============================= WARNING: suspicious RCU usage 4.15.0+ #217 Not tainted ----------------------------- ./include/linux/rcupdate.h:302 Illegal context switch in RCU read-side critical section! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor5/10958: #0: (rcu_read_lock){....}, at: [<00000000a3a3c4b0>] __rds_conn_create+0xe46/0x1b50 net/rds/connection.c:218 stack backtrace: CPU: 1 PID: 10958 Comm: syz-executor5 Not tainted 4.15.0+ #217 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4592 rcu_preempt_sleep_check include/linux/rcupdate.h:301 [inline] ___might_sleep+0x385/0x470 kernel/sched/core.c:6093 __might_sleep+0x95/0x190 kernel/sched/core.c:6081 slab_pre_alloc_hook mm/slab.h:420 [inline] slab_alloc mm/slab.c:3365 [inline] kmem_cache_alloc+0x2a2/0x760 mm/slab.c:3539 rds_tcp_conn_alloc+0xa7/0x4e0 net/rds/tcp.c:296 __rds_conn_create+0x112f/0x1b50 net/rds/connection.c:227 rds_conn_create_outgoing+0x3f/0x50 net/rds/connection.c:309 rds_sendmsg+0xda3/0x2390 net/rds/send.c:1126 sock_sendmsg_nosec net/socket.c:630 [inline] sock_sendmsg+0xca/0x110 net/socket.c:640 SYSC_sendto+0x361/0x5c0 net/socket.c:1747 SyS_sendto+0x40/0x50 net/socket.c:1715 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ee/0xfa1 arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7fa2c79 RSP: 002b:00000000f779e09c EFLAGS: 00000286 ORIG_RAX: 0000000000000171 RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 0000000020fc2000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002069affb RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.h:420 in_atomic(): 1, irqs_disabled(): 0, pid: 10958, name: syz-executor5 1 lock held by syz-executor5/10958: #0: (rcu_read_lock){....}, at: [<00000000a3a3c4b0>] __rds_conn_create+0xe46/0x1b50 net/rds/connection.c:218 CPU: 1 PID: 10958 Comm: syz-executor5 Not tainted 4.15.0+ #217 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6128 __might_sleep+0x95/0x190 kernel/sched/core.c:6081 slab_pre_alloc_hook mm/slab.h:420 [inline] slab_alloc mm/slab.c:3365 [inline] kmem_cache_alloc+0x2a2/0x760 mm/slab.c:3539 rds_tcp_conn_alloc+0xa7/0x4e0 net/rds/tcp.c:296 __rds_conn_create+0x112f/0x1b50 net/rds/connection.c:227 rds_conn_create_outgoing+0x3f/0x50 net/rds/connection.c:309 rds_sendmsg+0xda3/0x2390 net/rds/send.c:1126 sock_sendmsg_nosec net/socket.c:630 [inline] sock_sendmsg+0xca/0x110 net/socket.c:640 SYSC_sendto+0x361/0x5c0 net/socket.c:1747 SyS_sendto+0x40/0x50 net/socket.c:1715 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ee/0xfa1 arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7fa2c79 RSP: 002b:00000000f779e09c EFLAGS: 00000286 ORIG_RAX: 0000000000000171 RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 0000000020fc2000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002069affb RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rpcbind: RPC call returned error 22 rpcbind: RPC call returned error 22 binder: 11194 RLIMIT_NICE not set binder: 11194 RLIMIT_NICE not set binder: 11194 RLIMIT_NICE not set binder: BINDER_SET_CONTEXT_MGR already set binder: 11187:11205 got reply transaction with no transaction stack binder: 11187:11205 transaction failed 29201/-71, size 0-0 line 2757 binder: 11187:11194 ioctl 40046207 0 returned -16 binder_alloc: 11187: binder_alloc_buf, no vma binder: 11187:11202 transaction failed 29189/-3, size 0-0 line 2957 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29201 binder: undelivered TRANSACTION_COMPLETE binder: undelivered TRANSACTION_COMPLETE binder: undelivered transaction 38, process died. SELinux: failed to load policy SELinux: failed to load policy binder: undelivered TRANSACTION_COMPLETE binder_alloc: binder_alloc_mmap_handler: 11394 20000000-20002000 already mapped failed -16 binder: BINDER_SET_CONTEXT_MGR already set binder_alloc: 11394: binder_alloc_buf, no vma binder: 11394:11410 transaction failed 29189/-3, size 0-0 line 2957 binder: 11394:11400 ioctl 40046207 0 returned -16 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered transaction 42, process died. device lo entered promiscuous mode bridge: RTM_NEWNEIGH with invalid state 0x0 device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode sctp: [Deprecated]: syz-executor2 (pid 11507) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor2 (pid 11515) Use of int in maxseg socket option. Use struct sctp_assoc_value instead kauditd_printk_skb: 51 callbacks suppressed audit: type=1400 audit(1518284528.308:129): avc: denied { sys_chroot } for pid=11524 comm="syz-executor3" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 netlink: 28 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 28 bytes leftover after parsing attributes in process `syz-executor1'. device eql entered promiscuous mode netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 'syz-executor0': attribute type 1 has an invalid length. netlink: 'syz-executor0': attribute type 1 has an invalid length. binder: 11895:11898 ioctl 8903 208a0ffc returned -22 binder: 11895:11898 ioctl 8904 20c05000 returned -22 binder: BINDER_SET_CONTEXT_MGR already set binder: 11895:11920 ioctl 40046207 0 returned -16 binder: 11895:11898 ioctl 8903 208a0ffc returned -22 binder: 11895:11898 ioctl 8904 20c05000 returned -22 netlink: 'syz-executor2': attribute type 1 has an invalid length. netlink: 'syz-executor2': attribute type 1 has an invalid length. 9pnet_virtio: no channels available for device ./file0 device ipddp0 entered promiscuous mode device ipddp0 left promiscuous mode 9pnet_virtio: no channels available for device ./file0 device lo entered promiscuous mode device lo left promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20026. Sending cookies. Check SNMP counters. audit: type=1400 audit(1518284530.428:130): avc: denied { map } for pid=12075 comm="syz-executor0" path="/dev/usbmon0" dev="devtmpfs" ino=1110 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 TCP: request_sock_TCP: Possible SYN flooding on port 20026. Sending cookies. Check SNMP counters. audit: type=1400 audit(1518284530.642:131): avc: denied { map } for pid=12122 comm="syz-executor4" path="mnt:[4026532878]" dev="nsfs" ino=4026532878 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=1 TCP: request_sock_TCP: Possible SYN flooding on port 20026. Sending cookies. Check SNMP counters. QAT: Invalid ioctl mmap: syz-executor1 (12229): VmData 35123200 exceed data ulimit 5. Update limits or use boot option ignore_rlimit_data. QAT: Invalid ioctl binder: BINDER_SET_CONTEXT_MGR already set binder: 12276:12288 ioctl 40046207 0 returned -16 BUG: sleeping function called from invalid context at mm/slab.h:420 in_atomic(): 1, irqs_disabled(): 0, pid: 12326, name: syz-executor2 1 lock held by syz-executor2/12326: #0: (rcu_read_lock){....}, at: [<00000000a3a3c4b0>] __rds_conn_create+0xe46/0x1b50 net/rds/connection.c:218 CPU: 0 PID: 12326 Comm: syz-executor2 Tainted: G W 4.15.0+ #217 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6128 __might_sleep+0x95/0x190 kernel/sched/core.c:6081 slab_pre_alloc_hook mm/slab.h:420 [inline] slab_alloc mm/slab.c:3365 [inline] kmem_cache_alloc_trace+0x299/0x740 mm/slab.c:3605 kmalloc include/linux/slab.h:512 [inline] kzalloc include/linux/slab.h:701 [inline] rds_loop_conn_alloc+0xc8/0x380 net/rds/loop.c:126 __rds_conn_create+0x112f/0x1b50 net/rds/connection.c:227 rds_conn_create_outgoing+0x3f/0x50 net/rds/connection.c:309 rds_sendmsg+0xda3/0x2390 net/rds/send.c:1126 sock_sendmsg_nosec net/socket.c:630 [inline] sock_sendmsg+0xca/0x110 net/socket.c:640 ___sys_sendmsg+0x320/0x8b0 net/socket.c:2046 __sys_sendmmsg+0x31b/0x620 net/socket.c:2129 C_SYSC_sendmmsg net/compat.c:745 [inline] compat_SyS_sendmmsg+0x32/0x40 net/compat.c:742 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ee/0xfa1 arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7f08c79 RSP: 002b:00000000f770409c EFLAGS: 00000286 ORIG_RAX: 0000000000000159 RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 0000000020573000 RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. device eql entered promiscuous mode skbuff: bad partial csum: csum=0/3849 len=3712 audit: type=1400 audit(1518284532.343:132): avc: denied { map } for pid=12409 comm="syz-executor6" path="/dev/sg0" dev="devtmpfs" ino=9139 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not nat x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not nat 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 device eql entered promiscuous mode binder: 12741:12746 transaction failed 29189/-22, size 0-0 line 2842 audit: type=1326 audit(1518284534.218:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7f08c79 code=0x7ffc0000 binder: 12741:12746 transaction failed 29189/-22, size 0-0 line 2842 audit: type=1326 audit(1518284534.218:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7f08c79 code=0x7ffc0000 audit: type=1326 audit(1518284534.221:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7f08c79 code=0x7ffc0000 audit: type=1326 audit(1518284534.221:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7f08c79 code=0x7ffc0000 audit: type=1326 audit(1518284534.230:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=265 compat=1 ip=0xf7f08c79 code=0x7ffc0000 audit: type=1326 audit(1518284534.230:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7f08c79 code=0x7ffc0000 audit: type=1326 audit(1518284534.230:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7f08c79 code=0x7ffc0000 audit: type=1326 audit(1518284534.234:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=267 compat=1 ip=0xf7f08c79 code=0x7ffc0000 audit: type=1326 audit(1518284534.235:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7f08c79 code=0x7ffc0000 audit: type=1326 audit(1518284534.235:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=12741 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7f08c79 code=0x7ffc0000 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29189