Oops: general protection fault, probably for non-canonical address 0xe01ffc00000000b0: 0000 [#1] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x0100000000000580-0x0100000000000587] CPU: 1 UID: 0 PID: 4109 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:perf_tp_event+0x26b/0xe70 Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f RSP: 0018:ffff88801593f800 EFLAGS: 00010212 RAX: 00200000000000b0 RBX: ffff88801a1d1901 RCX: ffffc900042ab000 RDX: 0000000000040000 RSI: ffffffff818996ad RDI: 0100000000000580 RBP: ffff88801593fa70 R08: ffff88806cf31340 R09: ffffe8ffffd16000 R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000 FS: 00007f10e5471700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f10e800f018 CR3: 000000000d523000 CR4: 0000000000350ef0 Call Trace: perf_trace_run_bpf_submit+0xef/0x180 perf_trace_lock+0x337/0x5d0 lock_release+0x1ab/0x290 futex_ref_get+0x119/0x300 futex_hash+0x70/0x390 futex_wake+0x143/0x540 do_futex+0x26d/0x370 __x64_sys_futex+0x1c9/0x4d0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f10e7efbb19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f10e5471218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: ffffffffffffffda RBX: 00007f10e800ef68 RCX: 00007f10e7efbb19 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f10e800ef6c RBP: 00007f10e800ef60 R08: 000000000000000e R09: 0000000000000000 R10: 0000000000000003 R11: 0000000000000246 R12: 00007f10e800ef6c R13: 00007ffd87e44bdf R14: 00007f10e5471300 R15: 0000000000022000 Modules linked in: Oops: general protection fault, probably for non-canonical address 0xe01ffc00000000b0: 0000 [#2] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x0100000000000580-0x0100000000000587] CPU: 1 UID: 0 PID: 4109 Comm: syz-executor.2 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [D]=DIE, [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:perf_tp_event+0x26b/0xe70 Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f RSP: 0018:ffff88806cf08a80 EFLAGS: 00010012 RAX: 00200000000000b0 RBX: ffff88801a1d1901 RCX: ffffffff8189962c RDX: ffff88801710b700 RSI: ffffffff818996ad RDI: 0100000000000580 RBP: ffff88806cf08cf0 R08: ffff88806cf31490 R09: ffffe8ffffd16000 R10: 0000000000000000 R11: ffff88806cf37018 R12: dffffc0000000000 R13: 0100000000000000 R14: ffff88806cf31490 R15: dffffc0000000000 FS: 00007f10e5471700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f10e800f018 CR3: 000000000d523000 CR4: 0000000000350ef0 Call Trace: perf_trace_run_bpf_submit+0xef/0x180 perf_trace_lock+0x337/0x5d0 lock_release+0x1ab/0x290 _raw_spin_unlock+0x16/0x40 sched_ttwu_pending+0x2e0/0x4a0 __flush_smp_call_function_queue+0x434/0x740 __sysvec_call_function_single+0x6d/0x370 sysvec_call_function_single+0xa1/0xc0 asm_sysvec_call_function_single+0x1a/0x20 RIP: 0010:oops_exit+0x0/0x50 Code: f1 39 00 be ff ff ff ff 48 c7 c7 50 ac 43 86 e8 c6 0f f9 ff 5b e9 20 f1 39 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 53 e8 06 f1 39 00 8b 1d c0 ed 4e 06 31 ff 89 de e8 27 RSP: 0018:ffff88801593f690 EFLAGS: 00000202 RAX: 000000000002c09b RBX: 0000000000000216 RCX: ffffc900042ab000 RDX: 0000000000040000 RSI: ffffffff812a3dca RDI: 0000000000000007 RBP: 000000000000000b R08: 0000000000000001 R09: fffffbfff0f11c90 R10: 0000000000000000 R11: 0000000000000001 R12: ffff88801593f758 R13: 0000000000000000 R14: e01ffc00000000b0 R15: 0000000000000000 oops_end+0x65/0xe0 exc_general_protection+0x1a2/0x330 asm_exc_general_protection+0x26/0x30 RIP: 0010:perf_tp_event+0x26b/0xe70 Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f RSP: 0018:ffff88801593f800 EFLAGS: 00010212 RAX: 00200000000000b0 RBX: ffff88801a1d1901 RCX: ffffc900042ab000 RDX: 0000000000040000 RSI: ffffffff818996ad RDI: 0100000000000580 RBP: ffff88801593fa70 R08: ffff88806cf31340 R09: ffffe8ffffd16000 R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000 perf_trace_run_bpf_submit+0xef/0x180 perf_trace_lock+0x337/0x5d0 lock_release+0x1ab/0x290 futex_ref_get+0x119/0x300 futex_hash+0x70/0x390 futex_wake+0x143/0x540 do_futex+0x26d/0x370 __x64_sys_futex+0x1c9/0x4d0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f10e7efbb19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f10e5471218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: ffffffffffffffda RBX: 00007f10e800ef68 RCX: 00007f10e7efbb19 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f10e800ef6c RBP: 00007f10e800ef60 R08: 000000000000000e R09: 0000000000000000 R10: 0000000000000003 R11: 0000000000000246 R12: 00007f10e800ef6c R13: 00007ffd87e44bdf R14: 00007f10e5471300 R15: 0000000000022000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:perf_tp_event+0x26b/0xe70 Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f RSP: 0018:ffff88801593f800 EFLAGS: 00010212 RAX: 00200000000000b0 RBX: ffff88801a1d1901 RCX: ffffc900042ab000 RDX: 0000000000040000 RSI: ffffffff818996ad RDI: 0100000000000580 RBP: ffff88801593fa70 R08: ffff88806cf31340 R09: ffffe8ffffd16000 R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000 FS: 00007f10e5471700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f10e800f018 CR3: 000000000d523000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess): 0: 3c 20 cmp $0x20,%al 2: 00 0f add %cl,(%rdi) 4: 85 3d 0b 00 00 4c test %edi,0x4c00000b(%rip) # 0x4c000015 a: 8b ab 00 03 00 00 mov 0x300(%rbx),%ebp 10: 4d 85 ed test %r13,%r13 13: 4c 0f 44 eb cmove %rbx,%r13 17: e8 d3 50 ea ff callq 0xffea50ef 1c: 49 8d bd 80 05 00 00 lea 0x580(%r13),%rdi 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 0f 85 fd 0a 00 00 jne 0xb32 35: 4d 8b ad 80 05 00 00 mov 0x580(%r13),%r13 3c: 4d 85 ed test %r13,%r13 3f: 0f .byte 0xf