BUG: unable to handle page fault for address: ffffffff00000190
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 5a8b067 P4D 5a8b067 PUD 0
Oops: Oops: 0000 [#1] SMP KASAN NOPTI
CPU: 1 UID: 0 PID: 286 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:perf_tp_event+0x186/0xe70
Code: 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 42 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 <44> 8b ab f0 01 00 00 31 ff 41 83 e5 01 44 89 ee e8 c5 4c ea ff 45
RSP: 0018:ffff88806cf08540 EFLAGS: 00010246
RAX: 0000000000000000 RBX: fffffffeffffffa0 RCX: 0000000000000002
RDX: ffff88801b0d5280 RSI: ffffffff818995b7 RDI: ffffffff00000190
RBP: ffff88806cf087b0 R08: ffff88806cf313e8 R09: ffffe8ffffd16638
R10: 0000000000000000 R11: 0000000000006cee R12: dffffc0000000000
R13: 000000000000002c R14: ffff88806cf313e8 R15: dffffc0000000000
FS: 0000555563e20400(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff00000190 CR3: 0000000041fa8000 CR4: 0000000000350ef0
Call Trace:
perf_trace_run_bpf_submit+0xef/0x180
perf_trace_lock+0x337/0x5d0
lock_release+0x1ab/0x290
unwind_next_frame+0x3b7/0x2540
__unwind_start+0x517/0x7c0
arch_stack_walk+0x62/0xf0
stack_trace_save+0x8e/0xc0
kasan_save_stack+0x24/0x50
kasan_save_track+0x14/0x30
__kasan_save_free_info+0x3a/0x60
__kasan_slab_free+0x3f/0x50
kmem_cache_free+0x2a1/0x540
dst_destroy+0x23c/0x340
rcu_core+0x7c8/0x1800
handle_softirqs+0x1b1/0x770
__irq_exit_rcu+0xc4/0x100
irq_exit_rcu+0x9/0x20
sysvec_apic_timer_interrupt+0x70/0x80
asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:__ext4_get_inode_loc+0x1d2/0x1390
Code: fa 03 0f 8e 80 0e 00 00 89 43 10 31 d2 89 c6 4c 89 e7 e8 e1 0c f9 ff 48 89 44 24 10 48 85 c0 0f 84 42 0f 00 00 e8 5e 05 8c ff <48> 8b 14 24 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00
RSP: 0018:ffff88801b1777e8 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff88801b177a98 RCX: ffff88801b17776c
RDX: ffff88801b0d5280 RSI: ffffffff81e7e222 RDI: ffff88800916cea8
RBP: 0000000000003e62 R08: ffffffff84c93ca0 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff88800fdac000
R13: ffff88800fdae000 R14: 0000000000003e63 R15: ffff88800fdae000
ext4_get_inode_loc+0xbd/0x160
ext4_reserve_inode_write+0x155/0x350
__ext4_mark_inode_dirty+0x162/0x7e0
__ext4_new_inode+0x2864/0x4d70
ext4_mkdir+0x331/0xb30
vfs_mkdir+0x59a/0x8d0
do_mkdirat+0x19f/0x3d0
__x64_sys_mkdir+0xf3/0x140
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f831639ac27
Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff8582a9e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000053
RAX: ffffffffffffffda RBX: 00007fff8582aa70 RCX: 00007f831639ac27
RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00007fff8582aa70
RBP: 00007fff8582aa4c R08: 0000000000000000 R09: 0000000000000003
R10: 00007fff8582a787 R11: 0000000000000206 R12: 0000000000000032
R13: 000000000001ecb0 R14: 0000000000000006 R15: 00007fff8582aab0
Modules linked in:
CR2: ffffffff00000190
---[ end trace 0000000000000000 ]---
RIP: 0010:perf_tp_event+0x186/0xe70
Code: 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 42 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 <44> 8b ab f0 01 00 00 31 ff 41 83 e5 01 44 89 ee e8 c5 4c ea ff 45
RSP: 0018:ffff88806cf08540 EFLAGS: 00010246
RAX: 0000000000000000 RBX: fffffffeffffffa0 RCX: 0000000000000002
RDX: ffff88801b0d5280 RSI: ffffffff818995b7 RDI: ffffffff00000190
RBP: ffff88806cf087b0 R08: ffff88806cf313e8 R09: ffffe8ffffd16638
R10: 0000000000000000 R11: 0000000000006cee R12: dffffc0000000000
R13: 000000000000002c R14: ffff88806cf313e8 R15: dffffc0000000000
FS: 0000555563e20400(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffff00000190 CR3: 0000000041fa8000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess):
0: 89 85 c8 fd ff ff mov %eax,-0x238(%rbp)
6: e8 c9 51 ea ff callq 0xffea51d4
b: 48 8d bb f0 01 00 00 lea 0x1f0(%rbx),%rdi
12: 48 89 f8 mov %rdi,%rax
15: 48 c1 e8 03 shr $0x3,%rax
19: 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax
1e: 84 c0 test %al,%al
20: 74 08 je 0x2a
22: 3c 03 cmp $0x3,%al
24: 0f 8e c5 0b 00 00 jle 0xbef
* 2a: 44 8b ab f0 01 00 00 mov 0x1f0(%rbx),%r13d <-- trapping instruction
31: 31 ff xor %edi,%edi
33: 41 83 e5 01 and $0x1,%r13d
37: 44 89 ee mov %r13d,%esi
3a: e8 c5 4c ea ff callq 0xffea4d04
3f: 45 rex.RB