==================================================================
BUG: KASAN: slab-out-of-bounds in __collect_expired_timers include/linux/list.h:729 [inline]
BUG: KASAN: slab-out-of-bounds in collect_expired_timers kernel/time/timer.c:1569 [inline]
BUG: KASAN: slab-out-of-bounds in __run_timers+0xa2e/0xb90 kernel/time/timer.c:1616
Write of size 8 at addr ffff88004e5f4488 by task syz-executor0/28822

CPU: 2 PID: 28822 Comm: syz-executor0 Not tainted 4.13.0-next-20170908+ #18
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:16 [inline]
 dump_stack+0x194/0x257 lib/dump_stack.c:52
 print_address_description+0x73/0x250 mm/kasan/report.c:252
 kasan_report_error mm/kasan/report.c:351 [inline]
 kasan_report+0x24e/0x340 mm/kasan/report.c:409
 __asan_report_store8_noabort+0x17/0x20 mm/kasan/report.c:435
 __collect_expired_timers include/linux/list.h:729 [inline]
 collect_expired_timers kernel/time/timer.c:1569 [inline]
 __run_timers+0xa2e/0xb90 kernel/time/timer.c:1616
 run_timer_softirq+0x4c/0xb0 kernel/time/timer.c:1646
 __do_softirq+0x2bb/0xbd0 kernel/softirq.c:284
 invoke_softirq kernel/softirq.c:364 [inline]
 irq_exit+0x1d3/0x210 kernel/softirq.c:405
 exiting_irq arch/x86/include/asm/apic.h:638 [inline]
 smp_apic_timer_interrupt+0x177/0x710 arch/x86/kernel/apic/apic.c:1048
 apic_timer_interrupt+0x9d/0xb0 arch/x86/entry/entry_64.S:577
 </IRQ>
RIP: 0010:rep_nop arch/x86/include/asm/processor.h:634 [inline]
RIP: 0010:cpu_relax arch/x86/include/asm/processor.h:639 [inline]
RIP: 0010:csd_lock_wait kernel/smp.c:108 [inline]
RIP: 0010:smp_call_function_many+0x6ea/0x930 kernel/smp.c:468
RSP: 0018:ffff88004e656ef0 EFLAGS: 00000216 ORIG_RAX: ffffffffffffff10
RAX: 0000000000010000 RBX: ffffe8ffd0b04760 RCX: ffffc900026f2000
RDX: 0000000000000ddc RSI: ffffffff8162dff8 RDI: ffffffff857eaa68
RBP: ffff88004e657018 R08: fffffbffffeaf08d R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffe8ffd0b04778
R13: dffffc0000000000 R14: ffff88004e656ff0 R15: ffffed0009ccadf6
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9472 sclass=netlink_route_socket pig=28838 comm=syz-executor1
 smp_call_function kernel/smp.c:492 [inline]
 on_each_cpu+0x3d/0x1b0 kernel/smp.c:602
 text_poke_bp+0xe4/0x170 arch/x86/kernel/alternative.c:819
 __jump_label_transform.isra.0+0x6a5/0x8a0 arch/x86/kernel/jump_label.c:101
 arch_jump_label_transform+0x2f/0x40 arch/x86/kernel/jump_label.c:109
 __jump_label_update+0x207/0x2d0 kernel/jump_label.c:368
 jump_label_update+0x22c/0x2b0 kernel/jump_label.c:735
 static_key_slow_inc_cpuslocked kernel/jump_label.c:109 [inline]
 static_key_slow_inc+0x32f/0x3c0 kernel/jump_label.c:124
 tracepoint_add_func kernel/tracepoint.c:223 [inline]
 tracepoint_probe_register_prio+0x80d/0x9a0 kernel/tracepoint.c:283
 tracepoint_probe_register+0x2a/0x40 kernel/tracepoint.c:304
 trace_event_reg+0x167/0x320 kernel/trace/trace_events.c:305
 perf_trace_event_reg kernel/trace/trace_event_perf.c:122 [inline]
 perf_trace_event_init kernel/trace/trace_event_perf.c:197 [inline]
 perf_trace_init+0x4f9/0xab0 kernel/trace/trace_event_perf.c:221
 perf_tp_event_init+0x7d/0xf0 kernel/events/core.c:8037
 perf_try_init_event+0xc9/0x1f0 kernel/events/core.c:9261
 perf_init_event kernel/events/core.c:9299 [inline]
 perf_event_alloc+0x1c5b/0x2a00 kernel/events/core.c:9558
 SYSC_perf_event_open+0x84e/0x2e00 kernel/events/core.c:10013
 SyS_perf_event_open+0x39/0x50 kernel/events/core.c:9899
 do_syscall_64+0x26c/0x8c0 arch/x86/entry/common.c:287
 entry_SYSCALL64_slow_path+0x25/0x25
RIP: 0033:0x447299
RSP: 002b:00007f4b8b9a0c08 EFLAGS: 00000282 ORIG_RAX: 000000000000012a
RAX: ffffffffffffffda RBX: 000000002001d000 RCX: 0000000000447299
RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 000000002001d000
RBP: 0000000000708000 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffffffffffff R11: 0000000000000282 R12: 00000000ffffffff
R13: 0000000000003d10 R14: 00000000006e6dd0 R15: 0000000000000000

Allocated by task 28762:
 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59
 save_stack+0x43/0xd0 mm/kasan/kasan.c:447
 set_track mm/kasan/kasan.c:459 [inline]
 kasan_kmalloc+0xad/0xe0 mm/kasan/kasan.c:551
 kmem_cache_alloc_trace+0x136/0x750 mm/slab.c:3627
 kmalloc include/linux/slab.h:493 [inline]
 perf_event_mmap_event kernel/events/core.c:6943 [inline]
 perf_event_mmap+0x4b2/0x1170 kernel/events/core.c:7137
 mmap_region+0x3e5/0x15a0 mm/mmap.c:1721
 do_mmap+0x6a1/0xd50 mm/mmap.c:1468
 do_mmap_pgoff include/linux/mm.h:2151 [inline]
 vm_mmap_pgoff+0x1de/0x280 mm/util.c:333
 SYSC_mmap_pgoff mm/mmap.c:1518 [inline]
 SyS_mmap_pgoff+0x462/0x5f0 mm/mmap.c:1476
 SYSC_mmap arch/x86/kernel/sys_x86_64.c:99 [inline]
 SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:90
 entry_SYSCALL_64_fastpath+0x1f/0xbe

Freed by task 28762:
 save_stack_trace+0x16/0x20 arch/x86/kernel/stacktrace.c:59
 save_stack+0x43/0xd0 mm/kasan/kasan.c:447
 set_track mm/kasan/kasan.c:459 [inline]
 kasan_slab_free+0x71/0xc0 mm/kasan/kasan.c:524
 __cache_free mm/slab.c:3503 [inline]
 kfree+0xca/0x250 mm/slab.c:3820
 perf_event_mmap_event kernel/events/core.c:7023 [inline]
 perf_event_mmap+0xa0d/0x1170 kernel/events/core.c:7137
 mmap_region+0x3e5/0x15a0 mm/mmap.c:1721
 do_mmap+0x6a1/0xd50 mm/mmap.c:1468
 do_mmap_pgoff include/linux/mm.h:2151 [inline]
 vm_mmap_pgoff+0x1de/0x280 mm/util.c:333
 SYSC_mmap_pgoff mm/mmap.c:1518 [inline]
 SyS_mmap_pgoff+0x462/0x5f0 mm/mmap.c:1476
 SYSC_mmap arch/x86/kernel/sys_x86_64.c:99 [inline]
 SyS_mmap+0x16/0x20 arch/x86/kernel/sys_x86_64.c:90
 entry_SYSCALL_64_fastpath+0x1f/0xbe

The buggy address belongs to the object at ffff88004e5f4b40
 which belongs to the cache kmalloc-4096 of size 4096
The buggy address is located 1720 bytes to the left of
 4096-byte region [ffff88004e5f4b40, ffff88004e5f5b40)
The buggy address belongs to the page:
page:ffffea0001397d00 count:1 mapcount:0 mapping:ffff88004e5f4b40 index:0x0 compound_mapcount: 0
flags: 0x500000000008100(slab|head)
raw: 0500000000008100 ffff88004e5f4b40 0000000000000000 0000000100000001
raw: ffffea00013a2fa0 ffffea0001397da0 ffff88003e800dc0 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff88004e5f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff88004e5f4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff88004e5f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                      ^
 ffff88004e5f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff88004e5f4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
==================================================================