0x30 [ 26.045664][ T84] R13: 0000000000000000 R14: 0000555e648f1300 R15: 0000555e60a45d98 [ 26.053630][ T295] RIP: 0033:0x7faaf5dca1e0 [ 26.058150][ T84] [ 26.066102][ T295] Code: 41 54 55 48 89 f5 53 89 fb 48 83 ec 18 48 83 3d 0d 0e 0a 00 00 89 54 24 0c 74 08 84 c9 0f 85 09 02 00 00 31 c0 ba 01 00 00 00 0f b1 15 e0 3b 0a 00 0f 85 0f 02 00 00 4c 8d 25 d3 3b 0a 00 4c [ 26.071021][ T84] Modules linked in: [ 26.078977][ T295] RSP: 002b:00007ffc4d28de10 EFLAGS: 00010246 [ 26.083443][ T84] ---[ end trace 0000000000000000 ]--- [ 26.086401][ T295] [ 26.086406][ T295] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 26.086420][ T295] RDX: 0000000000000001 RSI: 00007faaf5e6b120 RDI: 0000000000000000 [pid 298] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="sys_enter", prog_fd=4}}, 16 [pid 295] <... close_range resumed>) = 0 [pid 292] <... close_range resumed>) = 0 [pid 292] exit_group(0) = ? [pid 292] +++ exited with 0 +++ [pid 290] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=292, si_uid=0, si_status=0, si_utime=0, si_stime=2} --- [pid 290] restart_syscall(<... resuming interrupted clone ...>) = 0 [pid 290] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555588761650) = 300 [ 26.106066][ T84] RIP: 0010:__traceiter_sys_enter+0x34/0x50 [ 26.109923][ T295] RBP: 00007faaf5e6b120 R08: 00007ffc4d28dc07 R09: 0000000000000140 [ 26.116015][ T84] Code: 8b 3d 60 a2 10 06 4d 85 ff 74 2e 48 89 d3 49 89 f6 49 8b 07 49 8b 7f 08 4c 89 f6 48 89 da 41 ba f4 7c 88 b7 44 03 50 fc 74 02 <0f> 0b ff d0 49 83 7f 18 00 4d 8d 7f 18 75 d8 31 c0 5b 41 5e 41 5f [ 26.121436][ T295] R10: 0000000000000001 R11: 0000000000000286 R12: 0000000000000000 [ 26.123824][ T84] RSP: 0018:ffffc900009b7ea8 EFLAGS: 00010a17 [pid 295] exit_group(0) = ? [pid 295] +++ exited with 0 +++ [pid 291] --- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=295, si_uid=0, si_status=0, si_utime=0, si_stime=6} --- [pid 291] restart_syscall(<... resuming interrupted clone ...>./strace-static-x86_64: Process 300 attached [pid 300] set_robust_list(0x555588761660, 24) = 0 [pid 300] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 300] setpgid(0, 0) = 0 [pid 300] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 300] write(3, "1000", 4) = 4 [pid 300] close(3) = 0 [pid 300] write(1, "executing program\n", 18executing program ) = 18 [pid 300] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_BLOOM_FILTER, key_size=0, value_size=4, max_entries=255, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80) = 3 [pid 300] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(4, 17, 0), prog_flags=0x40 /* BPF_F_??? */, prog_name="", prog_ifindex=0, expected_attach_type=BPF_XDP, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL, ...}, 148) = -1 EINVAL (Invalid argument) [pid 300] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [pid 300] bpf(BPF_RAW_TRACEPOINT_OPEN, {raw_tracepoint={name="sys_enter", prog_fd=4}}, 16 [pid 291] <... restart_syscall resumed>) = 0 [pid 291] clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555588761650) = 301 ./strace-static-x86_64: Process 301 attached [pid 301] set_robust_list(0x555588761660, 24) = 0 [pid 301] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 301] setpgid(0, 0) = 0 [pid 301] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 301] write(3, "1000", 4) = 4 [pid 301] close(3executing program ) = 0 [pid 301] write(1, "executing program\n", 18) = 18 [pid 301] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_BLOOM_FILTER, key_size=0, value_size=4, max_entries=255, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 80) = 3 [pid 301] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SCHED_CLS, insn_cnt=12, insns=0x200000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(4, 17, 0), prog_flags=0x40 /* BPF_F_??? */, prog_name="", prog_ifindex=0, expected_attach_type=BPF_XDP, prog_btf_fd=-1, func_info_rec_size=8, func_info=NULL, func_info_cnt=0, line_info_rec_size=16, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL, ...}, 148) = -1 EINVAL (Invalid argument) [pid 301] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_RAW_TRACEPOINT, insn_cnt=12, insns=0x200000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4 [ 26.131710][ T295] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 26.139694][ T84] [ 26.145554][ T295] [ 26.155471][ T295] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 26.173343][ T84] RAX: ffffffff81710320 RBX: 0000000000000000 RCX: ffff88810f0d5100 [ 26.217006][ T84] RDX: 0000000000000000 RSI: ffffc900009b7f58 RDI: ffffc900000dd000 [ 26.225032][ T84] RBP: ffffc900009b7ec0 R08: dffffc0000000000 R09: ffffed1021cd443f [ 26.233013][ T84] R10: 000000005cc8e400 R11: 1ffff11021cd443e R12: ffff88810f0d5100 [ 26.241013][ T84] R13: 0000000000000000 R14: ffffc900009b7f58 R15: ffff88810999f8a8 [ 26.249005][ T84] FS: 00007f616711fc80(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 26.258144][ T84] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.264745][ T84] CR2: 0000557fa8503848 CR3: 00000001100cb000 CR4: 00000000003506b0 [ 26.272804][ T84] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.280783][ T84] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.288772][ T84] Kernel panic - not syncing: Fatal exception [ 26.295140][ T84] Kernel Offset: disabled [ 26.299463][ T84] Rebooting in 86400 seconds..