fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x25a/0x400 mm/slab.c:3659 ------------[ cut here ]------------ __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node+0x38/0x70 mm/slab.c:3689 WARNING: CPU: 0 PID: 17966 at security/apparmor/file.c:136 aa_audit_file.cold+0x18/0x4f security/apparmor/file.c:136 kmalloc_node include/linux/slab.h:530 [inline] kvmalloc_node+0x46/0xd0 mm/util.c:397 Kernel panic - not syncing: panic_on_warn set ... kvmalloc include/linux/mm.h:531 [inline] kvzalloc include/linux/mm.h:539 [inline] netif_alloc_rx_queues net/core/dev.c:7486 [inline] alloc_netdev_mqs+0x75c/0xb70 net/core/dev.c:8153 rtnl_create_link+0x1ab/0x890 net/core/rtnetlink.c:2460 rtnl_newlink+0xe86/0x1830 net/core/rtnetlink.c:2718 rtnetlink_rcv_msg+0x3be/0xb10 net/core/rtnetlink.c:4316 netlink_rcv_skb+0x125/0x390 net/netlink/af_netlink.c:2433 netlink_unicast_kernel net/netlink/af_netlink.c:1287 [inline] netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1313 netlink_sendmsg+0x62e/0xb80 net/netlink/af_netlink.c:1878 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062 __sys_sendmsg+0xa3/0x120 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x27/0x40 net/socket.c:2103 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007fb67803cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e740 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 RBP: 00007fb67803cca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 R13: 00007fffb0db461f R14: 00007fb67803d9c0 R15: 000000000119bf2c CPU: 0 PID: 17966 Comm: syz-executor.5 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 panic+0x1f9/0x42d kernel/panic.c:183 __warn.cold+0x20/0x4b kernel/panic.c:547 report_bug+0x208/0x249 lib/bug.c:186 fixup_bug arch/x86/kernel/traps.c:177 [inline] fixup_bug arch/x86/kernel/traps.c:172 [inline] do_error_trap+0x195/0x2d0 arch/x86/kernel/traps.c:295 invalid_op+0x1b/0x40 arch/x86/entry/entry_64.S:964 RIP: 0010:aa_audit_file.cold+0x18/0x4f security/apparmor/file.c:136 RSP: 0018:ffff88805c6ef7d0 EFLAGS: 00010282 RAX: 0000000000000049 RBX: 1ffff1100b8ddefd RCX: 0000000000000000 RDX: 0000000000040000 RSI: ffffffff8145db00 RDI: ffffed100b8ddef0 RBP: ffff88805c6ef9f8 R08: 0000000000000049 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffff4 R13: ffff88823f8b8d80 R14: ffff88805c6ef848 R15: 0000000000000000 aa_change_profile+0xcc9/0x2420 security/apparmor/domain.c:1277 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 apparmor_setprocattr+0x98c/0xa80 security/apparmor/lsm.c:651 security_setprocattr+0x74/0xb0 security/security.c:1272 proc_pid_attr_write+0x1bd/0x280 fs/proc/base.c:2588 __vfs_write+0xe4/0x630 fs/read_write.c:480 vfs_write+0x17f/0x4d0 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xf2/0x210 fs/read_write.c:582 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007fa5a2389c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 000000000003a980 RCX: 000000000045deb9 RDX: 0000000000000009 RSI: 0000000020000100 RDI: 0000000000000003 RBP: 00007fa5a2389ca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffc066abfdf R14: 00007fa5a238a9c0 R15: 000000000119bf2c CPU: 1 PID: 17983 Comm: syz-executor.1 Not tainted 4.14.210-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x263/0x410 mm/slab.c:3640 __alloc_skb+0x5c/0x510 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:980 [inline] nlmsg_new include/net/netlink.h:511 [inline] netlink_ack+0x216/0x9a0 net/netlink/af_netlink.c:2360 netlink_rcv_skb+0x2c5/0x390 net/netlink/af_netlink.c:2439 netlink_unicast_kernel net/netlink/af_netlink.c:1287 [inline] netlink_unicast+0x437/0x610 net/netlink/af_netlink.c:1313 netlink_sendmsg+0x62e/0xb80 net/netlink/af_netlink.c:1878 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 ___sys_sendmsg+0x6c8/0x800 net/socket.c:2062 __sys_sendmsg+0xa3/0x120 net/socket.c:2096 SYSC_sendmsg net/socket.c:2107 [inline] SyS_sendmsg+0x27/0x40 net/socket.c:2103 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45deb9 RSP: 002b:00007fb67803cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000002e740 RCX: 000000000045deb9 RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 RBP: 00007fb67803cca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 R13: 00007fffb0db461f R14: 00007fb67803d9c0 R15: 000000000119bf2c Kernel Offset: disabled Rebooting in 86400 seconds..