Warning: Permanently added '[localhost]:1869' (ECDSA) to the list of known hosts. 2025/08/29 09:03:17 fuzzer started 2025/08/29 09:03:18 dialing manager at localhost:43077 syzkaller login: [ 50.780997] cgroup: Unknown subsys name 'net' [ 50.838237] cgroup: Unknown subsys name 'cpuset' [ 50.854507] cgroup: Unknown subsys name 'rlimit' 2025/08/29 09:03:28 syscalls: 2214 2025/08/29 09:03:28 code coverage: enabled 2025/08/29 09:03:28 comparison tracing: enabled 2025/08/29 09:03:28 extra coverage: enabled 2025/08/29 09:03:28 setuid sandbox: enabled 2025/08/29 09:03:28 namespace sandbox: enabled 2025/08/29 09:03:28 Android sandbox: enabled 2025/08/29 09:03:28 fault injection: enabled 2025/08/29 09:03:28 leak checking: enabled 2025/08/29 09:03:28 net packet injection: enabled 2025/08/29 09:03:28 net device setup: enabled 2025/08/29 09:03:28 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2025/08/29 09:03:28 devlink PCI setup: PCI device 0000:00:10.0 is not available 2025/08/29 09:03:28 USB emulation: enabled 2025/08/29 09:03:28 hci packet injection: enabled 2025/08/29 09:03:28 wifi device emulation: enabled 2025/08/29 09:03:28 802.15.4 emulation: enabled 2025/08/29 09:03:28 fetching corpus: 0, signal 0/2000 (executing program) 2025/08/29 09:03:28 fetching corpus: 50, signal 20593/23973 (executing program) 2025/08/29 09:03:28 fetching corpus: 100, signal 36981/41340 (executing program) 2025/08/29 09:03:29 fetching corpus: 150, signal 46444/51655 (executing program) 2025/08/29 09:03:29 fetching corpus: 200, signal 52232/58287 (executing program) 2025/08/29 09:03:29 fetching corpus: 250, signal 57653/64424 (executing program) 2025/08/29 09:03:29 fetching corpus: 300, signal 62725/70150 (executing program) 2025/08/29 09:03:29 fetching corpus: 350, signal 66430/74422 (executing program) 2025/08/29 09:03:29 fetching corpus: 400, signal 68864/77491 (executing program) 2025/08/29 09:03:29 fetching corpus: 450, signal 74341/83114 (executing program) 2025/08/29 09:03:29 fetching corpus: 500, signal 77089/86293 (executing program) 2025/08/29 09:03:29 fetching corpus: 550, signal 79306/88953 (executing program) 2025/08/29 09:03:29 fetching corpus: 600, signal 82221/92123 (executing program) 2025/08/29 09:03:30 fetching corpus: 650, signal 84295/94522 (executing program) 2025/08/29 09:03:30 fetching corpus: 700, signal 86455/96894 (executing program) 2025/08/29 09:03:30 fetching corpus: 750, signal 87664/98509 (executing program) 2025/08/29 09:03:30 fetching corpus: 800, signal 90717/101399 (executing program) 2025/08/29 09:03:30 fetching corpus: 850, signal 92854/103539 (executing program) 2025/08/29 09:03:30 fetching corpus: 900, signal 94967/105658 (executing program) 2025/08/29 09:03:30 fetching corpus: 950, signal 97374/107867 (executing program) 2025/08/29 09:03:30 fetching corpus: 1000, signal 98644/109266 (executing program) 2025/08/29 09:03:30 fetching corpus: 1050, signal 100364/110922 (executing program) 2025/08/29 09:03:31 fetching corpus: 1100, signal 103768/113643 (executing program) 2025/08/29 09:03:31 fetching corpus: 1150, signal 105149/114925 (executing program) 2025/08/29 09:03:31 fetching corpus: 1200, signal 106362/116030 (executing program) 2025/08/29 09:03:31 fetching corpus: 1250, signal 108191/117559 (executing program) 2025/08/29 09:03:32 fetching corpus: 1300, signal 109219/118491 (executing program) 2025/08/29 09:03:32 fetching corpus: 1350, signal 110367/119454 (executing program) 2025/08/29 09:03:32 fetching corpus: 1400, signal 111891/120573 (executing program) 2025/08/29 09:03:32 fetching corpus: 1450, signal 112742/121370 (executing program) 2025/08/29 09:03:32 fetching corpus: 1500, signal 113593/122119 (executing program) 2025/08/29 09:03:32 fetching corpus: 1550, signal 115017/123208 (executing program) 2025/08/29 09:03:33 fetching corpus: 1600, signal 116928/124491 (executing program) 2025/08/29 09:03:33 fetching corpus: 1650, signal 117833/125158 (executing program) 2025/08/29 09:03:33 fetching corpus: 1700, signal 118758/125842 (executing program) 2025/08/29 09:03:33 fetching corpus: 1750, signal 120339/126964 (executing program) 2025/08/29 09:03:33 fetching corpus: 1800, signal 121006/127436 (executing program) 2025/08/29 09:03:33 fetching corpus: 1850, signal 121618/127852 (executing program) 2025/08/29 09:03:33 fetching corpus: 1900, signal 122710/128522 (executing program) 2025/08/29 09:03:33 fetching corpus: 1950, signal 123636/129032 (executing program) 2025/08/29 09:03:34 fetching corpus: 2000, signal 124409/129466 (executing program) 2025/08/29 09:03:34 fetching corpus: 2050, signal 125499/129970 (executing program) 2025/08/29 09:03:34 fetching corpus: 2100, signal 126434/130403 (executing program) 2025/08/29 09:03:34 fetching corpus: 2150, signal 127014/130676 (executing program) 2025/08/29 09:03:34 fetching corpus: 2200, signal 127826/130984 (executing program) 2025/08/29 09:03:34 fetching corpus: 2250, signal 128686/131303 (executing program) 2025/08/29 09:03:34 fetching corpus: 2300, signal 129004/131494 (executing program) 2025/08/29 09:03:34 fetching corpus: 2350, signal 129560/131679 (executing program) 2025/08/29 09:03:34 fetching corpus: 2391, signal 130029/131824 (executing program) 2025/08/29 09:03:34 fetching corpus: 2391, signal 130029/131855 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/131890 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/131933 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/131973 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132012 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132048 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132090 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132123 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132170 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132212 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132245 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132293 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132325 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132357 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132400 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132400 (executing program) 2025/08/29 09:03:35 fetching corpus: 2391, signal 130029/132400 (executing program) 2025/08/29 09:03:37 starting 8 fuzzer processes 09:03:37 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ppoll(&(0x7f0000000080)=[{r0}, {r1, 0x254}], 0x2, 0x0, 0x0, 0x0) 09:03:37 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) 09:03:37 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f00000004c0)="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", 0x33b}], 0x1) 09:03:37 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000a40), 0x8) 09:03:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') preadv(r0, &(0x7f0000001600)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 09:03:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000009680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000011c0)='\n', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000500)="abc82f4b0c65dc65ce5133c7e476076068a83ee92be8e4d3a009928f93cd3bfb040f90f5d1628f91b12b79bb8ba0fd1eb46b1878be284bc3a100eca58bf28ea03d48a1e437744869ff4575ea3868d19605e3457f16e88f76a89efed42659840579a8dfbf55a3d195e32fb6cbbc283b5f15e65d161df3e2612790202e24b9eeac934ab17ed3fcc33835e4b163edc71c58dc1c7fc28a491b4ad14412f6a0419e516588a318", 0xa4}, {&(0x7f00000005c0)="d32b15b258661773fe4339143c26158cbad0c1d15e72bfda8567bae248f941061de2c4aad8fff993890955a4512fbb14fdb5e5d9e02068e1d3ff76dd7b455f3b680c544b6a368b02635b5998982844cd3c9bb255ceeb12489f70ab2f80b05fae6945e9a3c97dc791e0743c13015cb9c41eba959c4a64c7cd6a858fb3fb2b94ce87af21dcf4e580ede5d22335c4c00080f47093a6a4c5fe9669834daaccc7df87abdc5ff6ab79fa4ec7be34abdbb920fd11ecb9f62d8f80", 0xb7}, {&(0x7f0000000780)="1bde42f26b32e1ef07c37d01cc092b7572f703299aece9def598b359f731c09eac5eca072b22b23564ad3d92d330567b843c5ff74c061bf31d1e40ca5c5a0e78049218c02781b954a375e6b1ad394b5fc0242c5cbe1e0696cb11948b0d14230a4db98f98fc0c7364c8b99ba93fd4b5f492e5918fde8f8339663949c29a1772bf4aa32c7d73a7c020603b3c5e0234d37c31959e", 0x93}, {&(0x7f0000000840)="7dfb88723da3512e425bed8e80162d0be98da9e941e352729f69dfbe9f1c70ea8a0b1ba55fbf3b6d22089ff98fee7fb7409685cc631f80dba397e00c3e9db0a74d1d58383d5051a99bac57bc51ddda59575c2237c5339eae355eb916b90d53780a43f0aa81d5be3780ea30e3efed286c9ab4d827f4de9d8526d72a21c28872821a7166af627cd6f362af7aeca0e3e8ef8fbb73d8c86924b45afcfdc144281d491594978b3d5dc0f7e94428178611751f03df2b5302f12e49212bd0e1ae9782b2cad49e75b9f8a84d7be9b126adcf74ad39fa69f72646e4742b960890f2a3d52322001e997b6d08b29490", 0xea}, {&(0x7f0000000940)="cea262d51d1621163e229cb550310c7b643b5ab86494c7880d87ba45be49e718af554fb6c9449c96b13d85e8084f6ace9d21493875618e0389b834b3e91436a3efdc7104b44061006ae5a27001669bf298dc3c1ca4075a19443629899129e087a29b5ad75093cb6bd763acccc73c6463da1b5891efcd0a77813831ceb1ef189ac8e28c97c5c4e0eb0b2d06c96d89e83eedab06b2a524707749464f1af2c7d129d8b58015562dbbebff854fbc4af29dfe0a16761f1580a4e9eb1c8790eb735cbb36e18e2a8f94064faf34dd3d0913d31ac9", 0xd1}, {&(0x7f0000003840)="981c778502d4c3eee1b55047bb5e8c2f931d501e78a412", 0x17}], 0x6}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000d80)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000fc0)='s', 0x1}], 0x1}}], 0x3, 0x44009) 09:03:37 executing program 7: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 09:03:37 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44800) [ 70.428422] audit: type=1400 audit(1756458217.798:7): avc: denied { execmem } for pid=273 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 71.657256] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 71.660724] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 71.662973] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 71.668846] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 71.673450] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 71.746430] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 71.751137] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 71.752766] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 71.754382] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 71.758055] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 71.762466] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 71.769742] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 71.777269] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 71.779397] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 71.788429] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 71.815057] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 71.827422] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 71.829403] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 71.831256] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 71.838357] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 71.840898] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 71.843096] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 71.848958] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 71.850730] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 71.852044] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 71.852302] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 71.857862] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 71.864619] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 71.869696] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 71.870738] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 71.872138] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 71.876594] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 71.881578] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 71.882922] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 71.886002] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 71.892623] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 71.898080] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 71.899623] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 71.903149] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 71.908740] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 73.751239] Bluetooth: hci0: command tx timeout [ 73.814837] Bluetooth: hci1: command tx timeout [ 73.878989] Bluetooth: hci2: command tx timeout [ 73.941983] Bluetooth: hci5: command tx timeout [ 73.942567] Bluetooth: hci6: command tx timeout [ 74.006911] Bluetooth: hci4: command tx timeout [ 74.007506] Bluetooth: hci7: command tx timeout [ 74.007635] Bluetooth: hci3: command tx timeout [ 75.798888] Bluetooth: hci0: command tx timeout [ 75.863157] Bluetooth: hci1: command tx timeout [ 75.925982] Bluetooth: hci2: command tx timeout [ 75.991892] Bluetooth: hci5: command tx timeout [ 75.991916] Bluetooth: hci6: command tx timeout [ 76.053896] Bluetooth: hci3: command tx timeout [ 76.054931] Bluetooth: hci4: command tx timeout [ 76.055322] Bluetooth: hci7: command tx timeout [ 77.845988] Bluetooth: hci0: command tx timeout [ 77.909841] Bluetooth: hci1: command tx timeout [ 77.973878] Bluetooth: hci2: command tx timeout [ 78.037830] Bluetooth: hci5: command tx timeout [ 78.038257] Bluetooth: hci6: command tx timeout [ 78.101883] Bluetooth: hci7: command tx timeout [ 78.101911] Bluetooth: hci4: command tx timeout [ 78.102358] Bluetooth: hci3: command tx timeout [ 79.894888] Bluetooth: hci0: command tx timeout [ 79.957923] Bluetooth: hci1: command tx timeout [ 80.022992] Bluetooth: hci2: command tx timeout [ 80.085967] Bluetooth: hci6: command tx timeout [ 80.085993] Bluetooth: hci5: command tx timeout [ 80.150072] Bluetooth: hci4: command tx timeout [ 80.150161] Bluetooth: hci3: command tx timeout [ 80.151040] Bluetooth: hci7: command tx timeout [ 111.668578] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 111.669704] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 111.903381] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 111.904039] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 09:04:19 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44800) 09:04:19 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44800) 09:04:19 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44800) 09:04:20 executing program 6: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) [ 112.734084] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 112.734702] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 09:04:20 executing program 6: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) [ 112.869812] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 112.870449] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 09:04:20 executing program 6: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) [ 112.977534] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 112.978231] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 09:04:20 executing program 6: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) [ 113.108878] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.109916] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 09:04:20 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 113.310923] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.311552] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 113.426640] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.427296] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 113.541062] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.541690] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 113.684658] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.685326] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 113.760126] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.760736] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 113.838879] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.839519] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 113.928488] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 113.931263] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.006316] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.006979] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.007396] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.008183] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.026704] audit: type=1400 audit(1756458261.396:8): avc: denied { watch_reads } for pid=3906 comm="syz-executor.1" path="/syzkaller-testdir842046604/syzkaller.TJvxmY/0/file0" dev="tmpfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir permissive=1 [ 114.071178] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 114.071802] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 114.185127] audit: type=1400 audit(1756458261.554:9): avc: denied { open } for pid=3914 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 114.187010] audit: type=1400 audit(1756458261.555:10): avc: denied { kernel } for pid=3914 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 09:04:21 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ppoll(&(0x7f0000000080)=[{r0}, {r1, 0x254}], 0x2, 0x0, 0x0, 0x0) 09:04:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 09:04:21 executing program 7: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 09:04:21 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000a40), 0x8) 09:04:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000009680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000011c0)='\n', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000500)="abc82f4b0c65dc65ce5133c7e476076068a83ee92be8e4d3a009928f93cd3bfb040f90f5d1628f91b12b79bb8ba0fd1eb46b1878be284bc3a100eca58bf28ea03d48a1e437744869ff4575ea3868d19605e3457f16e88f76a89efed42659840579a8dfbf55a3d195e32fb6cbbc283b5f15e65d161df3e2612790202e24b9eeac934ab17ed3fcc33835e4b163edc71c58dc1c7fc28a491b4ad14412f6a0419e516588a318", 0xa4}, {&(0x7f00000005c0)="d32b15b258661773fe4339143c26158cbad0c1d15e72bfda8567bae248f941061de2c4aad8fff993890955a4512fbb14fdb5e5d9e02068e1d3ff76dd7b455f3b680c544b6a368b02635b5998982844cd3c9bb255ceeb12489f70ab2f80b05fae6945e9a3c97dc791e0743c13015cb9c41eba959c4a64c7cd6a858fb3fb2b94ce87af21dcf4e580ede5d22335c4c00080f47093a6a4c5fe9669834daaccc7df87abdc5ff6ab79fa4ec7be34abdbb920fd11ecb9f62d8f80", 0xb7}, {&(0x7f0000000780)="1bde42f26b32e1ef07c37d01cc092b7572f703299aece9def598b359f731c09eac5eca072b22b23564ad3d92d330567b843c5ff74c061bf31d1e40ca5c5a0e78049218c02781b954a375e6b1ad394b5fc0242c5cbe1e0696cb11948b0d14230a4db98f98fc0c7364c8b99ba93fd4b5f492e5918fde8f8339663949c29a1772bf4aa32c7d73a7c020603b3c5e0234d37c31959e", 0x93}, {&(0x7f0000000840)="7dfb88723da3512e425bed8e80162d0be98da9e941e352729f69dfbe9f1c70ea8a0b1ba55fbf3b6d22089ff98fee7fb7409685cc631f80dba397e00c3e9db0a74d1d58383d5051a99bac57bc51ddda59575c2237c5339eae355eb916b90d53780a43f0aa81d5be3780ea30e3efed286c9ab4d827f4de9d8526d72a21c28872821a7166af627cd6f362af7aeca0e3e8ef8fbb73d8c86924b45afcfdc144281d491594978b3d5dc0f7e94428178611751f03df2b5302f12e49212bd0e1ae9782b2cad49e75b9f8a84d7be9b126adcf74ad39fa69f72646e4742b960890f2a3d52322001e997b6d08b29490", 0xea}, {&(0x7f0000000940)="cea262d51d1621163e229cb550310c7b643b5ab86494c7880d87ba45be49e718af554fb6c9449c96b13d85e8084f6ace9d21493875618e0389b834b3e91436a3efdc7104b44061006ae5a27001669bf298dc3c1ca4075a19443629899129e087a29b5ad75093cb6bd763acccc73c6463da1b5891efcd0a77813831ceb1ef189ac8e28c97c5c4e0eb0b2d06c96d89e83eedab06b2a524707749464f1af2c7d129d8b58015562dbbebff854fbc4af29dfe0a16761f1580a4e9eb1c8790eb735cbb36e18e2a8f94064faf34dd3d0913d31ac9", 0xd1}, {&(0x7f0000003840)="981c778502d4c3eee1b55047bb5e8c2f931d501e78a412", 0x17}], 0x6}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000d80)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000fc0)='s', 0x1}], 0x1}}], 0x3, 0x44009) 09:04:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') preadv(r0, &(0x7f0000001600)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 09:04:21 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) 09:04:21 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f00000004c0)="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", 0x33b}], 0x1) 09:04:21 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000a40), 0x8) 09:04:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000009680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000011c0)='\n', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000500)="abc82f4b0c65dc65ce5133c7e476076068a83ee92be8e4d3a009928f93cd3bfb040f90f5d1628f91b12b79bb8ba0fd1eb46b1878be284bc3a100eca58bf28ea03d48a1e437744869ff4575ea3868d19605e3457f16e88f76a89efed42659840579a8dfbf55a3d195e32fb6cbbc283b5f15e65d161df3e2612790202e24b9eeac934ab17ed3fcc33835e4b163edc71c58dc1c7fc28a491b4ad14412f6a0419e516588a318", 0xa4}, {&(0x7f00000005c0)="d32b15b258661773fe4339143c26158cbad0c1d15e72bfda8567bae248f941061de2c4aad8fff993890955a4512fbb14fdb5e5d9e02068e1d3ff76dd7b455f3b680c544b6a368b02635b5998982844cd3c9bb255ceeb12489f70ab2f80b05fae6945e9a3c97dc791e0743c13015cb9c41eba959c4a64c7cd6a858fb3fb2b94ce87af21dcf4e580ede5d22335c4c00080f47093a6a4c5fe9669834daaccc7df87abdc5ff6ab79fa4ec7be34abdbb920fd11ecb9f62d8f80", 0xb7}, {&(0x7f0000000780)="1bde42f26b32e1ef07c37d01cc092b7572f703299aece9def598b359f731c09eac5eca072b22b23564ad3d92d330567b843c5ff74c061bf31d1e40ca5c5a0e78049218c02781b954a375e6b1ad394b5fc0242c5cbe1e0696cb11948b0d14230a4db98f98fc0c7364c8b99ba93fd4b5f492e5918fde8f8339663949c29a1772bf4aa32c7d73a7c020603b3c5e0234d37c31959e", 0x93}, {&(0x7f0000000840)="7dfb88723da3512e425bed8e80162d0be98da9e941e352729f69dfbe9f1c70ea8a0b1ba55fbf3b6d22089ff98fee7fb7409685cc631f80dba397e00c3e9db0a74d1d58383d5051a99bac57bc51ddda59575c2237c5339eae355eb916b90d53780a43f0aa81d5be3780ea30e3efed286c9ab4d827f4de9d8526d72a21c28872821a7166af627cd6f362af7aeca0e3e8ef8fbb73d8c86924b45afcfdc144281d491594978b3d5dc0f7e94428178611751f03df2b5302f12e49212bd0e1ae9782b2cad49e75b9f8a84d7be9b126adcf74ad39fa69f72646e4742b960890f2a3d52322001e997b6d08b29490", 0xea}, {&(0x7f0000000940)="cea262d51d1621163e229cb550310c7b643b5ab86494c7880d87ba45be49e718af554fb6c9449c96b13d85e8084f6ace9d21493875618e0389b834b3e91436a3efdc7104b44061006ae5a27001669bf298dc3c1ca4075a19443629899129e087a29b5ad75093cb6bd763acccc73c6463da1b5891efcd0a77813831ceb1ef189ac8e28c97c5c4e0eb0b2d06c96d89e83eedab06b2a524707749464f1af2c7d129d8b58015562dbbebff854fbc4af29dfe0a16761f1580a4e9eb1c8790eb735cbb36e18e2a8f94064faf34dd3d0913d31ac9", 0xd1}, {&(0x7f0000003840)="981c778502d4c3eee1b55047bb5e8c2f931d501e78a412", 0x17}], 0x6}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000d80)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000fc0)='s', 0x1}], 0x1}}], 0x3, 0x44009) 09:04:21 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f00000004c0)="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", 0x33b}], 0x1) 09:04:21 executing program 7: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 09:04:21 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) 09:04:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') preadv(r0, &(0x7f0000001600)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 09:04:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 114.449613] kmemleak: Found object by alias at 0x607f1a639aa0 [ 114.449634] CPU: 1 UID: 0 PID: 3938 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 114.449651] Tainted: [W]=WARN [ 114.449655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 114.449662] Call Trace: [ 114.449666] [ 114.449671] dump_stack_lvl+0xca/0x120 [ 114.449695] __lookup_object+0x94/0xb0 [ 114.449712] delete_object_full+0x27/0x70 [ 114.449727] free_percpu+0x30/0x1160 [ 114.449744] ? arch_uprobe_clear_state+0x16/0x140 [ 114.449768] futex_hash_free+0x38/0xc0 [ 114.449782] mmput+0x2d3/0x390 [ 114.449800] do_exit+0x79d/0x2970 [ 114.449817] ? __pfx_do_exit+0x10/0x10 [ 114.449830] ? find_held_lock+0x2b/0x80 [ 114.449848] ? get_signal+0x835/0x2340 [ 114.449867] do_group_exit+0xd3/0x2a0 [ 114.449881] get_signal+0x2315/0x2340 [ 114.449898] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 114.449914] ? __pfx_get_signal+0x10/0x10 [ 114.449930] ? __schedule+0xe91/0x3590 [ 114.449950] arch_do_signal_or_restart+0x80/0x790 [ 114.449966] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 114.449982] ? __x64_sys_futex+0x1c9/0x4d0 [ 114.449994] ? __x64_sys_futex+0x1d2/0x4d0 [ 114.450009] ? __pfx___x64_sys_futex+0x10/0x10 [ 114.450022] ? xfd_validate_state+0x55/0x180 [ 114.450042] exit_to_user_mode_loop+0x8b/0x110 [ 114.450054] do_syscall_64+0x2f7/0x360 [ 114.450066] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.450077] RIP: 0033:0x7f739c205b19 [ 114.450086] Code: Unable to access opcode bytes at 0x7f739c205aef. [ 114.450091] RSP: 002b:00007f739977b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 114.450102] RAX: 0000000000000001 RBX: 00007f739c318f68 RCX: 00007f739c205b19 [ 114.450109] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f739c318f6c [ 114.450116] RBP: 00007f739c318f60 R08: 000000000000000e R09: 0000000000000000 [ 114.450123] R10: 0000000000000001 R11: 0000000000000246 R12: 00007f739c318f6c [ 114.450130] R13: 00007ffd4c2ae55f R14: 00007f739977b300 R15: 0000000000022000 [ 114.450145] [ 114.450149] kmemleak: Object (percpu) 0x607f1a639a9c (size 8): [ 114.450155] kmemleak: comm "syz-executor.1", pid 3943, jiffies 4294781354 [ 114.450162] kmemleak: min_count = 1 [ 114.450166] kmemleak: count = 0 [ 114.450169] kmemleak: flags = 0x21 [ 114.450173] kmemleak: checksum = 0 [ 114.450176] kmemleak: backtrace: [ 114.450180] pcpu_alloc_noprof+0x87a/0x1170 [ 114.450194] alloc_vfsmnt+0x135/0x6e0 [ 114.450207] vfs_create_mount.part.0+0x40/0x440 [ 114.450222] path_mount+0x1637/0x1dd0 [ 114.450232] __x64_sys_mount+0x27b/0x300 [ 114.450243] do_syscall_64+0xbf/0x360 [ 114.450251] entry_SYSCALL_64_after_hwframe+0x77/0x7f 09:04:21 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ppoll(&(0x7f0000000080)=[{r0}, {r1, 0x254}], 0x2, 0x0, 0x0, 0x0) 09:04:21 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000140)=[{&(0x7f00000004c0)="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", 0x33b}], 0x1) 09:04:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000009680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000011c0)='\n', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000500)="abc82f4b0c65dc65ce5133c7e476076068a83ee92be8e4d3a009928f93cd3bfb040f90f5d1628f91b12b79bb8ba0fd1eb46b1878be284bc3a100eca58bf28ea03d48a1e437744869ff4575ea3868d19605e3457f16e88f76a89efed42659840579a8dfbf55a3d195e32fb6cbbc283b5f15e65d161df3e2612790202e24b9eeac934ab17ed3fcc33835e4b163edc71c58dc1c7fc28a491b4ad14412f6a0419e516588a318", 0xa4}, {&(0x7f00000005c0)="d32b15b258661773fe4339143c26158cbad0c1d15e72bfda8567bae248f941061de2c4aad8fff993890955a4512fbb14fdb5e5d9e02068e1d3ff76dd7b455f3b680c544b6a368b02635b5998982844cd3c9bb255ceeb12489f70ab2f80b05fae6945e9a3c97dc791e0743c13015cb9c41eba959c4a64c7cd6a858fb3fb2b94ce87af21dcf4e580ede5d22335c4c00080f47093a6a4c5fe9669834daaccc7df87abdc5ff6ab79fa4ec7be34abdbb920fd11ecb9f62d8f80", 0xb7}, {&(0x7f0000000780)="1bde42f26b32e1ef07c37d01cc092b7572f703299aece9def598b359f731c09eac5eca072b22b23564ad3d92d330567b843c5ff74c061bf31d1e40ca5c5a0e78049218c02781b954a375e6b1ad394b5fc0242c5cbe1e0696cb11948b0d14230a4db98f98fc0c7364c8b99ba93fd4b5f492e5918fde8f8339663949c29a1772bf4aa32c7d73a7c020603b3c5e0234d37c31959e", 0x93}, {&(0x7f0000000840)="7dfb88723da3512e425bed8e80162d0be98da9e941e352729f69dfbe9f1c70ea8a0b1ba55fbf3b6d22089ff98fee7fb7409685cc631f80dba397e00c3e9db0a74d1d58383d5051a99bac57bc51ddda59575c2237c5339eae355eb916b90d53780a43f0aa81d5be3780ea30e3efed286c9ab4d827f4de9d8526d72a21c28872821a7166af627cd6f362af7aeca0e3e8ef8fbb73d8c86924b45afcfdc144281d491594978b3d5dc0f7e94428178611751f03df2b5302f12e49212bd0e1ae9782b2cad49e75b9f8a84d7be9b126adcf74ad39fa69f72646e4742b960890f2a3d52322001e997b6d08b29490", 0xea}, {&(0x7f0000000940)="cea262d51d1621163e229cb550310c7b643b5ab86494c7880d87ba45be49e718af554fb6c9449c96b13d85e8084f6ace9d21493875618e0389b834b3e91436a3efdc7104b44061006ae5a27001669bf298dc3c1ca4075a19443629899129e087a29b5ad75093cb6bd763acccc73c6463da1b5891efcd0a77813831ceb1ef189ac8e28c97c5c4e0eb0b2d06c96d89e83eedab06b2a524707749464f1af2c7d129d8b58015562dbbebff854fbc4af29dfe0a16761f1580a4e9eb1c8790eb735cbb36e18e2a8f94064faf34dd3d0913d31ac9", 0xd1}, {&(0x7f0000003840)="981c778502d4c3eee1b55047bb5e8c2f931d501e78a412", 0x17}], 0x6}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000d80)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000fc0)='s', 0x1}], 0x1}}], 0x3, 0x44009) 09:04:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') preadv(r0, &(0x7f0000001600)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 09:04:21 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) read$eventfd(r0, &(0x7f0000000a40), 0x8) 09:04:21 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) 09:04:21 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 09:04:21 executing program 7: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 09:04:22 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) 09:04:22 executing program 0: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ppoll(&(0x7f0000000080)=[{r0}, {r1, 0x254}], 0x2, 0x0, 0x0, 0x0) 09:04:22 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) [ 114.712141] kmemleak: Found object by alias at 0x607f1a639a9c [ 114.712165] CPU: 0 UID: 0 PID: 3965 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 114.712183] Tainted: [W]=WARN [ 114.712187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 114.712194] Call Trace: [ 114.712198] [ 114.712203] dump_stack_lvl+0xca/0x120 [ 114.712227] __lookup_object+0x94/0xb0 [ 114.712244] delete_object_full+0x27/0x70 [ 114.712259] free_percpu+0x30/0x1160 [ 114.712275] ? arch_uprobe_clear_state+0x16/0x140 [ 114.712295] futex_hash_free+0x38/0xc0 [ 114.712309] mmput+0x2d3/0x390 [ 114.712328] do_exit+0x79d/0x2970 [ 114.712341] ? lock_release+0xc8/0x290 [ 114.712357] ? __pfx_do_exit+0x10/0x10 [ 114.712371] ? find_held_lock+0x2b/0x80 [ 114.712387] ? get_signal+0x835/0x2340 [ 114.712407] do_group_exit+0xd3/0x2a0 [ 114.712421] get_signal+0x2315/0x2340 [ 114.712443] ? __virt_addr_valid+0x100/0x5d0 [ 114.712464] ? __pfx_get_signal+0x10/0x10 [ 114.712480] ? do_futex+0x135/0x370 [ 114.712493] ? __pfx_do_futex+0x10/0x10 [ 114.712505] ? putname.part.0+0x11b/0x160 [ 114.712522] arch_do_signal_or_restart+0x80/0x790 [ 114.712539] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 114.712554] ? __x64_sys_futex+0x1c9/0x4d0 [ 114.712566] ? __x64_sys_futex+0x1d2/0x4d0 [ 114.712581] ? __pfx___x64_sys_futex+0x10/0x10 [ 114.712594] ? getname_flags.part.0+0x1c6/0x540 [ 114.712613] exit_to_user_mode_loop+0x8b/0x110 [ 114.712626] do_syscall_64+0x2f7/0x360 [ 114.712637] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.712649] RIP: 0033:0x7f75fb018b19 [ 114.712658] Code: Unable to access opcode bytes at 0x7f75fb018aef. [ 114.712663] RSP: 002b:00007f75f858e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 114.712674] RAX: fffffffffffffe00 RBX: 00007f75fb12bf68 RCX: 00007f75fb018b19 [ 114.712681] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f75fb12bf68 [ 114.712688] RBP: 00007f75fb12bf60 R08: 0000000000000000 R09: 0000000000000000 [ 114.712695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75fb12bf6c [ 114.712702] R13: 00007ffce533079f R14: 00007f75f858e300 R15: 0000000000022000 [ 114.712717] [ 114.712721] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 114.712728] kmemleak: comm "syz-executor.5", pid 286, jiffies 4294781603 [ 114.712734] kmemleak: min_count = 1 [ 114.712738] kmemleak: count = 0 [ 114.712742] kmemleak: flags = 0x21 [ 114.712745] kmemleak: checksum = 0 [ 114.712749] kmemleak: backtrace: [ 114.712752] pcpu_alloc_noprof+0x87a/0x1170 [ 114.712767] mm_init+0x99b/0x1170 [ 114.712775] copy_process+0x3ab7/0x73c0 [ 114.712784] kernel_clone+0xea/0x7f0 [ 114.712794] __do_sys_clone+0xce/0x120 [ 114.712803] do_syscall_64+0xbf/0x360 [ 114.712812] entry_SYSCALL_64_after_hwframe+0x77/0x7f 09:04:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000009680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000011c0)='\n', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000500)="abc82f4b0c65dc65ce5133c7e476076068a83ee92be8e4d3a009928f93cd3bfb040f90f5d1628f91b12b79bb8ba0fd1eb46b1878be284bc3a100eca58bf28ea03d48a1e437744869ff4575ea3868d19605e3457f16e88f76a89efed42659840579a8dfbf55a3d195e32fb6cbbc283b5f15e65d161df3e2612790202e24b9eeac934ab17ed3fcc33835e4b163edc71c58dc1c7fc28a491b4ad14412f6a0419e516588a318", 0xa4}, {&(0x7f00000005c0)="d32b15b258661773fe4339143c26158cbad0c1d15e72bfda8567bae248f941061de2c4aad8fff993890955a4512fbb14fdb5e5d9e02068e1d3ff76dd7b455f3b680c544b6a368b02635b5998982844cd3c9bb255ceeb12489f70ab2f80b05fae6945e9a3c97dc791e0743c13015cb9c41eba959c4a64c7cd6a858fb3fb2b94ce87af21dcf4e580ede5d22335c4c00080f47093a6a4c5fe9669834daaccc7df87abdc5ff6ab79fa4ec7be34abdbb920fd11ecb9f62d8f80", 0xb7}, {&(0x7f0000000780)="1bde42f26b32e1ef07c37d01cc092b7572f703299aece9def598b359f731c09eac5eca072b22b23564ad3d92d330567b843c5ff74c061bf31d1e40ca5c5a0e78049218c02781b954a375e6b1ad394b5fc0242c5cbe1e0696cb11948b0d14230a4db98f98fc0c7364c8b99ba93fd4b5f492e5918fde8f8339663949c29a1772bf4aa32c7d73a7c020603b3c5e0234d37c31959e", 0x93}, {&(0x7f0000000840)="7dfb88723da3512e425bed8e80162d0be98da9e941e352729f69dfbe9f1c70ea8a0b1ba55fbf3b6d22089ff98fee7fb7409685cc631f80dba397e00c3e9db0a74d1d58383d5051a99bac57bc51ddda59575c2237c5339eae355eb916b90d53780a43f0aa81d5be3780ea30e3efed286c9ab4d827f4de9d8526d72a21c28872821a7166af627cd6f362af7aeca0e3e8ef8fbb73d8c86924b45afcfdc144281d491594978b3d5dc0f7e94428178611751f03df2b5302f12e49212bd0e1ae9782b2cad49e75b9f8a84d7be9b126adcf74ad39fa69f72646e4742b960890f2a3d52322001e997b6d08b29490", 0xea}, {&(0x7f0000000940)="cea262d51d1621163e229cb550310c7b643b5ab86494c7880d87ba45be49e718af554fb6c9449c96b13d85e8084f6ace9d21493875618e0389b834b3e91436a3efdc7104b44061006ae5a27001669bf298dc3c1ca4075a19443629899129e087a29b5ad75093cb6bd763acccc73c6463da1b5891efcd0a77813831ceb1ef189ac8e28c97c5c4e0eb0b2d06c96d89e83eedab06b2a524707749464f1af2c7d129d8b58015562dbbebff854fbc4af29dfe0a16761f1580a4e9eb1c8790eb735cbb36e18e2a8f94064faf34dd3d0913d31ac9", 0xd1}, {&(0x7f0000003840)="981c778502d4c3eee1b55047bb5e8c2f931d501e78a412", 0x17}], 0x6}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000d80)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000fc0)='s', 0x1}], 0x1}}], 0x3, 0x44009) 09:04:22 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) 09:04:22 executing program 4: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 09:04:22 executing program 6: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 09:04:22 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) 09:04:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000009680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000011c0)='\n', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000500)="abc82f4b0c65dc65ce5133c7e476076068a83ee92be8e4d3a009928f93cd3bfb040f90f5d1628f91b12b79bb8ba0fd1eb46b1878be284bc3a100eca58bf28ea03d48a1e437744869ff4575ea3868d19605e3457f16e88f76a89efed42659840579a8dfbf55a3d195e32fb6cbbc283b5f15e65d161df3e2612790202e24b9eeac934ab17ed3fcc33835e4b163edc71c58dc1c7fc28a491b4ad14412f6a0419e516588a318", 0xa4}, {&(0x7f00000005c0)="d32b15b258661773fe4339143c26158cbad0c1d15e72bfda8567bae248f941061de2c4aad8fff993890955a4512fbb14fdb5e5d9e02068e1d3ff76dd7b455f3b680c544b6a368b02635b5998982844cd3c9bb255ceeb12489f70ab2f80b05fae6945e9a3c97dc791e0743c13015cb9c41eba959c4a64c7cd6a858fb3fb2b94ce87af21dcf4e580ede5d22335c4c00080f47093a6a4c5fe9669834daaccc7df87abdc5ff6ab79fa4ec7be34abdbb920fd11ecb9f62d8f80", 0xb7}, {&(0x7f0000000780)="1bde42f26b32e1ef07c37d01cc092b7572f703299aece9def598b359f731c09eac5eca072b22b23564ad3d92d330567b843c5ff74c061bf31d1e40ca5c5a0e78049218c02781b954a375e6b1ad394b5fc0242c5cbe1e0696cb11948b0d14230a4db98f98fc0c7364c8b99ba93fd4b5f492e5918fde8f8339663949c29a1772bf4aa32c7d73a7c020603b3c5e0234d37c31959e", 0x93}, {&(0x7f0000000840)="7dfb88723da3512e425bed8e80162d0be98da9e941e352729f69dfbe9f1c70ea8a0b1ba55fbf3b6d22089ff98fee7fb7409685cc631f80dba397e00c3e9db0a74d1d58383d5051a99bac57bc51ddda59575c2237c5339eae355eb916b90d53780a43f0aa81d5be3780ea30e3efed286c9ab4d827f4de9d8526d72a21c28872821a7166af627cd6f362af7aeca0e3e8ef8fbb73d8c86924b45afcfdc144281d491594978b3d5dc0f7e94428178611751f03df2b5302f12e49212bd0e1ae9782b2cad49e75b9f8a84d7be9b126adcf74ad39fa69f72646e4742b960890f2a3d52322001e997b6d08b29490", 0xea}, {&(0x7f0000000940)="cea262d51d1621163e229cb550310c7b643b5ab86494c7880d87ba45be49e718af554fb6c9449c96b13d85e8084f6ace9d21493875618e0389b834b3e91436a3efdc7104b44061006ae5a27001669bf298dc3c1ca4075a19443629899129e087a29b5ad75093cb6bd763acccc73c6463da1b5891efcd0a77813831ceb1ef189ac8e28c97c5c4e0eb0b2d06c96d89e83eedab06b2a524707749464f1af2c7d129d8b58015562dbbebff854fbc4af29dfe0a16761f1580a4e9eb1c8790eb735cbb36e18e2a8f94064faf34dd3d0913d31ac9", 0xd1}, {&(0x7f0000003840)="981c778502d4c3eee1b55047bb5e8c2f931d501e78a412", 0x17}], 0x6}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000d80)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000fc0)='s', 0x1}], 0x1}}], 0x3, 0x44009) [ 114.842415] kmemleak: Found object by alias at 0x607f1a639a9c [ 114.842439] CPU: 0 UID: 0 PID: 3972 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 114.842457] Tainted: [W]=WARN [ 114.842461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 114.842468] Call Trace: [ 114.842472] [ 114.842477] dump_stack_lvl+0xca/0x120 [ 114.842502] __lookup_object+0x94/0xb0 [ 114.842519] delete_object_full+0x27/0x70 [ 114.842534] free_percpu+0x30/0x1160 [ 114.842551] ? arch_uprobe_clear_state+0x16/0x140 [ 114.842571] futex_hash_free+0x38/0xc0 [ 114.842585] mmput+0x2d3/0x390 [ 114.842603] do_exit+0x79d/0x2970 [ 114.842617] ? signal_wake_up_state+0x9f/0x120 [ 114.842632] ? zap_other_threads+0x2b9/0x3a0 [ 114.842647] ? __pfx_do_exit+0x10/0x10 [ 114.842659] ? do_group_exit+0x1c3/0x2a0 [ 114.842673] ? lock_release+0xc8/0x290 09:04:22 executing program 4: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) [ 114.842690] do_group_exit+0xd3/0x2a0 [ 114.842704] __x64_sys_exit_group+0x3e/0x50 [ 114.842717] x64_sys_call+0x18c5/0x18d0 [ 114.842733] do_syscall_64+0xbf/0x360 [ 114.842744] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.842755] RIP: 0033:0x7f75fb018b19 [ 114.842769] Code: Unable to access opcode bytes at 0x7f75fb018aef. [ 114.842774] RSP: 002b:00007ffce53309c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 114.842786] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f75fb018b19 [ 114.842793] RDX: 00007f75fafcb72b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 114.842800] RBP: 0000000000000000 R08: 0000001b2d2267f4 R09: 0000000000000000 [ 114.842807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.842813] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffce5330ab0 [ 114.842828] [ 114.842832] kmemleak: Object (percpu) 0x607f1a639a98 (size 8): [ 114.842839] kmemleak: comm "syz-executor.4", pid 3976, jiffies 4294781728 [ 114.842845] kmemleak: min_count = 1 [ 114.842849] kmemleak: count = 0 [ 114.842853] kmemleak: flags = 0x21 [ 114.842856] kmemleak: checksum = 0 [ 114.842860] kmemleak: backtrace: [ 114.842863] pcpu_alloc_noprof+0x87a/0x1170 [ 114.842878] percpu_ref_init+0x37/0x400 [ 114.842895] blkg_alloc+0xe9/0x7d0 [ 114.842907] blkg_create+0xe08/0x1420 [ 114.842919] bio_associate_blkg_from_css+0xe06/0x1380 [ 114.842932] bio_associate_blkg+0x10e/0x2a0 [ 114.842944] bio_init+0x2dd/0x570 [ 114.842956] bio_alloc_bioset+0x4c5/0x8c0 [ 114.842969] ext4_bio_write_folio+0x8d6/0x13c0 [ 114.842986] mpage_map_and_submit_buffers+0x545/0x9d0 [ 114.843004] ext4_do_writepages+0x2125/0x38b0 [ 114.843015] ext4_writepages+0x369/0x7a0 [ 114.843026] do_writepages+0x244/0x5c0 [ 114.843039] filemap_fdatawrite_wbc+0x10b/0x150 [ 114.843062] __filemap_fdatawrite_range+0xb9/0x100 [ 114.843078] filemap_write_and_wait_range.part.0+0x89/0x110 09:04:22 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) 09:04:22 executing program 6: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 09:04:22 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000cc0), &(0x7f0000000d00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e40)=ANY=[]) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xd400080b) inotify_rm_watch(r0, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) 09:04:22 executing program 4: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 09:04:22 executing program 6: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, 0x0) sync_file_range(r2, 0x1, 0x0, 0x1) pwritev2(r2, &(0x7f0000000040)=[{&(0x7f00000008c0)='!', 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x44000) sendfile(r0, r1, 0x0, 0xfdef) 09:04:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 09:04:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') ioctl$TUNSETIFF(r0, 0xc0606610, 0x0) 09:04:22 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) setsockopt$bt_BT_VOICE(r1, 0x112, 0x10, 0x0, 0x0) 09:04:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000740)={0xa, 0x4e23, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000009680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000011c0)='\n', 0x1}], 0x1}}], 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000001100)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000500)="abc82f4b0c65dc65ce5133c7e476076068a83ee92be8e4d3a009928f93cd3bfb040f90f5d1628f91b12b79bb8ba0fd1eb46b1878be284bc3a100eca58bf28ea03d48a1e437744869ff4575ea3868d19605e3457f16e88f76a89efed42659840579a8dfbf55a3d195e32fb6cbbc283b5f15e65d161df3e2612790202e24b9eeac934ab17ed3fcc33835e4b163edc71c58dc1c7fc28a491b4ad14412f6a0419e516588a318", 0xa4}, {&(0x7f00000005c0)="d32b15b258661773fe4339143c26158cbad0c1d15e72bfda8567bae248f941061de2c4aad8fff993890955a4512fbb14fdb5e5d9e02068e1d3ff76dd7b455f3b680c544b6a368b02635b5998982844cd3c9bb255ceeb12489f70ab2f80b05fae6945e9a3c97dc791e0743c13015cb9c41eba959c4a64c7cd6a858fb3fb2b94ce87af21dcf4e580ede5d22335c4c00080f47093a6a4c5fe9669834daaccc7df87abdc5ff6ab79fa4ec7be34abdbb920fd11ecb9f62d8f80", 0xb7}, {&(0x7f0000000780)="1bde42f26b32e1ef07c37d01cc092b7572f703299aece9def598b359f731c09eac5eca072b22b23564ad3d92d330567b843c5ff74c061bf31d1e40ca5c5a0e78049218c02781b954a375e6b1ad394b5fc0242c5cbe1e0696cb11948b0d14230a4db98f98fc0c7364c8b99ba93fd4b5f492e5918fde8f8339663949c29a1772bf4aa32c7d73a7c020603b3c5e0234d37c31959e", 0x93}, {&(0x7f0000000840)="7dfb88723da3512e425bed8e80162d0be98da9e941e352729f69dfbe9f1c70ea8a0b1ba55fbf3b6d22089ff98fee7fb7409685cc631f80dba397e00c3e9db0a74d1d58383d5051a99bac57bc51ddda59575c2237c5339eae355eb916b90d53780a43f0aa81d5be3780ea30e3efed286c9ab4d827f4de9d8526d72a21c28872821a7166af627cd6f362af7aeca0e3e8ef8fbb73d8c86924b45afcfdc144281d491594978b3d5dc0f7e94428178611751f03df2b5302f12e49212bd0e1ae9782b2cad49e75b9f8a84d7be9b126adcf74ad39fa69f72646e4742b960890f2a3d52322001e997b6d08b29490", 0xea}, {&(0x7f0000000940)="cea262d51d1621163e229cb550310c7b643b5ab86494c7880d87ba45be49e718af554fb6c9449c96b13d85e8084f6ace9d21493875618e0389b834b3e91436a3efdc7104b44061006ae5a27001669bf298dc3c1ca4075a19443629899129e087a29b5ad75093cb6bd763acccc73c6463da1b5891efcd0a77813831ceb1ef189ac8e28c97c5c4e0eb0b2d06c96d89e83eedab06b2a524707749464f1af2c7d129d8b58015562dbbebff854fbc4af29dfe0a16761f1580a4e9eb1c8790eb735cbb36e18e2a8f94064faf34dd3d0913d31ac9", 0xd1}, {&(0x7f0000003840)="981c778502d4c3eee1b55047bb5e8c2f931d501e78a412", 0x17}], 0x6}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000d80)="e3", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000fc0)='s', 0x1}], 0x1}}], 0x3, 0x44009) 09:04:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') ioctl$TUNSETIFF(r0, 0xc0606610, 0x0) 09:04:22 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x85) 09:04:22 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001180)={{0x2, 0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 09:04:22 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) setsockopt$bt_BT_VOICE(r1, 0x112, 0x10, 0x0, 0x0) 09:04:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) [ 115.134457] kmemleak: Found object by alias at 0x607f1a639aa4 [ 115.134479] CPU: 0 UID: 0 PID: 4003 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.134497] Tainted: [W]=WARN [ 115.134500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.134507] Call Trace: 09:04:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 09:04:22 executing program 4: syz_mount_image$nfs(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)={[{'\x00'}]}) 09:04:22 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) [ 115.134511] [ 115.134516] dump_stack_lvl+0xca/0x120 [ 115.134541] __lookup_object+0x94/0xb0 09:04:22 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001180)={{0x2, 0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 09:04:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') ioctl$TUNSETIFF(r0, 0xc0606610, 0x0) [ 115.134558] delete_object_full+0x27/0x70 [ 115.134574] free_percpu+0x30/0x1160 [ 115.134589] ? arch_uprobe_clear_state+0x16/0x140 [ 115.134609] futex_hash_free+0x38/0xc0 [ 115.134623] mmput+0x2d3/0x390 [ 115.134641] do_exit+0x79d/0x2970 [ 115.134654] ? signal_wake_up_state+0x85/0x120 [ 115.134670] ? zap_other_threads+0x2b9/0x3a0 [ 115.134685] ? __pfx_do_exit+0x10/0x10 [ 115.134697] ? do_group_exit+0x1c3/0x2a0 [ 115.134710] ? lock_release+0xc8/0x290 [ 115.134727] do_group_exit+0xd3/0x2a0 [ 115.134741] __x64_sys_exit_group+0x3e/0x50 [ 115.134754] x64_sys_call+0x18c5/0x18d0 [ 115.134774] do_syscall_64+0xbf/0x360 [ 115.134786] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.134797] RIP: 0033:0x7f81e497eb19 [ 115.134806] Code: Unable to access opcode bytes at 0x7f81e497eaef. [ 115.134811] RSP: 002b:00007fffa81ffb28 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 09:04:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) [ 115.134822] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f81e497eb19 [ 115.134829] RDX: 00007f81e493172b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 115.134836] RBP: 0000000000000000 R08: 0000001b2d023118 R09: 0000000000000000 [ 115.134843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.134849] R13: 0000000000000000 R14: 0000000000000001 R15: 00007fffa81ffc10 [ 115.134864] [ 115.134868] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.134874] kmemleak: comm "syz-executor.2", pid 285, jiffies 4294782046 09:04:22 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) setsockopt$bt_BT_VOICE(r1, 0x112, 0x10, 0x0, 0x0) [ 115.134881] kmemleak: min_count = 1 [ 115.134885] kmemleak: count = 0 [ 115.134888] kmemleak: flags = 0x21 [ 115.134892] kmemleak: checksum = 0 [ 115.134896] kmemleak: backtrace: [ 115.134899] pcpu_alloc_noprof+0x87a/0x1170 [ 115.134914] mm_init+0x99b/0x1170 [ 115.134921] copy_process+0x3ab7/0x73c0 [ 115.134931] kernel_clone+0xea/0x7f0 [ 115.134941] __do_sys_clone+0xce/0x120 [ 115.134950] do_syscall_64+0xbf/0x360 [ 115.134959] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.268829] kmemleak: Found object by alias at 0x607f1a639aa0 [ 115.268847] CPU: 0 UID: 0 PID: 4022 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.268865] Tainted: [W]=WARN [ 115.268869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.268876] Call Trace: [ 115.268880] [ 115.268884] dump_stack_lvl+0xca/0x120 [ 115.268908] __lookup_object+0x94/0xb0 [ 115.268925] delete_object_full+0x27/0x70 [ 115.268940] free_percpu+0x30/0x1160 [ 115.268956] ? arch_uprobe_clear_state+0x16/0x140 [ 115.268976] futex_hash_free+0x38/0xc0 [ 115.268989] mmput+0x2d3/0x390 [ 115.269008] do_exit+0x79d/0x2970 [ 115.269021] ? lock_release+0xc8/0x290 [ 115.269037] ? __pfx_do_exit+0x10/0x10 [ 115.269051] ? find_held_lock+0x2b/0x80 [ 115.269068] ? get_signal+0x835/0x2340 [ 115.269087] do_group_exit+0xd3/0x2a0 [ 115.269101] get_signal+0x2315/0x2340 [ 115.269120] ? do_vfs_ioctl+0x125/0x1470 [ 115.269138] ? __pfx_get_signal+0x10/0x10 [ 115.269153] ? do_futex+0x135/0x370 [ 115.269167] ? __pfx_do_futex+0x10/0x10 [ 115.269178] ? debug_mutex_unlock+0x1/0x270 [ 115.269196] arch_do_signal_or_restart+0x80/0x790 [ 115.269213] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 115.269229] ? __x64_sys_futex+0x1c9/0x4d0 [ 115.269244] ? __x64_sys_futex+0x1d2/0x4d0 [ 115.269259] ? __pfx___x64_sys_futex+0x10/0x10 [ 115.269271] ? selinux_file_ioctl+0xb9/0x280 [ 115.269291] exit_to_user_mode_loop+0x8b/0x110 [ 115.269304] do_syscall_64+0x2f7/0x360 [ 115.269315] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.269327] RIP: 0033:0x7f739c205b19 [ 115.269336] Code: Unable to access opcode bytes at 0x7f739c205aef. [ 115.269341] RSP: 002b:00007f739977b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 115.269352] RAX: fffffffffffffe00 RBX: 00007f739c318f68 RCX: 00007f739c205b19 [ 115.269359] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f739c318f68 [ 115.269366] RBP: 00007f739c318f60 R08: 0000000000000000 R09: 0000000000000000 [ 115.269373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f739c318f6c [ 115.269379] R13: 00007ffd4c2ae55f R14: 00007f739977b300 R15: 0000000000022000 [ 115.269395] [ 115.269398] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.269405] kmemleak: comm "syz-executor.2", pid 285, jiffies 4294782174 [ 115.269412] kmemleak: min_count = 1 [ 115.269415] kmemleak: count = 0 [ 115.269419] kmemleak: flags = 0x21 [ 115.269423] kmemleak: checksum = 0 [ 115.269426] kmemleak: backtrace: [ 115.269430] pcpu_alloc_noprof+0x87a/0x1170 [ 115.269444] mm_init+0x99b/0x1170 [ 115.269452] copy_process+0x3ab7/0x73c0 [ 115.269462] kernel_clone+0xea/0x7f0 [ 115.269471] __do_sys_clone+0xce/0x120 [ 115.269481] do_syscall_64+0xbf/0x360 [ 115.269489] entry_SYSCALL_64_after_hwframe+0x77/0x7f 09:04:22 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x85) 09:04:22 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 09:04:22 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) 09:04:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) 09:04:22 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001180)={{0x2, 0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 09:04:22 executing program 4: syz_mount_image$nfs(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)={[{'\x00'}]}) 09:04:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='pagemap\x00') ioctl$TUNSETIFF(r0, 0xc0606610, 0x0) 09:04:22 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup2(r0, r0) setsockopt$bt_BT_VOICE(r1, 0x112, 0x10, 0x0, 0x0) [ 115.429250] kmemleak: Found object by alias at 0x607f1a639aa4 [ 115.429271] CPU: 0 UID: 0 PID: 4034 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.429289] Tainted: [W]=WARN [ 115.429293] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.429300] Call Trace: [ 115.429304] [ 115.429308] dump_stack_lvl+0xca/0x120 [ 115.429333] __lookup_object+0x94/0xb0 [ 115.429351] delete_object_full+0x27/0x70 [ 115.429366] free_percpu+0x30/0x1160 [ 115.429384] ? arch_uprobe_clear_state+0x16/0x140 [ 115.429404] futex_hash_free+0x38/0xc0 [ 115.429418] mmput+0x2d3/0x390 [ 115.429436] do_exit+0x79d/0x2970 [ 115.429450] ? signal_wake_up_state+0x85/0x120 [ 115.429466] ? zap_other_threads+0x2b9/0x3a0 [ 115.429481] ? __pfx_do_exit+0x10/0x10 [ 115.429494] ? do_group_exit+0x1c3/0x2a0 [ 115.429507] ? lock_release+0xc8/0x290 [ 115.429524] do_group_exit+0xd3/0x2a0 [ 115.429539] __x64_sys_exit_group+0x3e/0x50 [ 115.429553] x64_sys_call+0x18c5/0x18d0 [ 115.429569] do_syscall_64+0xbf/0x360 [ 115.429580] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.429591] RIP: 0033:0x7f81e497eb19 [ 115.429600] Code: Unable to access opcode bytes at 0x7f81e497eaef. [ 115.429605] RSP: 002b:00007fffa81ffb28 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 115.429616] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f81e497eb19 [ 115.429624] RDX: 00007f81e493172b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 115.429631] RBP: 0000000000000000 R08: 0000001b2d023118 R09: 0000000000000000 [ 115.429637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.429644] R13: 0000000000000000 R14: 0000000000000001 R15: 00007fffa81ffc10 [ 115.429659] [ 115.429663] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.429669] kmemleak: comm "syz-executor.7", pid 288, jiffies 4294782277 [ 115.429676] kmemleak: min_count = 1 [ 115.429680] kmemleak: count = 0 [ 115.429684] kmemleak: flags = 0x21 [ 115.429687] kmemleak: checksum = 0 [ 115.429691] kmemleak: backtrace: [ 115.429694] pcpu_alloc_noprof+0x87a/0x1170 [ 115.429709] mm_init+0x99b/0x1170 [ 115.429717] copy_process+0x3ab7/0x73c0 [ 115.429726] kernel_clone+0xea/0x7f0 [ 115.429736] __do_sys_clone+0xce/0x120 [ 115.429746] do_syscall_64+0xbf/0x360 [ 115.429754] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.447260] kmemleak: Found object by alias at 0x607f1a639a9c [ 115.447272] CPU: 0 UID: 0 PID: 4029 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.447289] Tainted: [W]=WARN [ 115.447292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.447299] Call Trace: [ 115.447302] [ 115.447306] dump_stack_lvl+0xca/0x120 [ 115.447324] __lookup_object+0x94/0xb0 [ 115.447338] delete_object_full+0x27/0x70 [ 115.447353] free_percpu+0x30/0x1160 [ 115.447367] ? arch_uprobe_clear_state+0x16/0x140 [ 115.447385] futex_hash_free+0x38/0xc0 [ 115.447398] mmput+0x2d3/0x390 [ 115.447415] do_exit+0x79d/0x2970 [ 115.447427] ? signal_wake_up_state+0x85/0x120 [ 115.447442] ? zap_other_threads+0x2b9/0x3a0 [ 115.447457] ? __pfx_do_exit+0x10/0x10 [ 115.447469] ? do_group_exit+0x1c3/0x2a0 [ 115.447482] ? lock_release+0xc8/0x290 [ 115.447498] do_group_exit+0xd3/0x2a0 [ 115.447512] __x64_sys_exit_group+0x3e/0x50 [ 115.447526] x64_sys_call+0x18c5/0x18d0 [ 115.447540] do_syscall_64+0xbf/0x360 [ 115.447551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.447562] RIP: 0033:0x7f75fb018b19 [ 115.447570] Code: Unable to access opcode bytes at 0x7f75fb018aef. [ 115.447574] RSP: 002b:00007ffce53309c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 115.447585] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f75fb018b19 [ 115.447592] RDX: 00007f75fafcb72b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 115.447599] RBP: 0000000000000000 R08: 0000001b2d220120 R09: 0000000000000000 [ 115.447606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.447612] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffce5330ab0 [ 115.447627] [ 115.447630] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.447637] kmemleak: comm "syz-executor.7", pid 288, jiffies 4294782277 [ 115.447643] kmemleak: min_count = 1 [ 115.447647] kmemleak: count = 0 [ 115.447651] kmemleak: flags = 0x21 [ 115.447654] kmemleak: checksum = 0 [ 115.447658] kmemleak: backtrace: [ 115.447661] pcpu_alloc_noprof+0x87a/0x1170 [ 115.447675] mm_init+0x99b/0x1170 [ 115.447683] copy_process+0x3ab7/0x73c0 [ 115.447692] kernel_clone+0xea/0x7f0 [ 115.447702] __do_sys_clone+0xce/0x120 [ 115.447711] do_syscall_64+0xbf/0x360 [ 115.447719] entry_SYSCALL_64_after_hwframe+0x77/0x7f 09:04:22 executing program 4: syz_mount_image$nfs(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)={[{'\x00'}]}) 09:04:22 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) 09:04:22 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x85) 09:04:22 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) 09:04:22 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001180)={{0x2, 0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 09:04:22 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) 09:04:22 executing program 2: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001180)={{0x2, 0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 09:04:22 executing program 7: ioprio_set$pid(0x2, 0x0, 0x2000) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') pread64(r0, 0x0, 0x0, 0x0) [ 115.560830] kmemleak: Found object by alias at 0x607f1a639aa0 [ 115.560849] CPU: 0 UID: 0 PID: 4053 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.560867] Tainted: [W]=WARN [ 115.560871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.560878] Call Trace: [ 115.560882] [ 115.560887] dump_stack_lvl+0xca/0x120 [ 115.560911] __lookup_object+0x94/0xb0 [ 115.560928] delete_object_full+0x27/0x70 [ 115.560943] free_percpu+0x30/0x1160 [ 115.560959] ? arch_uprobe_clear_state+0x16/0x140 [ 115.560978] futex_hash_free+0x38/0xc0 [ 115.560992] mmput+0x2d3/0x390 [ 115.561011] do_exit+0x79d/0x2970 [ 115.561028] ? __pfx_do_exit+0x10/0x10 [ 115.561042] ? find_held_lock+0x2b/0x80 [ 115.561060] ? get_signal+0x835/0x2340 [ 115.561083] do_group_exit+0xd3/0x2a0 [ 115.561098] get_signal+0x2315/0x2340 [ 115.561115] ? put_task_stack+0xd2/0x240 [ 115.561129] ? __pfx_get_signal+0x10/0x10 [ 115.561144] ? __schedule+0xe91/0x3590 [ 115.561164] arch_do_signal_or_restart+0x80/0x790 [ 115.561181] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 115.561197] ? __x64_sys_futex+0x1c9/0x4d0 [ 115.561209] ? __x64_sys_futex+0x1d2/0x4d0 [ 115.561222] ? fput+0x6a/0x100 [ 115.561236] ? __pfx___x64_sys_futex+0x10/0x10 [ 115.561254] exit_to_user_mode_loop+0x8b/0x110 [ 115.561267] do_syscall_64+0x2f7/0x360 [ 115.561279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.561290] RIP: 0033:0x7f739c205b19 [ 115.561299] Code: Unable to access opcode bytes at 0x7f739c205aef. [ 115.561304] RSP: 002b:00007f739977b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 115.561315] RAX: 0000000000000001 RBX: 00007f739c318f68 RCX: 00007f739c205b19 [ 115.561322] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f739c318f6c [ 115.561329] RBP: 00007f739c318f60 R08: 000000000000000e R09: 0000000000000000 [ 115.561335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f739c318f6c [ 115.561342] R13: 00007ffd4c2ae55f R14: 00007f739977b300 R15: 0000000000022000 [ 115.561357] [ 115.561361] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.561368] kmemleak: comm "syz-executor.4", pid 284, jiffies 4294782394 [ 115.561375] kmemleak: min_count = 1 [ 115.561378] kmemleak: count = 0 [ 115.561382] kmemleak: flags = 0x21 [ 115.561385] kmemleak: checksum = 0 [ 115.561389] kmemleak: backtrace: [ 115.561393] pcpu_alloc_noprof+0x87a/0x1170 [ 115.561407] mm_init+0x99b/0x1170 [ 115.561415] copy_process+0x3ab7/0x73c0 [ 115.561425] kernel_clone+0xea/0x7f0 [ 115.561434] __do_sys_clone+0xce/0x120 [ 115.561444] do_syscall_64+0xbf/0x360 [ 115.561452] entry_SYSCALL_64_after_hwframe+0x77/0x7f 09:04:22 executing program 7: ioprio_set$pid(0x2, 0x0, 0x2000) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') pread64(r0, 0x0, 0x0, 0x0) 09:04:22 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) 09:04:22 executing program 2: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001180)={{0x2, 0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) [ 115.645572] kmemleak: Found object by alias at 0x607f1a639a9c [ 115.645591] CPU: 0 UID: 0 PID: 4052 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.645609] Tainted: [W]=WARN [ 115.645613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.645621] Call Trace: [ 115.645625] [ 115.645629] dump_stack_lvl+0xca/0x120 [ 115.645654] __lookup_object+0x94/0xb0 [ 115.645671] delete_object_full+0x27/0x70 [ 115.645686] free_percpu+0x30/0x1160 [ 115.645702] ? arch_uprobe_clear_state+0x16/0x140 [ 115.645722] futex_hash_free+0x38/0xc0 [ 115.645736] mmput+0x2d3/0x390 [ 115.645755] do_exit+0x79d/0x2970 [ 115.645773] ? signal_wake_up_state+0x85/0x120 [ 115.645789] ? zap_other_threads+0x2b9/0x3a0 [ 115.645804] ? __pfx_do_exit+0x10/0x10 [ 115.645816] ? do_group_exit+0x1c3/0x2a0 [ 115.645830] ? lock_release+0xc8/0x290 [ 115.645846] do_group_exit+0xd3/0x2a0 [ 115.645861] __x64_sys_exit_group+0x3e/0x50 [ 115.645874] x64_sys_call+0x18c5/0x18d0 [ 115.645890] do_syscall_64+0xbf/0x360 [ 115.645901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.645912] RIP: 0033:0x7f75fb018b19 [ 115.645920] Code: Unable to access opcode bytes at 0x7f75fb018aef. [ 115.645925] RSP: 002b:00007ffce53309c8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 115.645937] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f75fb018b19 [ 115.645944] RDX: 00007f75fafcb72b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 115.645951] RBP: 0000000000000000 R08: 0000001b2d220120 R09: 0000000000000000 [ 115.645958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.645964] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffce5330ab0 [ 115.645979] [ 115.645983] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.645990] kmemleak: comm "syz-executor.7", pid 288, jiffies 4294782525 [ 115.645997] kmemleak: min_count = 1 [ 115.646000] kmemleak: count = 0 [ 115.646004] kmemleak: flags = 0x21 [ 115.646007] kmemleak: checksum = 0 [ 115.646011] kmemleak: backtrace: [ 115.646015] pcpu_alloc_noprof+0x87a/0x1170 [ 115.646029] mm_init+0x99b/0x1170 [ 115.646037] copy_process+0x3ab7/0x73c0 [ 115.646046] kernel_clone+0xea/0x7f0 [ 115.646056] __do_sys_clone+0xce/0x120 [ 115.646066] do_syscall_64+0xbf/0x360 [ 115.646074] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.662492] kmemleak: Found object by alias at 0x607f1a639aa4 [ 115.662514] CPU: 1 UID: 0 PID: 4060 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.662533] Tainted: [W]=WARN [ 115.662537] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.662545] Call Trace: [ 115.662549] [ 115.662554] dump_stack_lvl+0xca/0x120 [ 115.662579] __lookup_object+0x94/0xb0 [ 115.662596] delete_object_full+0x27/0x70 [ 115.662611] free_percpu+0x30/0x1160 [ 115.662628] ? arch_uprobe_clear_state+0x16/0x140 [ 115.662648] futex_hash_free+0x38/0xc0 [ 115.662662] mmput+0x2d3/0x390 [ 115.662681] do_exit+0x79d/0x2970 [ 115.662694] ? lock_release+0xc8/0x290 [ 115.662711] ? __pfx_do_exit+0x10/0x10 [ 115.662724] ? find_held_lock+0x2b/0x80 [ 115.662741] ? get_signal+0x835/0x2340 [ 115.662761] do_group_exit+0xd3/0x2a0 [ 115.662780] get_signal+0x2315/0x2340 [ 115.662797] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 115.662813] ? __pfx_get_signal+0x10/0x10 [ 115.662829] ? do_futex+0x135/0x370 [ 115.662842] ? __pfx_do_futex+0x10/0x10 [ 115.662857] arch_do_signal_or_restart+0x80/0x790 [ 115.662874] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 115.662890] ? __x64_sys_futex+0x1c9/0x4d0 [ 115.662902] ? __x64_sys_futex+0x1d2/0x4d0 [ 115.662915] ? exc_page_fault+0xb0/0x180 [ 115.662931] ? __pfx___x64_sys_futex+0x10/0x10 [ 115.662949] exit_to_user_mode_loop+0x8b/0x110 [ 115.662962] do_syscall_64+0x2f7/0x360 [ 115.662973] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.662986] RIP: 0033:0x7f81e497eb19 [ 115.662994] Code: Unable to access opcode bytes at 0x7f81e497eaef. [ 115.662999] RSP: 002b:00007f81e1ef4218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 115.663011] RAX: fffffffffffffe00 RBX: 00007f81e4a91f68 RCX: 00007f81e497eb19 [ 115.663018] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f81e4a91f68 [ 115.663025] RBP: 00007f81e4a91f60 R08: 0000000000000000 R09: 0000000000000000 [ 115.663032] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81e4a91f6c [ 115.663038] R13: 00007fffa81ff8ff R14: 00007f81e1ef4300 R15: 0000000000022000 [ 115.663054] [ 115.663066] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.663073] kmemleak: comm "syz-executor.7", pid 288, jiffies 4294782525 [ 115.663080] kmemleak: min_count = 1 [ 115.663083] kmemleak: count = 0 [ 115.663087] kmemleak: flags = 0x21 [ 115.663090] kmemleak: checksum = 0 [ 115.663094] kmemleak: backtrace: [ 115.663098] pcpu_alloc_noprof+0x87a/0x1170 [ 115.663112] mm_init+0x99b/0x1170 [ 115.663120] copy_process+0x3ab7/0x73c0 [ 115.663130] kernel_clone+0xea/0x7f0 [ 115.663139] __do_sys_clone+0xce/0x120 [ 115.663149] do_syscall_64+0xbf/0x360 [ 115.663158] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.686734] kmemleak: Found object by alias at 0x607f1a639aa0 [ 115.686747] CPU: 0 UID: 0 PID: 4062 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.686769] Tainted: [W]=WARN [ 115.686773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.686780] Call Trace: [ 115.686783] [ 115.686787] dump_stack_lvl+0xca/0x120 [ 115.686806] __lookup_object+0x94/0xb0 [ 115.686820] delete_object_full+0x27/0x70 [ 115.686835] free_percpu+0x30/0x1160 [ 115.686849] ? arch_uprobe_clear_state+0x16/0x140 [ 115.686868] futex_hash_free+0x38/0xc0 [ 115.686880] mmput+0x2d3/0x390 [ 115.686898] do_exit+0x79d/0x2970 [ 115.686910] ? signal_wake_up_state+0x85/0x120 [ 115.686925] ? zap_other_threads+0x2b9/0x3a0 [ 115.686940] ? __pfx_do_exit+0x10/0x10 [ 115.686953] ? do_group_exit+0x1c3/0x2a0 [ 115.686966] ? lock_release+0xc8/0x290 [ 115.686982] do_group_exit+0xd3/0x2a0 [ 115.686996] __x64_sys_exit_group+0x3e/0x50 [ 115.687010] x64_sys_call+0x18c5/0x18d0 [ 115.687024] do_syscall_64+0xbf/0x360 [ 115.687035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.687046] RIP: 0033:0x7f739c205b19 [ 115.687054] Code: Unable to access opcode bytes at 0x7f739c205aef. [ 115.687070] RSP: 002b:00007ffd4c2ae788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 115.687081] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f739c205b19 [ 115.687088] RDX: 00007f739c1b872b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 115.687095] RBP: 0000000000000000 R08: 0000001b2d42313c R09: 0000000000000000 [ 115.687102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.687109] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd4c2ae870 [ 115.687124] [ 115.687128] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.687134] kmemleak: comm "syz-executor.7", pid 288, jiffies 4294782525 [ 115.687141] kmemleak: min_count = 1 [ 115.687145] kmemleak: count = 0 [ 115.687149] kmemleak: flags = 0x21 [ 115.687152] kmemleak: checksum = 0 [ 115.687156] kmemleak: backtrace: [ 115.687159] pcpu_alloc_noprof+0x87a/0x1170 [ 115.687173] mm_init+0x99b/0x1170 [ 115.687181] copy_process+0x3ab7/0x73c0 [ 115.687191] kernel_clone+0xea/0x7f0 [ 115.687200] __do_sys_clone+0xce/0x120 [ 115.687210] do_syscall_64+0xbf/0x360 [ 115.687219] entry_SYSCALL_64_after_hwframe+0x77/0x7f 09:04:23 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x85) 09:04:23 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0x0, 0x0) 09:04:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) 09:04:23 executing program 4: syz_mount_image$nfs(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, &(0x7f00000009c0), 0x0, &(0x7f0000000a40)={[{'\x00'}]}) 09:04:23 executing program 2: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001180)={{0x2, 0xee00, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 09:04:23 executing program 7: ioprio_set$pid(0x2, 0x0, 0x2000) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') pread64(r0, 0x0, 0x0, 0x0) 09:04:23 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000540)={0x1, &(0x7f0000000500)=[{}]}) 09:04:23 executing program 5: syz_emit_vhci(&(0x7f0000000140)=ANY=[@ANYBLOB="04040a0000000000000574cce1"], 0xd) syz_emit_vhci(&(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x0, 0x2, 0xc}, @l2cap_cid_le_signaling={{0x8}, @l2cap_disconn_rsp={{0x7, 0x4, 0x4}, {0xa7, 0x9}}}}, 0x11) [ 115.824104] Bluetooth: unknown link type 225 09:04:23 executing program 7: ioprio_set$pid(0x2, 0x0, 0x2000) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') pread64(r0, 0x0, 0x0, 0x0) [ 115.824737] Bluetooth: hci4: connection err: -111 [ 115.825346] Bluetooth: unknown link type 225 [ 115.825703] Bluetooth: hci4: connection err: -111 09:04:23 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept(r0, 0x0, 0x0) 09:04:23 executing program 6: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_MOVE(0x12, 0x0, 0x0, 0x0, 0x0) [ 115.860567] kmemleak: Found object by alias at 0x607f1a639a9c [ 115.860591] CPU: 0 UID: 0 PID: 4083 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.860610] Tainted: [W]=WARN [ 115.860613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.860620] Call Trace: [ 115.860624] [ 115.860629] dump_stack_lvl+0xca/0x120 [ 115.860654] __lookup_object+0x94/0xb0 [ 115.860672] delete_object_full+0x27/0x70 [ 115.860687] free_percpu+0x30/0x1160 [ 115.860704] ? arch_uprobe_clear_state+0x16/0x140 [ 115.860723] futex_hash_free+0x38/0xc0 [ 115.860738] mmput+0x2d3/0x390 [ 115.860756] do_exit+0x79d/0x2970 [ 115.860774] ? lock_release+0xc8/0x290 [ 115.860790] ? __pfx_do_exit+0x10/0x10 [ 115.860804] ? find_held_lock+0x2b/0x80 [ 115.860821] ? get_signal+0x835/0x2340 [ 115.860840] do_group_exit+0xd3/0x2a0 [ 115.860855] get_signal+0x2315/0x2340 [ 115.860877] ? __pfx_get_signal+0x10/0x10 [ 115.860892] ? do_futex+0x135/0x370 [ 115.860906] ? __pfx_do_futex+0x10/0x10 [ 115.860920] arch_do_signal_or_restart+0x80/0x790 [ 115.860937] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 115.860953] ? __x64_sys_futex+0x1c9/0x4d0 [ 115.860965] ? __x64_sys_futex+0x1d2/0x4d0 [ 115.860978] ? fput+0x6a/0x100 [ 115.860992] ? __pfx___x64_sys_futex+0x10/0x10 [ 115.861004] ? ksys_write+0x1a3/0x240 [ 115.861016] ? __pfx_ksys_write+0x10/0x10 [ 115.861031] exit_to_user_mode_loop+0x8b/0x110 [ 115.861043] do_syscall_64+0x2f7/0x360 [ 115.861055] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.861067] RIP: 0033:0x7f75fb018b19 [ 115.861076] Code: Unable to access opcode bytes at 0x7f75fb018aef. [ 115.861081] RSP: 002b:00007f75f858e218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 115.861092] RAX: fffffffffffffe00 RBX: 00007f75fb12bf68 RCX: 00007f75fb018b19 [ 115.861100] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f75fb12bf68 [ 115.861106] RBP: 00007f75fb12bf60 R08: 0000000000000000 R09: 0000000000000000 [ 115.861113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f75fb12bf6c [ 115.861120] R13: 00007ffce533079f R14: 00007f75f858e300 R15: 0000000000022000 [ 115.861135] [ 115.861138] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.861145] kmemleak: comm "syz-executor.3", pid 281, jiffies 4294782771 [ 115.861152] kmemleak: min_count = 1 [ 115.861156] kmemleak: count = 0 [ 115.861159] kmemleak: flags = 0x21 [ 115.861163] kmemleak: checksum = 0 [ 115.861166] kmemleak: backtrace: [ 115.861170] pcpu_alloc_noprof+0x87a/0x1170 [ 115.861184] mm_init+0x99b/0x1170 [ 115.861192] copy_process+0x3ab7/0x73c0 [ 115.861202] kernel_clone+0xea/0x7f0 [ 115.861211] __do_sys_clone+0xce/0x120 [ 115.861221] do_syscall_64+0xbf/0x360 [ 115.861229] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.886645] kmemleak: Found object by alias at 0x607f1a639aa0 [ 115.886662] CPU: 1 UID: 0 PID: 4084 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.886681] Tainted: [W]=WARN [ 115.886685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.886692] Call Trace: [ 115.886696] [ 115.886702] dump_stack_lvl+0xca/0x120 [ 115.886726] __lookup_object+0x94/0xb0 [ 115.886743] delete_object_full+0x27/0x70 09:04:23 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x40}, 0x18) [ 115.886759] free_percpu+0x30/0x1160 [ 115.886780] ? arch_uprobe_clear_state+0x16/0x140 [ 115.886800] futex_hash_free+0x38/0xc0 [ 115.886815] mmput+0x2d3/0x390 [ 115.886834] do_exit+0x79d/0x2970 [ 115.886848] ? signal_wake_up_state+0x85/0x120 [ 115.886863] ? zap_other_threads+0x2b9/0x3a0 [ 115.886879] ? __pfx_do_exit+0x10/0x10 [ 115.886892] ? do_group_exit+0x1c3/0x2a0 [ 115.886905] ? lock_release+0xc8/0x290 [ 115.886922] do_group_exit+0xd3/0x2a0 [ 115.886937] __x64_sys_exit_group+0x3e/0x50 [ 115.886950] x64_sys_call+0x18c5/0x18d0 [ 115.886966] do_syscall_64+0xbf/0x360 [ 115.886978] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.886989] RIP: 0033:0x7f739c205b19 [ 115.886998] Code: Unable to access opcode bytes at 0x7f739c205aef. [ 115.887003] RSP: 002b:00007ffd4c2ae788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 115.887014] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f739c205b19 [ 115.887022] RDX: 00007f739c1b872b RSI: ffffffffffffffbc RDI: 0000000000000000 [ 115.887029] RBP: 0000000000000000 R08: 0000001b2d4230cc R09: 0000000000000000 [ 115.887035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.887042] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd4c2ae870 [ 115.887057] [ 115.887067] kmemleak: Object (percpu) 0x607f1a639a98 (size 16): [ 115.887074] kmemleak: comm "syz-executor.3", pid 281, jiffies 4294782771 [ 115.887081] kmemleak: min_count = 1 [ 115.887084] kmemleak: count = 0 [ 115.887088] kmemleak: flags = 0x21 [ 115.887092] kmemleak: checksum = 0 [ 115.887095] kmemleak: backtrace: [ 115.887099] pcpu_alloc_noprof+0x87a/0x1170 [ 115.887113] mm_init+0x99b/0x1170 [ 115.887121] copy_process+0x3ab7/0x73c0 [ 115.887131] kernel_clone+0xea/0x7f0 [ 115.887141] __do_sys_clone+0xce/0x120 [ 115.887150] do_syscall_64+0xbf/0x360 [ 115.887159] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.929798] Oops: general protection fault, probably for non-canonical address 0xdffffc035fbe7866: 0000 [#1] SMP KASAN NOPTI [ 115.930683] KASAN: probably user-memory-access in range [0x0000001afdf3c330-0x0000001afdf3c337] [ 115.931335] CPU: 1 UID: 0 PID: 4089 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.932203] Tainted: [W]=WARN [ 115.932674] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.934706] RIP: 0010:perf_tp_event+0x175/0xe70 [ 115.935834] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 115.939962] RSP: 0018:ffff8880425e7540 EFLAGS: 00010016 [ 115.940357] RAX: 000000035fbe7866 RBX: 0000001afdf3c143 RCX: 0000000000000002 [ 115.940878] RDX: ffff888043859b80 RSI: ffffffff818995b7 RDI: 0000001afdf3c333 [ 115.941396] RBP: ffff8880425e77b0 R08: ffff88806cf31340 R09: ffffe8ffffd16a98 [ 115.941914] R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 [ 115.942434] R13: 0000000000000024 R14: ffff88806cf31340 R15: dffffc0000000000 [ 115.942953] FS: 00007fbcc7e34700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 [ 115.943551] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 115.943977] CR2: 00007fbcca9d2018 CR3: 000000001dd30000 CR4: 0000000000350ef0 [ 115.944497] Call Trace: [ 115.944692] [ 115.944864] ? perf_trace_lock+0xb5/0x5d0 [ 115.945182] ? __pfx_perf_tp_event+0x10/0x10 [ 115.945518] ? lock_acquire+0x15e/0x2f0 [ 115.945818] ? __is_insn_slot_addr+0x2e/0x290 [ 115.946161] ? find_held_lock+0x2b/0x80 [ 115.946465] ? __is_insn_slot_addr+0x136/0x290 [ 115.946812] ? lock_release+0xc8/0x290 [ 115.947115] ? __is_insn_slot_addr+0x140/0x290 [ 115.947464] ? perf_trace_lock+0xb5/0x5d0 [ 115.947775] ? __pfx_perf_trace_lock+0x10/0x10 [ 115.948115] ? lock_is_held_type+0x9e/0x120 [ 115.948449] ? perf_trace_run_bpf_submit+0xef/0x180 [ 115.948820] ? find_held_lock+0x2b/0x80 [ 115.949122] ? __perf_event_task_sched_out+0x461/0x14e0 [ 115.949519] perf_trace_run_bpf_submit+0xef/0x180 [ 115.949884] perf_trace_lock+0x337/0x5d0 [ 115.950192] ? __pfx_perf_trace_lock+0x10/0x10 [ 115.950538] ? mm_cid_get.isra.0+0x46c/0x570 [ 115.950873] ? set_next_entity+0x331/0x940 [ 115.951196] ? __schedule+0xe4b/0x3590 [ 115.951491] lock_release+0x1ab/0x290 [ 115.951777] ? lock_unpin_lock+0x9f/0x140 [ 115.952092] __schedule+0xe50/0x3590 [ 115.952379] ? __pfx___schedule+0x10/0x10 [ 115.952690] ? lock_acquire+0x15e/0x2f0 [ 115.952988] ? find_held_lock+0x2b/0x80 [ 115.953290] ? schedule+0x2c7/0x390 [ 115.953566] ? lock_release+0xc8/0x290 [ 115.953859] schedule+0xdb/0x390 [ 115.954121] futex_do_wait+0x88/0x180 [ 115.954411] __futex_wait+0x176/0x300 [ 115.954701] ? __pfx___futex_wait+0x10/0x10 [ 115.955024] ? __pfx_perf_trace_lock+0x10/0x10 [ 115.955375] ? __pfx_futex_wake_mark+0x10/0x10 [ 115.955721] ? lock_release+0xc8/0x290 [ 115.956016] ? futex_private_hash_put+0x127/0x2d0 [ 115.956376] futex_wait+0xde/0x380 [ 115.956648] ? __pfx_futex_wait+0x10/0x10 [ 115.956960] ? __pfx_futex_wake+0x10/0x10 [ 115.957274] ? __do_sys_perf_event_open+0x44d/0x2c20 [ 115.957651] ? lock_release+0xc8/0x290 [ 115.957946] do_futex+0x2ee/0x370 [ 115.958211] ? __pfx_do_futex+0x10/0x10 [ 115.958510] ? __pfx___do_sys_perf_event_open+0x10/0x10 [ 115.958902] ? find_held_lock+0x2b/0x80 [ 115.959214] __x64_sys_futex+0x1c9/0x4d0 [ 115.959522] ? __pfx___x64_sys_futex+0x10/0x10 [ 115.959867] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 115.960257] do_syscall_64+0xbf/0x360 [ 115.960543] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.960923] RIP: 0033:0x7fbcca8beb19 [ 115.961200] Code: Unable to access opcode bytes at 0x7fbcca8beaef. [ 115.961651] RSP: 002b:00007fbcc7e34218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 115.962202] RAX: ffffffffffffffda RBX: 00007fbcca9d1f68 RCX: 00007fbcca8beb19 [ 115.962721] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fbcca9d1f68 [ 115.963246] RBP: 00007fbcca9d1f60 R08: 0000000000000000 R09: 0000000000000000 [ 115.963763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbcca9d1f6c [ 115.964281] R13: 00007ffdb80a2d7f R14: 00007fbcc7e34300 R15: 0000000000022000 [ 115.964808] [ 115.964984] Modules linked in: [ 115.965229] ---[ end trace 0000000000000000 ]--- [ 115.965231] Oops: general protection fault, probably for non-canonical address 0xdffffc035fc070c2: 0000 [#2] SMP KASAN NOPTI [ 115.965573] RIP: 0010:perf_tp_event+0x175/0xe70 [ 115.966444] KASAN: probably user-memory-access in range [0x0000001afe038610-0x0000001afe038617] [ 115.966781] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 115.967460] CPU: 0 UID: 0 PID: 281 Comm: syz-executor.3 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 115.968808] RSP: 0018:ffff8880425e7540 EFLAGS: 00010016 [ 115.969693] Tainted: [D]=DIE, [W]=WARN [ 115.970109] RAX: 000000035fbe7866 RBX: 0000001afdf3c143 RCX: 0000000000000002 [ 115.970416] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 115.970971] RDX: ffff888043859b80 RSI: ffffffff818995b7 RDI: 0000001afdf3c333 [ 115.971635] RIP: 0010:perf_tp_event+0x175/0xe70 [ 115.972184] RBP: ffff8880425e77b0 R08: ffff88806cf31340 R09: ffffe8ffffd16a98 [ 115.972545] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 115.973092] R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 [ 115.974513] RSP: 0018:ffff888016fef6c0 EFLAGS: 00010012 [ 115.975075] R13: 0000000000000024 R14: ffff88806cf31340 R15: dffffc0000000000 [ 115.975078] [ 115.975494] RAX: 000000035fc070c2 RBX: 0000001afe038422 RCX: 0000000000000002 [ 115.976049] FS: 00007fbcc7e34700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 [ 115.976188] RDX: ffff888013f7d280 RSI: ffffffff818995b7 RDI: 0000001afe038612 [ 115.976742] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 115.977362] RBP: ffff888016fef930 R08: ffff88806ce31340 R09: ffffe8ffffc16a98 [ 115.977920] CR2: 00007fbcca9d2018 CR3: 000000001dd30000 CR4: 0000000000350ef0 [ 115.978373] R10: 0000000000000000 R11: 1ffff1100d9c6f7b R12: dffffc0000000000 [ 115.978928] note: syz-executor.3[4089] exited with irqs disabled [ 115.979490] R13: 0000000000000024 R14: ffff88806ce31340 R15: dffffc0000000000 [ 115.981072] FS: 000055557bb18400(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 [ 115.981708] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 115.982168] CR2: 00007f8daa46b546 CR3: 00000000455fb000 CR4: 0000000000350ef0 [ 115.982729] Call Trace: [ 115.982939] [ 115.983131] ? get_page_from_freelist+0x484/0x24b0 [ 115.983540] ? __pfx_perf_tp_event+0x10/0x10 [ 115.983903] ? __kasan_unpoison_pages+0x2f/0x40 [ 115.984278] ? get_page_from_freelist+0x8a8/0x24b0 [ 115.984681] ? should_fail_alloc_page+0xe8/0x110 [ 115.985063] ? arch_scale_cpu_capacity+0x17/0xa0 [ 115.985449] ? trace_mm_page_alloc+0xfc/0x150 [ 115.985815] ? perf_trace_lock+0xb5/0x5d0 [ 115.986151] ? css_rstat_updated+0x1b8/0x4d0 [ 115.986516] ? perf_trace_run_bpf_submit+0xef/0x180 [ 115.986919] perf_trace_run_bpf_submit+0xef/0x180 [ 115.987318] perf_trace_lock+0x337/0x5d0 [ 115.987651] ? __pfx_perf_trace_lock+0x10/0x10 [ 115.988021] ? __pfx___perf_event_task_sched_out+0x10/0x10 [ 115.988464] ? set_next_entity+0x362/0x940 [ 115.988806] ? __schedule+0xe4b/0x3590 [ 115.989126] lock_release+0x1ab/0x290 [ 115.989437] __schedule+0xe50/0x3590 [ 115.989746] ? __pfx___schedule+0x10/0x10 [ 115.990082] ? __pfx_perf_trace_lock+0x10/0x10 [ 115.990456] ? schedule+0x2c7/0x390 [ 115.990756] ? lock_release+0x1c7/0x290 [ 115.991108] schedule+0xdb/0x390 [ 115.991389] do_nanosleep+0x15e/0x560 [ 115.991702] ? do_wait+0x234/0x560 [ 115.991995] ? __pfx_do_nanosleep+0x10/0x10 [ 115.992341] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 115.992756] ? __pfx_hrtimer_wakeup+0x10/0x10 [ 115.993120] ? __hrtimer_setup+0x1a4/0x2c0 [ 115.993466] hrtimer_nanosleep+0x13a/0x340 [ 115.993807] ? __pfx_hrtimer_nanosleep+0x10/0x10 [ 115.994189] ? __pfx_hrtimer_wakeup+0x10/0x10 [ 115.994559] ? get_timespec64+0x11c/0x190 [ 115.994896] ? __pfx_get_timespec64+0x10/0x10 [ 115.995269] ? handle_mm_fault+0x590/0x9b0 [ 115.995613] common_nsleep+0xaa/0xd0 [ 115.995920] __x64_sys_clock_nanosleep+0x331/0x470 [ 115.996320] ? __pfx___x64_sys_clock_nanosleep+0x10/0x10 [ 115.996760] do_syscall_64+0xbf/0x360 [ 115.997065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.997475] RIP: 0033:0x7fbcca8e38e1 [ 115.997772] Code: Unable to access opcode bytes at 0x7fbcca8e38b7. [ 115.998258] RSP: 002b:00007ffdb80a2f60 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 [ 115.998856] RAX: ffffffffffffffda RBX: 000000000000001b RCX: 00007fbcca8e38e1 [ 115.999429] RDX: 00007ffdb80a2fa0 RSI: 0000000000000000 RDI: 0000000000000000 [ 115.999986] RBP: 00007ffdb80a302c R08: 0000000000000000 R09: 00007fbcca9ae000 [ 116.000545] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000032 [ 116.001107] R13: 000000000001c44f R14: 0000000000000000 R15: 00007ffdb80a3090 [ 116.001673] [ 116.001866] Modules linked in: [ 116.002127] ---[ end trace 0000000000000000 ]--- [ 116.002497] RIP: 0010:perf_tp_event+0x175/0xe70 [ 116.002881] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 116.004310] RSP: 0018:ffff8880425e7540 EFLAGS: 00010016 [ 116.004732] RAX: 000000035fbe7866 RBX: 0000001afdf3c143 RCX: 0000000000000002 [ 116.005295] RDX: ffff888043859b80 RSI: ffffffff818995b7 RDI: 0000001afdf3c333 [ 116.005863] RBP: ffff8880425e77b0 R08: ffff88806cf31340 R09: ffffe8ffffd16a98 [ 116.006426] R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 [ 116.006986] R13: 0000000000000024 R14: ffff88806cf31340 R15: dffffc0000000000 [ 116.007554] FS: 000055557bb18400(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 [ 116.008188] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 116.008647] CR2: 00007f8daa46b546 CR3: 00000000455fb000 CR4: 0000000000350ef0 [ 116.009214] note: syz-executor.3[281] exited with irqs disabled [ 116.009701] Oops: general protection fault, probably for non-canonical address 0xdffffc035fc070c2: 0000 [#3] SMP KASAN NOPTI [ 116.010567] KASAN: probably user-memory-access in range [0x0000001afe038610-0x0000001afe038617] [ 116.011255] CPU: 0 UID: 0 PID: 281 Comm: syz-executor.3 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 116.012180] Tainted: [D]=DIE, [W]=WARN [ 116.012483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 116.013131] RIP: 0010:perf_tp_event+0x175/0xe70 [ 116.013510] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 116.014936] RSP: 0018:ffff88806ce08a80 EFLAGS: 00010012 [ 116.015363] RAX: 000000035fc070c2 RBX: 0000001afe038422 RCX: 0000000000000002 [ 116.015923] RDX: ffff888013f7d280 RSI: ffffffff818995b7 RDI: 0000001afe038612 [ 116.016480] RBP: ffff88806ce08cf0 R08: ffff88806ce31490 R09: ffffe8ffffc16a98 [ 116.017041] R10: 0000000000000000 R11: 746e756f63716573 R12: dffffc0000000000 [ 116.017598] R13: 000000000000002c R14: ffff88806ce31490 R15: dffffc0000000000 [ 116.018160] FS: 000055557bb18400(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 [ 116.018792] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 116.019254] CR2: 00007f8daa46b546 CR3: 00000000455fb000 CR4: 0000000000350ef0 [ 116.019815] Call Trace: [ 116.020022] [ 116.020202] ? __pfx_raw_local_deliver+0x10/0x10 [ 116.020587] ? __pfx_perf_tp_event+0x10/0x10 [ 116.020940] ? ip_local_deliver_finish+0x3f2/0x680 [ 116.021337] ? perf_trace_lock+0xb5/0x5d0 [ 116.021672] ? lock_release+0x1c7/0x290 [ 116.021996] ? __pfx_perf_trace_lock+0x10/0x10 [ 116.022363] ? kvm_sched_clock_read+0x16/0x30 [ 116.022729] ? sched_clock+0x37/0x60 [ 116.023034] ? perf_trace_lock+0xb5/0x5d0 [ 116.023370] ? perf_trace_lock+0xb5/0x5d0 [ 116.023703] ? trace_pelt_se_tp+0xdf/0x130 [ 116.024039] ? __pfx_perf_trace_lock+0x10/0x10 [ 116.024403] ? __pfx_perf_trace_lock+0x10/0x10 [ 116.024777] ? cpufreq_update_util+0x91/0x240 [ 116.025139] ? perf_trace_run_bpf_submit+0xef/0x180 [ 116.025540] perf_trace_run_bpf_submit+0xef/0x180 [ 116.025929] perf_trace_lock+0x337/0x5d0 [ 116.026253] ? do_raw_spin_lock+0x123/0x260 [ 116.026601] ? __pfx_perf_trace_lock+0x10/0x10 [ 116.026969] ? clockevents_program_event+0x14f/0x360 [ 116.027381] ? hrtimer_interrupt+0x114/0x830 [ 116.027734] lock_release+0x1ab/0x290 [ 116.028043] ktime_get_update_offsets_now+0xab/0x3c0 [ 116.028449] ? hrtimer_interrupt+0x114/0x830 [ 116.028801] ? __pfx_lapic_next_deadline+0x10/0x10 [ 116.029193] hrtimer_interrupt+0x114/0x830 [ 116.029533] __sysvec_apic_timer_interrupt+0xbb/0x330 [ 116.029945] sysvec_apic_timer_interrupt+0x6b/0x80 [ 116.030335] [ 116.030518] [ 116.030709] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 116.031130] RIP: 0010:make_task_dead+0xa2/0x3b0 [ 116.031503] Code: 38 00 85 db 0f 84 21 01 00 00 e8 d9 96 38 00 9c 5b 81 e3 00 02 00 00 31 ff 48 89 de e8 27 92 38 00 48 85 db 0f 84 17 01 00 00 b9 96 38 00 31 ff 65 8b 1d 60 df 48 06 81 e3 ff ff ff 7f 89 de [ 116.032932] RSP: 0018:ffff888016feff28 EFLAGS: 00000246 [ 116.033351] RAX: 0000000000000001 RBX: ffff888013f7d280 RCX: ffffffff817c2b86 [ 116.033910] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff813b5234 [ 116.034474] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 116.035038] R10: ffffffff8643ac57 R11: 0000000000000001 R12: ffff888013f7d280 [ 116.035606] R13: 0000000000000000 R14: dffffc035fc070c2 R15: 0000000000000000 [ 116.036170] ? trace_irq_enable.constprop.0+0x26/0x100 [ 116.036586] ? make_task_dead+0x214/0x3b0 [ 116.036924] ? make_task_dead+0x214/0x3b0 [ 116.037260] ? do_syscall_64+0xbf/0x360 [ 116.037586] rewind_stack_and_make_dead+0x16/0x20 [ 116.037973] RIP: 0033:0x7fbcca8e38e1 [ 116.038273] Code: Unable to access opcode bytes at 0x7fbcca8e38b7. [ 116.038781] RSP: 002b:00007ffdb80a2f60 EFLAGS: 00000293 ORIG_RAX: 00000000000000e6 [ 116.039384] RAX: ffffffffffffffda RBX: 000000000000001b RCX: 00007fbcca8e38e1 [ 116.039942] RDX: 00007ffdb80a2fa0 RSI: 0000000000000000 RDI: 0000000000000000 [ 116.040498] RBP: 00007ffdb80a302c R08: 0000000000000000 R09: 00007fbcca9ae000 [ 116.041059] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000032 [ 116.041617] R13: 000000000001c44f R14: 0000000000000000 R15: 00007ffdb80a3090 [ 116.042179] [ 116.042369] Modules linked in: [ 116.042629] ---[ end trace 0000000000000000 ]--- [ 116.043002] RIP: 0010:perf_tp_event+0x175/0xe70 [ 116.043397] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 116.044812] RSP: 0018:ffff8880425e7540 EFLAGS: 00010016 [ 116.045227] RAX: 000000035fbe7866 RBX: 0000001afdf3c143 RCX: 0000000000000002 [ 116.045784] RDX: ffff888043859b80 RSI: ffffffff818995b7 RDI: 0000001afdf3c333 [ 116.046340] RBP: ffff8880425e77b0 R08: ffff88806cf31340 R09: ffffe8ffffd16a98 [ 116.046897] R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 [ 116.047467] R13: 0000000000000024 R14: ffff88806cf31340 R15: dffffc0000000000 [ 116.048028] FS: 000055557bb18400(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 [ 116.048657] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 116.049113] CR2: 00007f8daa46b546 CR3: 00000000455fb000 CR4: 0000000000350ef0 [ 116.049672] Kernel panic - not syncing: Fatal exception in interrupt [ 117.092273] Shutting down cpus with NMI [ 117.092786] Kernel Offset: disabled [ 117.093076] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]--- VM DIAGNOSIS: 09:04:23 Registers: info registers vcpu 0 RAX=0000000000000001 RBX=0000000000000001 RCX=ffffffff84bdec0e RDX=fffffbfff0f0ec09 RSI=0000000000000004 RDI=ffffffff87876044 RBP=ffffffff87876044 RSP=ffff888016fef470 R8 =0000000000000000 R9 =fffffbfff0f0ec08 R10=ffffffff87876047 R11=202c746c75616620 R12=1ffff11002dfde8f R13=0000000000000007 R14=fffffbfff0f0ec08 R15=ffff888016fef4a8 RIP=ffffffff84bdeda0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 000055557bb18400 00000000 00000000 GS =0000 ffff8880e55dd000 00000000 00000000 LDT=0000 fffffe3d00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f8daa46b546 CR3=00000000455fb000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000030 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff828e32c5 RDI=ffffffff88724180 RBP=ffffffff88724140 RSP=ffff8880425e6e30 R8 =0000000000000000 R9 =ffffed100141b046 R10=0000000000000030 R11=0000000065646f43 R12=0000000000000030 R13=0000000000000010 R14=ffffffff88724140 R15=ffffffff828e32b0 RIP=ffffffff828e331d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fbcc7e34700 00000000 00000000 GS =0000 ffff8880e56dd000 00000000 00000000 LDT=0000 fffffe2800000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fbcca9d2018 CR3=000000001dd30000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007fbcca9a57c000007fbcca9a57c8 XMM02=00007fbcca9a57e000007fbcca9a57c0 XMM03=00007fbcca9a57c800007fbcca9a57c0 XMM04=ffffffff0000ff00000000ff00000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000