./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2963877049
<...>
Warning: Permanently added '10.128.0.21' (ED25519) to the list of known hosts.
execve("./syz-executor2963877049", ["./syz-executor2963877049"], 0x7fffcd416ce0 /* 10 vars */) = 0
brk(NULL) = 0x555576c16000
brk(0x555576c16d00) = 0x555576c16d00
arch_prctl(ARCH_SET_FS, 0x555576c16380) = 0
set_tid_address(0x555576c16650) = 5231
set_robust_list(0x555576c16660, 24) = 0
rseq(0x555576c16ca0, 0x20, 0, 0x53053053) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor2963877049", 4096) = 28
getrandom("\x79\x71\xac\x06\x50\x0a\xbb\x0d", 8, GRND_NONBLOCK) = 8
brk(NULL) = 0x555576c16d00
brk(0x555576c37d00) = 0x555576c37d00
brk(0x555576c38000) = 0x555576c38000
mprotect(0x7f2f1f806000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
openat(AT_FDCWD, "/proc/self/make-it-fail", O_WRONLY) = 3
close(3) = 0
openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_WRONLY) = 3
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/failslab/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3
write(3, "N", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/fail_futex/ignore-private", O_WRONLY|O_CLOEXEC) = 3
write(3, "N", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-highmem", O_WRONLY|O_CLOEXEC) = 3
write(3, "N", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/ignore-gfp-wait", O_WRONLY|O_CLOEXEC) = 3
write(3, "N", 1) = 1
close(3) = 0
openat(AT_FDCWD, "/sys/kernel/debug/fail_page_alloc/min-order", O_WRONLY|O_CLOEXEC) = 3
write(3, "0", 1) = 1
close(3) = 0
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5232 attached
, child_tidptr=0x555576c16650) = 5232
[pid 5232] set_robust_list(0x555576c16660, 24) = 0
[pid 5232] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid 5232] setpgid(0, 0) = 0
[pid 5232] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3
[pid 5232] write(3, "1000", 4) = 4
[pid 5232] close(3) = 0
[pid 5232] write(1, "executing program\n", 18executing program
) = 18
[pid 5232] creat("./file0", 000) = 3
[pid 5232] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_PROG_ARRAY, key_size=4, value_size=4, max_entries=10, map_flags=0, inner_map_fd=0, map_name="", map_ifindex=0, btf_fd=0, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 4
[pid 5232] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_KPROBE, insn_cnt=8, insns=0x20000000, license="syzkaller", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=0x30 /* BPF_??? */, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 5
[pid 5232] bpf(BPF_LINK_CREATE, {link_create={prog_fd=5, target_fd=-1, attach_type=0x30 /* BPF_??? */, flags=0}, ...}, 64) = 6
[pid 5232] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_KPROBE, insn_cnt=8, insns=0x20000000, license="syzkaller", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=0x30 /* BPF_??? */, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 7
[pid 5232] openat(AT_FDCWD, "/proc/thread-self/fail-nth", O_RDWR) = 8
[pid 5232] write(8, "8", 1) = 1
[ 58.835943][ T5232] FAULT_INJECTION: forcing a failure.
[ 58.835943][ T5232] name failslab, interval 1, probability 0, space 0, times 1
[ 58.848684][ T5232] CPU: 1 UID: 0 PID: 5232 Comm: syz-executor296 Not tainted 6.11.0-rc3-next-20240816-syzkaller #0
[ 58.859269][ T5232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
[ 58.869329][ T5232] Call Trace:
[ 58.872595][ T5232]
[ 58.875519][ T5232] dump_stack_lvl+0x241/0x360
[ 58.880210][ T5232] ? __pfx_dump_stack_lvl+0x10/0x10
[ 58.885397][ T5232] ? __pfx__printk+0x10/0x10
[ 58.889977][ T5232] ? kmem_cache_alloc_lru_noprof+0x49/0x2b0
[ 58.895866][ T5232] ? __pfx___might_resched+0x10/0x10
[ 58.901229][ T5232] should_fail_ex+0x3b0/0x4e0
[ 58.905909][ T5232] ? __d_alloc+0x31/0x700
[ 58.910231][ T5232] should_failslab+0xac/0x100
[ 58.914906][ T5232] ? __d_alloc+0x31/0x700
[ 58.919228][ T5232] kmem_cache_alloc_lru_noprof+0x71/0x2b0
[ 58.924946][ T5232] ? mark_lock+0x9a/0x350
[ 58.929268][ T5232] __d_alloc+0x31/0x700
[ 58.933419][ T5232] d_alloc_pseudo+0x1f/0xb0
[ 58.937914][ T5232] alloc_file_pseudo+0x123/0x290
[ 58.942843][ T5232] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 58.948293][ T5232] ? __local_bh_enable_ip+0x168/0x200
[ 58.953662][ T5232] ? bpf_link_prime+0x7a/0x240
[ 58.958420][ T5232] ? __pfx___local_bh_enable_ip+0x10/0x10
[ 58.964135][ T5232] anon_inode_getfile+0xc8/0x180
[ 58.969071][ T5232] bpf_link_prime+0xff/0x240
[ 58.973655][ T5232] bpf_uprobe_multi_link_attach+0xa46/0xb90
[ 58.979559][ T5232] ? __pfx_bpf_uprobe_multi_link_attach+0x10/0x10
[ 58.985969][ T5232] ? __pfx_lock_release+0x10/0x10
[ 58.990995][ T5232] ? bpf_prog_attach_check_attach_type+0x3e7/0x4b0
[ 58.997494][ T5232] link_create+0x6e9/0x870
[ 59.001911][ T5232] __sys_bpf+0x4bc/0x810
[ 59.006159][ T5232] ? __pfx___sys_bpf+0x10/0x10
[ 59.010927][ T5232] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[ 59.017251][ T5232] ? do_syscall_64+0x100/0x230
[ 59.022017][ T5232] __x64_sys_bpf+0x7c/0x90
[ 59.026438][ T5232] do_syscall_64+0xf3/0x230
[ 59.030941][ T5232] ? clear_bhb_loop+0x35/0x90
[ 59.035611][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 59.041533][ T5232] RIP: 0033:0x7f2f1f79ab29
[ 59.045966][ T5232] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 a1 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 59.065833][ T5232] RSP: 002b:00007ffca14f3f08 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[ 59.074245][ T5232] RAX: ffffffffffffffda RBX: 00007ffca14f3f20 RCX: 00007f2f1f79ab29
[pid 5232] bpf(BPF_LINK_CREATE, {link_create={prog_fd=7, target_fd=-1, attach_type=0x30 /* BPF_??? */, flags=0}, ...}, 64) = -1 ENOMEM (Cannot allocate memory)
[pid 5232] exit_group(0) = ?
[ 59.082210][ T5232] RDX: 0000000000000040 RSI: 00000000200002c0 RDI: 000000000000001c
[ 59.090174][ T5232] RBP: 0000000000000001 R08: 00007ffca14f3ca7 R09: 00000000000000a0
[ 59.098141][ T5232] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000
[ 59.106102][ T5232] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001
[ 59.114078][ T5232]
[ 59.129832][ T5232] ==================================================================
[ 59.137916][ T5232] BUG: KASAN: slab-use-after-free in uprobe_unregister+0x99/0x220
[ 59.145708][ T5232] Read of size 8 at addr ffff88807a3ec2c0 by task syz-executor296/5232
[ 59.153925][ T5232]
[ 59.156228][ T5232] CPU: 1 UID: 0 PID: 5232 Comm: syz-executor296 Not tainted 6.11.0-rc3-next-20240816-syzkaller #0
[ 59.166792][ T5232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
[ 59.176826][ T5232] Call Trace:
[ 59.180086][ T5232]
[ 59.182994][ T5232] dump_stack_lvl+0x241/0x360
[ 59.187654][ T5232] ? __pfx_dump_stack_lvl+0x10/0x10
[ 59.192829][ T5232] ? __pfx__printk+0x10/0x10
[ 59.197398][ T5232] ? _printk+0xd5/0x120
[ 59.201533][ T5232] ? __virt_addr_valid+0x183/0x530
[ 59.206623][ T5232] ? __virt_addr_valid+0x183/0x530
[ 59.211736][ T5232] print_report+0x169/0x550
[ 59.216227][ T5232] ? __virt_addr_valid+0x183/0x530
[ 59.221314][ T5232] ? __virt_addr_valid+0x183/0x530
[ 59.226402][ T5232] ? __virt_addr_valid+0x45f/0x530
[ 59.231489][ T5232] ? __phys_addr+0xba/0x170
[ 59.235965][ T5232] ? uprobe_unregister+0x99/0x220
[ 59.240966][ T5232] kasan_report+0x143/0x180
[ 59.245450][ T5232] ? uprobe_unregister+0x99/0x220
[ 59.250451][ T5232] uprobe_unregister+0x99/0x220
[ 59.255277][ T5232] bpf_uprobe_multi_link_release+0x8c/0x1b0
[ 59.261154][ T5232] bpf_link_free+0xf5/0x250
[ 59.265635][ T5232] bpf_link_release+0x7b/0x90
[ 59.270286][ T5232] ? __pfx_bpf_link_release+0x10/0x10
[ 59.275635][ T5232] __fput+0x24b/0x890
[ 59.279593][ T5232] task_work_run+0x24f/0x310
[ 59.284159][ T5232] ? __pfx_task_work_run+0x10/0x10
[ 59.289244][ T5232] ? switch_task_namespaces+0xe4/0x110
[ 59.294688][ T5232] do_exit+0xa2f/0x28e0
[ 59.298821][ T5232] ? __pfx_do_exit+0x10/0x10
[ 59.303491][ T5232] ? lockdep_hardirqs_on_prepare+0x43d/0x780
[ 59.309457][ T5232] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[ 59.315767][ T5232] ? _raw_spin_unlock_irq+0x23/0x50
[ 59.320968][ T5232] ? lockdep_hardirqs_on+0x99/0x150
[ 59.326174][ T5232] do_group_exit+0x207/0x2c0
[ 59.330744][ T5232] __x64_sys_exit_group+0x3f/0x40
[ 59.335750][ T5232] x64_sys_call+0x26a8/0x26b0
[ 59.340412][ T5232] do_syscall_64+0xf3/0x230
[ 59.344901][ T5232] ? clear_bhb_loop+0x35/0x90
[ 59.349578][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 59.355458][ T5232] RIP: 0033:0x7f2f1f798c79
[ 59.359853][ T5232] Code: Unable to access opcode bytes at 0x7f2f1f798c4f.
[ 59.366848][ T5232] RSP: 002b:00007ffca14f3ea8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 59.375254][ T5232] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f1f798c79
[ 59.383208][ T5232] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
[ 59.391166][ T5232] RBP: 00007f2f1f80c370 R08: ffffffffffffffb8 R09: 00000000000000a0
[ 59.399117][ T5232] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f2f1f80c370
[ 59.407069][ T5232] R13: 0000000000000000 R14: 00007f2f1f80cdc0 R15: 00007f2f1f762340
[ 59.415027][ T5232]
[ 59.418023][ T5232]
[ 59.420324][ T5232] Allocated by task 5232:
[ 59.424644][ T5232] kasan_save_track+0x3f/0x80
[ 59.429302][ T5232] __kasan_kmalloc+0x98/0xb0
[ 59.433865][ T5232] __kmalloc_node_noprof+0x22a/0x440
[ 59.439130][ T5232] __kvmalloc_node_noprof+0x72/0x1b0
[ 59.444391][ T5232] bpf_uprobe_multi_link_attach+0x43e/0xb90
[ 59.450260][ T5232] link_create+0x6e9/0x870
[ 59.454657][ T5232] __sys_bpf+0x4bc/0x810
[ 59.458884][ T5232] __x64_sys_bpf+0x7c/0x90
[ 59.463364][ T5232] do_syscall_64+0xf3/0x230
[ 59.467845][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 59.473721][ T5232]
[ 59.476021][ T5232] Freed by task 5232:
[ 59.480063][ T5232] kasan_save_track+0x3f/0x80
[ 59.484716][ T5232] kasan_save_free_info+0x40/0x50
[ 59.489718][ T5232] __kasan_slab_free+0x59/0x70
[ 59.494459][ T5232] kfree+0x196/0x3e0
[ 59.498331][ T5232] bpf_uprobe_multi_link_attach+0xa7d/0xb90
[ 59.504226][ T5232] link_create+0x6e9/0x870
[ 59.508624][ T5232] __sys_bpf+0x4bc/0x810
[ 59.512842][ T5232] __x64_sys_bpf+0x7c/0x90
[ 59.517353][ T5232] do_syscall_64+0xf3/0x230
[ 59.521841][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 59.527798][ T5232]
[ 59.530097][ T5232] The buggy address belongs to the object at ffff88807a3ec280
[ 59.530097][ T5232] which belongs to the cache kmalloc-96 of size 96
[ 59.544124][ T5232] The buggy address is located 64 bytes inside of
[ 59.544124][ T5232] freed 96-byte region [ffff88807a3ec280, ffff88807a3ec2e0)
[ 59.557808][ T5232]
[ 59.560111][ T5232] The buggy address belongs to the physical page:
[ 59.566505][ T5232] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7a3ec
[ 59.575242][ T5232] ksm flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
[ 59.582678][ T5232] page_type: 0xfdffffff(slab)
[ 59.587332][ T5232] raw: 00fff00000000000 ffff888015841280 ffffea00008eda00 0000000000000003
[ 59.595891][ T5232] raw: 0000000000000000 0000000080200020 00000001fdffffff 0000000000000000
[ 59.604446][ T5232] page dumped because: kasan: bad access detected
[ 59.610865][ T5232] page_owner tracks the page as allocated
[ 59.616574][ T5232] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52c40(GFP_NOFS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 4696, tgid 4696 (udevd), ts 25205133470, free_ts 25188206742
[ 59.635041][ T5232] post_alloc_hook+0x1f3/0x230
[ 59.639787][ T5232] get_page_from_freelist+0x3004/0x30c0
[ 59.645398][ T5232] __alloc_pages_noprof+0x29e/0x780
[ 59.650592][ T5232] alloc_slab_page+0x5f/0x120
[ 59.655264][ T5232] allocate_slab+0x5a/0x2f0
[ 59.659753][ T5232] ___slab_alloc+0xcd1/0x14b0
[ 59.664409][ T5232] __slab_alloc+0x58/0xa0
[ 59.668716][ T5232] __kmalloc_noprof+0x25a/0x400
[ 59.673641][ T5232] tomoyo_encode+0x26f/0x540
[ 59.678213][ T5232] tomoyo_realpath_from_path+0x59e/0x5e0
[ 59.683850][ T5232] tomoyo_path_perm+0x2b7/0x740
[ 59.688699][ T5232] security_inode_getattr+0xd8/0x130
[ 59.693963][ T5232] vfs_getattr+0x45/0x430
[ 59.698272][ T5232] vfs_fstatat+0xe4/0x190
[ 59.702579][ T5232] __x64_sys_newfstatat+0x11d/0x1a0
[ 59.707752][ T5232] do_syscall_64+0xf3/0x230
[ 59.712235][ T5232] page last free pid 4699 tgid 4699 stack trace:
[ 59.718620][ T5232] free_unref_page+0xc07/0xd90
[ 59.723359][ T5232] __slab_free+0x31b/0x3d0
[ 59.727749][ T5232] qlist_free_all+0x9e/0x140
[ 59.732322][ T5232] kasan_quarantine_reduce+0x14f/0x170
[ 59.737752][ T5232] __kasan_slab_alloc+0x23/0x80
[ 59.742597][ T5232] kmem_cache_alloc_noprof+0x135/0x2a0
[ 59.748033][ T5232] getname_flags+0xb7/0x540
[ 59.752516][ T5232] do_sys_openat2+0xd2/0x1d0
[ 59.757095][ T5232] __x64_sys_openat+0x247/0x2a0
[ 59.761924][ T5232] do_syscall_64+0xf3/0x230
[ 59.766404][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 59.772276][ T5232]
[ 59.774604][ T5232] Memory state around the buggy address:
[ 59.780213][ T5232] ffff88807a3ec180: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[ 59.788252][ T5232] ffff88807a3ec200: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[ 59.796287][ T5232] >ffff88807a3ec280: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[ 59.804323][ T5232] ^
[ 59.810448][ T5232] ffff88807a3ec300: 00 00 00 00 00 00 00 00 06 fc fc fc fc fc fc fc
[ 59.818489][ T5232] ffff88807a3ec380: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[ 59.826530][ T5232] ==================================================================
[ 59.836168][ T5232] Kernel panic - not syncing: KASAN: panic_on_warn set ...
[ 59.843388][ T5232] CPU: 1 UID: 0 PID: 5232 Comm: syz-executor296 Not tainted 6.11.0-rc3-next-20240816-syzkaller #0
[ 59.853992][ T5232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
[ 59.864043][ T5232] Call Trace:
[ 59.867305][ T5232]
[ 59.870220][ T5232] dump_stack_lvl+0x241/0x360
[ 59.874886][ T5232] ? __pfx_dump_stack_lvl+0x10/0x10
[ 59.880074][ T5232] ? __pfx__printk+0x10/0x10
[ 59.884649][ T5232] ? preempt_schedule+0xe1/0xf0
[ 59.889496][ T5232] ? vscnprintf+0x5d/0x90
[ 59.893809][ T5232] panic+0x349/0x870
[ 59.897685][ T5232] ? check_panic_on_warn+0x21/0xb0
[ 59.902786][ T5232] ? __pfx_panic+0x10/0x10
[ 59.907192][ T5232] ? _raw_spin_unlock_irqrestore+0x130/0x140
[ 59.913160][ T5232] ? __pfx__raw_spin_unlock_irqrestore+0x10/0x10
[ 59.919483][ T5232] ? print_report+0x502/0x550
[ 59.924204][ T5232] check_panic_on_warn+0x86/0xb0
[ 59.929126][ T5232] ? uprobe_unregister+0x99/0x220
[ 59.934134][ T5232] end_report+0x77/0x160
[ 59.938360][ T5232] kasan_report+0x154/0x180
[ 59.942850][ T5232] ? uprobe_unregister+0x99/0x220
[ 59.948210][ T5232] uprobe_unregister+0x99/0x220
[ 59.953062][ T5232] bpf_uprobe_multi_link_release+0x8c/0x1b0
[ 59.958939][ T5232] bpf_link_free+0xf5/0x250
[ 59.963430][ T5232] bpf_link_release+0x7b/0x90
[ 59.968091][ T5232] ? __pfx_bpf_link_release+0x10/0x10
[ 59.973450][ T5232] __fput+0x24b/0x890
[ 59.977421][ T5232] task_work_run+0x24f/0x310
[ 59.981997][ T5232] ? __pfx_task_work_run+0x10/0x10
[ 59.987094][ T5232] ? switch_task_namespaces+0xe4/0x110
[ 59.992535][ T5232] do_exit+0xa2f/0x28e0
[ 59.996676][ T5232] ? __pfx_do_exit+0x10/0x10
[ 60.001243][ T5232] ? lockdep_hardirqs_on_prepare+0x43d/0x780
[ 60.007208][ T5232] ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[ 60.013525][ T5232] ? _raw_spin_unlock_irq+0x23/0x50
[ 60.018709][ T5232] ? lockdep_hardirqs_on+0x99/0x150
[ 60.023890][ T5232] do_group_exit+0x207/0x2c0
[ 60.028466][ T5232] __x64_sys_exit_group+0x3f/0x40
[ 60.033473][ T5232] x64_sys_call+0x26a8/0x26b0
[ 60.038134][ T5232] do_syscall_64+0xf3/0x230
[ 60.042620][ T5232] ? clear_bhb_loop+0x35/0x90
[ 60.047281][ T5232] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 60.053164][ T5232] RIP: 0033:0x7f2f1f798c79
[ 60.058003][ T5232] Code: Unable to access opcode bytes at 0x7f2f1f798c4f.
[ 60.065002][ T5232] RSP: 002b:00007ffca14f3ea8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 60.073399][ T5232] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2f1f798c79
[ 60.081370][ T5232] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000
[ 60.089329][ T5232] RBP: 00007f2f1f80c370 R08: ffffffffffffffb8 R09: 00000000000000a0
[ 60.097288][ T5232] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f2f1f80c370
[ 60.105253][ T5232] R13: 0000000000000000 R14: 00007f2f1f80cdc0 R15: 00007f2f1f762340
[ 60.113309][ T5232]
[ 60.116557][ T5232] Kernel Offset: disabled
[ 60.120898][ T5232] Rebooting in 86400 seconds..