input: syz1 as /devices/virtual/input/input674 input: syz1 as /devices/virtual/input/input675 BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1355 in_atomic(): 0, irqs_disabled(): 0, pid: 7989, name: syz-executor.0 3 locks held by syz-executor.0/7989: #0: 0000000070a1545d (&table[i].mutex){+.+.}, at: nfnl_lock net/netfilter/nfnetlink.c:62 [inline] #0: 0000000070a1545d (&table[i].mutex){+.+.}, at: nfnetlink_rcv_msg+0x98d/0xf60 net/netfilter/nfnetlink.c:223 #1: 000000008d101164 (rcu_read_lock){....}, at: ctnetlink_create_conntrack+0x199/0x12c0 net/netfilter/nf_conntrack_netlink.c:1929 #2: 000000003043322b (&mm->mmap_sem){++++}, at: __do_page_fault+0x3e2/0xde0 arch/x86/mm/fault.c:1341 Preemption disabled at: [] rcu_lockdep_current_cpu_online kernel/rcu/tree.c:1076 [inline] [] rcu_lockdep_current_cpu_online+0x32/0x1b0 kernel/rcu/tree.c:1068 CPU: 0 PID: 7989 Comm: syz-executor.0 Not tainted 4.19.143-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 ___might_sleep.cold+0x235/0x250 kernel/sched/core.c:6196 __do_page_fault+0x40d/0xde0 arch/x86/mm/fault.c:1355 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1205 RIP: 0010:0x40 Code: Bad RIP value. RSP: 0018:ffff888204a2f190 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005ddf000 RDX: 1ffff11013603557 RSI: ffff888204a2f210 RDI: ffff888204a2f260 RBP: ffff88804c2d8d80 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 00000000368ebda7 R12: 0000000000000000 R13: 0000000000000001 R14: ffff88809b01aa80 R15: ffff888204a2f210 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. bridge_slave_0: FDB only supports static addresses netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. tc_dump_action: action bad kind netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. tc_dump_action: action bad kind BUG: unable to handle kernel NULL pointer dereference at 0000000000000040 PGD 9b331067 P4D 9b331067 PUD 33b6f067 PMD 0 Oops: 0010 [#1] PREEMPT SMP KASAN CPU: 1 PID: 7989 Comm: syz-executor.0 Tainted: G W 4.19.143-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:0x40 Code: Bad RIP value. RSP: 0018:ffff888204a2f190 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005ddf000 RDX: 1ffff11013603557 RSI: ffff888204a2f210 RDI: ffff888204a2f260 RBP: ffff88804c2d8d80 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 00000000368ebda7 R12: 0000000000000000 R13: 0000000000000001 R14: ffff88809b01aa80 R15: ffff888204a2f210 FS: 00007f9b21e97700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000016 CR3: 000000004e48c000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: Modules linked in: CR2: 0000000000000040 ---[ end trace 7c5dfe3ff2e3a98b ]--- RIP: 0010:0x40 Code: Bad RIP value. RSP: 0018:ffff888204a2f190 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90005ddf000 RDX: 1ffff11013603557 RSI: ffff888204a2f210 RDI: ffff888204a2f260 RBP: ffff88804c2d8d80 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 00000000368ebda7 R12: 0000000000000000 R13: 0000000000000001 R14: ffff88809b01aa80 R15: ffff888204a2f210 FS: 00007f9b21e97700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000c00f536010 CR3: 000000004e48c000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400