kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 29332 Comm: syz-executor.4 Not tainted 4.9.193+ #0 task: 000000008c19e503 task.stack: 00000000fbec846e RIP: 0010:[] [<00000000d661f083>] perf_event_count kernel/events/core.c:3583 [inline] RIP: 0010:[] [<00000000d661f083>] perf_output_read_group kernel/events/core.c:5742 [inline] RIP: 0010:[] [<00000000d661f083>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779 RSP: 0018:ffff8801c0827278 EFLAGS: 00010207 RAX: 000000000000001b RBX: 0000000000000006 RCX: ffffc90000917000 RDX: 0000000000040000 RSI: ffffffff813c5b00 RDI: 00000000000000de RBP: ffff8801c08273f0 R08: 1ffff100375d87eb R09: ffffed00375d87ed R10: ffffed00375d87ec R11: ffff8801baec3f67 R12: ffff8801ca303548 R13: ffff8801c0827588 R14: dffffc0000000000 R15: ffff8801ca3034d0 FS: 00007f8e12457700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020930000 CR3: 00000001addec000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff81270ed2 ffff8801c0827590 ffffed0038104eb2 0000000000000010 0000000000000004 0000000000000010 ffffed0038104eb5 1ffff10038104e5d ffff8801b1127720 ffff8801c08275a8 ffff8801c08275a0 ffff8801c0827358 Call Trace: [<000000008fd2c996>] perf_output_sample+0x1142/0x17e0 kernel/events/core.c:5821 [<00000000760ea864>] __perf_event_output kernel/events/core.c:6093 [inline] [<00000000760ea864>] perf_event_output_forward+0x129/0x240 kernel/events/core.c:6106 [<000000009ad6a6c9>] __perf_event_overflow+0x121/0x330 kernel/events/core.c:7208 [<00000000fc6a7650>] perf_swevent_overflow+0x17c/0x210 kernel/events/core.c:7284 [<00000000164f9ff6>] perf_swevent_event+0x1ac/0x280 kernel/events/core.c:7317 [<000000001d42a116>] do_perf_sw_event kernel/events/core.c:7425 [inline] [<000000001d42a116>] ___perf_sw_event+0x299/0x4c0 kernel/events/core.c:7456 [<000000006aa0ca87>] __perf_sw_event+0x47/0x90 kernel/events/core.c:7468 [<00000000836768d5>] perf_sw_event include/linux/perf_event.h:1045 [inline] [<00000000836768d5>] __do_page_fault+0x6cd/0xa60 arch/x86/mm/fault.c:1442 [<000000009750cd81>] do_page_fault+0x28/0x30 arch/x86/mm/fault.c:1464 [<000000000250ee79>] page_fault+0x25/0x30 arch/x86/entry/entry_64.S:956 [<000000005dd84f84>] pipe_write+0x25a/0xe40 fs/pipe.c:447 [<00000000324bcd60>] new_sync_write fs/read_write.c:498 [inline] [<00000000324bcd60>] __vfs_write+0x3c1/0x560 fs/read_write.c:511 [<0000000060983ab7>] vfs_write+0x185/0x520 fs/read_write.c:559 [<00000000d3ecd015>] SYSC_write fs/read_write.c:607 [inline] [<00000000d3ecd015>] SyS_write+0x121/0x270 fs/read_write.c:599 [<0000000062d959b9>] do_syscall_64+0x1ad/0x5c0 arch/x86/entry/common.c:288 [<00000000fc62da85>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: 74 08 3c 03 0f 8e 55 0a 00 00 41 83 bf 88 00 00 00 01 0f 84 09 07 00 00 e8 a0 cc f5 ff 48 8d bb d8 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 15 0a 00 00 48 8b 9b d8 00 00 00 48 85 db RIP [<00000000d661f083>] perf_event_count kernel/events/core.c:3583 [inline] RIP [<00000000d661f083>] perf_output_read_group kernel/events/core.c:5742 [inline] RIP [<00000000d661f083>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779 RSP ---[ end trace ccb224aa5693e37d ]---