kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 15425 Comm: syz-executor226 Not tainted 4.9.202+ #0 task: 00000000eb5246db task.stack: 000000006651e46a RIP: 0010:[] [<0000000023dd91f8>] perf_event_count kernel/events/core.c:3583 [inline] RIP: 0010:[] [<0000000023dd91f8>] perf_output_read_group kernel/events/core.c:5742 [inline] RIP: 0010:[] [<0000000023dd91f8>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779 RSP: 0018:ffff8801d21971b8 EFLAGS: 00010207 RAX: 000000000000001b RBX: 0000000000000006 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffffff813c5a40 RDI: 00000000000000de RBP: ffff8801d2197330 R08: 1ffff1003a8fb670 R09: ffffed003a8fb672 R10: ffffed003a8fb671 R11: ffff8801d47db38f R12: ffff8801d239bcc8 R13: ffff8801d21974c8 R14: dffffc0000000000 R15: ffff8801d239bc50 FS: 00007f967e68d700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000201f1000 CR3: 00000001ca791000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: 0000000000000000 ffff8801d21974d0 ffffed003a432e9a 0000000000000010 0000000000000004 0000000000000010 ffffed003a432e9d 1ffff1003a432e45 ffff8801cedf8020 ffff8801d21974e8 ffff8801d21974e0 ffff8801d2197298 Call Trace: [<0000000065f25232>] perf_output_sample+0x1142/0x17e0 kernel/events/core.c:5821 [<000000009cbce5fa>] __perf_event_output kernel/events/core.c:6093 [inline] [<000000009cbce5fa>] perf_event_output_backward+0x129/0x240 kernel/events/core.c:6114 [<00000000b0fb5408>] __perf_event_overflow+0x121/0x330 kernel/events/core.c:7208 [<00000000f76acbe7>] perf_swevent_overflow+0x17c/0x210 kernel/events/core.c:7284 [<000000002c89f399>] perf_swevent_event+0x1ac/0x280 kernel/events/core.c:7317 [<0000000089687ad8>] do_perf_sw_event kernel/events/core.c:7425 [inline] [<0000000089687ad8>] ___perf_sw_event+0x299/0x4c0 kernel/events/core.c:7456 [<00000000918d98f9>] __perf_sw_event+0x47/0x90 kernel/events/core.c:7468 [<00000000e3723f91>] perf_sw_event include/linux/perf_event.h:1045 [inline] [<00000000e3723f91>] __do_page_fault+0x6cd/0xa60 arch/x86/mm/fault.c:1442 [<00000000cea52fd9>] do_page_fault+0x28/0x30 arch/x86/mm/fault.c:1464 [<00000000f715e020>] page_fault+0x25/0x30 arch/x86/entry/entry_64.S:956 [<000000009a2efa98>] mem_read+0x52/0x70 fs/proc/base.c:906 [<00000000bec54c6d>] do_loop_readv_writev.part.0+0xcc/0x2c0 fs/read_write.c:721 [<00000000d3ae08a5>] do_loop_readv_writev fs/read_write.c:710 [inline] [<00000000d3ae08a5>] do_readv_writev+0x556/0x7a0 fs/read_write.c:876 [<0000000057fd2132>] vfs_readv+0x86/0xc0 fs/read_write.c:900 [<00000000e7b319f1>] do_preadv+0x19b/0x240 fs/read_write.c:977 [<0000000031b8f518>] SYSC_preadv fs/read_write.c:1027 [inline] [<0000000031b8f518>] SyS_preadv+0x31/0x40 fs/read_write.c:1022 [<000000004f16436b>] do_syscall_64+0x1ad/0x5c0 arch/x86/entry/common.c:288 [<000000000a3b0bea>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: 74 08 3c 03 0f 8e 55 0a 00 00 41 83 bf 88 00 00 00 01 0f 84 09 07 00 00 e8 b0 cb f5 ff 48 8d bb d8 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 15 0a 00 00 48 8b 9b d8 00 00 00 48 85 db RIP [<0000000023dd91f8>] perf_event_count kernel/events/core.c:3583 [inline] RIP [<0000000023dd91f8>] perf_output_read_group kernel/events/core.c:5742 [inline] RIP [<0000000023dd91f8>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779 RSP ---[ end trace d674fb4d01324679 ]---