============================= FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 WARNING: suspicious RCU usage 4.17.0-rc1+ #16 Not tainted ----------------------------- CPU: 0 PID: 14047 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #16 net/ipv6/route.c:1550 suspicious rcu_dereference_protected() usage! Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 other info that might help us debug this: fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 rcu_scheduler_active = 2, debug_locks = 1 3 locks held by syz-executor5/14037: #0: 00000000c7be3319 ( __should_failslab+0x124/0x180 mm/failslab.c:32 rcu_read_lock_bh should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x26f/0x770 mm/slab.c:3661 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696 ){....} __kmalloc_reserve.isra.38+0x3a/0xe0 net/core/skbuff.c:137 __alloc_skb+0x14d/0x780 net/core/skbuff.c:205 , at: lwtunnel_xmit_redirect include/net/lwtunnel.h:92 [inline] , at: ip6_finish_output2+0x253/0x2800 net/ipv6/ip6_output.c:106 #1: alloc_skb include/linux/skbuff.h:987 [inline] __ip_append_data.isra.47+0x2096/0x2940 net/ipv4/ip_output.c:977 00000000c7be3319 ( rcu_read_lock_bh ){....} ip_append_data.part.48+0xf3/0x180 net/ipv4/ip_output.c:1180 , at: __dev_queue_xmit+0x30f/0x34c0 net/core/dev.c:3519 ip_append_data+0x6d/0x90 net/ipv4/ip_output.c:1169 #2: raw_sendmsg+0x1dae/0x29b0 net/ipv4/raw.c:678 000000009ee61c36 ( rcu_read_lock ){....} , at: ip6_link_failure+0xfe/0x790 net/ipv6/route.c:2227 inet_sendmsg+0x19f/0x690 net/ipv4/af_inet.c:798 stack backtrace: sock_sendmsg_nosec net/socket.c:629 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:639 ___sys_sendmsg+0x805/0x940 net/socket.c:2117 __sys_sendmsg+0x115/0x270 net/socket.c:2155 __do_sys_sendmsg net/socket.c:2164 [inline] __se_sys_sendmsg net/socket.c:2162 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2162 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455389 RSP: 002b:00007f3a5526dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f3a5526e6d4 RCX: 0000000000455389 RDX: 0000000000000000 RSI: 00000000200008c0 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 R13: 00000000000004d5 R14: 00000000006fa498 R15: 0000000000000002 CPU: 1 PID: 14037 Comm: syz-executor5 Not tainted 4.17.0-rc1+ #16 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592 rt6_remove_exception_rt+0x416/0x4d0 net/ipv6/route.c:1549 ip6_link_failure+0x484/0x790 net/ipv6/route.c:2231 dst_link_failure include/net/dst.h:427 [inline] ip_tunnel_xmit+0x281b/0x3abc net/ipv4/ip_tunnel.c:784 __gre_xmit+0x5e1/0x980 net/ipv4/ip_gre.c:449 gre_tap_xmit+0x2fd/0x570 net/ipv4/ip_gre.c:756 __netdev_start_xmit include/linux/netdevice.h:4087 [inline] netdev_start_xmit include/linux/netdevice.h:4096 [inline] xmit_one net/core/dev.c:3054 [inline] dev_hard_start_xmit+0x264/0xc10 net/core/dev.c:3070 sch_direct_xmit+0x4de/0x11e0 net/sched/sch_generic.c:327 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 qdisc_restart net/sched/sch_generic.c:399 [inline] __qdisc_run+0x741/0x1af0 net/sched/sch_generic.c:410 __dev_xmit_skb net/core/dev.c:3245 [inline] __dev_queue_xmit+0x28ea/0x34c0 net/core/dev.c:3553 dev_queue_xmit+0x17/0x20 net/core/dev.c:3618 neigh_resolve_output+0x679/0xad0 net/core/neighbour.c:1358 neigh_output include/net/neighbour.h:482 [inline] ip6_finish_output2+0xc93/0x2800 net/ipv6/ip6_output.c:120 ip6_finish_output+0x5fe/0xbc0 net/ipv6/ip6_output.c:154 NF_HOOK_COND include/linux/netfilter.h:277 [inline] ip6_output+0x227/0x9b0 net/ipv6/ip6_output.c:171 dst_output include/net/dst.h:444 [inline] NF_HOOK include/linux/netfilter.h:288 [inline] rawv6_send_hdrinc net/ipv6/raw.c:678 [inline] rawv6_sendmsg+0x2674/0x4590 net/ipv6/raw.c:924 inet_sendmsg+0x19f/0x690 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:629 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:639 ___sys_sendmsg+0x805/0x940 net/socket.c:2117 __sys_sendmsg+0x115/0x270 net/socket.c:2155 __do_sys_sendmsg net/socket.c:2164 [inline] __se_sys_sendmsg net/socket.c:2162 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2162 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455389 RSP: 002b:00007f36aa7dec68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f36aa7df6d4 RCX: 0000000000455389 RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000000004f3 R14: 00000000006fa768 R15: 0000000000000000 CPU: 0 PID: 14064 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #16 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149 __should_failslab+0x124/0x180 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1522 slab_pre_alloc_hook mm/slab.h:423 [inline] slab_alloc mm/slab.c:3378 [inline] kmem_cache_alloc_trace+0x4b/0x780 mm/slab.c:3618 kmalloc include/linux/slab.h:512 [inline] ip_setup_cork+0x54b/0x6d0 net/ipv4/ip_output.c:1122 ip_append_data.part.48+0x144/0x180 net/ipv4/ip_output.c:1173 ip_append_data+0x6d/0x90 net/ipv4/ip_output.c:1169 icmp_push_reply+0x169/0x500 net/ipv4/icmp.c:375 icmp_send+0x1587/0x1c30 net/ipv4/icmp.c:741 ipv4_link_failure+0x2c/0x220 net/ipv4/route.c:1199 dst_link_failure include/net/dst.h:427 [inline] vti_xmit net/ipv4/ip_vti.c:229 [inline] vti_tunnel_xmit+0xaa0/0x15a0 net/ipv4/ip_vti.c:264 __netdev_start_xmit include/linux/netdevice.h:4087 [inline] netdev_start_xmit include/linux/netdevice.h:4096 [inline] xmit_one net/core/dev.c:3054 [inline] dev_hard_start_xmit+0x264/0xc10 net/core/dev.c:3070 __dev_queue_xmit+0x2724/0x34c0 net/core/dev.c:3585 dev_queue_xmit+0x17/0x20 net/core/dev.c:3618 neigh_direct_output+0x15/0x20 net/core/neighbour.c:1398 neigh_output include/net/neighbour.h:482 [inline] ip_finish_output2+0xa5f/0x1840 net/ipv4/ip_output.c:229 ip_finish_output+0x828/0xf80 net/ipv4/ip_output.c:317 NF_HOOK_COND include/linux/netfilter.h:277 [inline] ip_output+0x21b/0x850 net/ipv4/ip_output.c:405 dst_output include/net/dst.h:444 [inline] ip_local_out+0xc5/0x1b0 net/ipv4/ip_output.c:124 ip_send_skb+0x40/0xe0 net/ipv4/ip_output.c:1424 ip_push_pending_frames+0x64/0x80 net/ipv4/ip_output.c:1444 raw_sendmsg+0x22fd/0x29b0 net/ipv4/raw.c:684 inet_sendmsg+0x19f/0x690 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:629 [inline] sock_sendmsg+0xd5/0x120 net/socket.c:639 ___sys_sendmsg+0x805/0x940 net/socket.c:2117 __sys_sendmsg+0x115/0x270 net/socket.c:2155 __do_sys_sendmsg net/socket.c:2164 [inline] __se_sys_sendmsg net/socket.c:2162 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2162 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455389 RSP: 002b:00007f3a5526dc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f3a5526e6d4 RCX: 0000000000455389 RDX: 0000000000000000 RSI: 00000000200008c0 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 R13: 00000000000004d5 R14: 00000000006fa498 R15: 0000000000000003 netlink: 'syz-executor4': attribute type 53 has an invalid length. kernel msg: ebtables bug: please report to author: Wrong len argument kernel msg: ebtables bug: please report to author: Wrong len argument netlink: 'syz-executor4': attribute type 53 has an invalid length. device lo entered promiscuous mode device lo left promiscuous mode device syz_tun entered promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode nla_parse: 7 callbacks suppressed netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor3'.