===================================== WARNING: bad unlock balance detected! 4.16.0-rc2+ #323 Not tainted ------------------------------------- syz-executor0/5850 is trying to release lock (rcu_read_lock_bh) at: [] rcu_read_unlock_bh include/linux/rcupdate.h:722 [inline] [] hashlimit_mt_common.isra.10+0x1beb/0x2610 net/netfilter/xt_hashlimit.c:777 but there are no more locks to release! other info that might help us debug this: 1 lock held by syz-executor0/5850: #0: (rcu_read_lock){....}, at: [<000000009df80def>] nf_hook include/linux/netfilter.h:206 [inline] #0: (rcu_read_lock){....}, at: [<000000009df80def>] __ip6_local_out+0x2f1/0xaa0 net/ipv6/output_core.c:164 stack backtrace: CPU: 1 PID: 5850 Comm: syz-executor0 Not tainted 4.16.0-rc2+ #323 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 print_unlock_imbalance_bug+0x12f/0x140 kernel/locking/lockdep.c:3484 __lock_release kernel/locking/lockdep.c:3691 [inline] lock_release+0x6fe/0xa40 kernel/locking/lockdep.c:3939 rcu_lock_release include/linux/rcupdate.h:249 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:724 [inline] hashlimit_mt_common.isra.10+0x1c08/0x2610 net/netfilter/xt_hashlimit.c:777 hashlimit_mt+0x78/0x90 net/netfilter/xt_hashlimit.c:846 ip6t_do_table+0x98d/0x1a30 net/ipv6/netfilter/ip6_tables.c:319 ip6table_raw_hook+0x65/0x80 net/ipv6/netfilter/ip6table_raw.c:42 nf_hook_entry_hookfn include/linux/netfilter.h:120 [inline] nf_hook_slow+0xba/0x1a0 net/netfilter/core.c:483 nf_hook include/linux/netfilter.h:243 [inline] __ip6_local_out+0x517/0xaa0 net/ipv6/output_core.c:164 ip6_local_out+0x2d/0x160 net/ipv6/output_core.c:174 ip6_send_skb+0xa1/0x330 net/ipv6/ip6_output.c:1677 udp_v6_send_skb+0x5ee/0xf70 net/ipv6/udp.c:1044 udpv6_sendmsg+0x2835/0x3400 net/ipv6/udp.c:1316 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:764 sock_sendmsg_nosec net/socket.c:630 [inline] sock_sendmsg+0xca/0x110 net/socket.c:640 SYSC_sendto+0x361/0x5c0 net/socket.c:1747 SyS_sendto+0x40/0x50 net/socket.c:1715 do_syscall_64+0x280/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x453da9 RSP: 002b:00007f66f871cc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f66f871d6d4 RCX: 0000000000453da9 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000014 RBP: 000000000072bea0 R08: 000000002064afe4 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000000004ba R14: 00000000006f7210 R15: 0000000000000000 x_tables: ip6_tables: eui64 match: used from hooks INPUT/FORWARD/OUTPUT, but only valid from PREROUTING/INPUT/FORWARD x_tables: ip6_tables: eui64 match: used from hooks INPUT/FORWARD/OUTPUT, but only valid from PREROUTING/INPUT/FORWARD binder_alloc: binder_alloc_mmap_handler: 6105 20000000-20002000 already mapped failed -16 hrtimer: interrupt took 27791 ns capability: warning: `syz-executor2' uses deprecated v2 capabilities in a way that may be insecure device syz2 entered promiscuous mode device syz2 left promiscuous mode kauditd_printk_skb: 23 callbacks suppressed audit: type=1400 audit(1519226918.065:45): avc: denied { map } for pid=6556 comm="syz-executor7" path="/dev/vcs6" dev="devtmpfs" ino=12619 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file permissive=1 audit: type=1400 audit(1519226918.359:46): avc: denied { call } for pid=6670 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 binder_alloc: 6670: binder_alloc_buf, no vma binder: 6670:6678 transaction failed 29189/-3, size 24-8 line 2957 binder: BINDER_SET_CONTEXT_MGR already set binder: 6670:6687 ioctl 40046207 0 returned -16 binder_alloc: 6670: binder_alloc_buf, no vma binder: 6670:6678 transaction failed 29189/-3, size 24-8 line 2957 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29189 netlink: 15 bytes leftover after parsing attributes in process `syz-executor2'. xt_HMARK: proto mask must be zero with L3 mode syz-executor1 (6737) used greatest stack depth: 12224 bytes left audit: type=1400 audit(1519226918.692:47): avc: denied { map } for pid=6794 comm="syz-executor4" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=18314 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 xt_CONNSECMARK: invalid mode: 0 xt_CONNSECMARK: invalid mode: 0 device eql entered promiscuous mode SELinux: unrecognized netlink message: protocol=9 nlmsg_type=24 sclass=netlink_audit_socket pig=6916 comm=syz-executor7 TCP: request_sock_TCPv6: Possible SYN flooding on port 20014. Sending cookies. Check SNMP counters. mmap: syz-executor2 (7042) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. RDS: rds_bind could not find a transport for 224.0.0.1, load rds_tcp or rds_rdma? x_tables: ip6_tables: MASQUERADE target: used from hooks INPUT/OUTPUT, but only usable from POSTROUTING netlink: 7 bytes leftover after parsing attributes in process `syz-executor2'. x_tables: ip6_tables: MASQUERADE target: used from hooks INPUT/OUTPUT, but only usable from POSTROUTING RDS: rds_bind could not find a transport for 224.0.0.1, load rds_tcp or rds_rdma? netlink: 7 bytes leftover after parsing attributes in process `syz-executor2'. audit: type=1400 audit(1519226919.501:48): avc: denied { ioctl } for pid=7063 comm="syz-executor5" path="socket:[19857]" dev="sockfs" ino=19857 ioctlcmd=0x891a scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1519226919.724:49): avc: denied { net_bind_service } for pid=7115 comm="syz-executor2" capability=10 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 NFQUEUE: number of total queues is 0 binder: 7189:7196 transaction failed 29189/-22, size 40-8 line 2842 binder: 7189:7196 BC_INCREFS_DONE u0000000000000000 no match binder: 7189:7196 transaction failed 29189/-22, size 40-8 line 2842 kernel msg: ebtables bug: please report to author: Total nentries is wrong kernel msg: ebtables bug: please report to author: Total nentries is wrong TCP: request_sock_TCPv6: Possible SYN flooding on port 20030. Sending cookies. Check SNMP counters. audit: type=1400 audit(1519226920.163:50): avc: denied { map } for pid=7293 comm="syz-executor6" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=155 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 7282 Comm: syz-executor2 Not tainted 4.16.0-rc2+ #323 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0xbd9/0x2500 fs/userfaultfd.c:430 do_anonymous_page mm/memory.c:3163 [inline] handle_pte_fault mm/memory.c:3977 [inline] __handle_mm_fault+0x32a3/0x3ce0 mm/memory.c:4103 handle_mm_fault+0x35c/0x970 mm/memory.c:4140 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1426 do_page_fault+0xee/0x730 arch/x86/mm/fault.c:1501 page_fault+0x62/0x90 arch/x86/entry/entry_64.S:1122 RIP: 0010:fault_in_pages_readable arch/x86/include/asm/smap.h:58 [inline] RIP: 0010:iov_iter_fault_in_readable+0x1aa/0x420 lib/iov_iter.c:421 RSP: 0018:ffff8801ad14f7e0 EFLAGS: 00010246 RAX: 0000000000010000 RBX: 0000000020011fd2 RCX: ffffffff825c9071 RDX: 0000000000000103 RSI: ffffc90002d41000 RDI: ffff8801ad14fbe0 RBP: ffff8801ad14f8c0 R08: 0000000000000000 R09: 1ffff10035a29ea8 R10: ffff8801ad14f710 R11: ffff8801cd3486d0 R12: 1ffff10035a29eff R13: ffff8801ad14f898 R14: 0000000000000000 R15: ffff8801ad14fbd8 generic_perform_write+0x200/0x600 mm/filemap.c:3128 __generic_file_write_iter+0x366/0x5b0 mm/filemap.c:3263 generic_file_write_iter+0x399/0x790 mm/filemap.c:3291 call_write_iter include/linux/fs.h:1781 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x684/0x970 fs/read_write.c:482 vfs_write+0x189/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 do_syscall_64+0x280/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x453da9 RSP: 002b:00007f60d4751c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007f60d47526d4 RCX: 0000000000453da9 RDX: 0000000000000030 RSI: 0000000020011fd2 RDI: 0000000000000014 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000660 R14: 00000000006f99a0 R15: 0000000000000000 xt_connbytes: Forcing CT accounting to be enabled Option 'Ü¿Ò „ãÞ' to dns_resolver key: bad/missing value Option 'Ü¿Ò „ãÞ' to dns_resolver key: bad/missing value sctp: [Deprecated]: syz-executor0 (pid 7474) Use of int in max_burst socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor0 (pid 7483) Use of int in max_burst socket option. Use struct sctp_assoc_value instead audit: type=1400 audit(1519226921.372:51): avc: denied { transfer } for pid=7549 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 binder_alloc: 7549: binder_alloc_buf, no vma audit: type=1400 audit(1519226921.392:52): avc: denied { ioctl } for pid=7566 comm="syz-executor0" path="socket:[20545]" dev="sockfs" ino=20545 ioctlcmd=0x8918 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 binder: 7549:7559 transaction failed 29189/-3, size 40-8 line 2957 binder: BINDER_SET_CONTEXT_MGR already set binder: 7549:7565 ioctl 40046207 0 returned -16 binder: undelivered TRANSACTION_ERROR: 29189 binder: release 7549:7559 transaction 12 out, still active binder: unexpected work type, 4, not freed binder: undelivered TRANSACTION_COMPLETE binder: send failed reply for transaction 12, target dead SELinux: unrecognized netlink message: protocol=0 nlmsg_type=55920 sclass=netlink_route_socket pig=7601 comm=syz-executor6 device syz3 entered promiscuous mode netlink: 'syz-executor7': attribute type 3 has an invalid length. netlink: 'syz-executor7': attribute type 3 has an invalid length. netlink: 'syz-executor3': attribute type 1 has an invalid length. audit: type=1400 audit(1519226922.668:53): avc: denied { setopt } for pid=7959 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 kauditd_printk_skb: 1 callbacks suppressed audit: type=1400 audit(1519226923.166:55): avc: denied { map } for pid=8145 comm="syz-executor1" path="/dev/sg0" dev="devtmpfs" ino=9110 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 audit: type=1400 audit(1519226923.416:56): avc: denied { getrlimit } for pid=8247 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1