general protection fault, probably for non-canonical address 0xe000000f0060204b: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x0000207803010258-0x000020780301025f] CPU: 1 PID: 8312 Comm: kworker/u4:6 Not tainted 5.9.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound call_usermodehelper_exec_work RIP: 0010:perf_tp_event_match kernel/events/core.c:9354 [inline] RIP: 0010:perf_tp_event+0x1d5/0xb60 kernel/events/core.c:9405 Code: 89 85 68 fd ff ff eb 0f e8 78 c6 e3 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 69 c6 e3 ff 48 8d bb d8 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 36 08 00 00 44 8b bb d8 01 RSP: 0018:ffffc90001b67580 EFLAGS: 00010006 RAX: 0000040f0060204b RBX: 0000207803010080 RCX: ffffffff8178a00c RDX: ffff88805b2b04c0 RSI: ffffffff81916f77 RDI: 0000207803010258 RBP: ffffc90001b67870 R08: 0000000000000000 R09: ffff88805b2b04c7 R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff8880ae531b60 R14: 0000000000000001 R15: 1ffff11015ca637d FS: 0000000000000000(0000) GS:ffff8880ae500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000074a918 CR3: 00000000a1852000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: perf_trace_run_bpf_submit+0x11c/0x210 kernel/events/core.c:9380 perf_trace_sched_wakeup_template+0x364/0x4d0 include/trace/events/sched.h:57 __traceiter_sched_wakeup_new+0x53/0x90 include/trace/events/sched.h:103 trace_sched_wakeup_new include/trace/events/sched.h:103 [inline] wake_up_new_task+0x7f6/0xd20 kernel/sched/core.c:3354 kernel_clone+0x1f0/0xab0 kernel/fork.c:2480 kernel_thread+0xb5/0xf0 kernel/fork.c:2508 call_usermodehelper_exec_work kernel/umh.c:172 [inline] call_usermodehelper_exec_work+0xcc/0x180 kernel/umh.c:158 process_one_work+0x933/0x15a0 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Modules linked in: ---[ end trace ba1dfe3bf1621018 ]--- RIP: 0010:perf_tp_event_match kernel/events/core.c:9354 [inline] RIP: 0010:perf_tp_event+0x1d5/0xb60 kernel/events/core.c:9405 Code: 89 85 68 fd ff ff eb 0f e8 78 c6 e3 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 69 c6 e3 ff 48 8d bb d8 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 36 08 00 00 44 8b bb d8 01 RSP: 0018:ffffc90001b67580 EFLAGS: 00010006 RAX: 0000040f0060204b RBX: 0000207803010080 RCX: ffffffff8178a00c RDX: ffff88805b2b04c0 RSI: ffffffff81916f77 RDI: 0000207803010258 RBP: ffffc90001b67870 R08: 0000000000000000 R09: ffff88805b2b04c7 R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff8880ae531b60 R14: 0000000000000001 R15: 1ffff11015ca637d FS: 0000000000000000(0000) GS:ffff8880ae500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000074a918 CR3: 00000000a1852000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600