general protection fault: 0000 [#1] SMP PTI
CPU: 1 PID: 17842 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #28
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:freelist_dereference mm/slub.c:264 [inline]
RIP: 0010:get_freepointer mm/slub.c:270 [inline]
RIP: 0010:get_freepointer_safe mm/slub.c:285 [inline]
RIP: 0010:slab_alloc_node mm/slub.c:2689 [inline]
RIP: 0010:slab_alloc mm/slub.c:2728 [inline]
RIP: 0010:kmem_cache_alloc+0x4b9/0xbb0 mm/slub.c:2733
Code: 7d 98 00 0f 85 92 fe ff ff 48 8b bd 60 ff ff ff 44 8b 37 e8 a9 b3 03 00 8b 00 4d 01 e6 48 8b 4d 90 48 09 c1 0f 85 7e fe ff ff <49> 8b 1e 4c 89 f7 e8 cc b3 03 00 4c 8b 30 8b 02 89 45 b4 48 83 7d
RSP: 0018:ffff8800bab2fa00 EFLAGS: 00010246
RAX: 0000000000000000 RBX: d6000073d6000073 RCX: 0000000000000000
RDX: ffff880129015e20 RSI: aaaaaaaaaaaab000 RDI: ffffea0006f61560
nla_parse: 3 callbacks suppressed
netlink: 3760 bytes leftover after parsing attributes in process `syz-executor4'.
RBP: ffff8800bab2fab8 R08: 0000000000480020 R09: ffff88021fd39090
R10: 0000000000000000 R11: ffffffff88dd9300 R12: d6000073d6000073
R13: ffffe8ffffd43000 R14: d6000073d6000073 R15: ffff880127be0900
FS: 00007f82d5459700(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004ce440 CR3: 0000000108e44000 CR4: 00000000001406e0
DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000
netlink: 3760 bytes leftover after parsing attributes in process `syz-executor4'.
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
sk_prot_alloc+0xf6/0x4b0 net/core/sock.c:1475
sk_alloc+0xf1/0xc00 net/core/sock.c:1535
inet6_create+0x75f/0x16f0 net/ipv6/af_inet6.c:183
__sock_create+0x723/0xf70 net/socket.c:1286
sock_create net/socket.c:1326 [inline]
__sys_socketpair+0x42b/0x1af0 net/socket.c:1418
__do_sys_socketpair net/socket.c:1467 [inline]
__se_sys_socketpair net/socket.c:1464 [inline]
__x64_sys_socketpair+0x117/0x170 net/socket.c:1464
do_syscall_64+0x15b/0x230 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x63/0xe7
RIP: 0033:0x455ab9
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007f82d5458c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035
RAX: ffffffffffffffda RBX: 00007f82d54596d4 RCX: 0000000000455ab9
RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000ffffffff
R13: 00000000004c1f1a R14: 00000000004d3828 R15: 0000000000000000
Modules linked in:
Dumping ftrace buffer:
(ftrace buffer empty)
---[ end trace b7eed4bf258bdcbd ]---
RIP: 0010:freelist_dereference mm/slub.c:264 [inline]
RIP: 0010:get_freepointer mm/slub.c:270 [inline]
RIP: 0010:get_freepointer_safe mm/slub.c:285 [inline]
RIP: 0010:slab_alloc_node mm/slub.c:2689 [inline]
RIP: 0010:slab_alloc mm/slub.c:2728 [inline]
RIP: 0010:kmem_cache_alloc+0x4b9/0xbb0 mm/slub.c:2733
Code: 7d 98 00 0f 85 92 fe ff ff 48 8b bd 60 ff ff ff 44 8b 37 e8 a9 b3 03 00 8b 00 4d 01 e6 48 8b 4d 90 48 09 c1 0f 85 7e fe ff ff <49> 8b 1e 4c 89 f7 e8 cc b3 03 00 4c 8b 30 8b 02 89 45 b4 48 83 7d
RSP: 0018:ffff8800bab2fa00 EFLAGS: 00010246
RAX: 0000000000000000 RBX: d6000073d6000073 RCX: 0000000000000000
RDX: ffff880129015e20 RSI: aaaaaaaaaaaab000 RDI: ffffea0006f61560
RBP: ffff8800bab2fab8 R08: 0000000000480020 R09: ffff88021fd39090
R10: 0000000000000000 R11: ffffffff88dd9300 R12: d6000073d6000073
R13: ffffe8ffffd43000 R14: d6000073d6000073 R15: ffff880127be0900
FS: 00007f82d5459700(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004ce440 CR3: 0000000108e44000 CR4: 00000000001406e0
DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600