kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 1 PID: 26890 Comm: syz-executor.2 Not tainted 4.9.155+ #27
task: ffff8801c8b52f80 task.stack: ffff8801c4510000
RIP: 0010:[<ffffffff813be24e>]  [<ffffffff813be24e>] perf_event_count kernel/events/core.c:3583 [inline]
RIP: 0010:[<ffffffff813be24e>]  [<ffffffff813be24e>] perf_output_read_group kernel/events/core.c:5734 [inline]
RIP: 0010:[<ffffffff813be24e>]  [<ffffffff813be24e>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5771
RSP: 0018:ffff8801c4517278  EFLAGS: 00010207
RAX: 000000000000001b RBX: 0000000000000007 RCX: ffffc90007768000
RDX: 0000000000040000 RSI: ffffffff813be240 RDI: 00000000000000df
RBP: ffff8801c45173f0 R08: 1ffff100363b6e82 R09: ffffed00363b6e83
R10: ffffed00363b6e82 R11: ffff8801b1db7417 R12: ffff8801b2823cc8
R13: ffff8801c4517588 R14: dffffc0000000000 R15: ffff8801b2823c50
FS:  00007f6766389700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020ce9000 CR3: 0000000197952000 CR4: 00000000001606b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
Stack:
 ffffffff813c4479 ffff8801c4517590 ffffed00388a2eb2 0000000000000008
 0000000000000000 0000000000000008 ffffed00388a2eb5 1ffff100388a2e5d
 ffff8801d50a6ea0 ffff8801c45175a8 ffff8801c45175a0 ffff8801c4517358
Call Trace:
 [<ffffffff813df212>] perf_output_sample+0x1142/0x17e0 kernel/events/core.c:5813
 [<ffffffff813e0879>] __perf_event_output kernel/events/core.c:6085 [inline]
 [<ffffffff813e0879>] perf_event_output_forward+0x129/0x240 kernel/events/core.c:6098
 [<ffffffff813cb7c1>] __perf_event_overflow+0x121/0x330 kernel/events/core.c:7198
 [<ffffffff813cbedc>] perf_swevent_overflow+0x17c/0x210 kernel/events/core.c:7274
 [<ffffffff813cc11c>] perf_swevent_event+0x1ac/0x280 kernel/events/core.c:7307
 [<ffffffff813e3309>] do_perf_sw_event kernel/events/core.c:7415 [inline]
 [<ffffffff813e3309>] ___perf_sw_event+0x299/0x4c0 kernel/events/core.c:7446
 [<ffffffff813e3577>] __perf_sw_event+0x47/0x90 kernel/events/core.c:7458
 [<ffffffff810b1c3d>] perf_sw_event include/linux/perf_event.h:1040 [inline]
 [<ffffffff810b1c3d>] __do_page_fault+0x6cd/0xa60 arch/x86/mm/fault.c:1447
 [<ffffffff810b2028>] do_page_fault+0x28/0x30 arch/x86/mm/fault.c:1469
 [<ffffffff82817ab5>] page_fault+0x25/0x30 arch/x86/entry/entry_64.S:951
 [<ffffffff81526f8a>] pipe_write+0x25a/0xe40 fs/pipe.c:433
 [<ffffffff8150a431>] new_sync_write fs/read_write.c:498 [inline]
 [<ffffffff8150a431>] __vfs_write+0x3c1/0x560 fs/read_write.c:511
 [<ffffffff8150cd15>] vfs_write+0x185/0x520 fs/read_write.c:559
 [<ffffffff81510aec>] SYSC_write fs/read_write.c:606 [inline]
 [<ffffffff81510aec>] SyS_write+0xdc/0x1c0 fs/read_write.c:598
 [<ffffffff810056bd>] do_syscall_64+0x1ad/0x570 arch/x86/entry/common.c:285
 [<ffffffff82816a93>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb
Code: 74 08 3c 03 0f 8e 55 0a 00 00 41 83 bf 88 00 00 00 01 0f 84 09 07 00 00 e8 e0 d2 f5 ff 48 8d bb d8 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 15 0a 00 00 48 8b 9b d8 00 00 00 48 85 db 
RIP  [<ffffffff813be24e>] perf_event_count kernel/events/core.c:3583 [inline]
RIP  [<ffffffff813be24e>] perf_output_read_group kernel/events/core.c:5734 [inline]
RIP  [<ffffffff813be24e>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5771
 RSP <ffff8801c4517278>
---[ end trace 275a1899831af5f9 ]---