BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:71 in_atomic(): 1, irqs_disabled(): 0, pid: 5568, name: syz-executor4 INFO: lockdep is turned off. CPU: 3 PID: 5568 Comm: syz-executor4 Not tainted 4.13.0-rc5-next-20170817+ #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6013 __might_sleep+0x95/0x190 kernel/sched/core.c:5966 __might_fault+0xab/0x1d0 mm/memory.c:4383 __copy_from_user include/linux/uaccess.h:71 [inline] paging32_walk_addr_generic+0x428/0x1e00 arch/x86/kvm/paging_tmpl.h:369 paging32_walk_addr arch/x86/kvm/paging_tmpl.h:475 [inline] paging32_gva_to_gpa+0xa5/0x230 arch/x86/kvm/paging_tmpl.h:913 kvm_read_guest_virt_helper+0xd8/0x140 arch/x86/kvm/x86.c:4399 kvm_read_guest_virt_system+0x3c/0x50 arch/x86/kvm/x86.c:4466 segmented_read_std+0x10c/0x180 arch/x86/kvm/emulate.c:819 em_fxrstor+0x27b/0x410 arch/x86/kvm/emulate.c:4022 x86_emulate_insn+0x55d/0x3c50 arch/x86/kvm/emulate.c:5471 x86_emulate_instruction+0x411/0x1ca0 arch/x86/kvm/x86.c:5705 kvm_mmu_page_fault+0x18b/0x2c0 arch/x86/kvm/mmu.c:4852 handle_ept_violation+0x1d1/0x5a0 arch/x86/kvm/vmx.c:6399 vmx_handle_exit+0x281/0x1aa0 arch/x86/kvm/vmx.c:8716 vcpu_enter_guest arch/x86/kvm/x86.c:7006 [inline] vcpu_run arch/x86/kvm/x86.c:7068 [inline] kvm_arch_vcpu_ioctl_run+0x1cee/0x58b0 arch/x86/kvm/x86.c:7229 kvm_vcpu_ioctl+0x64c/0x1010 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2591 vfs_ioctl fs/ioctl.c:45 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:685 SYSC_ioctl fs/ioctl.c:700 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x446739 RSP: 002b:00007fae648b4c08 EFLAGS: 00000282 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 0000000000446739 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000019 RBP: 0000000000708000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000282 R12: 00000000ffffffff R13: 0000000000001e10 R14: 00000000006e3ed0 R15: 000000008080aea1 kvm: MONITOR instruction emulated as NOP! sctp: [Deprecated]: syz-executor4 (pid 6107) Use of int in max_burst socket option. Use struct sctp_assoc_value instead kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x4000008f data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x4000008e data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x4000008d data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x4000008c data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x4000008b data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x4000008a data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x40000089 data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x40000088 data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x40000087 data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x40000086 data 0x47 kvm [6111]: vcpu0, guest rIP: 0x9110 Hyper-V uhandled wrmsr: 0x40000020 data 0x47 sctp: [Deprecated]: syz-executor4 (pid 6107) Use of int in max_burst socket option. Use struct sctp_assoc_value instead tmpfs: No value for mount option 'ɿ܈82 Oo&oK' tmpfs: No value for mount option 'ɿ܈82 Oo&oK' sock: process `syz-executor7' is using obsolete getsockopt SO_BSDCOMPAT device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo entered promiscuous mode kvm: pic: non byte read kvm: pic: non byte write kvm: pic: non byte write kvm: pic: non byte write kvm: pic: non byte write kvm: pic: non byte write kvm: pic: non byte write kvm: pic: non byte write kvm: pic: non byte write kvm: pic: non byte write kvm: pic: non byte read device lo entered promiscuous mode PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex kvm [6854]: vcpu0, guest rIP: 0x9138 Hyper-V uhandled wrmsr: 0x40000020 data 0x400 kvm [6854]: vcpu0, guest rIP: 0xfff0 Hyper-V uhandled wrmsr: 0x40000020 data 0x400 sctp: [Deprecated]: syz-executor5 (pid 6972) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead kvm: pic: non byte read *** Guest State *** CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=fffffffffffff871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000f7c RIP = 0x0000000000009118 RFLAGS=0x00010046 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 SS: sel=0x0000, attr=0x00081, limit=0x00002000, base=0x0000000000000000 ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 GDTR: limit=0x00000000, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x08000, limit=0x00000000, base=0x0000000000000000 IDTR: limit=0x00000000, base=0x0000000000000000 TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000008 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b6397 RSP = 0xffff88006802f4c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007ffb5c2e8700 GSBase=ffff88006df00000 TRBase=ffff88006df22d40 GDTBase=ffffffffff574000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=00000000394f4000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d74d30 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b699edfa SecondaryExec=001000e2 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=8000030d errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffe21f734d20 EPT pointer = 0x000000006808b01e Virtual processor ID = 0x00a2 nla_parse: 17 callbacks suppressed netlink: 5 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor7'. kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008f kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008e kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008d kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008c kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008b kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008a kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000089 kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000088 kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000087 kvm [7215]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000086 kvm [7334]: vcpu0, guest rIP: 0x9138 Hyper-V uhandled wrmsr: 0x40000020 data 0x400 kvm [7334]: vcpu0, guest rIP: 0x0 Hyper-V uhandled wrmsr: 0x40000020 data 0x400 rpcbind: RPC call returned error 22 rpcbind: RPC call returned error 22 sctp: [Deprecated]: syz-executor5 (pid 7474) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor5 (pid 7520) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. QAT: Invalid ioctl QAT: Invalid ioctl device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. loop_reread_partitions: partition scan of loop0 (-\t@r9hxGQ:[il L*@R-Tr-x) failed (rc=-13) pit: kvm: requested 2514 ns i8254 timer period limited to 500000 ns sctp: [Deprecated]: syz-executor6 (pid 7726) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor6 (pid 7726) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 19 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 19 bytes leftover after parsing attributes in process `syz-executor0'. *** Guest State *** CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=fffffffffffff871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000000 RIP = 0x000000000000fff0 RFLAGS=0x00000002 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0x0002, attr=0x10000, limit=0x00000000, base=0x0000000000000000 DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 GDTR: limit=0x00000000, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 IDTR: limit=0x00000000, base=0x0000000000000000 TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b6397 RSP = 0xffff88003881f4c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007fa54314a700 GSBase=ffff88006de00000 TRBase=ffff88003ec22d40 GDTBase=ffffffffff577000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=000000003d543000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d74d30 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=001000f2 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffe000464a68 TPR Threshold = 0x00 EPT pointer = 0x000000006943501e Virtual processor ID = 0x00a0 *** Guest State *** CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=fffffffffffff871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000000 RIP = 0x000000000000fff0 RFLAGS=0x00000002 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0x0002, attr=0x10000, limit=0x00000000, base=0x0000000000000000 DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 GDTR: limit=0x00000000, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 IDTR: limit=0x00000000, base=0x0000000000000000 TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b6397 RSP = 0xffff880022e574c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007fa543127700 GSBase=ffff88006df00000 TRBase=ffff88006df22d40 GDTBase=ffffffffff574000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=000000003d543000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d74d30 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=001000f2 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffdff739f80a TPR Threshold = 0x00 EPT pointer = 0x000000006882f01e Virtual processor ID = 0x00c0 sctp: [Deprecated]: syz-executor7 (pid 7940) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 7940) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 7940) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 7954) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead netlink: 13 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 13 bytes leftover after parsing attributes in process `syz-executor6'. device lo entered promiscuous mode