FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
=============================
CPU: 0 PID: 14695 Comm: syz-executor7 Not tainted 4.16.0-rc1+ #226
WARNING: suspicious RCU usage
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x194/0x257 lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail+0x8c0/0xa40 lib/fault-inject.c:149
4.16.0-rc1+ #226 Not tainted
-----------------------------
./include/linux/rcupdate.h:302 Illegal context switch in RCU read-side critical section!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
should_failslab+0xec/0x120 mm/failslab.c:32
1 lock held by syz-executor1/14693:
slab_pre_alloc_hook mm/slab.h:422 [inline]
slab_alloc mm/slab.c:3365 [inline]
__do_kmalloc mm/slab.c:3703 [inline]
__kmalloc+0x63/0x760 mm/slab.c:3714
#0:
kmalloc_array include/linux/slab.h:631 [inline]
kcalloc include/linux/slab.h:642 [inline]
alloc_pipe_info+0x23f/0x4b0 fs/pipe.c:650
(
rcu_read_lock
splice_direct_to_actor+0x64a/0x820 fs/splice.c:920
){....}
, at: [<0000000030c84c62>] __rds_conn_create+0xe46/0x1b50 net/rds/connection.c:218
do_splice_direct+0x29b/0x3c0 fs/splice.c:1061
stack backtrace:
do_sendfile+0x5c9/0xe80 fs/read_write.c:1413
C_SYSC_sendfile fs/read_write.c:1489 [inline]
compat_SyS_sendfile+0xea/0x1a0 fs/read_write.c:1478
do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline]
do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392
entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139
RIP: 0023:0xf7fa1c79
RSP: 002b:00000000f779d09c EFLAGS: 00000286 ORIG_RAX: 00000000000000bb
RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000000000013
RDX: 0000000020301ff8 RSI: 00000000ffffffff RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
CPU: 1 PID: 14693 Comm: syz-executor1 Not tainted 4.16.0-rc1+ #226
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x194/0x257 lib/dump_stack.c:53
lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4592
rcu_preempt_sleep_check include/linux/rcupdate.h:301 [inline]
___might_sleep+0x385/0x470 kernel/sched/core.c:6098
__might_sleep+0x95/0x190 kernel/sched/core.c:6086
slab_pre_alloc_hook mm/slab.h:420 [inline]
slab_alloc mm/slab.c:3365 [inline]
kmem_cache_alloc_trace+0x299/0x740 mm/slab.c:3605
kmalloc include/linux/slab.h:512 [inline]
kzalloc include/linux/slab.h:701 [inline]
rds_loop_conn_alloc+0xc8/0x380 net/rds/loop.c:126
__rds_conn_create+0x112f/0x1b50 net/rds/connection.c:227
rds_conn_create_outgoing+0x3f/0x50 net/rds/connection.c:309
rds_sendmsg+0xda3/0x2390 net/rds/send.c:1126
sock_sendmsg_nosec net/socket.c:630 [inline]
sock_sendmsg+0xca/0x110 net/socket.c:640
SYSC_sendto+0x361/0x5c0 net/socket.c:1747
SyS_sendto+0x40/0x50 net/socket.c:1715
do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline]
do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392
entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139
RIP: 0023:0xf7f83c79
RSP: 002b:00000000f777f09c EFLAGS: 00000286 ORIG_RAX: 0000000000000171
RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 0000000020218000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020062000
RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
BUG: sleeping function called from invalid context at mm/slab.h:420
in_atomic(): 1, irqs_disabled(): 0, pid: 14693, name: syz-executor1
1 lock held by syz-executor1/14693:
#0: (rcu_read_lock){....}, at: [<0000000030c84c62>] __rds_conn_create+0xe46/0x1b50 net/rds/connection.c:218
CPU: 1 PID: 14693 Comm: syz-executor1 Not tainted 4.16.0-rc1+ #226
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x194/0x257 lib/dump_stack.c:53
___might_sleep+0x2b2/0x470 kernel/sched/core.c:6133
__might_sleep+0x95/0x190 kernel/sched/core.c:6086
slab_pre_alloc_hook mm/slab.h:420 [inline]
slab_alloc mm/slab.c:3365 [inline]
kmem_cache_alloc_trace+0x299/0x740 mm/slab.c:3605
kmalloc include/linux/slab.h:512 [inline]
kzalloc include/linux/slab.h:701 [inline]
rds_loop_conn_alloc+0xc8/0x380 net/rds/loop.c:126
__rds_conn_create+0x112f/0x1b50 net/rds/connection.c:227
rds_conn_create_outgoing+0x3f/0x50 net/rds/connection.c:309
rds_sendmsg+0xda3/0x2390 net/rds/send.c:1126
sock_sendmsg_nosec net/socket.c:630 [inline]
sock_sendmsg+0xca/0x110 net/socket.c:640
SYSC_sendto+0x361/0x5c0 net/socket.c:1747
SyS_sendto+0x40/0x50 net/socket.c:1715
do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline]
do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392
entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139
RIP: 0023:0xf7f83c79
RSP: 002b:00000000f777f09c EFLAGS: 00000286 ORIG_RAX: 0000000000000171
RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 0000000020218000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020062000
RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
QAT: Invalid ioctl
QAT: failed to copy from user cfg_data.
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: failed to copy from user cfg_data.
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 15093 Comm: syz-executor3 Tainted: G W 4.16.0-rc1+ #226
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x194/0x257 lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail+0x8c0/0xa40 lib/fault-inject.c:149
should_failslab+0xec/0x120 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:422 [inline]
slab_alloc mm/slab.c:3365 [inline]
__do_kmalloc mm/slab.c:3703 [inline]
__kmalloc_track_caller+0x5f/0x760 mm/slab.c:3720
memdup_user+0x2c/0x90 mm/util.c:160
strndup_user+0x62/0xb0 mm/util.c:217
SYSC_request_key security/keys/keyctl.c:176 [inline]
SyS_request_key+0xa7/0x2d0 security/keys/keyctl.c:158
do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline]
do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392
netlink: 'syz-executor2': attribute type 21 has an invalid length.
entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139
RIP: 0023:0xf7f86c79
RSP: 002b:00000000f778209c EFLAGS: 00000286 ORIG_RAX: 000000000000011f
RAX: ffffffffffffffda RBX: 0000000020ee7803 RCX: 0000000020366ffb
RDX: 0000000020370000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
SELinux: unrecognized netlink message: protocol=6 nlmsg_type=58446 sclass=netlink_xfrm_socket pig=15141 comm=syz-executor4
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 15145 Comm: syz-executor3 Tainted: G W 4.16.0-rc1+ #226
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x194/0x257 lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail+0x8c0/0xa40 lib/fault-inject.c:149
should_failslab+0xec/0x120 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:422 [inline]
slab_alloc mm/slab.c:3365 [inline]
__do_kmalloc mm/slab.c:3703 [inline]
__kmalloc_track_caller+0x5f/0x760 mm/slab.c:3720
memdup_user+0x2c/0x90 mm/util.c:160
strndup_user+0x62/0xb0 mm/util.c:217
SYSC_request_key security/keys/keyctl.c:186 [inline]
SyS_request_key+0xd6/0x2d0 security/keys/keyctl.c:158
do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline]
do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392
entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139
RIP: 0023:0xf7f86c79
RSP: 002b:00000000f778209c EFLAGS: 00000286 ORIG_RAX: 000000000000011f
RAX: ffffffffffffffda RBX: 0000000020ee7803 RCX: 0000000020366ffb
RDX: 0000000020370000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
IPVS: length: 199 != 24
IPVS: length: 199 != 24
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 15265 Comm: syz-executor6 Tainted: G W 4.16.0-rc1+ #226
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x194/0x257 lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail+0x8c0/0xa40 lib/fault-inject.c:149
should_failslab+0xec/0x120 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:422 [inline]
slab_alloc mm/slab.c:3365 [inline]
kmem_cache_alloc_trace+0x4b/0x740 mm/slab.c:3605
kmalloc include/linux/slab.h:512 [inline]
kzalloc include/linux/slab.h:701 [inline]
tcp_sendmsg_fastopen net/ipv4/tcp.c:1151 [inline]
tcp_sendmsg_locked+0x1f71/0x3c70 net/ipv4/tcp.c:1214
tcp_sendmsg+0x2f/0x50 net/ipv4/tcp.c:1463
inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:764
sock_sendmsg_nosec net/socket.c:630 [inline]
sock_sendmsg+0xca/0x110 net/socket.c:640
SYSC_sendto+0x361/0x5c0 net/socket.c:1747
SyS_sendto+0x40/0x50 net/socket.c:1715
do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline]
do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392
entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139
RIP: 0023:0xf7f35c79
RSP: 002b:00000000f773109c EFLAGS: 00000286 ORIG_RAX: 0000000000000171
RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000020fa0fff
RDX: 0000000000000000 RSI: 0000000020020003 RDI: 00000000204cb000
RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 15293 Comm: syz-executor6 Tainted: G W 4.16.0-rc1+ #226
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:17 [inline]
dump_stack+0x194/0x257 lib/dump_stack.c:53
fail_dump lib/fault-inject.c:51 [inline]
should_fail+0x8c0/0xa40 lib/fault-inject.c:149
should_failslab+0xec/0x120 mm/failslab.c:32
slab_pre_alloc_hook mm/slab.h:422 [inline]
slab_alloc mm/slab.c:3365 [inline]
kmem_cache_alloc+0x47/0x760 mm/slab.c:3539
dst_alloc+0x11f/0x1a0 net/core/dst.c:104
rt_dst_alloc+0xe9/0x520 net/ipv4/route.c:1497
__mkroute_output net/ipv4/route.c:2239 [inline]
ip_route_output_key_hash_rcu+0xa59/0x2f00 net/ipv4/route.c:2467
ip_route_output_key_hash+0x20b/0x370 net/ipv4/route.c:2296
__ip_route_output_key include/net/route.h:125 [inline]
ip_route_output_flow+0x26/0xa0 net/ipv4/route.c:2550
ip_route_connect include/net/route.h:307 [inline]
tcp_v4_connect+0x77b/0x1e70 net/ipv4/tcp_ipv4.c:175
__inet_stream_connect+0x2d4/0xf00 net/ipv4/af_inet.c:620
tcp_sendmsg_fastopen net/ipv4/tcp.c:1168 [inline]
tcp_sendmsg_locked+0x264e/0x3c70 net/ipv4/tcp.c:1214
tcp_sendmsg+0x2f/0x50 net/ipv4/tcp.c:1463
inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:764
sock_sendmsg_nosec net/socket.c:630 [inline]
sock_sendmsg+0xca/0x110 net/socket.c:640
SYSC_sendto+0x361/0x5c0 net/socket.c:1747
SyS_sendto+0x40/0x50 net/socket.c:1715
do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline]
do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392
entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139
RIP: 0023:0xf7f35c79
RSP: 002b:00000000f773109c EFLAGS: 00000286 ORIG_RAX: 0000000000000171
RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000020fa0fff
RDX: 0000000000000000 RSI: 0000000020020003 RDI: 00000000204cb000
RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
binder: 15394:15397 BC_FREE_BUFFER u0000000000000000 no match
TCP: request_sock_TCPv6: Possible SYN flooding on port 20022. Sending cookies. Check SNMP counters.
binder: 15394:15397 BC_FREE_BUFFER u0000000000000000 no match
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
audit: type=1400 audit(1518859890.308:101): avc: denied { getopt } for pid=15601 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
encrypted_key: insufficient parameters specified
encrypted_key: insufficient parameters specified
tmpfs: No value for mount option ',4'
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pig=15747 comm=syz-executor1
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pig=15756 comm=syz-executor1
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pig=15784 comm=syz-executor1
binder: 15932:15949 DecRefs 0 refcount change on invalid ref 0 ret -22
binder_alloc: binder_alloc_mmap_handler: 15932 20000000-20002000 already mapped failed -16
binder: BINDER_SET_CONTEXT_MGR already set
binder: 15932:15949 ioctl 40046207 0 returned -16
binder: 15932:15959 DecRefs 0 refcount change on invalid ref 0 ret -22
sit: non-ECT from 0.0.0.0 with TOS=0x3
sit: non-ECT from 0.0.0.0 with TOS=0x3
binder: 16083 RLIMIT_NICE not set
binder: BINDER_SET_CONTEXT_MGR already set
binder: 16081:16083 ioctl 40046207 0 returned -16
binder: undelivered TRANSACTION_COMPLETE
audit: type=1400 audit(1518859892.782:102): avc: denied { net_raw } for pid=16135 comm="syz-executor6" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
audit: type=1400 audit(1518859892.783:103): avc: denied { dac_read_search } for pid=16136 comm="syz-executor1" capability=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
audit: type=1400 audit(1518859892.809:104): avc: denied { dac_override } for pid=16146 comm="syz-executor7" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
audit: type=1400 audit(1518859892.809:105): avc: denied { map } for pid=16157 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
audit: type=1400 audit(1518859892.859:106): avc: denied { net_admin } for pid=11811 comm="syz-executor7" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
audit: type=1400 audit(1518859892.919:107): avc: denied { dac_read_search } for pid=4219 comm="syz-executor1" capability=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
audit: type=1400 audit(1518859892.920:108): avc: denied { dac_override } for pid=4219 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
audit: type=1400 audit(1518859892.922:109): avc: denied { net_admin } for pid=4219 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1
audit: type=1400 audit(1518859892.932:110): avc: denied { name_connect } for pid=16141 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1
sctp: [Deprecated]: syz-executor1 (pid 16219) Use of struct sctp_assoc_value in delayed_ack socket option.
Use struct sctp_sack_info instead
sctp: [Deprecated]: syz-executor1 (pid 16219) Use of struct sctp_assoc_value in delayed_ack socket option.
Use struct sctp_sack_info instead