BUG: sleeping function called from invalid context at mm/slab.h:422 in_atomic(): 1, irqs_disabled(): 1, pid: 30588, name: syz-executor.1 3 locks held by syz-executor.1/30588: #0: 00000000f83b3598 (&ep->mtx){+.+.}, at: __do_sys_epoll_ctl fs/eventpoll.c:2075 [inline] #0: 00000000f83b3598 (&ep->mtx){+.+.}, at: __se_sys_epoll_ctl+0x5d2/0x2b90 fs/eventpoll.c:1997 #1: 00000000815ba02c (&dev->dev_mutex){+.+.}, at: v4l2_m2m_fop_poll+0x91/0x110 drivers/media/v4l2-core/v4l2-mem2mem.c:1056 #2: 000000005c1fff03 (&(&q->done_lock)->rlock){....}, at: v4l2_m2m_poll+0x140/0x720 drivers/media/v4l2-core/v4l2-mem2mem.c:623 irq event stamp: 304 hardirqs last enabled at (303): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (303): [] _raw_spin_unlock_irqrestore+0x79/0xe0 kernel/locking/spinlock.c:184 hardirqs last disabled at (304): [] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline] hardirqs last disabled at (304): [] _raw_spin_lock_irqsave+0x66/0xc0 kernel/locking/spinlock.c:152 softirqs last enabled at (154): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (129): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (129): [] irq_exit+0x215/0x260 kernel/softirq.c:412 Preemption disabled at: [<0000000000000000>] (null) CPU: 1 PID: 30588 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6192 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x26d/0x370 mm/slab.c:3557 ep_ptable_queue_proc+0xaf/0x390 fs/eventpoll.c:1242 poll_wait include/linux/poll.h:51 [inline] v4l2_m2m_poll+0x633/0x720 drivers/media/v4l2-core/v4l2-mem2mem.c:625 v4l2_m2m_fop_poll+0xa4/0x110 drivers/media/v4l2-core/v4l2-mem2mem.c:1058 v4l2_poll+0x146/0x1f0 drivers/media/v4l2-core/v4l2-dev.c:350 vfs_poll include/linux/poll.h:90 [inline] ep_item_poll+0x14a/0x3e0 fs/eventpoll.c:890 ep_insert fs/eventpoll.c:1479 [inline] __do_sys_epoll_ctl fs/eventpoll.c:2112 [inline] __se_sys_epoll_ctl+0x1b04/0x2b90 fs/eventpoll.c:1997 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fdc49016e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fdc4798c168 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 RAX: ffffffffffffffda RBX: 00007fdc49129f60 RCX: 00007fdc49016e99 RDX: 0000000000000003 RSI: 0000000000000001 RDI: 0000000000000004 RBP: 00007fdc49070ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff591f7abf R14: 00007fdc4798c300 R15: 0000000000022000 nla_parse: 25 callbacks suppressed netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. *** Guest State *** CR0: actual=0x0000000000000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x0000000000000000 RSP = 0x0000000000000f80 RIP = 0x0000000000000000 RFLAGS=0x00000002 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 CS: sel=0x0000, attr=0x040fb, limit=0x000fffff, base=0x0000000000000000 DS: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 SS: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 ES: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 FS: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 GS: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 GDTR: limit=0x000007ff, base=0x0000000000001000 audit: type=1800 audit(1640473982.970:446): pid=30915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=65536 res=0 LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 IDTR: limit=0x000001ff, base=0x0000000000003800 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000002801 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811a9c2f RSP = 0xffff88808c47f8c0 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f06a3507700 GSBase=ffff8880ba100000 TRBase=fffffe0000003000 GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 CR0=0000000080050033 CR3=00000000a1a92000 CR4=00000000003426e0 Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff88201290 EFER = 0x0000000000000d01 PAT = 0x0407050600070106 *** Control State *** PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ea EntryControls=0000d1ff ExitControls=002fefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff1f94bb6860 EPT pointer = 0x000000008b4ed01e Virtual processor ID = 0x0001 audit: type=1800 audit(1640473983.660:447): pid=30987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15436 res=0 irq bypass consumer (token 00000000b5460743) registration fails: -16 irq bypass consumer (token 0000000054e5a4e2) registration fails: -16 irq bypass consumer (token 000000009b3f49a1) registration fails: -16 IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready netlink: 'syz-executor.2': attribute type 10 has an invalid length. bond0: team0 is up - this may be due to an out of date ifenslave netlink: 'syz-executor.2': attribute type 10 has an invalid length. bridge0: port 3(team0) entered blocking state bridge0: port 3(team0) entered disabled state device team0 entered promiscuous mode device team_slave_0 entered promiscuous mode device team_slave_1 entered promiscuous mode netlink: 'syz-executor.2': attribute type 10 has an invalid length. device team0 left promiscuous mode device team_slave_0 left promiscuous mode device team_slave_1 left promiscuous mode bridge0: port 3(team0) entered disabled state bond0: team0 is up - this may be due to an out of date ifenslave netlink: 'syz-executor.2': attribute type 10 has an invalid length.