BUG: please report to dccp@vger.kernel.org => prev = 0, last = 0 at net/dccp/ccids/lib/packet_history.c:425/tfrc_rx_hist_sample_rtt() netlink: 76 bytes leftover after parsing attributes in process `syz-executor1'. CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 4.16.0-rc4+ #265 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 tfrc_rx_hist_sample_rtt+0x407/0x4d0 net/dccp/ccids/lib/packet_history.c:422 ccid3_hc_rx_packet_recv+0x696/0xeb3 net/dccp/ccids/ccid3.c:765 ccid_hc_rx_packet_recv net/dccp/ccid.h:185 [inline] dccp_deliver_input_to_ccids+0xd9/0x250 net/dccp/input.c:180 dccp_rcv_established+0x88/0xb0 net/dccp/input.c:378 dccp_v4_do_rcv+0x135/0x160 net/dccp/ipv4.c:653 sk_backlog_rcv include/net/sock.h:909 [inline] __sk_receive_skb+0x33e/0xc10 net/core/sock.c:513 dccp_v4_rcv+0xf5f/0x1c80 net/dccp/ipv4.c:874 ip_local_deliver_finish+0x2f1/0xc50 net/ipv4/ip_input.c:216 NF_HOOK include/linux/netfilter.h:288 [inline] ip_local_deliver+0x1ce/0x6e0 net/ipv4/ip_input.c:257 dst_input include/net/dst.h:450 [inline] ip_rcv_finish+0xa36/0x2040 net/ipv4/ip_input.c:397 NF_HOOK include/linux/netfilter.h:288 [inline] ip_rcv+0xb76/0x1820 net/ipv4/ip_input.c:493 __netif_receive_skb_core+0x1a41/0x3460 net/core/dev.c:4557 __netif_receive_skb+0x2c/0x1b0 net/core/dev.c:4622 process_backlog+0x203/0x740 net/core/dev.c:5302 napi_poll net/core/dev.c:5700 [inline] net_rx_action+0x792/0x1910 net/core/dev.c:5766 __do_softirq+0x2d7/0xb85 kernel/softirq.c:285 run_ksoftirqd+0x86/0x100 kernel/softirq.c:666 smpboot_thread_fn+0x450/0x7c0 kernel/smpboot.c:164 kthread+0x33c/0x400 kernel/kthread.c:238 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:406 dccp_close: ABORT with 1141 bytes unread netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 192 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 192 bytes leftover after parsing attributes in process `syz-executor1'. audit: type=1400 audit(1521076197.927:60): avc: denied { accept } for pid=9960 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 syz-executor6: vmalloc: allocation failure: 17045651456 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor6 cpuset=/ mems_allowed=0 CPU: 1 PID: 9986 Comm: syz-executor6 Not tainted 4.16.0-rc4+ #265 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 warn_alloc+0x19a/0x2b0 mm/page_alloc.c:3310 __vmalloc_node_range+0x4f0/0x650 mm/vmalloc.c:1775 __vmalloc_node mm/vmalloc.c:1804 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1826 kvmalloc_node+0x82/0xd0 mm/util.c:428 kvmalloc include/linux/mm.h:541 [inline] kvmalloc_array include/linux/mm.h:557 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:778 translate_table+0x235/0x1690 net/ipv6/netfilter/ip6_tables.c:703 do_replace net/ipv6/netfilter/ip6_tables.c:1164 [inline] do_ip6t_set_ctl+0x370/0x5f0 net/ipv6/netfilter/ip6_tables.c:1690 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115 ipv6_setsockopt+0x10b/0x130 net/ipv6/ipv6_sockglue.c:927 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2878 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2980 SYSC_setsockopt net/socket.c:1850 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1829 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x453e69 RSP: 002b:00007f1543178c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f15431796d4 RCX: 0000000000453e69 RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000014 RBP: 000000000072bea0 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020001fde R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000520 R14: 00000000006f7ba0 R15: 0000000000000000 Mem-Info: active_anon:55188 inactive_anon:63 isolated_anon:0 active_file:3471 inactive_file:8660 isolated_file:0 unevictable:0 dirty:73 writeback:0 unstable:0 slab_reclaimable:10019 slab_unreclaimable:82885 mapped:24443 shmem:70 pagetables:732 bounce:0 free:1440008 free_pcp:407 free_cma:0 Node 0 active_anon:229104kB inactive_anon:252kB active_file:13884kB inactive_file:34640kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:97772kB dirty:292kB writeback:0kB shmem:280kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 118784kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB syz-executor6: vmalloc: allocation failure: 17045651456 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) lowmem_reserve[]: 0 2864 6373 6373 Node 0 DMA32 free:2934564kB min:30292kB low:37864kB high:45436kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2935312kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:748kB local_pcp:700kB free_cma:0kB lowmem_reserve[]: 0 0 3509 syz-executor6 cpuset= 3509 Node 0 Normal free:2813956kB min:37120kB low:46400kB high:55680kB active_anon:216460kB inactive_anon:252kB active_file:13884kB inactive_file:34640kB unevictable:0kB writepending:292kB present:4718592kB managed:3593744kB mlocked:0kB kernel_stack:4960kB pagetables:2780kB bounce:0kB free_pcp:1004kB local_pcp:356kB free_cma:0kB lowmem_reserve[]: / 0 mems_allowed=0 0 0 0 CPU: 0 PID: 10004 Comm: syz-executor6 Not tainted 4.16.0-rc4+ #265 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 Node 0 warn_alloc+0x19a/0x2b0 mm/page_alloc.c:3310 DMA: 1*4kB (U) __vmalloc_node_range+0x4f0/0x650 mm/vmalloc.c:1775 0*8kB __vmalloc_node mm/vmalloc.c:1804 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1826 0*16kB kvmalloc_node+0x82/0xd0 mm/util.c:428 1*32kB kvmalloc include/linux/mm.h:541 [inline] kvmalloc_array include/linux/mm.h:557 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:778 translate_table+0x235/0x1690 net/ipv6/netfilter/ip6_tables.c:703 (U) 2*64kB (U) 1*128kB do_replace net/ipv6/netfilter/ip6_tables.c:1164 [inline] do_ip6t_set_ctl+0x370/0x5f0 net/ipv6/netfilter/ip6_tables.c:1690 (U) 1*256kB (U) nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:115 ipv6_setsockopt+0x10b/0x130 net/ipv6/ipv6_sockglue.c:927 0*512kB tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2878 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2980 1*1024kB SYSC_setsockopt net/socket.c:1850 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1829 (U) 1*2048kB (M) do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 3*4096kB (M) = 15908kB Node 0 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x453e69 DMA32: RSP: 002b:00007f1543136c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f15431376d4 RCX: 0000000000453e69 RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000014 3*4kB RBP: 000000000072c010 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020001fde R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000520 R14: 00000000006f7ba0 R15: 0000000000000002 kernel msg: ebtables bug: please report to author: Wrong len argument (M) 1*8kB (M) 1*16kB (M) 2*32kB (M) 1*64kB (M) 1*128kB (M) 2*256kB (M) 2*512kB (M) 2*1024kB (M) 1*2048kB (M) 715*4096kB (M) = 2934564kB Node 0 Normal: 407*4kB (UME) 252*8kB kernel msg: ebtables bug: please report to author: Wrong len argument (UME) 167*16kB (UM) 291*32kB (UME) 312*64kB (UME) 112*128kB (UME) 29*256kB (UM) 23*512kB (UME) 69*1024kB (UM) 6*2048kB (U) 649*4096kB (UM) = 2810380kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 12201 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965969 pages RAM 0 pages HighMem/MovableOnly 329728 pages reserved sctp: [Deprecated]: syz-executor4 (pid 10086) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor4 (pid 10106) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead netlink: 28 bytes leftover after parsing attributes in process `syz-executor3'. rdma_op 00000000578ba8d0 conn xmit_rdma (null) netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 'syz-executor1': attribute type 16 has an invalid length. device lo left promiscuous mode netlink: 'syz-executor1': attribute type 16 has an invalid length. netlink: 'syz-executor6': attribute type 1 has an invalid length. netlink: 'syz-executor6': attribute type 1 has an invalid length. netlink: 120 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 120 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 'syz-executor0': attribute type 1 has an invalid length. kernel msg: ebtables bug: please report to author: counter_offset != totalcnt kernel msg: ebtables bug: please report to author: counter_offset != totalcnt audit: type=1400 audit(1521076201.066:61): avc: denied { create } for pid=10767 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 sctp: [Deprecated]: syz-executor0 (pid 10773) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor0 (pid 10794) Use of int in maxseg socket option. Use struct sctp_assoc_value instead SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10999 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11018 comm=syz-executor7 IPVS: length: 24 != 8 audit: type=1400 audit(1521076202.486:62): avc: denied { getopt } for pid=11179 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 kernel msg: ebtables bug: please report to author: Wrong len argument netlink: 'syz-executor7': attribute type 1 has an invalid length. nla_parse: 8 callbacks suppressed netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 'syz-executor7': attribute type 1 has an invalid length. netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. audit: type=1400 audit(1521076202.923:63): avc: denied { map } for pid=11329 comm="syz-executor4" path="socket:[28278]" dev="sockfs" ino=28278 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 device bridge0 entered promiscuous mode device bridge0 left promiscuous mode netlink: 15 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 15 bytes leftover after parsing attributes in process `syz-executor7'. device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode netlink: 'syz-executor4': attribute type 3 has an invalid length. netlink: 'syz-executor4': attribute type 3 has an invalid length. kernel msg: ebtables bug: please report to author: Wrong len argument kernel msg: ebtables bug: please report to author: Wrong len argument kernel msg: ebtables bug: please report to author: Wrong len argument kernel msg: ebtables bug: please report to author: Wrong len argument SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63179 sclass=netlink_route_socket pig=11841 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63179 sclass=netlink_route_socket pig=11853 comm=syz-executor4 audit: type=1400 audit(1521076204.721:64): avc: denied { ioctl } for pid=11858 comm="syz-executor5" path="socket:[29924]" dev="sockfs" ino=29924 ioctlcmd=0x89e2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=sock_file permissive=1 kernel msg: ebtables bug: please report to author: entries_size too small netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. sctp: [Deprecated]: syz-executor7 (pid 11953) Use of int in max_burst socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 11953) Use of int in max_burst socket option. Use struct sctp_assoc_value instead netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. sctp: [Deprecated]: syz-executor4 (pid 12155) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor4 (pid 12155) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead netlink: 'syz-executor3': attribute type 16 has an invalid length. netlink: 'syz-executor3': attribute type 16 has an invalid length. netlink: 'syz-executor7': attribute type 25 has an invalid length. sctp: [Deprecated]: syz-executor7 (pid 12600) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 12605) Use of int in maxseg socket option. Use struct sctp_assoc_value instead