INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 0 PID: 8343 Comm: syz-executor.0 Not tainted 4.14.279-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 register_lock_class+0x389/0x1180 kernel/locking/lockdep.c:768 __lock_acquire+0x167/0x3f20 kernel/locking/lockdep.c:3378 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893 ieee802154_del_devkey+0x44/0x80 net/mac802154/cfg.c:450 rdev_del_devkey net/ieee802154/rdev-ops.h:316 [inline] nl802154_del_llsec_devkey+0x254/0x330 net/ieee802154/nl802154.c:1994 genl_family_rcv_msg+0x572/0xb20 net/netlink/genetlink.c:600 genl_rcv_msg+0xaf/0x140 net/netlink/genetlink.c:625 netlink_rcv_skb+0x125/0x390 net/netlink/af_netlink.c:2455 genl_rcv+0x24/0x40 net/netlink/genetlink.c:636 netlink_unicast_kernel net/netlink/af_netlink.c:1296 [inline] netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1322 netlink_sendmsg+0x648/0xbc0 net/netlink/af_netlink.c:1893 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062 __sys_sendmsg+0xa3/0x120 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x27/0x40 net/socket.c:2103 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fba6e3120e9 RSP: 002b:00007fba6cc87168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fba6e424f60 RCX: 00007fba6e3120e9 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 00007fba6e36c08d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc3aa8f0cf R14: 00007fba6cc87300 R15: 0000000000022000 netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 9792 Comm: syz-executor.2 Not tainted 4.14.279-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x25a/0x400 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node+0x38/0x70 mm/slab.c:3689 kmalloc_node include/linux/slab.h:530 [inline] kvmalloc_node+0x46/0xd0 mm/util.c:397 kvmalloc include/linux/mm.h:531 [inline] newseg+0x1d0/0xbb0 ipc/shm.c:651 ipcget_new ipc/util.c:307 [inline] ipcget+0xc6/0xb40 ipc/util.c:636 SYSC_shmget ipc/shm.c:781 [inline] SyS_shmget+0xc3/0x100 ipc/shm.c:765 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f97a1ba80e9 RSP: 002b:00007f97a051d168 EFLAGS: 00000246 ORIG_RAX: 000000000000001d RAX: ffffffffffffffda RBX: 00007f97a1cbaf60 RCX: 00007f97a1ba80e9 RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000000000000 RBP: 00007f97a051d1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020ffe000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd0938e9af R14: 00007f97a051d300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 9818 Comm: syz-executor.2 Not tainted 4.14.279-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 __d_alloc+0x2a/0xa20 fs/dcache.c:1623 __shmem_file_setup.part.0+0x2a7/0x3c0 mm/shmem.c:4276 __shmem_file_setup mm/shmem.c:4264 [inline] shmem_kernel_file_setup+0x4e/0x70 mm/shmem.c:4320 newseg+0x400/0xbb0 ipc/shm.c:692 ipcget_new ipc/util.c:307 [inline] ipcget+0xc6/0xb40 ipc/util.c:636 SYSC_shmget ipc/shm.c:781 [inline] SyS_shmget+0xc3/0x100 ipc/shm.c:765 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f97a1ba80e9 RSP: 002b:00007f97a051d168 EFLAGS: 00000246 ORIG_RAX: 000000000000001d RAX: ffffffffffffffda RBX: 00007f97a1cbaf60 RCX: 00007f97a1ba80e9 RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000000000000 RBP: 00007f97a051d1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020ffe000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd0938e9af R14: 00007f97a051d300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 9844 Comm: syz-executor.2 Not tainted 4.14.279-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 shmem_alloc_inode+0x18/0x40 mm/shmem.c:3904 alloc_inode+0x5d/0x170 fs/inode.c:210 new_inode_pseudo fs/inode.c:899 [inline] new_inode+0x1d/0xf0 fs/inode.c:928 shmem_get_inode+0x8b/0x890 mm/shmem.c:2181 __shmem_file_setup.part.0+0x2e7/0x3c0 mm/shmem.c:4282 __shmem_file_setup mm/shmem.c:4264 [inline] shmem_kernel_file_setup+0x4e/0x70 mm/shmem.c:4320 newseg+0x400/0xbb0 ipc/shm.c:692 ipcget_new ipc/util.c:307 [inline] ipcget+0xc6/0xb40 ipc/util.c:636 SYSC_shmget ipc/shm.c:781 [inline] SyS_shmget+0xc3/0x100 ipc/shm.c:765 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f97a1ba80e9 RSP: 002b:00007f97a051d168 EFLAGS: 00000246 ORIG_RAX: 000000000000001d RAX: ffffffffffffffda RBX: 00007f97a1cbaf60 RCX: 00007f97a1ba80e9 RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000000000000 RBP: 00007f97a051d1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020ffe000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd0938e9af R14: 00007f97a051d300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 9871 Comm: syz-executor.2 Not tainted 4.14.279-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] get_empty_filp+0x86/0x3f0 fs/file_table.c:123 alloc_file+0x23/0x440 fs/file_table.c:164 __shmem_file_setup.part.0+0x198/0x3c0 mm/shmem.c:4294 __shmem_file_setup mm/shmem.c:4264 [inline] shmem_kernel_file_setup+0x4e/0x70 mm/shmem.c:4320 newseg+0x400/0xbb0 ipc/shm.c:692 ipcget_new ipc/util.c:307 [inline] ipcget+0xc6/0xb40 ipc/util.c:636 SYSC_shmget ipc/shm.c:781 [inline] SyS_shmget+0xc3/0x100 ipc/shm.c:765 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f97a1ba80e9 RSP: 002b:00007f97a051d168 EFLAGS: 00000246 ORIG_RAX: 000000000000001d RAX: ffffffffffffffda RBX: 00007f97a1cbaf60 RCX: 00007f97a1ba80e9 RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000000000000 RBP: 00007f97a051d1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020ffe000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd0938e9af R14: 00007f97a051d300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 9910 Comm: syz-executor.2 Not tainted 4.14.279-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] aa_alloc_file_ctx security/apparmor/include/file.h:60 [inline] apparmor_file_alloc_security+0x129/0x800 security/apparmor/lsm.c:431 security_file_alloc+0x66/0xa0 security/security.c:874 get_empty_filp+0x16b/0x3f0 fs/file_table.c:129 alloc_file+0x23/0x440 fs/file_table.c:164 __shmem_file_setup.part.0+0x198/0x3c0 mm/shmem.c:4294 __shmem_file_setup mm/shmem.c:4264 [inline] shmem_kernel_file_setup+0x4e/0x70 mm/shmem.c:4320 newseg+0x400/0xbb0 ipc/shm.c:692 ipcget_new ipc/util.c:307 [inline] ipcget+0xc6/0xb40 ipc/util.c:636 SYSC_shmget ipc/shm.c:781 [inline] SyS_shmget+0xc3/0x100 ipc/shm.c:765 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f97a1ba80e9 RSP: 002b:00007f97a051d168 EFLAGS: 00000246 ORIG_RAX: 000000000000001d RAX: ffffffffffffffda RBX: 00007f97a1cbaf60 RCX: 00007f97a1ba80e9 RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000000000000 RBP: 00007f97a051d1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000020ffe000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd0938e9af R14: 00007f97a051d300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 10013 Comm: syz-executor.3 Not tainted 4.14.279-syzkaller #0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x263/0x410 mm/slab.c:3640 __alloc_skb+0x5c/0x510 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:980 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1168 [inline] netlink_sendmsg+0x91e/0xbc0 net/netlink/af_netlink.c:1868 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062 __sys_sendmsg+0xa3/0x120 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x27/0x40 net/socket.c:2103 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f9d289300e9 RSP: 002b:00007f9d272a5168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f9d28a42f60 RCX: 00007f9d289300e9 RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 RBP: 00007f9d272a51d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007fff541e7f0f R14: 00007f9d272a5300 R15: 0000000000022000 CPU: 0 PID: 10016 Comm: syz-executor.4 Not tainted 4.14.279-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x263/0x410 mm/slab.c:3640 __alloc_skb+0x5c/0x510 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:980 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1168 [inline] netlink_sendmsg+0x91e/0xbc0 net/netlink/af_netlink.c:1868 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062 __sys_sendmsg+0xa3/0x120 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x27/0x40 net/socket.c:2103 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fe98d8ce0e9 RSP: 002b:00007fe98c243168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fe98d9e0f60 RCX: 00007fe98d8ce0e9 RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 00007fe98c2431d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffe62c1250f R14: 00007fe98c243300 R15: 0000000000022000