Warning: Permanently added '[localhost]:21576' (ECDSA) to the list of known hosts.
2025/09/01 08:10:54 fuzzer started
2025/09/01 08:10:55 dialing manager at localhost:35473
syzkaller login: [ 58.139605] cgroup: Unknown subsys name 'net'
[ 58.203293] cgroup: Unknown subsys name 'cpuset'
[ 58.215981] cgroup: Unknown subsys name 'rlimit'
2025/09/01 08:11:05 syscalls: 2214
2025/09/01 08:11:05 code coverage: enabled
2025/09/01 08:11:05 comparison tracing: enabled
2025/09/01 08:11:05 extra coverage: enabled
2025/09/01 08:11:05 setuid sandbox: enabled
2025/09/01 08:11:05 namespace sandbox: enabled
2025/09/01 08:11:05 Android sandbox: enabled
2025/09/01 08:11:05 fault injection: enabled
2025/09/01 08:11:05 leak checking: enabled
2025/09/01 08:11:05 net packet injection: enabled
2025/09/01 08:11:05 net device setup: enabled
2025/09/01 08:11:05 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist
2025/09/01 08:11:05 devlink PCI setup: PCI device 0000:00:10.0 is not available
2025/09/01 08:11:05 USB emulation: enabled
2025/09/01 08:11:05 hci packet injection: enabled
2025/09/01 08:11:05 wifi device emulation: enabled
2025/09/01 08:11:05 802.15.4 emulation: enabled
2025/09/01 08:11:05 fetching corpus: 0, signal 0/2000 (executing program)
2025/09/01 08:11:05 fetching corpus: 50, signal 28318/30378 (executing program)
2025/09/01 08:11:05 fetching corpus: 100, signal 42498/44152 (executing program)
2025/09/01 08:11:05 fetching corpus: 150, signal 50757/51866 (executing program)
2025/09/01 08:11:05 fetching corpus: 200, signal 56704/57143 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/57867 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/57932 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/57996 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58056 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58114 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58179 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58232 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58287 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58353 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58431 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58501 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58555 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58612 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58671 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58735 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58776 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58835 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58909 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/58974 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/59017 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/59073 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/59136 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/59194 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/59253 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/59263 (executing program)
2025/09/01 08:11:06 fetching corpus: 219, signal 57503/59263 (executing program)
2025/09/01 08:11:08 starting 8 fuzzer processes
08:11:08 executing program 0:
getegid()
08:11:08 executing program 1:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:08 executing program 4:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:08 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4)
setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000013c0)=0x6, 0x4)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c)
08:11:08 executing program 7:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x12, {0x0, @tcp_ip4_spec={@rand_addr, @private}, @esp_ip4_spec={@multicast1, @local}}}})
08:11:08 executing program 5:
syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
pivot_root(0x0, 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
08:11:08 executing program 3:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0)
08:11:08 executing program 6:
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000001140))
waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f00000011c0), 0x0, 0x0)
[ 71.280954] audit: type=1400 audit(1756714268.448:7): avc: denied { execmem } for pid=275 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1
[ 72.509919] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1
[ 72.512111] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9
[ 72.516010] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9
[ 72.523785] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4
[ 72.529961] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2
[ 72.569313] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1
[ 72.574124] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9
[ 72.577922] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9
[ 72.583052] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4
[ 72.586938] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2
[ 72.641575] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1
[ 72.651125] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9
[ 72.663584] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1
[ 72.664951] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9
[ 72.689981] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4
[ 72.691280] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9
[ 72.699778] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9
[ 72.706976] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2
[ 72.710003] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4
[ 72.715118] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1
[ 72.717327] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1
[ 72.726044] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1
[ 72.732500] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9
[ 72.737045] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9
[ 72.738904] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9
[ 72.743138] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9
[ 72.746149] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9
[ 72.754142] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9
[ 72.779903] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2
[ 72.787032] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4
[ 72.789368] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4
[ 72.801231] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1
[ 72.802477] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4
[ 72.804347] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2
[ 72.810978] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9
[ 72.815869] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2
[ 72.821922] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9
[ 72.827889] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2
[ 72.857508] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4
[ 72.860607] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2
[ 74.601186] Bluetooth: hci1: command tx timeout
[ 74.602071] Bluetooth: hci0: command tx timeout
[ 74.792741] Bluetooth: hci2: command tx timeout
[ 74.857747] Bluetooth: hci3: command tx timeout
[ 74.920730] Bluetooth: hci7: command tx timeout
[ 74.921374] Bluetooth: hci5: command tx timeout
[ 74.921979] Bluetooth: hci4: command tx timeout
[ 74.922400] Bluetooth: hci6: command tx timeout
[ 76.648783] Bluetooth: hci0: command tx timeout
[ 76.648922] Bluetooth: hci1: command tx timeout
[ 76.840795] Bluetooth: hci2: command tx timeout
[ 76.904815] Bluetooth: hci3: command tx timeout
[ 76.968742] Bluetooth: hci6: command tx timeout
[ 76.968790] Bluetooth: hci4: command tx timeout
[ 76.969385] Bluetooth: hci5: command tx timeout
[ 76.970419] Bluetooth: hci7: command tx timeout
[ 78.696728] Bluetooth: hci1: command tx timeout
[ 78.697945] Bluetooth: hci0: command tx timeout
[ 78.888733] Bluetooth: hci2: command tx timeout
[ 78.953659] Bluetooth: hci3: command tx timeout
[ 79.016809] Bluetooth: hci6: command tx timeout
[ 79.017276] Bluetooth: hci4: command tx timeout
[ 79.018738] Bluetooth: hci7: command tx timeout
[ 79.018772] Bluetooth: hci5: command tx timeout
[ 80.746769] Bluetooth: hci0: command tx timeout
[ 80.746837] Bluetooth: hci1: command tx timeout
[ 80.936945] Bluetooth: hci2: command tx timeout
[ 81.000735] Bluetooth: hci3: command tx timeout
[ 81.065026] Bluetooth: hci6: command tx timeout
[ 81.066544] Bluetooth: hci4: command tx timeout
[ 81.066657] Bluetooth: hci7: command tx timeout
[ 81.067332] Bluetooth: hci5: command tx timeout
[ 109.999348] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 110.000046] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 110.164101] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 110.164977] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
08:11:47 executing program 3:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0)
08:11:47 executing program 3:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0)
[ 110.815265] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 110.816033] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
08:11:48 executing program 3:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$HCIINQUIRY(r0, 0x800448f0, 0x0)
[ 110.914864] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 110.915472] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
08:11:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)={0x28, 0x2d, 0x1, 0x0, 0x0, "", [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@local}]}]}, 0x28}], 0x1}, 0x0)
[ 110.997566] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 111.001888] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'.
08:11:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)={0x28, 0x2d, 0x1, 0x0, 0x0, "", [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@local}]}]}, 0x28}], 0x1}, 0x0)
[ 111.041118] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 111.059676] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 111.060252] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
08:11:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)={0x28, 0x2d, 0x1, 0x0, 0x0, "", [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@local}]}]}, 0x28}], 0x1}, 0x0)
[ 111.117573] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'.
08:11:48 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)={0x28, 0x2d, 0x1, 0x0, 0x0, "", [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@local}]}]}, 0x28}], 0x1}, 0x0)
[ 111.163883] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'.
[ 111.191871] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 111.192510] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
08:11:48 executing program 3:
syz_emit_ethernet(0x2b, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, @echo={0x8, 0x0, 0x0, 0x0, 0x0, "98"}}}}}, 0x0)
[ 111.292058] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 111.293379] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 111.407477] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 111.408543] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 111.529991] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 111.530641] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 111.615335] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 111.615980] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 111.677644] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 111.678241] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 111.719939] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 111.720539] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 111.921795] audit: type=1400 audit(1756714309.095:8): avc: denied { open } for pid=3880 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 111.923754] audit: type=1400 audit(1756714309.096:9): avc: denied { kernel } for pid=3880 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
[ 112.260556] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 112.261343] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 112.314140] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 112.314878] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 112.413763] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 112.414478] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50
[ 112.463781] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50
[ 112.464440] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50
08:11:49 executing program 1:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:49 executing program 6:
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000001140))
waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f00000011c0), 0x0, 0x0)
08:11:49 executing program 3:
syz_emit_ethernet(0x2b, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, @echo={0x8, 0x0, 0x0, 0x0, 0x0, "98"}}}}}, 0x0)
08:11:49 executing program 4:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:49 executing program 7:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x12, {0x0, @tcp_ip4_spec={@rand_addr, @private}, @esp_ip4_spec={@multicast1, @local}}}})
08:11:49 executing program 5:
syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
pivot_root(0x0, 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
08:11:49 executing program 0:
getegid()
08:11:49 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4)
setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000013c0)=0x6, 0x4)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c)
08:11:49 executing program 6:
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000001140))
waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f00000011c0), 0x0, 0x0)
08:11:49 executing program 3:
syz_emit_ethernet(0x2b, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, @echo={0x8, 0x0, 0x0, 0x0, 0x0, "98"}}}}}, 0x0)
08:11:49 executing program 0:
getegid()
08:11:49 executing program 4:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:49 executing program 5:
syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
pivot_root(0x0, 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
08:11:49 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4)
setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000013c0)=0x6, 0x4)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c)
08:11:49 executing program 7:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x12, {0x0, @tcp_ip4_spec={@rand_addr, @private}, @esp_ip4_spec={@multicast1, @local}}}})
08:11:49 executing program 3:
syz_emit_ethernet(0x2b, &(0x7f0000000040)={@local, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @local}, @echo={0x8, 0x0, 0x0, 0x0, 0x0, "98"}}}}}, 0x0)
08:11:50 executing program 1:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:50 executing program 0:
getegid()
08:11:50 executing program 6:
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000001140))
waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f00000011c0), 0x0, 0x0)
08:11:50 executing program 5:
syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
pivot_root(0x0, 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
08:11:50 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4)
setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000013c0)=0x6, 0x4)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c)
08:11:50 executing program 4:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:50 executing program 7:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wlan0\x00', &(0x7f0000000000)=@ethtool_rx_ntuple={0x12, {0x0, @tcp_ip4_spec={@rand_addr, @private}, @esp_ip4_spec={@multicast1, @local}}}})
08:11:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4)
setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000013c0)=0x6, 0x4)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c)
08:11:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4)
setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000013c0)=0x6, 0x4)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c)
[ 113.572583] kmemleak: Found object by alias at 0x607f1a62f60c
[ 113.572602] CPU: 0 UID: 0 PID: 3952 Comm: syz-executor.6 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
[ 113.572624] Tainted: [W]=WARN
[ 113.572628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 113.572636] Call Trace:
[ 113.572640]
[ 113.572645] dump_stack_lvl+0xca/0x120
[ 113.572676] __lookup_object+0x94/0xb0
[ 113.572694] delete_object_full+0x27/0x70
[ 113.572711] free_percpu+0x30/0x1160
[ 113.572729] ? arch_uprobe_clear_state+0x16/0x140
[ 113.572750] futex_hash_free+0x38/0xc0
[ 113.572765] mmput+0x2d3/0x390
[ 113.572785] do_exit+0x79d/0x2970
[ 113.572799] ? signal_wake_up_state+0x85/0x120
[ 113.572815] ? zap_other_threads+0x2b9/0x3a0
[ 113.572831] ? __pfx_do_exit+0x10/0x10
[ 113.572844] ? do_group_exit+0x1c3/0x2a0
[ 113.572858] ? lock_release+0xc8/0x290
[ 113.572876] do_group_exit+0xd3/0x2a0
[ 113.572892] __x64_sys_exit_group+0x3e/0x50
[ 113.572906] x64_sys_call+0x18c5/0x18d0
08:11:50 executing program 7:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:50 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
[ 113.572922] do_syscall_64+0xbf/0x360
[ 113.572935] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 113.572947] RIP: 0033:0x7f00530b2b19
[ 113.572957] Code: Unable to access opcode bytes at 0x7f00530b2aef.
[ 113.572962] RSP: 002b:00007ffc7730f438 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 113.572974] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f00530b2b19
[ 113.572982] RDX: 00007f005306572b RSI: ffffffffffffffbc RDI: 0000000000000000
[ 113.572989] RBP: 0000000000000000 R08: 0000001b2d1200d0 R09: 0000000000000000
[ 113.572997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 113.573004] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffc7730f520
[ 113.573020]
[ 113.573024] kmemleak: Object (percpu) 0x607f1a62f608 (size 8):
[ 113.573030] kmemleak: comm "syz-executor.1", pid 3962, jiffies 4294780428
[ 113.573038] kmemleak: min_count = 1
[ 113.573042] kmemleak: count = 0
[ 113.573046] kmemleak: flags = 0x21
[ 113.573050] kmemleak: checksum = 0
[ 113.573053] kmemleak: backtrace:
[ 113.573057] pcpu_alloc_noprof+0x87a/0x1170
[ 113.573073] perf_trace_event_init+0x366/0xa10
[ 113.573087] perf_trace_init+0x1a4/0x2f0
[ 113.573099] perf_tp_event_init+0xa6/0x120
[ 113.573116] perf_try_init_event+0x140/0x9f0
[ 113.573130] perf_event_alloc.part.0+0x118e/0x45f0
[ 113.573147] __do_sys_perf_event_open+0x719/0x2c20
[ 113.573160] do_syscall_64+0xbf/0x360
[ 113.573170] entry_SYSCALL_64_after_hwframe+0x77/0x7f
08:11:50 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4)
setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f00000013c0)=0x6, 0x4)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c)
08:11:50 executing program 4:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:50 executing program 7:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:50 executing program 5:
syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
pivot_root(0x0, 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
08:11:51 executing program 5:
syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
pivot_root(0x0, 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
08:11:51 executing program 1:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:51 executing program 4:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:51 executing program 3:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:51 executing program 6:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:51 executing program 2:
syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
pivot_root(0x0, 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
08:11:51 executing program 7:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:51 executing program 5:
syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
pivot_root(0x0, 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
08:11:51 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
[ 114.649834] kmemleak: Found object by alias at 0x607f1a62f60c
[ 114.649854] CPU: 1 UID: 0 PID: 3993 Comm: syz-executor.6 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
[ 114.649873] Tainted: [W]=WARN
[ 114.649877] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 114.649884] Call Trace:
[ 114.649889]
[ 114.649893] dump_stack_lvl+0xca/0x120
[ 114.649919] __lookup_object+0x94/0xb0
[ 114.649937] delete_object_full+0x27/0x70
[ 114.649957] free_percpu+0x30/0x1160
[ 114.649975] ? arch_uprobe_clear_state+0x16/0x140
[ 114.649995] futex_hash_free+0x38/0xc0
[ 114.650010] mmput+0x2d3/0x390
[ 114.650030] do_exit+0x79d/0x2970
[ 114.650044] ? signal_wake_up_state+0x85/0x120
[ 114.650060] ? zap_other_threads+0x2b9/0x3a0
[ 114.650076] ? __pfx_do_exit+0x10/0x10
[ 114.650089] ? do_group_exit+0x1c3/0x2a0
[ 114.650103] ? lock_release+0xc8/0x290
[ 114.650121] do_group_exit+0xd3/0x2a0
[ 114.650136] __x64_sys_exit_group+0x3e/0x50
[ 114.650150] x64_sys_call+0x18c5/0x18d0
[ 114.650166] do_syscall_64+0xbf/0x360
[ 114.650180] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 114.650191] RIP: 0033:0x7f00530b2b19
[ 114.650200] Code: Unable to access opcode bytes at 0x7f00530b2aef.
[ 114.650205] RSP: 002b:00007ffc7730f438 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 114.650217] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f00530b2b19
[ 114.650225] RDX: 00007f005306572b RSI: ffffffffffffffbc RDI: 0000000000000000
[ 114.650233] RBP: 0000000000000000 R08: 0000001b2d129794 R09: 0000000000000000
[ 114.650240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 114.650247] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffc7730f520
[ 114.650262]
[ 114.650266] kmemleak: Object (percpu) 0x607f1a62f608 (size 8):
[ 114.650273] kmemleak: comm "syz-executor.4", pid 3989, jiffies 4294781476
[ 114.650281] kmemleak: min_count = 1
[ 114.650285] kmemleak: count = 0
[ 114.650288] kmemleak: flags = 0x21
[ 114.650292] kmemleak: checksum = 0
[ 114.650296] kmemleak: backtrace:
[ 114.650299] pcpu_alloc_noprof+0x87a/0x1170
[ 114.650315] perf_trace_event_init+0x366/0xa10
[ 114.650329] perf_trace_init+0x1a4/0x2f0
[ 114.650342] perf_tp_event_init+0xa6/0x120
[ 114.650358] perf_try_init_event+0x140/0x9f0
[ 114.650372] perf_event_alloc.part.0+0x118e/0x45f0
[ 114.650389] __do_sys_perf_event_open+0x719/0x2c20
[ 114.650402] do_syscall_64+0xbf/0x360
[ 114.650411] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 114.696450] kmemleak: Found object by alias at 0x607f1a63eb84
[ 114.696464] CPU: 1 UID: 0 PID: 3987 Comm: syz-executor.4 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
[ 114.696481] Tainted: [W]=WARN
[ 114.696485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 114.696492] Call Trace:
[ 114.696495]
[ 114.696500] dump_stack_lvl+0xca/0x120
[ 114.696520] __lookup_object+0x94/0xb0
[ 114.696535] delete_object_full+0x27/0x70
[ 114.696552] free_percpu+0x30/0x1160
[ 114.696568] ? arch_uprobe_clear_state+0x16/0x140
[ 114.696590] futex_hash_free+0x38/0xc0
[ 114.696603] mmput+0x2d3/0x390
[ 114.696623] do_exit+0x79d/0x2970
[ 114.696636] ? signal_wake_up_state+0x85/0x120
[ 114.696651] ? zap_other_threads+0x2b9/0x3a0
[ 114.696667] ? __pfx_do_exit+0x10/0x10
[ 114.696680] ? do_group_exit+0x1c3/0x2a0
[ 114.696694] ? lock_release+0xc8/0x290
[ 114.696711] do_group_exit+0xd3/0x2a0
[ 114.696726] __x64_sys_exit_group+0x3e/0x50
[ 114.696740] x64_sys_call+0x18c5/0x18d0
[ 114.696755] do_syscall_64+0xbf/0x360
[ 114.696768] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 114.696779] RIP: 0033:0x7fc41a257b19
[ 114.696788] Code: Unable to access opcode bytes at 0x7fc41a257aef.
[ 114.696793] RSP: 002b:00007ffd83ed1118 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 114.696805] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fc41a257b19
[ 114.696812] RDX: 00007fc41a20a72b RSI: ffffffffffffffbc RDI: 0000000000000000
[ 114.696820] RBP: 0000000000000000 R08: 0000001b2d32bd00 R09: 0000000000000000
[ 114.696827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 114.696834] R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffd83ed1200
[ 114.696849]
[ 114.696853] kmemleak: Object (percpu) 0x607f1a63eb80 (size 8):
[ 114.696860] kmemleak: comm "syz-executor.6", pid 3996, jiffies 4294781506
[ 114.696867] kmemleak: min_count = 1
[ 114.696871] kmemleak: count = 0
[ 114.696874] kmemleak: flags = 0x21
[ 114.696878] kmemleak: checksum = 0
[ 114.696882] kmemleak: backtrace:
[ 114.696885] pcpu_alloc_noprof+0x87a/0x1170
[ 114.696900] percpu_ref_init+0x37/0x400
[ 114.696911] blkg_alloc+0xe9/0x7d0
[ 114.696924] blkg_create+0xe08/0x1420
[ 114.696937] bio_associate_blkg_from_css+0xe06/0x1380
[ 114.696951] bio_associate_blkg+0x10e/0x2a0
[ 114.696964] bio_init+0x2dd/0x570
[ 114.696978] bio_alloc_bioset+0x2cf/0x8c0
[ 114.696993] iomap_dio_alloc_bio.isra.0+0x88/0xc0
[ 114.697005] iomap_dio_bio_iter+0x8aa/0x1550
[ 114.697014] __iomap_dio_rw+0x10a1/0x1cf0
[ 114.697024] iomap_dio_rw+0x40/0xa0
[ 114.697033] ext4_file_read_iter+0x2f6/0x4a0
[ 114.697045] vfs_read+0x868/0xc70
[ 114.697056] ksys_read+0x121/0x240
[ 114.697066] do_syscall_64+0xbf/0x360
08:11:51 executing program 6:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:51 executing program 3:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:51 executing program 2:
syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
pivot_root(0x0, 0x0)
rmdir(&(0x7f0000000000)='./file0\x00')
08:11:51 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:51 executing program 5:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:52 executing program 4:
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000900)="5ed0b2ff68d76fb3", 0x8)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0)
sendfile(r0, r1, 0x0, 0xfdef)
truncate(&(0x7f0000000040)='./file0\x00', 0x0)
08:11:52 executing program 6:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
08:11:52 executing program 3:
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read(r0, &(0x7f0000000000), 0x2000)
close(r0)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x105000, 0x0)
read(r1, &(0x7f0000000000), 0x2000)
close(r1)
munmap(&(0x7f0000000000/0x2000)=nil, 0x2000)
[ 115.463709] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] SMP KASAN NOPTI
[ 115.464630] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[ 115.465205] CPU: 0 UID: 0 PID: 3997 Comm: syz-executor.1 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
[ 115.467118] Tainted: [W]=WARN
[ 115.467730] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 115.469240] RIP: 0010:perf_trace_add+0x21b/0x340
[ 115.470565] Code: 00 0f 85 3a 01 00 00 4c 89 75 00 4d 85 ed 74 2a e8 da b2 f5 ff 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 df 00 00 00 4d 89 75 08 eb 03 45 31 e4 e8 ad b2
[ 115.473686] RSP: 0018:ffff888018d27228 EFLAGS: 00010012
[ 115.474097] RAX: dffffc0000000000 RBX: ffff88800964a580 RCX: ffffffff817e42fe
[ 115.474629] RDX: 0000000000000001 RSI: ffffffff817e43d6 RDI: 0000000000000009
[ 115.475161] RBP: ffffe8ffffc07608 R08: ffffffff85ca4140 R09: ffffed10031a4e8c
[ 115.475691] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
[ 115.476224] R13: 0000000000000001 R14: ffff88800964a5e0 R15: ffff88800964a618
[ 115.476756] FS: 00007f9b75c76700(0000) GS:ffff8880e55d8000(0000) knlGS:0000000000000000
[ 115.477356] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 115.477799] CR2: 0000001b2d630000 CR3: 000000000c954000 CR4: 0000000000350ef0
[ 115.478334] Call Trace:
[ 115.478531]
[ 115.478706] event_sched_in+0x446/0xb60
[ 115.479022] merge_sched_in+0xb4d/0x1810
[ 115.479336] visit_groups_merge.constprop.0.isra.0+0x8d1/0x1150
[ 115.479791] ? __pfx_visit_groups_merge.constprop.0.isra.0+0x10/0x10
[ 115.480275] ? lock_is_held_type+0x9e/0x120
[ 115.480612] ctx_sched_in+0x579/0x9b0
[ 115.480903] ? __pfx_ctx_sched_in+0x10/0x10
[ 115.481233] perf_event_sched_in+0x5d/0x90
[ 115.481555] __perf_event_task_sched_in+0x2ec/0x5e0
[ 115.481941] ? __pfx___perf_event_task_sched_in+0x10/0x10
[ 115.482354] ? lock_is_held_type+0x9e/0x120
[ 115.482686] ? xfd_validate_state+0x55/0x180
[ 115.483030] finish_task_switch.isra.0+0x410/0x840
[ 115.483413] __schedule+0xe86/0x3590
[ 115.483706] ? __pfx___schedule+0x10/0x10
[ 115.484025] ? kasan_save_stack+0x34/0x50
[ 115.484344] ? kasan_save_stack+0x24/0x50
[ 115.484660] ? kasan_save_track+0x14/0x30
[ 115.484976] ? __kmalloc_noprof+0x27e/0x6e0
[ 115.485307] ? iter_file_splice_write+0x1cd/0x11f0
[ 115.485683] ? splice_direct_to_actor+0x347/0x9d0
[ 115.486059] ? do_splice_direct+0x179/0x250
[ 115.486393] ? lock_is_held_type+0x9e/0x120
[ 115.486727] __cond_resched+0x4c/0x80
[ 115.487021] down_write+0x72/0x1f0
[ 115.487292] ? __pfx_down_write+0x10/0x10
[ 115.487610] ext4_buffered_write_iter+0xab/0x430
[ 115.487974] ext4_file_write_iter+0x9df/0x1990
[ 115.488320] ? kasan_save_track+0x14/0x30
[ 115.488637] ? __kasan_kmalloc+0x7f/0x90
[ 115.488948] ? __pfx_ext4_file_write_iter+0x10/0x10
[ 115.489323] ? trace_kmalloc+0x1f/0xb0
[ 115.489619] ? __kmalloc_noprof+0x29d/0x6e0
[ 115.489957] ? iter_file_splice_write+0x1cd/0x11f0
[ 115.490331] ? splice_from_pipe_next.part.0+0x165/0x510
[ 115.490738] iter_file_splice_write+0xa3b/0x11f0
[ 115.491100] ? trace_sched_exit_tp+0xbf/0x100
[ 115.491448] ? __pfx_iter_file_splice_write+0x10/0x10
[ 115.491844] ? lock_is_held_type+0x9e/0x120
[ 115.492178] ? __pfx_iter_file_splice_write+0x10/0x10
[ 115.492570] direct_splice_actor+0x192/0x7b0
[ 115.492914] splice_direct_to_actor+0x347/0x9d0
[ 115.493276] ? __pfx_direct_splice_actor+0x10/0x10
[ 115.493649] ? __pfx_splice_direct_to_actor+0x10/0x10
[ 115.494051] ? lock_acquire+0x15e/0x2f0
[ 115.494356] do_splice_direct+0x179/0x250
[ 115.494673] ? __pfx_do_splice_direct+0x10/0x10
[ 115.495028] ? __pfx_direct_file_splice_eof+0x10/0x10
[ 115.495421] ? security_file_permission+0x22/0x90
[ 115.495794] do_sendfile+0xa8e/0xdc0
[ 115.496081] ? __pfx_do_sendfile+0x10/0x10
[ 115.496402] ? __x64_sys_futex+0x1c9/0x4d0
[ 115.496725] ? __x64_sys_futex+0x1d2/0x4d0
[ 115.497048] __x64_sys_sendfile64+0x1d3/0x210
[ 115.497397] ? __pfx___x64_sys_sendfile64+0x10/0x10
[ 115.497787] do_syscall_64+0xbf/0x360
[ 115.498079] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 115.498469] RIP: 0033:0x7f9b78700b19
[ 115.498750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 115.500101] RSP: 002b:00007f9b75c76188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[ 115.500662] RAX: ffffffffffffffda RBX: 00007f9b78813f60 RCX: 00007f9b78700b19
[ 115.501190] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004
[ 115.501727] RBP: 00007f9b7875af6d R08: 0000000000000000 R09: 0000000000000000
[ 115.502257] R10: 000000000000fdef R11: 0000000000000246 R12: 0000000000000000
[ 115.502785] R13: 00007fff8785bb0f R14: 00007f9b75c76300 R15: 0000000000022000
[ 115.503317]
[ 115.503495] Modules linked in:
[ 115.503743] ---[ end trace 0000000000000000 ]---
[ 115.504094] RIP: 0010:perf_trace_add+0x21b/0x340
[ 115.504457] Code: 00 0f 85 3a 01 00 00 4c 89 75 00 4d 85 ed 74 2a e8 da b2 f5 ff 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 df 00 00 00 4d 89 75 08 eb 03 45 31 e4 e8 ad b2
[ 115.505816] RSP: 0018:ffff888018d27228 EFLAGS: 00010012
[ 115.506213] RAX: dffffc0000000000 RBX: ffff88800964a580 RCX: ffffffff817e42fe
[ 115.506742] RDX: 0000000000000001 RSI: ffffffff817e43d6 RDI: 0000000000000009
[ 115.507270] RBP: ffffe8ffffc07608 R08: ffffffff85ca4140 R09: ffffed10031a4e8c
[ 115.507800] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
[ 115.508329] R13: 0000000000000001 R14: ffff88800964a5e0 R15: ffff88800964a618
[ 115.508859] FS: 00007f9b75c76700(0000) GS:ffff8880e55d8000(0000) knlGS:0000000000000000
[ 115.509454] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 115.509893] CR2: 0000001b2d630000 CR3: 000000000c954000 CR4: 0000000000350ef0
[ 115.510428] note: syz-executor.1[3997] exited with irqs disabled
VM DIAGNOSIS:
08:11:52 Registers:
info registers vcpu 0
RAX=0000000000000031 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8
RSI=ffffffff828e5105 RDI=ffffffff88729280 RBP=ffffffff88729240 RSP=ffff888018d26b78
R8 =0000000000000000 R9 =ffffed1001456046 R10=0000000000000031 R11=000000003a504952
R12=0000000000000031 R13=0000000000000010 R14=ffffffff88729240 R15=ffffffff828e50f0
RIP=ffffffff828e515d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f9b75c76700 00000000 00000000
GS =0000 ffff8880e55d8000 00000000 00000000
LDT=0000 fffffe5000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000001000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=0000001b2d630000 CR3=000000000c954000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000 XMM01=00000000000000003f847ae147ae147b
XMM02=00000000000000000000000000000000 XMM03=00000000000000003f73b2845bb74dba
XMM04=77654e2e726567616e614d100182ff17 XMM05=c76fbc81fccef0b581fca5f0b581fc60
XMM06=fcc5f0b581fcdbecb581fc7e39be81fc XMM07=81fc4ce23681fca8822c81fcde182582
XMM08=bc81fc5f03b681fc0ff3b581fc09bcb4 XMM09=fac981fc3067bc81fc31f46c81fcbd6f
XMM10=1f79bb84fc46aabf81fc1e23ce81fccc XMM11=fc02edb581fc677e7481fc9add3681fc
XMM12=000073a9bf81fc8839be81fcda66bc81 XMM13=6bc6ac32ee2581bfe1d0b1a9f212734f
XMM14=f2f9052d905ef798ac0c37e0dd5d0701 XMM15=37e4a6841914bd119c970ba280435028
info registers vcpu 1
RAX=0000000000000001 RBX=0000000000000001 RCX=ffffffff84be3c0e RDX=ffffed1002ffa301
RSI=0000000000000004 RDI=ffff888017fd1800 RBP=ffff888017fd1800 RSP=ffff8880431afc20
R8 =0000000000000000 R9 =ffffed1002ffa300 R10=ffff888017fd1803 R11=0000000000000001
R12=1ffff11008635f85 R13=0000000000000003 R14=ffffed1002ffa300 R15=ffff8880431afc58
RIP=ffffffff84be3da0 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 000055556e709400 00000000 00000000
GS =0000 ffff8880e56d8000 00000000 00000000
LDT=0000 fffffe3300000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT= fffffe0000048000 0000007f
IDT= fffffe0000000000 00000fff
CR0=80050033 CR2=0000001b2d031000 CR3=000000000c954000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000
XMM02=00000000000000004124eab000000000 XMM03=0000ff00000000000000000000000000
XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962
XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72
XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000