TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. ================================================================== BUG: KASAN: stack-out-of-bounds in schedule_debug kernel/sched/core.c:3285 [inline] BUG: KASAN: stack-out-of-bounds in __schedule+0x1977/0x1df0 kernel/sched/core.c:3395 Read of size 8 at addr ffff8801bac70000 by task syz-executor0/5985 CPU: 0 PID: 5985 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #77 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: The buggy address belongs to the page: page:ffffea0006eb1c00 count:1 mapcount:-512 mapping:0000000000000000 index:0x0 flags: 0x2fffc0000000000() raw: 02fffc0000000000 dead000000000100 dead000000000200 0000000000000000 raw: 0000000000000000 0000000000000000 00000001fffffdff ffff8801d0798540 page dumped because: kasan: bad access detected page->mem_cgroup:ffff8801d0798540 Memory state around the buggy address: ffff8801bac6ff00: f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801bac6ff80: 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 f2 >ffff8801bac70000: f2 f2 f2 04 f2 f2 f2 f2 f2 f2 f2 00 f2 f2 f2 00 ^ ffff8801bac70080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801bac70100: 00 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 f2 f2 f2 ================================================================== Kernel panic - not syncing: panic_on_warn set ... CPU: 0 PID: 5985 Comm: syz-executor0 Tainted: G B 4.19.0-rc1+ #77 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: Dumping ftrace buffer: (ftrace buffer empty) Kernel Offset: disabled Rebooting in 86400 seconds..