./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2963877049 <...> Warning: Permanently added '10.128.0.21' (ED25519) to the list of known hosts. execve("./syz-executor2963877049", ["./syz-executor2963877049"], 0x7fffcd416ce0 /* 10 vars */) = 0 brk(NULL) = 0x555576c16000 brk(0x555576c16d00) = 0x555576c16d00 arch_prctl(ARCH_SET_FS, 0x555576c16380) = 0 set_tid_address(0x555576c16650) = 5231 set_robust_list(0x555576c16660, 24) = 0 rseq(0x555576c16ca0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2963877049", 4096) = 28 getrandom("\x79\x71\xac\x06\x50\x0a\xbb\x0d", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555576c16d00 brk(0x555576c37d00) = 0x555576c37d00 brk(0x555576c38000) = 0x555576c38000 mprotect(0x7f2f1f806000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 openat(AT_FDCWD, "/proc/self/make-it-fail", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_WRONLY) = 3 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/failslab/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_futex/ignore-private", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3 write(3, "N", 1) = 1 close(3) = 0 openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/min-order", O_WRONLY|O_CLOEXEC) = 3 write(3, "0", 1) = 1 close(3) = 0 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5232 attached , child_tidptr=0x555576c16650) = 5232 [pid 5232] set_robust_list(0x555576c16660, 24) = 0 [pid 5232] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 5232] setpgid(0, 0) = 0 [pid 5232] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 5232] write(3, "1000", 4) = 4 [pid 5232] close(3) = 0 [pid 5232] write(1, "executing program\n", 18executing program ) = 18 [pid 5232] creat("./file0", 000) = 3 [pid 5232] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_PROG_ARRAY, key_size=4, value_size=4, max_entries=10, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 4 [pid 5232] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_KPROBE, insn_cnt=8, insns=0x20000000, license="syzkaller", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=0x30 /* BPF_??? */, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 5 [pid 5232] bpf(BPF_LINK_CREATE, {link_create={prog_fd=5, target_fd=-1, attach_type=0x30 /* BPF_??? */, flags=0}, ...}, 64) = 6 [pid 5232] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_KPROBE, insn_cnt=8, insns=0x20000000, license="syzkaller", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=0x30 /* BPF_??? */, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 7 [pid 5232] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 8 [pid 5232] write(8, "8", 1) = 1 [ 58.835943][ T5232] FAULT_INJECTION: forcing a failure. [ 58.835943][ T5232] name failslab, interval 1, probability 0, space 0, times 1 [ 58.848684][ T5232] CPU: 1 UID: 0 PID: 5232 Comm: syz-executor296 Not tainted 6.11.0-rc3-next-20240816-syzkaller #0 [ 58.859269][ T5232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 58.869329][ T5232] Call Trace: [ 58.872595][ T5232] [ 58.875519][ T5232] dump_stack_lvl+0x241/0x360 [ 58.880210][ T5232] ? __pfx_dump_stack_lvl+0x10/0x10 [ 58.885397][ T5232] ? __pfx__printk+0x10/0x10 [ 58.889977][ T5232] ? kmem_cache_alloc_lru_noprof+0x49/0x2b0 [ 58.895866][ T5232] ? __pfx___might_resched+0x10/0x10 [ 58.901229][ T5232] should_fail_ex+0x3b0/0x4e0 [ 58.905909][ T5232] ? __d_alloc+0x31/0x700 [ 58.910231][ T5232] should_failslab+0xac/0x100 [ 58.914906][ T5232] ? __d_alloc+0x31/0x700 [ 58.919228][ T5232] kmem_cache_alloc_lru_noprof+0x71/0x2b0 [ 58.924946][ T5232] ? mark_lock+0x9a/0x350 [ 58.929268][ T5232] __d_alloc+0x31/0x700 [ 58.933419][ T5232] d_alloc_pseudo+0x1f/0xb0 [ 58.937914][ T5232] alloc_file_pseudo+0x123/0x290 [ 58.942843][ T5232] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 58.948293][ T5232] ? __local_bh_enable_ip+0x168/0x200 [ 58.953662][ T5232] ? bpf_link_prime+0x7a/0x240 [ 58.958420][ T5232] ? __pfx___local_bh_enable_ip+0x10/0x10 [ 58.964135][ T5232] anon_inode_getfile+0xc8/0x180 [ 58.969071][ T5232] bpf_link_prime+0xff/0x240 [ 58.973655][ T5232] bpf_uprobe_multi_link_attach+0xa46/0xb90 [ 58.979559][ T5232] ? __pfx_bpf_uprobe_multi_link_attach+0x10/0x10 [ 58.985969][ T5232] ? __pfx_lock_release+0x10/0x10 [ 58.990995][ T5232] ? bpf_prog_attach_check_attach_type+0x3e7/0x4b0 [ 58.997494][ T5232] link_create+0x6e9/0x870 [ 59.001911][ T5232] __sys_bpf+0x4bc/0x810 [ 59.006159][ T5232] ? __pfx___sys_bpf+0x10/0x10 [ 59.010927][ T5232] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 59.017251][ T5232] ? do_syscall_64+0x100/0x230 [ 59.022017][ T5232] __x64_sys_bpf+0x7c/0x90 [ 59.026438][ T5232] do_syscall_64+0xf3/0x230 [ 59.030941][ T5232] ? clear_bhb_loop+0x35/0x90 [ 59.035611][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.041533][ T5232] RIP: 0033:0x7f2f1f79ab29 [ 59.045966][ T5232] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 59.065833][ T5232] RSP: 002b:00007ffca14f3f08 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 59.074245][ T5232] RAX: ffffffffffffffda RBX: 00007ffca14f3f20 RCX: 00007f2f1f79ab29 [pid 5232] bpf(BPF_LINK_CREATE, {link_create={prog_fd=7, target_fd=-1, attach_type=0x30 /* BPF_??? */, flags=0}, ...}, 64) = -1 ENOMEM (Cannot allocate memory) [pid 5232] exit_group(0) = ? [ 59.082210][ T5232] RDX: 0000000000000040 RSI: 00000000200002c0 RDI: 000000000000001c [ 59.090174][ T5232] RBP: 0000000000000001 R08: 00007ffca14f3ca7 R09: 00000000000000a0 [ 59.098141][ T5232] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 59.106102][ T5232] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 [ 59.114078][ T5232] [ 59.129832][ T5232] ================================================================== [ 59.137916][ T5232] BUG: KASAN: slab-use-after-free in uprobe_unregister+0x99/0x220 [ 59.145708][ T5232] Read of size 8 at addr ffff88807a3ec2c0 by task syz-executor296/5232 [ 59.153925][ T5232] [ 59.156228][ T5232] CPU: 1 UID: 0 PID: 5232 Comm: syz-executor296 Not tainted 6.11.0-rc3-next-20240816-syzkaller #0 [ 59.166792][ T5232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 59.176826][ T5232] Call Trace: [ 59.180086][ T5232] [ 59.182994][ T5232] dump_stack_lvl+0x241/0x360 [ 59.187654][ T5232] ? __pfx_dump_stack_lvl+0x10/0x10 [ 59.192829][ T5232] ? __pfx__printk+0x10/0x10 [ 59.197398][ T5232] ? _printk+0xd5/0x120 [ 59.201533][ T5232] ? __virt_addr_valid+0x183/0x530 [ 59.206623][ T5232] ? __virt_addr_valid+0x183/0x530 [ 59.211736][ T5232] print_report+0x169/0x550 [ 59.216227][ T5232] ? __virt_addr_valid+0x183/0x530 [ 59.221314][ T5232] ? __virt_addr_valid+0x183/0x530 [ 59.226402][ T5232] ? __virt_addr_valid+0x45f/0x530 [ 59.231489][ T5232] ? __phys_addr+0xba/0x170 [ 59.235965][ T5232] ? uprobe_unregister+0x99/0x220 [ 59.240966][ T5232] kasan_report+0x143/0x180 [ 59.245450][ T5232] ? uprobe_unregister+0x99/0x220 [ 59.250451][ T5232] uprobe_unregister+0x99/0x220 [ 59.255277][ T5232] bpf_uprobe_multi_link_release+0x8c/0x1b0 [ 59.261154][ T5232] bpf_link_free+0xf5/0x250 [ 59.265635][ T5232] bpf_link_release+0x7b/0x90 [ 59.270286][ T5232] ? __pfx_bpf_link_release+0x10/0x10 [ 59.275635][ T5232] __fput+0x24b/0x890 [ 59.279593][ T5232] task_work_run+0x24f/0x310 [ 59.284159][ T5232] ? __pfx_task_work_run+0x10/0x10 [ 59.289244][ T5232] ? switch_task_namespaces+0xe4/0x110 [ 59.294688][ T5232] do_exit+0xa2f/0x28e0 [ 59.298821][ T5232] ? __pfx_do_exit+0x10/0x10 [ 59.303491][ T5232] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 59.309457][ T5232] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 59.315767][ T5232] ? _raw_spin_unlock_irq+0x23/0x50 [ 59.320968][ T5232] ? lockdep_hardirqs_on+0x99/0x150 [ 59.326174][ T5232] do_group_exit+0x207/0x2c0 [ 59.330744][ T5232] __x64_sys_exit_group+0x3f/0x40 [ 59.335750][ T5232] x64_sys_call+0x26a8/0x26b0 [ 59.340412][ T5232] do_syscall_64+0xf3/0x230 [ 59.344901][ T5232] ? clear_bhb_loop+0x35/0x90 [ 59.349578][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.355458][ T5232] RIP: 0033:0x7f2f1f798c79 [ 59.359853][ T5232] Code: Unable to access opcode bytes at 0x7f2f1f798c4f. [ 59.366848][ T5232] RSP: 002b:00007ffca14f3ea8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 59.375254][ T5232] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f1f798c79 [ 59.383208][ T5232] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 59.391166][ T5232] RBP: 00007f2f1f80c370 R08: ffffffffffffffb8 R09: 00000000000000a0 [ 59.399117][ T5232] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f2f1f80c370 [ 59.407069][ T5232] R13: 0000000000000000 R14: 00007f2f1f80cdc0 R15: 00007f2f1f762340 [ 59.415027][ T5232] [ 59.418023][ T5232] [ 59.420324][ T5232] Allocated by task 5232: [ 59.424644][ T5232] kasan_save_track+0x3f/0x80 [ 59.429302][ T5232] __kasan_kmalloc+0x98/0xb0 [ 59.433865][ T5232] __kmalloc_node_noprof+0x22a/0x440 [ 59.439130][ T5232] __kvmalloc_node_noprof+0x72/0x1b0 [ 59.444391][ T5232] bpf_uprobe_multi_link_attach+0x43e/0xb90 [ 59.450260][ T5232] link_create+0x6e9/0x870 [ 59.454657][ T5232] __sys_bpf+0x4bc/0x810 [ 59.458884][ T5232] __x64_sys_bpf+0x7c/0x90 [ 59.463364][ T5232] do_syscall_64+0xf3/0x230 [ 59.467845][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.473721][ T5232] [ 59.476021][ T5232] Freed by task 5232: [ 59.480063][ T5232] kasan_save_track+0x3f/0x80 [ 59.484716][ T5232] kasan_save_free_info+0x40/0x50 [ 59.489718][ T5232] __kasan_slab_free+0x59/0x70 [ 59.494459][ T5232] kfree+0x196/0x3e0 [ 59.498331][ T5232] bpf_uprobe_multi_link_attach+0xa7d/0xb90 [ 59.504226][ T5232] link_create+0x6e9/0x870 [ 59.508624][ T5232] __sys_bpf+0x4bc/0x810 [ 59.512842][ T5232] __x64_sys_bpf+0x7c/0x90 [ 59.517353][ T5232] do_syscall_64+0xf3/0x230 [ 59.521841][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.527798][ T5232] [ 59.530097][ T5232] The buggy address belongs to the object at ffff88807a3ec280 [ 59.530097][ T5232] which belongs to the cache kmalloc-96 of size 96 [ 59.544124][ T5232] The buggy address is located 64 bytes inside of [ 59.544124][ T5232] freed 96-byte region [ffff88807a3ec280, ffff88807a3ec2e0) [ 59.557808][ T5232] [ 59.560111][ T5232] The buggy address belongs to the physical page: [ 59.566505][ T5232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7a3ec [ 59.575242][ T5232] ksm flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 59.582678][ T5232] page_type: 0xfdffffff(slab) [ 59.587332][ T5232] raw: 00fff00000000000 ffff888015841280 ffffea00008eda00 0000000000000003 [ 59.595891][ T5232] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000 [ 59.604446][ T5232] page dumped because: kasan: bad access detected [ 59.610865][ T5232] page_owner tracks the page as allocated [ 59.616574][ T5232] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52c40(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 4696, tgid 4696 (udevd), ts 25205133470, free_ts 25188206742 [ 59.635041][ T5232] post_alloc_hook+0x1f3/0x230 [ 59.639787][ T5232] get_page_from_freelist+0x3004/0x30c0 [ 59.645398][ T5232] __alloc_pages_noprof+0x29e/0x780 [ 59.650592][ T5232] alloc_slab_page+0x5f/0x120 [ 59.655264][ T5232] allocate_slab+0x5a/0x2f0 [ 59.659753][ T5232] ___slab_alloc+0xcd1/0x14b0 [ 59.664409][ T5232] __slab_alloc+0x58/0xa0 [ 59.668716][ T5232] __kmalloc_noprof+0x25a/0x400 [ 59.673641][ T5232] tomoyo_encode+0x26f/0x540 [ 59.678213][ T5232] tomoyo_realpath_from_path+0x59e/0x5e0 [ 59.683850][ T5232] tomoyo_path_perm+0x2b7/0x740 [ 59.688699][ T5232] security_inode_getattr+0xd8/0x130 [ 59.693963][ T5232] vfs_getattr+0x45/0x430 [ 59.698272][ T5232] vfs_fstatat+0xe4/0x190 [ 59.702579][ T5232] __x64_sys_newfstatat+0x11d/0x1a0 [ 59.707752][ T5232] do_syscall_64+0xf3/0x230 [ 59.712235][ T5232] page last free pid 4699 tgid 4699 stack trace: [ 59.718620][ T5232] free_unref_page+0xc07/0xd90 [ 59.723359][ T5232] __slab_free+0x31b/0x3d0 [ 59.727749][ T5232] qlist_free_all+0x9e/0x140 [ 59.732322][ T5232] kasan_quarantine_reduce+0x14f/0x170 [ 59.737752][ T5232] __kasan_slab_alloc+0x23/0x80 [ 59.742597][ T5232] kmem_cache_alloc_noprof+0x135/0x2a0 [ 59.748033][ T5232] getname_flags+0xb7/0x540 [ 59.752516][ T5232] do_sys_openat2+0xd2/0x1d0 [ 59.757095][ T5232] __x64_sys_openat+0x247/0x2a0 [ 59.761924][ T5232] do_syscall_64+0xf3/0x230 [ 59.766404][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.772276][ T5232] [ 59.774604][ T5232] Memory state around the buggy address: [ 59.780213][ T5232] ffff88807a3ec180: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 59.788252][ T5232] ffff88807a3ec200: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 59.796287][ T5232] >ffff88807a3ec280: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 59.804323][ T5232] ^ [ 59.810448][ T5232] ffff88807a3ec300: 00 00 00 00 00 00 00 00 06 fc fc fc fc fc fc fc [ 59.818489][ T5232] ffff88807a3ec380: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 59.826530][ T5232] ================================================================== [ 59.836168][ T5232] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 59.843388][ T5232] CPU: 1 UID: 0 PID: 5232 Comm: syz-executor296 Not tainted 6.11.0-rc3-next-20240816-syzkaller #0 [ 59.853992][ T5232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 59.864043][ T5232] Call Trace: [ 59.867305][ T5232] [ 59.870220][ T5232] dump_stack_lvl+0x241/0x360 [ 59.874886][ T5232] ? __pfx_dump_stack_lvl+0x10/0x10 [ 59.880074][ T5232] ? __pfx__printk+0x10/0x10 [ 59.884649][ T5232] ? preempt_schedule+0xe1/0xf0 [ 59.889496][ T5232] ? vscnprintf+0x5d/0x90 [ 59.893809][ T5232] panic+0x349/0x870 [ 59.897685][ T5232] ? check_panic_on_warn+0x21/0xb0 [ 59.902786][ T5232] ? __pfx_panic+0x10/0x10 [ 59.907192][ T5232] ? _raw_spin_unlock_irqrestore+0x130/0x140 [ 59.913160][ T5232] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10 [ 59.919483][ T5232] ? print_report+0x502/0x550 [ 59.924204][ T5232] check_panic_on_warn+0x86/0xb0 [ 59.929126][ T5232] ? uprobe_unregister+0x99/0x220 [ 59.934134][ T5232] end_report+0x77/0x160 [ 59.938360][ T5232] kasan_report+0x154/0x180 [ 59.942850][ T5232] ? uprobe_unregister+0x99/0x220 [ 59.948210][ T5232] uprobe_unregister+0x99/0x220 [ 59.953062][ T5232] bpf_uprobe_multi_link_release+0x8c/0x1b0 [ 59.958939][ T5232] bpf_link_free+0xf5/0x250 [ 59.963430][ T5232] bpf_link_release+0x7b/0x90 [ 59.968091][ T5232] ? __pfx_bpf_link_release+0x10/0x10 [ 59.973450][ T5232] __fput+0x24b/0x890 [ 59.977421][ T5232] task_work_run+0x24f/0x310 [ 59.981997][ T5232] ? __pfx_task_work_run+0x10/0x10 [ 59.987094][ T5232] ? switch_task_namespaces+0xe4/0x110 [ 59.992535][ T5232] do_exit+0xa2f/0x28e0 [ 59.996676][ T5232] ? __pfx_do_exit+0x10/0x10 [ 60.001243][ T5232] ? lockdep_hardirqs_on_prepare+0x43d/0x780 [ 60.007208][ T5232] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10 [ 60.013525][ T5232] ? _raw_spin_unlock_irq+0x23/0x50 [ 60.018709][ T5232] ? lockdep_hardirqs_on+0x99/0x150 [ 60.023890][ T5232] do_group_exit+0x207/0x2c0 [ 60.028466][ T5232] __x64_sys_exit_group+0x3f/0x40 [ 60.033473][ T5232] x64_sys_call+0x26a8/0x26b0 [ 60.038134][ T5232] do_syscall_64+0xf3/0x230 [ 60.042620][ T5232] ? clear_bhb_loop+0x35/0x90 [ 60.047281][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.053164][ T5232] RIP: 0033:0x7f2f1f798c79 [ 60.058003][ T5232] Code: Unable to access opcode bytes at 0x7f2f1f798c4f. [ 60.065002][ T5232] RSP: 002b:00007ffca14f3ea8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 60.073399][ T5232] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f1f798c79 [ 60.081370][ T5232] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 [ 60.089329][ T5232] RBP: 00007f2f1f80c370 R08: ffffffffffffffb8 R09: 00000000000000a0 [ 60.097288][ T5232] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f2f1f80c370 [ 60.105253][ T5232] R13: 0000000000000000 R14: 00007f2f1f80cdc0 R15: 00007f2f1f762340 [ 60.113309][ T5232] [ 60.116557][ T5232] Kernel Offset: disabled [ 60.120898][ T5232] Rebooting in 86400 seconds..