BUG: unable to handle page fault for address: ffffffff00000190 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 5a8b067 P4D 5a8b067 PUD 0 Oops: Oops: 0000 [#1] SMP KASAN NOPTI CPU: 1 UID: 0 PID: 286 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:perf_tp_event+0x186/0xe70 Code: 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 42 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 <44> 8b ab f0 01 00 00 31 ff 41 83 e5 01 44 89 ee e8 c5 4c ea ff 45 RSP: 0018:ffff88806cf08540 EFLAGS: 00010246 RAX: 0000000000000000 RBX: fffffffeffffffa0 RCX: 0000000000000002 RDX: ffff88801b0d5280 RSI: ffffffff818995b7 RDI: ffffffff00000190 RBP: ffff88806cf087b0 R08: ffff88806cf313e8 R09: ffffe8ffffd16638 R10: 0000000000000000 R11: 0000000000006cee R12: dffffc0000000000 R13: 000000000000002c R14: ffff88806cf313e8 R15: dffffc0000000000 FS: 0000555563e20400(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff00000190 CR3: 0000000041fa8000 CR4: 0000000000350ef0 Call Trace: perf_trace_run_bpf_submit+0xef/0x180 perf_trace_lock+0x337/0x5d0 lock_release+0x1ab/0x290 unwind_next_frame+0x3b7/0x2540 __unwind_start+0x517/0x7c0 arch_stack_walk+0x62/0xf0 stack_trace_save+0x8e/0xc0 kasan_save_stack+0x24/0x50 kasan_save_track+0x14/0x30 __kasan_save_free_info+0x3a/0x60 __kasan_slab_free+0x3f/0x50 kmem_cache_free+0x2a1/0x540 dst_destroy+0x23c/0x340 rcu_core+0x7c8/0x1800 handle_softirqs+0x1b1/0x770 __irq_exit_rcu+0xc4/0x100 irq_exit_rcu+0x9/0x20 sysvec_apic_timer_interrupt+0x70/0x80 asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:__ext4_get_inode_loc+0x1d2/0x1390 Code: fa 03 0f 8e 80 0e 00 00 89 43 10 31 d2 89 c6 4c 89 e7 e8 e1 0c f9 ff 48 89 44 24 10 48 85 c0 0f 84 42 0f 00 00 e8 5e 05 8c ff <48> 8b 14 24 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 RSP: 0018:ffff88801b1777e8 EFLAGS: 00000293 RAX: 0000000000000000 RBX: ffff88801b177a98 RCX: ffff88801b17776c RDX: ffff88801b0d5280 RSI: ffffffff81e7e222 RDI: ffff88800916cea8 RBP: 0000000000003e62 R08: ffffffff84c93ca0 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800fdac000 R13: ffff88800fdae000 R14: 0000000000003e63 R15: ffff88800fdae000 ext4_get_inode_loc+0xbd/0x160 ext4_reserve_inode_write+0x155/0x350 __ext4_mark_inode_dirty+0x162/0x7e0 __ext4_new_inode+0x2864/0x4d70 ext4_mkdir+0x331/0xb30 vfs_mkdir+0x59a/0x8d0 do_mkdirat+0x19f/0x3d0 __x64_sys_mkdir+0xf3/0x140 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f831639ac27 Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fff8582a9e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fff8582aa70 RCX: 00007f831639ac27 RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00007fff8582aa70 RBP: 00007fff8582aa4c R08: 0000000000000000 R09: 0000000000000003 R10: 00007fff8582a787 R11: 0000000000000206 R12: 0000000000000032 R13: 000000000001ecb0 R14: 0000000000000006 R15: 00007fff8582aab0 Modules linked in: CR2: ffffffff00000190 ---[ end trace 0000000000000000 ]--- RIP: 0010:perf_tp_event+0x186/0xe70 Code: 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 42 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 <44> 8b ab f0 01 00 00 31 ff 41 83 e5 01 44 89 ee e8 c5 4c ea ff 45 RSP: 0018:ffff88806cf08540 EFLAGS: 00010246 RAX: 0000000000000000 RBX: fffffffeffffffa0 RCX: 0000000000000002 RDX: ffff88801b0d5280 RSI: ffffffff818995b7 RDI: ffffffff00000190 RBP: ffff88806cf087b0 R08: ffff88806cf313e8 R09: ffffe8ffffd16638 R10: 0000000000000000 R11: 0000000000006cee R12: dffffc0000000000 R13: 000000000000002c R14: ffff88806cf313e8 R15: dffffc0000000000 FS: 0000555563e20400(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffff00000190 CR3: 0000000041fa8000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 89 85 c8 fd ff ff mov %eax,-0x238(%rbp) 6: e8 c9 51 ea ff callq 0xffea51d4 b: 48 8d bb f0 01 00 00 lea 0x1f0(%rbx),%rdi 12: 48 89 f8 mov %rdi,%rax 15: 48 c1 e8 03 shr $0x3,%rax 19: 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax 1e: 84 c0 test %al,%al 20: 74 08 je 0x2a 22: 3c 03 cmp $0x3,%al 24: 0f 8e c5 0b 00 00 jle 0xbef * 2a: 44 8b ab f0 01 00 00 mov 0x1f0(%rbx),%r13d <-- trapping instruction 31: 31 ff xor %edi,%edi 33: 41 83 e5 01 and $0x1,%r13d 37: 44 89 ee mov %r13d,%esi 3a: e8 c5 4c ea ff callq 0xffea4d04 3f: 45 rex.RB