kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 3942 Comm: syz-executor.2 Not tainted 4.9.203-syzkaller #0 task: 000000007e65d3d1 task.stack: 000000001103bd82 RIP: 0010:[] [<000000001409f46c>] perf_event_count kernel/events/core.c:3583 [inline] RIP: 0010:[] [<000000001409f46c>] perf_output_read_group kernel/events/core.c:5742 [inline] RIP: 0010:[] [<000000001409f46c>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779 RSP: 0018:ffff8801c6a270f8 EFLAGS: 00010207 RAX: 000000000000001b RBX: 0000000000000006 RCX: ffffc9000172e000 RDX: 0000000000011f6e RSI: ffffffff813c5b80 RDI: 00000000000000de RBP: ffff8801c6a27270 R08: 1ffff10039cbf3d0 R09: ffffed0039cbf3d2 R10: ffffed0039cbf3d1 R11: ffff8801ce5f9e8f R12: ffff8801c64d57c8 R13: ffff8801c6a27408 R14: dffffc0000000000 R15: ffff8801c64d5750 FS: 00007fa777cd6700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020dd1000 CR3: 00000001c457d000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff8100228a ffff8801c6a27410 ffffed0038d44e82 0000000000000010 0000000000000004 0000000000000010 ffffed0038d44e85 1ffff10038d44e2d ffff8801c4f12220 ffff8801c6a27428 ffff8801c6a27420 ffff8801c6a271d8 Call Trace: [<00000000040b8d24>] perf_output_sample+0x1142/0x17e0 kernel/events/core.c:5821 [<00000000802b07b4>] __perf_event_output kernel/events/core.c:6093 [inline] [<00000000802b07b4>] perf_event_output_forward+0x129/0x240 kernel/events/core.c:6106 [<00000000464470f4>] __perf_event_overflow+0x121/0x330 kernel/events/core.c:7208 [<00000000ec352c7b>] perf_swevent_overflow+0x17c/0x210 kernel/events/core.c:7284 [<000000000f29cb7a>] perf_swevent_event+0x1ac/0x280 kernel/events/core.c:7317 [<0000000092a320df>] do_perf_sw_event kernel/events/core.c:7425 [inline] [<0000000092a320df>] ___perf_sw_event+0x299/0x4c0 kernel/events/core.c:7456 [<0000000014a56a76>] __perf_sw_event+0x47/0x90 kernel/events/core.c:7468 [<00000000e5371fa8>] perf_sw_event include/linux/perf_event.h:1045 [inline] [<00000000e5371fa8>] __do_page_fault+0x6cd/0xa60 arch/x86/mm/fault.c:1442 [<00000000a9bfeeca>] do_page_fault+0x28/0x30 arch/x86/mm/fault.c:1464 [<00000000db492318>] page_fault+0x25/0x30 arch/x86/entry/entry_64.S:956 [<000000009d4335a6>] skb_do_copy_data_nocache include/net/sock.h:1805 [inline] [<000000009d4335a6>] skb_copy_to_page_nocache include/net/sock.h:1831 [inline] [<000000009d4335a6>] tcp_sendmsg+0x9a1/0x2fa0 net/ipv4/tcp.c:1289 [<0000000092acb347>] inet_sendmsg+0x202/0x4d0 net/ipv4/af_inet.c:766 [<00000000d37d6be9>] sock_sendmsg_nosec net/socket.c:649 [inline] [<00000000d37d6be9>] sock_sendmsg+0xbe/0x110 net/socket.c:659 [<00000000f245d8ba>] SYSC_sendto net/socket.c:1684 [inline] [<00000000f245d8ba>] SyS_sendto+0x201/0x340 net/socket.c:1652 [<0000000078f4e5b0>] do_syscall_64+0x1ad/0x5c0 arch/x86/entry/common.c:288 [<000000002a0664e3>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: 74 08 3c 03 0f 8e 55 0a 00 00 41 83 bf 88 00 00 00 01 0f 84 09 07 00 00 e8 b0 cb f5 ff 48 8d bb d8 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 15 0a 00 00 48 8b 9b d8 00 00 00 48 85 db RIP [<000000001409f46c>] perf_event_count kernel/events/core.c:3583 [inline] RIP [<000000001409f46c>] perf_output_read_group kernel/events/core.c:5742 [inline] RIP [<000000001409f46c>] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5779 RSP ---[ end trace 5dce934a60fedeb3 ]---