general protection fault, probably for non-canonical address 0xdffffc002000002f: 0000 [#1] PREEMPT SMP KASAN
KASAN: probably user-memory-access in range [0x0000000100000178-0x000000010000017f]
CPU: 0 PID: 9949 Comm: syz-executor.3 Not tainted 5.16.0-rc4-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:perf_tp_event_match kernel/events/core.c:9687 [inline]
RIP: 0010:perf_tp_event+0x1d5/0xbc0 kernel/events/core.c:9738
Code: 89 85 e8 fd ff ff eb 0f e8 38 2d e0 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 29 2d e0 ff 48 8d bb e0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 94 08 00 00 44 8b bb e0 01
RSP: 0018:ffffc900046ef580 EFLAGS: 00010003
RAX: 000000002000002f RBX: 00000000ffffff9f RCX: 0000000000000000
RDX: ffff8880785c9d00 RSI: ffffffff81977dc7 RDI: 000000010000017f
RBP: ffffc900046ef7f0 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff817bf47d R11: 0000000000000000 R12: dffffc0000000000
R13: ffff8880b9c34860 R14: 0000000000000001 R15: 1ffff1101738691d
FS:  00005555571b0400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000004 CR3: 0000000055b09000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 <TASK>
 perf_trace_run_bpf_submit+0x11c/0x210 kernel/events/core.c:9713
 perf_trace_sched_switch+0x4a4/0x690 include/trace/events/sched.h:220
 __traceiter_sched_switch+0x5f/0xa0 include/trace/events/sched.h:220
 trace_sched_switch include/trace/events/sched.h:220 [inline]
 __schedule+0x1b32/0x4940 kernel/sched/core.c:6250
 schedule+0xd2/0x260 kernel/sched/core.c:6326
 synchronize_rcu_expedited+0x471/0x620 kernel/rcu/tree_exp.h:852
 namespace_unlock+0x1af/0x410 fs/namespace.c:1448
 do_umount fs/namespace.c:1671 [inline]
 path_umount+0x797/0x1260 fs/namespace.c:1753
 ksys_umount fs/namespace.c:1776 [inline]
 __do_sys_umount fs/namespace.c:1781 [inline]
 __se_sys_umount fs/namespace.c:1779 [inline]
 __x64_sys_umount+0x159/0x180 fs/namespace.c:1779
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f1ff54ae307
Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc0b708c38 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f1ff54ae307
RDX: 00007ffc0b708d0a RSI: 000000000000000a RDI: 00007ffc0b708d00
RBP: 00007ffc0b708d00 R08: 00000000ffffffff R09: 00007ffc0b708ad0
R10: 00005555571b1873 R11: 0000000000000202 R12: 00007f1ff5506172
R13: 00007ffc0b709dc0 R14: 00005555571b1810 R15: 00007ffc0b709e00
 </TASK>
Modules linked in:
---[ end trace 4af4ef2afea959f8 ]---
RIP: 0010:perf_tp_event_match kernel/events/core.c:9687 [inline]
RIP: 0010:perf_tp_event+0x1d5/0xbc0 kernel/events/core.c:9738
Code: 89 85 e8 fd ff ff eb 0f e8 38 2d e0 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 29 2d e0 ff 48 8d bb e0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 94 08 00 00 44 8b bb e0 01
RSP: 0018:ffffc900046ef580 EFLAGS: 00010003
RAX: 000000002000002f RBX: 00000000ffffff9f RCX: 0000000000000000
RDX: ffff8880785c9d00 RSI: ffffffff81977dc7 RDI: 000000010000017f
RBP: ffffc900046ef7f0 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff817bf47d R11: 0000000000000000 R12: dffffc0000000000
R13: ffff8880b9c34860 R14: 0000000000000001 R15: 1ffff1101738691d
FS:  00005555571b0400(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000004 CR3: 0000000055b09000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess):
   0:	89 85 e8 fd ff ff    	mov    %eax,-0x218(%rbp)
   6:	eb 0f                	jmp    0x17
   8:	e8 38 2d e0 ff       	callq  0xffe02d45
   d:	48 83 eb 60          	sub    $0x60,%rbx
  11:	0f 84 4a 01 00 00    	je     0x161
  17:	e8 29 2d e0 ff       	callq  0xffe02d45
  1c:	48 8d bb e0 01 00 00 	lea    0x1e0(%rbx),%rdi
  23:	48 89 f8             	mov    %rdi,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
* 2a:	42 0f b6 04 20       	movzbl (%rax,%r12,1),%eax <-- trapping instruction
  2f:	84 c0                	test   %al,%al
  31:	74 08                	je     0x3b
  33:	3c 03                	cmp    $0x3,%al
  35:	0f 8e 94 08 00 00    	jle    0x8cf
  3b:	44                   	rex.R
  3c:	8b                   	.byte 0x8b
  3d:	bb                   	.byte 0xbb
  3e:	e0 01                	loopne 0x41