TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. ================================================================== BUG: KASAN: stack-out-of-bounds in schedule_debug kernel/sched/core.c:3285 [inline] BUG: KASAN: stack-out-of-bounds in __schedule+0x1977/0x1df0 kernel/sched/core.c:3395 Read of size 8 at addr ffff8801c8e38000 by task syz-executor0/6738 CPU: 0 PID: 6738 Comm: syz-executor0 Not tainted 4.19.0-rc1-next-20180830+ #52 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: The buggy address belongs to the page: page:ffffea0007238e00 count:1 mapcount:-512 mapping:0000000000000000 index:0x0 flags: 0x2fffc0000000000() raw: 02fffc0000000000 dead000000000100 dead000000000200 0000000000000000 raw: 0000000000000000 0000000000000000 00000001fffffdff ffff8801b41be400 page dumped because: kasan: bad access detected page->mem_cgroup:ffff8801b41be400 Memory state around the buggy address: ffff8801c8e37f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801c8e37f80: 00 00 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 f2 f2 >ffff8801c8e38000: f2 f2 04 f2 f2 f2 f2 f2 f2 f2 00 f2 f2 f2 00 00 ^ ffff8801c8e38080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8801c8e38100: 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 f2 f2 f2 f2 ================================================================== Kernel panic - not syncing: panic_on_warn set ... CPU: 0 PID: 6738 Comm: syz-executor0 Tainted: G B 4.19.0-rc1-next-20180830+ #52 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: Dumping ftrace buffer: (ftrace buffer empty) Kernel Offset: disabled Rebooting in 86400 seconds..