Oops: general protection fault, probably for non-canonical address 0xe01ffc00000000b0: 0000 [#1] SMP KASAN NOPTI
KASAN: maybe wild-memory-access in range [0x0100000000000580-0x0100000000000587]
CPU: 1 UID: 0 PID: 3943 Comm: syz-executor.2 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:perf_tp_event+0x26b/0xe70
Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f
RSP: 0018:ffff888045227800 EFLAGS: 00010212
RAX: 00200000000000b0 RBX: ffff8880450e0641 RCX: ffffc900074c4000
RDX: 0000000000040000 RSI: ffffffff8189a5dd RDI: 0100000000000580
RBP: ffff888045227a70 R08: ffff88806cf31340 R09: ffffe8ffffd16260
R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000
R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000
FS: 00007f6c8836d700(0000) GS:ffff8880e56d8000(0000) knlGS:0000000000000000
kmemleak: Found object by alias at 0x607f1a63e264
CPU: 0 UID: 0 PID: 3933 Comm: syz-executor.6 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Call Trace:
dump_stack_lvl+0xca/0x120
__lookup_object+0x94/0xb0
delete_object_full+0x27/0x70
free_percpu+0x30/0x1160
futex_hash_free+0x38/0xc0
mmput+0x2d3/0x390
do_exit+0x79d/0x2970
do_group_exit+0xd3/0x2a0
__x64_sys_exit_group+0x3e/0x50
x64_sys_call+0x18c5/0x18d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f8f7414bb19
Code: Unable to access opcode bytes at 0x7f8f7414baef.
RSP: 002b:00007ffe23671e98 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007f8f7414bb19
RDX: 00007f8f740fe72b RSI: ffffffffffffffbc RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000001b2da21504 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 0000000000000000 R14: 0000000000000001 R15: 00007ffe23671f80
kmemleak: Object (percpu) 0x607f1a63e260 (size 8):
kmemleak: comm "syz-executor.2", pid 3943, jiffies 4294774736
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x21
kmemleak: checksum = 0
kmemleak: backtrace:
pcpu_alloc_noprof+0x87a/0x1170
perf_trace_event_init+0x366/0xa10
perf_trace_init+0x1a4/0x2f0
perf_tp_event_init+0xa6/0x120
perf_try_init_event+0x140/0x9f0
perf_event_alloc.part.0+0x118e/0x45f0
__do_sys_perf_event_open+0x719/0x2c20
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000000e0c2000 CR4: 0000000000350ef0
Call Trace:
perf_trace_run_bpf_submit+0xef/0x180
perf_trace_lock+0x337/0x5d0
lock_release+0x1ab/0x290
futex_ref_get+0x119/0x300
futex_hash+0x70/0x390
futex_wake+0x143/0x540
do_futex+0x26d/0x370
__x64_sys_futex+0x1c9/0x4d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6c8adf7b19
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f6c8836d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: ffffffffffffffda RBX: 00007f6c8af0af68 RCX: 00007f6c8adf7b19
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f6c8af0af6c
RBP: 00007f6c8af0af60 R08: 000000000000000e R09: 0000000000000000
R10: 0000000000000003 R11: 0000000000000246 R12: 00007f6c8af0af6c
R13: 00007ffd902101df R14: 00007f6c8836d300 R15: 0000000000022000
Modules linked in:
Oops: general protection fault, probably for non-canonical address 0xe01ffc00000000b0: 0000 [#2] SMP KASAN NOPTI
KASAN: maybe wild-memory-access in range [0x0100000000000580-0x0100000000000587]
CPU: 1 UID: 0 PID: 3943 Comm: syz-executor.2 Tainted: G D W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary)
Tainted: [D]=DIE, [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:perf_tp_event+0x26b/0xe70
Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f
RSP: 0018:ffff88806cf08a80 EFLAGS: 00010012
RAX: 00200000000000b0 RBX: ffff8880450e0641 RCX: ffffffff8189a55c
RDX: ffff888043578000 RSI: ffffffff8189a5dd RDI: 0100000000000580
RBP: ffff88806cf08cf0 R08: ffff88806cf31490 R09: ffffe8ffffd16260
R10: 0000000000000000 R11: ffff88806cf37018 R12: dffffc0000000000
R13: 0100000000000000 R14: ffff88806cf31490 R15: dffffc0000000000
FS: 00007f6c8836d700(0000) GS:ffff8880e56d8000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000000e0c2000 CR4: 0000000000350ef0
Call Trace:
perf_trace_run_bpf_submit+0xef/0x180
perf_trace_lock+0x337/0x5d0
lock_release+0x1ab/0x290
_raw_spin_unlock+0x16/0x40
sched_ttwu_pending+0x2e0/0x4a0
__flush_smp_call_function_queue+0x434/0x740
__sysvec_call_function_single+0x6d/0x370
sysvec_call_function_single+0xa1/0xc0
asm_sysvec_call_function_single+0x1a/0x20
RIP: 0010:oops_exit+0x0/0x50
Code: 00 3a 00 be ff ff ff ff 48 c7 c7 50 b4 43 86 e8 c6 0f f9 ff 5b e9 50 00 3a 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 53 e8 36 00 3a 00 8b 1d c0 3d 4f 06 31 ff 89 de e8 57
RSP: 0018:ffff888045227690 EFLAGS: 00000202
RAX: 0000000000035b31 RBX: 0000000000000212 RCX: ffffc900074c4000
RDX: 0000000000040000 RSI: ffffffff812a3dca RDI: 0000000000000007
RBP: 000000000000000b R08: 0000000000000001 R09: fffffbfff0f12690
R10: 0000000000000000 R11: 0000000000000001 R12: ffff888045227758
R13: 0000000000000000 R14: e01ffc00000000b0 R15: 0000000000000000
oops_end+0x65/0xe0
exc_general_protection+0x1a2/0x330
asm_exc_general_protection+0x26/0x30
RIP: 0010:perf_tp_event+0x26b/0xe70
Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f
RSP: 0018:ffff888045227800 EFLAGS: 00010212
RAX: 00200000000000b0 RBX: ffff8880450e0641 RCX: ffffc900074c4000
RDX: 0000000000040000 RSI: ffffffff8189a5dd RDI: 0100000000000580
RBP: ffff888045227a70 R08: ffff88806cf31340 R09: ffffe8ffffd16260
R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000
R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000
perf_trace_run_bpf_submit+0xef/0x180
perf_trace_lock+0x337/0x5d0
lock_release+0x1ab/0x290
futex_ref_get+0x119/0x300
futex_hash+0x70/0x390
futex_wake+0x143/0x540
do_futex+0x26d/0x370
__x64_sys_futex+0x1c9/0x4d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f6c8adf7b19
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f6c8836d218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: ffffffffffffffda RBX: 00007f6c8af0af68 RCX: 00007f6c8adf7b19
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f6c8af0af6c
RBP: 00007f6c8af0af60 R08: 000000000000000e R09: 0000000000000000
R10: 0000000000000003 R11: 0000000000000246 R12: 00007f6c8af0af6c
R13: 00007ffd902101df R14: 00007f6c8836d300 R15: 0000000000022000
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:perf_tp_event+0x26b/0xe70
Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f
RSP: 0018:ffff888045227800 EFLAGS: 00010212
RAX: 00200000000000b0 RBX: ffff8880450e0641 RCX: ffffc900074c4000
RDX: 0000000000040000 RSI: ffffffff8189a5dd RDI: 0100000000000580
RBP: ffff888045227a70 R08: ffff88806cf31340 R09: ffffe8ffffd16260
R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000
R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000
FS: 00007f6c8836d700(0000) GS:ffff8880e56d8000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000000e0c2000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess):
0: 3c 20 cmp $0x20,%al
2: 00 0f add %cl,(%rdi)
4: 85 3d 0b 00 00 4c test %edi,0x4c00000b(%rip) # 0x4c000015
a: 8b ab 00 03 00 00 mov 0x300(%rbx),%ebp
10: 4d 85 ed test %r13,%r13
13: 4c 0f 44 eb cmove %rbx,%r13
17: e8 d3 50 ea ff callq 0xffea50ef
1c: 49 8d bd 80 05 00 00 lea 0x580(%r13),%rdi
23: 48 89 f8 mov %rdi,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction
2f: 0f 85 fd 0a 00 00 jne 0xb32
35: 4d 8b ad 80 05 00 00 mov 0x580(%r13),%r13
3c: 4d 85 ed test %r13,%r13
3f: 0f .byte 0xf