BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1253 in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 6821, name: syz-executor.0 1 lock held by syz-executor.0/6821: #0: ffff888092aa3268 (&mm->mmap_lock#2){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:56 [inline] #0: ffff888092aa3268 (&mm->mmap_lock#2){++++}-{3:3}, at: do_user_addr_fault+0x344/0xba0 arch/x86/mm/fault.c:1236 irq event stamp: 3098030 hardirqs last enabled at (3098029): [] __free_object+0x427/0xd20 lib/debugobjects.c:360 hardirqs last disabled at (3098030): [] __syscall_return_slowpath+0x52/0x180 arch/x86/entry/common.c:328 softirqs last enabled at (3094668): [] asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:711 softirqs last disabled at (3094657): [] asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:711 CPU: 0 PID: 6821 Comm: syz-executor.0 Not tainted 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1f0/0x31e lib/dump_stack.c:118 ___might_sleep+0x3c0/0x570 kernel/sched/core.c:6899 do_user_addr_fault+0x377/0xba0 arch/x86/mm/fault.c:1253 handle_page_fault arch/x86/mm/fault.c:1365 [inline] exc_page_fault+0x124/0x1f0 arch/x86/mm/fault.c:1418 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:565 RIP: 0010:__prepare_exit_to_usermode+0x52/0x1e0 arch/x86/entry/common.c:240 Code: 24 50 15 00 00 0f 85 8f 01 00 00 f0 41 80 64 24 03 7f 83 3d 9f e9 6c 08 00 74 23 41 83 bc 24 cc 08 00 00 00 75 18 41 83 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90001677f10 EFLAGS: 00010006 RAX: 0000000000004000 RBX: 0000000000000023 RCX: ffff88809e2c8180 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc90001677f58 RBP: 0000000000000000 R08: ffffffff817a2250 R09: fffffbfff17051b4 R10: fffffbfff17051b4 R11: 0000000000000000 R12: ffff88809e2c8180 R13: 0000000000000000 R14: ffffc90001677f58 R15: ffffc90001677f58 do_syscall_64+0x7f/0xe0 arch/x86/entry/common.c:368 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45b030 Code: Bad RIP value. RSP: 002b:00007ffff03fdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 RAX: 0000000000000000 RBX: 000000000006eb2f RCX: 000000000045b030 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffff03fdf50 RBP: 0000000000000293 R08: 0000000000000001 R09: 000000000259b940 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d R13: 00007ffff03fdfa0 R14: 000000000006e662 R15: 00007ffff03fdfb0 BUG: unable to handle page fault for address: 0000000000004000 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page PGD 88328067 P4D 88328067 PUD 88329067 PMD 0 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 0 PID: 6821 Comm: syz-executor.0 Tainted: G W 5.8.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__prepare_exit_to_usermode+0x52/0x1e0 arch/x86/entry/common.c:240 Code: 24 50 15 00 00 0f 85 8f 01 00 00 f0 41 80 64 24 03 7f 83 3d 9f e9 6c 08 00 74 23 41 83 bc 24 cc 08 00 00 00 75 18 41 83 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90001677f10 EFLAGS: 00010006 RAX: 0000000000004000 RBX: 0000000000000023 RCX: ffff88809e2c8180 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc90001677f58 RBP: 0000000000000000 R08: ffffffff817a2250 R09: fffffbfff17051b4 R10: fffffbfff17051b4 R11: 0000000000000000 R12: ffff88809e2c8180 R13: 0000000000000000 R14: ffffc90001677f58 R15: ffffc90001677f58 FS: 000000000259b940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000004000 CR3: 000000008a2ef000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: do_syscall_64+0x7f/0xe0 arch/x86/entry/common.c:368 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x45b030 Code: Bad RIP value. RSP: 002b:00007ffff03fdf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 RAX: 0000000000000000 RBX: 000000000006eb2f RCX: 000000000045b030 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007ffff03fdf50 RBP: 0000000000000293 R08: 0000000000000001 R09: 000000000259b940 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d R13: 00007ffff03fdfa0 R14: 000000000006e662 R15: 00007ffff03fdfb0 Modules linked in: CR2: 0000000000004000 ---[ end trace dbf45dca1c5d5dea ]--- RIP: 0010:__prepare_exit_to_usermode+0x52/0x1e0 arch/x86/entry/common.c:240 Code: 24 50 15 00 00 0f 85 8f 01 00 00 f0 41 80 64 24 03 7f 83 3d 9f e9 6c 08 00 74 23 41 83 bc 24 cc 08 00 00 00 75 18 41 83 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSP: 0018:ffffc90001677f10 EFLAGS: 00010006 RAX: 0000000000004000 RBX: 0000000000000023 RCX: ffff88809e2c8180 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc90001677f58 RBP: 0000000000000000 R08: ffffffff817a2250 R09: fffffbfff17051b4 R10: fffffbfff17051b4 R11: 0000000000000000 R12: ffff88809e2c8180 R13: 0000000000000000 R14: ffffc90001677f58 R15: ffffc90001677f58 FS: 000000000259b940(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000004000 CR3: 000000008a2ef000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400