On some of our machines, we see this warning: /* switch the line discipline */ tty->ldisc = ld; tty_set_termios_ldisc(tty, disc); retval = tty_ldisc_open(tty, tty->ldisc); if (retval) { -> if (!WARN_ON(disc == N_TTY)) { tty_ldisc_put(tty->ldisc); tty->ldisc = NULL; } } where the stack is tty_ldisc_reinit tty_ldisc_hangup __tty_hangup do_exit do_signal syscall This is followed by a NULL pointer deref crash in n_tty_set_termios, presumably when it tries to deref that unallocated tty->disc_data. The only way n_tty_open() can fail is if the vmalloc in there fails. struct n_tty_data isn't terribly big, but ever since the following patch it doesn't even *try* the allocation: commit 5d17a73a2ebeb8d1c6924b91e53ab2650fe86ffb Author: Michal Hocko <mhocko@xxxxxxxx> Date: Fri Feb 24 14:58:53 2017 -0800 vmalloc: back off when the current task is killed __vmalloc_area_node() allocates pages to cover the requested vmalloc size. This can be a lot of memory. If the current task is killed by the OOM killer, and thus has an unlimited access to memory reserves, it can consume all the memory theoretically. Fix this by checking for fatal_signal_pending and back off early. Link: http://lkml.kernel.org/r/20170201092706.9966-4-mhocko@xxxxxxxxxx Signed-off-by: Michal Hocko <mhocko@xxxxxxxx> Reviewed-by: Christoph Hellwig <hch@xxxxxx> Cc: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx> Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> Signed-off-by: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx> This talks about the oom killer and memory exhaustion, but most fatal signals don't happen due to the OOM killer. I think this patch should be reverted. If somebody is vmallocing crazy amounts of memory in the exit path we should probably track them down individually; the patch doesn't reference any real instances of that. But we cannot start failing allocations that have never failed before. That said, maybe we want Alan's N_NULL failover in the hangup path too? -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>