general protection fault, probably for non-canonical address 0xdffffc022084a04b: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x0000001104250258-0x000000110425025f] CPU: 1 PID: 17 Comm: kworker/1:0 Not tainted 5.9.0-rc6-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events bpf_prog_free_deferred RIP: 0010:perf_tp_event_match kernel/events/core.c:9325 [inline] RIP: 0010:perf_tp_event+0x1d5/0xb60 kernel/events/core.c:9376 Code: 89 85 68 fd ff ff eb 0f e8 38 7f e4 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 29 7f e4 ff 48 8d bb d8 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 36 08 00 00 44 8b bb d8 01 RSP: 0018:ffffc90000d8f5c0 EFLAGS: 00010006 RAX: 000000022084a04b RBX: 0000001104250082 RCX: ffffffff8179efac RDX: ffff8880a9666480 RSI: ffffffff81920817 RDI: 000000110425025a RBP: ffffc90000d8f8b0 R08: 0000000000000000 R09: ffff8880a9666487 R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 R13: ffff8880ae531b20 R14: 0000000000000001 R15: 1ffff11015ca6375 FS: 0000000000000000(0000) GS:ffff8880ae500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31823000 CR3: 000000004b7a2000 CR4: 00000000001506e0 DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: perf_trace_run_bpf_submit+0x11c/0x210 kernel/events/core.c:9351 perf_trace_sched_wakeup_template+0x364/0x4d0 include/trace/events/sched.h:57 trace_sched_wakeup include/trace/events/sched.h:96 [inline] ttwu_do_wakeup+0x254/0x570 kernel/sched/core.c:2467 ttwu_queue kernel/sched/core.c:2700 [inline] try_to_wake_up+0x565/0x1350 kernel/sched/core.c:2978 wake_up_process kernel/sched/core.c:3048 [inline] wake_up_q+0x96/0x100 kernel/sched/core.c:596 __mutex_unlock_slowpath+0x2b6/0x610 kernel/locking/mutex.c:1280 _vm_unmap_aliases mm/vmalloc.c:1744 [inline] vm_remove_mappings mm/vmalloc.c:2236 [inline] __vunmap+0x5cd/0xac0 mm/vmalloc.c:2263 __vfree mm/vmalloc.c:2320 [inline] vfree+0x88/0x140 mm/vmalloc.c:2350 bpf_jit_free+0x1c8/0x320 bpf_prog_free_deferred+0x4f9/0x690 kernel/bpf/core.c:2148 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 Modules linked in: ---[ end trace d5e02951518b390e ]--- RIP: 0010:perf_tp_event_match kernel/events/core.c:9325 [inline] RIP: 0010:perf_tp_event+0x1d5/0xb60 kernel/events/core.c:9376 Code: 89 85 68 fd ff ff eb 0f e8 38 7f e4 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 29 7f e4 ff 48 8d bb d8 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 36 08 00 00 44 8b bb d8 01 RSP: 0018:ffffc90000d8f5c0 EFLAGS: 00010006 RAX: 000000022084a04b RBX: 0000001104250082 RCX: ffffffff8179efac RDX: ffff8880a9666480 RSI: ffffffff81920817 RDI: 000000110425025a RBP: ffffc90000d8f8b0 R08: 0000000000000000 R09: ffff8880a9666487 R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 R13: ffff8880ae531b20 R14: 0000000000000001 R15: 1ffff11015ca6375 FS: 0000000000000000(0000) GS:ffff8880ae500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31823000 CR3: 000000004b7a2000 CR4: 00000000001506e0 DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600