kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 3164 Comm: syz.6.727 Not tainted 5.4.289-syzkaller-00028-g3f2c17e79750 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024
RIP: 0010:inherit_group kernel/events/core.c:12110 [inline]
RIP: 0010:inherit_task_group+0x1bf/0x390 kernel/events/core.c:12154
Code: c5 8c 00 00 00 48 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 86 01 00 00 8b 5d 00 49 81 c7 8c 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 85 01 00 00 41 89 1f 45 31 ff e9 f4 00
RSP: 0018:ffff8881d5f3f9c8 EFLAGS: 00010207
RAX: 0000000000000011 RBX: 0000000000000000 RCX: 0000000000080000
RDX: ffffc90008d5b000 RSI: 0000000000004ae0 RDI: 0000000000004ae1
RBP: ffff8881eb46188c R08: dffffc0000000000 R09: ffffed103edcb12c
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff8881d5f3fac0 R14: ffff8881eb461810 R15: 000000000000008c
FS:  00007fc0748c76c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7fa866cd58 CR3: 00000001e6b15000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000020000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 perf_event_init_context kernel/events/core.c:12221 [inline]
 perf_event_init_task+0x331/0x770 kernel/events/core.c:12273
 copy_process+0xf2b/0x3230 kernel/fork.c:2026
 _do_fork+0x197/0x900 kernel/fork.c:2399
 __do_sys_clone kernel/fork.c:2557 [inline]
 __se_sys_clone kernel/fork.c:2538 [inline]
 __x64_sys_clone+0x26b/0x2c0 kernel/fork.c:2538
 do_syscall_64+0xca/0x1c0 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x5c/0xc1
RIP: 0033:0x7fc07625cda9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fc0748c6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007fc076475fa0 RCX: 00007fc07625cda9
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400
RBP: 00007fc0762de2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
R13: 0000000000000000 R14: 00007fc076475fa0 R15: 00007ffc52d972f8
Modules linked in:
---[ end trace a73418cf32c86f27 ]---
RIP: 0010:inherit_group kernel/events/core.c:12110 [inline]
RIP: 0010:inherit_task_group+0x1bf/0x390 kernel/events/core.c:12154
Code: c5 8c 00 00 00 48 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 86 01 00 00 8b 5d 00 49 81 c7 8c 00 00 00 4c 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 85 01 00 00 41 89 1f 45 31 ff e9 f4 00
RSP: 0018:ffff8881d5f3f9c8 EFLAGS: 00010207
RAX: 0000000000000011 RBX: 0000000000000000 RCX: 0000000000080000
RDX: ffffc90008d5b000 RSI: 0000000000004ae0 RDI: 0000000000004ae1
RBP: ffff8881eb46188c R08: dffffc0000000000 R09: ffffed103edcb12c
R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000
R13: ffff8881d5f3fac0 R14: ffff8881eb461810 R15: 000000000000008c
FS:  00007fc0748c76c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000001e6b15000 CR4: 00000000003406a0
DR0: 0000000000000000 DR1: 0000000020000300 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess), 1 bytes skipped:
   0:	8c 00                	mov    %es,(%rax)
   2:	00 00                	add    %al,(%rax)
   4:	48 89 e8             	mov    %rbp,%rax
   7:	48 c1 e8 03          	shr    $0x3,%rax
   b:	42 0f b6 04 20       	movzbl (%rax,%r12,1),%eax
  10:	84 c0                	test   %al,%al
  12:	0f 85 86 01 00 00    	jne    0x19e
  18:	8b 5d 00             	mov    0x0(%rbp),%ebx
  1b:	49 81 c7 8c 00 00 00 	add    $0x8c,%r15
  22:	4c 89 f8             	mov    %r15,%rax
  25:	48 c1 e8 03          	shr    $0x3,%rax
* 29:	42 0f b6 04 20       	movzbl (%rax,%r12,1),%eax <-- trapping instruction
  2e:	84 c0                	test   %al,%al
  30:	0f 85 85 01 00 00    	jne    0x1bb
  36:	41 89 1f             	mov    %ebx,(%r15)
  39:	45 31 ff             	xor    %r15d,%r15d
  3c:	e9                   	.byte 0xe9
  3d:	f4                   	hlt