===================================== [ BUG: bad unlock balance detected! ] 4.9.69-g3f1d77c #108 Not tainted ------------------------------------- syz-executor2/5242 is trying to release lock ([ 34.284144] binder: 5248:5250 got transaction with invalid offset (0, min 0 max 0) or object. binder: 5248:5250 transaction failed 29201/-22, size 0-8 line 3193 binder: 5248:5250 got transaction with too large buffer binder: 5248:5250 transaction failed 29201/-22, size 40-16 line 3289 binder_alloc: 5248: binder_alloc_buf, no vma binder: 5248:5255 transaction failed 29189/-3, size 0-8 line 3130 binder: BINDER_SET_CONTEXT_MGR already set binder: 5248:5250 ioctl 40046207 0 returned -16 binder_alloc: 5248: binder_alloc_buf, no vma binder: 5248:5250 transaction failed 29189/-3, size 40-16 line 3130 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29201 mrt_lock) at: but there are no more locks to release! other info that might help us debug this: 1 lock held by syz-executor2/5242: #0: (&p->lock){+.+.+.}, at: [] seq_read+0xdd/0x1290 fs/seq_file.c:178 stack backtrace: CPU: 1 PID: 5242 Comm: syz-executor2 Not tainted 4.9.69-g3f1d77c #108 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801cf6af8e8 ffffffff81d90a29 ffffffff849ae9f8 ffff8801d6cab000 ffffffff834dfd74 ffffffff849ae9f8 ffff8801d6cab888 ffff8801cf6af918 ffffffff81235404 dffffc0000000000 ffffffff849ae9f8 00000000ffffffff Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] print_unlock_imbalance_bug+0x174/0x1a0 kernel/locking/lockdep.c:3398 [] __lock_release kernel/locking/lockdep.c:3540 [inline] [] lock_release+0x6f8/0xb80 kernel/locking/lockdep.c:3775 [] __raw_read_unlock include/linux/rwlock_api_smp.h:225 [inline] [] _raw_read_unlock+0x1a/0x50 kernel/locking/spinlock.c:255 [] ipmr_mfc_seq_stop+0xe4/0x140 net/ipv6/ip6mr.c:553 [] seq_read+0xa83/0x1290 fs/seq_file.c:283 [] proc_reg_read+0xef/0x170 fs/proc/inode.c:202 [] do_loop_readv_writev.part.17+0x141/0x1e0 fs/read_write.c:714 [] do_loop_readv_writev fs/read_write.c:880 [inline] [] do_readv_writev+0x520/0x750 fs/read_write.c:874 [] vfs_readv+0x84/0xc0 fs/read_write.c:898 [] do_readv+0xe6/0x250 fs/read_write.c:924 [] SYSC_readv fs/read_write.c:1011 [inline] [] SyS_readv+0x27/0x30 fs/read_write.c:1008 [] entry_SYSCALL_64_fastpath+0x23/0xc6 program syz-executor3 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 program syz-executor3 is using a deprecated SCSI ioctl, please convert it to SG_IO sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 device lo entered promiscuous mode netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'. audit: type=1400 audit(1513488502.843:33): avc: denied { accept } for pid=5397 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. audit: type=1400 audit(1513488503.003:34): avc: denied { read } for pid=5408 comm="syz-executor4" path="socket:[13711]" dev="sockfs" ino=13711 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. devpts: called with bogus options devpts: called with bogus options FAULT_FLAG_ALLOW_RETRY missing 70 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 5646 Comm: syz-executor7 Not tainted 4.9.69-g3f1d77c #108 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801a59878e0 ffffffff81d90a29 ffff8801a5987bc0 0000000000000000 ffff8801c47d7310 ffff8801a5987ab0 ffff8801c47d7200 ffff8801a5987ad8 ffffffff8165e557 ffff8801a4898000 ffff8801a5987a30 00000001cf14c067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5c2/0xd40 arch/x86/mm/fault.c:1406 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1469 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012 [] getname_flags+0x10e/0x580 fs/namei.c:148 [] getname fs/namei.c:208 [inline] [] user_path_create fs/namei.c:3695 [inline] [] SYSC_mkdirat fs/namei.c:3839 [inline] [] SyS_mkdirat fs/namei.c:3831 [inline] [] SYSC_mkdir fs/namei.c:3858 [inline] [] SyS_mkdir+0xa6/0x260 fs/namei.c:3856 [] entry_SYSCALL_64_fastpath+0x23/0xc6 CPU: 0 PID: 5650 Comm: syz-executor7 Not tainted 4.9.69-g3f1d77c #108 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801a6937ae0 ffffffff81d90a29 ffff8801a6937dc0 0000000000000000 ffff8801c47d7310 ffff8801a6937cb0 ffff8801c47d7200 ffff8801a6937cd8 ffffffff8165e557 0000000000000000 ffff8801a6937c30 00000001cf14c067 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] handle_userfault+0xa37/0x1300 fs/userfaultfd.c:323 [] do_anonymous_page mm/memory.c:2747 [inline] [] handle_pte_fault mm/memory.c:3488 [inline] [] __handle_mm_fault mm/memory.c:3577 [inline] [] handle_mm_fault+0x1fd1/0x2530 mm/memory.c:3614 [] __do_page_fault+0x5c2/0xd40 arch/x86/mm/fault.c:1406 [] do_page_fault+0x27/0x30 arch/x86/mm/fault.c:1469 [] page_fault+0x28/0x30 arch/x86/entry/entry_64.S:1012