====================================================== WARNING: possible circular locking dependency detected 4.13.0-rc6-next-20170825+ #9 Not tainted ------------------------------------------------------ kworker/0:1/37 is trying to acquire lock: (rcu_sched_state.barrier_mutex){+.+.}, at: [] _rcu_barrier+0x13f/0x7a0 kernel/rcu/tree.c:3502 but task is already holding lock: ((&map->work)){+.+.}, at: [] process_one_work+0xb2c/0x1be0 kernel/workqueue.c:2094 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 ((&map->work)){+.+.}: process_one_work+0xba5/0x1be0 kernel/workqueue.c:2095 worker_thread+0x223/0x1860 kernel/workqueue.c:2233 kthread+0x39c/0x470 kernel/kthread.c:231 ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431 0xffffffffffffffff -> #2 ((complete)&rcu.completion){+.+.}: check_prevs_add kernel/locking/lockdep.c:2020 [inline] validate_chain kernel/locking/lockdep.c:2469 [inline] __lock_acquire+0x3286/0x4620 kernel/locking/lockdep.c:3498 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002 complete_acquire include/linux/completion.h:39 [inline] __wait_for_common kernel/sched/completion.c:108 [inline] wait_for_common kernel/sched/completion.c:122 [inline] wait_for_completion+0xc8/0x770 kernel/sched/completion.c:143 __synchronize_srcu+0x1b5/0x250 kernel/rcu/srcutree.c:898 synchronize_srcu_expedited kernel/rcu/srcutree.c:923 [inline] synchronize_srcu+0x1a3/0x560 kernel/rcu/srcutree.c:974 quarantine_remove_cache+0xd7/0xf0 mm/kasan/quarantine.c:327 kasan_cache_shrink+0x9/0x10 mm/kasan/kasan.c:380 kmem_cache_shrink+0x15/0x30 mm/slab_common.c:857 acpi_os_purge_cache+0x15/0x20 drivers/acpi/osl.c:1560 acpi_purge_cached_objects+0x38/0xc9 drivers/acpi/acpica/utxface.c:271 acpi_initialize_objects+0xc5/0x112 drivers/acpi/acpica/utxfinit.c:302 acpi_bus_init drivers/acpi/bus.c:1131 [inline] acpi_init+0x23c/0x8e6 drivers/acpi/bus.c:1220 do_one_initcall+0x9e/0x330 init/main.c:826 do_initcall_level init/main.c:892 [inline] do_initcalls init/main.c:900 [inline] do_basic_setup init/main.c:918 [inline] kernel_init_freeable+0x469/0x521 init/main.c:1066 kernel_init+0x13/0x172 init/main.c:993 ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431 -> #1 (cpu_hotplug_lock.rw_sem){++++}: check_prevs_add kernel/locking/lockdep.c:2020 [inline] validate_chain kernel/locking/lockdep.c:2469 [inline] __lock_acquire+0x3286/0x4620 kernel/locking/lockdep.c:3498 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002 percpu_down_read_preempt_disable include/linux/percpu-rwsem.h:35 [inline] percpu_down_read include/linux/percpu-rwsem.h:58 [inline] cpus_read_lock+0x42/0x90 kernel/cpu.c:218 get_online_cpus include/linux/cpu.h:126 [inline] _rcu_barrier+0x33d/0x7a0 kernel/rcu/tree.c:3525 rcu_barrier_sched kernel/rcu/tree.c:3591 [inline] rcu_barrier+0x10/0x20 kernel/rcu/tree_plugin.h:891 netdev_run_todo+0x28f/0xca0 net/core/dev.c:7824 rtnl_unlock+0xe/0x10 net/core/rtnetlink.c:106 tun_detach drivers/net/tun.c:588 [inline] tun_chr_close+0x49/0x60 drivers/net/tun.c:2595 __fput+0x333/0x7f0 fs/file_table.c:210 ____fput+0x15/0x20 fs/file_table.c:246 task_work_run+0x199/0x270 kernel/task_work.c:112 exit_task_work include/linux/task_work.h:21 [inline] do_exit+0xa52/0x1b40 kernel/exit.c:865 do_group_exit+0x149/0x400 kernel/exit.c:968 get_signal+0x7e8/0x17e0 kernel/signal.c:2334 do_signal+0x94/0x1ee0 arch/x86/kernel/signal.c:808 exit_to_usermode_loop+0x224/0x300 arch/x86/entry/common.c:158 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath+0x42f/0x500 arch/x86/entry/common.c:266 entry_SYSCALL_64_fastpath+0xbc/0xbe -> #0 (rcu_sched_state.barrier_mutex){+.+.}: check_prev_add+0x865/0x1520 kernel/locking/lockdep.c:1894 check_prevs_add kernel/locking/lockdep.c:2020 [inline] validate_chain kernel/locking/lockdep.c:2469 [inline] __lock_acquire+0x3286/0x4620 kernel/locking/lockdep.c:3498 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1870 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 _rcu_barrier+0x13f/0x7a0 kernel/rcu/tree.c:3502 rcu_barrier_sched kernel/rcu/tree.c:3591 [inline] rcu_barrier+0x10/0x20 kernel/rcu/tree_plugin.h:891 htab_map_free+0x9d/0x640 kernel/bpf/hashtab.c:1112 bpf_map_free_deferred+0xac/0xd0 kernel/bpf/syscall.c:209 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2098 worker_thread+0x223/0x1860 kernel/workqueue.c:2233 kthread+0x39c/0x470 kernel/kthread.c:231 ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431 other info that might help us debug this: Chain exists of: rcu_sched_state.barrier_mutex --> (complete)&rcu.completion --> (&map->work) Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock((&map->work)); lock((complete)&rcu.completion); lock((&map->work)); lock(rcu_sched_state.barrier_mutex); *** DEADLOCK *** 2 locks held by kworker/0:1/37: #0: ("events"){.+.+}, at: [] __write_once_size include/linux/compiler.h:305 [inline] #0: ("events"){.+.+}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:33 [inline] #0: ("events"){.+.+}, at: [] atomic_long_set include/asm-generic/atomic-long.h:56 [inline] #0: ("events"){.+.+}, at: [] set_work_data kernel/workqueue.c:617 [inline] #0: ("events"){.+.+}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:644 [inline] #0: ("events"){.+.+}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2090 #1: ((&map->work)){+.+.}, at: [] process_one_work+0xb2c/0x1be0 kernel/workqueue.c:2094 stack backtrace: CPU: 0 PID: 37 Comm: kworker/0:1 Not tainted 4.13.0-rc6-next-20170825+ #9 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Workqueue: events bpf_map_free_deferred Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 print_circular_bug+0x503/0x710 kernel/locking/lockdep.c:1259 check_prev_add+0x865/0x1520 kernel/locking/lockdep.c:1894 check_prevs_add kernel/locking/lockdep.c:2020 [inline] validate_chain kernel/locking/lockdep.c:2469 [inline] __lock_acquire+0x3286/0x4620 kernel/locking/lockdep.c:3498 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1870 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 _rcu_barrier+0x13f/0x7a0 kernel/rcu/tree.c:3502 rcu_barrier_sched kernel/rcu/tree.c:3591 [inline] rcu_barrier+0x10/0x20 kernel/rcu/tree_plugin.h:891 htab_map_free+0x9d/0x640 kernel/bpf/hashtab.c:1112 bpf_map_free_deferred+0xac/0xd0 kernel/bpf/syscall.c:209 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2098 worker_thread+0x223/0x1860 kernel/workqueue.c:2233 kthread+0x39c/0x470 kernel/kthread.c:231 ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431 audit: type=1326 audit(1503858706.689:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=3925 comm="syz-executor6" exe="/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 audit: type=1326 audit(1503858706.707:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=3925 comm="syz-executor6" exe="/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 pit: kvm: requested 2514 ns i8254 timer period limited to 500000 ns pit: kvm: requested 2514 ns i8254 timer period limited to 500000 ns netlink: 1 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor4'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pig=4070 comm=syz-executor1 netlink: 3440 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 3440 bytes leftover after parsing attributes in process `syz-executor3'. sock: process `syz-executor1' is using obsolete setsockopt SO_BSDCOMPAT kvm [4111]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x8 kvm [4111]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x8 *** Guest State *** CR0: actual=0x0000000000000031, shadow=0x0000000060000031, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000020, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000f80 RIP = 0x0000000000000000 RFLAGS=0x00000002 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000f80 CS:RIP=0050:0000000000002810 CS: sel=0x0030, attr=0x0409b, limit=0x000fffff, base=0x0000000000000000 DS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 SS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 ES: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 GDTR: limit=0x000007ff, base=0x0000000000001000 LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 IDTR: limit=0x000001ff, base=0x0000000000003800 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000001 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b8fd7 RSP = 0xffff88004dae74c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f80d342b700 GSBase=ffff88003ed00000 TRBase=ffff88003ed23100 GDTBase=ffffffffff576000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=000000003e331000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84da5a70 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b699edfe SecondaryExec=000000e2 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000001 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffd7023772a2 EPT pointer = 0x000000003eb8801e Virtual processor ID = 0x0018 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=4269 comm=syz-executor1 netlink: 1 bytes leftover after parsing attributes in process `syz-executor6'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=4272 comm=syz-executor1 netlink: 1 bytes leftover after parsing attributes in process `syz-executor6'. kvm: pic: non byte read kvm: pic: level sensitive irq not supported kvm: pic: level sensitive irq not supported kvm: pic: level sensitive irq not supported kvm: pic: level sensitive irq not supported kvm: pic: level sensitive irq not supported kvm: pic: level sensitive irq not supported kvm: pic: level sensitive irq not supported device lo entered promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20027. Sending cookies. Check SNMP counters. device lo left promiscuous mode kvm: pic: level sensitive irq not supported kvm: pic: level sensitive irq not supported kvm: pic: level sensitive irq not supported Disabled LAPIC found during irq injection device lo entered promiscuous mode kvm: pic: non byte read sctp: [Deprecated]: syz-executor4 (pid 4315) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device lo left promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. sctp: [Deprecated]: syz-executor4 (pid 4328) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead SELinux: unrecognized netlink message: protocol=6 nlmsg_type=3131 sclass=netlink_xfrm_socket pig=4469 comm=syz-executor3 Trying to set illegal importance in message SELinux: unrecognized netlink message: protocol=6 nlmsg_type=3131 sclass=netlink_xfrm_socket pig=4484 comm=syz-executor3 Trying to set illegal importance in message syz-executor1: vmalloc: allocation failure: 17179869180 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor1 cpuset=/ mems_allowed=0-1 CPU: 2 PID: 4543 Comm: syz-executor1 Not tainted 4.13.0-rc6-next-20170825+ #9 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 warn_alloc+0x1c2/0x2f0 mm/page_alloc.c:3254 __vmalloc_node_range+0x599/0x730 mm/vmalloc.c:1781 __vmalloc_node mm/vmalloc.c:1810 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1832 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:529 [inline] kvmalloc_array include/linux/mm.h:545 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1690 net/ipv6/netfilter/ip6_tables.c:711 do_replace net/ipv6/netfilter/ip6_tables.c:1155 [inline] do_ip6t_set_ctl+0x34b/0x5c0 net/ipv6/netfilter/ip6_tables.c:1681 nf_sockopt net/netfilter/nf_sockopt.c:105 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:114 ipv6_setsockopt+0x115/0x150 net/ipv6/ipv6_sockglue.c:920 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2800 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2970 SYSC_setsockopt net/socket.c:1852 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1831 do_syscall_64+0x26c/0x8c0 arch/x86/entry/common.c:287 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x446749 RSP: 002b:00007f80d342ac08 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000018 RCX: 0000000000446749 RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000018 RBP: 0000000000708000 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020001fde R11: 0000000000000296 R12: 00000000ffffffff R13: 0000000000004770 R14: 00000000006e6830 R15: 0000000000000029 Mem-Info: active_anon:95096 inactive_anon:66 isolated_anon:0 active_file:3472 inactive_file:4620 isolated_file:0 unevictable:0 dirty:107 writeback:0 unstable:0 slab_reclaimable:5105 slab_unreclaimable:35859 mapped:20784 shmem:75 pagetables:847 bounce:0 free:248632 free_pcp:987 free_cma:0 raw_sendmsg: syz-executor3 forgot to set AF_INET. Fix it! SELinux: failure in selinux_parse_skb(), unable to parse packet Node 0 active_anon:150552kB inactive_anon:112kB active_file:6180kB inactive_file:13088kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:45044kB dirty:104kB writeback:0kB shmem:128kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 1 active_anon:211588kB inactive_anon:144kB active_file:7712kB inactive_file:5388kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:38176kB dirty:324kB writeback:0kB shmem:172kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 22528kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no SELinux: failure in selinux_parse_skb(), unable to parse packet Node 0 DMA free:15908kB min:640kB low:800kB high:960kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 886 886 886 Node 0 DMA32 free:606452kB min:36536kB low:45668kB high:54800kB active_anon:150552kB inactive_anon:112kB active_file:6180kB inactive_file:13092kB unevictable:0kB writepending:108kB present:1032192kB managed:909748kB mlocked:0kB kernel_stack:1920kB pagetables:1152kB bounce:0kB free_pcp:2088kB local_pcp:320kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 1 DMA32 free:383876kB min:30404kB low:38004kB high:45604kB active_anon:217736kB inactive_anon:144kB active_file:7712kB inactive_file:5388kB unevictable:0kB writepending:520kB present:1048560kB managed:755216kB mlocked:0kB kernel_stack:3360kB pagetables:2200kB bounce:0kB free_pcp:2444kB local_pcp:740kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 609*4kB (UME) 1303*8kB (UME) 794*16kB (UME) 304*32kB (UME) 71*64kB (UME) 7*128kB (UME) 10*256kB (UME) 6*512kB (ME) 3*1024kB (ME) 2*2048kB (M) 135*4096kB (M) = 606492kB Node 1 DMA32: 151*4kB (UM) 3138*8kB (UM) 2068*16kB (UM) 1335*32kB (UME) 750*64kB (UM) 185*128kB (UME) 23*256kB (UM) 6*512kB (UME) 1*1024kB (E) 0*2048kB 49*4096kB (M) = 383884kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 8153 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 524186 pages RAM 0 pages HighMem/MovableOnly 103968 pages reserved syz-executor1: vmalloc: allocation failure: 17179869180 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor1 cpuset=/ mems_allowed=0-1 CPU: 3 PID: 4558 Comm: syz-executor1 Not tainted 4.13.0-rc6-next-20170825+ #9 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 warn_alloc+0x1c2/0x2f0 mm/page_alloc.c:3254 __vmalloc_node_range+0x599/0x730 mm/vmalloc.c:1781 __vmalloc_node mm/vmalloc.c:1810 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1832 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:529 [inline] kvmalloc_array include/linux/mm.h:545 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1690 net/ipv6/netfilter/ip6_tables.c:711 do_replace net/ipv6/netfilter/ip6_tables.c:1155 [inline] do_ip6t_set_ctl+0x34b/0x5c0 net/ipv6/netfilter/ip6_tables.c:1681 nf_sockopt net/netfilter/nf_sockopt.c:105 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:114 ipv6_setsockopt+0x115/0x150 net/ipv6/ipv6_sockglue.c:920 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2800 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2970 SYSC_setsockopt net/socket.c:1852 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1831 do_syscall_64+0x26c/0x8c0 arch/x86/entry/common.c:287 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x446749 RSP: 002b:00007f80d3409c08 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000000001f RCX: 0000000000446749 RDX: 0000000000000040 RSI: 0000000000000029 RDI: 000000000000001f RBP: 00000000007080a8 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020001fde R11: 0000000000000296 R12: 00000000ffffffff R13: 0000000000004770 R14: 00000000006e6830 R15: 0000000000000029 device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008f kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008e kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008d kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008c kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008b kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008a kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000089 kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000088 kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000087 kvm [4662]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x40000086 kvm [4662]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000023 data 0x66c900003b9a1043 kvm [4662]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000022 data 0x66c90000cb211043 kvm [4662]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000023 data 0x66c900003b9a1043 kvm [4662]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000022 data 0x66c90000cb211043 kvm [4662]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000023 data 0x66c900003b9a1043 kvm [4662]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000022 data 0x66c90000cb211043 sctp: [Deprecated]: syz-executor6 (pid 4699) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead kvm [4662]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000023 data 0x66c900003b9a1043 kvm [4662]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000022 data 0x66c90000cb211043 sctp: [Deprecated]: syz-executor6 (pid 4699) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead tty_warn_deprecated_flags: 'syz-executor7' is using deprecated serial flags (with no effect): 00000400 tty_warn_deprecated_flags: 'syz-executor7' is using deprecated serial flags (with no effect): 00000400 audit: type=1326 audit(1503858708.781:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=4813 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 *** Guest State *** CR0: actual=0x0000000080000039, shadow=0x00000000e0000019, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000010, gh_mask=ffffffffffffe871 CR3 = 0x0000000000004000 RSP = 0x0000000000000f80 RIP = 0x0000000000009104 RFLAGS=0x00020002 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 CS: sel=0x0030, attr=0x0409b, limit=0x000fffff, base=0x0000000000000000 DS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 SS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 ES: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 audit: type=1326 audit(1503858708.920:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=4813 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 GDTR: limit=0x000007ff, base=0x0000000000001000 LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 IDTR: limit=0x000001ff, base=0x0000000000003800 QAT: Invalid ioctl TR: sel=0x00d0, attr=0x0008b, limit=0x000001ff, base=0x0000000000004e00 PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex EFER = 0x0000000000000001 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b8fd7 RSP = 0xffff880050e1f4c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f95ddd65700 GSBase=ffff88006df00000 TRBase=ffff88006df23100 GDTBase=ffffffffff574000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=0000000039344000 CR4=00000000000026e0 QAT: Invalid ioctl Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84da5a70 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b6a06dfa SecondaryExec=000000e3 EntryControls=0001d1ff ExitControls=00afefff PF_BRIDGE: RTM_NEWNEIGH with unknown ifindex ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffd5f1dcb62c TPR Threshold = 0x00 EPT pointer = 0x000000006d1d201e Virtual processor ID = 0x0001 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=24 sclass=netlink_tcpdiag_socket pig=4905 comm=syz-executor4 SELinux: failure in selinux_parse_skb(), unable to parse packet rpcbind: RPC call returned error 22 rpcbind: RPC call returned error 22 nla_parse: 10 callbacks suppressed netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. IPv6: NLM_F_REPLACE set, but no existing node found! netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. IPv6: NLM_F_REPLACE set, but no existing node found! netlink: 5 bytes leftover after parsing attributes in process `syz-executor6'. audit: type=1326 audit(1503858710.112:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5069 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:0:0: [sg0] tag#0 CDB: Test Unit Ready sd 0:0:0:0: [sg0] tag#0 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 QAT: Invalid ioctl audit: type=1326 audit(1503858710.258:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5069 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 TCP: request_sock_TCPv6: Possible SYN flooding on port 20017. Sending cookies. Check SNMP counters. sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:0:0: [sg0] tag#0 CDB: Test Unit Ready sd 0:0:0:0: [sg0] tag#0 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. QAT: Invalid ioctl netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. syz-executor6: vmalloc: allocation failure: 4833356120 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor6 cpuset=/ mems_allowed=0-1 CPU: 1 PID: 5123 Comm: syz-executor6 Not tainted 4.13.0-rc6-next-20170825+ #9 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 warn_alloc+0x1c2/0x2f0 mm/page_alloc.c:3254 __vmalloc_node_range+0x599/0x730 mm/vmalloc.c:1781 __vmalloc_node mm/vmalloc.c:1810 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1832 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:529 [inline] kvmalloc_array include/linux/mm.h:545 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1610 net/ipv4/netfilter/ip_tables.c:692 do_replace net/ipv4/netfilter/ip_tables.c:1135 [inline] do_ipt_set_ctl+0x34b/0x5c0 net/ipv4/netfilter/ip_tables.c:1669 nf_sockopt net/netfilter/nf_sockopt.c:105 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:114 ip_setsockopt+0xa1/0xb0 net/ipv4/ip_sockglue.c:1251 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2800 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2970 SYSC_setsockopt net/socket.c:1852 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1831 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x446749 RSP: 002b:00007fb7bed55c08 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000000001b RCX: 0000000000446749 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 000000000000001b RBP: 0000000000708000 R08: 0000000000000056 R09: 0000000000000000 R10: 0000000020006000 R11: 0000000000000296 R12: 00000000ffffffff R13: 00000000000056a0 R14: 00000000006e7760 R15: 0000200000000004 warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: active_anon:93983 inactive_anon:44 isolated_anon:0 active_file:3486 inactive_file:4629 isolated_file:0 unevictable:0 dirty:135 writeback:0 unstable:0 slab_reclaimable:5141 slab_unreclaimable:34978 mapped:20767 shmem:49 pagetables:838 bounce:0 free:250598 free_pcp:959 free_cma:0 Node 0 active_anon:160724kB inactive_anon:96kB active_file:6228kB inactive_file:13132kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:44972kB dirty:108kB writeback:0kB shmem:100kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 16384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 1 active_anon:217416kB inactive_anon:80kB active_file:7716kB inactive_file:5384kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:38096kB dirty:432kB writeback:0kB shmem:96kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 24576kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:640kB low:800kB high:960kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 886 886 886 Node 0 DMA32 free:584240kB min:36536kB low:45668kB high:54800kB active_anon:166780kB inactive_anon:96kB active_file:6228kB inactive_file:13132kB unevictable:0kB writepending:108kB present:1032192kB managed:909748kB mlocked:0kB kernel_stack:1888kB pagetables:1276kB bounce:0kB free_pcp:2088kB local_pcp:548kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 1 DMA32 free:393804kB min:30404kB low:38004kB high:45604kB active_anon:217416kB inactive_anon:80kB active_file:7716kB inactive_file:5384kB unevictable:0kB writepending:432kB present:1048560kB managed:755216kB mlocked:0kB kernel_stack:3392kB pagetables:2104kB bounce:0kB free_pcp:1876kB local_pcp:624kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 540*4kB (UM) 48*8kB (UE) 155*16kB (UME) 235*32kB (UM) 77*64kB (UME) 21*128kB (UME) 21*256kB (UME) 11*512kB (UME) 7*1024kB (UME) 3*2048kB (UM) 131*4096kB (UM) = 581056kB Node 1 DMA32: 79*4kB (UME) 2232*8kB (UME) 2268*16kB (UME) 1399*32kB (UM) 768*64kB (UME) 185*128kB (UME) 17*256kB (UM) 11*512kB (UME) 5*1024kB (UE) 3*2048kB (UM) 50*4096kB (M) = 398108kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 8164 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 524186 pages RAM 0 pages HighMem/MovableOnly 103968 pages reserved syz-executor6: vmalloc: allocation failure: 4833356120 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor6 cpuset=/ mems_allowed=0-1 CPU: 2 PID: 5175 Comm: syz-executor6 Not tainted 4.13.0-rc6-next-20170825+ #9 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 warn_alloc+0x1c2/0x2f0 mm/page_alloc.c:3254 __vmalloc_node_range+0x599/0x730 mm/vmalloc.c:1781 __vmalloc_node mm/vmalloc.c:1810 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1832 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:529 [inline] kvmalloc_array include/linux/mm.h:545 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1610 net/ipv4/netfilter/ip_tables.c:692 do_replace net/ipv4/netfilter/ip_tables.c:1135 [inline] do_ipt_set_ctl+0x34b/0x5c0 net/ipv4/netfilter/ip_tables.c:1669 nf_sockopt net/netfilter/nf_sockopt.c:105 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:114 ip_setsockopt+0xa1/0xb0 net/ipv4/ip_sockglue.c:1251 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2800 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2970 SYSC_setsockopt net/socket.c:1852 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1831 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x446749 RSP: 002b:00007fb7becd1c08 EFLAGS: 00000296 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000025 RCX: 0000000000446749 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000025 RBP: 0000000000a5f870 R08: 0000000000000056 R09: 0000000000000000 R10: 0000000020006000 R11: 0000000000000296 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fb7becd29c0 R15: 00007fb7becd2700 netlink: 11 bytes leftover after parsing attributes in process `syz-executor0'. device lo entered promiscuous mode audit: type=1326 audit(1503858710.774:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5333 comm="syz-executor7" exe="/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 netlink: 12 bytes leftover after parsing attributes in process `syz-executor5'. audit: type=1326 audit(1503858710.843:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5333 comm="syz-executor7" exe="/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 netlink: 12 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor4'. kvm: emulating exchange as write QAT: Invalid ioctl QAT: Invalid ioctl dccp_v4_rcv: dropped packet with invalid checksum device lo entered promiscuous mode device lo left promiscuous mode audit: type=1326 audit(1503858711.270:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5555 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 audit: type=1326 audit(1503858711.418:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5555 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 SELinux: failure in selinux_parse_skb(), unable to parse packet SELinux: failure in selinux_parse_skb(), unable to parse packet SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5704 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5704 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=202 sclass=netlink_route_socket pig=5704 comm=syz-executor3 dccp_v4_rcv: dropped packet with invalid checksum SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5707 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5707 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5726 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=202 sclass=netlink_route_socket pig=5726 comm=syz-executor5 [drm:cirrus_gem_create] *ERROR* failed to allocate GEM object SELinux: unrecognized netlink message: protocol=0 nlmsg_type=202 sclass=netlink_route_socket pig=5704 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5740 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=202 sclass=netlink_route_socket pig=5740 comm=syz-executor5 device lo entered promiscuous mode [drm:cirrus_gem_create] *ERROR* failed to allocate GEM object A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. audit: type=1326 audit(1503858712.393:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5999 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. audit: type=1326 audit(1503858712.457:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6043 comm="syz-executor3" exe="/syz-executor3" sig=9 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0x0 audit: type=1326 audit(1503858712.535:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6043 comm="syz-executor3" exe="/syz-executor3" sig=9 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0x0 TCP: request_sock_TCP: Possible SYN flooding on port 20024. Sending cookies. Check SNMP counters. QAT: Invalid ioctl QAT: Invalid ioctl device lo entered promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode audit: type=1326 audit(1503858713.378:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6325 comm="syz-executor7" exe="/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0xffff0000 device lo entered promiscuous mode SELinux: failure in selinux_parse_skb(), unable to parse packet SELinux: failure in selinux_parse_skb(), unable to parse packet sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:0:0: [sg0] tag#0 CDB: Test Unit Ready sd 0:0:0:0: [sg0] tag#0 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 QAT: Invalid ioctl sd 0:0:0:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:0:0: [sg0] tag#0 CDB: Test Unit Ready sd 0:0:0:0: [sg0] tag#0 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:0:0: [sg0] tag#0 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 QAT: Invalid ioctl mmap: syz-executor1 (6453): VmData 13733888 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app rpcbind: RPC call returned error 22 rpcbind: RPC call returned error 22 dccp_v6_rcv: dropped packet with invalid checksum dccp_v6_rcv: dropped packet with invalid checksum kvm [6734]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x8000 kvm [6734]: vcpu1, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x8000 kauditd_printk_skb: 4 callbacks suppressed audit: type=1326 audit(1503858715.270:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6758 comm="syz-executor5" exe="/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x446749 code=0x0 hid-generic 0003:0627:0001.0001: pid 6778 passed too large report hid-generic 0003:0627:0001.0001: pid 6784 passed too large report PF_BRIDGE: RTM_SETLINK with unknown ifindex PF_BRIDGE: RTM_SETLINK with unknown ifindex QAT: Invalid ioctl QAT: Invalid ioctl nla_parse: 14 callbacks suppressed netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. sock: sock_set_timeout: `syz-executor0' (pid 7040) tries to set negative timeout sock: sock_set_timeout: `syz-executor0' (pid 7040) tries to set negative timeout SELinux: unknown mount option SELinux: unknown mount option