Mar 16, 201821 min read ☕ (Last updated: Mar 22, 2018)

Linux Kernel - 2018-03-3 Founds

perf_trace_buf_alloc - warn

Found in LK v4.16.0-rc5.

Call Trace (Dump)

[  100.240063] perf buffer not large enough
[  100.240092] WARNING: CPU: 0 PID: 23132 at kernel/trace/trace_event_perf.c:288 perf_trace_buf_alloc+0x12a/0x170
[  100.241844] Kernel panic - not syncing: panic_on_warn set ...

Code

In /include/linux/trace_events.h.

#define PERF_MAX_TRACE_SIZE	2048
...

void *perf_trace_buf_alloc(int size, struct pt_regs **regs, int *rctxp)
{
	char *raw_data;
	int rctx;

	BUILD_BUG_ON(PERF_MAX_TRACE_SIZE % sizeof(unsigned long));

	if (WARN_ONCE(size > PERF_MAX_TRACE_SIZE,
		      "perf buffer not large enough"))
		return NULL;

	*rctxp = rctx = perf_swevent_get_recursion_context();
	if (rctx < 0)
		return NULL;

	if (regs)
		*regs = this_cpu_ptr(&__perf_regs[rctx]);
	raw_data = this_cpu_ptr(perf_trace_buf[rctx]);

	/* zero the dead bytes from align to not leak stack to user */
	memset(&raw_data[size - sizeof(u64)], 0, sizeof(u64));
	return raw_data;
}

Just size is over 2048, so WARN_ONCE is just called...

And all of the codes which reference perf_tracE_buf_alloc are maybe safe because of handling null value.

End

socket - memory leak

Got from syzkaller & Found in LK v4.16.0-rc5 with enabling CONFIG_FAULT_INJECTION.

Call Trace (Dump)

[  144.332562] FAULT_INJECTION: forcing a failure.
[  144.332562] name failslab, interval 1, probability 0, space 0, times 0
[  144.333783] CPU: 0 PID: 6129 Comm: syz-executor4 Not tainted 4.16.0-rc5+ #12
[  144.334423] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
[  144.335236] Call Trace:
[  144.335453]  dump_stack+0xb9/0x11b
[  144.335788]  should_fail.cold.3+0x3d/0x4f
[  144.336155]  ? should_failslab+0x5e/0x90
[  144.336533]  ? kmem_cache_alloc_trace+0x244/0x340
[  144.336945]  ? sctp_auth_shkey_create+0x33/0x80
[  144.337350]  ? sctp_endpoint_new+0x1be/0x3b0
[  144.337798]  ? sctp_init_sock+0x219/0x3b0
[  144.338233]  ? sctp_destroy_sock+0x140/0x140
[  144.338662]  ? inet6_create+0x35f/0x630
[  144.339063]  ? __sock_create+0x231/0x3e0
[  144.339470]  ? SyS_socket+0x5e/0xc0
[  144.339843]  ? do_syscall_64+0x73/0x1f0
[  144.340348]  ? entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  144.817626] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[  150.885525] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
2018/03/12 14:50:35 BUG: memory leak
ferenced object 0xffff8e356d2e0880 (size 1872):
  comm "syz-executor4", pid 6106, jiffies 4294811594 (age 6.629s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    0a 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00  ...@............
  backtrace:
    [<000000004c693a10>] 0xffffffffffffffff

2018/03/12 14:50:35 BUG: memory leak
unreferenced object 0xffff8e357a154760 (size 32):
  comm "syz-executor4", pid 6106, jiffies 4294811594 (age 6.636s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    03 00 00 00 03 00 00 00 0f 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000004c693a10>] 0xffffffffffffffff

End

xfrm_state_find - stack out of bounds

Found in LK v4.16.0-rc6.

stack-out-of-bounds in xfrm_state_find, 4 bytes read.

Call Trace (Dump)

[  467.981313]  dump_stack+0x10a/0x1dd
[  467.981824]  ? _atomic_dec_and_lock+0x163/0x163
[  467.982417]  ? show_regs_print_info+0x12/0x12
[  467.983088]  ? xfrm_state_find+0x3c6/0x30f0
[  467.983660]  print_address_description+0x60/0x224
[  467.984438]  ? xfrm_state_find+0x3c6/0x30f0
[  467.985208]  kasan_report+0x196/0x2a0
[  467.985839]  ? xfrm_state_find+0x2ea6/0x30f0
[  467.986510]  ? xfrm_state_find+0x2ea6/0x30f0
[  467.987035]  ? save_trace+0x300/0x300
[  467.987683]  ? xfrm_state_afinfo_get_rcu+0x170/0x170
[  467.988511]  ? find_held_lock+0x32/0x1b0
[  467.989193]  ? print_usage_bug+0x140/0x140
[  467.989939]  ? lock_acquire+0x4a0/0x4a0
[  467.990594]  ? print_usage_bug+0x140/0x140
[  467.991269]  ? rcutorture_record_progress+0x10/0x10
[  467.992089]  ? __lock_is_held+0xad/0x140
[  467.992805]  ? dequeue_task_fair+0x3730/0x3730
[  467.993593]  ? __lock_acquire+0x911/0x4670
[  467.994320]  ? __lock_acquire+0x911/0x4670
[  467.994977]  ? reweight_entity+0xfe0/0xfe0
[  467.995468]  ? put_prev_task_fair+0x70/0x70
[  467.996041]  ? debug_check_no_locks_freed+0x210/0x210
[  467.996743]  ? debug_check_no_locks_freed+0x210/0x210
[  467.997342]  ? dequeue_task_fair+0x1586/0x3730
[  467.997961]  ? print_usage_bug+0x140/0x140
[  467.998657]  ? xfrm_tmpl_resolve+0x2be/0xb30
[  467.999321]  ? __xfrm_decode_session+0xf0/0xf0
[  468.000063]  ? rcu_read_lock_sched_held+0xe4/0x120
[  468.000597]  ? fib_table_lookup+0xa64/0x1960
[  468.001290]  ? xfrm_resolve_and_create_bundle+0x134/0x27e0
[  468.002054]  ? print_usage_bug+0x140/0x140
[  468.002742]  ? save_trace+0x300/0x300
[  468.003395]  ? save_trace+0x300/0x300
[  468.003849]  ? __lock_acquire+0x911/0x4670
[  468.004300]  ? xfrm_tmpl_resolve+0xb30/0xb30
[  468.004790]  ? print_usage_bug+0x140/0x140
[  468.005249]  ? find_held_lock+0x32/0x1b0
[  468.005615]  ? xfrm_sk_policy_lookup+0x306/0x450
[  468.006131]  ? lock_acquire+0x4a0/0x4a0
[  468.006474]  ? lock_downgrade+0x6e0/0x6e0
[  468.008510]  ? refcount_inc_not_zero+0xf5/0x180
[  468.008982]  ? rcutorture_record_progress+0x10/0x10
[  468.009514]  ? xfrm_selector_match+0x36/0xdc0
[  468.010028]  ? xfrm_sk_policy_lookup+0x32f/0x450
[  468.010523]  ? xfrm_selector_match+0xdc0/0xdc0
[  468.011027]  ? xfrm_lookup+0x336/0x21a0
[  468.011376]  ? xfrm_lookup+0x336/0x21a0
[  468.011745]  ? set_load_weight+0x270/0x270
[  468.012272]  ? xfrm_policy_lookup_bytype.constprop.49+0x1700/0x1700
[  468.013118]  ? find_held_lock+0x32/0x1b0
[  468.013609]  ? ip_route_output_key_hash+0x229/0x350
[  468.014352]  ? lock_acquire+0x4a0/0x4a0
[  468.014825]  ? lock_downgrade+0x6e0/0x6e0
[  468.015359]  ? find_held_lock+0x32/0x1b0
[  468.015827]  ? rcutorture_record_progress+0x10/0x10
[  468.016418]  ? raw_sendmsg+0x89a/0x3b80
[  468.016883]  ? ip_route_output_key_hash+0x252/0x350
[  468.017519]  ? ip_route_output_key_hash_rcu+0x2c70/0x2c70
[  468.018206]  ? debug_check_no_locks_freed+0x210/0x210
[  468.018816]  ? xfrm_lookup_route+0x34/0x1a0
[  468.019364]  ? ip_route_output_flow+0x86/0xa0
[  468.019834]  ? raw_sendmsg+0xef5/0x3b80
[  468.020248]  ? raw_getsockopt+0xd0/0xd0
[  468.020691]  ? refill_pi_state_cache.part.7+0x2f0/0x2f0
[  468.021153]  ? _raw_spin_unlock_irqrestore+0x46/0x60
[  468.021590]  ? get_futex_value_locked+0xc0/0xf0
[  468.022099]  ? futex_wait_setup+0x1f9/0x380
[  468.022659]  ? save_trace+0x300/0x300
[  468.023075]  ? find_held_lock+0x32/0x1b0
[  468.023511]  ? futex_wake+0x630/0x630
[  468.023920]  ? futex_wake+0x528/0x630
[  468.024341]  ? __might_fault+0x104/0x1b0
[  468.024784]  ? lock_downgrade+0x6e0/0x6e0
[  468.025245]  ? rw_copy_check_uvector+0x227/0x2f0
[  468.025668]  ? import_iovec+0x20b/0x3d0
[  468.026105]  ? sock_has_perm+0x26e/0x360
[  468.026527]  ? selinux_secmark_relabel_packet+0xc0/0xc0
[  468.027099]  ? _copy_from_user+0x94/0x100
[  468.027534]  ? inet_sendmsg+0x12d/0x590
[  468.027947]  ? inet_sk_rebuild_header+0x1b30/0x1b30
[  468.028463]  ? SYSC_sendto+0x560/0x560
[  468.028881]  ? inet_sk_rebuild_header+0x1b30/0x1b30
[  468.029438]  ? sock_sendmsg+0xc0/0x100
[  468.029840]  ? ___sys_sendmsg+0x2e9/0x820
[  468.030237]  ? copy_msghdr_from_user+0x4f0/0x4f0
[  468.030726]  ? finish_task_switch+0x182/0x740
[  468.031282]  ? set_load_weight+0x270/0x270
[  468.031800]  ? lock_repin_lock+0x410/0x410
[  468.032354]  ? __fget_light+0x28c/0x3a0
[  468.032825]  ? __schedule+0x75c/0x1ea0
[  468.033315]  ? __sched_text_start+0x8/0x8
[  468.033813]  ? __sys_sendmmsg+0x1ce/0x590
[  468.034328]  ? SyS_sendmsg+0x40/0x40
[  468.034771]  ? fget_raw+0x20/0x20
[  468.035246]  ? selinux_netlbl_socket_setsockopt+0xf1/0x430
[  468.035925]  ? schedule+0xf0/0x3a0
[  468.036495]  ? __schedule+0x1ea0/0x1ea0
[  468.036994]  ? SyS_futex+0x261/0x31e
[  468.037455]  ? SyS_futex+0x26a/0x31e
[  468.037919]  ? exit_to_usermode_loop+0x139/0x1e0
[  468.038498]  ? do_futex+0x1f50/0x1f50
[  468.038925]  ? exit_to_usermode_loop+0x181/0x1e0
[  468.039437]  ? syscall_slow_exit_work+0x400/0x400
[  468.039964]  ? security_file_ioctl+0x76/0xb0
[  468.040460]  ? SyS_sendmmsg+0x2f/0x50
[  468.040881]  ? __sys_sendmmsg+0x590/0x590
[  468.041348]  ? do_syscall_64+0x23e/0x7a0
[  468.041861]  ? put_task_stack+0x13e/0x2c0
[  468.042306]  ? syscall_return_slowpath+0x470/0x470
[  468.042861]  ? syscall_return_slowpath+0x2df/0x470
[  468.043387]  ? prepare_exit_to_usermode+0x330/0x330
[  468.044024]  ? entry_SYSCALL_64_after_hwframe+0x52/0xb7
[  468.044647]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  468.045103]  ? entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  468.045697] 
[  468.045894] The buggy address belongs to the page:
[  468.046592] page:ffffea0000b419c0 count:0 mapcount:0 mapping:0000000000000000 index:0x0
[  468.047381] flags: 0x100000000000000()
[  468.047787] raw: 0100000000000000 0000000000000000 0000000000000000 00000000ffffffff
[  468.048497] raw: 0000000000000000 ffffea0000b419e0 0000000000000000 0000000000000000
[  468.049192] page dumped because: kasan: bad access detected
[  468.049716] 
[  468.049848] Memory state around the buggy address:
[  468.050235]  ffff88002d067500: f2 f2 f2 04 f2 f2 f2 f2 f2 f2 f2 00 f2 f2 f2 f2
[  468.050903]  ffff88002d067580: f2 f2 f2 00 00 00 00 f2 f2 f2 f2 00 00 00 00 00
[  468.051517] >ffff88002d067600: 00 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 f2 f2
[  468.052214]                                                              ^
[  468.052943]  ffff88002d067680: f2 f2 f2 f8 f2 f2 f2 f2 f2 f2 f2 f8 f2 f2 f2 f2
[  468.053591]  ffff88002d067700: f2 f2 f2 00 f2 f2 f2 f2 f2 f2 f2 00 00 00 f2 f2
[  468.054259] ==================================================================
[  468.054863] Disabling lock debugging due to kernel taint
[  468.055380] Kernel panic - not syncing: panic_on_warn set ...

End

__might_fault - dead lock

Got from syzkaller & Found in LK v4.16.0-rc6.

Call Trace (Dump)

WARNING: possible circular locking dependency detected
4.16.0-rc6+ #21 Not tainted
------------------------------------------------------
syz-executor3/13637 is trying to acquire lock:
 (&mm->mmap_sem){++++}, at: [<0000000083693474>] __might_fault+0xd4/0x1b0 mm/memory.c:4570

but task is already holding lock:
 (&rp->fetch_lock){+.+.}, at: [<000000001f43922c>] mon_bin_read+0x5e/0x5f0 drivers/usb/mon/mon_bin.c:813

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #1 (&rp->fetch_lock){+.+.}:

-> #0 (&mm->mmap_sem){++++}:

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&rp->fetch_lock);
                               lock(&mm->mmap_sem);
                               lock(&rp->fetch_lock);
  lock(&mm->mmap_sem);

 *** DEADLOCK ***
 
1 lock held by syz-executor3/13637:
 #0:  (&rp->fetch_lock){+.+.}, at: [<000000001f43922c>] mon_bin_read+0x5e/0x5f0 drivers/usb/mon/mon_bin.c:813

stack backtrace:
CPU: 1 PID: 13637 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #21
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x10a/0x1dd lib/dump_stack.c:53
 print_circular_bug.isra.33+0x3fe/0x437 kernel/locking/lockdep.c:1223
 check_prev_add kernel/locking/lockdep.c:1863 [inline]
 check_prevs_add kernel/locking/lockdep.c:1976 [inline]
 validate_chain kernel/locking/lockdep.c:2417 [inline]
 __lock_acquire.cold.54+0x57b/0x8e4 kernel/locking/lockdep.c:3431

End

kernfs_get - warn

Found in LK v4.16.0-rc6.

Call Trace (Dump)

[   58.664584] Call Trace:
[   58.664825]  dump_stack+0x10a/0x1dd
[   58.665129]  ? _atomic_dec_and_lock+0x163/0x163
[   58.665539]  ? kernfs_get+0x40/0x130
[   58.665857]  panic+0x1b3/0x3a4
[   58.666129]  ? add_taint.cold.3+0x16/0x16
[   58.666486]  ? __warn.cold.6+0x17c/0x1a4
[   58.666867]  ? kernfs_get+0x10c/0x130
[   58.667180]  __warn.cold.6+0x197/0x1a4
[   58.667524]  ? kernfs_get+0x10c/0x130
[   58.667838]  ? report_bug+0x1fb/0x270
[   58.668154]  ? fixup_bug.part.9+0x32/0x80
[   58.668506]  ? do_error_trap+0x28c/0x360
[   58.668840]  ? lock_acquire+0x4a0/0x4a0
[   58.669178]  ? do_general_protection+0x310/0x310
[   58.669601]  ? do_raw_spin_trylock+0x190/0x190
[   58.670012]  ? __lock_is_held+0xad/0x140
[   58.670450]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[   58.670858]  ? invalid_op+0x1b/0x40
[   58.671198]  ? kernfs_get+0x10c/0x130
[   58.671519]  ? kernfs_get+0x10c/0x130
[   58.671833]  ? kernfs_evict_inode+0x60/0x60
[   58.672203]  ? kernfs_path_from_node+0x60/0x60
[   58.672584]  ? __kernfs_remove+0x277/0xa60
[   58.672948]  ? kernfs_dir_fop_release+0x40/0x40
[   58.673346]  ? save_trace+0x300/0x300
[   58.673653]  ? __kmem_cache_create+0x14b/0x480
[   58.674075]  ? save_trace+0x300/0x300
[   58.674402]  ? __lock_is_held+0xad/0x140
[   58.674731]  ? kernfs_name_hash+0xad/0xe0
[   58.675113]  ? kernfs_remove_by_name_ns+0x4f/0xb0
[   58.675503]  ? sysfs_slab_add+0x172/0x230
[   58.675867]  ? __kmem_cache_create+0x234/0x480
[   58.676291]  ? kmem_cache_alloc+0x262/0x2a0
[   58.676697]  ? kmem_cache_create_usercopy+0x266/0x390
[   58.677199]  ? kmem_cache_create+0xd/0x10
[   58.677547]  ? hashtab_cache_init+0x20/0x30
[   58.677992]  ? security_load_policy+0x1c6/0xec0
[   58.678385]  ? security_get_bools+0x620/0x620
[   58.678786]  ? __alloc_pages_nodemask+0x91e/0xbe0
[   58.679196]  ? save_trace+0x300/0x300
[   58.679517]  ? save_trace+0x300/0x300
[   58.679897]  ? __vmalloc_node_range+0x1af/0x6d0
[   58.680324]  ? save_trace+0x300/0x300
[   58.680700]  ? find_held_lock+0x32/0x1b0
[   58.681089]  ? __might_fault+0x104/0x1b0
[   58.681508]  ? lock_acquire+0x4a0/0x4a0
[   58.681837]  ? lock_downgrade+0x6e0/0x6e0
[   58.682264]  ? __might_fault+0x177/0x1b0
[   58.682620]  ? sel_write_load+0x244/0x1620
[   58.683039]  ? perf_trace_lock_acquire+0xeb/0x930
[   58.683472]  ? sel_read_bool+0x240/0x240
[   58.683818]  ? __lock_is_held+0xad/0x140
[   58.684224]  ? rcu_note_context_switch+0x710/0x710
[   58.684648]  ? lock_acquire+0x4a0/0x4a0
[   58.685009]  ? save_trace+0x300/0x300
[   58.685379]  ? _cond_resched+0x10/0x20
[   58.685730]  ? __inode_security_revalidate+0xd5/0x130
[   58.686159]  ? avc_policy_seqno+0x5/0x10
[   58.686522]  ? selinux_file_permission+0x79/0x440
[   58.686927]  ? security_file_permission+0x82/0x1d0
[   58.687375]  ? do_iter_write+0x3c3/0x530
[   58.687722]  ? rcu_sync_lockdep_assert+0x69/0xa0
[   58.688164]  ? __sb_start_write+0x1ff/0x290
[   58.688609]  ? vfs_writev+0x1d3/0x330
[   58.688968]  ? rcutorture_record_progress+0x10/0x10
[   58.689403]  ? vfs_iter_write+0xa0/0xa0
[   58.689731]  ? __fd_install+0x290/0x6e0
[   58.690062]  ? __fget_light+0x28c/0x3a0
[   58.690450]  ? fget_raw+0x20/0x20
[   58.690746]  ? rcu_pm_notify+0xc0/0xc0
[   58.691081]  ? SyS_futex+0x261/0x31e
[   58.691432]  ? SyS_futex+0x26a/0x31e
[   58.691787]  ? do_pwritev+0x190/0x220
[   58.692146]  ? do_writev+0x2a0/0x2a0
[   58.692501]  ? security_file_ioctl+0x76/0xb0
[   58.692906]  ? do_syscall_64+0xb0/0x7a0
[   58.693311]  ? SyS_preadv2+0x70/0x70
[   58.693646]  ? do_syscall_64+0x23e/0x7a0
[   58.694019]  ? _raw_spin_unlock_irq+0x24/0x40
[   58.694405]  ? finish_task_switch+0x1c2/0x740
[   58.694805]  ? syscall_return_slowpath+0x470/0x470
[   58.695229]  ? syscall_return_slowpath+0x2df/0x470
[   58.695687]  ? prepare_exit_to_usermode+0x330/0x330
[   58.696143]  ? entry_SYSCALL_64_after_hwframe+0x52/0xb7
[   58.696603]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[   58.697010]  ? entry_SYSCALL_64_after_hwframe+0x42/0xb7
[   58.697669] Dumping ftrace buffer:
[   58.698098]    (ftrace buffer empty)
[   58.698417] Kernel Offset: 0x23000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[   58.699323] Rebooting in 86400 seconds..

Code

In fs/kernfs/dir.c Line 494.

/**
 * kernfs_get - get a reference count on a kernfs_node
 * @kn: the target kernfs_node
 */
void kernfs_get(struct kernfs_node *kn)
{
	if (kn) {
		WARN_ON(!atomic_read(&kn->count));
		atomic_inc(&kn->count);
	}
}

mon_bin_vma_fault - dead lock

Got from syzkaller & Found in LK v4.16.0-rc6.

Call Trace (Dump)

[  105.403185] WARNING: possible circular locking dependency detected
[  105.403862] 4.16.0-rc6+ #21 Not tainted
[  105.404291] ------------------------------------------------------
[  105.404959] syz-executor4/18491 is trying to acquire lock:
[  105.405516]  (&rp->fetch_lock){+.+.}, at: [<000000004f37fa18>] mon_bin_vma_fault+0xc9/0x3b0
[  105.406243] 
[  105.406243] but task is already holding lock:
[  105.406727]  (&mm->mmap_sem){++++}, at: [<00000000106c8ac7>] __mm_populate+0x29e/0x410
[  105.407392] 
[  105.407392] which lock already depends on the new lock.
[  105.407392] 
[  105.408085] 
[  105.408085] the existing dependency chain (in reverse order) is:
[  105.408707] 
[  105.408707] -> #1 (&mm->mmap_sem){++++}:
[  105.409322] 
[  105.409322] -> #0 (&rp->fetch_lock){+.+.}:
[  105.409916] 
[  105.409916] other info that might help us debug this:
[  105.409916] 
[  105.410766]  Possible unsafe locking scenario:
[  105.410766] 
[  105.411313]        CPU0                    CPU1
[  105.411807]        ----                    ----
[  105.412296]   lock(&mm->mmap_sem);
[  105.412672]                                lock(&rp->fetch_lock);
[  105.413300]                                lock(&mm->mmap_sem);
[  105.413944]   lock(&rp->fetch_lock);
[  105.414286] 
[  105.414286]  *** DEADLOCK ***
[  105.414286] 
[  105.414844] 1 lock held by syz-executor4/18491:
[  105.415306]  #0:  (&mm->mmap_sem){++++}, at: [<00000000106c8ac7>] __mm_populate+0x29e/0x410
[  105.416133] 
[  105.416133] stack backtrace:
[  105.416577] CPU: 0 PID: 18491 Comm: syz-executor4 Not tainted 4.16.0-rc6+ #21
[  105.417270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
[  105.418181] Call Trace:
[  105.418455]  dump_stack+0x10a/0x1dd
[  105.418872]  ? _atomic_dec_and_lock+0x163/0x163
[  105.419324]  ? __mm_populate+0x29e/0x410
[  105.419714]  ? __mm_populate+0x29e/0x410
[  105.420105]  print_circular_bug.isra.33+0x3fe/0x437
[  105.420588]  ? print_circular_bug_header+0x11b/0x11b
[  105.421073]  ? find_usage_backwards+0x30/0x30
[  105.421504]  __lock_acquire.cold.54+0x57b/0x8e4
[  105.421945]  ? lock_acquire+0x4a0/0x4a0
[  105.422341]  ? debug_check_no_locks_freed+0x210/0x210
[  105.422836]  ? set_next_entity+0x10c9/0x2d80
[  105.423255]  ? __lock_is_held+0xad/0x140
[  105.423647]  ? reweight_entity+0xfe0/0xfe0
[  105.424059]  ? print_usage_bug+0x140/0x140
[  105.424495]  ? put_prev_task_fair+0x70/0x70
[  105.424909]  ? __lock_acquire+0x911/0x4670
[  105.425323]  ? task_tick_fair+0x1ff0/0x1ff0
[  105.425731]  ? dequeue_task_fair+0x1586/0x3730
[  105.426169]  ? debug_check_no_locks_freed+0x210/0x210
[  105.426671]  ? perf_trace_lock_acquire+0xeb/0x930
[  105.427128]  ? __lock_acquire+0x911/0x4670
[  105.427540]  ? put_prev_task_fair+0x70/0x70
[  105.427950]  ? perf_trace_lock+0x950/0x950
[  105.428364]  ? debug_check_no_locks_freed+0x210/0x210
[  105.428856]  ? save_trace+0x300/0x300
[  105.429232]  ? print_usage_bug+0x140/0x140
[  105.429640]  ? print_usage_bug+0x140/0x140
[  105.430041]  ? print_usage_bug+0x140/0x140
[  105.430470]  ? lock_acquire+0x1a5/0x4a0
[  105.430868]  ? mon_bin_vma_fault+0xc9/0x3b0
[  105.431298]  ? lock_downgrade+0x6e0/0x6e0
[  105.431705]  ? mon_bin_vma_fault+0xc9/0x3b0
[  105.432099]  ? rcu_note_context_switch+0x710/0x710
[  105.432560]  ? print_usage_bug+0x140/0x140
[  105.432962]  ? mon_bin_vma_fault+0xc9/0x3b0
[  105.433374]  ? __mutex_lock+0x178/0x19d0
[  105.433757]  ? mon_bin_vma_fault+0xc9/0x3b0
[  105.434181]  ? check_chain_key+0x3c0/0x3c0
[  105.434588]  ? mon_bin_vma_fault+0xc9/0x3b0
[  105.434998]  ? __lock_acquire+0x911/0x4670
[  105.435420]  ? mark_held_locks+0xa8/0xf0
[  105.435807]  ? mutex_lock_io_nested+0x1830/0x1830
[  105.436311]  ? print_usage_bug+0x140/0x140
[  105.436733]  ? print_usage_bug+0x140/0x140
[  105.437152]  ? debug_check_no_locks_freed+0x210/0x210
[  105.437636]  ? __page_frag_cache_drain+0x1b0/0x1b0
[  105.438105]  ? print_usage_bug+0x140/0x140
[  105.438515]  ? deref_stack_reg+0xab/0x110
[  105.438909]  ? __read_once_size_nocheck.constprop.8+0x10/0x10
[  105.439478]  ? print_usage_bug+0x140/0x140
[  105.439879]  ? print_usage_bug+0x140/0x140
[  105.440283]  ? print_usage_bug+0x140/0x140
[  105.440695]  ? unwind_next_frame+0x11c2/0x1d10
[  105.441137]  ? __save_stack_trace+0x59/0xf0
[  105.441553]  ? print_usage_bug+0x140/0x140
[  105.441970]  ? __lock_acquire+0x911/0x4670
[  105.442349]  ? debug_check_no_locks_freed+0x210/0x210
[  105.442867]  ? debug_check_no_locks_freed+0x210/0x210
[  105.443368]  ? _cond_resched+0x10/0x20
[  105.443753]  ? mon_bin_vma_fault+0xc9/0x3b0
[  105.444176]  ? mon_bin_vma_fault+0xc9/0x3b0
[  105.444594]  ? mon_alloc_buff+0x200/0x200
[  105.444997]  ? print_usage_bug+0x140/0x140
[  105.445434]  ? __lock_acquire+0x911/0x4670
[  105.445869]  ? debug_check_no_locks_freed+0x210/0x210
[  105.446330]  ? __do_fault+0xe2/0x380
[  105.446696]  ? print_bad_pte+0x5d0/0x5d0
[  105.447078]  ? debug_check_no_locks_freed+0x210/0x210
[  105.447555]  ? debug_check_no_locks_freed+0x210/0x210
[  105.448060]  ? unlink_anon_vmas+0x3e2/0x920
[  105.448485]  ? unlink_anon_vmas+0x1ef/0x920
[  105.448910]  ? __handle_mm_fault+0x1206/0x31b0
[  105.449347]  ? vm_insert_mixed_mkwrite+0x30/0x30
[  105.449804]  ? __lock_acquire+0x911/0x4670
[  105.450208]  ? perf_trace_lock+0x950/0x950
[  105.450622]  ? debug_check_no_locks_freed+0x210/0x210
[  105.451104]  ? perf_trace_lock_acquire+0xeb/0x930
[  105.451534]  ? perf_trace_lock_acquire+0xeb/0x930
[  105.452029]  ? pud_huge+0x5c/0xc0
[  105.452346]  ? pmd_huge+0xe0/0xe0
[  105.452710]  ? perf_trace_lock_acquire+0xeb/0x930
[  105.453303]  ? follow_page_mask+0x129/0x14c0
[  105.453825]  ? save_trace+0x300/0x300
[  105.454194]  ? perf_trace_lock+0x950/0x950
[  105.454546]  ? save_trace+0x300/0x300
[  105.454886]  ? gup_pgd_range+0x22f0/0x22f0
[  105.455241]  ? save_trace+0x300/0x300
[  105.455556]  ? save_trace+0x300/0x300
[  105.455891]  ? save_stack+0x89/0xb0
[  105.456174]  ? __lock_is_held+0xad/0x140
[  105.456489]  ? handle_mm_fault+0x12e/0x390
[  105.456852]  ? __get_user_pages+0x619/0x13e0
[  105.457202]  ? follow_page_mask+0x14c0/0x14c0
[  105.457557]  ? vma_set_page_prot+0x155/0x220
[  105.457943]  ? vma_wants_writenotify+0x430/0x430
[  105.458291]  ? __mm_populate+0x29e/0x410
[  105.458587]  ? lock_downgrade+0x6e0/0x6e0
[  105.459002]  ? rcu_note_context_switch+0x710/0x710
[  105.459481]  ? populate_vma_page_range+0x201/0x2f0
[  105.459953]  ? get_user_pages_unlocked+0x4a0/0x4a0
[  105.460427]  ? vmacache_find+0x58/0x270
[  105.460810]  ? vmacache_update+0xc9/0x120
[  105.461206]  ? __mm_populate+0x222/0x410
[  105.461589]  ? populate_vma_page_range+0x2f0/0x2f0
[  105.462022]  ? security_mmap_file+0x13b/0x170
[  105.462393]  ? vm_mmap_pgoff+0x226/0x260
[  105.462784]  ? vma_is_stack_for_current+0xb0/0xb0
[  105.463147]  ? SyS_futex+0x261/0x31e
[  105.463425]  ? SyS_futex+0x26a/0x31e
[  105.463753]  ? SyS_mmap_pgoff+0x445/0x5c0
[  105.464159]  ? find_mergeable_anon_vma+0xc0/0xc0
[  105.464608]  ? security_file_ioctl+0x76/0xb0
[  105.465034]  ? do_syscall_64+0xb0/0x7a0
[  105.465410]  ? align_vdso_addr+0x50/0x50
[  105.465808]  ? do_syscall_64+0x23e/0x7a0
[  105.466196]  ? exit_to_usermode_loop+0x181/0x1e0
[  105.466645]  ? _raw_spin_unlock_irq+0x24/0x40
[  105.467082]  ? syscall_return_slowpath+0x470/0x470
[  105.467555]  ? syscall_return_slowpath+0x2df/0x470
[  105.468055]  ? entry_SYSCALL_64_after_hwframe+0x52/0xb7
[  105.468561]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  105.469029]  ? entry_SYSCALL_64_after_hwframe+0x42/0xb7

End