=============================
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
WARNING: suspicious RCU usage
4.17.0-rc1+ #16 Not tainted
-----------------------------
CPU: 0 PID: 14047 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #16
net/ipv6/route.c:1550 suspicious rcu_dereference_protected() usage!
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1b9/0x294 lib/dump_stack.c:113
other info that might help us debug this:
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
rcu_scheduler_active = 2, debug_locks = 1
3 locks held by syz-executor5/14037:
#0:
00000000c7be3319
(
__should_failslab+0x124/0x180 mm/failslab.c:32
rcu_read_lock_bh
should_failslab+0x9/0x14 mm/slab_common.c:1522
slab_pre_alloc_hook mm/slab.h:423 [inline]
slab_alloc_node mm/slab.c:3299 [inline]
kmem_cache_alloc_node_trace+0x26f/0x770 mm/slab.c:3661
__do_kmalloc_node mm/slab.c:3681 [inline]
__kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696
){....}
__kmalloc_reserve.isra.38+0x3a/0xe0 net/core/skbuff.c:137
__alloc_skb+0x14d/0x780 net/core/skbuff.c:205
, at: lwtunnel_xmit_redirect include/net/lwtunnel.h:92 [inline]
, at: ip6_finish_output2+0x253/0x2800 net/ipv6/ip6_output.c:106
#1:
alloc_skb include/linux/skbuff.h:987 [inline]
__ip_append_data.isra.47+0x2096/0x2940 net/ipv4/ip_output.c:977
00000000c7be3319
(
rcu_read_lock_bh
){....}
ip_append_data.part.48+0xf3/0x180 net/ipv4/ip_output.c:1180
, at: __dev_queue_xmit+0x30f/0x34c0 net/core/dev.c:3519
ip_append_data+0x6d/0x90 net/ipv4/ip_output.c:1169
#2:
raw_sendmsg+0x1dae/0x29b0 net/ipv4/raw.c:678
000000009ee61c36
(
rcu_read_lock
){....}
, at: ip6_link_failure+0xfe/0x790 net/ipv6/route.c:2227
inet_sendmsg+0x19f/0x690 net/ipv4/af_inet.c:798
stack backtrace:
sock_sendmsg_nosec net/socket.c:629 [inline]
sock_sendmsg+0xd5/0x120 net/socket.c:639
___sys_sendmsg+0x805/0x940 net/socket.c:2117
__sys_sendmsg+0x115/0x270 net/socket.c:2155
__do_sys_sendmsg net/socket.c:2164 [inline]
__se_sys_sendmsg net/socket.c:2162 [inline]
__x64_sys_sendmsg+0x78/0xb0 net/socket.c:2162
do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455389
RSP: 002b:00007f3a5526dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f3a5526e6d4 RCX: 0000000000455389
RDX: 0000000000000000 RSI: 00000000200008c0 RDI: 0000000000000013
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014
R13: 00000000000004d5 R14: 00000000006fa498 R15: 0000000000000002
CPU: 1 PID: 14037 Comm: syz-executor5 Not tainted 4.17.0-rc1+ #16
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1b9/0x294 lib/dump_stack.c:113
lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592
rt6_remove_exception_rt+0x416/0x4d0 net/ipv6/route.c:1549
ip6_link_failure+0x484/0x790 net/ipv6/route.c:2231
dst_link_failure include/net/dst.h:427 [inline]
ip_tunnel_xmit+0x281b/0x3abc net/ipv4/ip_tunnel.c:784
__gre_xmit+0x5e1/0x980 net/ipv4/ip_gre.c:449
gre_tap_xmit+0x2fd/0x570 net/ipv4/ip_gre.c:756
__netdev_start_xmit include/linux/netdevice.h:4087 [inline]
netdev_start_xmit include/linux/netdevice.h:4096 [inline]
xmit_one net/core/dev.c:3054 [inline]
dev_hard_start_xmit+0x264/0xc10 net/core/dev.c:3070
sch_direct_xmit+0x4de/0x11e0 net/sched/sch_generic.c:327
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
qdisc_restart net/sched/sch_generic.c:399 [inline]
__qdisc_run+0x741/0x1af0 net/sched/sch_generic.c:410
__dev_xmit_skb net/core/dev.c:3245 [inline]
__dev_queue_xmit+0x28ea/0x34c0 net/core/dev.c:3553
dev_queue_xmit+0x17/0x20 net/core/dev.c:3618
neigh_resolve_output+0x679/0xad0 net/core/neighbour.c:1358
neigh_output include/net/neighbour.h:482 [inline]
ip6_finish_output2+0xc93/0x2800 net/ipv6/ip6_output.c:120
ip6_finish_output+0x5fe/0xbc0 net/ipv6/ip6_output.c:154
NF_HOOK_COND include/linux/netfilter.h:277 [inline]
ip6_output+0x227/0x9b0 net/ipv6/ip6_output.c:171
dst_output include/net/dst.h:444 [inline]
NF_HOOK include/linux/netfilter.h:288 [inline]
rawv6_send_hdrinc net/ipv6/raw.c:678 [inline]
rawv6_sendmsg+0x2674/0x4590 net/ipv6/raw.c:924
inet_sendmsg+0x19f/0x690 net/ipv4/af_inet.c:798
sock_sendmsg_nosec net/socket.c:629 [inline]
sock_sendmsg+0xd5/0x120 net/socket.c:639
___sys_sendmsg+0x805/0x940 net/socket.c:2117
__sys_sendmsg+0x115/0x270 net/socket.c:2155
__do_sys_sendmsg net/socket.c:2164 [inline]
__se_sys_sendmsg net/socket.c:2162 [inline]
__x64_sys_sendmsg+0x78/0xb0 net/socket.c:2162
do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455389
RSP: 002b:00007f36aa7dec68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f36aa7df6d4 RCX: 0000000000455389
RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000013
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 00000000000004f3 R14: 00000000006fa768 R15: 0000000000000000
CPU: 0 PID: 14064 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #16
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1b9/0x294 lib/dump_stack.c:113
fail_dump lib/fault-inject.c:51 [inline]
should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
__should_failslab+0x124/0x180 mm/failslab.c:32
should_failslab+0x9/0x14 mm/slab_common.c:1522
slab_pre_alloc_hook mm/slab.h:423 [inline]
slab_alloc mm/slab.c:3378 [inline]
kmem_cache_alloc_trace+0x4b/0x780 mm/slab.c:3618
kmalloc include/linux/slab.h:512 [inline]
ip_setup_cork+0x54b/0x6d0 net/ipv4/ip_output.c:1122
ip_append_data.part.48+0x144/0x180 net/ipv4/ip_output.c:1173
ip_append_data+0x6d/0x90 net/ipv4/ip_output.c:1169
icmp_push_reply+0x169/0x500 net/ipv4/icmp.c:375
icmp_send+0x1587/0x1c30 net/ipv4/icmp.c:741
ipv4_link_failure+0x2c/0x220 net/ipv4/route.c:1199
dst_link_failure include/net/dst.h:427 [inline]
vti_xmit net/ipv4/ip_vti.c:229 [inline]
vti_tunnel_xmit+0xaa0/0x15a0 net/ipv4/ip_vti.c:264
__netdev_start_xmit include/linux/netdevice.h:4087 [inline]
netdev_start_xmit include/linux/netdevice.h:4096 [inline]
xmit_one net/core/dev.c:3054 [inline]
dev_hard_start_xmit+0x264/0xc10 net/core/dev.c:3070
__dev_queue_xmit+0x2724/0x34c0 net/core/dev.c:3585
dev_queue_xmit+0x17/0x20 net/core/dev.c:3618
neigh_direct_output+0x15/0x20 net/core/neighbour.c:1398
neigh_output include/net/neighbour.h:482 [inline]
ip_finish_output2+0xa5f/0x1840 net/ipv4/ip_output.c:229
ip_finish_output+0x828/0xf80 net/ipv4/ip_output.c:317
NF_HOOK_COND include/linux/netfilter.h:277 [inline]
ip_output+0x21b/0x850 net/ipv4/ip_output.c:405
dst_output include/net/dst.h:444 [inline]
ip_local_out+0xc5/0x1b0 net/ipv4/ip_output.c:124
ip_send_skb+0x40/0xe0 net/ipv4/ip_output.c:1424
ip_push_pending_frames+0x64/0x80 net/ipv4/ip_output.c:1444
raw_sendmsg+0x22fd/0x29b0 net/ipv4/raw.c:684
inet_sendmsg+0x19f/0x690 net/ipv4/af_inet.c:798
sock_sendmsg_nosec net/socket.c:629 [inline]
sock_sendmsg+0xd5/0x120 net/socket.c:639
___sys_sendmsg+0x805/0x940 net/socket.c:2117
__sys_sendmsg+0x115/0x270 net/socket.c:2155
__do_sys_sendmsg net/socket.c:2164 [inline]
__se_sys_sendmsg net/socket.c:2162 [inline]
__x64_sys_sendmsg+0x78/0xb0 net/socket.c:2162
do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455389
RSP: 002b:00007f3a5526dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f3a5526e6d4 RCX: 0000000000455389
RDX: 0000000000000000 RSI: 00000000200008c0 RDI: 0000000000000013
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014
R13: 00000000000004d5 R14: 00000000006fa498 R15: 0000000000000003
netlink: 'syz-executor4': attribute type 53 has an invalid length.
kernel msg: ebtables bug: please report to author: Wrong len argument
kernel msg: ebtables bug: please report to author: Wrong len argument
netlink: 'syz-executor4': attribute type 53 has an invalid length.
device lo entered promiscuous mode
device lo left promiscuous mode
device syz_tun entered promiscuous mode
device lo entered promiscuous mode
device lo left promiscuous mode
nla_parse: 7 callbacks suppressed
netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'.
netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'.
IPVS: ftp: loaded support on port[0] = 21
IPVS: ftp: loaded support on port[0] = 21
netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'.
netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'.