Warning: Permanently added '10.128.15.193' (ECDSA) to the list of known hosts. 2019/04/19 04:38:42 parsed 1 programs 2019/04/19 04:38:44 executed programs: 0 [ 53.829113][ T7981] IPVS: ftp: loaded support on port[0] = 21 [ 53.879408][ T7981] chnl_net:caif_netlink_parms(): no params data found [ 53.914759][ T7981] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.922909][ T7981] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.930769][ T7981] device bridge_slave_0 entered promiscuous mode [ 53.938630][ T7981] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.945768][ T7981] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.953337][ T7981] device bridge_slave_1 entered promiscuous mode [ 53.968328][ T7981] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 53.977893][ T7981] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 53.994063][ T7981] team0: Port device team_slave_0 added [ 54.000799][ T7981] team0: Port device team_slave_1 added [ 54.057600][ T7981] device hsr_slave_0 entered promiscuous mode [ 54.115918][ T7981] device hsr_slave_1 entered promiscuous mode [ 54.172921][ T7981] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.180182][ T7981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.187742][ T7981] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.194767][ T7981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.224210][ T7981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.237135][ T7983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.257687][ T7983] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.266092][ T7983] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.274025][ T7983] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 54.285938][ T7981] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.297869][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.306515][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.313573][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.321549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.331070][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.338251][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.359126][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.367856][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.376476][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.384584][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.392848][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.402485][ T7981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.419503][ T7981] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.510153][ T7989] [ 54.512496][ T7989] ====================================================== [ 54.519488][ T7989] WARNING: possible circular locking dependency detected [ 54.526486][ T7989] 5.1.0-rc5-next-20190418 #28 Not tainted [ 54.532176][ T7989] ------------------------------------------------------ [ 54.539205][ T7989] syz-executor.0/7989 is trying to acquire lock: [ 54.545539][ T7989] 00000000dd27f9c0 (&rp->fetch_lock){+.+.}, at: mon_bin_vma_fault+0x73/0x2d0 [ 54.554296][ T7989] [ 54.554296][ T7989] but task is already holding lock: [ 54.561727][ T7989] 00000000f97ee721 (&mm->mmap_sem){++++}, at: __mm_populate+0x270/0x380 [ 54.570163][ T7989] [ 54.570163][ T7989] which lock already depends on the new lock. [ 54.570163][ T7989] [ 54.580553][ T7989] [ 54.580553][ T7989] the existing dependency chain (in reverse order) is: [ 54.589665][ T7989] [ 54.589665][ T7989] -> #1 (&mm->mmap_sem){++++}: [ 54.596602][ T7989] lock_acquire+0x16f/0x3f0 [ 54.601628][ T7989] __might_fault+0x15e/0x1e0 [ 54.606787][ T7989] _copy_to_user+0x30/0x120 [ 54.611800][ T7989] mon_bin_get_event+0x117/0x450 [ 54.617248][ T7989] mon_bin_ioctl+0xacf/0xc80 [ 54.622337][ T7989] do_vfs_ioctl+0xd6e/0x1390 [ 54.627464][ T7989] ksys_ioctl+0xab/0xd0 [ 54.632123][ T7989] __x64_sys_ioctl+0x73/0xb0 [ 54.637283][ T7989] do_syscall_64+0x103/0x670 [ 54.642394][ T7989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.648777][ T7989] [ 54.648777][ T7989] -> #0 (&rp->fetch_lock){+.+.}: [ 54.655954][ T7989] __lock_acquire+0x239c/0x3fb0 [ 54.661309][ T7989] lock_acquire+0x16f/0x3f0 [ 54.666313][ T7989] __mutex_lock+0xf7/0x1310 [ 54.671356][ T7989] mutex_lock_nested+0x16/0x20 [ 54.676642][ T7989] mon_bin_vma_fault+0x73/0x2d0 [ 54.682090][ T7989] __do_fault+0x116/0x4e0 [ 54.687007][ T7989] __handle_mm_fault+0xf6c/0x3ec0 [ 54.692529][ T7989] handle_mm_fault+0x3b7/0xa90 [ 54.697791][ T7989] __get_user_pages+0x7b6/0x1a40 [ 54.703262][ T7989] populate_vma_page_range+0x20d/0x2a0 [ 54.709215][ T7989] __mm_populate+0x204/0x380 [ 54.714328][ T7989] vm_mmap_pgoff+0x213/0x230 [ 54.719428][ T7989] ksys_mmap_pgoff+0x4aa/0x630 [ 54.724708][ T7989] __x64_sys_mmap+0xe9/0x1b0 [ 54.729919][ T7989] do_syscall_64+0x103/0x670 [ 54.735014][ T7989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 54.741440][ T7989] [ 54.741440][ T7989] other info that might help us debug this: [ 54.741440][ T7989] [ 54.751666][ T7989] Possible unsafe locking scenario: [ 54.751666][ T7989] [ 54.759107][ T7989] CPU0 CPU1 [ 54.764456][ T7989] ---- ---- [ 54.769801][ T7989] lock(&mm->mmap_sem); [ 54.774030][ T7989] lock(&rp->fetch_lock); [ 54.781057][ T7989] lock(&mm->mmap_sem); [ 54.787792][ T7989] lock(&rp->fetch_lock); [ 54.792193][ T7989] [ 54.792193][ T7989] *** DEADLOCK *** [ 54.792193][ T7989] [ 54.800320][ T7989] 1 lock held by syz-executor.0/7989: [ 54.805691][ T7989] #0: 00000000f97ee721 (&mm->mmap_sem){++++}, at: __mm_populate+0x270/0x380 [ 54.814535][ T7989] [ 54.814535][ T7989] stack backtrace: [ 54.820404][ T7989] CPU: 0 PID: 7989 Comm: syz-executor.0 Not tainted 5.1.0-rc5-next-20190418 #28 [ 54.829391][ T7989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 54.839420][ T7989] Call Trace: [ 54.842700][ T7989] dump_stack+0x172/0x1f0 [ 54.847019][ T7989] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 54.853112][ T7989] check_prev_add.constprop.0+0xf11/0x23c0 [ 54.858917][ T7989] ? check_usage+0x570/0x570 [ 54.863591][ T7989] ? depot_save_stack+0x1de/0x460 [ 54.868598][ T7989] ? graph_lock+0x7b/0x200 [ 54.873009][ T7989] ? __lockdep_reset_lock+0x450/0x450 [ 54.878376][ T7989] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 54.884847][ T7989] __lock_acquire+0x239c/0x3fb0 [ 54.889690][ T7989] ? depot_save_stack+0x1de/0x460 [ 54.894689][ T7989] ? mark_held_locks+0xf0/0xf0 [ 54.899514][ T7989] ? __do_fault+0x2b9/0x4e0 [ 54.904100][ T7989] lock_acquire+0x16f/0x3f0 [ 54.908581][ T7989] ? mon_bin_vma_fault+0x73/0x2d0 [ 54.913601][ T7989] ? mon_bin_vma_fault+0x73/0x2d0 [ 54.918609][ T7989] __mutex_lock+0xf7/0x1310 [ 54.923088][ T7989] ? mon_bin_vma_fault+0x73/0x2d0 [ 54.928456][ T7989] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 54.934404][ T7989] ? mon_bin_vma_fault+0x73/0x2d0 [ 54.939539][ T7989] ? mutex_trylock+0x1e0/0x1e0 [ 54.944289][ T7989] ? ptlock_alloc+0x20/0x70 [ 54.948768][ T7989] ? rcu_read_lock_sched_held+0x110/0x130 [ 54.954475][ T7989] ? kmem_cache_alloc+0x32e/0x6f0 [ 54.959530][ T7989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 54.965821][ T7989] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 54.972043][ T7989] mutex_lock_nested+0x16/0x20 [ 54.976826][ T7989] ? mutex_lock_nested+0x16/0x20 [ 54.981779][ T7989] mon_bin_vma_fault+0x73/0x2d0 [ 54.986617][ T7989] __do_fault+0x116/0x4e0 [ 54.990932][ T7989] ? mem_cgroup_try_charge_delay+0x6c/0xa0 [ 54.996721][ T7989] __handle_mm_fault+0xf6c/0x3ec0 [ 55.001731][ T7989] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 55.007255][ T7989] ? find_held_lock+0x35/0x130 [ 55.011999][ T7989] ? handle_mm_fault+0x292/0xa90 [ 55.017010][ T7989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 55.023226][ T7989] ? kasan_check_read+0x11/0x20 [ 55.028094][ T7989] handle_mm_fault+0x3b7/0xa90 [ 55.032849][ T7989] __get_user_pages+0x7b6/0x1a40 [ 55.037864][ T7989] ? follow_page_mask+0x19a0/0x19a0 [ 55.043079][ T7989] ? vma_set_page_prot+0x18c/0x240 [ 55.048177][ T7989] ? memset+0x32/0x40 [ 55.052168][ T7989] populate_vma_page_range+0x20d/0x2a0 [ 55.057752][ T7989] __mm_populate+0x204/0x380 [ 55.062328][ T7989] ? populate_vma_page_range+0x2a0/0x2a0 [ 55.067942][ T7989] ? kasan_check_write+0x14/0x20 [ 55.072866][ T7989] vm_mmap_pgoff+0x213/0x230 [ 55.077444][ T7989] ? vma_is_stack_for_current+0xd0/0xd0 [ 55.082982][ T7989] ? ksys_dup3+0x3e0/0x3e0 [ 55.087381][ T7989] ? _copy_to_user+0xc9/0x120 [ 55.092084][ T7989] ksys_mmap_pgoff+0x4aa/0x630 [ 55.096836][ T7989] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 55.102452][ T7989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 55.107893][ T7989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 55.113335][ T7989] ? do_syscall_64+0x26/0x670 [ 55.118113][ T7989] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 55.124164][ T7989] __x64_sys_mmap+0xe9/0x1b0 [ 55.128776][ T7989] do_syscall_64+0x103/0x670 [ 55.133349][ T7989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 55.139221][ T7989] RIP: 0033:0x458c29 [ 55.143154][ T7989] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [