================================================================== BUG: KASAN: use-after-free in primary_event_id kernel/events/core.c:1316 [inline] BUG: KASAN: use-after-free in perf_output_read_group kernel/events/core.c:5897 [inline] BUG: KASAN: use-after-free in perf_output_read+0x1046/0x1090 kernel/events/core.c:5932 Read of size 8 at addr ffff88809ab081e0 by task syz-executor269/10253 CPU: 1 PID: 10253 Comm: syz-executor269 Not tainted 4.14.300-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_address_description.cold+0x54/0x1d3 mm/kasan/report.c:252 kasan_report_error.cold+0x8a/0x191 mm/kasan/report.c:351 kasan_report mm/kasan/report.c:409 [inline] __asan_report_load8_noabort+0x68/0x70 mm/kasan/report.c:430 primary_event_id kernel/events/core.c:1316 [inline] perf_output_read_group kernel/events/core.c:5897 [inline] perf_output_read+0x1046/0x1090 kernel/events/core.c:5932 perf_output_sample+0xa28/0x16f0 kernel/events/core.c:5974 __perf_event_output kernel/events/core.c:6287 [inline] perf_event_output_forward+0xf8/0x1f0 kernel/events/core.c:6300 __perf_event_overflow+0x113/0x310 kernel/events/core.c:7549 perf_swevent_overflow kernel/events/core.c:7625 [inline] perf_swevent_event+0x299/0x460 kernel/events/core.c:7653 do_perf_sw_event kernel/events/core.c:7766 [inline] ___perf_sw_event+0x2a1/0x480 kernel/events/core.c:7797 __perf_sw_event+0x4f/0x100 kernel/events/core.c:7809 perf_sw_event include/linux/perf_event.h:1046 [inline] __do_page_fault+0x692/0xad0 arch/x86/mm/fault.c:1483 page_fault+0x25/0x50 arch/x86/entry/entry_64.S:1126 The buggy address belongs to the page: page:ffffea00026ac200 count:0 mapcount:-127 mapping: (null) index:0xffff88809ab08140 flags: 0xfff00000000000() raw: 00fff00000000000 0000000000000000 ffff88809ab08140 00000000ffffff80 raw: ffffea00026e4020 ffffea00026a1620 0000000000000002 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88809ab08080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88809ab08100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88809ab08180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88809ab08200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88809ab08280: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================