general protection fault, probably for non-canonical address 0xe00000d540602048: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x000026aa03010240-0x000026aa03010247] CPU: 1 PID: 9898 Comm: kworker/u4:5 Not tainted 5.11.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound call_usermodehelper_exec_work RIP: 0010:perf_tp_event_match kernel/events/core.c:9481 [inline] RIP: 0010:perf_tp_event+0x1d5/0xb60 kernel/events/core.c:9532 Code: 89 85 e8 fd ff ff eb 0f e8 b8 34 e3 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 a9 34 e3 ff 48 8d bb d8 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 36 08 00 00 44 8b bb d8 01 RSP: 0018:ffffc9000169f600 EFLAGS: 00010007 RAX: 000004d540602048 RBX: 000026aa0301006e RCX: 0000000000000000 RDX: ffff888021870000 RSI: ffffffff818fa637 RDI: 000026aa03010246 RBP: ffffc9000169f870 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff81764c9c R11: 0000000000000000 R12: dffffc0000000000 R13: ffff8880b9f30a60 R14: 0000000000000001 R15: 1ffff110173e615d FS: 0000000000000000(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000074e198 CR3: 000000001386d000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: perf_trace_run_bpf_submit+0x11c/0x210 kernel/events/core.c:9507 perf_trace_sched_wakeup_template+0x364/0x4d0 include/trace/events/sched.h:141 __traceiter_sched_wakeup_new+0x53/0x90 include/trace/events/sched.h:187 trace_sched_wakeup_new include/trace/events/sched.h:187 [inline] wake_up_new_task+0x88d/0xdd0 kernel/sched/core.c:3835 kernel_clone+0x1f0/0xab0 kernel/fork.c:2488 kernel_thread+0xb5/0xf0 kernel/fork.c:2516 call_usermodehelper_exec_work kernel/umh.c:172 [inline] call_usermodehelper_exec_work+0xcc/0x180 kernel/umh.c:158 process_one_work+0x98d/0x15f0 kernel/workqueue.c:2275 worker_thread+0x64c/0x1120 kernel/workqueue.c:2421 kthread+0x3b1/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:296 Modules linked in: ---[ end trace 95b2381fd328acb9 ]--- RIP: 0010:perf_tp_event_match kernel/events/core.c:9481 [inline] RIP: 0010:perf_tp_event+0x1d5/0xb60 kernel/events/core.c:9532 Code: 89 85 e8 fd ff ff eb 0f e8 b8 34 e3 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 a9 34 e3 ff 48 8d bb d8 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 36 08 00 00 44 8b bb d8 01 RSP: 0018:ffffc9000169f600 EFLAGS: 00010007 RAX: 000004d540602048 RBX: 000026aa0301006e RCX: 0000000000000000 RDX: ffff888021870000 RSI: ffffffff818fa637 RDI: 000026aa03010246 RBP: ffffc9000169f870 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff81764c9c R11: 0000000000000000 R12: dffffc0000000000 R13: ffff8880b9f30a60 R14: 0000000000000001 R15: 1ffff110173e615d FS: 0000000000000000(0000) GS:ffff8880b9f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000074e198 CR3: 000000001386d000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400