====================================================== WARNING: possible circular locking dependency detected 4.15.0-rc3+ #217 Not tainted ------------------------------------------------------ syz-executor2/11838 is trying to acquire lock: (&tty->ldisc_sem){++++}, at: [<000000000fbb9c68>] ldsem_down_read+0x37/0x40 drivers/tty/tty_ldsem.c:365 but task is already holding lock: (&pipe->mutex/1){+.+.}, at: [<0000000012d74c6e>] pipe_lock_nested fs/pipe.c:67 [inline] (&pipe->mutex/1){+.+.}, at: [<0000000012d74c6e>] pipe_lock+0x56/0x70 fs/pipe.c:75 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #6 (&pipe->mutex/1){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1a80 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 pipe_lock_nested fs/pipe.c:67 [inline] pipe_lock+0x56/0x70 fs/pipe.c:75 iter_file_splice_write+0x264/0xf30 fs/splice.c:699 do_splice_from fs/splice.c:851 [inline] do_splice fs/splice.c:1147 [inline] SYSC_splice fs/splice.c:1402 [inline] SyS_splice+0x7d5/0x1630 fs/splice.c:1382 entry_SYSCALL_64_fastpath+0x1f/0x96 -> #5 (sb_writers){.+.+}: spin_lock include/linux/spinlock.h:315 [inline] bd_forget+0x1d/0x1a0 fs/block_dev.c:975 evict+0x64f/0x920 fs/inode.c:559 iput_final fs/inode.c:1515 [inline] iput+0x7b9/0xaf0 fs/inode.c:1542 bdput fs/block_dev.c:923 [inline] bd_forget+0xf0/0x1a0 fs/block_dev.c:983 evict+0x64f/0x920 fs/inode.c:559 -> #4 ((completion)&req.done){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 complete_acquire include/linux/completion.h:40 [inline] __wait_for_common kernel/sched/completion.c:109 [inline] wait_for_common kernel/sched/completion.c:123 [inline] wait_for_completion+0xcb/0x7b0 kernel/sched/completion.c:144 devtmpfs_create_node+0x32b/0x4a0 drivers/base/devtmpfs.c:115 device_add+0x120f/0x1640 drivers/base/core.c:1824 device_register+0x1d/0x20 drivers/base/core.c:1905 tty_register_device_attr+0x422/0x740 drivers/tty/tty_io.c:2956 tty_port_register_device_attr_serdev+0x100/0x140 drivers/tty/tty_port.c:166 uart_add_one_port+0xa7a/0x15b0 drivers/tty/serial/serial_core.c:2783 serial8250_register_8250_port+0xfac/0x1990 drivers/tty/serial/8250/8250_core.c:1045 serial_pnp_probe+0x5e7/0xac0 drivers/tty/serial/8250/8250_pnp.c:480 pnp_device_probe+0x15f/0x250 drivers/pnp/driver.c:109 really_probe drivers/base/dd.c:424 [inline] driver_probe_device+0x71b/0xae0 drivers/base/dd.c:566 __driver_attach+0x181/0x1c0 drivers/base/dd.c:800 bus_for_each_dev+0x154/0x1e0 drivers/base/bus.c:313 driver_attach+0x3d/0x50 drivers/base/dd.c:819 bus_add_driver+0x466/0x620 drivers/base/bus.c:669 driver_register+0x1bf/0x3c0 drivers/base/driver.c:168 pnp_register_driver+0x75/0xa0 drivers/pnp/driver.c:272 serial8250_pnp_init+0x15/0x20 drivers/tty/serial/8250/8250_pnp.c:537 serial8250_init+0x8f/0x270 drivers/tty/serial/8250/8250_core.c:1122 do_one_initcall+0x9e/0x330 init/main.c:826 do_initcall_level init/main.c:892 [inline] do_initcalls init/main.c:900 [inline] do_basic_setup init/main.c:918 [inline] kernel_init_freeable+0x469/0x521 init/main.c:1066 kernel_init+0x13/0x172 init/main.c:993 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:441 -> #3 (&port->mutex){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1a80 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 uart_set_termios+0x8f/0x5b0 drivers/tty/serial/serial_core.c:1416 tty_set_termios+0x6d4/0xa40 drivers/tty/tty_ioctl.c:334 set_termios+0x377/0x6b0 drivers/tty/tty_ioctl.c:414 tty_mode_ioctl+0x9fb/0xb10 drivers/tty/tty_ioctl.c:749 n_tty_ioctl_helper+0x40/0x360 drivers/tty/tty_ioctl.c:940 n_tty_ioctl+0x148/0x2d0 drivers/tty/n_tty.c:2435 tty_ioctl+0x32e/0x15f0 drivers/tty/tty_io.c:2638 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x1f/0x96 -> #2 (&tty->termios_rwsem){++++}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 down_write+0x87/0x120 kernel/locking/rwsem.c:70 n_tty_flush_buffer+0x21/0x320 drivers/tty/n_tty.c:357 tty_buffer_flush+0x29a/0x390 drivers/tty/tty_buffer.c:233 tty_ldisc_flush+0x25/0x70 drivers/tty/tty_ldisc.c:418 tty_port_close_start.part.4+0x1cd/0x4e0 drivers/tty/tty_port.c:603 tty_port_close_start drivers/tty/tty_port.c:646 [inline] tty_port_close+0x3f/0x80 drivers/tty/tty_port.c:640 uart_close+0x77/0x1d0 drivers/tty/serial/serial_core.c:1487 tty_release+0x446/0x14c0 drivers/tty/tty_io.c:1639 __fput+0x333/0x7f0 fs/file_table.c:210 ____fput+0x15/0x20 fs/file_table.c:244 task_work_run+0x199/0x270 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x296/0x310 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] syscall_return_slowpath+0x490/0x550 arch/x86/entry/common.c:264 entry_SYSCALL_64_fastpath+0x94/0x96 -> #1 (&buf->lock){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1a80 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 tty_buffer_flush+0xbd/0x390 drivers/tty/tty_buffer.c:222 tty_ldisc_flush+0x25/0x70 drivers/tty/tty_ldisc.c:418 tty_port_close_start.part.4+0x1cd/0x4e0 drivers/tty/tty_port.c:603 tty_port_close_start drivers/tty/tty_port.c:646 [inline] tty_port_close+0x3f/0x80 drivers/tty/tty_port.c:640 uart_close+0x77/0x1d0 drivers/tty/serial/serial_core.c:1487 tty_release+0x446/0x14c0 drivers/tty/tty_io.c:1639 __fput+0x333/0x7f0 fs/file_table.c:210 ____fput+0x15/0x20 fs/file_table.c:244 task_work_run+0x199/0x270 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x296/0x310 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] syscall_return_slowpath+0x490/0x550 arch/x86/entry/common.c:264 entry_SYSCALL_64_fastpath+0x94/0x96 -> #0 (&tty->ldisc_sem){++++}: check_prevs_add kernel/locking/lockdep.c:2031 [inline] validate_chain kernel/locking/lockdep.c:2473 [inline] __lock_acquire+0x3498/0x47f0 kernel/locking/lockdep.c:3500 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __ldsem_down_read_nested+0xd1/0xa90 drivers/tty/tty_ldsem.c:325 ldsem_down_read+0x37/0x40 drivers/tty/tty_ldsem.c:365 tty_ldisc_ref_wait+0x25/0x80 drivers/tty/tty_ldisc.c:277 tty_read+0xf8/0x250 drivers/tty/tty_io.c:852 do_loop_readv_writev fs/read_write.c:673 [inline] do_iter_read+0x3db/0x5b0 fs/read_write.c:897 vfs_readv+0x121/0x1c0 fs/read_write.c:959 kernel_readv fs/splice.c:361 [inline] default_file_splice_read+0x508/0xae0 fs/splice.c:416 do_splice_to+0x110/0x170 fs/splice.c:880 do_splice fs/splice.c:1173 [inline] SYSC_splice fs/splice.c:1402 [inline] SyS_splice+0x11a8/0x1630 fs/splice.c:1382 entry_SYSCALL_64_fastpath+0x1f/0x96 other info that might help us debug this: Chain exists of: &tty->ldisc_sem --> sb_writers --> &pipe->mutex/1 Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&pipe->mutex/1); lock(sb_writers); lock(&pipe->mutex/1); lock(&tty->ldisc_sem); *** DEADLOCK *** 1 lock held by syz-executor2/11838: #0: (&pipe->mutex/1){+.+.}, at: [<0000000012d74c6e>] pipe_lock_nested fs/pipe.c:67 [inline] #0: (&pipe->mutex/1){+.+.}, at: [<0000000012d74c6e>] pipe_lock+0x56/0x70 fs/pipe.c:75 stack backtrace: CPU: 0 PID: 11838 Comm: syz-executor2 Not tainted 4.15.0-rc3+ #217 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 print_circular_bug+0x42d/0x610 kernel/locking/lockdep.c:1271 check_prev_add+0x666/0x15f0 kernel/locking/lockdep.c:1914 check_prevs_add kernel/locking/lockdep.c:2031 [inline] validate_chain kernel/locking/lockdep.c:2473 [inline] __lock_acquire+0x3498/0x47f0 kernel/locking/lockdep.c:3500 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __ldsem_down_read_nested+0xd1/0xa90 drivers/tty/tty_ldsem.c:325 ldsem_down_read+0x37/0x40 drivers/tty/tty_ldsem.c:365 tty_ldisc_ref_wait+0x25/0x80 drivers/tty/tty_ldisc.c:277 tty_read+0xf8/0x250 drivers/tty/tty_io.c:852 do_loop_readv_writev fs/read_write.c:673 [inline] do_iter_read+0x3db/0x5b0 fs/read_write.c:897 vfs_readv+0x121/0x1c0 fs/read_write.c:959 kernel_readv fs/splice.c:361 [inline] default_file_splice_read+0x508/0xae0 fs/splice.c:416 do_splice_to+0x110/0x170 fs/splice.c:880 do_splice fs/splice.c:1173 [inline] SYSC_splice fs/splice.c:1402 [inline] SyS_splice+0x11a8/0x1630 fs/splice.c:1382 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007f2c14454c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452a39 RDX: 000000000000001a RSI: 0000000000000000 RDI: 0000000000000018 RBP: 00000000000000ec R08: 0000000000000200 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006ef6c0 R13: 00000000ffffffff R14: 00007f2c144556d4 R15: 0000000000000000 device gre0 entered promiscuous mode netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. binder: undelivered death notification, 0000000000000000 binder: BINDER_SET_CONTEXT_MGR already set binder: 11894:11900 ioctl 40046207 0 returned -16 binder: undelivered death notification, 0000000000000000 netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. rfkill: input handler disabled rfkill: input handler enabled device gre0 entered promiscuous mode device gre0 entered promiscuous mode rfkill: input handler disabled MPI: mpi too large (32768 bits) rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled ALSA: seq fatal error: cannot create timer (-19) audit: type=1326 audit(1513030995.894:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12095 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x0 ALSA: seq fatal error: cannot create timer (-19) rfkill: input handler disabled audit: type=1326 audit(1513030996.030:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12095 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x0 rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled binder: 12186:12187 ERROR: BC_REGISTER_LOOPER called without request binder: 12187 RLIMIT_NICE not set binder: 12186:12187 BC_ACQUIRE_DONE u0000000000000000 no match rfkill: input handler disabled binder: 12186:12187 BC_CLEAR_DEATH_NOTIFICATION invalid ref 3 binder: 12186:12187 BC_DEAD_BINDER_DONE 0000000000000003 not found binder: 12186:12187 DecRefs 0 refcount change on invalid ref 3 ret -22 binder: BINDER_SET_CONTEXT_MGR already set binder: 12186:12200 ioctl 40046207 0 returned -16 binder: 12186:12200 ERROR: BC_REGISTER_LOOPER called without request binder: 12200 RLIMIT_NICE not set binder: 12186:12204 BC_ACQUIRE_DONE u0000000000000000 no match binder: 12186:12204 BC_CLEAR_DEATH_NOTIFICATION invalid ref 3 binder: 12186:12204 BC_DEAD_BINDER_DONE 0000000000000003 not found binder: 12186:12204 ERROR: BC_REGISTER_LOOPER called without request binder: 12186:12204 DecRefs 0 refcount change on invalid ref 3 ret -22 binder: 12204 RLIMIT_NICE not set rfkill: input handler enabled 9pnet_virtio: no channels available for device ./file1 9pnet_virtio: no channels available for device ./file1 rfkill: input handler disabled rfkill: input handler enabled binder: 12187 RLIMIT_NICE not set binder: 12304:12307 got transaction to invalid handle binder: 12304:12307 transaction failed 29201/-22, size 0-0 line 2775 binder: 12304:12307 ioctl 1 20000000 returned -22 binder: 12304:12307 ERROR: BC_REGISTER_LOOPER called without request binder: 12304:12307 got transaction to invalid handle binder: 12304:12307 transaction failed 29201/-22, size 88-24 line 2775 binder: BINDER_SET_CONTEXT_MGR already set binder: 12304:12307 ioctl 40046207 0 returned -16 rfkill: input handler disabled binder: 12304:12322 got transaction to invalid handle binder: 12304:12322 transaction failed 29201/-22, size 0-0 line 2775 binder: 12304:12307 ioctl 1 20000000 returned -22 binder: 12304:12307 ERROR: BC_REGISTER_LOOPER called without request binder: 12304:12307 got transaction to invalid handle binder: 12304:12307 transaction failed 29201/-22, size 88-24 line 2775 rfkill: input handler enabled binder: 12304:12307 ioctl c0306201 20900fd0 returned -14 binder: undelivered TRANSACTION_ERROR: 29201 binder: undelivered TRANSACTION_ERROR: 29201 binder: 12336:12337 Acquire 1 refcount change on invalid ref 4 ret -22 device gre0 entered promiscuous mode nla_parse: 1 callbacks suppressed netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. binder: 12336:12337 BC_ACQUIRE_DONE uffffffffffffffff no match device gre0 entered promiscuous mode netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. binder: 12336:12337 unknown command 0 binder: 12336:12353 Acquire 1 refcount change on invalid ref 4 ret -22 binder: 12336:12353 BC_ACQUIRE_DONE uffffffffffffffff no match binder: 12336:12353 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 12336:12353 IncRefs 0 refcount change on invalid ref 0 ret -22 binder: 12353 RLIMIT_NICE not set binder: 12336:12337 ioctl c0306201 20501fd0 returned -22 rfkill: input handler disabled netlink: 'syz-executor4': attribute type 5 has an invalid length. rfkill: input handler enabled netlink: 'syz-executor4': attribute type 5 has an invalid length. dccp_invalid_packet: P.Data Offset(128) too large binder: 12431:12437 BC_INCREFS_DONE u0000000000000000 no match dccp_invalid_packet: P.Data Offset(128) too large rfkill: input handler disabled binder: 12431:12449 BC_INCREFS_DONE u0000000000000000 no match audit: type=1400 audit(1513030997.491:845): avc: denied { ipc_lock } for pid=12466 comm="syz-executor2" capability=14 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 rfkill: input handler enabled netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'. rfkill: input handler disabled rfkill: input handler enabled rfkill: input handler disabled QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl rfkill: input handler enabled QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. rfkill: input handler disabled device gre0 entered promiscuous mode rfkill: input handler enabled netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. rfkill: input handler disabled rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12823 comm=syz-executor3 rfkill: input handler disabled SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12859 comm=syz-executor3 netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled SELinux: unrecognized netlink message: protocol=0 nlmsg_type=190 sclass=netlink_route_socket pig=13013 comm=syz-executor7 rfkill: input handler disabled SELinux: unrecognized netlink message: protocol=0 nlmsg_type=190 sclass=netlink_route_socket pig=13013 comm=syz-executor7 rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled device gre0 entered promiscuous mode PF_BRIDGE: br_mdb_parse() with unknown ifindex PF_BRIDGE: br_mdb_parse() with unknown ifindex rfkill: input handler disabled audit: type=1400 audit(1513031000.153:846): avc: denied { map } for pid=13221 comm="syz-executor0" path="/dev/vga_arbiter" dev="devtmpfs" ino=15 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:xserver_misc_device_t:s0 tclass=chr_file permissive=1 rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled Disabled LAPIC found during irq injection audit: type=1326 audit(1513031000.422:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13314 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x7ffc0000 audit: type=1326 audit(1513031000.452:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13314 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x7ffc0000 rfkill: input handler disabled audit: type=1326 audit(1513031000.452:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13314 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=228 compat=0 ip=0x4557da code=0x7ffc0000 audit: type=1326 audit(1513031000.452:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13314 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x7ffc0000 audit: type=1326 audit(1513031000.452:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13314 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=248 compat=0 ip=0x452a39 code=0x7ffc0000 audit: type=1326 audit(1513031000.454:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13314 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x7ffc0000 rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled binder: 13380:13390 got transaction with invalid handle, 0 kauditd_printk_skb: 307 callbacks suppressed audit: type=1400 audit(1513031000.911:1160): avc: denied { write } for pid=13376 comm="syz-executor3" path="socket:[46647]" dev="sockfs" ino=46647 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pig=13405 comm=syz-executor1 binder: 13380:13390 transaction failed 29201/-22, size 64-16 line 2982 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pig=13413 comm=syz-executor1 rfkill: input handler disabled binder: BINDER_SET_CONTEXT_MGR already set binder: 13380:13390 ioctl 40046207 0 returned -16 binder_alloc: 13380: binder_alloc_buf, no vma binder: 13380:13402 transaction failed 29189/-3, size 64-16 line 2890 rfkill: input handler enabled binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29201 rfkill: input handler disabled rfkill: input handler enabled rfkill: input handler disabled rfkill: input handler enabled rfkill: input handler disabled syz-executor5 (13583): /proc/13582/oom_adj is deprecated, please use /proc/13582/oom_score_adj instead. rfkill: input handler enabled updating oom_score_adj for 13599 (syz-executor5) from 58 to 58 because it shares mm with 13582 (syz-executor5). Report if this is unexpected. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 13638 Comm: syz-executor2 Not tainted 4.15.0-rc3+ #217 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3292 [inline] kmem_cache_alloc_node_trace+0x5a/0x760 mm/slab.c:3654 __do_kmalloc_node mm/slab.c:3674 [inline] __kmalloc_node+0x33/0x70 mm/slab.c:3682 kmalloc_node include/linux/slab.h:541 [inline] kvmalloc_node+0x99/0xd0 mm/util.c:397 kvmalloc include/linux/mm.h:541 [inline] seq_buf_alloc fs/seq_file.c:29 [inline] seq_read+0x7cd/0x13d0 fs/seq_file.c:205 __vfs_read+0xef/0xa00 fs/read_write.c:411 vfs_read+0x124/0x360 fs/read_write.c:447 SYSC_read fs/read_write.c:573 [inline] SyS_read+0xef/0x220 fs/read_write.c:566 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007f2c14433c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452a39 RDX: 0000000000000008 RSI: 000000002011fff8 RDI: 0000000000000013 RBP: 00000000000005bf R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6a88 R13: 00000000ffffffff R14: 00007f2c144346d4 R15: 0000000000000004 rfkill: input handler disabled rfkill: input handler enabled print_req_error: I/O error, dev loop4, sector 0 nla_parse: 9 callbacks suppressed netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. device gre0 entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13688 Comm: syz-executor2 Not tainted 4.15.0-rc3+ #217 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3371 [inline] kmem_cache_alloc_trace+0x4b/0x750 mm/slab.c:3611 kmalloc include/linux/slab.h:499 [inline] proc_pid_stack+0xa3/0x340 fs/proc/base.c:432 proc_single_show+0xf8/0x170 fs/proc/base.c:744 seq_read+0x385/0x13d0 fs/seq_file.c:234 __vfs_read+0xef/0xa00 fs/read_write.c:411 vfs_read+0x124/0x360 fs/read_write.c:447 SYSC_read fs/read_write.c:573 [inline] SyS_read+0xef/0x220 fs/read_write.c:566 do_syscall_64+0x26c/0x920 arch/x86/entry/common.c:285 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452a39 RSP: 002b:00007f2c14433c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452a39 RDX: 0000000000000008 RSI: 000000002011fff8 RDI: 0000000000000013 RBP: 000000000000041e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f4370 R13: 0000000000000014 R14: 00007f2c144346d4 R15: ffffffffffffffff device lo entered promiscuous mode print_req_error: I/O error, dev loop4, sector 0 rfkill: input handler disabled rfkill: input handler enabled device lo left promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13731 Comm: syz-executor2 Not tainted 4.15.0-rc3+ #217 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3371 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3545 ptlock_alloc+0x24/0x70 mm/memory.c:4685 ptlock_init include/linux/mm.h:1790 [inline] pgtable_page_ctor include/linux/mm.h:1824 [inline] pte_alloc_one+0x59/0x100 arch/x86/mm/pgtable.c:32 __do_huge_pmd_anonymous_page mm/huge_memory.c:564 [inline] do_huge_pmd_anonymous_page+0x554/0x1b00 mm/huge_memory.c:728 create_huge_pmd mm/memory.c:3828 [inline] __handle_mm_fault+0x1b9f/0x3e20 mm/memory.c:4031 handle_mm_fault+0x334/0x8d0 mm/memory.c:4097 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1094 RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 arch/x86/lib/copy_user_64.S:66 RSP: 0018:ffff8801d65df9e0 EFLAGS: 00010202 RAX: ffffed003aaae479 RBX: 0000000000000008 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffff8801d55723c0 RDI: 000000002011fff8 RBP: ffff8801d65dfa10 R08: 7566205d3e303c5b R09: ffffed003aaae479 R10: 0000000000000001 R11: ffffed003aaae478 R12: 000000002011fff8 R13: ffff8801d55723c0 R14: 00007ffffffff000 R15: 0000000020120000 copy_to_user include/linux/uaccess.h:155 [inline] seq_read+0xcb4/0x13d0 fs/seq_file.c:279 __vfs_read+0xef/0xa00 fs/read_write.c:411 vfs_read+0x124/0x360 fs/read_write.c:447 SYSC_read fs/read_write.c:573 [inline] SyS_read+0xef/0x220 fs/read_write.c:566 do_syscall_64+0x26c/0x920 arch/x86/entry/common.c:285 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452a39 RSP: 002b:00007f2c14433c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452a39 RDX: 0000000000000008 RSI: 000000002011fff8 RDI: 0000000000000013 RBP: 000000000000041e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f4370 R13: 0000000000000014 R14: 00007f2c144346d4 R15: ffffffffffffffff device lo entered promiscuous mode device lo left promiscuous mode rfkill: input handler disabled FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13756 Comm: syz-executor2 Not tainted 4.15.0-rc3+ #217 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3371 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3545 ptlock_alloc+0x24/0x70 mm/memory.c:4685 ptlock_init include/linux/mm.h:1790 [inline] pgtable_page_ctor include/linux/mm.h:1824 [inline] pte_alloc_one+0x59/0x100 arch/x86/mm/pgtable.c:32 __do_huge_pmd_anonymous_page mm/huge_memory.c:564 [inline] do_huge_pmd_anonymous_page+0x554/0x1b00 mm/huge_memory.c:728 create_huge_pmd mm/memory.c:3828 [inline] __handle_mm_fault+0x1b9f/0x3e20 mm/memory.c:4031 handle_mm_fault+0x334/0x8d0 mm/memory.c:4097 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1094 RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 arch/x86/lib/copy_user_64.S:66 RSP: 0018:ffff8801d04779e0 EFLAGS: 00010202 RAX: ffffed003aeea809 RBX: 0000000000000008 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffff8801d7754040 RDI: 000000002011fff8 RBP: ffff8801d0477a10 R08: 7566205d3e303c5b R09: ffffed003aeea809 R10: 0000000000000001 R11: ffffed003aeea808 R12: 000000002011fff8 R13: ffff8801d7754040 R14: 00007ffffffff000 R15: 0000000020120000 copy_to_user include/linux/uaccess.h:155 [inline] seq_read+0xcb4/0x13d0 fs/seq_file.c:279 __vfs_read+0xef/0xa00 fs/read_write.c:411 vfs_read+0x124/0x360 fs/read_write.c:447 SYSC_read fs/read_write.c:573 [inline] SyS_read+0xef/0x220 fs/read_write.c:566 do_syscall_64+0x26c/0x920 arch/x86/entry/common.c:285 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452a39 RSP: 002b:00007f2c14433c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452a39 RDX: 0000000000000008 RSI: 000000002011fff8 RDI: 0000000000000013 RBP: 000000000000041e R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f4370 R13: 0000000000000014 R14: 00007f2c144346d4 R15: ffffffffffffffff rfkill: input handler enabled SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13767 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13767 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13767 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13767 comm=syz-executor7 audit: type=1400 audit(1513031002.714:1161): avc: denied { map } for pid=13770 comm="syz-executor0" path="socket:[47410]" dev="sockfs" ino=47410 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dccp_socket permissive=1 netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.