kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.1.0-rc4+ #34 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:perf_tp_event_match kernel/events/core.c:8489 [inline] RIP: 0010:perf_tp_event+0x1e9/0x850 kernel/events/core.c:8540 Code: 85 db 0f 84 dd 00 00 00 e8 34 54 e8 ff 48 83 eb 60 0f 84 ce 00 00 00 e8 25 54 e8 ff 48 8d bb d0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e ba 05 00 00 44 8b b3 d0 01 RSP: 0018:ffff8880ae907900 EFLAGS: 00010002 RAX: 0000000000a6a04a RBX: 0000000005350082 RCX: ffffffff81883a71 RDX: 0000000000000100 RSI: ffffffff81883adb RDI: 0000000005350252 RBP: ffff8880ae907bf0 R08: ffff8880aa28c340 R09: ffff8880ae900000 R10: ffff8880ae907c38 R11: ffff8880ae90002b R12: dffffc0000000000 R13: ffff8880ae900000 R14: 00000000000000e2 R15: 000000000000002c FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa422b13000 CR3: 0000000071ccd000 CR4: 00000000001406e0 Call Trace: perf_trace_run_bpf_submit+0x131/0x190 kernel/events/core.c:8515 perf_trace_sched_wakeup_template+0x471/0x6b0 include/trace/events/sched.h:57 trace_sched_wakeup include/trace/events/sched.h:96 [inline] ttwu_do_wakeup+0x239/0x580 kernel/sched/core.c:1702 ttwu_do_activate+0x14b/0x1f0 kernel/sched/core.c:1746 ttwu_queue kernel/sched/core.c:1890 [inline] try_to_wake_up+0x824/0x1000 kernel/sched/core.c:2100 wake_up_process+0x10/0x20 kernel/sched/core.c:2172 wakeup_softirqd+0x51/0x60 kernel/softirq.c:77 __do_softirq+0x5c2/0x95a kernel/softirq.c:315 invoke_softirq kernel/softirq.c:374 [inline] irq_exit+0x180/0x1d0 kernel/softirq.c:414 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x14a/0x570 arch/x86/kernel/apic/apic.c:1062 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 RIP: 0010:__raw_spin_unlock_irq include/linux/spinlock_api_smp.h:169 [inline] RIP: 0010:_raw_spin_unlock_irq+0x54/0x90 kernel/locking/spinlock.c:192 Code: c0 80 96 92 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 33 48 83 3d 85 be 81 01 00 74 20 fb 66 0f 1f 44 00 00 01 00 00 00 e8 b2 03 3d fa 65 8b 05 7b 15 f1 78 85 c0 74 06 41 RSP: 0018:ffff8880aa29fc70 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 RAX: 1ffffffff11252d0 RBX: ffff8880aa28c340 RCX: 0000000000000000 RDX: dffffc0000000000 RSI: 0000000000000006 RDI: ffff8880aa28cbbc RBP: ffff8880aa29fc78 R08: ffff8880aa28c340 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880ae92cf80 R13: ffff8880934c6180 R14: 0000000000000000 R15: 0000000000000001 finish_lock_switch kernel/sched/core.c:2627 [inline] finish_task_switch+0x146/0x780 kernel/sched/core.c:2727 context_switch kernel/sched/core.c:2880 [inline] __schedule+0x81f/0x1cc0 kernel/sched/core.c:3518 schedule_idle+0x58/0x80 kernel/sched/core.c:3589 do_idle+0x19b/0x570 kernel/sched/idle.c:286 cpu_startup_entry+0x1b/0x20 kernel/sched/idle.c:353 start_secondary+0x360/0x4d0 arch/x86/kernel/smpboot.c:267 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243 Modules linked in: ======================================================