Warning: Permanently added '10.128.1.70' (ECDSA) to the list of known hosts. executing program [ 66.553327][ T8443] BUG: sleeping function called from invalid context at lib/iov_iter.c:619 [ 66.562170][ T8443] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 8443, name: syz-executor700 [ 66.572107][ T8443] 2 locks held by syz-executor700/8443: [ 66.577746][ T8443] #0: ffff888028fa0d00 (&u->iolock){+.+.}-{3:3}, at: unix_stream_read_generic+0x16c6/0x2190 [ 66.588005][ T8443] #1: ffff888028fa0df0 (&u->lock){+.+.}-{2:2}, at: unix_stream_read_generic+0x16d0/0x2190 [ 66.598192][ T8443] Preemption disabled at: [ 66.598203][ T8443] [<0000000000000000>] 0x0 [ 66.606919][ T8443] CPU: 1 PID: 8443 Comm: syz-executor700 Not tainted 5.14.0-rc3-syzkaller #0 [ 66.615661][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.625697][ T8443] Call Trace: [ 66.628963][ T8443] dump_stack_lvl+0xcd/0x134 [ 66.633544][ T8443] ___might_sleep.cold+0x1f1/0x237 [ 66.638643][ T8443] __might_fault+0x6e/0x180 [ 66.643134][ T8443] _copy_to_iter+0x199/0x1600 [ 66.647802][ T8443] ? _copy_from_iter_nocache+0x12c0/0x12c0 [ 66.653597][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 66.659566][ T8443] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 66.665795][ T8443] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 66.672028][ T8443] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 66.678254][ T8443] ? __phys_addr+0xc4/0x140 [ 66.682742][ T8443] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 66.689001][ T8443] ? __phys_addr_symbol+0x2c/0x70 [ 66.694030][ T8443] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 66.699736][ T8443] ? __check_object_size+0x16e/0x3f0 [ 66.705017][ T8443] simple_copy_to_iter+0x4c/0x70 [ 66.709951][ T8443] __skb_datagram_iter+0x10f/0x770 [ 66.715053][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 66.720515][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 66.725702][ T8443] unix_stream_read_actor+0x78/0xc0 [ 66.730905][ T8443] unix_stream_read_generic+0x17cd/0x2190 [ 66.736617][ T8443] ? __lock_acquire+0xbc2/0x54a0 [ 66.741560][ T8443] ? __lock_acquire+0x162f/0x54a0 [ 66.746569][ T8443] ? unix_stream_sendmsg+0xfc0/0xfc0 [ 66.751853][ T8443] unix_stream_recvmsg+0xb1/0xf0 [ 66.756777][ T8443] ? unix_stream_splice_read+0x1f0/0x1f0 [ 66.762402][ T8443] ? unix_copy_addr+0x100/0x100 [ 66.767249][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 66.773482][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 66.778938][ T8443] ? unix_stream_splice_read+0x1f0/0x1f0 [ 66.784560][ T8443] ____sys_recvmsg+0x2c4/0x600 [ 66.789739][ T8443] ? kernel_recvmsg+0x160/0x160 [ 66.794580][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 66.800814][ T8443] ? __import_iovec+0x2b5/0x580 [ 66.805647][ T8443] ? aa_af_perm+0x230/0x230 [ 66.810167][ T8443] ? import_iovec+0x10c/0x150 [ 66.814839][ T8443] ___sys_recvmsg+0x127/0x200 [ 66.819502][ T8443] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 66.825118][ T8443] ? mark_lock+0xef/0x17b0 [ 66.829522][ T8443] ? lock_chain_count+0x20/0x20 [ 66.834370][ T8443] ? __lock_acquire+0xbc2/0x54a0 [ 66.839296][ T8443] ? ___sys_sendmsg+0x105/0x170 [ 66.844133][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 66.850360][ T8443] ? __fget_light+0x215/0x280 [ 66.855025][ T8443] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 66.861253][ T8443] do_recvmmsg+0x24d/0x6d0 [ 66.865656][ T8443] ? ___sys_recvmsg+0x200/0x200 [ 66.870505][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 66.876468][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 66.882434][ T8443] ? lock_downgrade+0x6e0/0x6e0 [ 66.887277][ T8443] ? __context_tracking_exit+0xb8/0xe0 [ 66.892730][ T8443] ? lock_downgrade+0x6e0/0x6e0 [ 66.897584][ T8443] ? lock_downgrade+0x6e0/0x6e0 [ 66.902434][ T8443] __x64_sys_recvmmsg+0x20b/0x260 [ 66.907442][ T8443] ? __do_sys_socketcall+0x590/0x590 [ 66.912713][ T8443] ? syscall_enter_from_user_mode+0x21/0x70 [ 66.918597][ T8443] do_syscall_64+0x35/0xb0 [ 66.923001][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 66.928879][ T8443] RIP: 0033:0x43ef39 [ 66.932756][ T8443] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 66.952353][ T8443] RSP: 002b:00007ffca8776d68 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 66.960754][ T8443] RAX: ffffffffffffffda RBX: 0000000000400488 RCX: 000000000043ef39 [ 66.968721][ T8443] RDX: 0000000000000700 RSI: 0000000020001140 RDI: 0000000000000004 [ 66.976698][ T8443] RBP: 0000000000402f20 R08: 0000000000000000 R09: 0000000000400488 [ 66.984673][ T8443] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000402fb0 [ 66.992649][ T8443] R13: 0000000000000000 R14: 00000000004ac018 R15: 0000000000400488 [ 67.000801][ T8443] [ 67.003123][ T8443] ============================= [ 67.007956][ T8443] [ BUG: Invalid wait context ] [ 67.012786][ T8443] 5.14.0-rc3-syzkaller #0 Tainted: G W [ 67.019544][ T8443] ----------------------------- [ 67.024369][ T8443] syz-executor700/8443 is trying to lock: [ 67.030066][ T8443] ffff8880212b6a28 (&mm->mmap_lock#2){++++}-{3:3}, at: __might_fault+0xa3/0x180 [ 67.039108][ T8443] other info that might help us debug this: [ 67.044978][ T8443] context-{4:4} [ 67.048418][ T8443] 2 locks held by syz-executor700/8443: [ 67.053949][ T8443] #0: ffff888028fa0d00 (&u->iolock){+.+.}-{3:3}, at: unix_stream_read_generic+0x16c6/0x2190 [ 67.064121][ T8443] #1: ffff888028fa0df0 (&u->lock){+.+.}-{2:2}, at: unix_stream_read_generic+0x16d0/0x2190 [ 67.074119][ T8443] stack backtrace: [ 67.077818][ T8443] CPU: 1 PID: 8443 Comm: syz-executor700 Tainted: G W 5.14.0-rc3-syzkaller #0 [ 67.087957][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.098011][ T8443] Call Trace: [ 67.101280][ T8443] dump_stack_lvl+0xcd/0x134 [ 67.105868][ T8443] __lock_acquire.cold+0x213/0x3ab [ 67.110979][ T8443] ? lock_chain_count+0x20/0x20 [ 67.115823][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 67.121794][ T8443] lock_acquire+0x1ab/0x510 [ 67.126286][ T8443] ? __might_fault+0xa3/0x180 [ 67.130952][ T8443] ? lock_release+0x720/0x720 [ 67.135616][ T8443] ? dump_stack_lvl+0x120/0x134 [ 67.140459][ T8443] ? dump_stack_lvl+0x12a/0x134 [ 67.145301][ T8443] ? dump_stack_lvl+0x12c/0x134 [ 67.150143][ T8443] __might_fault+0x106/0x180 [ 67.154728][ T8443] ? __might_fault+0xa3/0x180 [ 67.159391][ T8443] _copy_to_iter+0x199/0x1600 [ 67.164057][ T8443] ? _copy_from_iter_nocache+0x12c0/0x12c0 [ 67.169851][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 67.175818][ T8443] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 67.182047][ T8443] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 67.188276][ T8443] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 67.194505][ T8443] ? __phys_addr+0xc4/0x140 [ 67.199003][ T8443] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 67.205234][ T8443] ? __phys_addr_symbol+0x2c/0x70 [ 67.210248][ T8443] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 67.215956][ T8443] ? __check_object_size+0x16e/0x3f0 [ 67.221243][ T8443] simple_copy_to_iter+0x4c/0x70 [ 67.226179][ T8443] __skb_datagram_iter+0x10f/0x770 [ 67.231284][ T8443] ? zerocopy_sg_from_iter+0x110/0x110 [ 67.236735][ T8443] skb_copy_datagram_iter+0x40/0x50 [ 67.241929][ T8443] unix_stream_read_actor+0x78/0xc0 [ 67.247120][ T8443] unix_stream_read_generic+0x17cd/0x2190 [ 67.252834][ T8443] ? __lock_acquire+0xbc2/0x54a0 [ 67.257761][ T8443] ? __lock_acquire+0x162f/0x54a0 [ 67.262774][ T8443] ? unix_stream_sendmsg+0xfc0/0xfc0 [ 67.268059][ T8443] unix_stream_recvmsg+0xb1/0xf0 [ 67.272986][ T8443] ? unix_stream_splice_read+0x1f0/0x1f0 [ 67.278624][ T8443] ? unix_copy_addr+0x100/0x100 [ 67.283466][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.289693][ T8443] ? security_socket_recvmsg+0x8f/0xc0 [ 67.295146][ T8443] ? unix_stream_splice_read+0x1f0/0x1f0 [ 67.300773][ T8443] ____sys_recvmsg+0x2c4/0x600 [ 67.305526][ T8443] ? kernel_recvmsg+0x160/0x160 [ 67.310364][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.316593][ T8443] ? __import_iovec+0x2b5/0x580 [ 67.321431][ T8443] ? aa_af_perm+0x230/0x230 [ 67.325930][ T8443] ? import_iovec+0x10c/0x150 [ 67.330610][ T8443] ___sys_recvmsg+0x127/0x200 [ 67.335293][ T8443] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 67.340915][ T8443] ? mark_lock+0xef/0x17b0 [ 67.345321][ T8443] ? lock_chain_count+0x20/0x20 [ 67.350165][ T8443] ? __lock_acquire+0xbc2/0x54a0 [ 67.355090][ T8443] ? ___sys_sendmsg+0x105/0x170 [ 67.359932][ T8443] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 67.366166][ T8443] ? __fget_light+0x215/0x280 [ 67.370835][ T8443] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 67.377065][ T8443] do_recvmmsg+0x24d/0x6d0 [ 67.381470][ T8443] ? ___sys_recvmsg+0x200/0x200 [ 67.386833][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 67.392802][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 67.398773][ T8443] ? lock_downgrade+0x6e0/0x6e0 [ 67.403615][ T8443] ? __context_tracking_exit+0xb8/0xe0 [ 67.409066][ T8443] ? lock_downgrade+0x6e0/0x6e0 [ 67.413906][ T8443] ? lock_downgrade+0x6e0/0x6e0 [ 67.418746][ T8443] __x64_sys_recvmmsg+0x20b/0x260 [ 67.423764][ T8443] ? __do_sys_socketcall+0x590/0x590 [ 67.429041][ T8443] ? syscall_enter_from_user_mode+0x21/0x70 [ 67.434929][ T8443] do_syscall_64+0x35/0xb0 [ 67.439331][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 67.445216][ T8443] RIP: 0033:0x43ef39 [ 67.449095][ T8443] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 67.468689][ T8443] RSP: 002b:00007ffca8776d68 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 67.477089][ T8443] RAX: ffffffffffffffda RBX: 0000000000400488 RCX: 000000000043ef39 [ 67.485045][ T8443] RDX: 0000000000000700 RSI: 0000000020001140 RDI: 0000000000000004 [ 67.493016][ T8443] RBP: 0000000000402f20 R08: 0000000000000000 R09: 0000000000400488 [ 67.500976][ T8443] R10: 0000000000000007 R11: 0000000000000246 R12: 0000