kernel panic at kern/src/kmalloc.c:79, from core 3: Kmalloc failed! Handle me! Stack Backtrace on Core 3: #01 [<0xffffffffc200aa6c>] in backtrace at src/kdebug.c:235 #02 [<0xffffffffc200a205>] in _panic at src/init.c:275 #03 [<0xffffffffc200aff4>] in kmalloc at src/kmalloc.c:79 #04 [<0xffffffffc200b01f>] in kzmalloc at src/kmalloc.c:91 #05 [<0xffffffffc207fa44>] in mntralloc at drivers/dev/mnt.c:1110 #06 [<0xffffffffc207fb73>] in mntflushalloc at drivers/dev/mnt.c:1058 #07 [<0xffffffffc2080010>] in mountio at drivers/dev/mnt.c:854 #08 [<0xffffffffc2080105>] in mountrpc at drivers/dev/mnt.c:783 #09 [<0xffffffffc2080f3b>] in mntwalk at drivers/dev/mnt.c:475 #10 [<0xffffffffc2033bcb>] in walk at src/ns/chan.c:800 #11 [<0xffffffffc2034039>] in __namec_from at src/ns/chan.c:1138 #12 [<0xffffffffc2034c43>] in namec at src/ns/chan.c:1530 #13 [<0xffffffffc2041ddd>] in sysopenat at src/ns/sysfile.c:585 #14 [<0xffffffffc20592de>] in sys_openat at src/syscall.c:1826 #15 [<0xffffffffc205a249>] in syscall at src/syscall.c:2582 #16 [<0xffffffffc205add8>] in run_local_syscall at src/syscall.c:2619 #17 [<0xffffffffc205b319>] in prep_syscalls at src/syscall.c:2639 #18 [<0xffffffffc20b7a92>] in sysenter_callwrapper at arch/x86/trap.c:932 kernel panic at kern/src/slab.c:658, from core 0: [German Accent]: OOM for a small slab growth!!! Stack Backtrace on Core 0: #01 [<0xffffffffc200aa6c>] in backtrace at src/kdebug.c:235 #02 [<0xffffffffc200a205>] in _panic at src/init.c:275 #03 [<0xffffffffc2053ef4>] in __kmem_alloc_from_slab at src/slab.c:658 #04 [<0xffffffffc20548da>] in kmem_cache_alloc at src/slab.c:696 #05 [<0xffffffffc2002497>] in arena_alloc at src/arena.c:839 #06 [<0xffffffffc2046675>] in kpages_alloc at src/page_alloc.c:80 #07 [<0xffffffffc20b2718>] in __pml_walk at arch/x86/pmap64.c:100 #08 [<0xffffffffc20b27a6>] in __pml_walk at arch/x86/pmap64.c:129 #09 [<0xffffffffc20b27a6>] in __pml_walk at arch/x86/pmap64.c:129 #10 [< [inline] >] in pml_walk at arch/x86/pmap64.c:146 #10 [<0xffffffffc20b3261>] in pgdir_walk at arch/x86/pmap64.c:410 #11 [<0xffffffffc200df59>] in map_page_at_addr at src/mm.c:770 #12 [<0xffffffffc200ede0>] in __hpf at src/mm.c:1363 #13 [<0xffffffffc201017e>] in handle_page_fault at src/mm.c:1379 #14 [< [inline] >] in __handler_user_page_fault at arch/x86/trap.c:264 #14 [< [inline] >] in __handle_page_fault at arch/x86/trap.c:343 #14 [< [inline] >] in trap_dispatch at arch/x86/trap.c:617 #14 [<0xffffffffc20b6da1>] in trap at arch/x86/trap.c:700 r13 0x000010000000a4c0 r14 0x0000000000000004 r15 0x00007f7fffa01200 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x00000000004102c6 cs 0x------------0023 flag 0x0000000000010202 rsp 0x0000300000006d80 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x000000005a5a4f80 Addr 0x00000000004102c6 is in syz-executor at offset 0x00000000000102c6 VM Regions for proc 405 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b8000): 0x00000005, 0x00000001, 0xffff80000369d020, 0x0000000000000000 01: (0x00000000004b8000 - 0x00000000004b9000): 0x00000005, 0x00000002, 0xffff80000369d020, 0x00000000000b8000 02: (0x00000000006b9000 - 0x00000000006bc000): 0x00000003, 0x00000002, 0xffff80000369d020, 0x00000000000b9000 03: (0x00000000006bc000 - 0x0000000000ae5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff80000369d020, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 1: Offsets only matter for shared libraries #01 Addr 0x00000000004102c6 is in syz-executor at offset 0x00000000000102c6 #02 Addr 0x00000000004106ee is in syz-executor at offset 0x00000000000106ee #03 Addr 0x0000000000415c9d is in syz-executor at offset 0x0000000000015c9d #04 Addr 0x000000000040858b is in syz-executor at offset 0x000000000000858b #05 Addr 0x00000000004150f0 is in syz-executor at offset 0x00000000000150f0 #06 Addr 0x0000000000408aba is in syz-executor at offset 0x0000000000008aba #07 Addr 0x00000000004044a9 is in syz-executor at offset 0x00000000000044a9 #08 Addr 0x0000000000414e1c is in syz-executor at offset 0x0000000000014e1c #09 Addr 0x0000000000414e21 is in syz-executor at offset 0x0000000000014e21