reason=80000021 qualification=0000000000000000
IDTVectoring: info=00000000 errcode=00000000
TSC Offset = 0xffffff1d003a8530
EPT pointer = 0x0000000089e0701e
Virtual processor ID = 0x0002
BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1366
in_atomic(): 0, irqs_disabled(): 1, pid: 13870, name: syz-executor.4
no locks held by syz-executor.4/13870.
irq event stamp: 3587
hardirqs last  enabled at (3587): [<ffffffff81007553>] do_syscall_64+0x53/0x640 arch/x86/entry/common.c:280
hardirqs last disabled at (3586): [<ffffffff8620007e>] entry_SYSCALL_64_after_hwframe+0x3a/0xb7
softirqs last  enabled at (3378): [<ffffffff86400645>] __do_softirq+0x645/0x9a0 kernel/softirq.c:314
softirqs last disabled at (3143): [<ffffffff8138a9d0>] invoke_softirq kernel/softirq.c:368 [inline]
softirqs last disabled at (3143): [<ffffffff8138a9d0>] irq_exit+0x160/0x1b0 kernel/softirq.c:409
CPU: 0 PID: 13870 Comm: syz-executor.4 Not tainted 4.14.138 #34
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x138/0x19c lib/dump_stack.c:53
 ___might_sleep.cold+0x1bd/0x1f6 kernel/sched/core.c:6039
 __might_sleep+0x93/0xb0 kernel/sched/core.c:5992
 __do_page_fault+0x2ed/0xb80 arch/x86/mm/fault.c:1366
 do_page_fault+0x71/0x511 arch/x86/mm/fault.c:1498
 page_fault+0x25/0x50 arch/x86/entry/entry_64.S:1122
RIP: 0010:atomic_inc arch/x86/include/asm/atomic.h:92 [inline]
RIP: 0010:__lock_acquire+0x20c/0x4620 kernel/locking/lockdep.c:3378
RSP: 0018:ffff88805355f680 EFLAGS: 00010086
RAX: ffffffffffffffff RBX: 0000000000000001 RCX: 0000000000000001
RDX: 1ffff110133d8156 RSI: 0000000000000000 RDI: ffff888099ec0ab0
RBP: ffff88805355f830 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: ffff88807c5ae2c0 R12: ffff888099ec0aa8
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001
 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3991
 kernfs_get_active fs/kernfs/dir.c:421 [inline]
 kernfs_get_active+0xb6/0xe0 fs/kernfs/dir.c:412
 kernfs_fop_poll+0x11f/0x280 fs/kernfs/file.c:841
 do_pollfd fs/select.c:826 [inline]
 do_poll fs/select.c:876 [inline]
 do_sys_poll+0x545/0xcc0 fs/select.c:970
 SYSC_poll fs/select.c:1028 [inline]
 SyS_poll+0x71/0x360 fs/select.c:1016
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459829
RSP: 002b:00007f8006362c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000007
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829
RDX: fffffffffffffff9 RSI: 0000000000000002 RDI: 0000000020000180
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80063636d4
R13: 00000000004c6707 R14: 00000000004db7c0 R15: 00000000ffffffff
BUG: unable to handle kernel NULL pointer dereference at 0000000000000137
IP: atomic_inc arch/x86/include/asm/atomic.h:92 [inline]
IP: __lock_acquire+0x20c/0x4620 kernel/locking/lockdep.c:3378
PGD 790b1067 P4D 790b1067 PUD 92c6e067 PMD 0 
Oops: 0002 [#1] PREEMPT SMP KASAN
Modules linked in:
CPU: 0 PID: 13870 Comm: syz-executor.4 Tainted: G        W       4.14.138 #34
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff88807c5ae2c0 task.stack: ffff888053558000
RIP: 0010:atomic_inc arch/x86/include/asm/atomic.h:92 [inline]
RIP: 0010:__lock_acquire+0x20c/0x4620 kernel/locking/lockdep.c:3378
RSP: 0018:ffff88805355f680 EFLAGS: 00010086
RAX: ffffffffffffffff RBX: 0000000000000001 RCX: 0000000000000001
RDX: 1ffff110133d8156 RSI: 0000000000000000 RDI: ffff888099ec0ab0
RBP: ffff88805355f830 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: ffff88807c5ae2c0 R12: ffff888099ec0aa8
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001
FS:  00007f8006363700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000137 CR3: 000000006ecb7000 CR4: 00000000001426f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 lock_acquire+0x16f/0x430 kernel/locking/lockdep.c:3991
 kernfs_get_active fs/kernfs/dir.c:421 [inline]
 kernfs_get_active+0xb6/0xe0 fs/kernfs/dir.c:412
 kernfs_fop_poll+0x11f/0x280 fs/kernfs/file.c:841
 do_pollfd fs/select.c:826 [inline]
 do_poll fs/select.c:876 [inline]
 do_sys_poll+0x545/0xcc0 fs/select.c:970
 SYSC_poll fs/select.c:1028 [inline]
 SyS_poll+0x71/0x360 fs/select.c:1016
 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x42/0xb7
RIP: 0033:0x459829
RSP: 002b:00007f8006362c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000007
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829
RDX: fffffffffffffff9 RSI: 0000000000000002 RDI: 0000000020000180
RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80063636d4
R13: 00000000004c6707 R14: 00000000004db7c0 R15: 00000000ffffffff
Code: 00 fc ff df 41 89 f5 4b 8d 7c ec 08 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bf 2e 00 00 4b 8b 44 ec 08 48 85 c0 0f 84 15 ff ff ff <f0> ff 80 38 01 00 00 49 8d b3 78 08 00 00 48 ba 00 00 00 00 00 
RIP: atomic_inc arch/x86/include/asm/atomic.h:92 [inline] RSP: ffff88805355f680
RIP: __lock_acquire+0x20c/0x4620 kernel/locking/lockdep.c:3378 RSP: ffff88805355f680
CR2: 0000000000000137
---[ end trace 48da176dfcff50c4 ]---