kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 30756 Comm: syz-executor.3 Not tainted 4.9.185+ #8 task: 0000000066a9df19 task.stack: 00000000ea10da97 RIP: 0010:[] [<000000005337615c>] perf_event_count /kernel/events/core.c:3583 [inline] RIP: 0010:[] [<000000005337615c>] perf_output_read_group /kernel/events/core.c:5742 [inline] RIP: 0010:[] [<000000005337615c>] perf_output_read+0x63e/0x12e0 /kernel/events/core.c:5779 RSP: 0018:ffff8801abd2f038 EFLAGS: 00010207 RAX: 000000000000001b RBX: 0000000000000006 RCX: ffffc9000dd10000 RDX: 0000000000040000 RSI: ffffffff813c40f0 RDI: 00000000000000de RBP: ffff8801abd2f1b0 R08: 1ffff10035744619 R09: ffffed003574461b R10: ffffed003574461a R11: ffff8801aba230d7 R12: ffff8801c65d23c8 R13: ffff8801abd2f348 R14: dffffc0000000000 R15: ffff8801c65d2350 FS: 00007fbf43671700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020baf13f CR3: 000000018e98e000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Stack: ffff880190faf020 ffff8801abd2f350 ffffed00357a5e6a 0000000000000010 0000000000000004 0000000000000010 ffffed00357a5e6d 1ffff100357a5e15 ffff88019b692220 ffff8801abd2f368 ffff8801abd2f360 ffff8801abd2f118 Call Trace: [<00000000eb32edc8>] perf_output_sample+0x1142/0x17e0 /kernel/events/core.c:5821 [<000000001d493445>] __perf_event_output /kernel/events/core.c:6093 [inline] [<000000001d493445>] perf_event_output_forward+0x129/0x240 /kernel/events/core.c:6106 [<000000001d8ee885>] __perf_event_overflow+0x121/0x330 /kernel/events/core.c:7208 [<00000000ead72985>] perf_swevent_overflow+0x17c/0x210 /kernel/events/core.c:7284 [<0000000051842fb5>] perf_swevent_event+0x1ac/0x280 /kernel/events/core.c:7317 [<000000005ffe7b4c>] do_perf_sw_event /kernel/events/core.c:7425 [inline] [<000000005ffe7b4c>] ___perf_sw_event+0x299/0x4c0 /kernel/events/core.c:7456 [<0000000028619984>] __perf_sw_event+0x47/0x90 /kernel/events/core.c:7468 [<0000000032132486>] perf_sw_event /./include/linux/perf_event.h:1045 [inline] [<0000000032132486>] __do_page_fault+0x6cd/0xa60 /arch/x86/mm/fault.c:1445 [<000000009684249c>] do_page_fault+0x28/0x30 /arch/x86/mm/fault.c:1467 [<00000000291f6fab>] page_fault+0x25/0x30 /arch/x86/entry/entry_64.S:953 [<0000000017de26e0>] generic_perform_write+0x1b6/0x500 /mm/filemap.c:2929 [<000000002c4a9608>] __generic_file_write_iter+0x340/0x530 /mm/filemap.c:3064 [<00000000d3ae0ffc>] ext4_file_write_iter+0x364/0xcd0 /fs/ext4/file.c:165 [<00000000fcc8a898>] new_sync_write /fs/read_write.c:498 [inline] [<00000000fcc8a898>] __vfs_write+0x3c1/0x560 /fs/read_write.c:511 [<00000000e91f6ea2>] vfs_write+0x185/0x520 /fs/read_write.c:559 [<00000000f49c6573>] SYSC_write /fs/read_write.c:607 [inline] [<00000000f49c6573>] SyS_write+0x121/0x270 /fs/read_write.c:599 [<0000000076d11826>] do_syscall_64+0x1ad/0x5c0 /arch/x86/entry/common.c:288 [<0000000005b7c0b2>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: 74 08 3c 03 0f 8e 55 0a 00 00 41 83 bf 88 00 00 00 01 0f 84 09 07 00 00 e8 a0 cc f5 ff 48 8d bb d8 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 15 0a 00 00 48 8b 9b d8 00 00 00 48 85 db RIP [<000000005337615c>] perf_event_count /kernel/events/core.c:3583 [inline] RIP [<000000005337615c>] perf_output_read_group /kernel/events/core.c:5742 [inline] RIP [<000000005337615c>] perf_output_read+0x63e/0x12e0 /kernel/events/core.c:5779 RSP ---[ end trace 1aa6d99e6e77ee40 ]---