Oops: general protection fault, probably for non-canonical address 0xe01ffc00000000b0: 0000 [#1] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x0100000000000580-0x0100000000000587] CPU: 1 UID: 0 PID: 3981 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:perf_tp_event+0x26b/0xe70 Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f RSP: 0018:ffff8880164a7800 EFLAGS: 00010212 RAX: 00200000000000b0 RBX: ffff888013a79f41 RCX: ffffc900084cc000 RDX: 0000000000040000 RSI: ffffffff818996ad RDI: 0100000000000580 RBP: ffff8880164a7a70 R08: ffff88806cf31340 R09: ffffe8ffffd16558 R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000 FS: 00007f1ca711a700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f1ca9cb8018 CR3: 00000000465fc000 CR4: 0000000000350ef0 Call Trace: perf_trace_run_bpf_submit+0xef/0x180 perf_trace_lock+0x337/0x5d0 lock_release+0x1ab/0x290 futex_ref_get+0x119/0x300 futex_hash+0x70/0x390 futex_wake+0x143/0x540 do_futex+0x26d/0x370 __x64_sys_futex+0x1c9/0x4d0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1ca9ba4b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ca711a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: ffffffffffffffda RBX: 00007f1ca9cb7f68 RCX: 00007f1ca9ba4b19 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f1ca9cb7f6c RBP: 00007f1ca9cb7f60 R08: 000000000000000e R09: 0000000000000000 R10: 0000000000000003 R11: 0000000000000246 R12: 00007f1ca9cb7f6c R13: 00007ffe74f529bf R14: 00007f1ca711a300 R15: 0000000000022000 Modules linked in: Oops: general protection fault, probably for non-canonical address 0xdffffc0020000032: 0000 [#2] SMP KASAN NOPTI KASAN: probably user-memory-access in range [0x0000000100000190-0x0000000100000197] CPU: 0 UID: 0 PID: 3979 Comm: syz-executor.5 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [D]=DIE, [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:perf_tp_event+0x175/0xe70 Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 RSP: 0018:ffff88801e89f800 EFLAGS: 00010212 RAX: 0000000020000032 RBX: 00000000ffffffa0 RCX: 0000000000000002 RDX: ffff88800f4ed280 RSI: ffffffff818995b7 RDI: 0000000100000190 RBP: ffff88801e89fa70 R08: ffff88806ce31340 R09: ffffe8ffffc16558 R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 R13: 000000000000002c R14: ffff88806ce31340 R15: dffffc0000000000 FS: 0000555592aa8400(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555592aa9c18 CR3: 0000000009fce000 CR4: 0000000000350ef0 Call Trace: perf_trace_run_bpf_submit+0xef/0x180 perf_trace_lock+0x337/0x5d0 lock_release+0x1ab/0x290 futex_ref_get+0x119/0x300 futex_hash+0x70/0x390 futex_wake+0x143/0x540 do_futex+0x26d/0x370 __x64_sys_futex+0x1c9/0x4d0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f16d195cb19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffdacdb31e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f16d195cb19 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f16d1a6ff68 RBP: 00007f16d1a6ff60 R08: 00007f16ceed2700 R09: 0000000000000000 R10: 00007f16ceed2700 R11: 0000000000000246 R12: 00007f16d1a74060 R13: 00007ffdacdb32f0 R14: 00007f16d1a6ff60 R15: 0000000000022c22 Modules linked in: Oops: general protection fault, probably for non-canonical address 0xe01ffc00000000b0: 0000 [#3] SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x0100000000000580-0x0100000000000587] CPU: 1 UID: 0 PID: 3981 Comm: syz-executor.7 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) Tainted: [D]=DIE, [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:perf_tp_event+0x26b/0xe70 Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f RSP: 0018:ffff88806cf08a80 EFLAGS: 00010012 RAX: 00200000000000b0 RBX: ffff888013a79f41 RCX: ffffffff8189962c RDX: ffff888046ee5280 RSI: ffffffff818996ad RDI: 0100000000000580 RBP: ffff88806cf08cf0 R08: ffff88806cf31490 R09: ffffe8ffffd16558 R10: 0000000000000000 R11: 746e756f63716573 R12: dffffc0000000000 R13: 0100000000000000 R14: ffff88806cf31490 R15: dffffc0000000000 FS: 00007f1ca711a700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f1ca9cb8018 CR3: 00000000465fc000 CR4: 0000000000350ef0 Call Trace: perf_trace_run_bpf_submit+0xef/0x180 perf_trace_lock+0x337/0x5d0 lock_release+0x1ab/0x290 ktime_get_update_offsets_now+0xab/0x3c0 hrtimer_interrupt+0x114/0x830 __sysvec_apic_timer_interrupt+0xbb/0x330 sysvec_apic_timer_interrupt+0x6b/0x80 asm_sysvec_apic_timer_interrupt+0x1a/0x20 RIP: 0010:oops_exit+0x0/0x50 Code: f1 39 00 be ff ff ff ff 48 c7 c7 50 ac 43 86 e8 c6 0f f9 ff 5b e9 20 f1 39 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <66> 0f 1f 00 53 e8 06 f1 39 00 8b 1d c0 ed 4e 06 31 ff 89 de e8 27 RSP: 0018:ffff8880164a7690 EFLAGS: 00000202 RAX: 000000000002d1a5 RBX: 0000000000000216 RCX: ffffc900084cc000 RDX: 0000000000040000 RSI: ffffffff812a3dca RDI: 0000000000000007 RBP: 000000000000000b R08: 0000000000000001 R09: fffffbfff0f11c90 R10: 0000000000000000 R11: 0000000000000001 R12: ffff8880164a7758 R13: 0000000000000000 R14: e01ffc00000000b0 R15: 0000000000000000 oops_end+0x65/0xe0 exc_general_protection+0x1a2/0x330 asm_exc_general_protection+0x26/0x30 RIP: 0010:perf_tp_event+0x26b/0xe70 Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f RSP: 0018:ffff8880164a7800 EFLAGS: 00010212 RAX: 00200000000000b0 RBX: ffff888013a79f41 RCX: ffffc900084cc000 RDX: 0000000000040000 RSI: ffffffff818996ad RDI: 0100000000000580 RBP: ffff8880164a7a70 R08: ffff88806cf31340 R09: ffffe8ffffd16558 R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000 perf_trace_run_bpf_submit+0xef/0x180 perf_trace_lock+0x337/0x5d0 lock_release+0x1ab/0x290 futex_ref_get+0x119/0x300 futex_hash+0x70/0x390 futex_wake+0x143/0x540 do_futex+0x26d/0x370 __x64_sys_futex+0x1c9/0x4d0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1ca9ba4b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f1ca711a218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: ffffffffffffffda RBX: 00007f1ca9cb7f68 RCX: 00007f1ca9ba4b19 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f1ca9cb7f6c RBP: 00007f1ca9cb7f60 R08: 000000000000000e R09: 0000000000000000 R10: 0000000000000003 R11: 0000000000000246 R12: 00007f1ca9cb7f6c R13: 00007ffe74f529bf R14: 00007f1ca711a300 R15: 0000000000022000 Modules linked in: ---[ end trace 0000000000000000 ]--- Oops: general protection fault, probably for non-canonical address 0xdffffc0020000032: 0000 [#4] SMP KASAN NOPTI RIP: 0010:perf_tp_event+0x26b/0xe70 KASAN: probably user-memory-access in range [0x0000000100000190-0x0000000100000197] Code: 3c 20 00 0f 85 3d 0b 00 00 4c 8b ab 00 03 00 00 4d 85 ed 4c 0f 44 eb e8 d3 50 ea ff 49 8d bd 80 05 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 fd 0a 00 00 4d 8b ad 80 05 00 00 4d 85 ed 0f CPU: 0 UID: 0 PID: 3979 Comm: syz-executor.5 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) RSP: 0018:ffff8880164a7800 EFLAGS: 00010212 Tainted: [D]=DIE, [W]=WARN RAX: 00200000000000b0 RBX: ffff888013a79f41 RCX: ffffc900084cc000 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RDX: 0000000000040000 RSI: ffffffff818996ad RDI: 0100000000000580 RIP: 0010:perf_tp_event+0x175/0xe70 RBP: ffff8880164a7a70 R08: ffff88806cf31340 R09: ffffe8ffffd16558 Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 RSP: 0018:ffff88806ce08a80 EFLAGS: 00010012 R13: 0100000000000000 R14: ffff88806cf31340 R15: dffffc0000000000 RAX: 0000000020000032 RBX: 00000000ffffffa0 RCX: 0000000000000002 FS: 00007f1ca711a700(0000) GS:ffff8880e56dd000(0000) knlGS:0000000000000000 RDX: ffff88800f4ed280 RSI: ffffffff818995b7 RDI: 0000000100000190 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 RBP: ffff88806ce08cf0 R08: ffff88806ce31490 R09: ffffe8ffffc16558 CR2: 00007f1ca9cb8018 CR3: 00000000465fc000 CR4: 0000000000350ef0 R10: 0000000000000000 R11: 746e756f63716573 R12: dffffc0000000000 ---------------- Code disassembly (best guess): 0: 3c 20 cmp $0x20,%al 2: 00 0f add %cl,(%rdi) 4: 85 3d 0b 00 00 4c test %edi,0x4c00000b(%rip) # 0x4c000015 a: 8b ab 00 03 00 00 mov 0x300(%rbx),%ebp 10: 4d 85 ed test %r13,%r13 13: 4c 0f 44 eb cmove %rbx,%r13 17: e8 d3 50 ea ff callq 0xffea50ef 1c: 49 8d bd 80 05 00 00 lea 0x580(%r13),%rdi 23: 48 89 f8 mov %rdi,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 0f 85 fd 0a 00 00 jne 0xb32 35: 4d 8b ad 80 05 00 00 mov 0x580(%r13),%r13 3c: 4d 85 ed test %r13,%r13 3f: 0f .byte 0xf