kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 9954 Comm: syz-executor.5 Not tainted 5.2.0-rc2+ #22 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:perf_tp_event_match kernel/events/core.c:8532 [inline] RIP: 0010:perf_tp_event+0x1e9/0x850 kernel/events/core.c:8583 Code: 85 db 0f 84 dd 00 00 00 e8 94 a9 e7 ff 48 83 eb 60 0f 84 ce 00 00 00 e8 85 a9 e7 ff 48 8d bb d0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e ba 05 00 00 44 8b b3 d0 01 RSP: 0018:ffff88806700f4c0 EFLAGS: 00010003 RAX: 000004dc40602049 RBX: 000026e20301007f RCX: ffffffff8188fbd1 RDX: 0000000000000000 RSI: ffffffff8188fc3b RDI: 000026e20301024f RBP: ffff88806700f7b0 R08: ffff88806691e0c0 R09: ffff8880ae900000 R10: ffff88806700f7d8 R11: 0000000000000001 R12: dffffc0000000000 R13: ffff8880ae900000 R14: 00000000000000df R15: 0000000000000044 FS: 00005555565e9940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000758040 CR3: 0000000065eaa000 CR4: 00000000001406e0 Call Trace: perf_trace_run_bpf_submit+0x131/0x190 kernel/events/core.c:8558 perf_trace_sched_switch+0x625/0x960 include/trace/events/sched.h:138 trace_sched_switch include/trace/events/sched.h:138 [inline] __schedule+0xa7b/0x1560 kernel/sched/core.c:3442 preempt_schedule_common+0x4f/0xe0 kernel/sched/core.c:3590 preempt_schedule+0x4b/0x60 kernel/sched/core.c:3616 ___preempt_schedule+0x16/0x18 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:161 [inline] _raw_spin_unlock_irqrestore+0xbd/0xe0 kernel/locking/spinlock.c:191 spin_unlock_irqrestore include/linux/spinlock.h:393 [inline] __wake_up_common_lock+0xfe/0x190 kernel/sched/wait.c:123 __wake_up_sync_key+0x19/0x20 kernel/sched/wait.c:200 pipe_read+0x737/0x930 fs/pipe.c:364 call_read_iter include/linux/fs.h:1866 [inline] new_sync_read+0x4d7/0x800 fs/read_write.c:414 __vfs_read+0xe1/0x110 fs/read_write.c:427 vfs_read+0x194/0x3e0 fs/read_write.c:461 ksys_read+0x14f/0x290 fs/read_write.c:587 __do_sys_read fs/read_write.c:597 [inline] __se_sys_read fs/read_write.c:595 [inline] __x64_sys_read+0x73/0xb0 fs/read_write.c:595 do_syscall_64+0xfd/0x680 arch/x86/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x412f30 Code: 01 f0 ff ff 0f 83 90 1b 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d 5d 33 66 00 00 75 14 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff RSP: 002b:00007ffd4f0bc4f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000412f30 RDX: 0000000000000038 RSI: 0000000000758040 RDI: 00000000000000f9 RBP: 00000000000012fd R08: 0000000000006000 R09: 0000000000004000 R10: 00007ffd4f0bbe90 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd4f0bc530 R14: 0000000000142b2c R15: 00007ffd4f0bc540 Modules linked in: ======================================================