kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 3535 Comm: syz-executor.2 Not tainted 5.1.0-rc6+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:perf_tp_event_match kernel/events/core.c:8522 [inline] RIP: 0010:perf_tp_event+0x1e9/0x850 kernel/events/core.c:8573 Code: 85 db 0f 84 dd 00 00 00 e8 c4 4f e8 ff 48 83 eb 60 0f 84 ce 00 00 00 e8 b5 4f e8 ff 48 8d bb d0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e ba 05 00 00 44 8b b3 d0 01 RSP: 0018:ffff8880ae907800 EFLAGS: 00010002 RAX: 000001b9e061204a RBX: 00000dcf03090082 RCX: ffffffff81883cd1 RDX: 0000000000010000 RSI: ffffffff81883d3b RDI: 00000dcf03090252 RBP: ffff8880ae907af0 R08: ffff888084822100 R09: ffff8880ae900000 R10: ffff8880ae907b38 R11: ffff8880ae90002b R12: dffffc0000000000 R13: ffff8880ae900000 R14: 00000000000000e2 R15: 000000000000002c FS: 00000000018b1940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000738000 CR3: 000000009514a000 CR4: 00000000001426e0 Call Trace: perf_trace_run_bpf_submit+0x131/0x190 kernel/events/core.c:8548 perf_trace_sched_wakeup_template+0x471/0x6b0 include/trace/events/sched.h:57 trace_sched_wakeup include/trace/events/sched.h:96 [inline] ttwu_do_wakeup+0x239/0x580 kernel/sched/core.c:1702 ttwu_do_activate+0x14b/0x1f0 kernel/sched/core.c:1746 ttwu_queue kernel/sched/core.c:1890 [inline] try_to_wake_up+0x824/0x1000 kernel/sched/core.c:2100 wake_up_process+0x10/0x20 kernel/sched/core.c:2172 hrtimer_wakeup+0x48/0x60 kernel/time/hrtimer.c:1637 __run_hrtimer kernel/time/hrtimer.c:1389 [inline] __hrtimer_run_queues+0x33e/0xde0 kernel/time/hrtimer.c:1451 hrtimer_interrupt+0x314/0x770 kernel/time/hrtimer.c:1509 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1035 [inline] smp_apic_timer_interrupt+0x120/0x570 arch/x86/kernel/apic/apic.c:1060 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:807 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:767 [inline] RIP: 0010:kfree+0x186/0x230 mm/slab.c:3823 Code: 59 7e 0f 85 b3 fe ff ff e8 f8 fc 57 ff e9 a9 fe ff ff e8 ed 8f cd ff 48 83 3d 95 2d ea 06 00 0f 84 9e 00 00 00 48 89 df 57 9d <0f> 1f 44 00 00 5b 41 5c 41 5d 41 5e 5d c3 4c 89 f2 4c 89 e6 4c 89 RSP: 0018:ffff888098697b38 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: 0000000000000007 RBX: 0000000000000286 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000286 RBP: ffff888098697b58 R08: ffff888084822100 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff888096e67300 R13: ffff88812c3f01c0 R14: ffffffff82ed081a R15: ffff8880907d61c0 security_task_free+0x9a/0xf0 security/security.c:1470 copy_process.part.0+0x35c8/0x7980 kernel/fork.c:2140 copy_process kernel/fork.c:1709 [inline] _do_fork+0x257/0xfd0 kernel/fork.c:2226 __do_sys_clone kernel/fork.c:2333 [inline] __se_sys_clone kernel/fork.c:2327 [inline] __x64_sys_clone+0xbf/0x150 kernel/fork.c:2327 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45b769 Code: ff 48 85 f6 0f 84 d7 8e fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c ae 8e fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 RSP: 002b:00007ffe40c68938 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007f97bad6c700 RCX: 000000000045b769 RDX: 00007f97bad6c9d0 RSI: 00007f97bad6bdb0 RDI: 00000000003d0f00 RBP: 00007ffe40c68b50 R08: 00007f97bad6c700 R09: 00007f97bad6c700 R10: 00007f97bad6c9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 00007ffe40c689ef R14: 0000000000020000 R15: 00000000018b2b70 Modules linked in: ======================================================