Oops: general protection fault, probably for non-canonical address 0xdffffc0040000001: 0000 [#1] SMP KASAN NOPTI KASAN: probably user-memory-access in range [0x0000000200000008-0x000000020000000f] CPU: 0 UID: 0 PID: 3961 Comm: syz-executor.5 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:perf_trace_add+0x21b/0x340 Code: 00 0f 85 3a 01 00 00 4c 89 75 00 4d 85 ed 74 2a e8 da b2 f5 ff 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 df 00 00 00 4d 89 75 08 eb 03 45 31 e4 e8 ad b2 RSP: 0018:ffff888017be7748 EFLAGS: 00010012 RAX: dffffc0000000000 RBX: ffff888009649f40 RCX: ffffc900072c3000 RDX: 0000000040000001 RSI: ffffffff817e43d6 RDI: 0000000200000008 RBP: ffffe8ffffc166d0 R08: ffffffff85ca4140 R09: ffffed1002f7cf3f R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 R13: 0000000200000000 R14: ffff888009649fa0 R15: ffff888009649fd8 FS: 00007f6a7a2d7700(0000) GS:ffff8880e55d8000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f05c8f12000 CR3: 000000001ead1000 CR4: 0000000000350ef0 Call Trace: event_sched_in+0x446/0xb60 merge_sched_in+0xb4d/0x1810 visit_groups_merge.constprop.0.isra.0+0x8d1/0x1150 ctx_sched_in+0x579/0x9b0 perf_event_sched_in+0x5d/0x90 ctx_resched+0x398/0x840 __perf_install_in_context+0x436/0xb90 remote_function+0x129/0x1b0 generic_exec_single+0x1ca/0x2c0 smp_call_function_single+0x327/0x420 task_function_call+0xe4/0x170 perf_install_in_context+0x2ca/0x570 __do_sys_perf_event_open+0x1992/0x2c20 kmemleak: Found object by alias at 0x607f1a63e6d4 CPU: 1 UID: 0 PID: 3959 Comm: syz-executor.7 Tainted: G W 6.17.0-rc4-next-20250901 #1 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 Call Trace: dump_stack_lvl+0xca/0x120 __lookup_object+0x94/0xb0 delete_object_full+0x27/0x70 free_percpu+0x30/0x1160 futex_hash_free+0x38/0xc0 mmput+0x2d3/0x390 do_exit+0x79d/0x2970 do_group_exit+0xd3/0x2a0 __x64_sys_exit_group+0x3e/0x50 x64_sys_call+0x18c5/0x18d0 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fd702568b19 Code: Unable to access opcode bytes at 0x7fd702568aef. RSP: 002b:00007ffc4a8b4fd8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fd702568b19 RDX: 00007fd70251b72b RSI: ffffffffffffffbc RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000001 R14: 0000000000000001 R15: 00007ffc4a8b50c0 kmemleak: Object (percpu) 0x607f1a63e6d0 (size 8): kmemleak: comm "syz-executor.5", pid 3961, jiffies 4294786236 kmemleak: min_count = 1 kmemleak: count = 0 kmemleak: flags = 0x21 kmemleak: checksum = 0 kmemleak: backtrace: pcpu_alloc_noprof+0x87a/0x1170 perf_trace_event_init+0x366/0xa10 perf_trace_init+0x1a4/0x2f0 perf_tp_event_init+0xa6/0x120 perf_try_init_event+0x140/0x9f0 perf_event_alloc.part.0+0x118e/0x45f0 __do_sys_perf_event_open+0x719/0x2c20 do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f do_syscall_64+0xbf/0x360 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f6a7cd61b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f6a7a2d7188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007f6a7ce74f60 RCX: 00007f6a7cd61b19 RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000340 RBP: 00007f6a7cdbbf6d R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff8befefef R14: 00007f6a7a2d7300 R15: 0000000000022000 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:perf_trace_add+0x21b/0x340 Code: 00 0f 85 3a 01 00 00 4c 89 75 00 4d 85 ed 74 2a e8 da b2 f5 ff 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 df 00 00 00 4d 89 75 08 eb 03 45 31 e4 e8 ad b2 RSP: 0018:ffff888017be7748 EFLAGS: 00010012 RAX: dffffc0000000000 RBX: ffff888009649f40 RCX: ffffc900072c3000 RDX: 0000000040000001 RSI: ffffffff817e43d6 RDI: 0000000200000008 RBP: ffffe8ffffc166d0 R08: ffffffff85ca4140 R09: ffffed1002f7cf3f R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000 R13: 0000000200000000 R14: ffff888009649fa0 R15: ffff888009649fd8 FS: 00007f6a7a2d7700(0000) GS:ffff8880e55d8000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f05c8f12000 CR3: 000000001ead1000 CR4: 0000000000350ef0 note: syz-executor.5[3961] exited with irqs disabled note: syz-executor.5[3961] exited with preempt_count 3 ---------------- Code disassembly (best guess): 0: 00 0f add %cl,(%rdi) 2: 85 3a test %edi,(%rdx) 4: 01 00 add %eax,(%rax) 6: 00 4c 89 75 add %cl,0x75(%rcx,%rcx,4) a: 00 4d 85 add %cl,-0x7b(%rbp) d: ed in (%dx),%eax e: 74 2a je 0x3a 10: e8 da b2 f5 ff callq 0xfff5b2ef 15: 49 8d 7d 08 lea 0x8(%r13),%rdi 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 df 00 00 00 jne 0x113 34: 4d 89 75 08 mov %r14,0x8(%r13) 38: eb 03 jmp 0x3d 3a: 45 31 e4 xor %r12d,%r12d 3d: e8 .byte 0xe8 3e: ad lods %ds:(%rsi),%eax 3f: b2 .byte 0xb2