Oops: general protection fault, probably for non-canonical address 0xe01ffc00000000b0: 0000 [#1] SMP KASAN NOPTI
KASAN: maybe wild-memory-access in range [0x0100000000000580-0x0100000000000587]
CPU: 1 UID: 0 PID: 3951 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:perf_tp_event+0x26b/0xe70
Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f
RSP: 0018:ffff8880441d7800 EFLAGS: 00010212
RAX: 00200000000000b0 RBX: ffff8880432a12c1 RCX: ffffc9000def9000
RDX: 0000000000040000 RSI: ffffffff818996ad RDI: 0100000000000580
RBP: ffff8880441d7a70 R08: ffff88806cf31340 R09: ffffe8ffffd16778
R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000
R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000
FS: 00007f01ae74a700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7d364a6ff8 CR3: 00000000414be000 CR4: 0000000000350ef0
Call Trace:
perf_trace_run_bpf_submit+0xef/0x180
perf_trace_lock+0x337/0x5d0
lock_release+0x1ab/0x290
futex_ref_get+0x119/0x300
futex_hash+0x70/0x390
futex_wake+0x143/0x540
do_futex+0x26d/0x370
__x64_sys_futex+0x1c9/0x4d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f01b11d4b19
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f01ae74a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: ffffffffffffffda RBX: 00007f01b12e7f68 RCX: 00007f01b11d4b19
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f01b12e7f6c
RBP: 00007f01b12e7f60 R08: 000000000000000e R09: 0000000000000000
R10: 0000000000000003 R11: 0000000000000246 R12: 00007f01b12e7f6c
R13: 00007ffc0aacedff R14: 00007f01ae74a300 R15: 0000000000022000
Modules linked in:
Oops: general protection fault, probably for non-canonical address 0xe01ffc00000000b0: 0000 [#2] SMP KASAN NOPTI
KASAN: maybe wild-memory-access in range [0x0100000000000580-0x0100000000000587]
CPU: 1 UID: 0 PID: 3951 Comm: syz-executor.6 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary)
Tainted: [D]=DIE, [W]=WARN
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:perf_tp_event+0x26b/0xe70
Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f
RSP: 0018:ffff88806cf08a80 EFLAGS: 00010012
RAX: 00200000000000b0 RBX: ffff8880432a12c1 RCX: ffffffff8189962c
RDX: ffff888015b51b80 RSI: ffffffff818996ad RDI: 0100000000000580
RBP: ffff88806cf08cf0 R08: ffff88806cf31490 R09: ffffe8ffffd16778
R10: 0000000000000000 R11: ffff88806cf37018 R12: dffffc0000000000
R13: 0100000000000000 R14: ffff88806cf31490 R15: dffffc0000000000
FS: 00007f01ae74a700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7d364a6ff8 CR3: 00000000414be000 CR4: 0000000000350ef0
Call Trace:
perf_trace_run_bpf_submit+0xef/0x180
perf_trace_lock+0x337/0x5d0
lock_release+0x1ab/0x290
_raw_spin_unlock+0x16/0x40
sched_ttwu_pending+0x2e0/0x4a0
__flush_smp_call_function_queue+0x434/0x740
__sysvec_call_function_single+0x6d/0x370
sysvec_call_function_single+0xa1/0xc0
asm_sysvec_call_function_single+0x1a/0x20
RIP: 0010:oops_exit+0x0/0x50
Code: f1 39 00 be ff ff ff ff 48 c7 c7 50 ac 43 86 e8 c6 0f f9 ff 5b e9 20 f1 39 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 53 e8 06 f1 39 00 8b 1d c0 ed 4e 06 31 ff 89 de e8 27
RSP: 0018:ffff8880441d7690 EFLAGS: 00000202
RAX: 000000000002c312 RBX: 0000000000000206 RCX: ffffc9000def9000
RDX: 0000000000040000 RSI: ffffffff812a3dca RDI: 0000000000000007
RBP: 000000000000000b R08: 0000000000000001 R09: fffffbfff0f11c90
R10: 0000000000000000 R11: 0000000000000001 R12: ffff8880441d7758
R13: 0000000000000000 R14: e01ffc00000000b0 R15: 0000000000000000
oops_end+0x65/0xe0
exc_general_protection+0x1a2/0x330
asm_exc_general_protection+0x26/0x30
RIP: 0010:perf_tp_event+0x26b/0xe70
Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f
RSP: 0018:ffff8880441d7800 EFLAGS: 00010212
RAX: 00200000000000b0 RBX: ffff8880432a12c1 RCX: ffffc9000def9000
RDX: 0000000000040000 RSI: ffffffff818996ad RDI: 0100000000000580
RBP: ffff8880441d7a70 R08: ffff88806cf31340 R09: ffffe8ffffd16778
R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000
R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000
perf_trace_run_bpf_submit+0xef/0x180
perf_trace_lock+0x337/0x5d0
lock_release+0x1ab/0x290
futex_ref_get+0x119/0x300
futex_hash+0x70/0x390
futex_wake+0x143/0x540
do_futex+0x26d/0x370
__x64_sys_futex+0x1c9/0x4d0
do_syscall_64+0xbf/0x360
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f01b11d4b19
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f01ae74a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: ffffffffffffffda RBX: 00007f01b12e7f68 RCX: 00007f01b11d4b19
RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f01b12e7f6c
RBP: 00007f01b12e7f60 R08: 000000000000000e R09: 0000000000000000
R10: 0000000000000003 R11: 0000000000000246 R12: 00007f01b12e7f6c
R13: 00007ffc0aacedff R14: 00007f01ae74a300 R15: 0000000000022000
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:perf_tp_event+0x26b/0xe70
Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f
RSP: 0018:ffff8880441d7800 EFLAGS: 00010212
RAX: 00200000000000b0 RBX: ffff8880432a12c1 RCX: ffffc9000def9000
RDX: 0000000000040000 RSI: ffffffff818996ad RDI: 0100000000000580
RBP: ffff8880441d7a70 R08: ffff88806cf31340 R09: ffffe8ffffd16778
R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000
R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000
FS: 00007f01ae74a700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7d364a6ff8 CR3: 00000000414be000 CR4: 0000000000350ef0
----------------
Code disassembly (best guess):
0: 3c 20 cmp $0x20,%al
2: 00 0f add %cl,(%rdi)
4: 85 3d 0b 00 00 4c test %edi,0x4c00000b(%rip) # 0x4c000015
a: 8b ab 00 03 00 00 mov 0x300(%rbx),%ebp
10: 4d 85 ed test %r13,%r13
13: 4c 0f 44 eb cmove %rbx,%r13
17: e8 d3 50 ea ff callq 0xffea50ef
1c: 49 8d bd 80 05 00 00 lea 0x580(%r13),%rdi
23: 48 89 f8 mov %rdi,%rax
26: 48 c1 e8 03 shr $0x3,%rax
* 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction
2f: 0f 85 fd 0a 00 00 jne 0xb32
35: 4d 8b ad 80 05 00 00 mov 0x580(%r13),%r13
3c: 4d 85 ed test %r13,%r13
3f: 0f .byte 0xf