============================= WARNING: suspicious RCU usage 4.15.0-rc5+ #174 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1702 suspicious rcu_dereference_protected() usage! other info that might help us debug this: do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app rcu_scheduler_active = 2, debug_locks = 1 do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 3 locks held by syz-executor1/12664: #0: (rtnl_mutex){+.+.}, at: [<00000000d3d99849>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (rcu_read_lock){....}, at: [<00000000f7360f2a>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1560 #2: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<00000000b4d6628b>] spin_lock_bh include/linux/spinlock.h:315 [inline] #2: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<00000000b4d6628b>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1948 stack backtrace: CPU: 0 PID: 12664 Comm: syz-executor1 Not tainted 4.15.0-rc5+ #174 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del+0xcaa/0x11b0 net/ipv6/ip6_fib.c:1701 fib6_clean_node+0x3aa/0x4f0 net/ipv6/ip6_fib.c:1892 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1815 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1863 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1933 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1949 fib6_clean_all+0x27/0x30 net/ipv6/ip6_fib.c:1960 rt6_ifdown+0xd1/0x6a0 net/ipv6/route.c:3490 addrconf_ifdown+0x134/0x14f0 net/ipv6/addrconf.c:3589 addrconf_notify+0x5eb/0x22e0 net/ipv6/addrconf.c:3514 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1696 call_netdevice_notifiers net/core/dev.c:1714 [inline] __dev_notify_flags+0x262/0x430 net/core/dev.c:6896 dev_change_flags+0xf5/0x140 net/core/dev.c:6930 dev_ifsioc+0x60d/0x9b0 net/core/dev_ioctl.c:257 dev_ioctl+0x2d7/0xfb0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x94/0xb0 net/socket.c:963 sock_ioctl+0x2c2/0x440 net/socket.c:1053 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f25d6483c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 RDX: 0000000020b1ffe0 RSI: 0000000000008914 RDI: 0000000000000013 RBP: 0000000000000567 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6248 R13: 00000000ffffffff R14: 00007f25d64846d4 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.15.0-rc5+ #174 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1729 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by syz-executor1/12664: #0: (rtnl_mutex){+.+.}, at: [<00000000d3d99849>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (rcu_read_lock){....}, at: [<00000000f7360f2a>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1560 #2: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<00000000b4d6628b>] spin_lock_bh include/linux/spinlock.h:315 [inline] #2: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<00000000b4d6628b>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1948 stack backtrace: CPU: 0 PID: 12664 Comm: syz-executor1 Not tainted 4.15.0-rc5+ #174 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del+0x425/0x11b0 net/ipv6/ip6_fib.c:1728 fib6_clean_node+0x3aa/0x4f0 net/ipv6/ip6_fib.c:1892 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1815 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1863 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1933 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1949 fib6_clean_all+0x27/0x30 net/ipv6/ip6_fib.c:1960 rt6_ifdown+0xd1/0x6a0 net/ipv6/route.c:3490 addrconf_ifdown+0x134/0x14f0 net/ipv6/addrconf.c:3589 addrconf_notify+0x5eb/0x22e0 net/ipv6/addrconf.c:3514 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1696 call_netdevice_notifiers net/core/dev.c:1714 [inline] __dev_notify_flags+0x262/0x430 net/core/dev.c:6896 dev_change_flags+0xf5/0x140 net/core/dev.c:6930 dev_ifsioc+0x60d/0x9b0 net/core/dev_ioctl.c:257 dev_ioctl+0x2d7/0xfb0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x94/0xb0 net/socket.c:963 sock_ioctl+0x2c2/0x440 net/socket.c:1053 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f25d6483c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 RDX: 0000000020b1ffe0 RSI: 0000000000008914 RDI: 0000000000000013 RBP: 0000000000000567 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6248 R13: 00000000ffffffff R14: 00007f25d64846d4 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.15.0-rc5+ #174 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1639 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by syz-executor1/12664: #0: (rtnl_mutex){+.+.}, at: [<00000000d3d99849>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (rcu_read_lock){....}, at: [<00000000f7360f2a>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1560 #2: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<00000000b4d6628b>] spin_lock_bh include/linux/spinlock.h:315 [inline] #2: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<00000000b4d6628b>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1948 stack backtrace: CPU: 0 PID: 12664 Comm: syz-executor1 Not tainted 4.15.0-rc5+ #174 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del_route net/ipv6/ip6_fib.c:1638 [inline] fib6_del+0xd18/0x11b0 net/ipv6/ip6_fib.c:1731 fib6_clean_node+0x3aa/0x4f0 net/ipv6/ip6_fib.c:1892 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1815 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1863 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1933 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1949 fib6_clean_all+0x27/0x30 net/ipv6/ip6_fib.c:1960 rt6_ifdown+0xd1/0x6a0 net/ipv6/route.c:3490 addrconf_ifdown+0x134/0x14f0 net/ipv6/addrconf.c:3589 addrconf_notify+0x5eb/0x22e0 net/ipv6/addrconf.c:3514 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1696 call_netdevice_notifiers net/core/dev.c:1714 [inline] __dev_notify_flags+0x262/0x430 net/core/dev.c:6896 dev_change_flags+0xf5/0x140 net/core/dev.c:6930 dev_ifsioc+0x60d/0x9b0 net/core/dev_ioctl.c:257 dev_ioctl+0x2d7/0xfb0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x94/0xb0 net/socket.c:963 sock_ioctl+0x2c2/0x440 net/socket.c:1053 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f25d6483c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 RDX: 0000000020b1ffe0 RSI: 0000000000008914 RDI: 0000000000000013 RBP: 0000000000000567 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6248 R13: 00000000ffffffff R14: 00007f25d64846d4 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.15.0-rc5+ #174 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1676 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 4 locks held by syz-executor1/12664: #0: (rtnl_mutex){+.+.}, at: [<00000000d3d99849>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (rcu_read_lock){....}, at: [<00000000f7360f2a>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1560 #2: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<00000000b4d6628b>] spin_lock_bh include/linux/spinlock.h:315 [inline] #2: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<00000000b4d6628b>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1948 #3: (&net->ipv6.fib6_walker_lock){++--}, at: [<000000000a47e344>] fib6_del_route net/ipv6/ip6_fib.c:1671 [inline] #3: (&net->ipv6.fib6_walker_lock){++--}, at: [<000000000a47e344>] fib6_del+0x935/0x11b0 net/ipv6/ip6_fib.c:1731 stack backtrace: CPU: 0 PID: 12664 Comm: syz-executor1 Not tainted 4.15.0-rc5+ #174 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del_route net/ipv6/ip6_fib.c:1675 [inline] fib6_del+0xeb3/0x11b0 net/ipv6/ip6_fib.c:1731 fib6_clean_node+0x3aa/0x4f0 net/ipv6/ip6_fib.c:1892 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1815 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1863 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1933 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1949 fib6_clean_all+0x27/0x30 net/ipv6/ip6_fib.c:1960 rt6_ifdown+0xd1/0x6a0 net/ipv6/route.c:3490 addrconf_ifdown+0x134/0x14f0 net/ipv6/addrconf.c:3589 addrconf_notify+0x5eb/0x22e0 net/ipv6/addrconf.c:3514 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1696 call_netdevice_notifiers net/core/dev.c:1714 [inline] __dev_notify_flags+0x262/0x430 net/core/dev.c:6896 dev_change_flags+0xf5/0x140 net/core/dev.c:6930 dev_ifsioc+0x60d/0x9b0 net/core/dev_ioctl.c:257 dev_ioctl+0x2d7/0xfb0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x94/0xb0 net/socket.c:963 sock_ioctl+0x2c2/0x440 net/socket.c:1053 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f25d6483c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 RDX: 0000000020b1ffe0 RSI: 0000000000008914 RDI: 0000000000000013 RBP: 0000000000000567 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6248 R13: 00000000ffffffff R14: 00007f25d64846d4 R15: 0000000000000000 nla_parse: 8 callbacks suppressed netlink: 5 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor3'. device gre0 entered promiscuous mode sctp: [Deprecated]: syz-executor1 (pid 13109) Use of int in max_burst socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor1 (pid 13121) Use of int in max_burst socket option. Use struct sctp_assoc_value instead IPVS: length: 490 != 8 IPVS: length: 490 != 8 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14711 sclass=netlink_route_socket pig=13221 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14711 sclass=netlink_route_socket pig=13221 comm=syz-executor4 8021q: VLANs not supported on lo netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 8021q: VLANs not supported on lo SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5636 sclass=netlink_route_socket pig=13371 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5636 sclass=netlink_route_socket pig=13378 comm=syz-executor0 netlink: 11 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 'syz-executor0': attribute type 6 has an invalid length. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 'syz-executor0': attribute type 6 has an invalid length. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pig=13542 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pig=13542 comm=syz-executor3 openvswitch: netlink: Message has 6 unknown bytes. openvswitch: netlink: Message has 6 unknown bytes. device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): lo: link is not ready device lo left promiscuous mode device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): lo: link is not ready device lo left promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): lo: link is not ready device lo left promiscuous mode device gre0 entered promiscuous mode netlink: 'syz-executor2': attribute type 16 has an invalid length. netlink: 'syz-executor7': attribute type 1 has an invalid length. netlink: 'syz-executor7': attribute type 1 has an invalid length. netlink: 'syz-executor2': attribute type 16 has an invalid length. netlink: 'syz-executor0': attribute type 7 has an invalid length. SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19936 sclass=netlink_tcpdiag_socket pig=14343 comm=syz-executor1 netlink: 'syz-executor5': attribute type 3 has an invalid length. RDS: rds_bind could not find a transport for 224.0.0.1, load rds_tcp or rds_rdma? SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=14566 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=14578 comm=syz-executor4 syz-executor3: vmalloc: allocation failure: 17179128120 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor3 cpuset=/ mems_allowed=0 CPU: 1 PID: 14693 Comm: syz-executor3 Not tainted 4.15.0-rc5+ #174 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 warn_alloc+0x19a/0x2b0 mm/page_alloc.c:3299 __vmalloc_node_range+0x4f0/0x650 mm/vmalloc.c:1775 __vmalloc_node mm/vmalloc.c:1804 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1826 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:541 [inline] kvmalloc_array include/linux/mm.h:557 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1690 net/ipv6/netfilter/ip6_tables.c:704 do_replace net/ipv6/netfilter/ip6_tables.c:1167 [inline] do_ip6t_set_ctl+0x370/0x5f0 net/ipv6/netfilter/ip6_tables.c:1693 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115 ipv6_setsockopt+0x115/0x150 net/ipv6/ipv6_sockglue.c:928 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2874 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2978 SYSC_setsockopt net/socket.c:1821 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1800 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f4466a3cc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ac9 RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000016 RBP: 0000000000000577 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020001fde R11: 0000000000000212 R12: 00000000006f63c8 R13: 00000000ffffffff R14: 00007f4466a3d6d4 R15: 0000000000000000 warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: active_anon:31664 inactive_anon:61 isolated_anon:0 active_file:4116 inactive_file:8420 isolated_file:0 unevictable:0 dirty:143 writeback:0 unstable:0 slab_reclaimable:9461 slab_unreclaimable:92110 mapped:23465 shmem:68 pagetables:582 bounce:0 free:1439473 free_pcp:532 free_cma:0 syz-executor3: vmalloc: allocation failure: 17179128120 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor3 cpuset=/ mems_allowed=0 CPU: 0 PID: 14710 Comm: syz-executor3 Not tainted 4.15.0-rc5+ #174 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 warn_alloc+0x19a/0x2b0 mm/page_alloc.c:3299 __vmalloc_node_range+0x4f0/0x650 mm/vmalloc.c:1775 __vmalloc_node mm/vmalloc.c:1804 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1826 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:541 [inline] kvmalloc_array include/linux/mm.h:557 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1690 net/ipv6/netfilter/ip6_tables.c:704 do_replace net/ipv6/netfilter/ip6_tables.c:1167 [inline] do_ip6t_set_ctl+0x370/0x5f0 net/ipv6/netfilter/ip6_tables.c:1693 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115 ipv6_setsockopt+0x115/0x150 net/ipv6/ipv6_sockglue.c:928 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2874 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2978 SYSC_setsockopt net/socket.c:1821 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1800 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f44669fac58 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000071c010 RCX: 0000000000452ac9 RDX: 0000000000000040 RSI: 0000000000000029 RDI: 000000000000001c RBP: 00000000000004f9 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020001fde R11: 0000000000000212 R12: 00000000006f57f8 R13: 00000000ffffffff R14: 00007f44669fb6d4 R15: 0000000000000001 Node 0 active_anon:128640kB inactive_anon:244kB active_file:16464kB inactive_file:33680kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:93860kB dirty:572kB writeback:0kB shmem:272kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 4096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:160kB low:200kB high:240kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2874 6386 6386 Node 0 DMA32 free:2945688kB min:30348kB low:37932kB high:45516kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2946452kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:764kB local_pcp:720kB free_cma:0kB lowmem_reserve[]: 0 0 3511 3511 Node 0 Normal free:2796396kB min:37068kB low:46332kB high:55596kB active_anon:128612kB inactive_anon:244kB active_file:16464kB inactive_file:33696kB unevictable:0kB writepending:608kB present:4718592kB managed:3596136kB mlocked:0kB kernel_stack:4192kB pagetables:2368kB bounce:0kB free_pcp:1384kB local_pcp:660kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB Node 0 DMA32: 4*4kB (M) 3*8kB (M) 3*16kB (M) 2*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 2*1024kB (M) 2*2048kB (M) 717*4096kB (M) = 2945688kB Node 0 Normal: 137*4kB (UME) 609*8kB (UME) 1012*16kB (UME) 620*32kB (UME) 378*64kB (UM) 178*128kB (UME) 72*256kB (UME) 35*512kB (UME) 19*1024kB (UM) 15*2048kB (UME) 640*4096kB (UM) = 2796396kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 12612 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 326355 pages reserved netlink: 'syz-executor7': attribute type 1 has an invalid length. SELinux: unrecognized netlink message: protocol=6 nlmsg_type=41 sclass=netlink_xfrm_socket pig=14726 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=41 sclass=netlink_xfrm_socket pig=14742 comm=syz-executor0 nla_parse: 10 callbacks suppressed