======================================================
WARNING: possible circular locking dependency detected
4.17.0+ #84 Not tainted
------------------------------------------------------
syz-executor2/4696 is trying to acquire lock:
00000000541736e8 (rlock-AF_UNIX){+.+.}, at: skb_queue_tail+0x26/0x150 net/core/skbuff.c:2915

but task is already holding lock:
00000000d9e3f6ff (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock+0x80/0xb0 net/unix/af_unix.c:1077

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #1 (&(&u->lock)->rlock/1){+.+.}:
       _raw_spin_lock_nested+0x28/0x40 kernel/locking/spinlock.c:354
       sk_diag_dump_icons net/unix/diag.c:82 [inline]
       sk_diag_fill.isra.5+0xa43/0x10d0 net/unix/diag.c:144
       sk_diag_dump net/unix/diag.c:178 [inline]
       unix_diag_dump+0x35f/0x550 net/unix/diag.c:206
       netlink_dump+0x507/0xd20 net/netlink/af_netlink.c:2226
       __netlink_dump_start+0x51a/0x780 net/netlink/af_netlink.c:2323
       netlink_dump_start include/linux/netlink.h:214 [inline]
       unix_diag_handler_dump+0x3f4/0x7b0 net/unix/diag.c:307
       __sock_diag_cmd net/core/sock_diag.c:230 [inline]
       sock_diag_rcv_msg+0x2e0/0x3d0 net/core/sock_diag.c:261
       netlink_rcv_skb+0x172/0x440 net/netlink/af_netlink.c:2448
       sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:272
       netlink_unicast_kernel net/netlink/af_netlink.c:1310 [inline]
       netlink_unicast+0x58b/0x740 net/netlink/af_netlink.c:1336
       netlink_sendmsg+0x9f0/0xfa0 net/netlink/af_netlink.c:1901
       sock_sendmsg_nosec net/socket.c:645 [inline]
       sock_sendmsg+0xd5/0x120 net/socket.c:655
       sock_write_iter+0x35a/0x5a0 net/socket.c:924
       call_write_iter include/linux/fs.h:1793 [inline]
       do_iter_readv_writev+0x87d/0xa70 fs/read_write.c:680
       do_iter_write+0x185/0x5f0 fs/read_write.c:959
       vfs_writev+0x1c7/0x330 fs/read_write.c:1004
       do_writev+0x112/0x2f0 fs/read_write.c:1039
       __do_sys_writev fs/read_write.c:1112 [inline]
       __se_sys_writev fs/read_write.c:1109 [inline]
       __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109
       do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
       entry_SYSCALL_64_after_hwframe+0x49/0xbe

-> #0 (rlock-AF_UNIX){+.+.}:
       lock_acquire+0x1dc/0x520 kernel/locking/lockdep.c:3924
       __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
       _raw_spin_lock_irqsave+0x96/0xc0 kernel/locking/spinlock.c:152
       skb_queue_tail+0x26/0x150 net/core/skbuff.c:2915
       unix_dgram_sendmsg+0xf77/0x1730 net/unix/af_unix.c:1796
       sock_sendmsg_nosec net/socket.c:645 [inline]
       sock_sendmsg+0xd5/0x120 net/socket.c:655
       ___sys_sendmsg+0x525/0x940 net/socket.c:2161
       __sys_sendmmsg+0x240/0x6f0 net/socket.c:2256
       __do_sys_sendmmsg net/socket.c:2285 [inline]
       __se_sys_sendmmsg net/socket.c:2282 [inline]
       __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2282
       do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
       entry_SYSCALL_64_after_hwframe+0x49/0xbe

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&(&u->lock)->rlock/1);
                               lock(rlock-AF_UNIX);
                               lock(&(&u->lock)->rlock/1);
  lock(rlock-AF_UNIX);

 *** DEADLOCK ***

1 lock held by syz-executor2/4696:
 #0: 00000000d9e3f6ff (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock+0x80/0xb0 net/unix/af_unix.c:1077

stack backtrace:
CPU: 1 PID: 4696 Comm: syz-executor2 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 print_circular_bug.isra.36.cold.56+0x1bd/0x27d kernel/locking/lockdep.c:1227
 check_prev_add kernel/locking/lockdep.c:1867 [inline]
 check_prevs_add kernel/locking/lockdep.c:1980 [inline]
 validate_chain kernel/locking/lockdep.c:2421 [inline]
 __lock_acquire+0x343e/0x5140 kernel/locking/lockdep.c:3435
 lock_acquire+0x1dc/0x520 kernel/locking/lockdep.c:3924
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0x96/0xc0 kernel/locking/spinlock.c:152
 skb_queue_tail+0x26/0x150 net/core/skbuff.c:2915
 unix_dgram_sendmsg+0xf77/0x1730 net/unix/af_unix.c:1796
 sock_sendmsg_nosec net/socket.c:645 [inline]
 sock_sendmsg+0xd5/0x120 net/socket.c:655
 ___sys_sendmsg+0x525/0x940 net/socket.c:2161
 __sys_sendmmsg+0x240/0x6f0 net/socket.c:2256
 __do_sys_sendmmsg net/socket.c:2285 [inline]
 __se_sys_sendmmsg net/socket.c:2282 [inline]
 __x64_sys_sendmmsg+0x9d/0x100 net/socket.c:2282
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007f59518bcc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 00007f59518bd6d4 RCX: 0000000000455b29
RDX: fffffffffffffdc3 RSI: 00000000200bd000 RDI: 0000000000000018
RBP: 000000000072bf50 R08: 0000000000000000 R09: 0000000000000000
R10: 5a6d8d97750cae5e R11: 0000000000000246 R12: 00000000ffffffff
R13: 00000000004c0b11 R14: 00000000004d04f8 R15: 0000000000000001
kernel msg: ebtables bug: please report to author: Wrong len argument
kernel msg: ebtables bug: please report to author: Wrong len argument
kernel msg: ebtables bug: please report to author: Wrong len argument
kernel msg: ebtables bug: please report to author: Wrong len argument
kernel msg: ebtables bug: please report to author: Wrong len argument
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 1
CPU: 1 PID: 4870 Comm: syz-executor2 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 kmem_cache_alloc+0x2af/0x760 mm/slab.c:3552
 anon_vma_chain_alloc mm/rmap.c:128 [inline]
 __anon_vma_prepare+0xbc/0x700 mm/rmap.c:182
 anon_vma_prepare include/linux/rmap.h:153 [inline]
 do_huge_pmd_anonymous_page+0x1423/0x1d20 mm/huge_memory.c:675
 create_huge_pmd mm/memory.c:3863 [inline]
 __handle_mm_fault+0x2d61/0x4390 mm/memory.c:4067
 handle_mm_fault+0x53a/0xc70 mm/memory.c:4133
 __do_page_fault+0x60b/0xe40 arch/x86/mm/fault.c:1403
 do_page_fault+0xee/0x8a7 arch/x86/mm/fault.c:1478
 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1160
RIP: 0010:__put_user_4+0x1c/0x30 arch/x86/lib/putuser.S:68
Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 98 13 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 
RSP: 0018:ffff8801b1e37cf8 EFLAGS: 00010297
RAX: 0000000000000014 RBX: 00007fffffffeffd RCX: 0000000020000000
RDX: 0000000000000045 RSI: ffffffff81a83b23 RDI: 0000000000000286
RBP: ffff8801b1e37df0 R08: 1ffff100363c6f7c R09: 0000000000000000
R10: ffffed0038237420 R11: ffff8801ba1c42c0 R12: 0000000000000014
R13: 0000000020000000 R14: 0000000000000000 R15: dffffc0000000000
 __do_sys_socketpair net/socket.c:1503 [inline]
 __se_sys_socketpair net/socket.c:1500 [inline]
 __x64_sys_socketpair+0x97/0xf0 net/socket.c:1500
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007f59518ddc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035
RAX: ffffffffffffffda RBX: 00007f59518de6d4 RCX: 0000000000455b29
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000001e
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000013
R13: 00000000004c1c07 R14: 00000000004d28b0 R15: 0000000000000000
kernel msg: ebtables bug: please report to author: Wrong len argument
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 4905 Comm: syz-executor4 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
kernel msg: ebtables bug: please report to author: Wrong len argument
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 kmem_cache_alloc+0x2af/0x760 mm/slab.c:3552
 sock_alloc_inode+0x6f/0x300 net/socket.c:247
 alloc_inode+0x63/0x190 fs/inode.c:210
 new_inode_pseudo+0x69/0x1a0 fs/inode.c:895
 sock_alloc+0x41/0x270 net/socket.c:571
 __sock_create+0x161/0x920 net/socket.c:1286
 sock_create net/socket.c:1362 [inline]
 __sys_socket+0x100/0x250 net/socket.c:1392
 __do_sys_socket net/socket.c:1401 [inline]
 __se_sys_socket net/socket.c:1399 [inline]
 __x64_sys_socket+0x73/0xb0 net/socket.c:1399
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29
RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013
R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000000
socket: no more sockets
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 4944 Comm: syz-executor4 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
kernel msg: ebtables bug: please report to author: Wrong len argument
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 kmem_cache_alloc_trace+0x2cb/0x780 mm/slab.c:3618
 kmalloc include/linux/slab.h:513 [inline]
 sock_alloc_inode+0xb3/0x300 net/socket.c:250
 alloc_inode+0x63/0x190 fs/inode.c:210
 new_inode_pseudo+0x69/0x1a0 fs/inode.c:895
 sock_alloc+0x41/0x270 net/socket.c:571
 __sock_create+0x161/0x920 net/socket.c:1286
 sock_create net/socket.c:1362 [inline]
 __sys_socket+0x100/0x250 net/socket.c:1392
 __do_sys_socket net/socket.c:1401 [inline]
 __se_sys_socket net/socket.c:1399 [inline]
 __x64_sys_socket+0x73/0xb0 net/socket.c:1399
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29
RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013
R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000001
socket: no more sockets
kernel msg: ebtables bug: please report to author: Wrong len argument
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 4992 Comm: syz-executor4 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 __do_kmalloc mm/slab.c:3716 [inline]
 __kmalloc+0x2c8/0x760 mm/slab.c:3727
 kmalloc include/linux/slab.h:518 [inline]
 sk_prot_alloc+0x1ae/0x2e0 net/core/sock.c:1494
 sk_alloc+0x104/0x17b0 net/core/sock.c:1548
 packet_create+0x1a7/0xb80 net/packet/af_packet.c:3192
 __sock_create+0x528/0x920 net/socket.c:1322
 sock_create net/socket.c:1362 [inline]
 __sys_socket+0x100/0x250 net/socket.c:1392
 __do_sys_socket net/socket.c:1401 [inline]
 __se_sys_socket net/socket.c:1399 [inline]
 __x64_sys_socket+0x73/0xb0 net/socket.c:1399
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29
RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013
R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000002
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 5039 Comm: syz-executor4 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 kmem_cache_alloc+0x2af/0x760 mm/slab.c:3552
 __d_alloc+0xc0/0xd30 fs/dcache.c:1616
 d_alloc_pseudo+0x1d/0x30 fs/dcache.c:1744
 sock_alloc_file+0x157/0x4f0 net/socket.c:405
 sock_map_fd net/socket.c:441 [inline]
 __sys_socket+0x16f/0x250 net/socket.c:1396
 __do_sys_socket net/socket.c:1401 [inline]
 __se_sys_socket net/socket.c:1399 [inline]
 __x64_sys_socket+0x73/0xb0 net/socket.c:1399
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29
RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013
R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000003
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 5093 Comm: syz-executor4 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 kmem_cache_alloc+0x2af/0x760 mm/slab.c:3552
 kmem_cache_zalloc include/linux/slab.h:696 [inline]
 get_empty_filp+0x125/0x520 fs/file_table.c:122
 alloc_file+0x24/0x3e0 fs/file_table.c:163
 sock_alloc_file+0x1f3/0x4f0 net/socket.c:414
 sock_map_fd net/socket.c:441 [inline]
 __sys_socket+0x16f/0x250 net/socket.c:1396
 __do_sys_socket net/socket.c:1401 [inline]
 __se_sys_socket net/socket.c:1399 [inline]
 __x64_sys_socket+0x73/0xb0 net/socket.c:1399
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007fd471769c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029
RAX: ffffffffffffffda RBX: 00007fd47176a6d4 RCX: 0000000000455b29
RDX: 0000000000000300 RSI: 0000000000000003 RDI: 0000000000000011
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013
R13: 00000000004c1b7c R14: 00000000004d27c0 R15: 0000000000000004
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 5465 Comm: syz-executor3 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 __do_kmalloc mm/slab.c:3716 [inline]
 __kmalloc_track_caller+0x2c4/0x760 mm/slab.c:3733
 memdup_user+0x2c/0xa0 mm/util.c:160
 map_lookup_elem+0x242/0x970 kernel/bpf/syscall.c:626
 __do_sys_bpf kernel/bpf/syscall.c:2354 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:2328 [inline]
 __x64_sys_bpf+0x318/0x510 kernel/bpf/syscall.c:2328
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007f4707db0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f4707db16d4 RCX: 0000000000455b29
RDX: 0000000000000018 RSI: 0000000020000200 RDI: 0000000000000001
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014
R13: 00000000004bb807 R14: 00000000004c80f8 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 5534 Comm: syz-executor3 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 __do_kmalloc mm/slab.c:3716 [inline]
 __kmalloc+0x2c8/0x760 mm/slab.c:3727
 kmalloc include/linux/slab.h:518 [inline]
 map_lookup_elem+0x3a8/0x970 kernel/bpf/syscall.c:642
 __do_sys_bpf kernel/bpf/syscall.c:2354 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:2328 [inline]
 __x64_sys_bpf+0x318/0x510 kernel/bpf/syscall.c:2328
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007f4707db0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 00007f4707db16d4 RCX: 0000000000455b29
RDX: 0000000000000018 RSI: 0000000020000200 RDI: 0000000000000001
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014
R13: 00000000004bb807 R14: 00000000004c80f8 R15: 0000000000000001
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 5652 Comm: syz-executor7 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc_node mm/slab.c:3299 [inline]
 kmem_cache_alloc_node_trace+0x26f/0x770 mm/slab.c:3661
 kmalloc_node include/linux/slab.h:551 [inline]
 kzalloc_node include/linux/slab.h:717 [inline]
 __get_vm_area_node+0x12d/0x390 mm/vmalloc.c:1389
 __vmalloc_node_range+0xc4/0x760 mm/vmalloc.c:1741
 __vmalloc_node mm/vmalloc.c:1791 [inline]
 __vmalloc+0x45/0x50 mm/vmalloc.c:1797
 bpf_prog_alloc+0xdb/0x3c0 kernel/bpf/core.c:85
 __get_filter+0xf1/0x280 net/core/filter.c:1484
 sk_attach_filter+0x1d/0x90 net/core/filter.c:1519
 sock_setsockopt+0x14ab/0x22c0 net/core/sock.c:948
 __sys_setsockopt+0x2df/0x390 net/socket.c:1943
 __do_sys_setsockopt net/socket.c:1958 [inline]
 __se_sys_setsockopt net/socket.c:1955 [inline]
 __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1955
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007fb76e9a1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fb76e9a26d4 RCX: 0000000000455b29
RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013
RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000
R10: 0000000020b86000 R11: 0000000000000246 R12: 0000000000000014
R13: 00000000004c10f8 R14: 00000000004d0e10 R15: 0000000000000000
CPU: 0 PID: 5676 Comm: syz-executor6 Not tainted 4.17.0+ #84
syz-executor7: vmalloc: allocation failure: 4096 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
syz-executor7 cpuset=
syz7
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 mems_allowed=0
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc_node mm/slab.c:3299 [inline]
 kmem_cache_alloc_node_trace+0x26f/0x770 mm/slab.c:3661
 kmalloc_node include/linux/slab.h:551 [inline]
 kzalloc_node include/linux/slab.h:717 [inline]
 __get_vm_area_node+0x12d/0x390 mm/vmalloc.c:1389
 __vmalloc_node_range+0xc4/0x760 mm/vmalloc.c:1741
 __vmalloc_node mm/vmalloc.c:1791 [inline]
 __vmalloc+0x45/0x50 mm/vmalloc.c:1797
 bpf_prog_alloc+0xdb/0x3c0 kernel/bpf/core.c:85
 __get_filter+0xf1/0x280 net/core/filter.c:1484
 sk_attach_filter+0x1d/0x90 net/core/filter.c:1519
 sock_setsockopt+0x14ab/0x22c0 net/core/sock.c:948
 __sys_setsockopt+0x2df/0x390 net/socket.c:1943
 __do_sys_setsockopt net/socket.c:1958 [inline]
 __se_sys_setsockopt net/socket.c:1955 [inline]
 __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1955
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007ff395d16c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007ff395d176d4 RCX: 0000000000455b29
RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013
RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000
R10: 0000000020b86000 R11: 0000000000000246 R12: 0000000000000014
R13: 00000000004c10f8 R14: 00000000004d0e10 R15: 0000000000000000
CPU: 1 PID: 5652 Comm: syz-executor7 Not tainted 4.17.0+ #84
syz-executor6: vmalloc: allocation failure: 4096 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
syz-executor6 cpuset=
 warn_alloc.cold.117+0xb2/0x1b8 mm/page_alloc.c:3426
syz6
 mems_allowed=0
 __vmalloc_node_range+0x472/0x760 mm/vmalloc.c:1762
 __vmalloc_node mm/vmalloc.c:1791 [inline]
 __vmalloc+0x45/0x50 mm/vmalloc.c:1797
 bpf_prog_alloc+0xdb/0x3c0 kernel/bpf/core.c:85
 __get_filter+0xf1/0x280 net/core/filter.c:1484
 sk_attach_filter+0x1d/0x90 net/core/filter.c:1519
 sock_setsockopt+0x14ab/0x22c0 net/core/sock.c:948
 __sys_setsockopt+0x2df/0x390 net/socket.c:1943
 __do_sys_setsockopt net/socket.c:1958 [inline]
 __se_sys_setsockopt net/socket.c:1955 [inline]
 __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1955
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007fb76e9a1c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fb76e9a26d4 RCX: 0000000000455b29
RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013
RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000
R10: 0000000020b86000 R11: 0000000000000246 R12: 0000000000000014
R13: 00000000004c10f8 R14: 00000000004d0e10 R15: 0000000000000000
CPU: 0 PID: 5676 Comm: syz-executor6 Not tainted 4.17.0+ #84
Mem-Info:
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
active_anon:83448 inactive_anon:337 isolated_anon:0
 active_file:3955 inactive_file:13060 isolated_file:0
 unevictable:0 dirty:175 writeback:0 unstable:0
 slab_reclaimable:9762 slab_unreclaimable:104168
 mapped:74997 shmem:345 pagetables:1021 bounce:0
 free:1315980 free_pcp:365 free_cma:0
 warn_alloc.cold.117+0xb2/0x1b8 mm/page_alloc.c:3426
Node 0 active_anon:333792kB inactive_anon:1348kB active_file:15820kB inactive_file:52240kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:299988kB dirty:700kB writeback:0kB shmem:1380kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 233472kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no
Node 0 
DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB
 __vmalloc_node_range+0x472/0x760 mm/vmalloc.c:1762
lowmem_reserve[]:
 __vmalloc_node mm/vmalloc.c:1791 [inline]
 __vmalloc+0x45/0x50 mm/vmalloc.c:1797
 0
 bpf_prog_alloc+0xdb/0x3c0 kernel/bpf/core.c:85
 2827
 6332
 6332
 __get_filter+0xf1/0x280 net/core/filter.c:1484
 sk_attach_filter+0x1d/0x90 net/core/filter.c:1519
 sock_setsockopt+0x14ab/0x22c0 net/core/sock.c:948
Node 0 
DMA32 free:2898152kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898944kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:792kB local_pcp:728kB free_cma:0kB
lowmem_reserve[]:
 0
 0
 3504
 3504
 __sys_setsockopt+0x2df/0x390 net/socket.c:1943
Node 0 
 __do_sys_setsockopt net/socket.c:1958 [inline]
 __se_sys_setsockopt net/socket.c:1955 [inline]
 __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1955
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
Normal free:2349860kB min:37316kB low:46644kB high:55972kB active_anon:333792kB inactive_anon:1348kB active_file:15820kB inactive_file:52240kB unevictable:0kB writepending:700kB present:4718592kB managed:3589016kB mlocked:0kB kernel_stack:5984kB pagetables:4084kB bounce:0kB free_pcp:668kB local_pcp:420kB free_cma:0kB
lowmem_reserve[]:
 0
 0
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
 0
Code: 1d ba fb ff 
 0
c3 66 2e 0f 1f 84 
00 00 00 00 00 
Node 0 
66 90 48 89 f8 48 
DMA: 
89 f7 48 89 d6 48 89 ca 
1*4kB 
4d 89 c2 4d 89 c8 
(U) 
4c 8b 4c 24 08 0f 
0*8kB 
05 <48> 3d 01 f0 ff ff 
0*16kB 
0f 83 eb b9 fb ff 
1*32kB 
c3 66 2e 0f 1f 84 
(U) 
00 00 00 00 
RSP: 002b:00007ff395d16c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007ff395d176d4 RCX: 0000000000455b29
2*64kB 
RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013
RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000
R10: 0000000020b86000 R11: 0000000000000246 R12: 0000000000000014
R13: 00000000004c10f8 R14: 00000000004d0e10 R15: 0000000000000000
(U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB
Node 0 DMA32: 4*4kB (M) 3*8kB (M) 2*16kB (M) 3*32kB (M) 1*64kB (M) 4*128kB (M) 2*256kB (M) 2*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898152kB
Node 0 Normal: 2594*4kB (UME) 1113*8kB (ME) 838*16kB (UME) 588*32kB (UME) 352*64kB (UM) 117*128kB (UM) 37*256kB (UME) 33*512kB (UME) 16*1024kB (UE) 14*2048kB (UME) 535*4096kB (UM) = 2351792kB
Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB
17359 total pagecache pages
0 pages in swap cache
Swap cache stats: add 0, delete 0, find 0/0
Free swap  = 0kB
Total swap = 0kB
1965969 pages RAM
0 pages HighMem/MovableOnly
340002 pages reserved
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 5716 Comm: syz-executor0 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc_node mm/slab.c:3299 [inline]
 kmem_cache_alloc_node+0x272/0x780 mm/slab.c:3642
 __alloc_skb+0x111/0x780 net/core/skbuff.c:193
 alloc_skb include/linux/skbuff.h:987 [inline]
 alloc_skb_with_frags+0x137/0x760 net/core/skbuff.c:5266
 sock_alloc_send_pskb+0x87a/0xae0 net/core/sock.c:2108
 packet_alloc_skb net/packet/af_packet.c:2778 [inline]
 packet_snd net/packet/af_packet.c:2869 [inline]
 packet_sendmsg+0x1b88/0x6100 net/packet/af_packet.c:2946
 sock_sendmsg_nosec net/socket.c:645 [inline]
 sock_sendmsg+0xd5/0x120 net/socket.c:655
 __sys_sendto+0x3d7/0x670 net/socket.c:1833
 __do_sys_sendto net/socket.c:1845 [inline]
 __se_sys_sendto net/socket.c:1841 [inline]
 __x64_sys_sendto+0xe1/0x1a0 net/socket.c:1841
 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:290
 entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455b29
Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 
RSP: 002b:00007f2f38c52c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f2f38c536d4 RCX: 0000000000455b29
RDX: 000000000000000a RSI: 0000000020000100 RDI: 0000000000000013
RBP: 000000000072bea0 R08: 00000000200000c0 R09: 000000000000001c
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014
R13: 00000000004c0eb8 R14: 00000000004d0960 R15: 0000000000000000
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 0 PID: 5780 Comm: syz-executor0 Not tainted 4.17.0+ #84
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 fail_dump lib/fault-inject.c:51 [inline]
 should_fail.cold.4+0xa/0x1a lib/fault-inject.c:149
 __should_failslab+0x124/0x180 mm/failslab.c:32
 should_failslab+0x9/0x14 mm/slab_common.c:1522
 slab_pre_alloc_hook mm/slab.h:423 [inline]
 slab_alloc_node mm/slab.c:3299 [inline]
 kmem_cache_alloc_node_trace+0x26f/0x770 mm/slab.c:3661
 __do_kmalloc_node mm/slab.c:3681 [inline]
 __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3696
 __kmalloc_reserve.isra.40+0x3a/0xe0 net/core/skbuff.c:137
 __alloc_skb+0x14d/0x780 net/core/skbuff.c:205
 alloc_skb include/linux/skbuff.h:987 [inline]
 alloc_skb_with_frags+0x137/0x760 net/core/skbuff.c:5266
 sock_alloc_send_pskb+0x87a/0xae0 net/core/sock.c:2108
 packet_alloc_skb net/packet/af_packet.c:2778 [inline]
 packet_snd net/packet/af_packet.c:2869 [inline]
 packet_sendmsg+0x1b88/0x6100 net/packet/af_packet.c:2946