====================================================== WARNING: possible circular locking dependency detected 4.13.0-rc6+ #31 Not tainted ------------------------------------------------------ syz-executor5/18968 is trying to acquire lock: (sk_lock-AF_KCM){+.+.+.}, at: [] lock_sock include/net/sock.h:1459 [inline] (sk_lock-AF_KCM){+.+.+.}, at: [] kcm_sendpage+0x16e/0x1880 net/kcm/kcmsock.c:774 but task is already holding lock: (k-sk_lock-AF_KCM){+.+.+.}, at: [] lock_sock include/net/sock.h:1459 [inline] (k-sk_lock-AF_KCM){+.+.+.}, at: [] kcm_sendmsg+0x1ec/0x2200 net/kcm/kcmsock.c:910 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (k-sk_lock-AF_KCM){+.+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:3855 lock_sock_nested+0xc2/0x110 net/core/sock.c:2762 lock_sock include/net/sock.h:1459 [inline] kcm_sendpage+0x16e/0x1880 net/kcm/kcmsock.c:774 kernel_sendpage+0x8d/0xe0 net/socket.c:3387 kcm_write_msgs+0x404/0x1b80 net/kcm/kcmsock.c:646 kcm_sendmsg+0x1446/0x2200 net/kcm/kcmsock.c:1035 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 sock_write_iter+0x31a/0x5d0 net/socket.c:912 call_write_iter include/linux/fs.h:1743 [inline] new_sync_write fs/read_write.c:457 [inline] __vfs_write+0x684/0x970 fs/read_write.c:470 vfs_write+0x189/0x510 fs/read_write.c:518 SYSC_write fs/read_write.c:565 [inline] SyS_write+0xef/0x220 fs/read_write.c:557 entry_SYSCALL_64_fastpath+0x1f/0xbe -> #0 (sk_lock-AF_KCM){+.+.+.}: check_prev_add kernel/locking/lockdep.c:1844 [inline] check_prevs_add kernel/locking/lockdep.c:1954 [inline] validate_chain kernel/locking/lockdep.c:2281 [inline] __lock_acquire+0x2f2c/0x3dc0 kernel/locking/lockdep.c:3367 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:3855 lock_sock_nested+0xc2/0x110 net/core/sock.c:2762 lock_sock include/net/sock.h:1459 [inline] kcm_sendpage+0x16e/0x1880 net/kcm/kcmsock.c:774 kernel_sendpage+0x8d/0xe0 net/socket.c:3387 kcm_write_msgs+0x404/0x1b80 net/kcm/kcmsock.c:646 kcm_sendmsg+0x1446/0x2200 net/kcm/kcmsock.c:1035 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 sock_write_iter+0x31a/0x5d0 net/socket.c:912 call_write_iter include/linux/fs.h:1743 [inline] new_sync_write fs/read_write.c:457 [inline] __vfs_write+0x684/0x970 fs/read_write.c:470 vfs_write+0x189/0x510 fs/read_write.c:518 SYSC_write fs/read_write.c:565 [inline] SyS_write+0xef/0x220 fs/read_write.c:557 entry_SYSCALL_64_fastpath+0x1f/0xbe other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(k-sk_lock-AF_KCM); lock(sk_lock-AF_KCM); lock(k-sk_lock-AF_KCM); lock(sk_lock-AF_KCM); *** DEADLOCK *** 1 lock held by syz-executor5/18968: #0: (k-sk_lock-AF_KCM){+.+.+.}, at: [] lock_sock include/net/sock.h:1459 [inline] #0: (k-sk_lock-AF_KCM){+.+.+.}, at: [] kcm_sendmsg+0x1ec/0x2200 net/kcm/kcmsock.c:910 stack backtrace: CPU: 1 PID: 18968 Comm: syz-executor5 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 print_circular_bug+0x358/0x400 kernel/locking/lockdep.c:1218 check_prev_add kernel/locking/lockdep.c:1844 [inline] check_prevs_add kernel/locking/lockdep.c:1954 [inline] validate_chain kernel/locking/lockdep.c:2281 [inline] __lock_acquire+0x2f2c/0x3dc0 kernel/locking/lockdep.c:3367 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:3855 lock_sock_nested+0xc2/0x110 net/core/sock.c:2762 lock_sock include/net/sock.h:1459 [inline] kcm_sendpage+0x16e/0x1880 net/kcm/kcmsock.c:774 kernel_sendpage+0x8d/0xe0 net/socket.c:3387 kcm_write_msgs+0x404/0x1b80 net/kcm/kcmsock.c:646 kcm_sendmsg+0x1446/0x2200 net/kcm/kcmsock.c:1035 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 sock_write_iter+0x31a/0x5d0 net/socket.c:912 call_write_iter include/linux/fs.h:1743 [inline] new_sync_write fs/read_write.c:457 [inline] __vfs_write+0x684/0x970 fs/read_write.c:470 vfs_write+0x189/0x510 fs/read_write.c:518 SYSC_write fs/read_write.c:565 [inline] SyS_write+0xef/0x220 fs/read_write.c:557 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f761d9fdc08 EFLAGS: 00000216 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 00000000000000db RSI: 000000002060af25 RDI: 000000000000001b RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004dd0f2 R13: 00000000ffffffff R14: 0000000000000005 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 1 PID: 19953 Comm: syz-executor1 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x44/0x740 mm/slab.c:3625 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:666 [inline] sctp_association_new+0x114/0x21e0 net/sctp/associola.c:309 sctp_sendmsg+0x128c/0x31f0 net/sctp/socket.c:1838 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x352/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f87a7b2ac08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 0000000000000001 RSI: 000000002065efff RDI: 0000000000000005 RBP: 00007f87a7b2aa10 R08: 0000000020d10fe4 R09: 000000000000001c R10: fffffffffffffffe R11: 0000000000000216 R12: 00000000004b69f7 R13: 00007f87a7b2ab48 R14: 00000000004b6a07 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 19957 Comm: syz-executor1 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3723 [inline] __kmalloc+0x5c/0x760 mm/slab.c:3734 kmalloc_array include/linux/slab.h:612 [inline] kcalloc include/linux/slab.h:623 [inline] sctp_stream_init+0x6d/0x290 net/sctp/stream.c:48 sctp_association_init net/sctp/associola.c:249 [inline] sctp_association_new+0x129c/0x21e0 net/sctp/associola.c:313 sctp_sendmsg+0x128c/0x31f0 net/sctp/socket.c:1838 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x352/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f87a7b2ac08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 0000000000000001 RSI: 000000002065efff RDI: 0000000000000005 RBP: 00007f87a7b2aa10 R08: 0000000020d10fe4 R09: 000000000000001c R10: fffffffffffffffe R11: 0000000000000216 R12: 00000000004b69f7 R13: 00007f87a7b2ab48 R14: 00000000004b6a07 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 19961 Comm: syz-executor1 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x44/0x740 mm/slab.c:3625 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:666 [inline] sctp_auth_shkey_create net/sctp/auth.c:99 [inline] sctp_auth_asoc_copy_shkeys+0x1bd/0x520 net/sctp/auth.c:366 sctp_association_init net/sctp/associola.c:270 [inline] sctp_association_new+0x16a9/0x21e0 net/sctp/associola.c:313 sctp_sendmsg+0x128c/0x31f0 net/sctp/socket.c:1838 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x352/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f87a7b2ac08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 0000000000000001 RSI: 000000002065efff RDI: 0000000000000005 RBP: 000000000000048b R08: 0000000020d10fe4 R09: 000000000000001c R10: fffffffffffffffe R11: 0000000000000216 R12: 00000000004bab5f R13: 00000000ffffffff R14: 0000000000718070 R15: 0000000000000002 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 19991 Comm: syz-executor1 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x44/0x740 mm/slab.c:3625 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:666 [inline] sctp_add_bind_addr+0xd8/0x460 net/sctp/bind_addr.c:159 sctp_copy_one_addr+0x10a/0x120 net/sctp/bind_addr.c:460 sctp_bind_addr_copy+0x167/0x360 net/sctp/bind_addr.c:71 sctp_assoc_set_bind_addr_from_ep+0x136/0x190 net/sctp/associola.c:1579 sctp_sendmsg+0x12b3/0x31f0 net/sctp/socket.c:1844 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x352/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f87a7b2ac08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 0000000000000001 RSI: 000000002065efff RDI: 0000000000000005 RBP: 00007f87a7b2aa10 R08: 0000000020d10fe4 R09: 000000000000001c R10: fffffffffffffffe R11: 0000000000000216 R12: 00000000004b69f7 R13: 00007f87a7b2ab48 R14: 00000000004b6a07 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 20025 Comm: syz-executor1 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x44/0x740 mm/slab.c:3625 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:666 [inline] sctp_add_bind_addr+0xd8/0x460 net/sctp/bind_addr.c:159 sctp_copy_one_addr+0x10a/0x120 net/sctp/bind_addr.c:460 sctp_bind_addr_copy+0x167/0x360 net/sctp/bind_addr.c:71 sctp_assoc_set_bind_addr_from_ep+0x136/0x190 net/sctp/associola.c:1579 sctp_sendmsg+0x12b3/0x31f0 net/sctp/socket.c:1844 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x352/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f87a7b2ac08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 0000000000000001 RSI: 000000002065efff RDI: 0000000000000005 RBP: 00007f87a7b2aa10 R08: 0000000020d10fe4 R09: 000000000000001c R10: fffffffffffffffe R11: 0000000000000216 R12: 00000000004b69f7 R13: 00007f87a7b2ab48 R14: 00000000004b6a07 R15: 0000000000000000 CPU: 0 PID: 19947 Comm: syz-executor4 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x40/0x750 mm/slab.c:3559 sctp_bucket_create net/sctp/socket.c:7344 [inline] sctp_get_port_local+0x9cd/0x13b0 net/sctp/socket.c:7103 sctp_do_bind+0x240/0x540 net/sctp/socket.c:384 sctp_bind+0x8c/0xc0 net/sctp/socket.c:285 inet6_bind+0x125/0x1020 net/ipv6/af_inet6.c:293 SYSC_bind+0x1b4/0x3f0 net/socket.c:1476 SyS_bind+0x24/0x30 net/socket.c:1462 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f7f7ed54c08 EFLAGS: 00000216 ORIG_RAX: 0000000000000031 RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 000000000000001c RSI: 0000000020d15000 RDI: 0000000000000005 RBP: 00007f7f7ed54a10 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004b69f7 R13: 00007f7f7ed54b48 R14: 00000000004b6a07 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 20068 Comm: syz-executor3 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x44/0x740 mm/slab.c:3625 kmalloc include/linux/slab.h:493 [inline] kzalloc include/linux/slab.h:666 [inline] sctp_association_new+0x114/0x21e0 net/sctp/associola.c:309 sctp_sendmsg+0x128c/0x31f0 net/sctp/socket.c:1838 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x352/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f3dae3cfc08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 0000000000000001 RSI: 000000002065efff RDI: 0000000000000005 RBP: 00007f3dae3cfa10 R08: 0000000020d10fe4 R09: 000000000000001c R10: fffffffffffffffe R11: 0000000000000216 R12: 00000000004b69f7 R13: 00007f3dae3cfb48 R14: 00000000004b6a07 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 20091 Comm: syz-executor3 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3723 [inline] __kmalloc+0x5c/0x760 mm/slab.c:3734 kmalloc_array include/linux/slab.h:612 [inline] kcalloc include/linux/slab.h:623 [inline] sctp_stream_init+0x6d/0x290 net/sctp/stream.c:48 sctp_association_init net/sctp/associola.c:249 [inline] sctp_association_new+0x129c/0x21e0 net/sctp/associola.c:313 sctp_sendmsg+0x128c/0x31f0 net/sctp/socket.c:1838 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x352/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f3dae3cfc08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 0000000000000001 RSI: 000000002065efff RDI: 0000000000000005 RBP: 00007f3dae3cfa10 R08: 0000000020d10fe4 R09: 000000000000001c R10: fffffffffffffffe R11: 0000000000000216 R12: 00000000004b69f7 R13: 00007f3dae3cfb48 R14: 00000000004b6a07 R15: 0000000000000000 CPU: 0 PID: 20042 Comm: syz-executor1 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node+0x4f/0x750 mm/slab.c:3649 __alloc_skb+0xf1/0x740 net/core/skbuff.c:194 alloc_skb include/linux/skbuff.h:975 [inline] _sctp_make_chunk+0x3b/0x260 net/sctp/sm_make_chunk.c:1383 sctp_make_control+0x39/0x150 net/sctp/sm_make_chunk.c:1424 sctp_make_init+0x7eb/0xf70 net/sctp/sm_make_chunk.c:322 sctp_sf_do_prm_asoc+0xc1/0x350 net/sctp/sm_statefuns.c:4752 sctp_do_sm+0x192/0x6dd0 net/sctp/sm_sideeffect.c:1168 sctp_primitive_ASSOCIATE+0x9d/0xd0 net/sctp/primitive.c:88 sctp_sendmsg+0x1e5b/0x31f0 net/sctp/socket.c:1956 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x352/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f87a7b2ac08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 0000000000000001 RSI: 000000002065efff RDI: 0000000000000005 RBP: 00007f87a7b2aa10 R08: 0000000020d10fe4 R09: 000000000000001c R10: fffffffffffffffe R11: 0000000000000216 R12: 00000000004b69f7 R13: 00007f87a7b2ab48 R14: 00000000004b6a07 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 20128 Comm: syz-executor3 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3723 [inline] __kmalloc+0x5c/0x760 mm/slab.c:3734 kmalloc_array include/linux/slab.h:612 [inline] kcalloc include/linux/slab.h:623 [inline] sctp_stream_init+0x6d/0x290 net/sctp/stream.c:48 sctp_association_init net/sctp/associola.c:249 [inline] sctp_association_new+0x129c/0x21e0 net/sctp/associola.c:313 sctp_sendmsg+0x128c/0x31f0 net/sctp/socket.c:1838 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x352/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x451e59 RSP: 002b:00007f3dae3cfc08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59 RDX: 0000000000000001 RSI: 000000002065efff RDI: 0000000000000005 RBP: 00007f3dae3cfa10 R08: 0000000020d10fe4 R09: 000000000000001c R10: fffffffffffffffe R11: 0000000000000216 R12: 00000000004b69f7 R13: 00007f3dae3cfb48 R14: 00000000004b6a07 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 22366 Comm: syz-executor5 Not tainted 4.13.0-rc6+ #31 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149