general protection fault, probably for non-canonical address 0xdffffc33c060204b: 0000 [#1] PREEMPT SMP KASAN KASAN: probably user-memory-access in range [0x0000019e03010258-0x0000019e0301025f] CPU: 0 PID: 414 Comm: kworker/u4:7 Not tainted 5.9.0-rc2-next-20200828-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound call_usermodehelper_exec_work RIP: 0010:perf_tp_event_match kernel/events/core.c:9353 [inline] RIP: 0010:perf_tp_event+0x1d5/0xb50 kernel/events/core.c:9404 Code: 89 85 68 fd ff ff eb 0f e8 a8 f5 e4 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 99 f5 e4 ff 48 8d bb d8 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 2d 08 00 00 44 8b bb d8 01 RSP: 0018:ffffc90001b975c0 EFLAGS: 00010006 RAX: 00000033c060204b RBX: 0000019e03010080 RCX: ffffffff8177e1ec RDX: ffff8880a83e61c0 RSI: ffffffff818f86f7 RDI: 0000019e03010258 RBP: ffffc90001b978b0 R08: 0000000000000000 R09: ffff8880a83e61c7 R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff8880ae631aa0 R14: 0000000000000001 R15: 1ffff11015cc6365 FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f57b0f53db8 CR3: 00000000a82c4000 CR4: 00000000001526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: perf_trace_run_bpf_submit+0x11c/0x200 kernel/events/core.c:9379 perf_trace_sched_wakeup_template+0x35a/0x4c0 include/trace/events/sched.h:57 trace_sched_wakeup_new include/trace/events/sched.h:103 [inline] wake_up_new_task+0x81e/0xd40 kernel/sched/core.c:3358 _do_fork+0x1f7/0xb10 kernel/fork.c:2472 kernel_thread+0xb5/0xf0 kernel/fork.c:2500 call_usermodehelper_exec_work kernel/umh.c:163 [inline] call_usermodehelper_exec_work+0xcc/0x180 kernel/umh.c:149 process_one_work+0x94c/0x1670 kernel/workqueue.c:2269 worker_thread+0x64c/0x1120 kernel/workqueue.c:2415 kthread+0x3b5/0x4a0 kernel/kthread.c:292 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 Modules linked in: ---[ end trace 71e80f1f22130a29 ]--- RIP: 0010:perf_tp_event_match kernel/events/core.c:9353 [inline] RIP: 0010:perf_tp_event+0x1d5/0xb50 kernel/events/core.c:9404 Code: 89 85 68 fd ff ff eb 0f e8 a8 f5 e4 ff 48 83 eb 60 0f 84 4a 01 00 00 e8 99 f5 e4 ff 48 8d bb d8 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e 2d 08 00 00 44 8b bb d8 01 RSP: 0018:ffffc90001b975c0 EFLAGS: 00010006 RAX: 00000033c060204b RBX: 0000019e03010080 RCX: ffffffff8177e1ec RDX: ffff8880a83e61c0 RSI: ffffffff818f86f7 RDI: 0000019e03010258 RBP: ffffc90001b978b0 R08: 0000000000000000 R09: ffff8880a83e61c7 R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff8880ae631aa0 R14: 0000000000000001 R15: 1ffff11015cc6365 FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f57b0f53db8 CR3: 00000000a82c4000 CR4: 00000000001526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400