Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.16' (ECDSA) to the list of known hosts. syzkaller login: [ 33.268594] FAULT_INJECTION: forcing a failure. [ 33.268594] name failslab, interval 1, probability 0, space 0, times 1 [ 33.279837] CPU: 0 PID: 8094 Comm: syz-executor954 Not tainted 4.19.186-syzkaller #0 [ 33.287739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.297068] Call Trace: [ 33.299652] dump_stack+0x1fc/0x2ef [ 33.303268] should_fail.cold+0xa/0xf [ 33.307140] ? setup_fault_attr+0x200/0x200 [ 33.311452] ? lock_acquire+0x170/0x3c0 [ 33.315433] __should_failslab+0x115/0x180 [ 33.319655] should_failslab+0x5/0x10 [ 33.323497] kmem_cache_alloc+0x277/0x370 [ 33.327648] __alloc_file+0x21/0x330 [ 33.331352] alloc_empty_file+0x6d/0x170 [ 33.335402] path_openat+0xe9/0x2df0 [ 33.339103] ? __lock_acquire+0x6de/0x3ff0 [ 33.343320] ? lock_acquire+0x170/0x3c0 [ 33.347277] ? path_lookupat+0x8d0/0x8d0 [ 33.351318] ? mark_held_locks+0xf0/0xf0 [ 33.355356] ? __lock_acquire+0x6de/0x3ff0 [ 33.359573] do_filp_open+0x18c/0x3f0 [ 33.363453] ? may_open_dev+0xf0/0xf0 [ 33.367234] ? __alloc_fd+0x28d/0x570 [ 33.371014] ? lock_downgrade+0x720/0x720 [ 33.375174] ? lock_acquire+0x170/0x3c0 [ 33.379147] ? __alloc_fd+0x34/0x570 [ 33.382841] ? do_raw_spin_unlock+0x171/0x230 [ 33.387350] ? _raw_spin_unlock+0x29/0x40 [ 33.391474] ? __alloc_fd+0x28d/0x570 [ 33.395256] do_sys_open+0x3b3/0x520 [ 33.398972] ? filp_open+0x70/0x70 [ 33.402491] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 33.407934] ? trace_hardirqs_off_caller+0x6e/0x210 [ 33.412930] ? do_syscall_64+0x21/0x620 [ 33.416885] do_syscall_64+0xf9/0x620 [ 33.420679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 33.425848] RIP: 0033:0x4075c7 [ 33.429020] Code: 25 00 00 41 00 3d 00 00 41 00 74 47 64 8b 04 25 18 00 00 00 85 c0 75 6b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 95 00 00 00 48 8b 4c 24 28 64 48 2b 0c 25 [ 33.447899] RSP: 002b:00007ffcca5b60b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 33.455597] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00000000004075c7 [ 33.462846] RDX: 0000000000080001 RSI: 000000000049c2a0 RDI: 00000000ffffff9c [ 33.470099] RBP: 000000000049c2a0 R08: 0000000000000000 R09: 00007ffcca5b60a0 [ 33.477458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000080001 [ 33.484719] R13: 0000000000000000 R14: 00000000004ca018 R15: 00000000004004e8 [ 34.563237] IPVS: ftp: loaded support on port[0] = 21 executing program [ 34.625376] FAULT_INJECTION: forcing a failure. [ 34.625376] name failslab, interval 1, probability 0, space 0, times 0 [ 34.636934] CPU: 0 PID: 8095 Comm: syz-executor954 Not tainted 4.19.186-syzkaller #0 [ 34.644801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.654130] Call Trace: [ 34.656699] dump_stack+0x1fc/0x2ef [ 34.660326] should_fail.cold+0xa/0xf [ 34.664109] ? setup_fault_attr+0x200/0x200 [ 34.668409] ? lock_acquire+0x170/0x3c0 [ 34.672365] __should_failslab+0x115/0x180 [ 34.676578] should_failslab+0x5/0x10 [ 34.680371] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 34.685455] __kmalloc_node_track_caller+0x38/0x70 [ 34.690391] __alloc_skb+0xae/0x560 [ 34.694001] netlink_dump+0x55f/0xc10 [ 34.697784] __netlink_dump_start+0x4e9/0x6f0 [ 34.702287] ? genl_lock_dumpit+0x90/0x90 [ 34.706414] genl_family_rcv_msg+0xa76/0xc40 [ 34.710805] ? genl_rcv+0x40/0x40 [ 34.714236] ? genl_rcv_msg+0x12f/0x160 [ 34.718201] ? genl_lock_dumpit+0x90/0x90 [ 34.722328] ? genl_lock_done+0xc0/0xc0 [ 34.726279] ? genl_unlock+0x20/0x20 [ 34.729974] ? mark_held_locks+0xf0/0xf0 [ 34.734017] ? __radix_tree_lookup+0x216/0x370 [ 34.738580] genl_rcv_msg+0xbf/0x160 [ 34.742275] netlink_rcv_skb+0x160/0x440 [ 34.746314] ? genl_family_rcv_msg+0xc40/0xc40 [ 34.750872] ? netlink_ack+0xae0/0xae0 [ 34.754743] ? genl_rcv+0x15/0x40 [ 34.758193] genl_rcv+0x24/0x40 [ 34.761452] netlink_unicast+0x4d5/0x690 [ 34.765494] ? netlink_sendskb+0x110/0x110 [ 34.769710] ? _copy_from_iter_full+0x229/0x7c0 [ 34.774379] ? __phys_addr_symbol+0x2c/0x70 [ 34.778682] ? __check_object_size+0x17b/0x3e0 [ 34.783244] netlink_sendmsg+0x6bb/0xc40 [ 34.787302] ? aa_af_perm+0x230/0x230 [ 34.791088] ? nlmsg_notify+0x1a0/0x1a0 [ 34.795048] ? kernel_recvmsg+0x220/0x220 [ 34.799180] ? nlmsg_notify+0x1a0/0x1a0 [ 34.803133] sock_sendmsg+0xc3/0x120 [ 34.806827] ___sys_sendmsg+0x7bb/0x8e0 [ 34.810780] ? check_preemption_disabled+0x41/0x280 [ 34.815776] ? copy_msghdr_from_user+0x440/0x440 [ 34.820515] ? proc_fail_nth_write+0x95/0x1d0 [ 34.824989] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 34.829923] ? debug_check_no_obj_freed+0x201/0x490 [ 34.834922] ? __vfs_write+0xff/0x770 [ 34.838698] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 34.843607] ? common_file_perm+0x4e5/0x850 [ 34.847905] ? kernel_read+0x110/0x110 [ 34.851775] ? trace_hardirqs_off+0x64/0x200 [ 34.856160] ? fsnotify+0x84e/0xe10 [ 34.859763] ? vfs_write+0x3d7/0x540 [ 34.863464] ? __fdget+0x1a0/0x230 [ 34.866986] __x64_sys_sendmsg+0x132/0x220 [ 34.871201] ? __sys_sendmsg+0x1b0/0x1b0 [ 34.875239] ? vfs_write+0x393/0x540 [ 34.878935] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 34.884294] ? trace_hardirqs_off_caller+0x6e/0x210 [ 34.889298] ? do_syscall_64+0x21/0x620 [ 34.893253] do_syscall_64+0xf9/0x620 [ 34.897038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 34.902206] RIP: 0033:0x4466c9 [ 34.905378] Code: 50 01 00 85 c0 b8 00 00 00 00 48 0f 44 c3 5b c3 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 34.924257] RSP: 002b:00007ffcca5b6628 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 34.931960] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004466c9 [ 34.939205] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000005 [ 34.946453] RBP: 0000000000000004 R08: 0000000000000001 R09: 00007ffcca5b66b0 [ 34.953701] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000021fc2b8 [ 34.960945] R13: 0000000000000000 R14: 00007ffcca5b6660 R15: 00007ffcca5b6668 [ 35.011588] kasan: CONFIG_KASAN_INLINE enabled [ 35.016281] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 35.025818] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 35.032059] CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 4.19.186-syzkaller #0 [ 35.039312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.048651] Workqueue: events netlink_sock_destruct_work [ 35.054085] RIP: 0010:klist_iter_exit+0x21/0x80 [ 35.058732] Code: 66 0f 1f 84 00 00 00 00 00 41 54 55 53 48 89 fb e8 74 b0 75 f9 48 8d 6b 08 48 b8 00 00 00 00 00 fc ff df 48 89 ea 48 c1 ea 03 <80> 3c 02 00 75 40 4c 8b 63 08 4d 85 e4 74 2e e8 4b b0 75 f9 31 f6 [ 35.077610] RSP: 0018:ffff8880b5a37c48 EFLAGS: 00010202 [ 35.082952] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 35.090201] RDX: 0000000000000001 RSI: ffffffff87ecad4c RDI: 0000000000000000 [ 35.097449] RBP: 0000000000000008 R08: 0000000000000000 R09: fffffbfff15cfae8 [ 35.104700] R10: ffffffff8ae7d747 R11: 0000000000074071 R12: 0000000000000000 [ 35.111948] R13: ffffffff896eb200 R14: ffff8880ba02a840 R15: ffff8880ba02f000 [ 35.119200] FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 35.127406] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 35.133296] CR2: 00005611cd37a268 CR3: 0000000009e6d000 CR4: 00000000001406f0 [ 35.140550] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 35.147810] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 35.155064] Call Trace: [ 35.157651] nfc_genl_dump_devices_done+0x31/0x50 [ 35.162479] genl_lock_done+0x82/0xc0 [ 35.166259] ? genl_unlock+0x20/0x20 [ 35.169986] netlink_sock_destruct+0x96/0x280 [ 35.174655] ? __netlink_create+0x270/0x270 [ 35.179069] __sk_destruct+0x4b/0x8a0 [ 35.182855] __sk_free+0x165/0x3b0 [ 35.186375] sk_free+0x3b/0x50 [ 35.189552] process_one_work+0x864/0x1570 [ 35.193872] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 35.198527] worker_thread+0x64c/0x1130 [ 35.202485] ? process_one_work+0x1570/0x1570 [ 35.206961] kthread+0x33f/0x460 [ 35.210309] ? kthread_pa