device lo left promiscuous mode ============================= WARNING: suspicious RCU usage 4.15.0-rc5+ #178 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1704 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 4 locks held by syz-executor4/26778: #0: (rtnl_mutex){+.+.}, at: [<00000000da0d3b83>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+.-.}, at: [<000000008a5ab2d1>] spin_trylock_bh include/linux/spinlock.h:370 [inline] #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+.-.}, at: [<000000008a5ab2d1>] fib6_run_gc+0x2b7/0x3c0 net/ipv6/ip6_fib.c:2017 #2: (rcu_read_lock){....}, at: [<0000000077ab6a55>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1562 #3: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<000000001122b0c0>] spin_lock_bh include/linux/spinlock.h:315 [inline] #3: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<000000001122b0c0>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1957 stack backtrace: CPU: 0 PID: 26778 Comm: syz-executor4 Not tainted 4.15.0-rc5+ #178 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del+0xcaa/0x11b0 net/ipv6/ip6_fib.c:1703 fib6_clean_node+0x42e/0x580 net/ipv6/ip6_fib.c:1894 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1817 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1865 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1942 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1958 fib6_clean_all net/ipv6/ip6_fib.c:1969 [inline] fib6_run_gc+0x16b/0x3c0 net/ipv6/ip6_fib.c:2025 ndisc_netdev_event+0x3c2/0x4a0 net/ipv6/ndisc.c:1776 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1696 call_netdevice_notifiers net/core/dev.c:1714 [inline] __dev_notify_flags+0x262/0x430 net/core/dev.c:6923 dev_change_flags+0xf5/0x140 net/core/dev.c:6957 dev_ifsioc+0x60d/0x9b0 net/core/dev_ioctl.c:257 dev_ioctl+0x2d7/0xfb0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x94/0xb0 net/socket.c:963 sock_ioctl+0x2c2/0x440 net/socket.c:1053 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f275edf4c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bf58 RCX: 0000000000452ac9 RDX: 00000000208a3fe0 RSI: 0000000000008914 RDI: 0000000000000014 RBP: 00000000000005f8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6fe0 R13: 00000000ffffffff R14: 00007f275edf56d4 R15: 0000000000000003 ============================= WARNING: suspicious RCU usage 4.15.0-rc5+ #178 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1731 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 4 locks held by syz-executor4/26778: #0: (rtnl_mutex){+.+.}, at: [<00000000da0d3b83>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+.-.}, at: [<000000008a5ab2d1>] spin_trylock_bh include/linux/spinlock.h:370 [inline] #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+.-.}, at: [<000000008a5ab2d1>] fib6_run_gc+0x2b7/0x3c0 net/ipv6/ip6_fib.c:2017 #2: (rcu_read_lock){....}, at: [<0000000077ab6a55>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1562 #3: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<000000001122b0c0>] spin_lock_bh include/linux/spinlock.h:315 [inline] #3: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<000000001122b0c0>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1957 stack backtrace: CPU: 0 PID: 26778 Comm: syz-executor4 Not tainted 4.15.0-rc5+ #178 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del+0x425/0x11b0 net/ipv6/ip6_fib.c:1730 fib6_clean_node+0x42e/0x580 net/ipv6/ip6_fib.c:1894 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1817 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1865 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1942 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1958 fib6_clean_all net/ipv6/ip6_fib.c:1969 [inline] fib6_run_gc+0x16b/0x3c0 net/ipv6/ip6_fib.c:2025 ndisc_netdev_event+0x3c2/0x4a0 net/ipv6/ndisc.c:1776 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1696 call_netdevice_notifiers net/core/dev.c:1714 [inline] __dev_notify_flags+0x262/0x430 net/core/dev.c:6923 dev_change_flags+0xf5/0x140 net/core/dev.c:6957 dev_ifsioc+0x60d/0x9b0 net/core/dev_ioctl.c:257 dev_ioctl+0x2d7/0xfb0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x94/0xb0 net/socket.c:963 sock_ioctl+0x2c2/0x440 net/socket.c:1053 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f275edf4c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bf58 RCX: 0000000000452ac9 RDX: 00000000208a3fe0 RSI: 0000000000008914 RDI: 0000000000000014 RBP: 00000000000005f8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6fe0 R13: 00000000ffffffff R14: 00007f275edf56d4 R15: 0000000000000003 ============================= WARNING: suspicious RCU usage 4.15.0-rc5+ #178 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1641 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 4 locks held by syz-executor4/26778: #0: (rtnl_mutex){+.+.}, at: [<00000000da0d3b83>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+.-.}, at: [<000000008a5ab2d1>] spin_trylock_bh include/linux/spinlock.h:370 [inline] #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+.-.}, at: [<000000008a5ab2d1>] fib6_run_gc+0x2b7/0x3c0 net/ipv6/ip6_fib.c:2017 #2: (rcu_read_lock){....}, at: [<0000000077ab6a55>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1562 #3: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<000000001122b0c0>] spin_lock_bh include/linux/spinlock.h:315 [inline] #3: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<000000001122b0c0>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1957 stack backtrace: CPU: 0 PID: 26778 Comm: syz-executor4 Not tainted 4.15.0-rc5+ #178 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del_route net/ipv6/ip6_fib.c:1640 [inline] fib6_del+0xd18/0x11b0 net/ipv6/ip6_fib.c:1733 fib6_clean_node+0x42e/0x580 net/ipv6/ip6_fib.c:1894 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1817 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1865 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1942 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1958 fib6_clean_all net/ipv6/ip6_fib.c:1969 [inline] fib6_run_gc+0x16b/0x3c0 net/ipv6/ip6_fib.c:2025 ndisc_netdev_event+0x3c2/0x4a0 net/ipv6/ndisc.c:1776 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1696 call_netdevice_notifiers net/core/dev.c:1714 [inline] __dev_notify_flags+0x262/0x430 net/core/dev.c:6923 dev_change_flags+0xf5/0x140 net/core/dev.c:6957 dev_ifsioc+0x60d/0x9b0 net/core/dev_ioctl.c:257 dev_ioctl+0x2d7/0xfb0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x94/0xb0 net/socket.c:963 sock_ioctl+0x2c2/0x440 net/socket.c:1053 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f275edf4c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bf58 RCX: 0000000000452ac9 RDX: 00000000208a3fe0 RSI: 0000000000008914 RDI: 0000000000000014 RBP: 00000000000005f8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6fe0 R13: 00000000ffffffff R14: 00007f275edf56d4 R15: 0000000000000003 ============================= WARNING: suspicious RCU usage 4.15.0-rc5+ #178 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1678 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 5 locks held by syz-executor4/26778: #0: (rtnl_mutex){+.+.}, at: [<00000000da0d3b83>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:74 #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+.-.}, at: [<000000008a5ab2d1>] spin_trylock_bh include/linux/spinlock.h:370 [inline] #1: (&(&net->ipv6.fib6_gc_lock)->rlock){+.-.}, at: [<000000008a5ab2d1>] fib6_run_gc+0x2b7/0x3c0 net/ipv6/ip6_fib.c:2017 #2: (rcu_read_lock){....}, at: [<0000000077ab6a55>] __fib6_clean_all+0x0/0x3a0 net/ipv6/ip6_fib.c:1562 #3: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<000000001122b0c0>] spin_lock_bh include/linux/spinlock.h:315 [inline] #3: (&(&tb->tb6_lock)->rlock){+.-.}, at: [<000000001122b0c0>] __fib6_clean_all+0x1d0/0x3a0 net/ipv6/ip6_fib.c:1957 #4: (&net->ipv6.fib6_walker_lock){++--}, at: [<0000000057fc04ce>] fib6_del_route net/ipv6/ip6_fib.c:1673 [inline] #4: (&net->ipv6.fib6_walker_lock){++--}, at: [<0000000057fc04ce>] fib6_del+0x935/0x11b0 net/ipv6/ip6_fib.c:1733 stack backtrace: CPU: 0 PID: 26778 Comm: syz-executor4 Not tainted 4.15.0-rc5+ #178 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4585 fib6_del_route net/ipv6/ip6_fib.c:1677 [inline] fib6_del+0xeb3/0x11b0 net/ipv6/ip6_fib.c:1733 fib6_clean_node+0x42e/0x580 net/ipv6/ip6_fib.c:1894 fib6_walk_continue+0x46c/0x8a0 net/ipv6/ip6_fib.c:1817 fib6_walk+0x91/0xf0 net/ipv6/ip6_fib.c:1865 fib6_clean_tree+0x1e6/0x340 net/ipv6/ip6_fib.c:1942 __fib6_clean_all+0x1f4/0x3a0 net/ipv6/ip6_fib.c:1958 fib6_clean_all net/ipv6/ip6_fib.c:1969 [inline] fib6_run_gc+0x16b/0x3c0 net/ipv6/ip6_fib.c:2025 ndisc_netdev_event+0x3c2/0x4a0 net/ipv6/ndisc.c:1776 notifier_call_chain+0x136/0x2c0 kernel/notifier.c:93 __raw_notifier_call_chain kernel/notifier.c:394 [inline] raw_notifier_call_chain+0x2d/0x40 kernel/notifier.c:401 call_netdevice_notifiers_info+0x32/0x70 net/core/dev.c:1696 call_netdevice_notifiers net/core/dev.c:1714 [inline] __dev_notify_flags+0x262/0x430 net/core/dev.c:6923 dev_change_flags+0xf5/0x140 net/core/dev.c:6957 dev_ifsioc+0x60d/0x9b0 net/core/dev_ioctl.c:257 dev_ioctl+0x2d7/0xfb0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x94/0xb0 net/socket.c:963 sock_ioctl+0x2c2/0x440 net/socket.c:1053 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007f275edf4c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bf58 RCX: 0000000000452ac9 RDX: 00000000208a3fe0 RSI: 0000000000008914 RDI: 0000000000000014 RBP: 00000000000005f8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f6fe0 R13: 00000000ffffffff R14: 00007f275edf56d4 R15: 0000000000000003 device syz3 left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device syz3 entered promiscuous mode IPVS: length: 65315 != 8 device syz3 left promiscuous mode device syz3 entered promiscuous mode ICMPv6: NA: bb:bb:bb:bb:bb:00 advertised our address fe80::aa on syz0! device syz3 left promiscuous mode device syz5 entered promiscuous mode ICMPv6: NA: bb:bb:bb:bb:bb:00 advertised our address fe80::aa on syz0! device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device lo left promiscuous mode device syz3 entered promiscuous mode device syz5 entered promiscuous mode device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device syz3 left promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz3 entered promiscuous mode device syz5 left promiscuous mode device syz3 left promiscuous mode sctp: [Deprecated]: syz-executor6 (pid 26996) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device syz3 entered promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 left promiscuous mode sctp: [Deprecated]: syz-executor6 (pid 27015) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode sctp: [Deprecated]: syz-executor2 (pid 27054) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor3 (pid 27068) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device syz3 left promiscuous mode sctp: [Deprecated]: syz-executor3 (pid 27092) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device syz3 entered promiscuous mode device lo entered promiscuous mode device syz3 left promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device lo entered promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device lo left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz5 entered promiscuous mode device syz3 left promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz5 entered promiscuous mode nla_parse: 6 callbacks suppressed netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. tc_dump_action: action bad kind device syz3 left promiscuous mode device syz5 left promiscuous mode netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. tc_dump_action: action bad kind device syz3 entered promiscuous mode netlink: 40 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor6'. tc_dump_action: action bad kind device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41569 sclass=netlink_route_socket pig=27446 comm=syz-executor7 device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41569 sclass=netlink_route_socket pig=27466 comm=syz-executor7 device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz3 entered promiscuous mode device syz5 left promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz3 entered promiscuous mode netlink: 172 bytes leftover after parsing attributes in process `syz-executor4'. device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 'syz-executor2': attribute type 29 has an invalid length. netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 'syz-executor2': attribute type 29 has an invalid length. netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'. sctp: [Deprecated]: syz-executor6 (pid 28104) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor6 (pid 28104) Use of int in maxseg socket option. Use struct sctp_assoc_value instead device syz5 entered promiscuous mode netlink: 13 bytes leftover after parsing attributes in process `syz-executor7'. IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device syz5 left promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 28238 Comm: syz-executor5 Not tainted 4.15.0-rc5+ #178 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3289 [inline] kmem_cache_alloc_node+0x56/0x760 mm/slab.c:3632 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:983 [inline] nlmsg_new include/net/netlink.h:511 [inline] rtmsg_ifinfo_build_skb+0x73/0x190 net/core/rtnetlink.c:3123 rtmsg_ifinfo_event.part.26+0x41/0xd0 net/core/rtnetlink.c:3159 rtmsg_ifinfo_event net/core/rtnetlink.c:3168 [inline] rtmsg_ifinfo+0x72/0x90 net/core/rtnetlink.c:3167 __dev_notify_flags+0x2c5/0x430 net/core/dev.c:6917 dev_change_flags+0xf5/0x140 net/core/dev.c:6957 devinet_ioctl+0x125b/0x19e0 net/ipv4/devinet.c:1083 inet_ioctl+0x117/0x1c0 net/ipv4/af_inet.c:904 sock_do_ioctl+0x65/0xb0 net/socket.c:956 sock_ioctl+0x2c2/0x440 net/socket.c:1053 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x23/0x9a RIP: 0033:0x452ac9 RSP: 002b:00007fc6e0ebcc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fc6e0ebcaa0 RCX: 0000000000452ac9 RDX: 000000002091d43e RSI: 0000000000008914 RDI: 0000000000000013 RBP: 00007fc6e0ebca90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b767a R13: 00007fc6e0ebcbc8 R14: 00000000004b767a R15: 0000000000000000 device syz5 entered promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47322 sclass=netlink_route_socket pig=28255 comm=syz-executor7 device syz5 left promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47322 sclass=netlink_route_socket pig=28255 comm=syz-executor7 device syz5 entered promiscuous mode tc_dump_action: action bad kind device syz5 left promiscuous mode sctp: [Deprecated]: syz-executor4 (pid 28321) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead tc_dump_action: action bad kind device syz5 entered promiscuous mode device syz5 left promiscuous mode sctp: [Deprecated]: syz-executor4 (pid 28346) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode sctp: [Deprecated]: syz-executor5 (pid 28746) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor5 (pid 28760) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead nla_parse: 12 callbacks suppressed netlink: 2 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor2'. device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz3 entered promiscuous mode device syz3 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode device syz5 entered promiscuous mode device syz5 left promiscuous mode netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. device syz5 entered promiscuous mode netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. device syz5 left promiscuous mode