Warning: Permanently added '10.128.1.168' (ED25519) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 52.176665][T10321] general protection fault, probably for non-canonical address 0xdffffc0000000011: 0000 [#1] PREEMPT SMP KASAN [ 52.188416][T10321] KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f] [ 52.196840][T10321] CPU: 0 PID: 10321 Comm: syz-executor324 Not tainted 5.15.137-syzkaller #0 [ 52.205531][T10321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 52.215775][T10321] RIP: 0010:inherit_task_group+0x276/0x710 [ 52.221623][T10321] Code: 81 c3 8c 00 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 3a 04 00 00 8b 1b 49 81 c6 8c 00 00 00 4c 89 f0 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 3a 04 00 00 41 89 1e e9 98 fe ff ff e8 [ 52.241238][T10321] RSP: 0018:ffffc9000621f8f0 EFLAGS: 00010207 [ 52.247321][T10321] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffff88807ca55940 [ 52.255306][T10321] RDX: 0000000000000000 RSI: ffffffff8a8b0be0 RDI: ffff888076b18090 [ 52.263289][T10321] RBP: ffff888076b18010 R08: dffffc0000000000 R09: fffffbfff1f79a3a executing program [ 52.271276][T10321] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 52.279268][T10321] R13: ffff88807b848000 R14: 000000000000008c R15: ffff888076b18010 [ 52.287252][T10321] FS: 00007f34a89d46c0(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 52.296196][T10321] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.302789][T10321] CR2: 00007ffe856f51d0 CR3: 0000000071005000 CR4: 00000000003506f0 [ 52.310774][T10321] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 52.318756][T10321] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 52.326749][T10321] Call Trace: [ 52.330037][T10321] [ 52.332985][T10321] ? __die_body+0x5e/0xa0 [ 52.337788][T10321] ? die_addr+0x95/0xc0 [ 52.341966][T10321] ? exc_general_protection+0x327/0x4f0 [ 52.347549][T10321] ? asm_exc_general_protection+0x22/0x30 [ 52.353289][T10321] ? inherit_task_group+0x276/0x710 [ 52.358510][T10321] ? __raw_spin_lock_init+0x41/0x100 [ 52.363816][T10321] perf_event_init_task+0x355/0x7a0 [ 52.369097][T10321] ? perf_event_attrs+0x20/0x20 [ 52.373974][T10321] ? memset+0x1f/0x40 [ 52.377975][T10321] ? sched_fork+0x389/0x8b0 [ 52.382493][T10321] copy_process+0x1570/0x3ef0 [ 52.387203][T10321] ? pidfd_show_fdinfo+0x2e0/0x2e0 [ 52.392339][T10321] ? __lock_acquire+0x1295/0x1ff0 [ 52.397399][T10321] kernel_clone+0x210/0x960 [ 52.401927][T10321] ? create_io_thread+0x1e0/0x1e0 [ 52.406979][T10321] ? read_lock_is_recursive+0x10/0x10 [ 52.412391][T10321] ? __context_tracking_exit+0x4c/0x80 [ 52.417873][T10321] __x64_sys_clone+0x23f/0x290 [ 52.422654][T10321] ? __do_sys_vfork+0x130/0x130 executing program [ 52.427528][T10321] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.433648][T10321] ? syscall_enter_from_user_mode+0x2e/0x230 [ 52.439652][T10321] ? lockdep_hardirqs_on+0x94/0x130 [ 52.444874][T10321] ? syscall_enter_from_user_mode+0x2e/0x230 [ 52.450879][T10321] do_syscall_64+0x3d/0xb0 [ 52.455414][T10321] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.461329][T10321] RIP: 0033:0x7f34a8a34559 executing program [ 52.465850][T10321] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 52.485490][T10321] RSP: 002b:00007f34a89d4228 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 52.493920][T10321] RAX: ffffffffffffffda RBX: 00007f34a8abe338 RCX: 00007f34a8a34559 [ 52.501902][T10321] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 52.510070][T10321] RBP: 00007f34a8abe330 R08: 0000000000000000 R09: 0000000000000000 [ 52.518153][T10321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f34a8a8b074 [ 52.526137][T10321] R13: 0000000000000011 R14: 00007ffe856f5070 R15: 00007ffe856f5158 [ 52.534134][T10321] [ 52.537631][T10321] Modules linked in: executing program executing program executing program executing program executing program executing program [ 52.632681][T10321] ---[ end trace 355d420cdadf50e7 ]--- [ 52.640568][T10321] RIP: 0010:inherit_task_group+0x276/0x710 [ 52.650992][T10321] Code: 81 c3 8c 00 00 00 48 89 d8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 3a 04 00 00 8b 1b 49 81 c6 8c 00 00 00 4c 89 f0 48 c1 e8 03 <42> 0f b6 04 20 84 c0 0f 85 3a 04 00 00 41 89 1e e9 98 fe ff ff e8 [ 52.702810][T10321] RSP: 0018:ffffc9000621f8f0 EFLAGS: 00010207 [ 52.730732][T10321] RAX: 0000000000000011 RBX: 0000000000000000 RCX: ffff88807ca55940 executing program executing program executing program [ 52.825839][T10321] RDX: 0000000000000000 RSI: ffffffff8a8b0be0 RDI: ffff888076b18090 executing program executing program [ 52.881509][T10321] RBP: ffff888076b18010 R08: dffffc0000000000 R09: fffffbfff1f79a3a executing program [ 52.940032][T10321] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 executing program executing program executing program [ 52.997109][T10321] R13: ffff88807b848000 R14: 000000000000008c R15: ffff888076b18010 [ 53.021882][T10321] FS: 00007f34a89d46c0(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 53.050867][T10321] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 executing program [ 53.097729][T10321] CR2: 00007f34a89d4d58 CR3: 0000000071005000 CR4: 00000000003506f0 executing program executing program [ 53.163150][T10321] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 executing program [ 53.210197][T10321] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 executing program [ 53.275586][T10321] Kernel panic - not syncing: Fatal exception [ 53.281858][T10321] Kernel Offset: disabled [ 53.286180][T10321] Rebooting in 86400 seconds..