Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x13e/0x194 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x14b lib/fault-inject.c:149 ====================================================== should_failslab+0xd6/0x130 mm/failslab.c:32 WARNING: possible circular locking dependency detected slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x292/0x7b0 mm/slab.c:3659 4.14.171-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.5/13370 is trying to acquire lock: __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3696 (&event->child_mutex __kmalloc_reserve.isra.0+0x35/0xd0 net/core/skbuff.c:137 ){+.+.}, at: [] perf_read_group kernel/events/core.c:4536 [inline] ){+.+.}, at: [] __perf_read kernel/events/core.c:4618 [inline] ){+.+.}, at: [] perf_read+0x2a1/0x7c0 kernel/events/core.c:4633 __alloc_skb+0xca/0x4c0 net/core/skbuff.c:205 but task is already holding lock: ( alloc_skb_fclone include/linux/skbuff.h:1022 [inline] sk_stream_alloc_skb+0xaf/0x780 net/ipv4/tcp.c:855 &cpuctx_mutex tcp_connect+0x127f/0x3ca0 net/ipv4/tcp_output.c:3514 ){+.+.} , at: [] perf_event_ctx_lock_nested+0x14d/0x2c0 kernel/events/core.c:1235 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #5 tcp_v4_connect+0x1296/0x1a70 net/ipv4/tcp_ipv4.c:255 ( &cpuctx_mutex __inet_stream_connect+0x6ad/0xb90 net/ipv4/af_inet.c:618 ){+.+.}: __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 perf_event_init_cpu+0xb7/0x170 kernel/events/core.c:11234 perf_event_init+0x2cc/0x308 kernel/events/core.c:11281 start_kernel+0x3b1/0x676 init/main.c:620 secondary_startup_64+0xa5/0xb0 arch/x86/kernel/head_64.S:240 -> #4 inet_stream_connect+0x53/0xa0 net/ipv4/af_inet.c:682 (pmus_lock SYSC_connect+0x1c6/0x250 net/socket.c:1655 ){+.+.} : __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 perf_event_init_cpu+0x2c/0x170 kernel/events/core.c:11228 cpuhp_invoke_callback+0x1e6/0x1ad0 kernel/cpu.c:184 cpuhp_up_callbacks kernel/cpu.c:573 [inline] _cpu_up+0x21a/0x520 kernel/cpu.c:1135 do_cpu_up kernel/cpu.c:1170 [inline] do_cpu_up+0x9a/0x160 kernel/cpu.c:1142 smp_init+0x149/0x15e kernel/smp.c:578 kernel_init_freeable+0x305/0x526 init/main.c:1066 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 kernel_init+0xd/0x15b init/main.c:998 entry_SYSCALL_64_after_hwframe+0x42/0xb7 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 RIP: 0033:0x45c449 -> #3 RSP: 002b:00007f1aee4bec78 EFLAGS: 00000246 ( ORIG_RAX: 000000000000002a cpu_hotplug_lock.rw_sem RAX: ffffffffffffffda RBX: 00007f1aee4bf6d4 RCX: 000000000045c449 ){++++} RDX: 0000000000000010 RSI: 0000000020000180 RDI: 0000000000000004 : RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 percpu_down_read_preempt_disable include/linux/percpu-rwsem.h:36 [inline] percpu_down_read include/linux/percpu-rwsem.h:59 [inline] cpus_read_lock+0x39/0xc0 kernel/cpu.c:295 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 static_key_slow_inc+0xe/0x20 kernel/jump_label.c:123 R13: 0000000000000081 R14: 00000000004c2d7d R15: 0000000000000005 tracepoint_add_func kernel/tracepoint.c:223 [inline] tracepoint_probe_register_prio+0x4d4/0x6d0 kernel/tracepoint.c:283 trace_event_reg+0x272/0x330 kernel/trace/trace_events.c:305 perf_trace_event_reg kernel/trace/trace_event_perf.c:122 [inline] perf_trace_event_init kernel/trace/trace_event_perf.c:197 [inline] perf_trace_init+0x424/0xa50 kernel/trace/trace_event_perf.c:221 perf_tp_event_init+0x79/0xf0 kernel/events/core.c:8117 perf_try_init_event+0x15b/0x1f0 kernel/events/core.c:9353 perf_init_event kernel/events/core.c:9391 [inline] perf_event_alloc.part.0+0xd89/0x25a0 kernel/events/core.c:9651 perf_event_alloc kernel/events/core.c:10004 [inline] SYSC_perf_event_open+0xa80/0x24a0 kernel/events/core.c:10108 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #2 (tracepoints_mutex){+.+.}: __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 tracepoint_probe_register_prio+0x35/0x6d0 kernel/tracepoint.c:279 trace_event_reg+0x272/0x330 kernel/trace/trace_events.c:305 perf_trace_event_reg kernel/trace/trace_event_perf.c:122 [inline] perf_trace_event_init kernel/trace/trace_event_perf.c:197 [inline] perf_trace_init+0x424/0xa50 kernel/trace/trace_event_perf.c:221 perf_tp_event_init+0x79/0xf0 kernel/events/core.c:8117 perf_try_init_event+0x15b/0x1f0 kernel/events/core.c:9353 perf_init_event kernel/events/core.c:9391 [inline] perf_event_alloc.part.0+0xd89/0x25a0 kernel/events/core.c:9651 perf_event_alloc kernel/events/core.c:10004 [inline] SYSC_perf_event_open+0xa80/0x24a0 kernel/events/core.c:10108 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #1 (event_mutex){+.+.}: __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 perf_trace_destroy+0x23/0xf0 kernel/trace/trace_event_perf.c:234 _free_event+0x328/0xe30 kernel/events/core.c:4238 free_event+0x32/0x40 kernel/events/core.c:4265 perf_event_release_kernel+0x35c/0x870 kernel/events/core.c:4409 perf_release+0x33/0x40 kernel/events/core.c:4435 __fput+0x25f/0x790 fs/file_table.c:210 task_work_run+0x113/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1d6/0x220 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x42/0xb7 -> #0 (&event->child_mutex){+.+.}: lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 perf_read_group kernel/events/core.c:4536 [inline] __perf_read kernel/events/core.c:4618 [inline] perf_read+0x2a1/0x7c0 kernel/events/core.c:4633 __vfs_read+0xe4/0x610 fs/read_write.c:411 vfs_read+0x131/0x330 fs/read_write.c:447 SYSC_read fs/read_write.c:574 [inline] SyS_read+0xf2/0x210 fs/read_write.c:567 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 other info that might help us debug this: Chain exists of: &event->child_mutex --> pmus_lock --> &cpuctx_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&cpuctx_mutex); lock(pmus_lock); lock(&cpuctx_mutex); lock(&event->child_mutex); *** DEADLOCK *** 1 lock held by syz-executor.5/13370: #0: (&cpuctx_mutex){+.+.}, at: [] perf_event_ctx_lock_nested+0x14d/0x2c0 kernel/events/core.c:1235 stack backtrace: CPU: 0 PID: 13370 Comm: syz-executor.5 Not tainted 4.14.171-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x13e/0x194 lib/dump_stack.c:58 print_circular_bug.isra.0.cold+0x1c4/0x282 kernel/locking/lockdep.c:1258 check_prev_add kernel/locking/lockdep.c:1901 [inline] check_prevs_add kernel/locking/lockdep.c:2018 [inline] validate_chain kernel/locking/lockdep.c:2460 [inline] __lock_acquire+0x2cb3/0x4620 kernel/locking/lockdep.c:3487 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3994 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xe8/0x1470 kernel/locking/mutex.c:893 perf_read_group kernel/events/core.c:4536 [inline] __perf_read kernel/events/core.c:4618 [inline] perf_read+0x2a1/0x7c0 kernel/events/core.c:4633 __vfs_read+0xe4/0x610 fs/read_write.c:411 vfs_read+0x131/0x330 fs/read_write.c:447 SYSC_read fs/read_write.c:574 [inline] SyS_read+0xf2/0x210 fs/read_write.c:567 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45c449 RSP: 002b:00007ff02ad90c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00007ff02ad916d4 RCX: 000000000045c449 RDX: 0000000000000040 RSI: 0000000020000080 RDI: 0000000000000007 RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000873 R14: 00000000004caea0 R15: 000000000076bf2c FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop0): Filesystem has been set read-only audit: type=1400 audit(1582788349.366:194): avc: denied { write } for pid=13445 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop0): Filesystem has been set read-only netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. hfs: gid requires an argument hfs: unable to parse mount options ip_tables: iptables: counters copy to user failed while replacing table FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop0): Filesystem has been set read-only ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop1): Filesystem has been set read-only hfs: gid requires an argument hfs: unable to parse mount options ip_tables: iptables: counters copy to user failed while replacing table ip_tables: iptables: counters copy to user failed while replacing table FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop0): Filesystem has been set read-only ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop1): Filesystem has been set read-only ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! ip_tables: iptables: counters copy to user failed while replacing table ip_tables: iptables: counters copy to user failed while replacing table FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop1): Filesystem has been set read-only FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop3): Filesystem has been set read-only ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop0): Filesystem has been set read-only ip_tables: iptables: counters copy to user failed while replacing table audit: type=1400 audit(1582788353.406:195): avc: denied { map } for pid=13703 comm="syz-executor.5" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=245806 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! ip_tables: iptables: counters copy to user failed while replacing table FAT-fs (loop0): bogus number of reserved sectors FAT-fs (loop0): Can't find a valid FAT filesystem FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop1): Filesystem has been set read-only netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop3): Filesystem has been set read-only ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! ip_tables: iptables: counters copy to user failed while replacing table ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. ip_tables: iptables: counters copy to user failed while replacing table FAT-fs (loop0): bogus number of reserved sectors FAT-fs (loop0): Can't find a valid FAT filesystem ip_tables: iptables: counters copy to user failed while replacing table ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop1): Filesystem has been set read-only FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop3): Filesystem has been set read-only ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop1): Filesystem has been set read-only FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop3): Filesystem has been set read-only ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! net_ratelimit: 2 callbacks suppressed ip_tables: iptables: counters copy to user failed while replacing table ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. ip_tables: iptables: counters copy to user failed while replacing table XFS (loop4): Invalid superblock magic number FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop3): Filesystem has been set read-only FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF FAT-fs (loop0): Filesystem has been set read-only ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! ip_tables: iptables: counters copy to user failed while replacing table ip_tables: iptables: counters copy to user failed while replacing table