WARNING: possible circular locking dependency detected
4.13.0-next-20170913+ #21 Not tainted
------------------------------------------------------
syz-executor0/3435 is trying to acquire lock:
 (event_mutex){+.+.}, at: [<ffffffff81759138>] perf_trace_init+0x58/0xab0 kernel/trace/trace_event_perf.c:216

but task is already holding lock:
 (&ctx->mutex){+.+.}, at: [<ffffffff8183846b>] perf_event_init_context kernel/events/core.c:10965 [inline]
 (&ctx->mutex){+.+.}, at: [<ffffffff8183846b>] perf_event_init_task+0x25b/0x890 kernel/events/core.c:11040

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #8 (&ctx->mutex){+.+.}:
       check_prevs_add kernel/locking/lockdep.c:2020 [inline]
       validate_chain kernel/locking/lockdep.c:2469 [inline]
       __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498
       lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002
       __mutex_lock_common kernel/locking/mutex.c:756 [inline]
       __mutex_lock+0x16f/0x1870 kernel/locking/mutex.c:893
       mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
       perf_event_ctx_lock_nested+0x1dc/0x3c0 kernel/events/core.c:1210
       perf_event_ctx_lock kernel/events/core.c:1223 [inline]
       perf_read+0xb9/0x970 kernel/events/core.c:4584
       do_loop_readv_writev fs/read_write.c:693 [inline]
       do_iter_read+0x3db/0x5b0 fs/read_write.c:917
       vfs_readv+0x121/0x1c0 fs/read_write.c:979
       kernel_readv fs/splice.c:361 [inline]
       default_file_splice_read+0x508/0xae0 fs/splice.c:416
       do_splice_to+0x110/0x170 fs/splice.c:880
       do_splice fs/splice.c:1173 [inline]
       SYSC_splice fs/splice.c:1402 [inline]
       SyS_splice+0x11a8/0x1630 fs/splice.c:1382
       entry_SYSCALL_64_fastpath+0x1f/0xbe

-> #7 (&pipe->mutex/1){+.+.}:
       check_prevs_add kernel/locking/lockdep.c:2020 [inline]
       validate_chain kernel/locking/lockdep.c:2469 [inline]
       __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498
       lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002
       __mutex_lock_common kernel/locking/mutex.c:756 [inline]
       __mutex_lock+0x16f/0x1870 kernel/locking/mutex.c:893
       mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
       pipe_lock_nested fs/pipe.c:66 [inline]
       pipe_lock+0x56/0x70 fs/pipe.c:74
       iter_file_splice_write+0x264/0xf50 fs/splice.c:699
       do_splice_from fs/splice.c:851 [inline]
       do_splice fs/splice.c:1147 [inline]
       SYSC_splice fs/splice.c:1402 [inline]
       SyS_splice+0x7d5/0x1630 fs/splice.c:1382
       entry_SYSCALL_64_fastpath+0x1f/0xbe

-> #6 (sb_writers){.+.+}:
       percpu_down_read_preempt_disable include/linux/percpu-rwsem.h:35 [inline]
       percpu_down_read include/linux/percpu-rwsem.h:58 [inline]
       __sb_start_write+0x18f/0x290 fs/super.c:1341
       sb_start_write include/linux/fs.h:1541 [inline]
       mnt_want_write+0x3f/0xb0 fs/namespace.c:387
       filename_create+0x12b/0x520 fs/namei.c:3628
       kern_path_create+0x33/0x40 fs/namei.c:3674
       handle_create+0xc0/0x760 drivers/base/devtmpfs.c:203

-> #5 ((complete)&req.done){+.+.}:
       check_prevs_add kernel/locking/lockdep.c:2020 [inline]
       validate_chain kernel/locking/lockdep.c:2469 [inline]
       __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498
       lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002
       complete_acquire include/linux/completion.h:39 [inline]
       __wait_for_common kernel/sched/completion.c:108 [inline]
       wait_for_common kernel/sched/completion.c:122 [inline]
       wait_for_completion+0xc8/0x770 kernel/sched/completion.c:143
       devtmpfs_create_node+0x32b/0x4a0 drivers/base/devtmpfs.c:115
       device_add+0x120f/0x1640 drivers/base/core.c:1824
       device_create_groups_vargs+0x1f3/0x250 drivers/base/core.c:2430
       device_create_vargs drivers/base/core.c:2470 [inline]
       device_create+0xda/0x110 drivers/base/core.c:2506
       msr_device_create+0x26/0x40 arch/x86/kernel/msr.c:188
       cpuhp_invoke_callback+0x256/0x14d0 kernel/cpu.c:145
       cpuhp_thread_fun+0x265/0x520 kernel/cpu.c:434
       smpboot_thread_fn+0x489/0x850 kernel/smpboot.c:164
       kthread+0x39c/0x470 kernel/kthread.c:231
       ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431

-> #4 (cpuhp_state){+.+.}:
       check_prevs_add kernel/locking/lockdep.c:2020 [inline]
       validate_chain kernel/locking/lockdep.c:2469 [inline]
       __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498
       lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002
       cpuhp_invoke_ap_callback kernel/cpu.c:467 [inline]
       cpuhp_issue_call+0x1a2/0x3e0 kernel/cpu.c:1308
       __cpuhp_setup_state_cpuslocked+0x2d6/0x5f0 kernel/cpu.c:1455
       __cpuhp_setup_state+0xb0/0x140 kernel/cpu.c:1484
       cpuhp_setup_state include/linux/cpuhotplug.h:177 [inline]
       page_writeback_init+0x4d/0x71 mm/page-writeback.c:2082
       pagecache_init+0x48/0x4f mm/filemap.c:871
       start_kernel+0x6c1/0x754 init/main.c:690
       x86_64_start_reservations+0x2a/0x2c arch/x86/kernel/head64.c:377
       x86_64_start_kernel+0x87/0x8a arch/x86/kernel/head64.c:358
       verify_cpu+0x0/0xfb

-> #3 (cpuhp_state_mutex){+.+.}:
       check_prevs_add kernel/locking/lockdep.c:2020 [inline]
       validate_chain kernel/locking/lockdep.c:2469 [inline]
       __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498
       lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002
       __mutex_lock_common kernel/locking/mutex.c:756 [inline]
       __mutex_lock+0x16f/0x1870 kernel/locking/mutex.c:893
       mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
       __cpuhp_setup_state_cpuslocked+0x5b/0x5f0 kernel/cpu.c:1430
       __cpuhp_setup_state+0xb0/0x140 kernel/cpu.c:1484
       cpuhp_setup_state_nocalls include/linux/cpuhotplug.h:205 [inline]
       kvm_guest_init+0x1f3/0x20f arch/x86/kernel/kvm.c:488
       setup_arch+0x1899/0x1ab3 arch/x86/kernel/setup.c:1295
       start_kernel+0xa5/0x754 init/main.c:530
       x86_64_start_reservations+0x2a/0x2c arch/x86/kernel/head64.c:377
       x86_64_start_kernel+0x87/0x8a arch/x86/kernel/head64.c:358
       verify_cpu+0x0/0xfb

-> #2 (cpu_hotplug_lock.rw_sem){++++}:
       check_prevs_add kernel/locking/lockdep.c:2020 [inline]
       validate_chain kernel/locking/lockdep.c:2469 [inline]
       __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498
       lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002
       percpu_down_read_preempt_disable include/linux/percpu-rwsem.h:35 [inline]
       percpu_down_read include/linux/percpu-rwsem.h:58 [inline]
       cpus_read_lock+0x42/0x90 kernel/cpu.c:218
       static_key_slow_inc+0x9d/0x3c0 kernel/jump_label.c:123
       tracepoint_add_func kernel/tracepoint.c:223 [inline]
       tracepoint_probe_register_prio+0x80d/0x9a0 kernel/tracepoint.c:283
       tracepoint_probe_register+0x2a/0x40 kernel/tracepoint.c:304
       trace_event_reg+0x167/0x320 kernel/trace/trace_events.c:305
       perf_trace_event_reg kernel/trace/trace_event_perf.c:122 [inline]
       perf_trace_event_init kernel/trace/trace_event_perf.c:197 [inline]
       perf_trace_init+0x4f9/0xab0 kernel/trace/trace_event_perf.c:221
       perf_tp_event_init+0x7d/0xf0 kernel/events/core.c:8037
       perf_try_init_event+0xc9/0x1f0 kernel/events/core.c:9261
       perf_init_event kernel/events/core.c:9299 [inline]
       perf_event_alloc+0x1c5b/0x2a00 kernel/events/core.c:9558
       SYSC_perf_event_open+0x84e/0x2e00 kernel/events/core.c:10013
       SyS_perf_event_open+0x39/0x50 kernel/events/core.c:9899
       entry_SYSCALL_64_fastpath+0x1f/0xbe

-> #1 (tracepoints_mutex){+.+.}:
       check_prevs_add kernel/locking/lockdep.c:2020 [inline]
       validate_chain kernel/locking/lockdep.c:2469 [inline]
       __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498
       lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002
       __mutex_lock_common kernel/locking/mutex.c:756 [inline]
       __mutex_lock+0x16f/0x1870 kernel/locking/mutex.c:893
       mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
       tracepoint_probe_register_prio+0xa0/0x9a0 kernel/tracepoint.c:279
       tracepoint_probe_register+0x2a/0x40 kernel/tracepoint.c:304
       trace_event_reg+0x167/0x320 kernel/trace/trace_events.c:305
       perf_trace_event_reg kernel/trace/trace_event_perf.c:122 [inline]
       perf_trace_event_init kernel/trace/trace_event_perf.c:197 [inline]
       perf_trace_init+0x4f9/0xab0 kernel/trace/trace_event_perf.c:221
       perf_tp_event_init+0x7d/0xf0 kernel/events/core.c:8037
       perf_try_init_event+0xc9/0x1f0 kernel/events/core.c:9261
       perf_init_event kernel/events/core.c:9299 [inline]
       perf_event_alloc+0x1c5b/0x2a00 kernel/events/core.c:9558
       SYSC_perf_event_open+0x84e/0x2e00 kernel/events/core.c:10013
       SyS_perf_event_open+0x39/0x50 kernel/events/core.c:9899
       entry_SYSCALL_64_fastpath+0x1f/0xbe

-> #0 (event_mutex){+.+.}:
       check_prev_add+0x865/0x1520 kernel/locking/lockdep.c:1894
       check_prevs_add kernel/locking/lockdep.c:2020 [inline]
       validate_chain kernel/locking/lockdep.c:2469 [inline]
       __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498
       lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002
       __mutex_lock_common kernel/locking/mutex.c:756 [inline]
       __mutex_lock+0x16f/0x1870 kernel/locking/mutex.c:893
       mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
       perf_trace_init+0x58/0xab0 kernel/trace/trace_event_perf.c:216
       perf_tp_event_init+0x7d/0xf0 kernel/events/core.c:8037
       perf_try_init_event+0xc9/0x1f0 kernel/events/core.c:9261
       perf_init_event kernel/events/core.c:9283 [inline]
       perf_event_alloc+0x10fa/0x2a00 kernel/events/core.c:9558
       inherit_event.isra.93+0x15b/0x910 kernel/events/core.c:10772
       inherit_group kernel/events/core.c:10863 [inline]
       inherit_task_group.isra.95.part.96+0x73/0x240 kernel/events/core.c:10921
       inherit_task_group kernel/events/core.c:10901 [inline]
       perf_event_init_context kernel/events/core.c:10972 [inline]
       perf_event_init_task+0x348/0x890 kernel/events/core.c:11040
       copy_process.part.36+0x173b/0x4af0 kernel/fork.c:1709
       copy_process kernel/fork.c:1548 [inline]
       _do_fork+0x1ef/0xfe0 kernel/fork.c:2027
       SYSC_clone kernel/fork.c:2137 [inline]
       SyS_clone+0x37/0x50 kernel/fork.c:2131
       do_syscall_64+0x26c/0x8c0 arch/x86/entry/common.c:287
       return_from_SYSCALL_64+0x0/0x7a

other info that might help us debug this:

Chain exists of:
  event_mutex --> &pipe->mutex/1 --> &ctx->mutex

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&ctx->mutex);
                               lock(&pipe->mutex/1);
                               lock(&ctx->mutex);
  lock(event_mutex);

 *** DEADLOCK ***

2 locks held by syz-executor0/3435:
 #0:  (&ctx->mutex){+.+.}, at: [<ffffffff8183846b>] perf_event_init_context kernel/events/core.c:10965 [inline]
 #0:  (&ctx->mutex){+.+.}, at: [<ffffffff8183846b>] perf_event_init_task+0x25b/0x890 kernel/events/core.c:11040
 #1:  (&pmus_srcu){....}, at: [<ffffffff8181d25a>] perf_event_alloc+0x104a/0x2a00 kernel/events/core.c:9554

stack backtrace:
CPU: 1 PID: 3435 Comm: syz-executor0 Not tainted 4.13.0-next-20170913+ #21
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:16 [inline]
 dump_stack+0x194/0x257 lib/dump_stack.c:52
 print_circular_bug+0x503/0x710 kernel/locking/lockdep.c:1259
 check_prev_add+0x865/0x1520 kernel/locking/lockdep.c:1894
 check_prevs_add kernel/locking/lockdep.c:2020 [inline]
 validate_chain kernel/locking/lockdep.c:2469 [inline]
 __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498
 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002
 __mutex_lock_common kernel/locking/mutex.c:756 [inline]
 __mutex_lock+0x16f/0x1870 kernel/locking/mutex.c:893
 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908
 perf_trace_init+0x58/0xab0 kernel/trace/trace_event_perf.c:216
 perf_tp_event_init+0x7d/0xf0 kernel/events/core.c:8037
 perf_try_init_event+0xc9/0x1f0 kernel/events/core.c:9261
 perf_init_event kernel/events/core.c:9283 [inline]
 perf_event_alloc+0x10fa/0x2a00 kernel/events/core.c:9558
 inherit_event.isra.93+0x15b/0x910 kernel/events/core.c:10772
 inherit_group kernel/events/core.c:10863 [inline]
 inherit_task_group.isra.95.part.96+0x73/0x240 kernel/events/core.c:10921
 inherit_task_group kernel/events/core.c:10901 [inline]
 perf_event_init_context kernel/events/core.c:10972 [inline]
 perf_event_init_task+0x348/0x890 kernel/events/core.c:11040
 copy_process.part.36+0x173b/0x4af0 kernel/fork.c:1709
 copy_process kernel/fork.c:1548 [inline]
 _do_fork+0x1ef/0xfe0 kernel/fork.c:2027
 SYSC_clone kernel/fork.c:2137 [inline]
 SyS_clone+0x37/0x50 kernel/fork.c:2131
 do_syscall_64+0x26c/0x8c0 arch/x86/entry/common.c:287
 entry_SYSCALL64_slow_path+0x25/0x25
RIP: 0033:0x4547e9
RSP: 002b:0000000000a6f738 EFLAGS: 00000202 ORIG_RAX: 0000000000000038
RAX: ffffffffffffffda RBX: 00007f7e788fa700 RCX: 00000000004547e9
RDX: 00007f7e788fa9d0 RSI: 00007f7e788f9db0 RDI: 00000000003d0f00
RBP: 0000000000a6f870 R08: 00007f7e788fa700 R09: 00007f7e788fa700
R10: 00007f7e788fa9d0 R11: 0000000000000202 R12: 0000000000000000
R13: 0000000000a6f7ef R14: 00007f7e788fa9c0 R15: 0000000000000006
SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47729 sclass=netlink_route_socket pig=3444 comm=syz-executor7
device syz3 entered promiscuous mode
QAT: Invalid ioctl
device gre0 entered promiscuous mode
device syz7 entered promiscuous mode
device syz2 entered promiscuous mode
netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'.
raw_sendmsg: syz-executor2 forgot to set AF_INET. Fix it!
syz-executor1 uses obsolete (PF_INET,SOCK_PACKET)
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 1
CPU: 0 PID: 4243 Comm: syz-executor5 Not tainted 4.13.0-next-20170913+ #21
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:16 [inline]
 dump_stack+0x194/0x257 lib/dump_stack.c:52
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail+0x8c0/0xa40 lib/fault-inject.c:149
 should_failslab+0xec/0x120 mm/failslab.c:31
 slab_pre_alloc_hook mm/slab.h:422 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc+0x47/0x760 mm/slab.c:3559
 sctp_bucket_create net/sctp/socket.c:7343 [inline]
 sctp_get_port_local+0x9d6/0x13c0 net/sctp/socket.c:7102
 sctp_do_bind+0x240/0x550 net/sctp/socket.c:384
 sctp_bind+0x8c/0xc0 net/sctp/socket.c:285
 inet6_bind+0x125/0x1020 net/ipv6/af_inet6.c:293
 SYSC_bind+0x1b4/0x3f0 net/socket.c:1476
 SyS_bind+0x24/0x30 net/socket.c:1462
 entry_SYSCALL_64_fastpath+0x1f/0xbe
RIP: 0033:0x451e59
RSP: 002b:00007fc434fefc08 EFLAGS: 00000216 ORIG_RAX: 0000000000000031
RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59
RDX: 000000000000001c RSI: 0000000020458000 RDI: 0000000000000006
RBP: 00007fc434fefa10 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004b69f7
R13: 00007fc434fefb48 R14: 00000000004b6a07 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
*** Guest State ***
CR0: actual=0x0000000080000031, shadow=0x0000000060000010, gh_mask=fffffffffffffff7
CR4: actual=0x0000000000002051, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
CR3 = 0x00000000fffbc000
RSP = 0x000000000000fffa  RIP = 0x0000000000000000
RFLAGS=0x00033000         DR7 = 0x0000000000000400
Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
CS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
DS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
SS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
ES:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
FS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GDTR:                           limit=0x0000ffff, base=0x0000000000000000
LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000
IDTR:                           limit=0x0000ffff, base=0x0000000000000000
TR:   sel=0x0000, attr=0x0008b, limit=0x00002088, base=0x0000000000000000
EFER =     0x0000000000000000  PAT = 0x0007040600070406
DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
Interruptibility = 00000000  ActivityState = 00000000
*** Host State ***
RIP = 0xffffffff811b8bff  RSP = 0xffff8801c7fd74c8
CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
FSBase=00007f2eb99d9700 GSBase=ffff8801db200000 TRBase=ffff8801db223100
GDTBase=ffffffffff577000 IDTBase=ffffffffff57b000
CR0=0000000080050033 CR3=00000001c80be000 CR4=00000000001426f0
Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d460b0
EFER = 0x0000000000000d01  PAT = 0x0000000000000000
*** Control State ***
PinBased=0000003f CPUBased=b699edfa SecondaryExec=00000042
EntryControls=0000d1ff ExitControls=0023efff
ExceptionBitmap=ffffbfff PFECmask=00000000 PFECmatch=00000000
VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000
VMExit: intr_info=00000000 errcode=00000000 ilen=00000000
        reason=80000021 qualification=0000000000000000
IDTVectoring: info=00000000 errcode=00000000
TSC Offset = 0xffffffdf871a9e78
EPT pointer = 0x00000001ca91201e
*** Guest State ***
CR0: actual=0x0000000080000031, shadow=0x0000000060000010, gh_mask=fffffffffffffff7
CR4: actual=0x0000000000002051, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
CR3 = 0x00000000fffbc000
RSP = 0x000000000000fffa  RIP = 0x0000000000000000
RFLAGS=0x00033000         DR7 = 0x0000000000000400
Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
CS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
DS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
SS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
ES:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
FS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GDTR:                           limit=0x0000ffff, base=0x0000000000000000
LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000
IDTR:                           limit=0x0000ffff, base=0x0000000000000000
TR:   sel=0x0000, attr=0x0008b, limit=0x00002088, base=0x0000000000000000
EFER =     0x0000000000000000  PAT = 0x0007040600070406
DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
Interruptibility = 00000000  ActivityState = 00000000
*** Host State ***
RIP = 0xffffffff811b8bff  RSP = 0xffff8801c64ff4c8
CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
FSBase=00007f2eb99d9700 GSBase=ffff8801db300000 TRBase=ffff8801db323100
GDTBase=ffffffffff576000 IDTBase=ffffffffff57b000
CR0=0000000080050033 CR3=00000001d5a3e000 CR4=00000000001426e0
Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d460b0
EFER = 0x0000000000000d01  PAT = 0x0000000000000000
*** Control State ***
PinBased=0000003f CPUBased=b699edfa SecondaryExec=00000042
EntryControls=0000d1ff ExitControls=0023efff
ExceptionBitmap=ffffbfff PFECmask=00000000 PFECmatch=00000000
VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000
VMExit: intr_info=00000000 errcode=00000000 ilen=00000000
        reason=80000021 qualification=0000000000000000
IDTVectoring: info=00000000 errcode=00000000
TSC Offset = 0xffffffdf6b7781fd
EPT pointer = 0x00000001bfc4901e
CPU: 0 PID: 4402 Comm: syz-executor6 Not tainted 4.13.0-next-20170913+ #21
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:16 [inline]
 dump_stack+0x194/0x257 lib/dump_stack.c:52
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail+0x8c0/0xa40 lib/fault-inject.c:149
 should_failslab+0xec/0x120 mm/failslab.c:31
 slab_pre_alloc_hook mm/slab.h:422 [inline]
 slab_alloc mm/slab.c:3383 [inline]
 kmem_cache_alloc_trace+0x4b/0x750 mm/slab.c:3625
 kmalloc include/linux/slab.h:493 [inline]
 kzalloc include/linux/slab.h:666 [inline]
 mld_add_delrec net/ipv6/mcast.c:721 [inline]
 igmp6_leave_group net/ipv6/mcast.c:2430 [inline]
 igmp6_group_dropped+0x3ef/0xa50 net/ipv6/mcast.c:700
 __ipv6_dev_mc_dec+0x23d/0x340 net/ipv6/mcast.c:935
 addrconf_leave_solict+0x193/0x240 net/ipv6/addrconf.c:2066
 __ipv6_dev_ac_dec+0x2c9/0x600 net/ipv6/anycast.c:326
 ipv6_dev_ac_dec net/ipv6/anycast.c:342 [inline]
 ipv6_sock_ac_close+0x2b4/0x3e0 net/ipv6/anycast.c:197
 inet6_release+0x48/0x70 net/ipv6/af_inet6.c:431
 sock_release+0x8d/0x1e0 net/socket.c:597
 sock_close+0x16/0x20 net/socket.c:1126
 __fput+0x333/0x7f0 fs/file_table.c:210
 ____fput+0x15/0x20 fs/file_table.c:244
 task_work_run+0x199/0x270 kernel/task_work.c:112
 tracehook_notify_resume include/linux/tracehook.h:191 [inline]
 exit_to_usermode_loop+0x2a6/0x300 arch/x86/entry/common.c:162
 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline]
 syscall_return_slowpath+0x42f/0x500 arch/x86/entry/common.c:266
 entry_SYSCALL_64_fastpath+0xbc/0xbe
RIP: 0033:0x451e59
RSP: 002b:00007f5f226adc08 EFLAGS: 00000216 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000718000 RCX: 0000000000451e59
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005
RBP: 0000000000000460 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004dd532
R13: 0000000000000006 R14: 0000000000000005 R15: 0000000000000000
*** Guest State ***
CR0: actual=0x0000000080000031, shadow=0x0000000060000010, gh_mask=fffffffffffffff7
CR4: actual=0x0000000000002051, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
CR3 = 0x00000000fffbc000
RSP = 0x000000000000fffa  RIP = 0x0000000000000000
RFLAGS=0x00033000         DR7 = 0x0000000000000400
Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
CS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
DS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
SS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
ES:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
FS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GDTR:                           limit=0x0000ffff, base=0x0000000000000000
LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000
IDTR:                           limit=0x0000ffff, base=0x0000000000000000
TR:   sel=0x0000, attr=0x0008b, limit=0x00002088, base=0x0000000000000000
EFER =     0x0000000000000000  PAT = 0x0007040600070406
DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
Interruptibility = 00000000  ActivityState = 00000000
*** Host State ***
RIP = 0xffffffff811b8bff  RSP = 0xffff8801cba5f4c8
CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
FSBase=00007f2eb99d9700 GSBase=ffff8801db300000 TRBase=ffff8801db223100
GDTBase=ffffffffff577000 IDTBase=ffffffffff57b000
CR0=0000000080050033 CR3=00000001ce631000 CR4=00000000001426e0
Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d460b0
EFER = 0x0000000000000d01  PAT = 0x0000000000000000
*** Control State ***
PinBased=0000003f CPUBased=b699edfa SecondaryExec=00000042
EntryControls=0000d1ff ExitControls=0023efff
ExceptionBitmap=ffffbfff PFECmask=00000000 PFECmatch=00000000
VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000
VMExit: intr_info=00000000 errcode=00000000 ilen=00000000
        reason=80000021 qualification=0000000000000000
IDTVectoring: info=00000000 errcode=00000000
TSC Offset = 0xffffffdedef30e09
EPT pointer = 0x00000001cac6001e
*** Guest State ***
CR0: actual=0x0000000080000031, shadow=0x0000000060000010, gh_mask=fffffffffffffff7
CR4: actual=0x0000000000002051, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
CR3 = 0x00000000fffbc000
RSP = 0x000000000000fffa  RIP = 0x0000000000000000
RFLAGS=0x00033000         DR7 = 0x0000000000000400
Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
CS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
DS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
SS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
ES:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
FS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GDTR:                           limit=0x0000ffff, base=0x0000000000000000
LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000
IDTR:                           limit=0x0000ffff, base=0x0000000000000000
TR:   sel=0x0000, attr=0x0008b, limit=0x00002088, base=0x0000000000000000
EFER =     0x0000000000000000  PAT = 0x0007040600070406
DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
Interruptibility = 00000000  ActivityState = 00000000
*** Host State ***
RIP = 0xffffffff811b8bff  RSP = 0xffff8801c62d74c8
CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
FSBase=00007f2eb99b6700 GSBase=ffff8801db300000 TRBase=ffff8801db323100
GDTBase=ffffffffff576000 IDTBase=ffffffffff57b000
CR0=0000000080050033 CR3=00000001d870d000 CR4=00000000001426e0
Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d460b0
EFER = 0x0000000000000d01  PAT = 0x0000000000000000
*** Control State ***
PinBased=0000003f CPUBased=b699edfa SecondaryExec=00000042
EntryControls=0000d1ff ExitControls=0023efff
ExceptionBitmap=ffffbfff PFECmask=00000000 PFECmatch=00000000
VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000
VMExit: intr_info=00000000 errcode=00000000 ilen=00000000
        reason=80000021 qualification=0000000000000000
IDTVectoring: info=00000000 errcode=00000000
TSC Offset = 0xffffffde82402d88
EPT pointer = 0x00000001d11e501e
*** Guest State ***
CR0: actual=0x0000000080000031, shadow=0x0000000060000010, gh_mask=fffffffffffffff7
CR4: actual=0x0000000000002051, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
CR3 = 0x00000000fffbc000
RSP = 0x000000000000fffa  RIP = 0x0000000000000000
RFLAGS=0x00033000         DR7 = 0x0000000000000400
Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
CS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
DS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
SS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
ES:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
FS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GS:   sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000
GDTR:                           limit=0x0000ffff, base=0x0000000000000000
LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000
IDTR:                           limit=0x0000ffff, base=0x0000000000000000
TR:   sel=0x0000, attr=0x0008b, limit=0x00002088, base=0x0000000000000000
EFER =     0x0000000000000000  PAT = 0x0007040600070406
DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
Interruptibility = 00000000  ActivityState = 00000000
*** Host State ***
RIP = 0xffffffff811b8bff  RSP = 0xffff8801c1bc74c8
CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
FSBase=00007f2eb99b6700 GSBase=ffff8801db200000 TRBase=ffff8801db223100
GDTBase=ffffffffff577000 IDTBase=ffffffffff57b000
CR0=0000000080050033 CR3=00000001d6b50000 CR4=00000000001426f0
Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d460b0
EFER = 0x0000000000000d01  PAT = 0x0000000000000000
*** Control State ***
PinBased=0000003f CPUBased=b699edfa SecondaryExec=00000042
EntryControls=0000d1ff ExitControls=0023efff
ExceptionBitmap=ffffbfff PFECmask=00000000 PFECmatch=00000000
VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000
VMExit: intr_info=00000000 errcode=00000000 ilen=00000000
        reason=80000021 qualification=0000000000000000
IDTVectoring: info=00000000 errcode=00000000
TSC Offset = 0xffffffde3735a647
EPT pointer = 0x00000001cfe3201e
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 5330 Comm: syz-executor3 Not tainted 4.13.0-next-20170913+ #21
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:16 [inline]
 dump_stack+0x194/0x257 lib/dump_stack.c:52
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail+0x8c0/0xa40 lib/fault-inject.c:149
 should_failslab+0xec/0x120 mm/failslab.c:31
 slab_pre_alloc_hook mm/slab.h:422 [inline]
 slab_alloc_node mm/slab.c:3304 [inline]
 kmem_cache_alloc_node+0x56/0x760 mm/slab.c:3649
 __alloc_skb+0xf1/0x740 net/core/skbuff.c:194
 alloc_skb include/linux/skbuff.h:976 [inline]
 netlink_alloc_large_skb net/netlink/af_netlink.c:1145 [inline]
 netlink_sendmsg+0xa86/0xe70 net/netlink/af_netlink.c:1837
 sock_sendmsg_nosec net/socket.c:633 [inline]
 sock_sendmsg+0xca/0x110 net/socket.c:643
 sock_write_iter+0x320/0x5e0 net/socket.c:912
 call_write_iter include/linux/fs.h:1770 [inline]
 do_iter_readv_writev+0x531/0x7f0 fs/read_write.c:673
 do_iter_write+0x15a/0x540 fs/read_write.c:952
 vfs_writev+0x18a/0x340 fs/read_write.c:997
 do_writev+0xfc/0x2a0 fs/read_write.c:1032
 SYSC_writev fs/read_write.c:1105 [inline]
 SyS_writev+0x27/0x30 fs/read_write.c:1102
 entry_SYSCALL_64_fastpath+0x1f/0xbe
RIP: 0033:0x451e59
RSP: 002b:00007fe3fb8e9c08 EFLAGS: 00000216 ORIG_RAX: 0000000000000014
RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 0000000000451e59
RDX: 0000000000000001 RSI: 00000000205ccff0 RDI: 0000000000000005
RBP: 00007fe3fb8e9a10 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004b69f7
R13: 00007fe3fb8e9b48 R14: 00000000004b6a07 R15: 0000000000000000
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket pig=5499 comm=syz-executor3
SELinux: unrecognized netlink message: protocol=9 nlmsg_type=26 sclass=netlink_audit_socket pig=5514 comm=syz-executor3
SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26 sclass=netlink_tcpdiag_socket pig=5532 comm=syz-executor3
SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26 sclass=netlink_tcpdiag_socket pig=5532 comm=syz-executor3