BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:71 in_atomic(): 1, irqs_disabled(): 0, pid: 3244, name: syz-executor1 2 locks held by syz-executor1/3244: #0: (&vcpu->mutex){+.+.}, at: [] vcpu_load+0x1c/0x70 arch/x86/kvm/../../../virt/kvm/kvm_main.c:154 #1: (&kvm->srcu){....}, at: [] vcpu_enter_guest arch/x86/kvm/x86.c:7021 [inline] #1: (&kvm->srcu){....}, at: [] vcpu_run arch/x86/kvm/x86.c:7100 [inline] #1: (&kvm->srcu){....}, at: [] kvm_arch_vcpu_ioctl_run+0x1bdd/0x5a30 arch/x86/kvm/x86.c:7261 CPU: 2 PID: 3244 Comm: syz-executor1 Not tainted 4.13.0-next-20170914+ #4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6015 __might_sleep+0x95/0x190 kernel/sched/core.c:5968 __might_fault+0xab/0x1d0 mm/memory.c:4499 __copy_from_user include/linux/uaccess.h:71 [inline] paging32_walk_addr_generic+0x427/0x1d80 arch/x86/kvm/paging_tmpl.h:369 paging32_walk_addr arch/x86/kvm/paging_tmpl.h:475 [inline] paging32_gva_to_gpa+0xa5/0x230 arch/x86/kvm/paging_tmpl.h:913 kvm_read_guest_virt_helper+0xd8/0x140 arch/x86/kvm/x86.c:4436 kvm_read_guest_virt_system+0x3c/0x50 arch/x86/kvm/x86.c:4503 segmented_read_std+0x10c/0x180 arch/x86/kvm/emulate.c:822 em_fxrstor+0x27b/0x410 arch/x86/kvm/emulate.c:4025 x86_emulate_insn+0x55d/0x3cf0 arch/x86/kvm/emulate.c:5483 x86_emulate_instruction+0x411/0x1ca0 arch/x86/kvm/x86.c:5735 kvm_mmu_page_fault+0x1b0/0x2f0 arch/x86/kvm/mmu.c:4956 handle_ept_violation+0x194/0x540 arch/x86/kvm/vmx.c:6502 vmx_handle_exit+0x24b/0x1a60 arch/x86/kvm/vmx.c:8823 vcpu_enter_guest arch/x86/kvm/x86.c:7038 [inline] vcpu_run arch/x86/kvm/x86.c:7100 [inline] kvm_arch_vcpu_ioctl_run+0x1d36/0x5a30 arch/x86/kvm/x86.c:7261 kvm_vcpu_ioctl+0x64c/0x1010 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2550 vfs_ioctl fs/ioctl.c:45 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:685 SYSC_ioctl fs/ioctl.c:700 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x447299 RSP: 002b:00007f47c7588c08 EFLAGS: 00000296 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000019 RCX: 0000000000447299 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000019 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000296 R12: 00000000ffffffff R13: 0000000000005790 R14: 00000000006e8850 R15: 0000000000000019 audit: type=1326 audit(1505361465.509:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=3248 comm="syz-executor3" exe="/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 capability: warning: `syz-executor0' uses 32-bit capabilities (legacy support in use) hrtimer: interrupt took 29404 ns audit: type=1326 audit(1505361465.597:4): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=3325 comm="syz-executor3" exe="/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 audit: type=1326 audit(1505361465.711:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=3325 comm="syz-executor3" exe="/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. IPv6: NLM_F_REPLACE set, but no existing node found! audit: type=1326 audit(1505361465.924:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=3395 comm="syz-executor6" exe="/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5955 sclass=netlink_tcpdiag_socket pig=3423 comm=syz-executor2 audit: type=1326 audit(1505361466.080:7): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=3395 comm="syz-executor6" exe="/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=3434 comm=syz-executor2 netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. Bearer <÷ÿ> rejected, not supported in standalone mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. IPv6: NLM_F_REPLACE set, but no existing node found! netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. Bearer <÷ÿ> rejected, not supported in standalone mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=3493 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3493 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pig=3493 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3493 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=3498 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pig=3499 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3499 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=3498 comm=syz-executor7 ICMPv6: NA: someone advertises our address fe80:0000:0000:0000:0000:0000:0000:06aa on syz6! netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. ICMPv6: NA: someone advertises our address fe80:0000:0000:0000:0000:0000:0000:06aa on syz6! netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 62 bytes leftover after parsing attributes in process `syz-executor0'. audit: type=1326 audit(1505361467.431:8): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=3712 comm="syz-executor3" exe="/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 audit: type=1326 audit(1505361467.528:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=3712 comm="syz-executor3" exe="/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 sg_write: data in/out 3171656/194 bytes for SCSI command 0x2a-- guessing data in; program syz-executor6 not setting count and/or reply_len properly sg_write: data in/out 3171656/194 bytes for SCSI command 0x2a-- guessing data in; program syz-executor6 not setting count and/or reply_len properly device lo entered promiscuous mode device lo left promiscuous mode 9pnet_virtio: no channels available for device ./file0 device lo entered promiscuous mode device lo left promiscuous mode 9pnet_virtio: no channels available for device ./file0 *** Guest State *** CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000000 RIP = 0x000000000000fff0 RFLAGS=0x00000000 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x0000ffff, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b8bff RSP = 0xffff88004d5474c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007ff814509700 GSBase=ffff88006df00000 TRBase=ffff88006df23100 GDTBase=ffffffffff574000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=000000003c942000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d45b40 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b6a1edfe SecondaryExec=000000e3 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000603 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffe28b4cc470 TPR Threshold = 0x00 EPT pointer = 0x000000006ac2001e Virtual processor ID = 0x0001 netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. RDS: rds_bind could not find a transport for 224.0.0.1, load rds_tcp or rds_rdma? RDS: rds_bind could not find a transport for 224.0.0.1, load rds_tcp or rds_rdma? netlink: 2 bytes leftover after parsing attributes in process `syz-executor5'. raw_sendmsg: syz-executor5 forgot to set AF_INET. Fix it! QAT: Invalid ioctl QAT: Invalid ioctl TCP: request_sock_TCP: Possible SYN flooding on port 20016. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. capability: warning: `syz-executor0' uses deprecated v2 capabilities in a way that may be insecure syz-executor6 uses obsolete (PF_INET,SOCK_PACKET) sctp: [Deprecated]: syz-executor7 (pid 4163) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 4172) Use of int in maxseg socket option. Use struct sctp_assoc_value instead TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. NFS: bad mount option value specified: v NFS: bad mount option value specified: v TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. audit: type=1326 audit(1505361470.232:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=4446 comm="syz-executor0" exe="/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 QAT: Invalid ioctl TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. QAT: Invalid ioctl TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. audit: type=1326 audit(1505361470.353:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=4446 comm="syz-executor0" exe="/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. nla_parse: 8 callbacks suppressed netlink: 72 bytes leftover after parsing attributes in process `syz-executor7'. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. netlink: 72 bytes leftover after parsing attributes in process `syz-executor7'. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 1 PID: 4561 Comm: syz-executor4 Tainted: G W 4.13.0-next-20170914+ #4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3559 __build_skb+0x9d/0x450 net/core/skbuff.c:284 build_skb+0x6f/0x260 net/core/skbuff.c:316 tun_build_skb.isra.42+0x92f/0x1690 drivers/net/tun.c:1346 tun_get_user+0x1dad/0x2150 drivers/net/tun.c:1455 tun_chr_write_iter+0xde/0x190 drivers/net/tun.c:1579 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:481 vfs_write+0x18f/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x40c611 RSP: 002b:00007fe5bb662c00 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000038 RCX: 000000000040c611 RDX: 0000000000000038 RSI: 0000000020004000 RDI: 0000000000000015 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 00000000ffffffff R13: 0000000000005730 R14: 00000000006e87f0 R15: 00007fe5bb663700 TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 4575 Comm: syz-executor4 Tainted: G W 4.13.0-next-20170914+ #4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3559 __build_skb+0x9d/0x450 net/core/skbuff.c:284 build_skb+0x6f/0x260 net/core/skbuff.c:316 tun_build_skb.isra.42+0x92f/0x1690 drivers/net/tun.c:1346 tun_get_user+0x1dad/0x2150 drivers/net/tun.c:1455 tun_chr_write_iter+0xde/0x190 drivers/net/tun.c:1579 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:481 vfs_write+0x18f/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x40c611 RSP: 002b:00007fe5bb641c00 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000038 RCX: 000000000040c611 RDX: 0000000000000038 RSI: 0000000020004000 RDI: 0000000000000015 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 00000000004a8bf7 R13: 0000000000000000 R14: 00007fe5bb6419c8 R15: 00007fe5bb641b38 TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 4605 Comm: syz-executor4 Tainted: G W 4.13.0-next-20170914+ #4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node_trace+0x5a/0x760 mm/slab.c:3668 __do_kmalloc_node mm/slab.c:3688 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3703 __kmalloc_reserve.isra.40+0x41/0xd0 net/core/skbuff.c:138 __alloc_skb+0x13b/0x740 net/core/skbuff.c:206 alloc_skb include/linux/skbuff.h:976 [inline] tcp_send_ack.part.35+0xce/0x610 net/ipv4/tcp_output.c:3557 tcp_send_ack+0x49/0x60 net/ipv4/tcp_output.c:3548 __tcp_ack_snd_check+0x2c6/0x4b0 net/ipv4/tcp_input.c:5084 tcp_ack_snd_check net/ipv4/tcp_input.c:5097 [inline] tcp_rcv_established+0x91e/0x1890 net/ipv4/tcp_input.c:5510 tcp_v4_do_rcv+0x2ab/0x7d0 net/ipv4/tcp_ipv4.c:1460 tcp_v4_rcv+0x249f/0x2f20 net/ipv4/tcp_ipv4.c:1720 ip_local_deliver_finish+0x2e2/0xba0 net/ipv4/ip_input.c:216 NF_HOOK include/linux/netfilter.h:249 [inline] ip_local_deliver+0x1ce/0x6e0 net/ipv4/ip_input.c:257 dst_input include/net/dst.h:478 [inline] ip_rcv_finish+0x8db/0x19c0 net/ipv4/ip_input.c:397 NF_HOOK include/linux/netfilter.h:249 [inline] ip_rcv+0xc3f/0x17d0 net/ipv4/ip_input.c:488 __netif_receive_skb_core+0x19af/0x33d0 net/core/dev.c:4423 __netif_receive_skb+0x2c/0x1b0 net/core/dev.c:4461 netif_receive_skb_internal+0x10b/0x670 net/core/dev.c:4534 netif_receive_skb+0xae/0x390 net/core/dev.c:4558 tun_rx_batched.isra.43+0x5ed/0x860 drivers/net/tun.c:1218 tun_get_user+0x11dd/0x2150 drivers/net/tun.c:1553 tun_chr_write_iter+0xde/0x190 drivers/net/tun.c:1579 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:481 vfs_write+0x18f/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x40c611 RSP: 002b:00007fe5bb662c00 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000038 RCX: 000000000040c611 RDX: 0000000000000038 RSI: 0000000020004000 RDI: 0000000000000015 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 00000000004a8bf7 R13: 0000000000000000 R14: 00007fe5bb6629c8 R15: 00007fe5bb662b38 TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. device gre0 entered promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. print_req_error: I/O error, dev loop3, sector 0 Buffer I/O error on dev loop3, logical block 0, lost async page write print_req_error: I/O error, dev loop3, sector 8 Buffer I/O error on dev loop3, logical block 1, lost async page write print_req_error: I/O error, dev loop3, sector 16 Buffer I/O error on dev loop3, logical block 2, lost async page write print_req_error: I/O error, dev loop3, sector 24 Buffer I/O error on dev loop3, logical block 3, lost async page write print_req_error: I/O error, dev loop3, sector 32 Buffer I/O error on dev loop3, logical block 4, lost async page write print_req_error: I/O error, dev loop3, sector 40 Buffer I/O error on dev loop3, logical block 5, lost async page write print_req_error: I/O error, dev loop3, sector 48 Buffer I/O error on dev loop3, logical block 6, lost async page write print_req_error: I/O error, dev loop3, sector 56 Buffer I/O error on dev loop3, logical block 7, lost async page write print_req_error: I/O error, dev loop3, sector 64 Buffer I/O error on dev loop3, logical block 8, lost async page write print_req_error: I/O error, dev loop3, sector 72 Buffer I/O error on dev loop3, logical block 9, lost async page write TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. device gre0 entered promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. netlink: 7 bytes leftover after parsing attributes in process `syz-executor1'. tc_dump_action: action bad kind netlink: 7 bytes leftover after parsing attributes in process `syz-executor1'. tc_dump_action: action bad kind TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5208 Comm: syz-executor3 Tainted: G W 4.13.0-next-20170914+ #4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3559 __build_skb+0x9d/0x450 net/core/skbuff.c:284 build_skb+0x6f/0x260 net/core/skbuff.c:316 tun_build_skb.isra.42+0x92f/0x1690 drivers/net/tun.c:1346 tun_get_user+0x1dad/0x2150 drivers/net/tun.c:1455 tun_chr_write_iter+0xde/0x190 drivers/net/tun.c:1579 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:481 vfs_write+0x18f/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x40c611 RSP: 002b:00007ff814508c00 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000042 RCX: 000000000040c611 RDX: 0000000000000042 RSI: 000000002000e000 RDI: 0000000000000015 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 00000000004a8bf7 R13: 0000000000000000 R14: 00007ff8145089c8 R15: 00007ff814508b38 TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 2 PID: 5240 Comm: syz-executor3 Tainted: G W 4.13.0-next-20170914+ #4 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3559 reqsk_alloc include/net/request_sock.h:88 [inline] inet_reqsk_alloc+0xad/0x570 net/ipv4/tcp_input.c:6192 cookie_v4_check+0x579/0x2910 net/ipv4/syncookies.c:329 tcp_v4_cookie_check net/ipv4/tcp_ipv4.c:1431 [inline] tcp_v4_do_rcv+0x6e9/0x7d0 net/ipv4/tcp_ipv4.c:1468 tcp_v4_rcv+0x2e07/0x2f20 net/ipv4/tcp_ipv4.c:1710 ip_local_deliver_finish+0x2e2/0xba0 net/ipv4/ip_input.c:216 NF_HOOK include/linux/netfilter.h:249 [inline] ip_local_deliver+0x1ce/0x6e0 net/ipv4/ip_input.c:257 TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. dst_input include/net/dst.h:478 [inline] ip_rcv_finish+0x8db/0x19c0 net/ipv4/ip_input.c:397 NF_HOOK include/linux/netfilter.h:249 [inline] ip_rcv+0xc3f/0x17d0 net/ipv4/ip_input.c:488 __netif_receive_skb_core+0x19af/0x33d0 net/core/dev.c:4423 mmap: syz-executor2 (5260) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. __netif_receive_skb+0x2c/0x1b0 net/core/dev.c:4461 netif_receive_skb_internal+0x10b/0x670 net/core/dev.c:4534 netif_receive_skb+0xae/0x390 net/core/dev.c:4558 tun_rx_batched.isra.43+0x5ed/0x860 drivers/net/tun.c:1218 tun_get_user+0x11dd/0x2150 drivers/net/tun.c:1553 tun_chr_write_iter+0xde/0x190 drivers/net/tun.c:1579 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:481 vfs_write+0x18f/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x40c611 RSP: 002b:00007ff814508c00 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000000042 RCX: 000000000040c611 RDX: 0000000000000042 RSI: 000000002000e000 RDI: 0000000000000015 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 00000000004a8bf7 R13: 0000000000000000 R14: 00007ff8145089c8 R15: 00007ff814508b38 QAT: Invalid ioctl QAT: Invalid ioctl TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. audit: type=1326 audit(1505361474.685:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5479 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable audit: type=1326 audit(1505361474.805:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5479 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. device gre0 entered promiscuous mode TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20012. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters. TCP: request_sock_TCP: Possible SYN flooding on port 20020. Sending cookies. Check SNMP counters.