kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 18843 Comm: syz-executor.3 Not tainted 4.9.168+ #40 task: 000000003bc447e4 task.stack: 00000000feb07d38 RIP: 0010:[] [<000000004a1f995d>] perf_event_count kernel/events/core.c:3583 [inline] RIP: 0010:[] [<000000004a1f995d>] perf_output_read_group kernel/events/core.c:5742 [inline] RIP: 0010:[] [<000000004a1f995d>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779 RSP: 0018:ffff8801c6166ff8 EFLAGS: 00010202 RAX: 000000000000001c RBX: 0000000000000009 RCX: ffffc90002f4a000 RDX: 0000000000040000 RSI: ffffffff813c0100 RDI: 00000000000000e1 RBP: ffff8801c6167170 R08: 1ffff100347f7e0d R09: ffffed00347f7e0f R10: ffffed00347f7e0e R11: ffff8801a3fbf077 R12: ffff88017ce8b7c8 R13: ffff8801c6167308 R14: dffffc0000000000 R15: ffff88017ce8b750 FS: 00007febf8ee5700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002052e13f CR3: 00000001174c4000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Stack: ffff8801c6167170 ffff8801c6167310 ffffed0038c2ce62 0000000000000010 0000000000000004 0000000000000010 ffffed0038c2ce65 1ffff10038c2ce0d ffff8801b04a4ca0 ffff8801c6167328 ffff8801c6167320 ffff8801c61670d8 Call Trace: [<00000000b1128dab>] perf_output_sample+0x1142/0x17e0 kernel/events/core.c:5821 [<00000000333d5485>] __perf_event_output kernel/events/core.c:6093 [inline] [<00000000333d5485>] perf_event_output_forward+0x129/0x240 kernel/events/core.c:6106 [<00000000b6daf629>] __perf_event_overflow+0x121/0x330 kernel/events/core.c:7206 [<00000000f6671431>] perf_swevent_overflow+0x17c/0x210 kernel/events/core.c:7282 [<000000001da30c22>] perf_swevent_event+0x1ac/0x280 kernel/events/core.c:7315 [<0000000052318370>] do_perf_sw_event kernel/events/core.c:7423 [inline] [<0000000052318370>] ___perf_sw_event+0x299/0x4c0 kernel/events/core.c:7454 [<000000005120a7ae>] __perf_sw_event+0x47/0x90 kernel/events/core.c:7466 [<000000007c4f85b0>] perf_sw_event include/linux/perf_event.h:1045 [inline] [<000000007c4f85b0>] __do_page_fault+0x6cd/0xa60 arch/x86/mm/fault.c:1447 [<0000000047d4ff90>] do_page_fault+0x28/0x30 arch/x86/mm/fault.c:1469 [<00000000c7b128a1>] page_fault+0x25/0x30 arch/x86/entry/entry_64.S:951 [<000000001499a6f6>] generic_perform_write+0x1b6/0x500 mm/filemap.c:2929 [<000000008f86dedb>] __generic_file_write_iter+0x340/0x530 mm/filemap.c:3064 [<000000008e663464>] ext4_file_write_iter+0x66e/0xdd0 fs/ext4/file.c:165 [<000000001ef4504d>] new_sync_write fs/read_write.c:498 [inline] [<000000001ef4504d>] __vfs_write+0x3c1/0x560 fs/read_write.c:511 [<00000000ab3c34da>] vfs_write+0x185/0x520 fs/read_write.c:559 [<000000002cc153b3>] SYSC_write fs/read_write.c:606 [inline] [<000000002cc153b3>] SyS_write+0xdc/0x1c0 fs/read_write.c:598 [<00000000a9335da4>] do_syscall_64+0x1ad/0x570 arch/x86/entry/common.c:285 [<000000009fa5633e>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: 74 08 3c 03 0f 8e 55 0a 00 00 41 83 bf 88 00 00 00 01 0f 84 09 07 00 00 e8 60 cf f5 ff 48 8d bb d8 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 15 0a 00 00 48 8b 9b d8 00 00 00 48 85 db RIP [<000000004a1f995d>] perf_event_count kernel/events/core.c:3583 [inline] RIP [<000000004a1f995d>] perf_output_read_group kernel/events/core.c:5742 [inline] RIP [<000000004a1f995d>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779 RSP ---[ end trace b0cb251baae6964c ]---