====================================================== WARNING: possible circular locking dependency detected 4.17.0+ #84 Not tainted ------------------------------------------------------ syz-executor2/4696 is trying to acquire lock: 00000000541736e8 (rlock-AF_UNIX){+.+.}, at: skb_queue_tail+0x26/0x150 net/core/skbuff.c:2915 but task is already holding lock: 00000000d9e3f6ff (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock+0x80/0xb0 net/unix/af_unix.c:1077 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&(&u->lock)->rlock/1){+.+.}: _raw_spin_lock_nested+0x28/0x40 kernel/locking/spinlock.c:354 sk_diag_dump_icons net/unix/diag.c:82 [inline] sk_diag_fill.isra.5+0xa43/0x10d0 net/unix/diag.c:144 sk_diag_dump net/unix/diag.c:178 [inline] unix_diag_dump+0x35f/0x550 net/unix/diag.c:206 netlink_dump+0x507/0xd20 net/netlink/af_netlink.c:2226 __netlink_dump_start+0x51a/0x780 net/netlink/af_netlink.c:2323 netlink_dump_start include/linux/netlink.h:214 [inline] unix_diag_handler_dump+0x3f4/0x7b0 net/unix/diag.c:307 __sock_diag_cmd net/core/sock_diag.c:230 [inline] sock_diag_rcv_msg+0x2e0/0x3d0 net/core/sock_diag.c:261 netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2448 sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:272 netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline] netlink_unicast+0x58b/0x740 net/netlink/af_netlink.c:1336 netlink_sendmsg+0x9f0/0xfa0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:645 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:655 sock_write_iter+0x35a/0x5a0 net/socket.c:924 call_write_iter include/linux/fs.h:1793 [inline] do_iter_readv_writev+0x87d/0xa70 fs/read_write.c:680 do_iter_write+0x185/0x5f0 fs/read_write.c:959 vfs_writev+0x1c7/0x330 fs/read_write.c:1004 do_writev+0x112/0x2f0 fs/read_write.c:1039 __do_sys_writev fs/read_write.c:1112 [inline] __se_sys_writev fs/read_write.c:1109 [inline] __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #0 (rlock-AF_UNIX){+.+.}: lock_acquire+0x1dc/0x520 kernel/locking/lockdep.c:3924 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x96/0xc0 kernel/locking/spinlock.c:152 skb_queue_tail+0x26/0x150 net/core/skbuff.c:2915 unix_dgram_sendmsg+0xf77/0x1730 net/unix/af_unix.c:1796 sock_sendmsg_nosec net/socket.c:645 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:655 ___sys_sendmsg+0x525/0x940 net/socket.c:2161 __sys_sendmmsg+0x240/0x6f0 net/socket.c:2256 __do_sys_sendmmsg net/socket.c:2285 [inline] __se_sys_sendmmsg net/socket.c:2282 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2282 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&(&u->lock)->rlock/1); lock(rlock-AF_UNIX); lock(&(&u->lock)->rlock/1); lock(rlock-AF_UNIX); *** DEADLOCK *** 1 lock held by syz-executor2/4696: #0: 00000000d9e3f6ff (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock+0x80/0xb0 net/unix/af_unix.c:1077 stack backtrace: CPU: 1 PID: 4696 Comm: syz-executor2 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 print_circular_bug.isra.36.cold.56+0x1bd/0x27d kernel/locking/lockdep.c:1227 check_prev_add kernel/locking/lockdep.c:1867 [inline] check_prevs_add kernel/locking/lockdep.c:1980 [inline] validate_chain kernel/locking/lockdep.c:2421 [inline] __lock_acquire+0x343e/0x5140 kernel/locking/lockdep.c:3435 lock_acquire+0x1dc/0x520 kernel/locking/lockdep.c:3924 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x96/0xc0 kernel/locking/spinlock.c:152 skb_queue_tail+0x26/0x150 net/core/skbuff.c:2915 unix_dgram_sendmsg+0xf77/0x1730 net/unix/af_unix.c:1796 sock_sendmsg_nosec net/socket.c:645 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:655 ___sys_sendmsg+0x525/0x940 net/socket.c:2161 __sys_sendmmsg+0x240/0x6f0 net/socket.c:2256 __do_sys_sendmmsg net/socket.c:2285 [inline] __se_sys_sendmmsg net/socket.c:2282 [inline] __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2282 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f59518bcc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007f59518bd6d4 RCX: 0000000000455b29 RDX: fffffffffffffdc3 RSI: 00000000200bd000 RDI: 0000000000000018 RBP: 000000000072bf50 R08: 0000000000000000 R09: 0000000000000000 R10: 5a6d8d97750cae5e R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000004c0b11 R14: 00000000004d04f8 R15: 0000000000000001 kernel msg: ebtables bug: please report to author: Wrong len argument kernel msg: ebtables bug: please report to author: Wrong len argument kernel msg: ebtables bug: please report to author: Wrong len argument kernel msg: ebtables bug: please report to author: Wrong len argument kernel msg: ebtables bug: please report to author: Wrong len argument FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 1 PID: 4870 Comm: syz-executor2 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2af/0x760 mm/slab.c:3552 anon_vma_chain_alloc mm/rmap.c:128 [inline] __anon_vma_prepare+0xbc/0x700 mm/rmap.c:182 anon_vma_prepare include/linux/rmap.h:153 [inline] do_huge_pmd_anonymous_page+0x1423/0x1d20 mm/huge_memory.c:675 create_huge_pmd mm/memory.c:3863 [inline] __handle_mm_fault+0x2d61/0x4390 mm/memory.c:4067 handle_mm_fault+0x53a/0xc70 mm/memory.c:4133 __do_page_fault+0x60b/0xe40 arch/x86/mm/fault.c:1403 do_page_fault+0xee/0x8a7 arch/x86/mm/fault.c:1478 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1160 RIP: 0010:__put_user_4+0x1c/0x30 arch/x86/lib/putuser.S:68 Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 98 13 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 RSP: 0018:ffff8801b1e37cf8 EFLAGS: 00010297 RAX: 0000000000000014 RBX: 00007fffffffeffd RCX: 0000000020000000 RDX: 0000000000000045 RSI: ffffffff81a83b23 RDI: 0000000000000286 RBP: ffff8801b1e37df0 R08: 1ffff100363c6f7c R09: 0000000000000000 R10: ffffed0038237420 R11: ffff8801ba1c42c0 R12: 0000000000000014 R13: 0000000020000000 R14: 0000000000000000 R15: dffffc0000000000 __do_sys_socketpair net/socket.c:1503 [inline] __se_sys_socketpair net/socket.c:1500 [inline] __x64_sys_socketpair+0x97/0xf0 net/socket.c:1500 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f59518ddc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 RAX: ffffffffffffffda RBX: 00007f59518de6d4 RCX: 0000000000455b29 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001e RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000013 R13: 00000000004c1c07 R14: 00000000004d28b0 R15: 0000000000000000 kernel msg: ebtables bug: please report to author: Wrong len argument FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 4905 Comm: syz-executor4 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 kernel msg: ebtables bug: please report to author: Wrong len argument __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2af/0x760 mm/slab.c:3552 sock_alloc_inode+0x6f/0x300 net/socket.c:247 alloc_inode+0x63/0x190 fs/inode.c:210 new_inode_pseudo+0x69/0x1a0 fs/inode.c:895 sock_alloc+0x41/0x270 net/socket.c:571 __sock_create+0x161/0x920 net/socket.c:1286 sock_create net/socket.c:1362 [inline] __sys_socket+0x100/0x250 net/socket.c:1392 __do_sys_socket net/socket.c:1401 [inline] __se_sys_socket net/socket.c:1399 [inline] __x64_sys_socket+0x73/0xb0 net/socket.c:1399 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29 RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000000 socket: no more sockets FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 4944 Comm: syz-executor4 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 kernel msg: ebtables bug: please report to author: Wrong len argument fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2cb/0x780 mm/slab.c:3618 kmalloc include/linux/slab.h:513 [inline] sock_alloc_inode+0xb3/0x300 net/socket.c:250 alloc_inode+0x63/0x190 fs/inode.c:210 new_inode_pseudo+0x69/0x1a0 fs/inode.c:895 sock_alloc+0x41/0x270 net/socket.c:571 __sock_create+0x161/0x920 net/socket.c:1286 sock_create net/socket.c:1362 [inline] __sys_socket+0x100/0x250 net/socket.c:1392 __do_sys_socket net/socket.c:1401 [inline] __se_sys_socket net/socket.c:1399 [inline] __x64_sys_socket+0x73/0xb0 net/socket.c:1399 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29 RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000001 socket: no more sockets kernel msg: ebtables bug: please report to author: Wrong len argument FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 4992 Comm: syz-executor4 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2c8/0x760 mm/slab.c:3727 kmalloc include/linux/slab.h:518 [inline] sk_prot_alloc+0x1ae/0x2e0 net/core/sock.c:1494 sk_alloc+0x104/0x17b0 net/core/sock.c:1548 packet_create+0x1a7/0xb80 net/packet/af_packet.c:3192 __sock_create+0x528/0x920 net/socket.c:1322 sock_create net/socket.c:1362 [inline] __sys_socket+0x100/0x250 net/socket.c:1392 __do_sys_socket net/socket.c:1401 [inline] __se_sys_socket net/socket.c:1399 [inline] __x64_sys_socket+0x73/0xb0 net/socket.c:1399 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29 RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000002 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5039 Comm: syz-executor4 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2af/0x760 mm/slab.c:3552 __d_alloc+0xc0/0xd30 fs/dcache.c:1616 d_alloc_pseudo+0x1d/0x30 fs/dcache.c:1744 sock_alloc_file+0x157/0x4f0 net/socket.c:405 sock_map_fd net/socket.c:441 [inline] __sys_socket+0x16f/0x250 net/socket.c:1396 __do_sys_socket net/socket.c:1401 [inline] __se_sys_socket net/socket.c:1399 [inline] __x64_sys_socket+0x73/0xb0 net/socket.c:1399 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29 RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000003 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5093 Comm: syz-executor4 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2af/0x760 mm/slab.c:3552 kmem_cache_zalloc include/linux/slab.h:696 [inline] get_empty_filp+0x125/0x520 fs/file_table.c:122 alloc_file+0x24/0x3e0 fs/file_table.c:163 sock_alloc_file+0x1f3/0x4f0 net/socket.c:414 sock_map_fd net/socket.c:441 [inline] __sys_socket+0x16f/0x250 net/socket.c:1396 __do_sys_socket net/socket.c:1401 [inline] __se_sys_socket net/socket.c:1399 [inline] __x64_sys_socket+0x73/0xb0 net/socket.c:1399 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29 RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000004 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5465 Comm: syz-executor3 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc_track_caller+0x2c4/0x760 mm/slab.c:3733 memdup_user+0x2c/0xa0 mm/util.c:160 map_lookup_elem+0x242/0x970 kernel/bpf/syscall.c:626 __do_sys_bpf kernel/bpf/syscall.c:2354 [inline] __se_sys_bpf kernel/bpf/syscall.c:2328 [inline] __x64_sys_bpf+0x318/0x510 kernel/bpf/syscall.c:2328 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f4707db0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f4707db16d4 RCX: 0000000000455b29 RDX: 0000000000000018 RSI: 0000000020000200 RDI: 0000000000000001 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 R13: 00000000004bb807 R14: 00000000004c80f8 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5534 Comm: syz-executor3 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2c8/0x760 mm/slab.c:3727 kmalloc include/linux/slab.h:518 [inline] map_lookup_elem+0x3a8/0x970 kernel/bpf/syscall.c:642 __do_sys_bpf kernel/bpf/syscall.c:2354 [inline] __se_sys_bpf kernel/bpf/syscall.c:2328 [inline] __x64_sys_bpf+0x318/0x510 kernel/bpf/syscall.c:2328 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f4707db0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f4707db16d4 RCX: 0000000000455b29 RDX: 0000000000000018 RSI: 0000000020000200 RDI: 0000000000000001 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 R13: 00000000004bb807 R14: 00000000004c80f8 R15: 0000000000000001 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5652 Comm: syz-executor7 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x26f/0x770 mm/slab.c:3661 kmalloc_node include/linux/slab.h:551 [inline] kzalloc_node include/linux/slab.h:717 [inline] __get_vm_area_node+0x12d/0x390 mm/vmalloc.c:1389 __vmalloc_node_range+0xc4/0x760 mm/vmalloc.c:1741 __vmalloc_node mm/vmalloc.c:1791 [inline] __vmalloc+0x45/0x50 mm/vmalloc.c:1797 bpf_prog_alloc+0xdb/0x3c0 kernel/bpf/core.c:85 __get_filter+0xf1/0x280 net/core/filter.c:1484 sk_attach_filter+0x1d/0x90 net/core/filter.c:1519 sock_setsockopt+0x14ab/0x22c0 net/core/sock.c:948 __sys_setsockopt+0x2df/0x390 net/socket.c:1943 __do_sys_setsockopt net/socket.c:1958 [inline] __se_sys_setsockopt net/socket.c:1955 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1955 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb76e9a1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007fb76e9a26d4 RCX: 0000000000455b29 RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 R10: 0000000020b86000 R11: 0000000000000246 R12: 0000000000000014 R13: 00000000004c10f8 R14: 00000000004d0e10 R15: 0000000000000000 CPU: 0 PID: 5676 Comm: syz-executor6 Not tainted 4.17.0+ #84 syz-executor7: vmalloc: allocation failure: 4096 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 syz-executor7 cpuset= syz7 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 mems_allowed=0 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x26f/0x770 mm/slab.c:3661 kmalloc_node include/linux/slab.h:551 [inline] kzalloc_node include/linux/slab.h:717 [inline] __get_vm_area_node+0x12d/0x390 mm/vmalloc.c:1389 __vmalloc_node_range+0xc4/0x760 mm/vmalloc.c:1741 __vmalloc_node mm/vmalloc.c:1791 [inline] __vmalloc+0x45/0x50 mm/vmalloc.c:1797 bpf_prog_alloc+0xdb/0x3c0 kernel/bpf/core.c:85 __get_filter+0xf1/0x280 net/core/filter.c:1484 sk_attach_filter+0x1d/0x90 net/core/filter.c:1519 sock_setsockopt+0x14ab/0x22c0 net/core/sock.c:948 __sys_setsockopt+0x2df/0x390 net/socket.c:1943 __do_sys_setsockopt net/socket.c:1958 [inline] __se_sys_setsockopt net/socket.c:1955 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1955 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007ff395d16c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007ff395d176d4 RCX: 0000000000455b29 RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 R10: 0000000020b86000 R11: 0000000000000246 R12: 0000000000000014 R13: 00000000004c10f8 R14: 00000000004d0e10 R15: 0000000000000000 CPU: 1 PID: 5652 Comm: syz-executor7 Not tainted 4.17.0+ #84 syz-executor6: vmalloc: allocation failure: 4096 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 syz-executor6 cpuset= warn_alloc.cold.117+0xb2/0x1b8 mm/page_alloc.c:3426 syz6 mems_allowed=0 __vmalloc_node_range+0x472/0x760 mm/vmalloc.c:1762 __vmalloc_node mm/vmalloc.c:1791 [inline] __vmalloc+0x45/0x50 mm/vmalloc.c:1797 bpf_prog_alloc+0xdb/0x3c0 kernel/bpf/core.c:85 __get_filter+0xf1/0x280 net/core/filter.c:1484 sk_attach_filter+0x1d/0x90 net/core/filter.c:1519 sock_setsockopt+0x14ab/0x22c0 net/core/sock.c:948 __sys_setsockopt+0x2df/0x390 net/socket.c:1943 __do_sys_setsockopt net/socket.c:1958 [inline] __se_sys_setsockopt net/socket.c:1955 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1955 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb76e9a1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007fb76e9a26d4 RCX: 0000000000455b29 RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 R10: 0000000020b86000 R11: 0000000000000246 R12: 0000000000000014 R13: 00000000004c10f8 R14: 00000000004d0e10 R15: 0000000000000000 CPU: 0 PID: 5676 Comm: syz-executor6 Not tainted 4.17.0+ #84 Mem-Info: Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 active_anon:83448 inactive_anon:337 isolated_anon:0 active_file:3955 inactive_file:13060 isolated_file:0 unevictable:0 dirty:175 writeback:0 unstable:0 slab_reclaimable:9762 slab_unreclaimable:104168 mapped:74997 shmem:345 pagetables:1021 bounce:0 free:1315980 free_pcp:365 free_cma:0 warn_alloc.cold.117+0xb2/0x1b8 mm/page_alloc.c:3426 Node 0 active_anon:333792kB inactive_anon:1348kB active_file:15820kB inactive_file:52240kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:299988kB dirty:700kB writeback:0kB shmem:1380kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 233472kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB __vmalloc_node_range+0x472/0x760 mm/vmalloc.c:1762 lowmem_reserve[]: __vmalloc_node mm/vmalloc.c:1791 [inline] __vmalloc+0x45/0x50 mm/vmalloc.c:1797 0 bpf_prog_alloc+0xdb/0x3c0 kernel/bpf/core.c:85 2827 6332 6332 __get_filter+0xf1/0x280 net/core/filter.c:1484 sk_attach_filter+0x1d/0x90 net/core/filter.c:1519 sock_setsockopt+0x14ab/0x22c0 net/core/sock.c:948 Node 0 DMA32 free:2898152kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898944kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:792kB local_pcp:728kB free_cma:0kB lowmem_reserve[]: 0 0 3504 3504 __sys_setsockopt+0x2df/0x390 net/socket.c:1943 Node 0 __do_sys_setsockopt net/socket.c:1958 [inline] __se_sys_setsockopt net/socket.c:1955 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1955 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 Normal free:2349860kB min:37316kB low:46644kB high:55972kB active_anon:333792kB inactive_anon:1348kB active_file:15820kB inactive_file:52240kB unevictable:0kB writepending:700kB present:4718592kB managed:3589016kB mlocked:0kB kernel_stack:5984kB pagetables:4084kB bounce:0kB free_pcp:668kB local_pcp:420kB free_cma:0kB lowmem_reserve[]: 0 0 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 0 Code: 1d ba fb ff 0 c3 66 2e 0f 1f 84 00 00 00 00 00 Node 0 66 90 48 89 f8 48 DMA: 89 f7 48 89 d6 48 89 ca 1*4kB 4d 89 c2 4d 89 c8 (U) 4c 8b 4c 24 08 0f 0*8kB 05 <48> 3d 01 f0 ff ff 0*16kB 0f 83 eb b9 fb ff 1*32kB c3 66 2e 0f 1f 84 (U) 00 00 00 00 RSP: 002b:00007ff395d16c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007ff395d176d4 RCX: 0000000000455b29 2*64kB RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 R10: 0000000020b86000 R11: 0000000000000246 R12: 0000000000000014 R13: 00000000004c10f8 R14: 00000000004d0e10 R15: 0000000000000000 (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 4*4kB (M) 3*8kB (M) 2*16kB (M) 3*32kB (M) 1*64kB (M) 4*128kB (M) 2*256kB (M) 2*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898152kB Node 0 Normal: 2594*4kB (UME) 1113*8kB (ME) 838*16kB (UME) 588*32kB (UME) 352*64kB (UM) 117*128kB (UM) 37*256kB (UME) 33*512kB (UME) 16*1024kB (UE) 14*2048kB (UME) 535*4096kB (UM) = 2351792kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 17359 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965969 pages RAM 0 pages HighMem/MovableOnly 340002 pages reserved FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 5716 Comm: syz-executor0 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x272/0x780 mm/slab.c:3642 __alloc_skb+0x111/0x780 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:987 [inline] alloc_skb_with_frags+0x137/0x760 net/core/skbuff.c:5266 sock_alloc_send_pskb+0x87a/0xae0 net/core/sock.c:2108 packet_alloc_skb net/packet/af_packet.c:2778 [inline] packet_snd net/packet/af_packet.c:2869 [inline] packet_sendmsg+0x1b88/0x6100 net/packet/af_packet.c:2946 sock_sendmsg_nosec net/socket.c:645 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:655 __sys_sendto+0x3d7/0x670 net/socket.c:1833 __do_sys_sendto net/socket.c:1845 [inline] __se_sys_sendto net/socket.c:1841 [inline] __x64_sys_sendto+0xe1/0x1a0 net/socket.c:1841 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455b29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f2f38c52c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f2f38c536d4 RCX: 0000000000455b29 RDX: 000000000000000a RSI: 0000000020000100 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 00000000200000c0 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 R13: 00000000004c0eb8 R14: 00000000004d0960 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 5780 Comm: syz-executor0 Not tainted 4.17.0+ #84 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x26f/0x770 mm/slab.c:3661 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696 __kmalloc_reserve.isra.40+0x3a/0xe0 net/core/skbuff.c:137 __alloc_skb+0x14d/0x780 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:987 [inline] alloc_skb_with_frags+0x137/0x760 net/core/skbuff.c:5266 sock_alloc_send_pskb+0x87a/0xae0 net/core/sock.c:2108 packet_alloc_skb net/packet/af_packet.c:2778 [inline] packet_snd net/packet/af_packet.c:2869 [inline] packet_sendmsg+0x1b88/0x6100 net/packet/af_packet.c:2946