===================================== [ BUG: bad unlock balance detected! ] 4.9.79-g47af77b #26 Not tainted ------------------------------------- syz-executor2/9180 is trying to release lock (mrt_lock) at: [] ipmr_mfc_seq_stop+0xe4/0x140 net/ipv6/ip6mr.c:553 but there are no more locks to release! other info that might help us debug this: 2 locks held by syz-executor2/9180: #0: (sb_writers#7){.+.+.+}, at: [] file_start_write include/linux/fs.h:2621 [inline] #0: (sb_writers#7){.+.+.+}, at: [] do_sendfile+0x9ff/0xd30 fs/read_write.c:1400 #1: (&p->lock){+.+.+.}, at: [] seq_read+0xdd/0x1290 fs/seq_file.c:178 stack backtrace: CPU: 1 PID: 9180 Comm: syz-executor2 Not tainted 4.9.79-g47af77b #26 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d89572a8 ffffffff81d94b09 ffffffff849b6cb8 ffff8801c944c800 ffffffff834e8ee4 ffffffff849b6cb8 ffff8801c944d088 ffff8801d89572d8 ffffffff81237df4 dffffc0000000000 ffffffff849b6cb8 00000000ffffffff Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_unlock_imbalance_bug+0x174/0x1a0 kernel/locking/lockdep.c:3398 [] __lock_release kernel/locking/lockdep.c:3540 [inline] [] lock_release+0x6f8/0xb80 kernel/locking/lockdep.c:3775 [] __raw_read_unlock include/linux/rwlock_api_smp.h:225 [inline] [] _raw_read_unlock+0x1a/0x50 kernel/locking/spinlock.c:255 [] ipmr_mfc_seq_stop+0xe4/0x140 net/ipv6/ip6mr.c:553 [] seq_read+0xa83/0x1290 fs/seq_file.c:283 [] proc_reg_read+0xef/0x170 fs/proc/inode.c:202 [] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714 [] do_loop_readv_writev fs/read_write.c:880 [inline] [] do_readv_writev+0x520/0x750 fs/read_write.c:874 [] vfs_readv+0x84/0xc0 fs/read_write.c:898 [] kernel_readv fs/splice.c:363 [inline] [] default_file_splice_read+0x43f/0x7a0 fs/splice.c:435 [] do_splice_to+0x10a/0x160 fs/splice.c:899 [] splice_direct_to_actor+0x24d/0x800 fs/splice.c:971 [] do_splice_direct+0x1a7/0x270 fs/splice.c:1080 [] do_sendfile+0x54b/0xd30 fs/read_write.c:1401 [] SYSC_sendfile64 fs/read_write.c:1456 [inline] [] SyS_sendfile64+0xd1/0x160 fs/read_write.c:1448 [] entry_SYSCALL_64_fastpath+0x29/0xe8 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=9211 comm=syz-executor3 audit: type=1400 audit(1517642475.625:34): avc: denied { dac_override } for pid=9210 comm="syz-executor0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1517642475.645:35): avc: denied { net_admin } for pid=9209 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1517642475.705:36): avc: denied { net_admin } for pid=4046 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1517642475.705:37): avc: denied { dac_override } for pid=9210 comm="syz-executor0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 netlink: 64 bytes leftover after parsing attributes in process `syz-executor7'. audit: type=1400 audit(1517642475.715:38): avc: denied { net_broadcast } for pid=9235 comm="syz-executor7" capability=11 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 netlink: 64 bytes leftover after parsing attributes in process `syz-executor7'. qtaguid: iface_stat: iface_check_stats_reset_and_adjust(lo): iface reset its stats unexpectedly FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 9260 Comm: syz-executor4 Not tainted 4.9.79-g47af77b #26 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801d7c67960 ffffffff81d94b09 ffff8801d7c67c40 0000000000000000 ffff8801be4f6290 ffff8801d7c67b30 ffff8801be4f6180 ffff8801d7c67b58 ffffffff816624aa ffff8801d7c67980 ffff8801d7c67ab0 00000001ca87a067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa3a/0x1310 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5c2/0xd40 arch/x86/mm/fault.c:1407 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1470 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1055 [] entry_SYSCALL_64_fastpath+0x29/0xe8 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=9228 comm=syz-executor3 audit: type=1400 audit(1517642476.035:40): avc: denied { sys_admin } for pid=9274 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1517642476.035:39): avc: denied { create } for pid=9267 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517642476.035:41): avc: denied { write } for pid=9267 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517642476.065:42): avc: denied { setopt } for pid=9293 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 binder: 9278:9287 transaction failed 29201/-28, size 7425698754467420151-39376272579952564 line 3127 binder: undelivered TRANSACTION_ERROR: 29201 binder: 9431:9435 ioctl 8933 2056f000 returned -22 binder: 9431:9448 ioctl 8933 2056f000 returned -22 binder: BINDER_SET_CONTEXT_MGR already set binder: 9671:9672 ioctl 40046207 0 returned -16 binder: 9671:9685 ERROR: BC_REGISTER_LOOPER called without request binder: 9671:9672 got reply transaction with bad transaction stack, transaction 67 has target 9671:0 binder: 9671:9672 transaction failed 29201/-71, size 24-8 line 2935 binder: release 9671:9672 transaction 67 out, still active binder: 9671:9685 ERROR: BC_REGISTER_LOOPER called without request binder: undelivered TRANSACTION_COMPLETE binder: undelivered TRANSACTION_ERROR: 29201 binder: send failed reply for transaction 67, target dead binder: BINDER_SET_CONTEXT_MGR already set binder: 9671:9672 ioctl 40046207 0 returned -16 binder: 9671:9672 unknown command 76 binder: 9671:9672 ioctl c0306201 2000a000 returned -22 binder: 9671:9696 got reply transaction with no transaction stack binder: 9671:9696 transaction failed 29201/-71, size 24-8 line 2920 binder: undelivered TRANSACTION_ERROR: 29201 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 sock: process `syz-executor6' is using obsolete setsockopt SO_BSDCOMPAT IPVS: Creating netns size=2536 id=10 pktgen: kernel_thread() failed for cpu 0 pktgen: Cannot create thread for cpu 0 (-4) pktgen: kernel_thread() failed for cpu 1 pktgen: Cannot create thread for cpu 1 (-4) pktgen: Initialization failed for all threads TCP: request_sock_TCPv6: Possible SYN flooding on port 20006. Sending cookies. Check SNMP counters. SELinux: unknown mount option binder: 10661:10671 BC_DEAD_BINDER_DONE 0000000000000000 not found binder: 10661:10671 BC_DEAD_BINDER_DONE 0000000000000000 not found audit_printk_skb: 36 callbacks suppressed audit: type=1400 audit(1517642481.905:54): avc: denied { getopt } for pid=11036 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1517642481.945:55): avc: denied { ioctl } for pid=11036 comm="syz-executor3" path="socket:[21518]" dev="sockfs" ino=21518 ioctlcmd=0x8903 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1517642482.085:56): avc: denied { getattr } for pid=11078 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 netlink: 236 bytes leftover after parsing attributes in process `syz-executor3'. audit: type=1400 audit(1517642482.235:57): avc: denied { bind } for pid=11096 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 netlink: 236 bytes leftover after parsing attributes in process `syz-executor3'. audit: type=1400 audit(1517642482.405:58): avc: denied { read } for pid=11157 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1517642482.845:59): avc: denied { setopt } for pid=11389 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20010. Sending cookies. Check SNMP counters. net_ratelimit: 36 callbacks suppressed IPv4: Oversized IP packet from 127.0.0.1 audit: type=1400 audit(1517642483.005:60): avc: denied { setattr } for pid=11442 comm="syz-executor3" name="NETLINK" dev="sockfs" ino=22606 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 IPv4: Oversized IP packet from 127.0.0.1 audit: type=1400 audit(1517642483.095:61): avc: denied { setuid } for pid=11470 comm="syz-executor6" capability=7 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1517642483.245:62): avc: denied { create } for pid=11523 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 IPv4: Oversized IP packet from 127.0.0.1 audit: type=1400 audit(1517642483.315:63): avc: denied { connect } for pid=11555 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 52 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 52 bytes leftover after parsing attributes in process `syz-executor3'.