binder: 11790:11795 ERROR: BC_REGISTER_LOOPER called after BC_ENTER_LOOPER BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:425/tfrc_rx_hist_sample_rtt() CPU: 0 PID: 11802 Comm: syz-executor2 Not tainted 4.15.0-rc9+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 tfrc_rx_hist_sample_rtt+0x407/0x4d0 net/dccp/ccids/lib/packet_history.c:422 ccid3_hc_rx_packet_recv+0x696/0xeb3 net/dccp/ccids/ccid3.c:765 ccid_hc_rx_packet_recv net/dccp/ccid.h:185 [inline] dccp_deliver_input_to_ccids+0xd9/0x250 net/dccp/input.c:180 dccp_rcv_established+0x88/0xb0 net/dccp/input.c:378 dccp_v4_do_rcv+0x135/0x160 net/dccp/ipv4.c:653 sk_backlog_rcv include/net/sock.h:907 [inline] __sk_receive_skb+0x33e/0xc20 net/core/sock.c:511 dccp_v4_rcv+0xf65/0x1c90 net/dccp/ipv4.c:874 ip_local_deliver_finish+0x2f1/0xc50 net/ipv4/ip_input.c:216 NF_HOOK include/linux/netfilter.h:250 [inline] ip_local_deliver+0x1ce/0x6e0 net/ipv4/ip_input.c:257 dst_input include/net/dst.h:466 [inline] ip_rcv_finish+0x959/0x1e30 net/ipv4/ip_input.c:397 NF_HOOK include/linux/netfilter.h:250 [inline] ip_rcv+0xc5a/0x1840 net/ipv4/ip_input.c:493 __netif_receive_skb_core+0x1a41/0x3460 net/core/dev.c:4484 __netif_receive_skb+0x2c/0x1b0 net/core/dev.c:4549 process_backlog+0x203/0x740 net/core/dev.c:5228 napi_poll net/core/dev.c:5626 [inline] net_rx_action+0x792/0x1910 net/core/dev.c:5692 __do_softirq+0x2d7/0xb85 kernel/softirq.c:285 do_softirq_own_stack+0x2a/0x40 arch/x86/entry/entry_64.S:1150 do_softirq.part.19+0x14d/0x190 kernel/softirq.c:329 do_softirq kernel/softirq.c:177 [inline] __local_bh_enable_ip+0x1ee/0x230 kernel/softirq.c:182 local_bh_enable include/linux/bottom_half.h:32 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:727 [inline] ip_finish_output2+0x96e/0x1560 net/ipv4/ip_output.c:231 ip_finish_output+0x864/0xd10 net/ipv4/ip_output.c:317 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip_output+0x1d2/0x860 net/ipv4/ip_output.c:405 dst_output include/net/dst.h:460 [inline] ip_local_out+0x95/0x160 net/ipv4/ip_output.c:124 ip_queue_xmit+0x8c6/0x18e0 net/ipv4/ip_output.c:504 dccp_transmit_skb+0x9ac/0x10f0 net/dccp/output.c:142 dccp_xmit_packet+0x215/0x740 net/dccp/output.c:281 dccp_write_xmit+0x17d/0x1d0 net/dccp/output.c:363 dccp_sendmsg+0x6d0/0xa80 net/dccp/proto.c:808 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:638 [inline] sock_sendmsg+0xca/0x110 net/socket.c:648 ___sys_sendmsg+0x767/0x8b0 net/socket.c:2028 __sys_sendmsg+0xe5/0x210 net/socket.c:2062 C_SYSC_sendmsg net/compat.c:739 [inline] compat_SyS_sendmsg+0x2a/0x40 net/compat.c:737 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7f28c79 RSP: 002b:00000000f770308c EFLAGS: 00000296 ORIG_RAX: 0000000000000172 RAX: ffffffffffffffda RBX: 0000000000000015 RCX: 0000000020d4d000 RDX: 0000000020000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 net_ratelimit: 39 callbacks suppressed IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 netlink: 'syz-executor5': attribute type 3 has an invalid length. netlink: 'syz-executor5': attribute type 3 has an invalid length. device eql entered promiscuous mode IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 binder: 12123:12125 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 12123:12125 got reply transaction with no transaction stack binder: 12123:12125 transaction failed 29201/-71, size 32-40 line 2703 IPv4: Oversized IP packet from 127.0.0.1 irq bypass consumer (token 000000009d9945b4) registration fails: -16 binder: 12123:12128 BC_ACQUIRE_DONE u0000000000000000 no match binder: 12123:12125 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 12123:12125 got reply transaction with no transaction stack binder: 12123:12125 transaction failed 29201/-71, size 32-40 line 2703 binder: 12123:12128 BC_ACQUIRE_DONE u0000000000000000 no match IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 binder: 12327:12330 unknown command 0 binder: 12327:12330 ioctl c0306201 20008fd0 returned -22 binder: 12330 RLIMIT_NICE not set binder: 12327:12330 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 12334 RLIMIT_NICE not set binder: 12327:12330 unknown command 0 binder: 12327:12330 ioctl c0306201 20008fd0 returned -22 audit: type=1400 audit(1517046459.822:83): avc: denied { bind } for pid=12403 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 audit: type=1400 audit(1517046459.823:84): avc: denied { connect } for pid=12403 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 audit: type=1400 audit(1517046459.823:85): avc: denied { getattr } for pid=12403 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 QAT: failed to copy from user. device eql entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl audit: type=1400 audit(1517046461.432:86): avc: denied { create } for pid=12713 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 audit: type=1400 audit(1517046461.690:87): avc: denied { bind } for pid=12791 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 net_ratelimit: 45 callbacks suppressed IPv4: Oversized IP packet from 127.0.0.1 could not allocate digest TFM handle cbcmac(khazad-generic) could not allocate digest TFM handle cbcmac(khazad-generic) IPv4: Oversized IP packet from 127.0.0.1 IPv4: Oversized IP packet from 127.0.0.1 dst_release: dst:000000003c227449 refcnt:-1 IPv4: Oversized IP packet from 127.0.0.1 dst_release: dst:000000008a366cd3 refcnt:-1 dst_release: dst:000000000f246a5e refcnt:-1 IPv4: Oversized IP packet from 127.0.0.1 QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl IPv4: Oversized IP packet from 127.0.0.1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 12969 Comm: syz-executor7 Not tainted 4.15.0-rc9+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 dst_alloc+0x11f/0x1a0 net/core/dst.c:107 rt_dst_alloc+0xe9/0x540 net/ipv4/route.c:1500 __mkroute_output net/ipv4/route.c:2242 [inline] ip_route_output_key_hash_rcu+0xa40/0x2c40 net/ipv4/route.c:2470 ip_route_output_key_hash+0x20b/0x370 net/ipv4/route.c:2299 __ip_route_output_key include/net/route.h:125 [inline] ip_route_output_flow+0x26/0xa0 net/ipv4/route.c:2553 udp_sendmsg+0x19d3/0x2cf0 net/ipv4/udp.c:1019 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:638 [inline] sock_sendmsg+0xca/0x110 net/socket.c:648 SYSC_sendto+0x361/0x5c0 net/socket.c:1729 SyS_sendto+0x40/0x50 net/socket.c:1697 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7fd7c79 RSP: 002b:00000000f77d308c EFLAGS: 00000296 ORIG_RAX: 0000000000000171 RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 0000000020865000 RDX: 000000000000ffe4 RSI: 0000000000000000 RDI: 0000000020fd9ff0 RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 IPv4: Oversized IP packet from 127.0.0.1 audit: type=1401 audit(1517046463.129:88): op=fscreate invalid_context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forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13008 Comm: syz-executor7 Not tainted 4.15.0-rc9+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3289 [inline] kmem_cache_alloc_node+0x56/0x760 mm/slab.c:3632 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:983 [inline] alloc_skb_with_frags+0x10d/0x750 net/core/skbuff.c:5147 sock_alloc_send_pskb+0x787/0x9b0 net/core/sock.c:2078 sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2095 __ip_append_data.isra.45+0x13ea/0x2570 net/ipv4/ip_output.c:969 ip_make_skb+0x2a0/0x330 net/ipv4/ip_output.c:1481 udp_sendmsg+0xb5d/0x2cf0 net/ipv4/udp.c:1046 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:638 [inline] sock_sendmsg+0xca/0x110 net/socket.c:648 SYSC_sendto+0x361/0x5c0 net/socket.c:1729 SyS_sendto+0x40/0x50 net/socket.c:1697 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7fd7c79 RSP: 002b:00000000f77d308c EFLAGS: 00000296 ORIG_RAX: 0000000000000171 RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000020865000 RDX: 000000000000ffe4 RSI: 0000000000000000 RDI: 0000000020fd9ff0 RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 device syz1 entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 13039 Comm: syz-executor7 Not tainted 4.15.0-rc9+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3289 [inline] kmem_cache_alloc_node_trace+0x5a/0x750 mm/slab.c:3651 __do_kmalloc_node mm/slab.c:3671 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3686 __kmalloc_reserve.isra.39+0x41/0xd0 net/core/skbuff.c:137 __alloc_skb+0x13b/0x780 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:983 [inline] alloc_skb_with_frags+0x10d/0x750 net/core/skbuff.c:5147 sock_alloc_send_pskb+0x787/0x9b0 net/core/sock.c:2078 sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2095 __ip_append_data.isra.45+0x13ea/0x2570 net/ipv4/ip_output.c:969 ip_make_skb+0x2a0/0x330 net/ipv4/ip_output.c:1481 udp_sendmsg+0xb5d/0x2cf0 net/ipv4/udp.c:1046 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:638 [inline] sock_sendmsg+0xca/0x110 net/socket.c:648 SYSC_sendto+0x361/0x5c0 net/socket.c:1729 SyS_sendto+0x40/0x50 net/socket.c:1697 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7fd7c79 RSP: 002b:00000000f77d308c EFLAGS: 00000296 ORIG_RAX: 0000000000000171 RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000020865000 RDX: 000000000000ffe4 RSI: 0000000000000000 RDI: 0000000020fd9ff0 RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13081 Comm: syz-executor7 Not tainted 4.15.0-rc9+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3289 [inline] kmem_cache_alloc_node+0x56/0x760 mm/slab.c:3632 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:983 [inline] ip_do_fragment+0x874/0x26c0 net/ipv4/ip_output.c:739 ip_fragment.constprop.47+0x145/0x200 net/ipv4/ip_output.c:546 ip_finish_output+0x698/0xd10 net/ipv4/ip_output.c:315 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip_output+0x1d2/0x860 net/ipv4/ip_output.c:405 dst_output include/net/dst.h:460 [inline] ip_local_out+0x95/0x160 net/ipv4/ip_output.c:124 ip_send_skb+0x3c/0xc0 net/ipv4/ip_output.c:1414 udp_send_skb+0x351/0xc30 net/ipv4/udp.c:829 udp_sendmsg+0xbae/0x2cf0 net/ipv4/udp.c:1051 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:638 [inline] sock_sendmsg+0xca/0x110 net/socket.c:648 SYSC_sendto+0x361/0x5c0 net/socket.c:1729 SyS_sendto+0x40/0x50 net/socket.c:1697 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7fd7c79 RSP: 002b:00000000f77d308c EFLAGS: 00000296 ORIG_RAX: 0000000000000171 RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000020865000 RDX: 000000000000ffe4 RSI: 0000000000000000 RDI: 0000000020fd9ff0 RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 13106 Comm: syz-executor7 Not tainted 4.15.0-rc9+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3289 [inline] kmem_cache_alloc_node_trace+0x5a/0x750 mm/slab.c:3651 __do_kmalloc_node mm/slab.c:3671 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3686 __kmalloc_reserve.isra.39+0x41/0xd0 net/core/skbuff.c:137 __alloc_skb+0x13b/0x780 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:983 [inline] ip_do_fragment+0x874/0x26c0 net/ipv4/ip_output.c:739 ip_fragment.constprop.47+0x145/0x200 net/ipv4/ip_output.c:546 ip_finish_output+0x698/0xd10 net/ipv4/ip_output.c:315 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip_output+0x1d2/0x860 net/ipv4/ip_output.c:405 dst_output include/net/dst.h:460 [inline] ip_local_out+0x95/0x160 net/ipv4/ip_output.c:124 ip_send_skb+0x3c/0xc0 net/ipv4/ip_output.c:1414 udp_send_skb+0x351/0xc30 net/ipv4/udp.c:829 udp_sendmsg+0xbae/0x2cf0 net/ipv4/udp.c:1051 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:638 [inline] sock_sendmsg+0xca/0x110 net/socket.c:648 SYSC_sendto+0x361/0x5c0 net/socket.c:1729 SyS_sendto+0x40/0x50 net/socket.c:1697 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7fd7c79 RSP: 002b:00000000f77d308c EFLAGS: 00000296 ORIG_RAX: 0000000000000171 RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000020865000 RDX: 000000000000ffe4 RSI: 0000000000000000 RDI: 0000000020fd9ff0 RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 QAT: Invalid ioctl QAT: Invalid ioctl tmpfs: No value for mount option '' CPU: 0 PID: 13121 Comm: syz-executor7 Not tainted 4.15.0-rc9+ #192 QAT: Invalid ioctl Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: tmpfs: No value for mount option '' __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3368 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3542 skb_clone+0x1ae/0x480 net/core/skbuff.c:1279 dev_queue_xmit_nit+0x40e/0xc40 net/core/dev.c:1943 xmit_one net/core/dev.c:2999 [inline] dev_hard_start_xmit+0x16b/0xac0 net/core/dev.c:3019 __dev_queue_xmit+0x2482/0x2cf0 net/core/dev.c:3511 dev_queue_xmit+0x17/0x20 net/core/dev.c:3544 neigh_hh_output include/net/neighbour.h:472 [inline] neigh_output include/net/neighbour.h:480 [inline] ip_finish_output2+0xf59/0x1560 net/ipv4/ip_output.c:229 ip_do_fragment+0xc69/0x26c0 net/ipv4/ip_output.c:810 ip_fragment.constprop.47+0x145/0x200 net/ipv4/ip_output.c:546 ip_finish_output+0x698/0xd10 net/ipv4/ip_output.c:315 NF_HOOK_COND include/linux/netfilter.h:239 [inline] ip_output+0x1d2/0x860 net/ipv4/ip_output.c:405 dst_output include/net/dst.h:460 [inline] ip_local_out+0x95/0x160 net/ipv4/ip_output.c:124 ip_send_skb+0x3c/0xc0 net/ipv4/ip_output.c:1414 udp_send_skb+0x351/0xc30 net/ipv4/udp.c:829 udp_sendmsg+0xbae/0x2cf0 net/ipv4/udp.c:1051 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:638 [inline] sock_sendmsg+0xca/0x110 net/socket.c:648 SYSC_sendto+0x361/0x5c0 net/socket.c:1729 SyS_sendto+0x40/0x50 net/socket.c:1697 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x54/0x63 arch/x86/entry/entry_64_compat.S:129 RIP: 0023:0xf7fd7c79 RSP: 002b:00000000f77d308c EFLAGS: 00000296 ORIG_RAX: 0000000000000171 RAX: ffffffffffffffda RBX: 0000000000000014 RCX: 0000000020865000 RDX: 000000000000ffe4 RSI: 0000000000000000 RDI: 0000000020fd9ff0 RBP: 0000000000000010 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000