====================================================== WARNING: possible circular locking dependency detected 4.15.0-rc3+ #222 Not tainted ------------------------------------------------------ syz-executor7/26161 is trying to acquire lock: (&tty->ldisc_sem){++++}, at: [<0000000019833594>] ldsem_down_read+0x37/0x40 drivers/tty/tty_ldsem.c:365 but task is already holding lock: (&pipe->mutex/1){+.+.}, at: [<00000000b96ef030>] pipe_lock_nested fs/pipe.c:67 [inline] (&pipe->mutex/1){+.+.}, at: [<00000000b96ef030>] pipe_lock+0x56/0x70 fs/pipe.c:75 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #6 (&pipe->mutex/1){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1a80 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 pipe_lock_nested fs/pipe.c:67 [inline] pipe_lock+0x56/0x70 fs/pipe.c:75 iter_file_splice_write+0x264/0xf30 fs/splice.c:699 do_splice_from fs/splice.c:851 [inline] do_splice fs/splice.c:1147 [inline] SYSC_splice fs/splice.c:1402 [inline] SyS_splice+0x7d5/0x1630 fs/splice.c:1382 entry_SYSCALL_64_fastpath+0x1f/0x96 -> #5 (sb_writers){.+.+}: inode_lock_nested include/linux/fs.h:748 [inline] filename_create+0x192/0x520 fs/namei.c:3625 kern_path_create+0x33/0x40 fs/namei.c:3666 handle_create+0xc0/0x760 drivers/base/devtmpfs.c:203 handle drivers/base/devtmpfs.c:373 [inline] devtmpfsd+0x3b4/0x4b0 drivers/base/devtmpfs.c:399 kthread+0x37a/0x440 kernel/kthread.c:238 -> #4 ((completion)&req.done){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 complete_acquire include/linux/completion.h:40 [inline] __wait_for_common kernel/sched/completion.c:109 [inline] wait_for_common kernel/sched/completion.c:123 [inline] wait_for_completion+0xcb/0x7b0 kernel/sched/completion.c:144 devtmpfs_create_node+0x32b/0x4a0 drivers/base/devtmpfs.c:115 device_add+0x120f/0x1640 drivers/base/core.c:1824 device_register+0x1d/0x20 drivers/base/core.c:1905 tty_register_device_attr+0x422/0x740 drivers/tty/tty_io.c:2956 tty_port_register_device_attr_serdev+0x100/0x140 drivers/tty/tty_port.c:166 uart_add_one_port+0xa7a/0x15a0 drivers/tty/serial/serial_core.c:2783 serial8250_register_8250_port+0xfac/0x1990 drivers/tty/serial/8250/8250_core.c:1045 serial_pnp_probe+0x5e7/0xac0 drivers/tty/serial/8250/8250_pnp.c:480 pnp_device_probe+0x15f/0x250 drivers/pnp/driver.c:109 really_probe drivers/base/dd.c:424 [inline] driver_probe_device+0x71b/0xae0 drivers/base/dd.c:566 __driver_attach+0x181/0x1c0 drivers/base/dd.c:800 bus_for_each_dev+0x154/0x1e0 drivers/base/bus.c:313 driver_attach+0x3d/0x50 drivers/base/dd.c:819 bus_add_driver+0x466/0x620 drivers/base/bus.c:669 driver_register+0x1bf/0x3c0 drivers/base/driver.c:168 pnp_register_driver+0x75/0xa0 drivers/pnp/driver.c:272 serial8250_pnp_init+0x15/0x20 drivers/tty/serial/8250/8250_pnp.c:537 serial8250_init+0x8f/0x270 drivers/tty/serial/8250/8250_core.c:1122 do_one_initcall+0x9e/0x330 init/main.c:831 do_initcall_level init/main.c:897 [inline] do_initcalls init/main.c:905 [inline] do_basic_setup init/main.c:923 [inline] kernel_init_freeable+0x469/0x521 init/main.c:1071 kernel_init+0x13/0x172 init/main.c:998 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:441 -> #3 (&port->mutex){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1a80 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 uart_set_termios+0x8f/0x5b0 drivers/tty/serial/serial_core.c:1416 tty_set_termios+0x6d4/0xa40 drivers/tty/tty_ioctl.c:334 set_termios+0x377/0x6b0 drivers/tty/tty_ioctl.c:414 tty_mode_ioctl+0x9fb/0xb10 drivers/tty/tty_ioctl.c:749 n_tty_ioctl_helper+0x40/0x360 drivers/tty/tty_ioctl.c:940 n_tty_ioctl+0x148/0x2d0 drivers/tty/n_tty.c:2435 tty_ioctl+0x32e/0x1600 drivers/tty/tty_io.c:2638 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x1f/0x96 -> #2 (&tty->termios_rwsem){++++}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 down_write+0x87/0x120 kernel/locking/rwsem.c:70 n_tty_flush_buffer+0x21/0x320 drivers/tty/n_tty.c:357 tty_buffer_flush+0x29a/0x390 drivers/tty/tty_buffer.c:233 tty_ldisc_flush+0x25/0x70 drivers/tty/tty_ldisc.c:418 tty_port_close_start.part.4+0x1cd/0x4e0 drivers/tty/tty_port.c:603 tty_port_close_start drivers/tty/tty_port.c:646 [inline] tty_port_close+0x3f/0x80 drivers/tty/tty_port.c:640 uart_close+0x77/0x1d0 drivers/tty/serial/serial_core.c:1487 tty_release+0x446/0x14c0 drivers/tty/tty_io.c:1639 __fput+0x333/0x7f0 fs/file_table.c:210 ____fput+0x15/0x20 fs/file_table.c:244 task_work_run+0x199/0x270 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x296/0x310 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] syscall_return_slowpath+0x490/0x550 arch/x86/entry/common.c:264 entry_SYSCALL_64_fastpath+0x94/0x96 -> #1 (&buf->lock){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1a80 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 tty_buffer_flush+0xbd/0x390 drivers/tty/tty_buffer.c:222 tty_ldisc_flush+0x25/0x70 drivers/tty/tty_ldisc.c:418 tty_port_close_start.part.4+0x1cd/0x4e0 drivers/tty/tty_port.c:603 tty_port_close_start drivers/tty/tty_port.c:646 [inline] tty_port_close+0x3f/0x80 drivers/tty/tty_port.c:640 uart_close+0x77/0x1d0 drivers/tty/serial/serial_core.c:1487 tty_release+0x446/0x14c0 drivers/tty/tty_io.c:1639 __fput+0x333/0x7f0 fs/file_table.c:210 ____fput+0x15/0x20 fs/file_table.c:244 task_work_run+0x199/0x270 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x296/0x310 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] syscall_return_slowpath+0x490/0x550 arch/x86/entry/common.c:264 entry_SYSCALL_64_fastpath+0x94/0x96 -> #0 (&tty->ldisc_sem){++++}: check_prevs_add kernel/locking/lockdep.c:2031 [inline] validate_chain kernel/locking/lockdep.c:2473 [inline] __lock_acquire+0x3498/0x47f0 kernel/locking/lockdep.c:3500 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __ldsem_down_read_nested+0xd1/0xa90 drivers/tty/tty_ldsem.c:325 ldsem_down_read+0x37/0x40 drivers/tty/tty_ldsem.c:365 tty_ldisc_ref_wait+0x25/0x80 drivers/tty/tty_ldisc.c:277 tty_read+0xf8/0x250 drivers/tty/tty_io.c:852 do_loop_readv_writev fs/read_write.c:673 [inline] do_iter_read+0x3db/0x5b0 fs/read_write.c:897 vfs_readv+0x121/0x1c0 fs/read_write.c:959 kernel_readv fs/splice.c:361 [inline] default_file_splice_read+0x508/0xae0 fs/splice.c:416 do_splice_to+0x110/0x170 fs/splice.c:880 do_splice fs/splice.c:1173 [inline] SYSC_splice fs/splice.c:1402 [inline] SyS_splice+0x11a8/0x1630 fs/splice.c:1382 entry_SYSCALL_64_fastpath+0x1f/0x96 other info that might help us debug this: Chain exists of: &tty->ldisc_sem --> sb_writers --> &pipe->mutex/1 Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&pipe->mutex/1); lock(sb_writers); lock(&pipe->mutex/1); lock(&tty->ldisc_sem); *** DEADLOCK *** 1 lock held by syz-executor7/26161: #0: (&pipe->mutex/1){+.+.}, at: [<00000000b96ef030>] pipe_lock_nested fs/pipe.c:67 [inline] #0: (&pipe->mutex/1){+.+.}, at: [<00000000b96ef030>] pipe_lock+0x56/0x70 fs/pipe.c:75 stack backtrace: CPU: 1 PID: 26161 Comm: syz-executor7 Not tainted 4.15.0-rc3+ #222 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 print_circular_bug+0x42d/0x610 kernel/locking/lockdep.c:1271 check_prev_add+0x666/0x15f0 kernel/locking/lockdep.c:1914 check_prevs_add kernel/locking/lockdep.c:2031 [inline] validate_chain kernel/locking/lockdep.c:2473 [inline] __lock_acquire+0x3498/0x47f0 kernel/locking/lockdep.c:3500 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __ldsem_down_read_nested+0xd1/0xa90 drivers/tty/tty_ldsem.c:325 ldsem_down_read+0x37/0x40 drivers/tty/tty_ldsem.c:365 tty_ldisc_ref_wait+0x25/0x80 drivers/tty/tty_ldisc.c:277 tty_read+0xf8/0x250 drivers/tty/tty_io.c:852 do_loop_readv_writev fs/read_write.c:673 [inline] do_iter_read+0x3db/0x5b0 fs/read_write.c:897 vfs_readv+0x121/0x1c0 fs/read_write.c:959 kernel_readv fs/splice.c:361 [inline] default_file_splice_read+0x508/0xae0 fs/splice.c:416 do_splice_to+0x110/0x170 fs/splice.c:880 do_splice fs/splice.c:1173 [inline] SYSC_splice fs/splice.c:1402 [inline] SyS_splice+0x11a8/0x1630 fs/splice.c:1382 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007fa99a58ac58 EFLAGS: 00000212 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 0000000000758048 RCX: 0000000000452a39 RDX: 000000000000001a RSI: 0000000000000000 RDI: 0000000000000018 RBP: 0000000000758048 R08: 0000000000000200 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007fa99a58b9c0 R15: 0000000000000000 audit: type=1400 audit(1513335858.032:1518): avc: denied { dyntransition } for pid=26195 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0 tclass=process permissive=1 netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008d data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008c data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008b data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008a data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000089 data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000088 data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000087 data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000086 data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000020 data 0xe0050031 kvm [26204]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000020 data 0xe0050031 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26238 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26238 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26277 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26290 comm=syz-executor5 QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26321 comm=syz-executor5 audit: type=1400 audit(1513335859.592:1519): avc: denied { accept } for pid=26317 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26321 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26371 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26371 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26397 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44760 sclass=netlink_audit_socket pig=26397 comm=syz-executor5 audit: type=1400 audit(1513335861.446:1520): avc: denied { map } for pid=26776 comm="syz-executor3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=103 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 26991 Comm: syz-executor5 Not tainted 4.15.0-rc3+ #222 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 ptlock_alloc+0x24/0x70 mm/memory.c:4686 ptlock_init include/linux/mm.h:1790 [inline] pgtable_page_ctor include/linux/mm.h:1824 [inline] pte_alloc_one+0x59/0x100 arch/x86/mm/pgtable.c:32 do_huge_pmd_anonymous_page+0xc23/0x1b00 mm/huge_memory.c:689 create_huge_pmd mm/memory.c:3828 [inline] __handle_mm_fault+0x1b9f/0x3e20 mm/memory.c:4032 handle_mm_fault+0x334/0x8d0 mm/memory.c:4098 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1094 RIP: 0033:0x401819 RSP: 002b:00007f58b36ddb90 EFLAGS: 00010246 RAX: 0000000020000000 RBX: 0000000000000032 RCX: 0000000000000000 RDX: 01d44f7ed4c7a253 RSI: 0000000000000000 RDI: 00007f58b36de608 RBP: 0000000020839000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000032 R11: 0000000000000000 R12: 00000000006f66c8 R13: 0000000000000013 R14: 00007f58b36de6d4 R15: ffffffffffffffff syz-executor5 invoked oom-killer: gfp_mask=0x0(), nodemask=(null), order=0, oom_score_adj=0 syz-executor5 cpuset=/ mems_allowed=0 CPU: 0 PID: 26991 Comm: syz-executor5 Not tainted 4.15.0-rc3+ #222 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 dump_header+0x28c/0xe1e mm/oom_kill.c:437 oom_kill_process+0x8b5/0x14a0 mm/oom_kill.c:865 out_of_memory+0x86d/0x1220 mm/oom_kill.c:1079 pagefault_out_of_memory+0x135/0x152 mm/oom_kill.c:1110 mm_fault_error+0xd6/0x2c0 arch/x86/mm/fault.c:1053 __do_page_fault+0xb4d/0xc90 arch/x86/mm/fault.c:1457 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1094 RIP: 0033:0x401819 RSP: 002b:00007f58b36ddb90 EFLAGS: 00010246 RAX: 0000000020000000 RBX: 0000000000000032 RCX: 0000000000000000 RDX: 01d44f7ed4c7a253 RSI: 0000000000000000 RDI: 00007f58b36de608 RBP: 0000000020839000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000032 R11: 0000000000000000 R12: 00000000006f66c8 R13: 0000000000000013 R14: 00007f58b36de6d4 R15: ffffffffffffffff Mem-Info: active_anon:143029 inactive_anon:34 isolated_anon:0 active_file:3988 inactive_file:7545 isolated_file:0 unevictable:0 dirty:235 writeback:0 unstable:0 slab_reclaimable:9056 slab_unreclaimable:99502 mapped:23032 shmem:45 pagetables:989 bounce:0 free:1344322 free_pcp:478 free_cma:0 Node 0 active_anon:572116kB inactive_anon:136kB active_file:15952kB inactive_file:30180kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:92128kB dirty:940kB writeback:0kB shmem:180kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 49152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:160kB low:200kB high:240kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2882 6395 6395 Node 0 DMA32 free:2953068kB min:30384kB low:37980kB high:45576kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953960kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:892kB local_pcp:304kB free_cma:0kB lowmem_reserve[]: 0 0 3513 3513 Node 0 Normal free:2408416kB min:37032kB low:46288kB high:55544kB active_anon:572116kB inactive_anon:136kB active_file:15952kB inactive_file:30180kB unevictable:0kB writepending:940kB present:4718592kB managed:3597640kB mlocked:0kB kernel_stack:4320kB pagetables:3956kB bounce:0kB free_pcp:1056kB local_pcp:408kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 3*4kB (UM) 2*8kB (UM) 3*16kB (M) 1*32kB (U) 4*64kB (UM) 4*128kB (UM) 4*256kB (M) 4*512kB (UM) 2*1024kB (UM) 3*2048kB (UM) 718*4096kB (M) = 2953068kB Node 0 Normal: 3091*4kB (UME) 339*8kB (UME) 1469*16kB (UME) 1781*32kB (UME) 1116*64kB (UME) 214*128kB (UME) 62*256kB (UM) 12*512kB (UME) 10*1024kB (UM) 9*2048kB (UME) 535*4096kB (UM) = 2436436kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 11577 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 324102 pages reserved [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1601] 0 1601 5366 639 90112 0 -1000 udevd [ 2868] 0 2868 2493 811 61440 0 0 dhclient [ 2999] 0 2999 30605 713 126976 0 0 rsyslogd [ 3054] 0 3054 4725 516 81920 0 0 cron [ 3072] 0 3072 3736 45 69632 0 0 mcstransd [ 3082] 0 3082 12927 1535 135168 0 0 restorecond [ 3096] 0 3096 12490 808 151552 0 -1000 sshd [ 3124] 0 3124 3694 469 77824 0 0 getty [ 3125] 0 3125 3694 476 69632 0 0 getty [ 3126] 0 3126 3694 464 77824 0 0 getty [ 3127] 0 3127 3694 465 77824 0 0 getty [ 3128] 0 3128 3694 446 73728 0 0 getty [ 3129] 0 3129 3694 465 69632 0 0 getty [ 3130] 0 3130 3649 447 73728 0 0 getty [ 3133] 0 3133 5728 954 90112 0 -1000 udevd [ 3134] 0 3134 5761 974 90112 0 -1000 udevd [ 3147] 0 3147 17856 1385 180224 0 0 sshd [ 3149] 0 3149 223347 129058 1527808 0 0 syz-fuzzer [ 3195] 0 3195 7361 230 65536 0 0 syz-executor7 [ 3196] 0 3196 7361 231 69632 0 0 syz-executor0 [ 3197] 0 3197 7361 230 69632 0 0 syz-executor1 [ 3198] 0 3198 7361 231 65536 0 0 syz-executor6 [ 3199] 0 3199 7361 230 69632 0 0 syz-executor5 [ 3200] 0 3200 7361 232 65536 0 0 syz-executor2 [ 3205] 0 3205 7361 232 65536 0 0 syz-executor4 [ 3207] 0 3207 5365 595 86016 0 -1000 udevd [ 3210] 0 3210 5365 594 86016 0 -1000 udevd [ 3230] 0 3230 5365 570 86016 0 -1000 udevd [ 3236] 0 3236 5365 279 86016 0 -1000 udevd [ 3242] 0 3242 5365 570 86016 0 -1000 udevd [ 3360] 0 3360 7361 2271 73728 0 0 syz-executor7 [ 3364] 0 3364 7361 2273 77824 0 0 syz-executor0 [ 3390] 0 3390 7361 2274 77824 0 0 syz-executor1 [ 3394] 0 3394 7361 2273 73728 0 0 syz-executor4 [ 3395] 0 3395 7361 2272 73728 0 0 syz-executor6 [ 3396] 0 3396 7361 2274 73728 0 0 syz-executor2 [ 3402] 0 3402 7361 2281 77824 0 0 syz-executor5 [26776] 0 26776 7361 232 65536 0 0 syz-executor3 [26861] 0 26861 7361 2271 73728 0 0 syz-executor3 [26991] 0 26988 11489 2724 81920 0 0 syz-executor5 Out of memory: Kill process 3149 (syz-fuzzer) score 76 or sacrifice child Killed process 3196 (syz-executor0) total-vm:29444kB, anon-rss:60kB, file-rss:864kB, shmem-rss:0kB oom_reaper: reaped process 3196 (syz-executor0), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 27395 Comm: syz-executor1 Not tainted 4.15.0-rc3+ #222 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 __build_skb+0x9d/0x450 net/core/skbuff.c:281 __napi_alloc_skb+0x173/0x2c0 net/core/skbuff.c:482 napi_alloc_skb include/linux/skbuff.h:2638 [inline] napi_get_frags+0x61/0x130 net/core/dev.c:5021 tun_napi_alloc_frags drivers/net/tun.c:1296 [inline] tun_get_user+0x1ba2/0x36d0 drivers/net/tun.c:1637 tun_chr_write_iter+0xbf/0x160 drivers/net/tun.c:1800 call_write_iter include/linux/fs.h:1772 [inline] do_iter_readv_writev+0x531/0x7f0 fs/read_write.c:653 do_iter_write+0x15a/0x540 fs/read_write.c:932 vfs_writev+0x18a/0x340 fs/read_write.c:977 do_writev+0xfc/0x2a0 fs/read_write.c:1012 SYSC_writev fs/read_write.c:1085 [inline] SyS_writev+0x27/0x30 fs/read_write.c:1082 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452911 RSP: 002b:00007f205bc87b80 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 00007f205bc87aa0 RCX: 0000000000452911 RDX: 0000000000000001 RSI: 00007f205bc87bd0 RDI: 0000000000000012 RBP: 00007f205bc87a90 R08: 0000000000000000 R09: 0000000000000000 R10: 000000000000002a R11: 0000000000000293 R12: 00000000004b75fb R13: 00007f205bc87bc8 R14: 00000000004b75fb R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 27439 Comm: syz-executor6 Not tainted 4.15.0-rc3+ #222 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 __build_skb+0x9d/0x450 net/core/skbuff.c:281 __napi_alloc_skb+0x173/0x2c0 net/core/skbuff.c:482 napi_alloc_skb include/linux/skbuff.h:2638 [inline] napi_get_frags+0x61/0x130 net/core/dev.c:5021 tun_napi_alloc_frags drivers/net/tun.c:1296 [inline] tun_get_user+0x1ba2/0x36d0 drivers/net/tun.c:1637 tun_chr_write_iter+0xbf/0x160 drivers/net/tun.c:1800 call_write_iter include/linux/fs.h:1772 [inline] do_iter_readv_writev+0x531/0x7f0 fs/read_write.c:653 do_iter_write+0x15a/0x540 fs/read_write.c:932 vfs_writev+0x18a/0x340 fs/read_write.c:977 do_writev+0xfc/0x2a0 fs/read_write.c:1012 SYSC_writev fs/read_write.c:1085 [inline] SyS_writev+0x27/0x30 fs/read_write.c:1082 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452911 RSP: 002b:00007fd47e8e8b80 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 00007fd47e8e8aa0 RCX: 0000000000452911 RDX: 0000000000000001 RSI: 00007fd47e8e8bd0 RDI: 0000000000000012 RBP: 00007fd47e8e8a90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000022 R11: 0000000000000293 R12: 00000000004b75fb R13: 00007fd47e8e8bc8 R14: 00000000004b75fb R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 27470 Comm: syz-executor6 Not tainted 4.15.0-rc3+ #222 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 QAT: Invalid ioctl QAT: Invalid ioctl should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 skb_clone+0x1ae/0x480 net/core/skbuff.c:1278 llc_rcv+0x6eb/0xee0 net/llc/llc_input.c:204 __netif_receive_skb_core+0x1a3e/0x3450 net/core/dev.c:4461 __netif_receive_skb+0x2c/0x1b0 net/core/dev.c:4526 netif_receive_skb_internal+0x10b/0x670 net/core/dev.c:4599 napi_frags_finish net/core/dev.c:5040 [inline] napi_gro_frags+0x57b/0xad0 net/core/dev.c:5113 tun_get_user+0x25f5/0x36d0 drivers/net/tun.c:1757 tun_chr_write_iter+0xbf/0x160 drivers/net/tun.c:1800 call_write_iter include/linux/fs.h:1772 [inline] do_iter_readv_writev+0x531/0x7f0 fs/read_write.c:653 do_iter_write+0x15a/0x540 fs/read_write.c:932 vfs_writev+0x18a/0x340 fs/read_write.c:977 do_writev+0xfc/0x2a0 fs/read_write.c:1012 SYSC_writev fs/read_write.c:1085 [inline] SyS_writev+0x27/0x30 fs/read_write.c:1082 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452911 RSP: 002b:00007fd47e8e8b80 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 RAX: ffffffffffffffda RBX: 00007fd47e8e8aa0 RCX: 0000000000452911 RDX: 0000000000000001 RSI: 00007fd47e8e8bd0 RDI: 0000000000000012 RBP: 00007fd47e8e8a90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000022 R11: 0000000000000293 R12: 00000000004b75fb R13: 00007fd47e8e8bc8 R14: 00000000004b75fb R15: 0000000000000000