general protection fault, probably for non-canonical address 0xdffffc0000000033: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000198-0x000000000000019f]
CPU: 0 PID: 5707 Comm: syz-executor.2 Not tainted 5.18.0-rc5-next-20220502 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
RIP: 0010:x86_pmu_enable_event+0x6a/0x2f0
Code: 00 e8 1a 47 43 00 48 c7 c7 20 63 60 84 e8 9e d9 14 03 48 8d bb 98 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 65 4c 8b 2d 52 2c 01 7f 84 c0 74 08 3c 03 0f 8e 1e 02
RSP: 0018:ffff88806ce09bf0 EFLAGS: 00010016
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000033 RSI: 0000000000010002 RDI: 0000000000000198
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001
R10: ffffffff8101029e R11: 0000000000000000 R12: 0000000000000001
R13: ffff88806ce21c20 R14: fffffbfff0b1dd4d R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055a190e1d0e0 CR3: 000000000d420000 CR4: 0000000000350ef0
DR0: 0100000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff4ff0 DR7: 0000000000000600
Call Trace:
amd_pmu_enable_all+0x12c/0x1a0
x86_pmu_enable+0x580/0xd90
perf_event_task_tick+0xa7c/0x1030
scheduler_tick+0x17e/0x350
update_process_times+0x18b/0x1f0
tick_sched_handle+0x9b/0x180
tick_sched_timer+0xee/0x120
__hrtimer_run_queues+0x1ca/0xbd0
hrtimer_interrupt+0x315/0x770
__sysvec_apic_timer_interrupt+0x144/0x4f0
sysvec_apic_timer_interrupt+0x89/0xc0
asm_sysvec_apic_timer_interrupt+0x12/0x20
RIP: 0010:lock_acquire+0x1db/0x530
Code: 02 b8 ff ff ff ff 65 0f c1 05 d9 7a d9 7e 83 f8 01 0f 85 c4 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24
RSP: 0018:ffff88804562f428 EFLAGS: 00000206
RAX: dffffc0000000000 RBX: 1ffff11008ac5e87 RCX: 0000000050e51c27
RDX: 1ffff11001163493 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff86a5e747
R10: fffffbfff0d4bce8 R11: 0000000000000001 R12: 0000000000000002
R13: 0000000000000000 R14: ffffffff85203b80 R15: 0000000000000000
__is_insn_slot_addr+0x3d/0x250
kernel_text_address+0x40/0xb0
__kernel_text_address+0x9/0x30
unwind_get_return_address+0x51/0x90
arch_stack_walk+0x99/0xf0
stack_trace_save+0x8c/0xc0
kasan_save_stack+0x1e/0x40
kasan_set_track+0x21/0x30
kasan_set_free_info+0x20/0x30
__kasan_slab_free+0x108/0x170
kfree+0xcf/0x410
__io_cqring_overflow_flush+0x24f/0x730
io_ring_ctx_wait_and_kill+0xb1/0x30f
io_uring_release+0x42/0x46
__fput+0x272/0x9d0
task_work_run+0xe2/0x1a0
do_exit+0xaf7/0x27e0
do_group_exit+0xd2/0x2f0
get_signal+0x2303/0x2350
arch_do_signal_or_restart+0x88/0x1a40
exit_to_user_mode_prepare+0x131/0x1a0
syscall_exit_to_user_mode+0x19/0x40
do_syscall_64+0x48/0x90
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fbb5b7a5b19
Code: Unable to access opcode bytes at RIP 0x7fbb5b7a5aef.
RSP: 002b:00007fbb58d1b218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
RAX: fffffffffffffe00 RBX: 00007fbb5b8b8f68 RCX: 00007fbb5b7a5b19
RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fbb5b8b8f68
RBP: 00007fbb5b8b8f60 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbb5b8b8f6c
R13: 00007ffdd2fdd3bf R14: 00007fbb58d1b300 R15: 0000000000022000
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:x86_pmu_enable_event+0x6a/0x2f0
Code: 00 e8 1a 47 43 00 48 c7 c7 20 63 60 84 e8 9e d9 14 03 48 8d bb 98 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 65 4c 8b 2d 52 2c 01 7f 84 c0 74 08 3c 03 0f 8e 1e 02
RSP: 0018:ffff88806ce09bf0 EFLAGS: 00010016
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000033 RSI: 0000000000010002 RDI: 0000000000000198
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001
R10: ffffffff8101029e R11: 0000000000000000 R12: 0000000000000001
R13: ffff88806ce21c20 R14: fffffbfff0b1dd4d R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055a190e1d0e0 CR3: 000000000d420000 CR4: 0000000000350ef0
DR0: 0100000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff4ff0 DR7: 0000000000000600
----------------
Code disassembly (best guess), 1 bytes skipped:
0: e8 1a 47 43 00 callq 0x43471f
5: 48 c7 c7 20 63 60 84 mov $0xffffffff84606320,%rdi
c: e8 9e d9 14 03 callq 0x314d9af
11: 48 8d bb 98 01 00 00 lea 0x198(%rbx),%rdi
18: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax
1f: fc ff df
22: 48 89 fa mov %rdi,%rdx
25: 48 c1 ea 03 shr $0x3,%rdx
* 29: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction
2d: 65 4c 8b 2d 52 2c 01 mov %gs:0x7f012c52(%rip),%r13 # 0x7f012c87
34: 7f
35: 84 c0 test %al,%al
37: 74 08 je 0x41
39: 3c 03 cmp $0x3,%al
3b: 0f .byte 0xf
3c: 8e 1e mov (%rsi),%ds
3e: 02 .byte 0x2