QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl ============================================ WARNING: possible recursive locking detected 4.15.0-rc8+ #269 Not tainted -------------------------------------------- syz-executor4/6372 is trying to acquire lock: (&vq->mutex){+.+.}, at: [<000000008cb3b78f>] vhost_dev_lock_vqs drivers/vhost/vhost.c:907 [inline] (&vq->mutex){+.+.}, at: [<000000008cb3b78f>] vhost_process_iotlb_msg drivers/vhost/vhost.c:997 [inline] (&vq->mutex){+.+.}, at: [<000000008cb3b78f>] vhost_chr_write_iter+0x278/0x1580 drivers/vhost/vhost.c:1046 but task is already holding lock: (&vq->mutex){+.+.}, at: [<000000008cb3b78f>] vhost_dev_lock_vqs drivers/vhost/vhost.c:907 [inline] (&vq->mutex){+.+.}, at: [<000000008cb3b78f>] vhost_process_iotlb_msg drivers/vhost/vhost.c:997 [inline] (&vq->mutex){+.+.}, at: [<000000008cb3b78f>] vhost_chr_write_iter+0x278/0x1580 drivers/vhost/vhost.c:1046 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&vq->mutex); lock(&vq->mutex); *** DEADLOCK *** May be due to missing lock nesting notation 1 lock held by syz-executor4/6372: #0: (&vq->mutex){+.+.}, at: [<000000008cb3b78f>] vhost_dev_lock_vqs drivers/vhost/vhost.c:907 [inline] #0: (&vq->mutex){+.+.}, at: [<000000008cb3b78f>] vhost_process_iotlb_msg drivers/vhost/vhost.c:997 [inline] #0: (&vq->mutex){+.+.}, at: [<000000008cb3b78f>] vhost_chr_write_iter+0x278/0x1580 drivers/vhost/vhost.c:1046 stack backtrace: CPU: 1 PID: 6372 Comm: syz-executor4 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 print_deadlock_bug kernel/locking/lockdep.c:1756 [inline] check_deadlock kernel/locking/lockdep.c:1800 [inline] validate_chain kernel/locking/lockdep.c:2396 [inline] __lock_acquire+0xe8f/0x3e00 kernel/locking/lockdep.c:3426 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:3914 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1a80 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 vhost_dev_lock_vqs drivers/vhost/vhost.c:907 [inline] vhost_process_iotlb_msg drivers/vhost/vhost.c:997 [inline] vhost_chr_write_iter+0x278/0x1580 drivers/vhost/vhost.c:1046 vhost_net_chr_write_iter+0x59/0x70 drivers/vhost/net.c:1353 call_write_iter include/linux/fs.h:1772 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x684/0x970 fs/read_write.c:482 vfs_write+0x189/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x452ee9 RSP: 002b:00007f1d17c3fc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 RDX: 0000000000000068 RSI: 00000000201c4000 RDI: 0000000000000014 RBP: 000000000000006c R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006efac0 R13: 00000000ffffffff R14: 00007f1d17c406d4 R15: 0000000000000000 QAT: Invalid ioctl QAT: Invalid ioctl sctp: [Deprecated]: syz-executor3 (pid 6537) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor3 (pid 6537) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. QAT: Invalid ioctl netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=4 nlmsg_type=33 sclass=netlink_tcpdiag_socket pig=6817 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=33 sclass=netlink_tcpdiag_socket pig=6835 comm=syz-executor4 dccp_invalid_packet: P.Data Offset(0) too small kauditd_printk_skb: 308 callbacks suppressed audit: type=1326 audit(1516425695.424:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452ee9 code=0x7ffc0000 audit: type=1326 audit(1516425695.431:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452ee9 code=0x7ffc0000 audit: type=1326 audit(1516425695.431:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=2 compat=0 ip=0x40d1e1 code=0x7ffc0000 audit: type=1326 audit(1516425695.431:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452ee9 code=0x7ffc0000 audit: type=1326 audit(1516425695.431:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452ee9 code=0x7ffc0000 audit: type=1326 audit(1516425695.460:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=16 compat=0 ip=0x452ee9 code=0x7ffc0000 audit: type=1326 audit(1516425695.460:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452ee9 code=0x7ffc0000 audit: type=1326 audit(1516425695.460:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452ee9 code=0x7ffc0000 audit: type=1326 audit(1516425695.460:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=282 compat=0 ip=0x452ee9 code=0x7ffc0000 audit: type=1326 audit(1516425695.461:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6940 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452ee9 code=0x7ffc0000 irq bypass consumer (token 000000006c92b4fc) registration fails: -16 binder: 7180:7184 not enough space to store 10 fds in buffer binder: 7180:7184 transaction failed 29201/-22, size 72-16 line 3045 binder_alloc: binder_alloc_mmap_handler: 7180 20000000-20002000 already mapped failed -16 binder: BINDER_SET_CONTEXT_MGR already set binder: 7180:7208 ioctl 40046207 0 returned -16 binder_alloc: 7180: binder_alloc_buf, no vma binder: 7180:7201 transaction failed 29189/-3, size 72-16 line 2903 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29201 irq bypass consumer (token 000000004074bc39) registration fails: -16 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 1 PID: 7465 Comm: syz-executor4 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 kmem_cache_zalloc include/linux/slab.h:678 [inline] ebitmap_cpy+0xce/0x260 security/selinux/ss/ebitmap.c:60 mls_context_cpy security/selinux/ss/context.h:51 [inline] mls_compute_sid+0x555/0x930 security/selinux/ss/mls.c:556 security_compute_sid+0x8df/0x18f0 security/selinux/ss/services.c:1724 security_transition_sid+0x75/0x90 security/selinux/ss/services.c:1763 socket_sockcreate_sid security/selinux/hooks.c:4335 [inline] selinux_socket_create+0x3cf/0x740 security/selinux/hooks.c:4368 security_socket_create+0x83/0xc0 security/security.c:1338 __sock_create+0xf7/0x850 net/socket.c:1222 sock_create net/socket.c:1307 [inline] SYSC_socket net/socket.c:1337 [inline] SyS_socket+0xeb/0x1d0 net/socket.c:1317 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x452ee9 RSP: 002b:00007f1d17c3fc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007f1d17c3faa0 RCX: 0000000000452ee9 RDX: 0000000000000084 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00007f1d17c3fa90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7c76 R13: 00007f1d17c3fbc8 R14: 00000000004b7c76 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 7477 Comm: syz-executor4 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 kmem_cache_zalloc include/linux/slab.h:678 [inline] ebitmap_cpy+0xce/0x260 security/selinux/ss/ebitmap.c:60 mls_context_cpy security/selinux/ss/context.h:51 [inline] mls_compute_sid+0x555/0x930 security/selinux/ss/mls.c:556 security_compute_sid+0x8df/0x18f0 security/selinux/ss/services.c:1724 security_transition_sid+0x75/0x90 security/selinux/ss/services.c:1763 socket_sockcreate_sid security/selinux/hooks.c:4335 [inline] selinux_socket_create+0x3cf/0x740 security/selinux/hooks.c:4368 security_socket_create+0x83/0xc0 security/security.c:1338 __sock_create+0xf7/0x850 net/socket.c:1222 sock_create net/socket.c:1307 [inline] SYSC_socket net/socket.c:1337 [inline] SyS_socket+0xeb/0x1d0 net/socket.c:1317 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x452ee9 RSP: 002b:00007f1d17c3fc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007f1d17c3faa0 RCX: 0000000000452ee9 RDX: 0000000000000084 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00007f1d17c3fa90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7c76 R13: 00007f1d17c3fbc8 R14: 00000000004b7c76 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 7489 Comm: syz-executor4 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 kmem_cache_zalloc include/linux/slab.h:678 [inline] ebitmap_cpy+0xce/0x260 security/selinux/ss/ebitmap.c:60 mls_context_cpy security/selinux/ss/context.h:51 [inline] mls_compute_sid+0x555/0x930 security/selinux/ss/mls.c:556 security_compute_sid+0x8df/0x18f0 security/selinux/ss/services.c:1724 security_transition_sid+0x75/0x90 security/selinux/ss/services.c:1763 socket_sockcreate_sid security/selinux/hooks.c:4335 [inline] selinux_socket_create+0x3cf/0x740 security/selinux/hooks.c:4368 security_socket_create+0x83/0xc0 security/security.c:1338 __sock_create+0xf7/0x850 net/socket.c:1222 sock_create net/socket.c:1307 [inline] SYSC_socket net/socket.c:1337 [inline] SyS_socket+0xeb/0x1d0 net/socket.c:1317 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x452ee9 RSP: 002b:00007f1d17c3fc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007f1d17c3faa0 RCX: 0000000000452ee9 RDX: 0000000000000084 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00007f1d17c3fa90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7c76 R13: 00007f1d17c3fbc8 R14: 00000000004b7c76 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 7510 Comm: syz-executor4 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 sock_alloc_inode+0x70/0x300 net/socket.c:250 alloc_inode+0x65/0x180 fs/inode.c:208 new_inode_pseudo+0x69/0x190 fs/inode.c:890 sock_alloc+0x41/0x270 net/socket.c:571 __sock_create+0x148/0x850 net/socket.c:1231 sock_create net/socket.c:1307 [inline] SYSC_socket net/socket.c:1337 [inline] SyS_socket+0xeb/0x1d0 net/socket.c:1317 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x452ee9 RSP: 002b:00007f1d17c3fc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007f1d17c3faa0 RCX: 0000000000452ee9 RDX: 0000000000000084 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00007f1d17c3fa90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7c76 R13: 00007f1d17c3fbc8 R14: 00000000004b7c76 R15: 0000000000000000 socket: no more sockets 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 7913 Comm: syz-executor6 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 audit_buffer_alloc kernel/audit.c:1625 [inline] audit_log_start+0x4cb/0xa10 kernel/audit.c:1743 __audit_seccomp+0x31/0x240 kernel/auditsc.c:2473 seccomp_log kernel/seccomp.c:592 [inline] __seccomp_filter+0xb53/0xe90 kernel/seccomp.c:726 __secure_computing+0xe6/0x400 kernel/seccomp.c:789 syscall_trace_enter+0x465/0x1100 arch/x86/entry/common.c:119 do_syscall_64+0x625/0x920 arch/x86/entry/common.c:277 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452ee9 RSP: 002b:00007f78036cdc58 EFLAGS: 00000212 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 RDX: 00000000203d1fbf RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00000000000003ba R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000212 R12: 00000000006f4a10 R13: 0000000000000013 R14: 00007f78036ce6d4 R15: ffffffffffffffff FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 7942 Comm: syz-executor6 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3289 [inline] kmem_cache_alloc_node+0x56/0x760 mm/slab.c:3632 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:983 [inline] nlmsg_new include/net/netlink.h:511 [inline] audit_buffer_alloc kernel/audit.c:1629 [inline] audit_log_start+0x4ef/0xa10 kernel/audit.c:1743 __audit_seccomp+0x31/0x240 kernel/auditsc.c:2473 seccomp_log kernel/seccomp.c:592 [inline] __seccomp_filter+0xb53/0xe90 kernel/seccomp.c:726 __secure_computing+0xe6/0x400 kernel/seccomp.c:789 syscall_trace_enter+0x465/0x1100 arch/x86/entry/common.c:119 do_syscall_64+0x625/0x920 arch/x86/entry/common.c:277 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452ee9 RSP: 002b:00007f78036cdc58 EFLAGS: 00000212 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 RDX: 00000000203d1fbf RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00000000000003ba R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000212 R12: 00000000006f4a10 R13: 0000000000000013 R14: 00007f78036ce6d4 R15: ffffffffffffffff FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 7957 Comm: syz-executor6 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3289 [inline] kmem_cache_alloc_node_trace+0x5a/0x750 mm/slab.c:3651 __do_kmalloc_node mm/slab.c:3671 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3686 __kmalloc_reserve.isra.39+0x41/0xd0 net/core/skbuff.c:137 __alloc_skb+0x13b/0x780 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:983 [inline] nlmsg_new include/net/netlink.h:511 [inline] audit_buffer_alloc kernel/audit.c:1629 [inline] audit_log_start+0x4ef/0xa10 kernel/audit.c:1743 __audit_seccomp+0x31/0x240 kernel/auditsc.c:2473 seccomp_log kernel/seccomp.c:592 [inline] __seccomp_filter+0xb53/0xe90 kernel/seccomp.c:726 __secure_computing+0xe6/0x400 kernel/seccomp.c:789 syscall_trace_enter+0x465/0x1100 arch/x86/entry/common.c:119 do_syscall_64+0x625/0x920 arch/x86/entry/common.c:277 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452ee9 RSP: 002b:00007f78036cdc58 EFLAGS: 00000212 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 RDX: 00000000203d1fbf RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00000000000003ba R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000212 R12: 00000000006f4a10 R13: 0000000000000013 R14: 00007f78036ce6d4 R15: ffffffffffffffff kauditd_printk_skb: 336 callbacks suppressed audit: type=1326 audit(1516425701.002:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7963 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452ee9 code=0x7ffc0000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 7967 Comm: syz-executor6 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] __do_kmalloc mm/slab.c:3706 [inline] __kmalloc+0x63/0x760 mm/slab.c:3717 kmalloc include/linux/slab.h:504 [inline] context_struct_to_string+0x353/0x720 security/selinux/ss/services.c:1220 security_sid_to_context_core+0x18a/0x250 security/selinux/ss/services.c:1291 security_sid_to_context+0x25/0x30 security/selinux/ss/services.c:1311 selinux_secid_to_secctx+0x23/0x30 security/selinux/hooks.c:6084 security_secid_to_secctx+0x83/0xc0 security/security.c:1280 audit_log_task_context+0x15a/0x260 kernel/audit.c:2164 audit_log_task+0x256/0x3f0 kernel/auditsc.c:2438 __audit_seccomp+0x4a/0x240 kernel/auditsc.c:2476 seccomp_log kernel/seccomp.c:592 [inline] __seccomp_filter+0xb53/0xe90 kernel/seccomp.c:726 __secure_computing+0xe6/0x400 kernel/seccomp.c:789 syscall_trace_enter+0x465/0x1100 arch/x86/entry/common.c:119 do_syscall_64+0x625/0x920 arch/x86/entry/common.c:277 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452ee9 RSP: 002b:00007f78036cdc58 EFLAGS: 00000212 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 RDX: 00000000203d1fbf RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00000000000003ba R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000212 R12: 00000000006f4a10 R13: 0000000000000013 R14: 00007f78036ce6d4 R15: ffffffffffffffff audit: error in audit_log_task_context FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 7985 Comm: syz-executor6 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc_trace+0x4b/0x750 mm/slab.c:3608 kmalloc include/linux/slab.h:499 [inline] audit_log_d_path+0xa6/0x170 kernel/audit.c:1976 audit_log_d_path_exe+0x62/0x80 kernel/audit.c:2193 audit_log_task+0x2f3/0x3f0 kernel/auditsc.c:2441 __audit_seccomp+0x4a/0x240 kernel/auditsc.c:2476 seccomp_log kernel/seccomp.c:592 [inline] __seccomp_filter+0xb53/0xe90 kernel/seccomp.c:726 __secure_computing+0xe6/0x400 kernel/seccomp.c:789 syscall_trace_enter+0x465/0x1100 arch/x86/entry/common.c:119 do_syscall_64+0x625/0x920 arch/x86/entry/common.c:277 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452ee9 RSP: 002b:00007f78036cdc58 EFLAGS: 00000212 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 RDX: 00000000203d1fbf RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00000000000003ba R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000212 R12: 00000000006f4a10 R13: 0000000000000013 R14: 00007f78036ce6d4 R15: ffffffffffffffff sctp: [Deprecated]: syz-executor2 (pid 7997) Use of int in maxseg socket option. Use struct sctp_assoc_value instead FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 8000 Comm: syz-executor6 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2948 [inline] prepare_alloc_pages mm/page_alloc.c:4187 [inline] __alloc_pages_nodemask+0x338/0xd80 mm/page_alloc.c:4226 __alloc_pages include/linux/gfp.h:456 [inline] __alloc_pages_node include/linux/gfp.h:469 [inline] kmem_getpages mm/slab.c:1413 [inline] cache_grow_begin+0x72/0x3f0 mm/slab.c:2668 cache_alloc_refill mm/slab.c:3035 [inline] ____cache_alloc mm/slab.c:3117 [inline] __do_cache_alloc mm/slab.c:3339 [inline] slab_alloc mm/slab.c:3374 [inline] kmem_cache_alloc_trace+0x3f0/0x750 mm/slab.c:3608 kmalloc include/linux/slab.h:499 [inline] audit_log_d_path+0xa6/0x170 kernel/audit.c:1976 audit_log_d_path_exe+0x62/0x80 kernel/audit.c:2193 audit_log_task+0x2f3/0x3f0 kernel/auditsc.c:2441 __audit_seccomp+0x4a/0x240 kernel/auditsc.c:2476 seccomp_log kernel/seccomp.c:592 [inline] __seccomp_filter+0xb53/0xe90 kernel/seccomp.c:726 __secure_computing+0xe6/0x400 kernel/seccomp.c:789 syscall_trace_enter+0x465/0x1100 arch/x86/entry/common.c:119 do_syscall_64+0x625/0x920 arch/x86/entry/common.c:277 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452ee9 RSP: 002b:00007f78036cdc58 EFLAGS: 00000212 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 RDX: 00000000203d1fbf RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00000000000003ba R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000212 R12: 00000000006f4a10 R13: 0000000000000013 R14: 00007f78036ce6d4 R15: ffffffffffffffff sctp: [Deprecated]: syz-executor2 (pid 8003) Use of int in maxseg socket option. Use struct sctp_assoc_value instead FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8023 Comm: syz-executor6 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] __do_kmalloc mm/slab.c:3706 [inline] __kmalloc+0x63/0x760 mm/slab.c:3717 kmalloc include/linux/slab.h:504 [inline] keyctl_update_key+0x44/0x100 security/keys/keyctl.c:332 SYSC_keyctl security/keys/keyctl.c:1649 [inline] SyS_keyctl+0x278/0x2c0 security/keys/keyctl.c:1637 do_syscall_64+0x273/0x920 arch/x86/entry/common.c:285 entry_SYSCALL64_slow_path+0x25/0x25 RIP: 0033:0x452ee9 RSP: 002b:00007f78036cdc58 EFLAGS: 00000212 ORIG_RAX: 00000000000000fa RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 RDX: 00000000203d1fbf RSI: 0000000000000000 RDI: 0000000000000002 RBP: 00000000000003ba R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000212 R12: 00000000006f4a10 R13: 0000000000000013 R14: 00007f78036ce6d4 R15: ffffffffffffffff FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8042 Comm: syz-executor6 Not tainted 4.15.0-rc8+ #269 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53