kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 13017 Comm: syz-executor.4 Not tainted 4.9.170+ #48
task: 00000000d2ea9d55 task.stack: 00000000eef2e8e7
RIP: 0010:[<ffffffff813c02ce>]  [<00000000591e3795>] perf_event_count kernel/events/core.c:3583 [inline]
RIP: 0010:[<ffffffff813c02ce>]  [<00000000591e3795>] perf_output_read_group kernel/events/core.c:5742 [inline]
RIP: 0010:[<ffffffff813c02ce>]  [<00000000591e3795>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779
RSP: 0018:ffff8801d712eff8  EFLAGS: 00010202
RAX: 000000000000001c RBX: 0000000000000009 RCX: ffffc9000e087000
RDX: 0000000000040000 RSI: ffffffff813c02c0 RDI: 00000000000000e1
RBP: ffff8801d712f170 R08: 1ffff1003abad95d R09: ffffed003abad95f
R10: ffffed003abad95e R11: ffff8801d5d6caf7 R12: ffff8801d9eb5048
R13: ffff8801d712f308 R14: dffffc0000000000 R15: ffff8801d9eb4fd0
FS:  00007ff837fce700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000002072513f CR3: 00000001a6e8f000 CR4: 00000000001606b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Stack:
 ffff8801d712f040 ffff8801d712f310 ffffed003ae25e62 0000000000000010
 0000000000000004 0000000000000010 ffffed003ae25e65 1ffff1003ae25e0d
 ffff8801d63c9120 ffff8801d712f328 ffff8801d712f320 ffff8801d712f0d8
Call Trace:
 [<000000005f0f66c5>] perf_output_sample+0x1142/0x17e0 kernel/events/core.c:5821
 [<0000000088800e27>] __perf_event_output kernel/events/core.c:6093 [inline]
 [<0000000088800e27>] perf_event_output_forward+0x129/0x240 kernel/events/core.c:6106
 [<000000004cb081fa>] __perf_event_overflow+0x121/0x330 kernel/events/core.c:7208
 [<00000000dcc517c3>] perf_swevent_overflow+0x17c/0x210 kernel/events/core.c:7284
 [<00000000da4ab38a>] perf_swevent_event+0x1ac/0x280 kernel/events/core.c:7317
 [<000000006cd4745a>] do_perf_sw_event kernel/events/core.c:7425 [inline]
 [<000000006cd4745a>] ___perf_sw_event+0x299/0x4c0 kernel/events/core.c:7456
 [<00000000428b0629>] __perf_sw_event+0x47/0x90 kernel/events/core.c:7468
 [<0000000084c29f45>] perf_sw_event include/linux/perf_event.h:1045 [inline]
 [<0000000084c29f45>] __do_page_fault+0x6cd/0xa60 arch/x86/mm/fault.c:1447
 [<00000000fce3f0a3>] do_page_fault+0x28/0x30 arch/x86/mm/fault.c:1469
 [<00000000b044c5ed>] page_fault+0x25/0x30 arch/x86/entry/entry_64.S:951
 [<00000000575812c3>] generic_perform_write+0x1b6/0x500 mm/filemap.c:2929
 [<00000000fec71d64>] __generic_file_write_iter+0x340/0x530 mm/filemap.c:3064
 [<00000000d5188fbe>] ext4_file_write_iter+0x66e/0xdd0 fs/ext4/file.c:165
 [<00000000054cdf84>] new_sync_write fs/read_write.c:498 [inline]
 [<00000000054cdf84>] __vfs_write+0x3c1/0x560 fs/read_write.c:511
 [<000000000c6c395d>] vfs_write+0x185/0x520 fs/read_write.c:559
 [<000000000449a3a0>] SYSC_write fs/read_write.c:606 [inline]
 [<000000000449a3a0>] SyS_write+0xdc/0x1c0 fs/read_write.c:598
 [<000000003c2ad849>] do_syscall_64+0x1ad/0x570 arch/x86/entry/common.c:285
 [<000000005ab571d0>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb
Code: 74 08 3c 03 0f 8e 55 0a 00 00 41 83 bf 88 00 00 00 01 0f 84 09 07 00 00 e8 f0 ce f5 ff 48 8d bb d8 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 15 0a 00 00 48 8b 9b d8 00 00 00 48 85 db 
RIP  [<00000000591e3795>] perf_event_count kernel/events/core.c:3583 [inline]
RIP  [<00000000591e3795>] perf_output_read_group kernel/events/core.c:5742 [inline]
RIP  [<00000000591e3795>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779
 RSP <ffff8801d712eff8>
---[ end trace db7cdc2d80091114 ]---