dccp_close: ABORT with 4813 bytes unread Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable ============================= WARNING: suspicious RCU usage 4.19.0-rc4+ #225 Not tainted ----------------------------- include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor0/12366: #0: 000000008a1503ae (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1492 [inline] 000000008a1503ae (sk_lock-AF_INET6){+.+.}, at: do_ipv6_setsockopt.isra.9+0x570/0x4700 net/ipv6/ipv6_sockglue.c:167 stack backtrace: CPU: 1 PID: 12366 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4536 ireq_opt_deref include/net/inet_sock.h:135 [inline] inet_csk_route_req+0x977/0xde0 net/ipv4/inet_connection_sock.c:547 dccp_v4_send_response+0xb4/0x6d0 net/dccp/ipv4.c:485 dccp_v4_conn_request+0xc81/0x1390 net/dccp/ipv4.c:634 dccp_v6_conn_request+0xdb9/0x1660 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x6f7/0x1a32 net/dccp/input.c:612 dccp_v4_do_rcv+0x102/0x180 net/dccp/ipv4.c:683 dccp_v6_do_rcv+0x99d/0xbf0 net/dccp/ipv6.c:579 sk_backlog_rcv include/net/sock.h:932 [inline] __release_sock+0x12f/0x3a0 net/core/sock.c:2336 release_sock+0xad/0x2c0 net/core/sock.c:2849 do_ipv6_setsockopt.isra.9+0x6a1/0x4700 net/ipv6/ipv6_sockglue.c:916 ipv6_setsockopt+0xbd/0x170 net/ipv6/ipv6_sockglue.c:940 dccp_setsockopt+0x96/0xf0 net/dccp/proto.c:574 sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:3038 __sys_setsockopt+0x1ba/0x3c0 net/socket.c:1902 __do_sys_setsockopt net/socket.c:1913 [inline] __se_sys_setsockopt net/socket.c:1910 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f727a8b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f727a8b46d4 RCX: 0000000000457679 RDX: 0000000000000020 RSI: 0000000000000029 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000020 R09: 0000000000000000 R10: 0000000020000200 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000004d5dc0 R14: 00000000004c9da0 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.19.0-rc4+ #225 Not tainted ----------------------------- include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor0/12366: #0: 000000008a1503ae (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1492 [inline] #0: 000000008a1503ae (sk_lock-AF_INET6){+.+.}, at: do_ipv6_setsockopt.isra.9+0x570/0x4700 net/ipv6/ipv6_sockglue.c:167 stack backtrace: CPU: 1 PID: 12366 Comm: syz-executor0 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4536 ireq_opt_deref include/net/inet_sock.h:135 [inline] dccp_v4_send_response+0x537/0x6d0 net/dccp/ipv4.c:496 dccp_v4_conn_request+0xc81/0x1390 net/dccp/ipv4.c:634 dccp_v6_conn_request+0xdb9/0x1660 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x6f7/0x1a32 net/dccp/input.c:612 dccp_v4_do_rcv+0x102/0x180 net/dccp/ipv4.c:683 dccp_v6_do_rcv+0x99d/0xbf0 net/dccp/ipv6.c:579 sk_backlog_rcv include/net/sock.h:932 [inline] __release_sock+0x12f/0x3a0 net/core/sock.c:2336 release_sock+0xad/0x2c0 net/core/sock.c:2849 do_ipv6_setsockopt.isra.9+0x6a1/0x4700 net/ipv6/ipv6_sockglue.c:916 ipv6_setsockopt+0xbd/0x170 net/ipv6/ipv6_sockglue.c:940 dccp_setsockopt+0x96/0xf0 net/dccp/proto.c:574 sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:3038 __sys_setsockopt+0x1ba/0x3c0 net/socket.c:1902 __do_sys_setsockopt net/socket.c:1913 [inline] __se_sys_setsockopt net/socket.c:1910 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f727a8b3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f727a8b46d4 RCX: 0000000000457679 RDX: 0000000000000020 RSI: 0000000000000029 RDI: 0000000000000003 RBP: 000000000072bf00 R08: 0000000000000020 R09: 0000000000000000 R10: 0000000020000200 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000004d5dc0 R14: 00000000004c9da0 R15: 0000000000000000 dccp_close: ABORT with 2620 bytes unread TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 12785 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2be/0x730 mm/slab.c:3552 sock_alloc_inode+0x1d/0x260 net/socket.c:244 alloc_inode+0x63/0x190 fs/inode.c:210 new_inode_pseudo+0x71/0x1a0 fs/inode.c:903 sock_alloc+0x41/0x270 net/socket.c:547 __sys_accept4+0x11c/0x8a0 net/socket.c:1560 __do_sys_accept4 net/socket.c:1625 [inline] __se_sys_accept4 net/socket.c:1622 [inline] __x64_sys_accept4+0x97/0xf0 net/socket.c:1622 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f465b70bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 RAX: ffffffffffffffda RBX: 00007f465b70c6d4 RCX: 0000000000457679 RDX: 0000000020000200 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 R13: 00000000004cbd88 R14: 00000000004bd78c R15: 0000000000000000 IPVS: set_ctl: invalid protocol: 63 224.0.0.1:20002 IPVS: set_ctl: invalid protocol: 63 224.0.0.1:20002 dccp_close: ABORT with 1310 bytes unread TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 12856 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x2d7/0x750 mm/slab.c:3618 kmalloc include/linux/slab.h:513 [inline] sock_alloc_inode+0x66/0x260 net/socket.c:247 alloc_inode+0x63/0x190 fs/inode.c:210 new_inode_pseudo+0x71/0x1a0 fs/inode.c:903 sock_alloc+0x41/0x270 net/socket.c:547 __sys_accept4+0x11c/0x8a0 net/socket.c:1560 __do_sys_accept4 net/socket.c:1625 [inline] __se_sys_accept4 net/socket.c:1622 [inline] __x64_sys_accept4+0x97/0xf0 net/socket.c:1622 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f465b70bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 RAX: ffffffffffffffda RBX: 00007f465b70c6d4 RCX: 0000000000457679 RDX: 0000000020000200 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 R13: 00000000004cbd88 R14: 00000000004bd78c R15: 0000000000000001 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 12897 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2be/0x730 mm/slab.c:3552 __d_alloc+0xc8/0xcc0 fs/dcache.c:1614 d_alloc_pseudo+0x1d/0x30 fs/dcache.c:1742 alloc_file_pseudo+0x158/0x3f0 fs/file_table.c:224 sock_alloc_file+0x4c/0x180 net/socket.c:394 __sys_accept4+0x28d/0x8a0 net/socket.c:1579 __do_sys_accept4 net/socket.c:1625 [inline] __se_sys_accept4 net/socket.c:1622 [inline] __x64_sys_accept4+0x97/0xf0 net/socket.c:1622 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f465b70bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 RAX: ffffffffffffffda RBX: 00007f465b70c6d4 RCX: 0000000000457679 RDX: 0000000020000200 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 R13: 00000000004cbd88 R14: 00000000004bd78c R15: 0000000000000002 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 12956 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2be/0x730 mm/slab.c:3552 kmem_cache_zalloc include/linux/slab.h:697 [inline] __alloc_file+0xa8/0x470 fs/file_table.c:100 alloc_empty_file+0x72/0x170 fs/file_table.c:150 alloc_file+0x5e/0x4d0 fs/file_table.c:192 alloc_file_pseudo+0x261/0x3f0 fs/file_table.c:231 sock_alloc_file+0x4c/0x180 net/socket.c:394 __sys_accept4+0x28d/0x8a0 net/socket.c:1579 __do_sys_accept4 net/socket.c:1625 [inline] __se_sys_accept4 net/socket.c:1622 [inline] __x64_sys_accept4+0x97/0xf0 net/socket.c:1622 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f465b70bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 RAX: ffffffffffffffda RBX: 00007f465b70c6d4 RCX: 0000000000457679 RDX: 0000000020000200 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 R13: 00000000004cbd88 R14: 00000000004bd78c R15: 0000000000000003 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13009 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc+0x2be/0x730 mm/slab.c:3552 kmem_cache_zalloc include/linux/slab.h:697 [inline] __alloc_file+0xa8/0x470 fs/file_table.c:100 alloc_empty_file+0x72/0x170 fs/file_table.c:150 alloc_file+0x5e/0x4d0 fs/file_table.c:192 alloc_file_pseudo+0x261/0x3f0 fs/file_table.c:231 sock_alloc_file+0x4c/0x180 net/socket.c:394 __sys_accept4+0x28d/0x8a0 net/socket.c:1579 __do_sys_accept4 net/socket.c:1625 [inline] __se_sys_accept4 net/socket.c:1622 [inline] __x64_sys_accept4+0x97/0xf0 net/socket.c:1622 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f465b72cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 RAX: ffffffffffffffda RBX: 00007f465b72d6d4 RCX: 0000000000457679 RDX: 0000000020000200 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004cbd88 R14: 00000000004bd78c R15: 0000000000000004 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 13050 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node+0x26e/0x730 mm/slab.c:3642 __alloc_skb+0x119/0x770 net/core/skbuff.c:193 alloc_skb_fclone include/linux/skbuff.h:1037 [inline] tcp_send_fin+0x298/0xda0 net/ipv4/tcp_output.c:3064 tcp_close+0xff1/0x1300 net/ipv4/tcp.c:2396 inet_release+0x104/0x1f0 net/ipv4/af_inet.c:428 inet6_release+0x50/0x70 net/ipv6/af_inet6.c:458 __sock_release+0xd7/0x250 net/socket.c:579 sock_close+0x19/0x20 net/socket.c:1141 __fput+0x385/0xa30 fs/file_table.c:278 ____fput+0x15/0x20 fs/file_table.c:309 task_work_run+0x1e8/0x2a0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x318/0x380 arch/x86/entry/common.c:166 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f465b70bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 RAX: ffffffffffffffea RBX: 00007f465b70c6d4 RCX: 0000000000457679 RDX: 0000000020000200 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 R13: 00000000004cbd88 R14: 00000000004bd78c R15: 0000000000000005 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13103 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1557 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x270/0x740 mm/slab.c:3661 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696 __kmalloc_reserve.isra.39+0x41/0xe0 net/core/skbuff.c:137 __alloc_skb+0x155/0x770 net/core/skbuff.c:205 alloc_skb_fclone include/linux/skbuff.h:1037 [inline] tcp_send_fin+0x298/0xda0 net/ipv4/tcp_output.c:3064 tcp_close+0xff1/0x1300 net/ipv4/tcp.c:2396 inet_release+0x104/0x1f0 net/ipv4/af_inet.c:428 inet6_release+0x50/0x70 net/ipv6/af_inet6.c:458 __sock_release+0xd7/0x250 net/socket.c:579 sock_close+0x19/0x20 net/socket.c:1141 __fput+0x385/0xa30 fs/file_table.c:278 ____fput+0x15/0x20 fs/file_table.c:309 task_work_run+0x1e8/0x2a0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x318/0x380 arch/x86/entry/common.c:166 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457679 Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f465b70bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 RAX: ffffffffffffffea RBX: 00007f465b70c6d4 RCX: 0000000000457679 RDX: 0000000020000200 RSI: 0000000020000000 RDI: 0000000000000004 RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 R13: 00000000004cbd88 R14: 00000000004bd78c R15: 0000000000000006 FAULT_INJECTION: forcing a failure. name fail_futex, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 13139 Comm: syz-executor5 Not tainted 4.19.0-rc4+ #225 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x17 lib/fault-inject.c:149 should_fail_futex kernel/futex.c:306 [inline] get_futex_key+0x16da/0x21b0 kernel/futex.c:626 futex_wake+0x1ac/0x760 kernel/futex.c:1526 do_futex+0x2e4/0x26d0 kernel/futex.c:3533 mm_release+0x46a/0x5f0 kernel/fork.c:1242