xecuting program 3: uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:35 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ptrace(0xffffffffffffffff, 0x0) 05:02:36 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) 05:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:36 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) [ 791.262703] audit: type=1326 audit(1529730156.261:1699): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15373 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ptrace(0xffffffffffffffff, 0x0) 05:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:36 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ptrace(0xffffffffffffffff, 0x0) 05:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) 05:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:37 executing program 7: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:37 executing program 1: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000100)={0xfc, ""/252}) 05:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:37 executing program 1: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:37 executing program 7: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:37 executing program 1: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:37 executing program 7: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:38 executing program 0: fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:38 executing program 0: fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) [ 793.514171] audit: type=1326 audit(1529730158.512:1700): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15546 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:38 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:38 executing program 0: fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 793.624406] audit: type=1326 audit(1529730158.561:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15549 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:38 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 793.848781] audit: type=1326 audit(1529730158.847:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15571 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:39 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:39 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:39 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 794.447580] audit: type=1326 audit(1529730159.446:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15601 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 794.490132] audit: type=1326 audit(1529730159.484:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15603 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 794.816442] audit: type=1326 audit(1529730159.814:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15635 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000380)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 05:02:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) uselib(&(0x7f00000002c0)='./file0\x00') mount(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='vfat\x00', 0x0, 0x0) 05:02:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 795.371807] audit: type=1326 audit(1529730160.370:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15652 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 795.469386] audit: type=1326 audit(1529730160.467:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15656 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffff9c, 0x5417, &(0x7f0000000080)) 05:02:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 795.759562] audit: type=1326 audit(1529730160.757:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15680 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) [ 795.809138] audit: type=1326 audit(1529730160.791:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15685 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:41 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:41 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) [ 796.413605] audit: type=1326 audit(1529730161.412:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15709 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:41 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:41 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) [ 796.742341] audit: type=1326 audit(1529730161.740:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15737 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:41 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) [ 796.857180] audit: type=1326 audit(1529730161.855:1712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15747 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 796.936582] audit: type=1326 audit(1529730161.930:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15753 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:42 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) [ 797.391833] audit: type=1326 audit(1529730162.390:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15770 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0xffffffffffffffff, 0x0) 05:02:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:42 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) [ 797.707220] audit: type=1326 audit(1529730162.705:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15790 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:42 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:02:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:43 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000280)=0xc) ptrace(0x0, 0x0) 05:02:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:43 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000003500)='/dev/null\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000003b00)={'#! ', './file0', [], 0xa}, 0xb) 05:02:43 executing program 4: epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 05:02:44 executing program 4: epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:44 executing program 5: msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000100)) 05:02:44 executing program 4: epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:44 executing program 5: msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:44 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:44 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000100)) 05:02:44 executing program 5: msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000100)) 05:02:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 05:02:44 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:44 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:45 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:45 executing program 3: syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:45 executing program 6: 05:02:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@rand_addr}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 05:02:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:45 executing program 6: 05:02:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) [ 800.745335] kauditd_printk_skb: 7 callbacks suppressed [ 800.745360] audit: type=1326 audit(1529730165.743:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15969 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000000c0)='bridge_slave_1\x00') 05:02:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) exit(0x0) 05:02:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) exit(0x0) 05:02:46 executing program 7: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) exit(0x0) 05:02:47 executing program 7: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) [ 802.189782] audit: type=1326 audit(1529730167.188:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16058 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:47 executing program 7: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:47 executing program 0: timerfd_create(0x0, 0x0) exit(0x0) 05:02:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:47 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000a}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:48 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:48 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) [ 803.135361] audit: type=1326 audit(1529730168.134:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16117 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) [ 803.227893] audit: type=1326 audit(1529730168.170:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16125 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:48 executing program 0: timerfd_create(0x0, 0x0) exit(0x0) 05:02:48 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) [ 803.533126] audit: type=1326 audit(1529730168.531:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16150 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:49 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) epoll_create(0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000300)=""/91, &(0x7f0000000380)=0x5b) 05:02:49 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:49 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) [ 804.071507] audit: type=1326 audit(1529730169.070:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16161 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:49 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) [ 804.140434] audit: type=1326 audit(1529730169.099:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16167 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:49 executing program 0: timerfd_create(0x0, 0x0) exit(0x0) 05:02:49 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:49 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:49 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) [ 804.566152] audit: type=1326 audit(1529730169.564:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16204 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:49 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:49 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) msync(&(0x7f0000e00000/0x200000)=nil, 0x200000, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000340)=ANY=[]) 05:02:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) [ 805.194035] audit: type=1326 audit(1529730170.189:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16227 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1=0xe0000001}}}, 0x2e) 05:02:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) [ 805.592126] audit: type=1326 audit(1529730170.590:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16263 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 05:02:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000003c0)) 05:02:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) 05:02:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) [ 806.598644] kauditd_printk_skb: 1 callbacks suppressed [ 806.598666] audit: type=1326 audit(1529730171.597:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16317 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:51 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) [ 807.027119] audit: type=1326 audit(1529730172.025:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16351 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:52 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) [ 807.185856] audit: type=1326 audit(1529730172.184:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16364 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:52 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)) [ 807.527292] audit: type=1326 audit(1529730172.525:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16375 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:52 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) [ 807.581757] audit: type=1326 audit(1529730172.554:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16382 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:52 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) [ 807.978663] audit: type=1326 audit(1529730172.977:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16402 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) 05:02:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) [ 808.216804] audit: type=1326 audit(1529730173.214:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16413 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) [ 808.451792] audit: type=1326 audit(1529730173.450:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16424 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_retries\x00'}, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x23, 0x0) 05:02:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:53 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:53 executing program 3: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:53 executing program 3: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) [ 808.940485] audit: type=1326 audit(1529730173.938:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16456 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000080)={'bcsh0\x00'}) [ 809.191276] audit: type=1326 audit(1529730174.187:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16473 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f00000000c0)) 05:02:54 executing program 3: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:54 executing program 5: msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:54 executing program 5: msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:55 executing program 5: msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:55 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:55 executing program 7: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:55 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:55 executing program 7: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:56 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:56 executing program 7: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000000)) 05:02:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:56 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:56 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) [ 811.836031] kauditd_printk_skb: 3 callbacks suppressed [ 811.841577] audit: type=1326 audit(1529730176.834:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16606 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:56 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:57 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:02:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:57 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:57 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) [ 812.771013] audit: type=1326 audit(1529730177.769:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16655 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:57 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:57 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:57 executing program 1: ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:02:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) timerfd_create(0x0, 0x0) exit(0x0) [ 813.219778] audit: type=1326 audit(1529730178.218:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16695 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:58 executing program 1: ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:58 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:58 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) [ 813.720038] audit: type=1326 audit(1529730178.717:1750): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16709 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:58 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:58 executing program 1: ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) [ 813.781676] audit: type=1326 audit(1529730178.771:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16715 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:58 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:02:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:59 executing program 2: creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) timerfd_create(0x0, 0x0) exit(0x0) [ 814.243883] audit: type=1326 audit(1529730179.242:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16747 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:59 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:02:59 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:02:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:02:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$l2tp(0x18, 0x1, 0x1) 05:02:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) write$sndseq(0xffffffffffffffff, &(0x7f0000000040), 0x0) 05:02:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:02:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) [ 814.748524] audit: type=1326 audit(1529730179.747:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16764 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:59 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:02:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$l2tp(0x18, 0x1, 0x1) 05:02:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) [ 814.859978] audit: type=1326 audit(1529730179.782:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16765 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:02:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:03:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) [ 814.970184] audit: type=1326 audit(1529730179.933:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16773 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) socket$l2tp(0x18, 0x1, 0x1) 05:03:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) timerfd_create(0x0, 0x0) exit(0x0) 05:03:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) [ 815.253919] audit: type=1326 audit(1529730180.252:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16799 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) 05:03:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:03:00 executing program 4: sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:03:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:00 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:03:00 executing program 4: sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:03:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:03:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:00 executing program 4: sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:03:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:03:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:01 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:03:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:03:01 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) 05:03:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:03:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:03:01 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) [ 816.923570] kauditd_printk_skb: 2 callbacks suppressed [ 816.923594] audit: type=1326 audit(1529730181.922:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16893 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:02 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:03:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:03:02 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) [ 817.106214] audit: type=1326 audit(1529730182.095:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16902 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) [ 817.201222] audit: type=1326 audit(1529730182.178:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16901 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:02 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:03 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:03:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:03:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) [ 818.138477] audit: type=1326 audit(1529730183.137:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16957 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:03 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) [ 818.242726] audit: type=1326 audit(1529730183.200:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16959 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:03 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:03 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50353}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, &(0x7f0000000140)) 05:03:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)) 05:03:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:04 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) [ 819.053003] audit: type=1326 audit(1529730184.051:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17009 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 819.121954] audit: type=1326 audit(1529730184.117:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17016 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:04 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) [ 819.198639] audit: type=1326 audit(1529730184.152:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17022 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) [ 819.307703] audit: type=1326 audit(1529730184.306:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17029 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:04 executing program 0: msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:04 executing program 0: msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:04 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:05 executing program 0: msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:05 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) [ 820.105441] audit: type=1326 audit(1529730185.103:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17070 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:05 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:05 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:05 executing program 7: openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) sched_yield() socket$l2tp(0x18, 0x1, 0x1) 05:03:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:06 executing program 7: openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:06 executing program 6: syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgrp(0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 05:03:06 executing program 7: openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:06 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) [ 822.625118] kauditd_printk_skb: 4 callbacks suppressed [ 822.625140] audit: type=1326 audit(1529730187.623:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17214 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:08 executing program 2: pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 05:03:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:08 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:08 executing program 2: pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) [ 823.560763] audit: type=1326 audit(1529730188.559:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17268 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:08 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:08 executing program 2: pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) [ 823.622572] audit: type=1326 audit(1529730188.595:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17263 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 823.642510] audit: type=1326 audit(1529730188.616:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17278 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:08 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 824.601469] audit: type=1326 audit(1529730189.600:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17319 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) [ 824.691474] audit: type=1326 audit(1529730189.647:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17320 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:09 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) [ 824.833658] audit: type=1326 audit(1529730189.777:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17334 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:10 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000001500)) 05:03:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:10 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:10 executing program 6: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) [ 825.603681] audit: type=1326 audit(1529730190.601:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17386 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000240)) 05:03:10 executing program 6: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) [ 825.841140] syz-executor3: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 825.852636] syz-executor3 cpuset=syz3 mems_allowed=0 [ 825.857904] CPU: 1 PID: 17397 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 825.864764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.874139] Call Trace: [ 825.876783] dump_stack+0x185/0x1d0 [ 825.880456] warn_alloc+0x430/0x690 [ 825.884168] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 825.889085] ? __msan_poison_alloca+0x15c/0x1d0 [ 825.893843] copy_process+0x778/0x9be0 [ 825.897787] ? __msan_poison_alloca+0x15c/0x1d0 [ 825.902503] ? handle_mm_fault+0x74eb/0x7ed0 [ 825.906963] ? handle_mm_fault+0x74eb/0x7ed0 [ 825.911440] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 825.916871] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 825.922905] ? handle_mm_fault+0x1eb0/0x7ed0 [ 825.927357] ? __msan_poison_alloca+0x140/0x1d0 [ 825.932080] _do_fork+0x353/0xf60 [ 825.935593] __x64_sys_clone+0x15e/0x1b0 [ 825.939698] ? __ia32_sys_vfork+0x70/0x70 [ 825.943877] do_syscall_64+0x15b/0x230 [ 825.947804] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 825.953015] RIP: 0033:0x458429 [ 825.956223] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 825.963971] RAX: ffffffffffffffda RBX: 00007f5302e18700 RCX: 0000000000458429 [ 825.971265] RDX: 00007f5302e189d0 RSI: 00007f5302e17db0 RDI: 00000000003d0f00 [ 825.978565] RBP: 0000000000a3e8a0 R08: 00007f5302e18700 R09: 00007f5302e18700 [ 825.985860] R10: 00007f5302e189d0 R11: 0000000000000202 R12: 0000000000000000 [ 825.993153] R13: 0000000000a3e81f R14: 00007f5302e189c0 R15: 0000000000000000 [ 826.000674] warn_alloc_show_mem: 2 callbacks suppressed [ 826.000682] Mem-Info: [ 826.008665] active_anon:215145 inactive_anon:75 isolated_anon:0 [ 826.008665] active_file:1475 inactive_file:1502 isolated_file:50 [ 826.008665] unevictable:0 dirty:30 writeback:0 unstable:0 [ 826.008665] slab_reclaimable:3381 slab_unreclaimable:9504 [ 826.008665] mapped:67587 shmem:84 pagetables:1465 bounce:0 [ 826.008665] free:40908 free_pcp:246 free_cma:0 05:03:11 executing program 6: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) [ 826.042021] Node 0 active_anon:858504kB inactive_anon:300kB active_file:5900kB inactive_file:6124kB unevictable:0kB isolated(anon):0kB isolated(file):200kB mapped:270232kB dirty:120kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 270336kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 05:03:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) [ 826.070238] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 826.096523] lowmem_reserve[]: 0 2817 7244 7244 [ 826.101296] Node 0 DMA32 free:101228kB min:26224kB low:32780kB high:39336kB active_anon:374368kB inactive_anon:4kB active_file:268kB inactive_file:240kB unevictable:0kB writepending:76kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2368kB pagetables:2472kB bounce:0kB free_pcp:456kB local_pcp:0kB free_cma:0kB [ 826.130264] lowmem_reserve[]: 0 0 4426 4426 [ 826.134746] Node 0 Normal free:59092kB min:41208kB low:51508kB high:61808kB active_anon:482112kB inactive_anon:296kB active_file:6280kB inactive_file:6172kB unevictable:0kB writepending:44kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:3388kB bounce:0kB free_pcp:632kB local_pcp:12kB free_cma:0kB [ 826.164138] lowmem_reserve[]: 0 0 0 0 [ 826.168111] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 826.181595] Node 0 DMA32: 5832*4kB (UME) 3001*8kB (UME) 852*16kB (UM) 125*32kB (UM) 33*64kB (UM) 7*128kB (UME) 3*256kB (UM) 2*512kB (M) 2*1024kB (ME) 9*2048kB (UM) 1*4096kB (U) = 94344kB [ 826.198683] Node 0 Normal: 10365*4kB (UMEH) 1904*8kB (MEH) 61*16kB (M) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 57732kB [ 826.212505] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 826.221183] 3054 total pagecache pages [ 826.225148] 0 pages in swap cache [ 826.228702] Swap cache stats: add 0, delete 0, find 0/0 [ 826.234141] Free swap = 0kB [ 826.237245] Total swap = 0kB [ 826.240323] 1965969 pages RAM [ 826.243515] 0 pages HighMem/MovableOnly [ 826.247546] 106316 pages reserved [ 826.257921] audit: type=1326 audit(1529730191.256:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17399 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 826.277958] audit: type=1326 audit(1529730191.257:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17393 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001600)={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, @rand_addr}, 0xc) 05:03:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:12 executing program 3: pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:12 executing program 3: pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 828.005585] kauditd_printk_skb: 3 callbacks suppressed [ 828.005609] audit: type=1326 audit(1529730193.004:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17517 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:13 executing program 3: pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 828.143605] audit: type=1326 audit(1529730193.136:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17525 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:13 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) [ 828.428255] audit: type=1326 audit(1529730193.426:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17548 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) pipe(&(0x7f0000000000)) rt_sigtimedwait(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240), 0x8) 05:03:13 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 828.929968] audit: type=1326 audit(1529730193.928:1789): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17572 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @loopback, @rand_addr}, &(0x7f00000003c0)=0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00'}, {@multicast1=0xe0000001}}, 0x44) 05:03:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:14 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 829.081025] audit: type=1326 audit(1529730194.078:1790): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17584 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x4000000000050344}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:14 executing program 5: pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 829.464911] audit: type=1326 audit(1529730194.463:1791): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17607 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 829.538180] audit: type=1326 audit(1529730194.495:1792): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17609 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:14 executing program 5: pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:14 executing program 0: pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:15 executing program 5: pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:15 executing program 0: pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:15 executing program 0: pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'user.', 'selinuxnodevwlan0\x00'}) 05:03:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:15 executing program 7: unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) [ 830.481962] audit: type=1326 audit(1529730195.480:1793): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17672 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) [ 830.547642] audit: type=1326 audit(1529730195.507:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17668 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:15 executing program 7: unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 830.807982] audit: type=1326 audit(1529730195.806:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17697 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:16 executing program 7: unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 05:03:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000380)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 05:03:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:17 executing program 2: rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:17 executing program 1: unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 832.825292] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 832.835818] syz-executor3 cpuset=syz3 mems_allowed=0 [ 832.840924] CPU: 1 PID: 17816 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 832.847743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.857087] Call Trace: [ 832.859668] dump_stack+0x185/0x1d0 [ 832.863281] warn_alloc+0x430/0x690 [ 832.866898] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 832.871723] ? kernel_poison_pages+0x40/0x360 [ 832.876203] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 832.881647] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 832.886572] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 832.891492] ? kmsan_set_origin_inline+0x6b/0x120 [ 832.896316] ? __msan_poison_alloca+0x15c/0x1d0 [ 832.900970] kmsan_alloc_page+0x82/0xe0 [ 832.904925] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 832.909661] ? kmsan_set_origin_inline+0x6b/0x120 [ 832.914487] ? __msan_poison_alloca+0x15c/0x1d0 [ 832.919138] ? __should_failslab+0x278/0x2a0 [ 832.923533] ? should_fail+0x57/0xab0 [ 832.927326] ? __should_failslab+0x278/0x2a0 [ 832.931719] ? kmsan_set_origin_inline+0x6b/0x120 [ 832.936553] ? __msan_poison_alloca+0x15c/0x1d0 [ 832.941205] ? kmsan_set_origin+0x9e/0x160 [ 832.945429] alloc_pages_vma+0x1555/0x17f0 [ 832.949652] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 832.954742] handle_mm_fault+0x44ca/0x7ed0 [ 832.958962] ? kmsan_set_origin_inline+0x6b/0x120 [ 832.963796] __do_page_fault+0xec6/0x1a10 [ 832.967931] do_page_fault+0xb7/0x250 [ 832.971714] ? page_fault+0x8/0x30 [ 832.975237] page_fault+0x1e/0x30 [ 832.978672] RIP: 0033:0x4075fa [ 832.981842] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 832.987183] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 832.994435] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 [ 833.001684] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 833.008933] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cb858 [ 833.016187] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 833.023449] Mem-Info: [ 833.025855] active_anon:209170 inactive_anon:75 isolated_anon:0 [ 833.025855] active_file:1446 inactive_file:797 isolated_file:0 [ 833.025855] unevictable:0 dirty:27 writeback:0 unstable:0 [ 833.025855] slab_reclaimable:3381 slab_unreclaimable:9505 [ 833.025855] mapped:67204 shmem:84 pagetables:1291 bounce:0 [ 833.025855] free:40936 free_pcp:534 free_cma:0 [ 833.058835] Node 0 active_anon:836680kB inactive_anon:300kB active_file:5784kB inactive_file:3188kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268816kB dirty:108kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 833.086755] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 833.112864] lowmem_reserve[]: 0 2817 7244 7244 [ 833.117436] Node 0 DMA32 free:96888kB min:26224kB low:32780kB high:39336kB active_anon:354712kB inactive_anon:0kB active_file:112kB inactive_file:304kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2880kB pagetables:2216kB bounce:0kB free_pcp:892kB local_pcp:644kB free_cma:0kB [ 833.146322] lowmem_reserve[]: 0 0 4426 4426 [ 833.150632] Node 0 Normal free:50952kB min:41208kB low:51508kB high:61808kB active_anon:481828kB inactive_anon:300kB active_file:5672kB inactive_file:2884kB unevictable:0kB writepending:40kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2948kB bounce:0kB free_pcp:1244kB local_pcp:564kB free_cma:0kB [ 833.180049] lowmem_reserve[]: 0 0 0 0 [ 833.183855] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 833.197060] Node 0 DMA32: 5830*4kB (UME) 3057*8kB (UME) 918*16kB (M) 196*32kB (UM) 83*64kB (UM) 37*128kB (ME) 21*256kB (M) 12*512kB (UM) 6*1024kB (ME) 0*2048kB 0*4096kB = 96448kB [ 833.213479] Node 0 Normal: 9128*4kB (UMEH) 1671*8kB (UMEH) 32*16kB (UMH) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 50456kB [ 833.227199] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 833.235750] 2327 total pagecache pages [ 833.239612] 0 pages in swap cache [ 833.243045] Swap cache stats: add 0, delete 0, find 0/0 [ 833.248392] Free swap = 0kB [ 833.251386] Total swap = 0kB [ 833.254383] 1965969 pages RAM [ 833.257462] 0 pages HighMem/MovableOnly [ 833.261428] 106316 pages reserved 05:03:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:18 executing program 2: rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:18 executing program 1: unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) [ 833.434553] kauditd_printk_skb: 3 callbacks suppressed [ 833.434576] audit: type=1326 audit(1529730198.433:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17826 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:18 executing program 2: rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:18 executing program 1: unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) [ 833.716940] audit: type=1326 audit(1529730198.714:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17816 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fchdir(0xffffffffffffffff) 05:03:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000600)) [ 833.904343] audit: type=1326 audit(1529730198.902:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17858 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:19 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) getrusage(0x0, &(0x7f00000001c0)) 05:03:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fchdir(0xffffffffffffffff) 05:03:19 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000600)) 05:03:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) [ 834.419118] audit: type=1326 audit(1529730199.417:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17897 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:03:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000600)) 05:03:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) getrusage(0x0, &(0x7f00000001c0)) 05:03:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) fchdir(0xffffffffffffffff) [ 834.846931] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 834.857450] syz-executor0 cpuset=syz0 mems_allowed=0 [ 834.862563] CPU: 0 PID: 17912 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 834.869410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.878750] Call Trace: [ 834.881332] dump_stack+0x185/0x1d0 [ 834.884944] warn_alloc+0x430/0x690 [ 834.888563] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 834.893390] ? kernel_poison_pages+0x40/0x360 [ 834.897868] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 834.903306] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 834.908235] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 834.913242] ? kmsan_set_origin_inline+0x6b/0x120 [ 834.918072] ? __msan_poison_alloca+0x15c/0x1d0 [ 834.922730] kmsan_alloc_page+0x82/0xe0 [ 834.926690] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 834.931431] ? kmsan_set_origin_inline+0x6b/0x120 [ 834.936271] ? __msan_poison_alloca+0x15c/0x1d0 [ 834.940922] ? __should_failslab+0x278/0x2a0 [ 834.945327] ? should_fail+0x57/0xab0 [ 834.949117] ? __should_failslab+0x278/0x2a0 [ 834.953511] ? kmsan_set_origin_inline+0x6b/0x120 [ 834.958343] ? __msan_poison_alloca+0x15c/0x1d0 [ 834.963002] ? kmsan_set_origin+0x9e/0x160 [ 834.967237] alloc_pages_vma+0x1555/0x17f0 [ 834.971460] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 834.976564] handle_mm_fault+0x44ca/0x7ed0 [ 834.980791] ? kmsan_set_origin_inline+0x6b/0x120 [ 834.985627] __do_page_fault+0xec6/0x1a10 [ 834.989761] do_page_fault+0xb7/0x250 [ 834.993542] ? page_fault+0x8/0x30 [ 834.997067] page_fault+0x1e/0x30 [ 835.000500] RIP: 0033:0x4075fa [ 835.003673] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 835.009018] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 835.016270] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 835.023520] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 835.030769] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cc03d [ 835.038018] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 835.045273] Mem-Info: [ 835.047682] active_anon:183513 inactive_anon:78 isolated_anon:0 [ 835.047682] active_file:1562 inactive_file:816 isolated_file:0 [ 835.047682] unevictable:0 dirty:33 writeback:0 unstable:0 [ 835.047682] slab_reclaimable:3381 slab_unreclaimable:9517 [ 835.047682] mapped:67287 shmem:84 pagetables:1305 bounce:0 [ 835.047682] free:66897 free_pcp:683 free_cma:0 [ 835.080748] Node 0 active_anon:734052kB inactive_anon:312kB active_file:6248kB inactive_file:3264kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269148kB dirty:132kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 264192kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 835.108662] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 835.134773] lowmem_reserve[]: 0 2817 7244 7244 [ 835.139343] Node 0 DMA32 free:199272kB min:26224kB low:32780kB high:39336kB active_anon:256944kB inactive_anon:12kB active_file:508kB inactive_file:380kB unevictable:0kB writepending:92kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2752kB pagetables:2324kB bounce:0kB free_pcp:1404kB local_pcp:732kB free_cma:0kB [ 835.168589] lowmem_reserve[]: 0 0 4426 4426 [ 835.172900] Node 0 Normal free:52412kB min:41208kB low:51508kB high:61808kB active_anon:477708kB inactive_anon:300kB active_file:5740kB inactive_file:2884kB unevictable:0kB writepending:40kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2896kB bounce:0kB free_pcp:1328kB local_pcp:656kB free_cma:0kB [ 835.202311] lowmem_reserve[]: 0 0 0 0 [ 835.206103] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 835.219303] Node 0 DMA32: 6154*4kB (UME) 6068*8kB (UME) 1748*16kB (UM) 709*32kB (UM) 380*64kB (UM) 145*128kB (UME) 38*256kB (UM) 17*512kB (M) 8*1024kB (UME) 3*2048kB (UM) 0*4096kB = 199464kB [ 835.236428] Node 0 Normal: 9224*4kB (UMEH) 1806*8kB (UMEH) 24*16kB (UMH) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51792kB [ 835.250154] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 835.258708] 2462 total pagecache pages [ 835.262574] 0 pages in swap cache [ 835.266002] Swap cache stats: add 0, delete 0, find 0/0 [ 835.271340] Free swap = 0kB [ 835.274332] Total swap = 0kB [ 835.277326] 1965969 pages RAM [ 835.280421] 0 pages HighMem/MovableOnly [ 835.284371] 106316 pages reserved [ 835.307803] audit: type=1326 audit(1529730200.306:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17910 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) [ 835.397898] audit: type=1326 audit(1529730200.395:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17912 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:03:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000600)) 05:03:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) getrusage(0x0, &(0x7f00000001c0)) 05:03:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:20 executing program 4: getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) [ 835.641162] audit: type=1326 audit(1529730200.639:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17936 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:20 executing program 6: pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:20 executing program 4: getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x8000502aa}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000040)) 05:03:20 executing program 6: pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) [ 835.972021] audit: type=1326 audit(1529730200.970:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17966 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:21 executing program 4: getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:21 executing program 6: pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) [ 836.561400] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 836.572023] syz-executor5 cpuset=syz5 mems_allowed=0 [ 836.577147] CPU: 0 PID: 17998 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 836.583986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.593430] Call Trace: [ 836.596020] dump_stack+0x185/0x1d0 [ 836.599655] warn_alloc+0x430/0x690 [ 836.603293] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 836.608131] ? kernel_poison_pages+0x40/0x360 [ 836.612629] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 836.618080] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 836.623029] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 836.628055] ? kmsan_set_origin_inline+0x6b/0x120 [ 836.632902] ? __msan_poison_alloca+0x15c/0x1d0 [ 836.637573] kmsan_alloc_page+0x82/0xe0 [ 836.641548] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 836.647118] ? kmsan_set_origin_inline+0x6b/0x120 [ 836.651967] ? __msan_poison_alloca+0x15c/0x1d0 [ 836.656629] ? __should_failslab+0x278/0x2a0 [ 836.661034] ? should_fail+0x57/0xab0 [ 836.664832] ? __should_failslab+0x278/0x2a0 [ 836.669236] ? kmsan_set_origin_inline+0x6b/0x120 [ 836.674076] ? __msan_poison_alloca+0x15c/0x1d0 [ 836.678744] ? kmsan_set_origin+0x9e/0x160 [ 836.682983] alloc_pages_vma+0x1555/0x17f0 [ 836.687221] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 836.692329] handle_mm_fault+0x44ca/0x7ed0 [ 836.696560] ? kmsan_set_origin_inline+0x6b/0x120 [ 836.701410] __do_page_fault+0xec6/0x1a10 [ 836.705566] do_page_fault+0xb7/0x250 [ 836.709372] ? page_fault+0x8/0x30 [ 836.712911] page_fault+0x1e/0x30 [ 836.716355] RIP: 0033:0x4075fa [ 836.719537] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 836.724894] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 836.732155] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 836.739418] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 836.746808] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cc6f0 [ 836.754072] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 836.761339] Mem-Info: [ 836.763761] active_anon:168894 inactive_anon:78 isolated_anon:0 [ 836.763761] active_file:1563 inactive_file:845 isolated_file:0 [ 836.763761] unevictable:0 dirty:40 writeback:0 unstable:0 [ 836.763761] slab_reclaimable:3381 slab_unreclaimable:9504 [ 836.763761] mapped:67208 shmem:84 pagetables:1326 bounce:0 [ 836.763761] free:85960 free_pcp:570 free_cma:0 05:03:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) unshare(0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x28, &(0x7f0000000340)}, 0x10) 05:03:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) [ 836.796778] Node 0 active_anon:675576kB inactive_anon:312kB active_file:6252kB inactive_file:3380kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269180kB dirty:160kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 836.824712] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 836.850849] lowmem_reserve[]: 0 2817 7244 7244 [ 836.855449] Node 0 DMA32 free:282116kB min:26224kB low:32780kB high:39336kB active_anon:197928kB inactive_anon:8kB active_file:508kB inactive_file:380kB unevictable:0kB writepending:92kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2304kB pagetables:2300kB bounce:0kB free_pcp:972kB local_pcp:328kB free_cma:0kB [ 836.884552] lowmem_reserve[]: 0 0 4426 4426 [ 836.888896] Node 0 Normal free:51508kB min:41208kB low:51508kB high:61808kB active_anon:475624kB inactive_anon:304kB active_file:5744kB inactive_file:3000kB unevictable:0kB writepending:68kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:3176kB bounce:0kB free_pcp:1252kB local_pcp:588kB free_cma:0kB [ 836.918326] lowmem_reserve[]: 0 0 0 0 [ 836.922141] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 836.935379] Node 0 DMA32: 5889*4kB (UMEH) 6175*8kB (UME) 1853*16kB (UM) 786*32kB (UM) 440*64kB (UM) 208*128kB (UME) 83*256kB (UM) 44*512kB (M) 17*1024kB (UME) 15*2048kB (UM) 0*4096kB = 274444kB 05:03:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') [ 836.952801] Node 0 Normal: 8981*4kB (UMEH) 1927*8kB (UMEH) 7*16kB (UMH) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51516kB [ 836.966482] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 836.975046] 2506 total pagecache pages [ 836.978918] 0 pages in swap cache [ 836.982348] Swap cache stats: add 0, delete 0, find 0/0 [ 836.987685] Free swap = 0kB [ 836.990677] Total swap = 0kB [ 836.993673] 1965969 pages RAM [ 836.996751] 0 pages HighMem/MovableOnly [ 837.000720] 106316 pages reserved 05:03:22 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:22 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002b}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) [ 837.183881] audit: type=1326 audit(1529730202.182:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18012 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:22 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) [ 837.272692] audit: type=1326 audit(1529730202.206:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18009 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) [ 837.460479] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 837.472425] syz-executor0 cpuset=syz0 mems_allowed=0 [ 837.477565] CPU: 0 PID: 18051 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 837.484400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.493748] Call Trace: [ 837.496340] dump_stack+0x185/0x1d0 [ 837.499975] warn_alloc+0x430/0x690 [ 837.503613] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 837.508454] ? kernel_poison_pages+0x40/0x360 [ 837.512954] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 837.518405] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 837.523351] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 837.528294] ? kmsan_set_origin_inline+0x6b/0x120 [ 837.533139] ? __msan_poison_alloca+0x15c/0x1d0 [ 837.537816] kmsan_alloc_page+0x82/0xe0 [ 837.541791] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 837.546545] ? kmsan_set_origin_inline+0x6b/0x120 [ 837.551383] ? __msan_poison_alloca+0x15c/0x1d0 [ 837.556049] ? __should_failslab+0x278/0x2a0 [ 837.560459] ? should_fail+0x57/0xab0 [ 837.564254] ? __should_failslab+0x278/0x2a0 [ 837.568659] ? kmsan_set_origin_inline+0x6b/0x120 [ 837.573496] ? __msan_poison_alloca+0x15c/0x1d0 [ 837.578165] ? kmsan_set_origin+0x9e/0x160 [ 837.582399] alloc_pages_vma+0x1555/0x17f0 [ 837.586638] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 837.591744] handle_mm_fault+0x44ca/0x7ed0 [ 837.595975] ? kmsan_set_origin_inline+0x6b/0x120 [ 837.600834] __do_page_fault+0xec6/0x1a10 [ 837.604986] do_page_fault+0xb7/0x250 [ 837.608792] ? page_fault+0x8/0x30 [ 837.612329] page_fault+0x1e/0x30 [ 837.615779] RIP: 0033:0x4075fa [ 837.618957] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 837.624313] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 837.631572] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 837.638830] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 837.646091] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cca73 [ 837.653357] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) rt_sigaction(0x0, &(0x7f0000000140), 0x0, 0x8, &(0x7f0000000180)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280)=""/4096, &(0x7f0000000100)=0x1000) 05:03:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) [ 838.922231] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 838.932761] syz-executor7 cpuset=syz7 mems_allowed=0 [ 838.937888] CPU: 0 PID: 18123 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 838.944713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.954056] Call Trace: [ 838.956634] dump_stack+0x185/0x1d0 [ 838.960249] warn_alloc+0x430/0x690 [ 838.963865] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 838.968692] ? kernel_poison_pages+0x40/0x360 [ 838.973172] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 838.978603] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 838.983528] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 838.988458] ? kmsan_set_origin_inline+0x6b/0x120 [ 838.993283] ? __msan_poison_alloca+0x15c/0x1d0 [ 838.997939] kmsan_alloc_page+0x82/0xe0 [ 839.001915] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 839.006652] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.011479] ? __msan_poison_alloca+0x15c/0x1d0 [ 839.016130] ? __should_failslab+0x278/0x2a0 [ 839.020522] ? should_fail+0x57/0xab0 [ 839.024301] ? __should_failslab+0x278/0x2a0 [ 839.028692] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.033516] ? __msan_poison_alloca+0x15c/0x1d0 [ 839.038169] ? kmsan_set_origin+0x9e/0x160 [ 839.042477] alloc_pages_vma+0x1555/0x17f0 [ 839.046707] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 839.051798] handle_mm_fault+0x44ca/0x7ed0 [ 839.056012] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.060843] __do_page_fault+0xec6/0x1a10 [ 839.064986] do_page_fault+0xb7/0x250 [ 839.068770] ? page_fault+0x8/0x30 [ 839.072293] page_fault+0x1e/0x30 [ 839.075723] RIP: 0033:0x4075fa [ 839.078899] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 839.084241] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 839.091490] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 839.098741] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 839.105993] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cd029 [ 839.113242] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 839.120500] warn_alloc_show_mem: 1 callbacks suppressed [ 839.120502] Mem-Info: [ 839.128241] active_anon:170480 inactive_anon:78 isolated_anon:0 [ 839.128241] active_file:1574 inactive_file:822 isolated_file:0 [ 839.128241] unevictable:0 dirty:49 writeback:0 unstable:0 [ 839.128241] slab_reclaimable:3381 slab_unreclaimable:9518 [ 839.128241] mapped:67237 shmem:84 pagetables:1416 bounce:0 [ 839.128241] free:78227 free_pcp:462 free_cma:0 [ 839.161221] Node 0 active_anon:681920kB inactive_anon:312kB active_file:6296kB inactive_file:3288kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268948kB dirty:196kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 264192kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 839.189140] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 839.215249] lowmem_reserve[]: 0 2817 7244 7244 [ 839.219825] Node 0 DMA32 free:245516kB min:26224kB low:32780kB high:39336kB active_anon:206524kB inactive_anon:8kB active_file:508kB inactive_file:416kB unevictable:0kB writepending:128kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:2828kB bounce:0kB free_pcp:308kB local_pcp:88kB free_cma:0kB [ 839.248806] lowmem_reserve[]: 0 0 4426 4426 [ 839.253113] Node 0 Normal free:51488kB min:41208kB low:51508kB high:61808kB active_anon:475392kB inactive_anon:304kB active_file:5788kB inactive_file:2872kB unevictable:0kB writepending:68kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2836kB bounce:0kB free_pcp:1540kB local_pcp:796kB free_cma:0kB [ 839.282517] lowmem_reserve[]: 0 0 0 0 [ 839.286304] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 839.299505] Node 0 DMA32: 5771*4kB (UMEH) 6144*8kB (UME) 1822*16kB (UM) 782*32kB (M) 439*64kB (M) 198*128kB (UME) 84*256kB (UM) 44*512kB (M) 17*1024kB (UME) 2*2048kB (UM) 0*4096kB = 245388kB [ 839.316616] Node 0 Normal: 9104*4kB (MEH) 1874*8kB (UMH) 1*16kB (H) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51488kB [ 839.329919] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 839.338483] 2480 total pagecache pages [ 839.342345] 0 pages in swap cache [ 839.345774] Swap cache stats: add 0, delete 0, find 0/0 [ 839.351112] Free swap = 0kB [ 839.354104] Total swap = 0kB [ 839.357098] 1965969 pages RAM [ 839.360184] 0 pages HighMem/MovableOnly [ 839.364137] 106316 pages reserved [ 839.383350] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 839.393890] syz-executor2 cpuset=syz2 mems_allowed=0 [ 839.399012] CPU: 1 PID: 18129 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 839.405844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.415194] Call Trace: [ 839.417792] dump_stack+0x185/0x1d0 [ 839.421422] warn_alloc+0x430/0x690 [ 839.425074] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 839.429918] ? kernel_poison_pages+0x40/0x360 [ 839.434437] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 839.439912] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 839.444864] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 839.449894] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.454734] ? __msan_poison_alloca+0x15c/0x1d0 [ 839.459411] kmsan_alloc_page+0x82/0xe0 [ 839.463392] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 839.468145] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.472985] ? __msan_poison_alloca+0x15c/0x1d0 [ 839.477658] ? __should_failslab+0x278/0x2a0 [ 839.482701] ? should_fail+0x57/0xab0 [ 839.486502] ? __should_failslab+0x278/0x2a0 [ 839.490915] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.495757] ? __msan_poison_alloca+0x15c/0x1d0 [ 839.500429] ? kmsan_set_origin+0x9e/0x160 [ 839.504675] alloc_pages_vma+0x1555/0x17f0 [ 839.508919] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 839.514031] handle_mm_fault+0x44ca/0x7ed0 [ 839.518264] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.523116] __do_page_fault+0xec6/0x1a10 [ 839.527268] do_page_fault+0xb7/0x250 05:03:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) [ 839.531067] ? page_fault+0x8/0x30 [ 839.534606] page_fault+0x1e/0x30 [ 839.538052] RIP: 0033:0x4075fa [ 839.541235] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 839.546595] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 839.553858] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 839.561124] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 839.568393] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cd1f6 [ 839.575653] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 839.604816] kauditd_printk_skb: 3 callbacks suppressed [ 839.604836] audit: type=1326 audit(1529730204.603:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18139 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) unshare(0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@dev={0xfe, 0x80}, @in6=@loopback={0x0, 0x1}}}, {{@in=@broadcast=0xffffffff}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 05:03:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) [ 839.719506] audit: type=1326 audit(1529730204.718:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18144 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:24 executing program 3: clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') [ 839.801197] audit: type=1326 audit(1529730204.748:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18145 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 839.836720] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 839.847243] syz-executor0 cpuset=syz0 mems_allowed=0 [ 839.852363] CPU: 1 PID: 18154 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 839.859207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.868560] Call Trace: [ 839.871152] dump_stack+0x185/0x1d0 [ 839.874780] warn_alloc+0x430/0x690 [ 839.878416] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 839.883253] ? kernel_poison_pages+0x40/0x360 [ 839.887841] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 839.893278] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 839.898212] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 839.903223] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.908056] ? __msan_poison_alloca+0x15c/0x1d0 [ 839.912718] kmsan_alloc_page+0x82/0xe0 [ 839.916678] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 839.921418] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.926244] ? __msan_poison_alloca+0x15c/0x1d0 [ 839.930898] ? __should_failslab+0x278/0x2a0 [ 839.935291] ? should_fail+0x57/0xab0 [ 839.939078] ? __should_failslab+0x278/0x2a0 [ 839.943471] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.948298] ? __msan_poison_alloca+0x15c/0x1d0 [ 839.952955] ? kmsan_set_origin+0x9e/0x160 [ 839.957182] alloc_pages_vma+0x1555/0x17f0 [ 839.961405] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 839.966509] handle_mm_fault+0x44ca/0x7ed0 [ 839.970727] ? kmsan_set_origin_inline+0x6b/0x120 [ 839.975561] __do_page_fault+0xec6/0x1a10 [ 839.979709] do_page_fault+0xb7/0x250 [ 839.983497] ? page_fault+0x8/0x30 [ 839.987023] page_fault+0x1e/0x30 [ 839.990470] RIP: 0033:0x4075fa [ 839.993647] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 839.998995] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 840.006249] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 840.013505] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 840.020770] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cd3bb [ 840.028021] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 840.035284] warn_alloc_show_mem: 1 callbacks suppressed [ 840.035287] Mem-Info: [ 840.043048] active_anon:170547 inactive_anon:75 isolated_anon:0 [ 840.043048] active_file:1574 inactive_file:831 isolated_file:0 [ 840.043048] unevictable:0 dirty:58 writeback:0 unstable:0 [ 840.043048] slab_reclaimable:3382 slab_unreclaimable:9527 [ 840.043048] mapped:67385 shmem:84 pagetables:1473 bounce:0 [ 840.043048] free:76934 free_pcp:556 free_cma:0 [ 840.076042] Node 0 active_anon:682188kB inactive_anon:300kB active_file:6296kB inactive_file:3324kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269540kB dirty:232kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 840.103962] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 840.130071] lowmem_reserve[]: 0 2817 7244 7244 [ 840.134643] Node 0 DMA32 free:240156kB min:26224kB low:32780kB high:39336kB active_anon:206740kB inactive_anon:12kB active_file:508kB inactive_file:452kB unevictable:0kB writepending:164kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:3032kB bounce:0kB free_pcp:816kB local_pcp:316kB free_cma:0kB [ 840.163795] lowmem_reserve[]: 0 0 4426 4426 [ 840.168103] Node 0 Normal free:51676kB min:41208kB low:51508kB high:61808kB active_anon:475348kB inactive_anon:288kB active_file:5788kB inactive_file:2872kB unevictable:0kB writepending:68kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2860kB bounce:0kB free_pcp:1408kB local_pcp:632kB free_cma:0kB [ 840.197598] lowmem_reserve[]: 0 0 0 0 [ 840.201392] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 840.214590] Node 0 DMA32: 5675*4kB (MEH) 6150*8kB (UME) 1820*16kB (UM) 780*32kB (M) 443*64kB (UM) 197*128kB (ME) 83*256kB (UM) 45*512kB (M) 16*1024kB (ME) 0*2048kB 0*4096kB = 240220kB [ 840.231094] Node 0 Normal: 9128*4kB (UMEH) 1872*8kB (MEH) 2*16kB (UH) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51584kB [ 840.244565] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 840.253116] 2489 total pagecache pages [ 840.256979] 0 pages in swap cache [ 840.260408] Swap cache stats: add 0, delete 0, find 0/0 [ 840.265743] Free swap = 0kB [ 840.268736] Total swap = 0kB [ 840.271730] 1965969 pages RAM [ 840.274812] 0 pages HighMem/MovableOnly [ 840.279629] 106316 pages reserved [ 840.359671] audit: type=1326 audit(1529730205.358:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18129 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:25 executing program 3: clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:25 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:25 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:25 executing program 3: clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:25 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) [ 840.635429] audit: type=1326 audit(1529730205.634:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18182 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:25 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:25 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:25 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) [ 840.874611] audit: type=1326 audit(1529730205.871:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18202 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) getrusage(0x0, &(0x7f00000001c0)) 05:03:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:26 executing program 7: pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) [ 841.579762] audit: type=1326 audit(1529730206.578:1818): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18247 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgid(0xffffffffffffffff) fchdir(0xffffffffffffffff) 05:03:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:26 executing program 7: pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) [ 841.839913] audit: type=1326 audit(1529730206.838:1819): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18268 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:26 executing program 7: pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') [ 841.975214] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 841.985746] syz-executor7 cpuset=syz7 mems_allowed=0 [ 841.990863] CPU: 1 PID: 18277 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 841.997695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.007044] Call Trace: [ 842.009639] dump_stack+0x185/0x1d0 [ 842.013274] warn_alloc+0x430/0x690 [ 842.016920] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 842.021768] ? kernel_poison_pages+0x40/0x360 [ 842.026281] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 842.031763] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 842.036797] ? kmsan_set_origin_inline+0x6b/0x120 [ 842.041643] ? __msan_poison_alloca+0x15c/0x1d0 [ 842.046323] kmsan_alloc_page+0x82/0xe0 [ 842.050300] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 842.055061] ? __x64_sys_pipe2+0x8f/0xd0 [ 842.059131] ? kmsan_set_origin_inline+0x6b/0x120 [ 842.063982] ? __msan_poison_alloca+0x15c/0x1d0 [ 842.068657] ? __should_failslab+0x278/0x2a0 [ 842.073083] ? should_fail+0x57/0xab0 [ 842.076889] ? __should_failslab+0x278/0x2a0 [ 842.081301] ? kmsan_set_origin_inline+0x6b/0x120 [ 842.086147] ? __msan_poison_alloca+0x15c/0x1d0 [ 842.090828] ? kmsan_set_origin+0x9e/0x160 [ 842.095081] alloc_pages_vma+0x1555/0x17f0 [ 842.099327] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 842.104442] handle_mm_fault+0x44ca/0x7ed0 [ 842.108678] ? kmsan_set_origin_inline+0x6b/0x120 [ 842.113534] __do_page_fault+0xec6/0x1a10 [ 842.117695] do_page_fault+0xb7/0x250 [ 842.121501] page_fault+0x1e/0x30 [ 842.124956] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 842.130571] RSP: 0018:ffff88000e31fdb8 EFLAGS: 00010202 [ 842.135929] RAX: ffffffff83ffaf9b RBX: 0000000020000000 RCX: 0000000000000001 [ 842.143202] RDX: 0000000000000000 RSI: ffff88000e31fe38 RDI: 0000000020000040 [ 842.150478] RBP: ffff88000e31fe20 R08: 0000001400000013 R09: 0000000000000002 [ 842.157754] R10: 0000000000000002 R11: ffffffff81cf1810 R12: 0000000000000000 [ 842.165027] R13: ffff88000e31fdc0 R14: 0000000000000000 R15: ffff8800664b2618 [ 842.172316] ? __do_pipe_flags+0x420/0x420 [ 842.176557] ? _copy_to_user+0xbb/0x180 [ 842.180537] ? _copy_to_user+0xed/0x180 [ 842.184515] do_pipe2+0x138/0x320 [ 842.187978] __x64_sys_pipe2+0x8f/0xd0 [ 842.191867] ? __do_pipe_flags+0x420/0x420 [ 842.196097] do_syscall_64+0x15b/0x230 [ 842.199992] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 842.205177] RIP: 0033:0x455a99 [ 842.208361] RSP: 002b:00007f9a0d307c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000125 [ 842.216077] RAX: ffffffffffffffda RBX: 00007f9a0d3086d4 RCX: 0000000000455a99 [ 842.223368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 842.230654] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 842.237904] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 842.245152] R13: 00000000004c05f6 R14: 00000000004cff18 R15: 0000000000000000 [ 842.252411] Mem-Info: [ 842.254811] active_anon:169435 inactive_anon:78 isolated_anon:0 [ 842.254811] active_file:1649 inactive_file:920 isolated_file:0 [ 842.254811] unevictable:0 dirty:64 writeback:0 unstable:0 [ 842.254811] slab_reclaimable:3382 slab_unreclaimable:9521 [ 842.254811] mapped:67321 shmem:84 pagetables:1325 bounce:0 [ 842.254811] free:80758 free_pcp:573 free_cma:0 [ 842.287782] Node 0 active_anon:677740kB inactive_anon:312kB active_file:6596kB inactive_file:3680kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269284kB dirty:256kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 842.315704] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 842.341811] lowmem_reserve[]: 0 2817 7244 7244 [ 842.346393] Node 0 DMA32 free:255712kB min:26224kB low:32780kB high:39336kB active_anon:202456kB inactive_anon:20kB active_file:804kB inactive_file:784kB unevictable:0kB writepending:164kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2368kB pagetables:2444kB bounce:0kB free_pcp:800kB local_pcp:204kB free_cma:0kB [ 842.375534] lowmem_reserve[]: 0 0 4426 4426 [ 842.379844] Node 0 Normal free:51416kB min:41208kB low:51508kB high:61808kB active_anon:475284kB inactive_anon:292kB active_file:5792kB inactive_file:2896kB unevictable:0kB writepending:92kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2856kB bounce:0kB free_pcp:1492kB local_pcp:764kB free_cma:0kB [ 842.409245] lowmem_reserve[]: 0 0 0 0 [ 842.413035] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 842.426278] Node 0 DMA32: 5856*4kB (UMEH) 6218*8kB (UME) 1825*16kB (UM) 780*32kB (UM) 455*64kB (UM) 200*128kB (UME) 82*256kB (UM) 45*512kB (M) 17*1024kB (ME) 6*2048kB (UM) 0*4096kB = 255776kB [ 842.443520] Node 0 Normal: 9099*4kB (UMEH) 1883*8kB (UMH) 2*16kB (UH) 1*32kB (U) 2*64kB (UH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51652kB [ 842.457417] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 842.466175] 2653 total pagecache pages [ 842.470172] 0 pages in swap cache [ 842.473598] Swap cache stats: add 0, delete 0, find 0/0 [ 842.478932] Free swap = 0kB [ 842.481926] Total swap = 0kB [ 842.484918] 1965969 pages RAM [ 842.488006] 0 pages HighMem/MovableOnly [ 842.491963] 106316 pages reserved 05:03:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) uname(&(0x7f0000000040)=""/64) 05:03:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') [ 842.637598] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 842.648123] syz-executor2 cpuset=syz2 mems_allowed=0 [ 842.653239] CPU: 1 PID: 18289 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 842.660068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.669407] Call Trace: [ 842.671982] dump_stack+0x185/0x1d0 [ 842.675597] warn_alloc+0x430/0x690 [ 842.679214] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 842.684041] ? apic_timer_interrupt+0xa/0x20 [ 842.688439] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 842.693956] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 842.698892] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 842.703900] ? kmsan_set_origin_inline+0x6b/0x120 [ 842.708723] ? __msan_poison_alloca+0x15c/0x1d0 [ 842.713383] kmsan_alloc_page+0x82/0xe0 [ 842.717340] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 842.722082] ? kmsan_set_origin_inline+0x6b/0x120 [ 842.726907] ? __msan_poison_alloca+0x15c/0x1d0 [ 842.731558] ? __should_failslab+0x278/0x2a0 [ 842.735949] ? should_fail+0x57/0xab0 [ 842.739728] ? __should_failslab+0x278/0x2a0 [ 842.744118] ? kmsan_set_origin_inline+0x6b/0x120 [ 842.748941] ? __msan_poison_alloca+0x15c/0x1d0 [ 842.753592] ? kmsan_set_origin+0x9e/0x160 [ 842.757813] alloc_pages_vma+0x1555/0x17f0 [ 842.762035] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 842.767132] handle_mm_fault+0x44ca/0x7ed0 [ 842.771348] ? kmsan_set_origin_inline+0x6b/0x120 [ 842.776180] __do_page_fault+0xec6/0x1a10 [ 842.780319] do_page_fault+0xb7/0x250 [ 842.784450] ? page_fault+0x8/0x30 [ 842.787971] page_fault+0x1e/0x30 [ 842.791404] RIP: 0033:0x4075fa [ 842.794573] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 842.799913] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 842.807166] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 842.814424] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 842.821675] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cdeac [ 842.828927] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:27 executing program 4: 05:03:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) uname(&(0x7f0000000040)=""/64) 05:03:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 843.434303] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 843.444835] syz-executor7 cpuset=syz7 mems_allowed=0 [ 843.449944] CPU: 1 PID: 18342 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 843.456768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.466107] Call Trace: [ 843.468695] dump_stack+0x185/0x1d0 [ 843.472307] warn_alloc+0x430/0x690 [ 843.475924] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 843.481483] ? kernel_poison_pages+0x40/0x360 [ 843.485969] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 843.491412] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 843.496337] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 843.501257] ? kmsan_set_origin_inline+0x6b/0x120 [ 843.506085] ? __msan_poison_alloca+0x15c/0x1d0 [ 843.510741] kmsan_alloc_page+0x82/0xe0 [ 843.514699] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 843.519452] ? kmsan_set_origin_inline+0x6b/0x120 [ 843.524275] ? __msan_poison_alloca+0x15c/0x1d0 [ 843.528928] ? __should_failslab+0x278/0x2a0 [ 843.533323] ? should_fail+0x57/0xab0 [ 843.537103] ? __should_failslab+0x278/0x2a0 [ 843.541494] ? kmsan_set_origin_inline+0x6b/0x120 [ 843.546319] ? __msan_poison_alloca+0x15c/0x1d0 [ 843.550973] ? kmsan_set_origin+0x9e/0x160 [ 843.555198] alloc_pages_vma+0x1555/0x17f0 [ 843.559421] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 843.564511] handle_mm_fault+0x44ca/0x7ed0 [ 843.568726] ? kmsan_set_origin_inline+0x6b/0x120 [ 843.573568] __do_page_fault+0xec6/0x1a10 [ 843.577707] do_page_fault+0xb7/0x250 [ 843.581492] ? page_fault+0x8/0x30 [ 843.585016] page_fault+0x1e/0x30 [ 843.588450] RIP: 0033:0x4075fa [ 843.591620] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 843.596964] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 843.604215] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 843.611470] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 843.618719] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ce1c9 [ 843.625969] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 843.633238] warn_alloc_show_mem: 1 callbacks suppressed [ 843.633241] Mem-Info: [ 843.640982] active_anon:168885 inactive_anon:78 isolated_anon:0 [ 843.640982] active_file:1712 inactive_file:942 isolated_file:24 [ 843.640982] unevictable:0 dirty:73 writeback:0 unstable:0 [ 843.640982] slab_reclaimable:3382 slab_unreclaimable:9526 [ 843.640982] mapped:67345 shmem:84 pagetables:1417 bounce:0 [ 843.640982] free:76915 free_pcp:411 free_cma:0 [ 843.674059] Node 0 active_anon:675540kB inactive_anon:312kB active_file:6848kB inactive_file:3768kB unevictable:0kB isolated(anon):0kB isolated(file):96kB mapped:269380kB dirty:292kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 843.702066] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 843.728174] lowmem_reserve[]: 0 2817 7244 7244 [ 843.732747] Node 0 DMA32 free:240388kB min:26224kB low:32780kB high:39336kB active_anon:200256kB inactive_anon:28kB active_file:920kB inactive_file:816kB unevictable:0kB writepending:188kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:2812kB bounce:0kB free_pcp:252kB local_pcp:128kB free_cma:0kB [ 843.761892] lowmem_reserve[]: 0 0 4426 4426 [ 843.766201] Node 0 Normal free:51368kB min:41208kB low:51508kB high:61808kB active_anon:475312kB inactive_anon:284kB active_file:5696kB inactive_file:2836kB unevictable:0kB writepending:104kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2856kB bounce:0kB free_pcp:1392kB local_pcp:704kB free_cma:0kB [ 843.795693] lowmem_reserve[]: 0 0 0 0 [ 843.799490] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 843.812688] Node 0 DMA32: 5507*4kB (UMEH) 6137*8kB (UME) 1819*16kB (UM) 780*32kB (UM) 442*64kB (UM) 197*128kB (UME) 81*256kB (M) 46*512kB (UM) 17*1024kB (ME) 0*2048kB 0*4096kB = 240388kB [ 843.829455] Node 0 Normal: 9069*4kB (UMEH) 1871*8kB (UMH) 6*16kB (UMH) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51404kB [ 843.843002] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 843.851552] 2761 total pagecache pages [ 843.855413] 0 pages in swap cache [ 843.858852] Swap cache stats: add 0, delete 0, find 0/0 [ 843.864191] Free swap = 0kB [ 843.867184] Total swap = 0kB [ 843.870193] 1965969 pages RAM [ 843.873276] 0 pages HighMem/MovableOnly [ 843.877223] 106316 pages reserved 05:03:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) uname(&(0x7f0000000040)=""/64) 05:03:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:29 executing program 2: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:29 executing program 1: pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) [ 844.213199] audit: type=1326 audit(1529730209.211:1820): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18377 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) [ 844.318411] audit: type=1326 audit(1529730209.313:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18382 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) 05:03:29 executing program 2: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:29 executing program 1: pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:29 executing program 2: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:29 executing program 1: pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') [ 845.134539] kauditd_printk_skb: 1 callbacks suppressed [ 845.134563] audit: type=1326 audit(1529730210.133:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18432 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pkey_alloc(0x0, 0x0) [ 845.236497] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 845.236507] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 845.236517] syz-executor2 cpuset= [ 845.247028] syz-executor7 cpuset= [ 845.257507] syz2 mems_allowed=0 [ 845.264361] syz7 mems_allowed=0 [ 845.267632] CPU: 0 PID: 18439 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 845.277697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.287036] Call Trace: [ 845.289614] dump_stack+0x185/0x1d0 [ 845.293226] warn_alloc+0x430/0x690 [ 845.296849] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 845.301677] ? kernel_poison_pages+0x40/0x360 [ 845.306157] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 845.311588] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 845.316515] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 845.321522] ? kmsan_set_origin_inline+0x6b/0x120 [ 845.326348] ? __msan_poison_alloca+0x15c/0x1d0 [ 845.331008] kmsan_alloc_page+0x82/0xe0 [ 845.334968] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 845.339709] ? kmsan_set_origin_inline+0x6b/0x120 [ 845.344544] ? __msan_poison_alloca+0x15c/0x1d0 [ 845.349195] ? __should_failslab+0x278/0x2a0 [ 845.353591] ? should_fail+0x57/0xab0 [ 845.357373] ? __should_failslab+0x278/0x2a0 [ 845.361766] ? kmsan_set_origin_inline+0x6b/0x120 [ 845.366593] ? __msan_poison_alloca+0x15c/0x1d0 [ 845.371249] ? kmsan_set_origin+0x9e/0x160 [ 845.375474] alloc_pages_vma+0x1555/0x17f0 [ 845.379715] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 845.384811] handle_mm_fault+0x44ca/0x7ed0 [ 845.389028] ? kmsan_set_origin_inline+0x6b/0x120 [ 845.393863] __do_page_fault+0xec6/0x1a10 [ 845.398008] do_page_fault+0xb7/0x250 [ 845.401794] ? page_fault+0x8/0x30 [ 845.405314] page_fault+0x1e/0x30 [ 845.408745] RIP: 0033:0x4075fa [ 845.411919] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 845.417263] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 845.424515] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 845.431783] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 845.439033] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ce8d3 [ 845.446288] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 845.453542] Mem-Info: [ 845.453553] CPU: 1 PID: 18435 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 845.453562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.455960] active_anon:169957 inactive_anon:78 isolated_anon:0 [ 845.455960] active_file:1720 inactive_file:967 isolated_file:0 [ 845.455960] unevictable:0 dirty:79 writeback:0 unstable:0 [ 845.455960] slab_reclaimable:3382 slab_unreclaimable:9529 [ 845.455960] mapped:67373 shmem:84 pagetables:1453 bounce:0 [ 845.455960] free:76104 free_pcp:429 free_cma:0 [ 845.462778] Call Trace: [ 845.472151] Node 0 active_anon:679828kB inactive_anon:312kB active_file:6880kB inactive_file:3868kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269492kB dirty:316kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 845.505994] dump_stack+0x185/0x1d0 [ 845.508544] Node 0 [ 845.536461] warn_alloc+0x430/0x690 [ 845.540071] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 845.542282] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 845.545870] lowmem_reserve[]: [ 845.571880] ? kernel_poison_pages+0x40/0x360 [ 845.576702] 0 [ 845.579790] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 845.584246] 2817 [ 845.586031] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 845.591443] 7244 [ 845.593506] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 845.598388] 7244 [ 845.600454] kmsan_alloc_page+0x82/0xe0 [ 845.607380] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 845.611312] Node 0 DMA32 free:237012kB min:26224kB low:32780kB high:39336kB active_anon:204544kB inactive_anon:36kB active_file:920kB inactive_file:904kB unevictable:0kB writepending:212kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2752kB pagetables:2988kB bounce:0kB free_pcp:324kB local_pcp:128kB free_cma:0kB [ 845.616064] ? kmsan_set_origin_inline+0x6b/0x120 [ 845.616080] ? __msan_poison_alloca+0x15c/0x1d0 [ 845.645197] lowmem_reserve[]: [ 845.650024] ? __should_failslab+0x278/0x2a0 [ 845.654658] 0 [ 845.657749] ? should_fail+0x57/0xab0 [ 845.662123] 0 [ 845.663908] ? __should_failslab+0x278/0x2a0 [ 845.667685] 4426 [ 845.669471] ? kmsan_set_origin_inline+0x6b/0x120 [ 845.673842] 4426 [ 845.675898] ? __msan_poison_alloca+0x15c/0x1d0 [ 845.682758] ? kmsan_set_origin+0x9e/0x160 [ 845.687402] Node 0 Normal free:51500kB min:41208kB low:51508kB high:61808kB active_anon:475284kB inactive_anon:276kB active_file:5960kB inactive_file:2964kB unevictable:0kB writepending:104kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2824kB bounce:0kB free_pcp:1392kB local_pcp:688kB free_cma:0kB [ 845.691723] alloc_pages_vma+0x1555/0x17f0 [ 845.691742] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 845.721202] lowmem_reserve[]: [ 845.725429] handle_mm_fault+0x44ca/0x7ed0 [ 845.730494] 0 [ 845.733583] ? kmsan_set_origin_inline+0x6b/0x120 [ 845.737780] 0 [ 845.739576] __do_page_fault+0xec6/0x1a10 [ 845.744372] 0 [ 845.746166] do_page_fault+0xb7/0x250 [ 845.750284] 0 [ 845.752072] ? page_fault+0x8/0x30 [ 845.757615] page_fault+0x1e/0x30 [ 845.761122] Node 0 [ 845.764560] RIP: 0033:0x4075fa [ 845.764562] DMA: 0*4kB [ 845.766783] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 845.769949] 0*8kB [ 845.777843] 0*16kB [ 845.779974] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 845.779977] 1*32kB (U) [ 845.782196] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 845.789436] 2*64kB [ 845.791995] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 845.799238] (U) [ 845.801451] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ce8d4 [ 845.808692] 1*128kB [ 845.810657] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 845.817895] (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 845.835464] Node 0 DMA32: 5461*4kB (UMH) 6132*8kB (UM) 1813*16kB (M) 776*32kB (UM) 435*64kB (M) 194*128kB (UM) 81*256kB (UM) 45*512kB (UM) 15*1024kB (M) 1*2048kB (M) 0*4096kB = 238596kB [ 845.838823] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 845.852178] Node 0 [ 845.862648] syz-executor5 cpuset= [ 845.862650] Normal: 9069*4kB [ 845.864866] syz5 [ 845.868295] (UMEH) [ 845.871418] mems_allowed=0 [ 845.873363] 1871*8kB [ 845.875581] CPU: 1 PID: 18443 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 845.878478] (UMH) [ 845.880867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.887678] 6*16kB [ 845.889801] Call Trace: [ 845.899126] (UMH) [ 845.901349] dump_stack+0x185/0x1d0 [ 845.903897] 1*32kB [ 845.906040] warn_alloc+0x430/0x690 [ 845.909639] (U) [ 845.911866] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 845.915454] 2*64kB [ 845.917413] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 845.922224] (UH) [ 845.924445] ? try_to_wake_up+0x1cfd/0x2260 [ 845.929868] 0*128kB [ 845.931930] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 845.936200] 0*256kB [ 845.938515] ? kmsan_set_origin_inline+0x6b/0x120 [ 845.943400] 0*512kB [ 845.945702] ? __msan_poison_alloca+0x15c/0x1d0 [ 845.950510] 0*1024kB [ 845.952820] kmsan_alloc_page+0x82/0xe0 [ 845.957449] 0*2048kB [ 845.959844] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 845.963792] 0*4096kB [ 845.966184] ? kmsan_set_origin_inline+0x6b/0x120 [ 845.970912] = 51500kB [ 845.973305] ? __msan_poison_alloca+0x15c/0x1d0 [ 845.978115] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 845.980502] ? __should_failslab+0x278/0x2a0 [ 845.985138] 2771 total pagecache pages [ 845.993697] ? should_fail+0x57/0xab0 [ 845.998068] 0 pages in swap cache [ 846.001933] ? __should_failslab+0x278/0x2a0 [ 846.005701] Swap cache stats: add 0, delete 0, find 0/0 [ 846.009307] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.013680] Free swap = 0kB [ 846.019019] ? __msan_poison_alloca+0x15c/0x1d0 [ 846.023825] Total swap = 0kB [ 846.026823] ? kmsan_set_origin+0x9e/0x160 [ 846.031455] 1965969 pages RAM [ 846.034460] alloc_pages_vma+0x1555/0x17f0 [ 846.038658] 0 pages HighMem/MovableOnly [ 846.041756] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 846.045953] 106316 pages reserved [ 846.049911] handle_mm_fault+0x44ca/0x7ed0 [ 846.062644] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.067513] __do_page_fault+0xec6/0x1a10 [ 846.069084] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 846.071664] do_page_fault+0xb7/0x250 [ 846.082117] syz-executor6 cpuset= [ 846.085894] ? page_fault+0x8/0x30 [ 846.085896] syz6 mems_allowed=0 [ 846.089344] page_fault+0x1e/0x30 [ 846.099573] RIP: 0033:0x4075fa [ 846.102742] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 846.108083] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 846.115334] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 846.122586] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 846.129839] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ceb2e 05:03:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) [ 846.137092] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 846.144354] CPU: 0 PID: 18436 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 846.151185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.160531] Call Trace: [ 846.163122] dump_stack+0x185/0x1d0 [ 846.166748] warn_alloc+0x430/0x690 [ 846.170385] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 846.175227] ? kernel_poison_pages+0x40/0x360 [ 846.179729] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 846.185181] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 846.190995] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 846.196025] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.200862] ? __msan_poison_alloca+0x15c/0x1d0 [ 846.205525] kmsan_alloc_page+0x82/0xe0 [ 846.209487] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 846.214229] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.219063] ? __msan_poison_alloca+0x15c/0x1d0 [ 846.223717] ? __should_failslab+0x278/0x2a0 [ 846.228110] ? should_fail+0x57/0xab0 [ 846.231891] ? __should_failslab+0x278/0x2a0 [ 846.236281] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.241102] ? __msan_poison_alloca+0x15c/0x1d0 [ 846.245752] ? kmsan_set_origin+0x9e/0x160 [ 846.249976] alloc_pages_vma+0x1555/0x17f0 [ 846.254196] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 846.259298] handle_mm_fault+0x44ca/0x7ed0 [ 846.263511] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.268343] __do_page_fault+0xec6/0x1a10 [ 846.272479] do_page_fault+0xb7/0x250 [ 846.276264] ? page_fault+0x8/0x30 [ 846.279786] page_fault+0x1e/0x30 [ 846.283221] RIP: 0033:0x4075fa [ 846.286395] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 846.291736] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 846.298987] RDX: 935e9f582c8804e2 RSI: 0000000000000000 RDI: 0000000001de4848 [ 846.306248] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 846.313500] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cec14 [ 846.320751] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 846.328007] warn_alloc_show_mem: 2 callbacks suppressed [ 846.328011] Mem-Info: [ 846.335758] active_anon:169969 inactive_anon:76 isolated_anon:0 [ 846.335758] active_file:1720 inactive_file:968 isolated_file:0 [ 846.335758] unevictable:0 dirty:79 writeback:0 unstable:0 [ 846.335758] slab_reclaimable:3382 slab_unreclaimable:9529 [ 846.335758] mapped:67403 shmem:84 pagetables:1452 bounce:0 [ 846.335758] free:76367 free_pcp:403 free_cma:0 [ 846.368741] Node 0 active_anon:679876kB inactive_anon:304kB active_file:6880kB inactive_file:3872kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269612kB dirty:316kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 846.396659] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 846.422768] lowmem_reserve[]: 0 2817 7244 7244 [ 846.427340] Node 0 DMA32 free:238064kB min:26224kB low:32780kB high:39336kB active_anon:204592kB inactive_anon:28kB active_file:920kB inactive_file:908kB unevictable:0kB writepending:212kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:2984kB bounce:0kB free_pcp:220kB local_pcp:116kB free_cma:0kB [ 846.456488] lowmem_reserve[]: 0 0 4426 4426 [ 846.460801] Node 0 Normal free:51500kB min:41208kB low:51508kB high:61808kB active_anon:475284kB inactive_anon:276kB active_file:5960kB inactive_file:2964kB unevictable:0kB writepending:104kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2824kB bounce:0kB free_pcp:1392kB local_pcp:688kB free_cma:0kB [ 846.490303] lowmem_reserve[]: 0 0 0 0 [ 846.494092] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 846.507293] Node 0 DMA32: 5440*4kB (MH) 6132*8kB (UM) 1813*16kB (M) 776*32kB (UM) 435*64kB (M) 194*128kB (UM) 81*256kB (UM) 44*512kB (M) 15*1024kB (M) 1*2048kB (M) 0*4096kB = 238000kB [ 846.523799] Node 0 Normal: 9069*4kB (UMEH) 1871*8kB (UMH) 6*16kB (UMH) 1*32kB (U) 2*64kB (UH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51500kB [ 846.537785] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 846.546338] 2772 total pagecache pages [ 846.550200] 0 pages in swap cache [ 846.553634] Swap cache stats: add 0, delete 0, find 0/0 [ 846.558975] Free swap = 0kB [ 846.561968] Total swap = 0kB [ 846.564961] 1965969 pages RAM [ 846.568041] 0 pages HighMem/MovableOnly [ 846.571999] 106316 pages reserved 05:03:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) [ 846.584740] audit: type=1326 audit(1529730211.580:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18445 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:31 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000001c0)='veth1_to_bridge\x00') 05:03:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pkey_alloc(0x0, 0x0) [ 846.692289] audit: type=1326 audit(1529730211.612:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18443 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 846.763135] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 846.773667] syz-executor3 cpuset=syz3 mems_allowed=0 [ 846.778787] CPU: 1 PID: 18460 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 846.785615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.794960] Call Trace: [ 846.797546] dump_stack+0x185/0x1d0 [ 846.801168] warn_alloc+0x430/0x690 [ 846.804803] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 846.809645] ? kernel_poison_pages+0x40/0x360 [ 846.814146] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 846.819598] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 846.824553] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 846.829580] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.834424] ? __msan_poison_alloca+0x15c/0x1d0 [ 846.839356] kmsan_alloc_page+0x82/0xe0 [ 846.843335] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 846.848084] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.852913] ? __msan_poison_alloca+0x15c/0x1d0 [ 846.857568] ? __should_failslab+0x278/0x2a0 [ 846.861963] ? should_fail+0x57/0xab0 [ 846.865743] ? __should_failslab+0x278/0x2a0 [ 846.870135] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.874958] ? __msan_poison_alloca+0x15c/0x1d0 [ 846.879609] ? kmsan_set_origin+0x9e/0x160 [ 846.883832] alloc_pages_vma+0x1555/0x17f0 [ 846.888063] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 846.893162] handle_mm_fault+0x44ca/0x7ed0 [ 846.897382] ? kmsan_set_origin_inline+0x6b/0x120 [ 846.902214] __do_page_fault+0xec6/0x1a10 [ 846.906350] do_page_fault+0xb7/0x250 [ 846.910136] ? page_fault+0x8/0x30 05:03:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) [ 846.913664] page_fault+0x1e/0x30 [ 846.917098] RIP: 0033:0x4075fa [ 846.920266] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 846.925618] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 846.932871] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 [ 846.940121] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 846.947374] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ceeca [ 846.954631] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) [ 847.024796] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 847.035322] syz-executor1 cpuset=syz1 mems_allowed=0 [ 847.040439] CPU: 1 PID: 18471 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 847.047471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.056982] Call Trace: [ 847.059571] dump_stack+0x185/0x1d0 [ 847.063198] warn_alloc+0x430/0x690 [ 847.066816] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 847.071643] ? kernel_poison_pages+0x40/0x360 [ 847.076128] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 847.081582] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 847.087293] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 847.092299] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.097133] ? __msan_poison_alloca+0x15c/0x1d0 [ 847.101790] kmsan_alloc_page+0x82/0xe0 [ 847.105750] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 847.110489] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.115313] ? __msan_poison_alloca+0x15c/0x1d0 [ 847.119961] ? __should_failslab+0x278/0x2a0 [ 847.124354] ? should_fail+0x57/0xab0 [ 847.128138] ? __should_failslab+0x278/0x2a0 [ 847.132526] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.137347] ? __msan_poison_alloca+0x15c/0x1d0 [ 847.141998] ? kmsan_set_origin+0x9e/0x160 [ 847.146222] alloc_pages_vma+0x1555/0x17f0 [ 847.150451] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 847.155541] handle_mm_fault+0x44ca/0x7ed0 [ 847.159760] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.164594] __do_page_fault+0xec6/0x1a10 [ 847.168729] do_page_fault+0xb7/0x250 05:03:32 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000240)) 05:03:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 847.172511] ? page_fault+0x8/0x30 [ 847.176032] page_fault+0x1e/0x30 [ 847.179470] RIP: 0033:0x4075fa [ 847.182640] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 847.187981] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 847.195319] RDX: 28865427f26a51b5 RSI: 0000000000000000 RDI: 0000000000e1e848 [ 847.202568] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 847.209830] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cefd0 [ 847.217080] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 847.255848] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 847.266382] syz-executor5 cpuset=syz5 mems_allowed=0 [ 847.271517] CPU: 0 PID: 18476 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 847.278354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.287700] Call Trace: [ 847.290291] dump_stack+0x185/0x1d0 [ 847.293921] warn_alloc+0x430/0x690 [ 847.297563] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 847.302405] ? kernel_poison_pages+0x40/0x360 [ 847.306914] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 847.312364] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 847.317311] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 847.322256] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.327100] ? __msan_poison_alloca+0x15c/0x1d0 [ 847.331788] kmsan_alloc_page+0x82/0xe0 [ 847.335762] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 847.340521] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.345360] ? __msan_poison_alloca+0x15c/0x1d0 [ 847.350024] ? __should_failslab+0x278/0x2a0 [ 847.354429] ? should_fail+0x57/0xab0 [ 847.358214] ? __should_failslab+0x278/0x2a0 [ 847.362602] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.367426] ? __msan_poison_alloca+0x15c/0x1d0 [ 847.372078] ? kmsan_set_origin+0x9e/0x160 [ 847.376321] alloc_pages_vma+0x1555/0x17f0 [ 847.380545] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 847.385635] handle_mm_fault+0x44ca/0x7ed0 [ 847.389851] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.394682] __do_page_fault+0xec6/0x1a10 [ 847.398820] do_page_fault+0xb7/0x250 [ 847.402602] ? page_fault+0x8/0x30 [ 847.406122] page_fault+0x1e/0x30 [ 847.409555] RIP: 0033:0x4075fa [ 847.412723] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 847.418071] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 847.425321] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 847.432572] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 847.439821] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cf0b7 [ 847.447073] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 847.454329] warn_alloc_show_mem: 2 callbacks suppressed [ 847.454331] Mem-Info: [ 847.462080] active_anon:170012 inactive_anon:74 isolated_anon:0 [ 847.462080] active_file:1428 inactive_file:1050 isolated_file:32 [ 847.462080] unevictable:0 dirty:97 writeback:0 unstable:0 [ 847.462080] slab_reclaimable:3382 slab_unreclaimable:9526 [ 847.462080] mapped:67447 shmem:84 pagetables:1519 bounce:0 [ 847.462080] free:76321 free_pcp:569 free_cma:0 [ 847.495240] Node 0 active_anon:680048kB inactive_anon:296kB active_file:5712kB inactive_file:4200kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:269788kB dirty:388kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 264192kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 847.523327] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 847.549435] lowmem_reserve[]: 0 2817 7244 7244 [ 847.554002] Node 0 DMA32 free:237404kB min:26224kB low:32780kB high:39336kB active_anon:204764kB inactive_anon:20kB active_file:928kB inactive_file:976kB unevictable:0kB writepending:284kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2944kB pagetables:3252kB bounce:0kB free_pcp:812kB local_pcp:148kB free_cma:0kB [ 847.583151] lowmem_reserve[]: 0 0 4426 4426 [ 847.587460] Node 0 Normal free:51976kB min:41208kB low:51508kB high:61808kB active_anon:475284kB inactive_anon:276kB active_file:4836kB inactive_file:2964kB unevictable:0kB writepending:104kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2824kB bounce:0kB free_pcp:1464kB local_pcp:688kB free_cma:0kB [ 847.616950] lowmem_reserve[]: 0 0 0 0 [ 847.620739] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 847.633941] Node 0 DMA32: 5503*4kB (UMH) 6144*8kB (UM) 1816*16kB (UM) 777*32kB (UM) 443*64kB (UM) 193*128kB (UM) 80*256kB (M) 44*512kB (M) 16*1024kB (UM) 0*2048kB 0*4096kB = 237532kB [ 847.650355] Node 0 Normal: 9163*4kB (UMEH) 1911*8kB (UMH) 9*16kB (UMH) 0*32kB 2*64kB (UH) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52340kB [ 847.664342] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 847.672894] 2588 total pagecache pages [ 847.676757] 0 pages in swap cache [ 847.680186] Swap cache stats: add 0, delete 0, find 0/0 [ 847.685522] Free swap = 0kB [ 847.688517] Total swap = 0kB [ 847.691510] 1965969 pages RAM [ 847.694588] 0 pages HighMem/MovableOnly [ 847.698548] 106316 pages reserved 05:03:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000280)) [ 847.706946] audit: type=1326 audit(1529730212.702:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18460 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 847.746534] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 847.757056] syz-executor2 cpuset=syz2 mems_allowed=0 [ 847.762161] CPU: 0 PID: 18478 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 847.768982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.778321] Call Trace: [ 847.780902] dump_stack+0x185/0x1d0 [ 847.784511] warn_alloc+0x430/0x690 [ 847.788126] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 847.792964] ? kernel_poison_pages+0x40/0x360 [ 847.797446] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 847.802897] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 847.807821] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 847.812741] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.817562] ? __msan_poison_alloca+0x15c/0x1d0 [ 847.822218] kmsan_alloc_page+0x82/0xe0 [ 847.826177] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 847.830914] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.835737] ? __msan_poison_alloca+0x15c/0x1d0 [ 847.840386] ? __should_failslab+0x278/0x2a0 [ 847.844777] ? should_fail+0x57/0xab0 [ 847.848562] ? __should_failslab+0x278/0x2a0 [ 847.852965] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.857787] ? __msan_poison_alloca+0x15c/0x1d0 [ 847.862440] ? kmsan_set_origin+0x9e/0x160 [ 847.866664] alloc_pages_vma+0x1555/0x17f0 [ 847.870892] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 847.875982] handle_mm_fault+0x44ca/0x7ed0 [ 847.880200] ? kmsan_set_origin_inline+0x6b/0x120 [ 847.885035] __do_page_fault+0xec6/0x1a10 [ 847.889177] do_page_fault+0xb7/0x250 [ 847.892961] ? page_fault+0x8/0x30 [ 847.896500] page_fault+0x1e/0x30 [ 847.899944] RIP: 0033:0x4075fa [ 847.903112] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:03:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) [ 847.908454] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 847.915702] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 847.922951] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 847.930201] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cf29f [ 847.937451] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:32 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:33 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 848.020431] audit: type=1326 audit(1529730212.736:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18464 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 848.040270] audit: type=1326 audit(1529730212.948:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18483 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) [ 848.148949] audit: type=1326 audit(1529730213.147:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18476 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:33 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 848.268568] audit: type=1326 audit(1529730213.266:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18503 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) pkey_alloc(0x0, 0x0) 05:03:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:33 executing program 6: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:33 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) [ 848.763619] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 848.774149] syz-executor6 cpuset=syz6 mems_allowed=0 [ 848.779273] CPU: 1 PID: 18546 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 848.786105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.795454] Call Trace: [ 848.798053] dump_stack+0x185/0x1d0 [ 848.801690] warn_alloc+0x430/0x690 [ 848.805331] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 848.810169] ? kernel_poison_pages+0x40/0x360 [ 848.814654] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 848.820092] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 848.825022] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 848.829951] ? kmsan_set_origin_inline+0x6b/0x120 [ 848.834777] ? __msan_poison_alloca+0x15c/0x1d0 [ 848.839442] kmsan_alloc_page+0x82/0xe0 [ 848.843401] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 848.848142] ? kmsan_set_origin_inline+0x6b/0x120 [ 848.852968] ? __msan_poison_alloca+0x15c/0x1d0 [ 848.857619] ? __should_failslab+0x278/0x2a0 [ 848.862009] ? should_fail+0x57/0xab0 [ 848.865789] ? __should_failslab+0x278/0x2a0 [ 848.870178] ? kmsan_set_origin_inline+0x6b/0x120 [ 848.875000] ? __msan_poison_alloca+0x15c/0x1d0 [ 848.879651] ? kmsan_set_origin+0x9e/0x160 [ 848.883873] alloc_pages_vma+0x1555/0x17f0 [ 848.888096] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 848.893187] handle_mm_fault+0x44ca/0x7ed0 [ 848.897404] ? kmsan_set_origin_inline+0x6b/0x120 [ 848.902239] __do_page_fault+0xec6/0x1a10 [ 848.906373] do_page_fault+0xb7/0x250 [ 848.910161] ? page_fault+0x8/0x30 [ 848.913684] page_fault+0x1e/0x30 [ 848.917119] RIP: 0033:0x4075fa [ 848.920291] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 848.925646] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 848.932899] RDX: 935e9f582c8804e2 RSI: 0000000000000000 RDI: 0000000001de4848 [ 848.940149] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 848.947400] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cf69b [ 848.954650] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 848.961908] warn_alloc_show_mem: 1 callbacks suppressed [ 848.961911] Mem-Info: [ 848.969654] active_anon:169948 inactive_anon:76 isolated_anon:0 [ 848.969654] active_file:1440 inactive_file:1018 isolated_file:0 [ 848.969654] unevictable:0 dirty:109 writeback:0 unstable:0 [ 848.969654] slab_reclaimable:3382 slab_unreclaimable:9529 [ 848.969654] mapped:67172 shmem:84 pagetables:1436 bounce:0 [ 848.969654] free:75970 free_pcp:433 free_cma:0 [ 849.002810] Node 0 active_anon:679792kB inactive_anon:304kB active_file:5760kB inactive_file:4072kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268688kB dirty:436kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 849.030726] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 849.056836] lowmem_reserve[]: 0 2817 7244 7244 [ 849.061408] Node 0 DMA32 free:236560kB min:26224kB low:32780kB high:39336kB active_anon:204468kB inactive_anon:12kB active_file:908kB inactive_file:1120kB unevictable:0kB writepending:296kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2752kB pagetables:2844kB bounce:0kB free_pcp:304kB local_pcp:84kB free_cma:0kB [ 849.090554] lowmem_reserve[]: 0 0 4426 4426 [ 849.094868] Node 0 Normal free:51416kB min:41208kB low:51508kB high:61808kB active_anon:475336kB inactive_anon:292kB active_file:4852kB inactive_file:2952kB unevictable:0kB writepending:140kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2900kB bounce:0kB free_pcp:1428kB local_pcp:752kB free_cma:0kB [ 849.124362] lowmem_reserve[]: 0 0 0 0 [ 849.128155] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 849.141356] Node 0 DMA32: 5416*4kB (MH) 6132*8kB (UM) 1823*16kB (UM) 775*32kB (M) 439*64kB (UM) 196*128kB (UM) 81*256kB (UM) 44*512kB (M) 15*1024kB (M) 0*2048kB 0*4096kB = 236496kB [ 849.157605] Node 0 Normal: 9096*4kB (UMEH) 1867*8kB (MH) 2*16kB (UH) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51416kB [ 849.170980] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 849.179530] 2542 total pagecache pages [ 849.183393] 0 pages in swap cache [ 849.186822] Swap cache stats: add 0, delete 0, find 0/0 [ 849.192258] Free swap = 0kB [ 849.195256] Total swap = 0kB [ 849.198254] 1965969 pages RAM [ 849.201344] 0 pages HighMem/MovableOnly [ 849.205294] 106316 pages reserved 05:03:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=""/6, 0x6}) 05:03:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:34 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 849.370858] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 849.381410] syz-executor1 cpuset=syz1 mems_allowed=0 [ 849.386627] CPU: 0 PID: 18562 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 849.393460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.402817] Call Trace: [ 849.405402] dump_stack+0x185/0x1d0 [ 849.409021] warn_alloc+0x430/0x690 [ 849.412645] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 849.417472] ? kernel_poison_pages+0x40/0x360 [ 849.421952] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 849.427389] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 849.432321] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 849.437241] ? kmsan_set_origin_inline+0x6b/0x120 [ 849.442075] ? __msan_poison_alloca+0x15c/0x1d0 [ 849.446733] kmsan_alloc_page+0x82/0xe0 [ 849.450695] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 849.455435] ? kmsan_set_origin_inline+0x6b/0x120 [ 849.460259] ? __msan_poison_alloca+0x15c/0x1d0 [ 849.464911] ? __should_failslab+0x278/0x2a0 [ 849.469303] ? should_fail+0x57/0xab0 [ 849.473086] ? __should_failslab+0x278/0x2a0 [ 849.477477] ? kmsan_set_origin_inline+0x6b/0x120 [ 849.482323] ? __msan_poison_alloca+0x15c/0x1d0 [ 849.486981] ? kmsan_set_origin+0x9e/0x160 [ 849.491204] alloc_pages_vma+0x1555/0x17f0 [ 849.495425] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 849.500515] handle_mm_fault+0x44ca/0x7ed0 [ 849.504731] ? kmsan_set_origin_inline+0x6b/0x120 [ 849.509565] __do_page_fault+0xec6/0x1a10 [ 849.513701] do_page_fault+0xb7/0x250 [ 849.517497] ? page_fault+0x8/0x30 [ 849.521019] page_fault+0x1e/0x30 [ 849.524454] RIP: 0033:0x4075fa [ 849.527625] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 849.532979] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 849.540231] RDX: 28865427f26a51b5 RSI: 0000000000000000 RDI: 0000000000e1e848 [ 849.547481] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 849.554732] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cf8fa [ 849.561984] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:34 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) [ 849.642655] audit: type=1326 audit(1529730214.641:1831): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18572 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:34 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) timer_delete(0x0) 05:03:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 05:03:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) [ 849.993539] audit: type=1326 audit(1529730214.992:1832): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18597 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:35 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) timer_delete(0x0) 05:03:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) [ 850.581358] warn_alloc: 5 callbacks suppressed [ 850.581375] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 850.596467] syz-executor4 cpuset=syz4 mems_allowed=0 [ 850.601578] CPU: 0 PID: 18614 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 850.608681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.618015] Call Trace: [ 850.620597] dump_stack+0x185/0x1d0 [ 850.624207] warn_alloc+0x430/0x690 [ 850.627824] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 850.632649] ? kernel_poison_pages+0x40/0x360 [ 850.637132] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 850.642565] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 850.648148] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 850.653156] ? kmsan_set_origin_inline+0x6b/0x120 [ 850.658068] ? __msan_poison_alloca+0x15c/0x1d0 [ 850.662726] kmsan_alloc_page+0x82/0xe0 [ 850.666686] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 850.671423] ? kmsan_set_origin_inline+0x6b/0x120 [ 850.676256] ? __msan_poison_alloca+0x15c/0x1d0 [ 850.680904] ? __should_failslab+0x278/0x2a0 [ 850.685297] ? should_fail+0x57/0xab0 [ 850.689080] ? __should_failslab+0x278/0x2a0 [ 850.693472] ? kmsan_set_origin_inline+0x6b/0x120 [ 850.698301] ? __msan_poison_alloca+0x15c/0x1d0 [ 850.702957] ? kmsan_set_origin+0x9e/0x160 [ 850.707182] alloc_pages_vma+0x1555/0x17f0 [ 850.711419] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 850.716517] handle_mm_fault+0x44ca/0x7ed0 [ 850.720740] ? kmsan_set_origin_inline+0x6b/0x120 [ 850.725598] __do_page_fault+0xec6/0x1a10 [ 850.729737] do_page_fault+0xb7/0x250 [ 850.733521] ? page_fault+0x8/0x30 [ 850.737048] page_fault+0x1e/0x30 [ 850.740492] RIP: 0033:0x4075fa [ 850.743662] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 850.749007] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 850.756260] RDX: f1164beb8b57cb48 RSI: 0000000000000000 RDI: 00000000026e7848 [ 850.763515] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 850.770778] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cfdb4 [ 850.778046] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 850.785323] warn_alloc_show_mem: 1 callbacks suppressed [ 850.785325] Mem-Info: [ 850.793075] active_anon:168929 inactive_anon:78 isolated_anon:0 [ 850.793075] active_file:1457 inactive_file:959 isolated_file:0 [ 850.793075] unevictable:0 dirty:118 writeback:0 unstable:0 [ 850.793075] slab_reclaimable:3382 slab_unreclaimable:9529 [ 850.793075] mapped:67200 shmem:84 pagetables:1428 bounce:0 [ 850.793075] free:76123 free_pcp:407 free_cma:0 [ 850.826144] Node 0 active_anon:675716kB inactive_anon:312kB active_file:5828kB inactive_file:3836kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268800kB dirty:472kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 850.854061] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 850.880170] lowmem_reserve[]: 0 2817 7244 7244 [ 850.884745] Node 0 DMA32 free:237172kB min:26224kB low:32780kB high:39336kB active_anon:200360kB inactive_anon:28kB active_file:1012kB inactive_file:984kB unevictable:0kB writepending:332kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2880kB pagetables:2852kB bounce:0kB free_pcp:228kB local_pcp:136kB free_cma:0kB [ 850.913985] lowmem_reserve[]: 0 0 4426 4426 [ 850.918295] Node 0 Normal free:51416kB min:41208kB low:51508kB high:61808kB active_anon:475324kB inactive_anon:284kB active_file:4816kB inactive_file:2852kB unevictable:0kB writepending:140kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2860kB bounce:0kB free_pcp:1400kB local_pcp:716kB free_cma:0kB [ 850.947788] lowmem_reserve[]: 0 0 0 0 [ 850.951576] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 850.964786] Node 0 DMA32: 5447*4kB (UMH) 6135*8kB (UM) 1814*16kB (M) 778*32kB (UM) 435*64kB (M) 198*128kB (UM) 81*256kB (UM) 45*512kB (UM) 15*1024kB (M) 0*2048kB 0*4096kB = 237108kB [ 850.981117] Node 0 Normal: 9094*4kB (MEH) 1866*8kB (UMH) 3*16kB (UMH) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51416kB [ 850.994578] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 851.003127] 2500 total pagecache pages [ 851.006988] 0 pages in swap cache [ 851.010429] Swap cache stats: add 0, delete 0, find 0/0 [ 851.015767] Free swap = 0kB [ 851.018760] Total swap = 0kB [ 851.021753] 1965969 pages RAM [ 851.024832] 0 pages HighMem/MovableOnly [ 851.028777] 106316 pages reserved 05:03:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 851.084774] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 851.095307] syz-executor1 cpuset=syz1 mems_allowed=0 [ 851.100431] CPU: 0 PID: 18612 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 851.107269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.116621] Call Trace: [ 851.119214] dump_stack+0x185/0x1d0 [ 851.122839] warn_alloc+0x430/0x690 [ 851.126474] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:03:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 851.131311] ? kernel_poison_pages+0x40/0x360 [ 851.135812] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 851.141268] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 851.147087] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 851.152110] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.156952] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.161624] kmsan_alloc_page+0x82/0xe0 [ 851.165596] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 851.170352] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.175193] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.179865] ? __should_failslab+0x278/0x2a0 05:03:36 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) timer_delete(0x0) [ 851.184279] ? should_fail+0x57/0xab0 [ 851.188076] ? __should_failslab+0x278/0x2a0 [ 851.192482] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.197319] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.201988] ? kmsan_set_origin+0x9e/0x160 [ 851.206228] alloc_pages_vma+0x1555/0x17f0 [ 851.210467] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 851.215576] handle_mm_fault+0x44ca/0x7ed0 [ 851.219837] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.224688] __do_page_fault+0xec6/0x1a10 [ 851.228841] do_page_fault+0xb7/0x250 [ 851.232641] ? page_fault+0x8/0x30 [ 851.236174] page_fault+0x1e/0x30 [ 851.239621] RIP: 0033:0x4075fa [ 851.242803] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 851.248161] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 851.255425] RDX: 28865427f26a51b5 RSI: 0000000000000000 RDI: 0000000000e1e848 [ 851.262691] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 851.269953] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000cffac [ 851.277213] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) [ 851.294225] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 851.304744] syz-executor2 cpuset=syz2 mems_allowed=0 [ 851.309857] CPU: 0 PID: 18621 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 851.316691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.326036] Call Trace: [ 851.328623] dump_stack+0x185/0x1d0 [ 851.332253] warn_alloc+0x430/0x690 [ 851.335898] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:03:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 851.340741] ? kernel_poison_pages+0x40/0x360 [ 851.345238] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 851.350687] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 851.355632] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 851.360662] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.365500] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.370175] kmsan_alloc_page+0x82/0xe0 [ 851.374153] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 851.378911] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.383743] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.388398] ? __should_failslab+0x278/0x2a0 [ 851.392796] ? should_fail+0x57/0xab0 [ 851.396579] ? __should_failslab+0x278/0x2a0 [ 851.400970] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.405792] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.410445] ? kmsan_set_origin+0x9e/0x160 [ 851.414667] alloc_pages_vma+0x1555/0x17f0 [ 851.418892] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 851.424004] handle_mm_fault+0x44ca/0x7ed0 [ 851.428218] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.433057] __do_page_fault+0xec6/0x1a10 [ 851.437196] do_page_fault+0xb7/0x250 [ 851.440978] ? page_fault+0x8/0x30 [ 851.444499] page_fault+0x1e/0x30 [ 851.447933] RIP: 0033:0x4075fa [ 851.451103] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 851.456459] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 851.463712] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 851.470960] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 851.478220] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d007d [ 851.485476] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 851.494814] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 851.505319] syz-executor3 cpuset=syz3 mems_allowed=0 [ 851.510430] CPU: 0 PID: 18623 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 851.517257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.526602] Call Trace: [ 851.529196] dump_stack+0x185/0x1d0 [ 851.532824] warn_alloc+0x430/0x690 [ 851.536463] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 851.541311] ? kernel_poison_pages+0x40/0x360 [ 851.545821] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 851.551269] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 851.556219] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 851.561249] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.566092] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.570766] kmsan_alloc_page+0x82/0xe0 [ 851.574740] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 851.579494] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.584335] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.589000] ? __should_failslab+0x278/0x2a0 05:03:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 851.593409] ? should_fail+0x57/0xab0 [ 851.597203] ? __should_failslab+0x278/0x2a0 [ 851.601608] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.606446] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.611114] ? kmsan_set_origin+0x9e/0x160 [ 851.615353] alloc_pages_vma+0x1555/0x17f0 [ 851.619591] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 851.624704] handle_mm_fault+0x44ca/0x7ed0 [ 851.628936] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.633788] __do_page_fault+0xec6/0x1a10 [ 851.637939] do_page_fault+0xb7/0x250 [ 851.641740] ? page_fault+0x8/0x30 [ 851.645278] page_fault+0x1e/0x30 [ 851.648730] RIP: 0033:0x4075fa [ 851.651909] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 851.657271] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 851.663786] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 851.664544] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 [ 851.675013] syz-executor6 cpuset= [ 851.682257] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 851.682258] syz6 mems_allowed=0 [ 851.685696] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0146 [ 851.703433] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 851.710698] CPU: 1 PID: 18637 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 851.717526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 851.726875] Call Trace: [ 851.729464] dump_stack+0x185/0x1d0 [ 851.733092] warn_alloc+0x430/0x690 [ 851.736732] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 851.741578] ? kernel_poison_pages+0x40/0x360 [ 851.746078] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 851.751529] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 851.756561] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 851.761583] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.766425] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.771097] kmsan_alloc_page+0x82/0xe0 [ 851.775069] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 851.779825] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.784663] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.789324] ? __should_failslab+0x278/0x2a0 [ 851.793730] ? should_fail+0x57/0xab0 [ 851.797520] ? __should_failslab+0x278/0x2a0 [ 851.801913] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.806738] ? __msan_poison_alloca+0x15c/0x1d0 [ 851.811392] ? kmsan_set_origin+0x9e/0x160 [ 851.815615] alloc_pages_vma+0x1555/0x17f0 [ 851.819837] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 851.824927] handle_mm_fault+0x44ca/0x7ed0 [ 851.829143] ? kmsan_set_origin_inline+0x6b/0x120 [ 851.833976] __do_page_fault+0xec6/0x1a10 [ 851.838110] do_page_fault+0xb7/0x250 [ 851.841892] ? page_fault+0x8/0x30 [ 851.845415] page_fault+0x1e/0x30 [ 851.848850] RIP: 0033:0x4075fa [ 851.852021] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 851.857367] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 851.864620] RDX: 935e9f582c8804e2 RSI: 0000000000000000 RDI: 0000000001de4848 [ 851.871882] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 851.879134] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d01ef [ 851.886390] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 851.893645] warn_alloc_show_mem: 3 callbacks suppressed [ 851.893648] Mem-Info: [ 851.901408] active_anon:168923 inactive_anon:76 isolated_anon:0 [ 851.901408] active_file:1457 inactive_file:959 isolated_file:0 [ 851.901408] unevictable:0 dirty:118 writeback:0 unstable:0 [ 851.901408] slab_reclaimable:3382 slab_unreclaimable:9529 [ 851.901408] mapped:67189 shmem:84 pagetables:1392 bounce:0 [ 851.901408] free:77482 free_pcp:510 free_cma:0 [ 851.934475] Node 0 active_anon:675692kB inactive_anon:304kB active_file:5828kB inactive_file:3836kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268756kB dirty:472kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 851.962391] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 851.988505] lowmem_reserve[]: 0 2817 7244 7244 [ 851.993075] Node 0 DMA32 free:242284kB min:26224kB low:32780kB high:39336kB active_anon:200372kB inactive_anon:24kB active_file:1012kB inactive_file:984kB unevictable:0kB writepending:332kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2880kB pagetables:2548kB bounce:0kB free_pcp:784kB local_pcp:156kB free_cma:0kB [ 852.023092] lowmem_reserve[]: 0 0 4426 4426 [ 852.027403] Node 0 Normal free:51740kB min:41208kB low:51508kB high:61808kB active_anon:475328kB inactive_anon:280kB active_file:4816kB inactive_file:2852kB unevictable:0kB writepending:140kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:3020kB bounce:0kB free_pcp:1256kB local_pcp:700kB free_cma:0kB [ 852.056895] lowmem_reserve[]: 0 0 0 0 [ 852.060683] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 852.073885] Node 0 DMA32: 5587*4kB (UMEH) 6162*8kB (UM) 1815*16kB (UM) 775*32kB (UM) 433*64kB (UM) 194*128kB (UME) 81*256kB (UME) 45*512kB (ME) 16*1024kB (UME) 2*2048kB (UM) 0*4096kB = 242284kB 05:03:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) [ 852.091260] Node 0 Normal: 9175*4kB (UMEH) 1860*8kB (UMH) 7*16kB (UMH) 2*32kB (U) 2*64kB (UH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51884kB [ 852.105246] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 852.114144] 2500 total pagecache pages [ 852.118009] 0 pages in swap cache [ 852.121440] Swap cache stats: add 0, delete 0, find 0/0 [ 852.126785] Free swap = 0kB [ 852.129782] Total swap = 0kB [ 852.132787] 1965969 pages RAM [ 852.135867] 0 pages HighMem/MovableOnly [ 852.139819] 106316 pages reserved 05:03:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) [ 852.153712] audit: type=1326 audit(1529730217.146:1833): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18621 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 852.209451] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 852.219962] syz-executor4 cpuset=syz4 mems_allowed=0 [ 852.225073] CPU: 1 PID: 18647 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 852.231906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.241253] Call Trace: [ 852.243844] dump_stack+0x185/0x1d0 [ 852.247473] warn_alloc+0x430/0x690 [ 852.251114] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 852.255956] ? kernel_poison_pages+0x40/0x360 [ 852.260458] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 852.265912] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 852.270862] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 852.275799] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.280634] ? __msan_poison_alloca+0x15c/0x1d0 [ 852.285306] kmsan_alloc_page+0x82/0xe0 [ 852.289281] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 852.294053] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.298893] ? __msan_poison_alloca+0x15c/0x1d0 [ 852.303557] ? __should_failslab+0x278/0x2a0 [ 852.307962] ? should_fail+0x57/0xab0 [ 852.311759] ? __should_failslab+0x278/0x2a0 [ 852.316160] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.321021] ? __msan_poison_alloca+0x15c/0x1d0 [ 852.325691] ? kmsan_set_origin+0x9e/0x160 [ 852.329930] alloc_pages_vma+0x1555/0x17f0 [ 852.334168] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 852.339278] handle_mm_fault+0x44ca/0x7ed0 [ 852.343507] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.348342] __do_page_fault+0xec6/0x1a10 [ 852.352479] do_page_fault+0xb7/0x250 [ 852.356264] ? page_fault+0x8/0x30 05:03:37 executing program 3: setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffc) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 852.359787] page_fault+0x1e/0x30 [ 852.363219] RIP: 0033:0x4075fa [ 852.366399] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 852.371742] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 852.379001] RDX: f1164beb8b57cb48 RSI: 0000000000000000 RDI: 00000000026e7848 [ 852.386254] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 852.393502] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0411 [ 852.400751] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 852.470581] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 852.481103] syz-executor7 cpuset=syz7 mems_allowed=0 [ 852.486205] CPU: 0 PID: 18657 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 852.493043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.502383] Call Trace: [ 852.504962] dump_stack+0x185/0x1d0 [ 852.508591] warn_alloc+0x430/0x690 [ 852.512210] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 852.517056] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 852.522502] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 852.527427] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 852.532355] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.537179] ? __msan_poison_alloca+0x15c/0x1d0 [ 852.541833] kmsan_alloc_page+0x82/0xe0 [ 852.545791] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 852.550538] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.555365] ? __msan_poison_alloca+0x15c/0x1d0 [ 852.560013] ? __should_failslab+0x278/0x2a0 [ 852.564407] ? should_fail+0x57/0xab0 [ 852.568191] ? __should_failslab+0x278/0x2a0 [ 852.572579] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.577412] ? __msan_poison_alloca+0x15c/0x1d0 [ 852.582066] ? kmsan_set_origin+0x9e/0x160 [ 852.586293] alloc_pages_vma+0x1555/0x17f0 [ 852.590514] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 852.595608] handle_mm_fault+0x44ca/0x7ed0 [ 852.599825] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.604658] __do_page_fault+0xec6/0x1a10 [ 852.608790] do_page_fault+0xb7/0x250 [ 852.612573] ? page_fault+0x8/0x30 [ 852.616098] page_fault+0x1e/0x30 [ 852.619534] RIP: 0033:0x4075fa [ 852.622704] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 852.628050] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 852.635303] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 852.642551] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 852.650630] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0516 [ 852.657885] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:37 executing program 3: setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) [ 852.673627] audit: type=1326 audit(1529730217.203:1834): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18646 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 852.740449] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 852.750975] syz-executor5 cpuset=syz5 mems_allowed=0 [ 852.756098] CPU: 0 PID: 18664 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 852.762928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 852.772278] Call Trace: [ 852.774867] dump_stack+0x185/0x1d0 [ 852.778498] warn_alloc+0x430/0x690 [ 852.782130] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 852.786973] ? kernel_poison_pages+0x40/0x360 [ 852.791468] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 852.796943] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 852.801890] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.806725] ? __msan_poison_alloca+0x15c/0x1d0 [ 852.811386] kmsan_alloc_page+0x82/0xe0 [ 852.815345] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 852.820086] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.824913] ? __msan_poison_alloca+0x15c/0x1d0 [ 852.829597] ? __should_failslab+0x278/0x2a0 [ 852.833991] ? should_fail+0x57/0xab0 [ 852.837771] ? __should_failslab+0x278/0x2a0 [ 852.842160] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.846984] ? __msan_poison_alloca+0x15c/0x1d0 [ 852.851637] ? kmsan_set_origin+0x9e/0x160 [ 852.855859] alloc_pages_vma+0x1555/0x17f0 [ 852.860087] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 852.865178] handle_mm_fault+0x44ca/0x7ed0 [ 852.869394] ? kmsan_set_origin_inline+0x6b/0x120 [ 852.874226] __do_page_fault+0xec6/0x1a10 [ 852.878357] do_page_fault+0xb7/0x250 [ 852.882141] ? page_fault+0x8/0x30 [ 852.885661] page_fault+0x1e/0x30 05:03:37 executing program 3: setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 852.889092] RIP: 0033:0x4075fa [ 852.892260] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 852.897602] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 852.904851] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 852.912101] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 852.919350] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0623 [ 852.926599] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 852.968892] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 852.979422] syz-executor4 cpuset=syz4 mems_allowed=0 [ 852.984545] CPU: 1 PID: 18667 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 852.991376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.000744] Call Trace: 05:03:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) [ 853.001653] audit: type=1326 audit(1529730217.711:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18654 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 853.003329] dump_stack+0x185/0x1d0 [ 853.003346] warn_alloc+0x430/0x690 [ 853.003371] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 853.003388] ? kernel_poison_pages+0x40/0x360 [ 853.003407] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 853.003419] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 853.003456] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 853.054858] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.059706] ? __msan_poison_alloca+0x15c/0x1d0 [ 853.064393] kmsan_alloc_page+0x82/0xe0 [ 853.068372] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 853.073138] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.077986] ? __msan_poison_alloca+0x15c/0x1d0 [ 853.082653] ? __should_failslab+0x278/0x2a0 [ 853.087067] ? should_fail+0x57/0xab0 [ 853.090864] ? __should_failslab+0x278/0x2a0 [ 853.095270] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.100115] ? __msan_poison_alloca+0x15c/0x1d0 [ 853.104783] ? kmsan_set_origin+0x9e/0x160 [ 853.109023] alloc_pages_vma+0x1555/0x17f0 [ 853.113261] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 853.118369] handle_mm_fault+0x44ca/0x7ed0 [ 853.122607] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.127458] __do_page_fault+0xec6/0x1a10 [ 853.131617] do_page_fault+0xb7/0x250 [ 853.135418] ? page_fault+0x8/0x30 [ 853.138963] page_fault+0x1e/0x30 [ 853.142408] RIP: 0033:0x4075fa [ 853.145588] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 853.150942] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000000 [ 853.158216] RDX: f1164beb8b57cb48 RSI: 0000000000000000 RDI: 00000000026e7848 [ 853.165480] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 853.172736] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0708 [ 853.179994] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 853.187260] warn_alloc_show_mem: 3 callbacks suppressed [ 853.187263] Mem-Info: [ 853.195018] active_anon:169499 inactive_anon:73 isolated_anon:0 [ 853.195018] active_file:1207 inactive_file:553 isolated_file:0 [ 853.195018] unevictable:0 dirty:18 writeback:0 unstable:0 [ 853.195018] slab_reclaimable:3381 slab_unreclaimable:9534 [ 853.195018] mapped:66784 shmem:84 pagetables:1454 bounce:0 [ 853.195018] free:76230 free_pcp:426 free_cma:0 [ 853.228006] Node 0 active_anon:677996kB inactive_anon:292kB active_file:4828kB inactive_file:2212kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267136kB dirty:72kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 264192kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 853.255983] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 853.282088] lowmem_reserve[]: 0 2817 7244 7244 [ 853.286660] Node 0 DMA32 free:237100kB min:26224kB low:32780kB high:39336kB active_anon:202392kB inactive_anon:12kB active_file:356kB inactive_file:664kB unevictable:0kB writepending:20kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:2576kB bounce:0kB free_pcp:744kB local_pcp:92kB free_cma:0kB [ 853.315636] lowmem_reserve[]: 0 0 4426 4426 [ 853.319949] Node 0 Normal free:51916kB min:41208kB low:51508kB high:61808kB active_anon:475604kB inactive_anon:280kB active_file:4032kB inactive_file:1452kB unevictable:0kB writepending:32kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:3240kB bounce:0kB free_pcp:960kB local_pcp:704kB free_cma:0kB [ 853.349269] lowmem_reserve[]: 0 0 0 0 [ 853.353062] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 853.366279] Node 0 DMA32: 5535*4kB (UMEH) 6146*8kB (UME) 1812*16kB (UME) 773*32kB (UME) 444*64kB (UME) 192*128kB (UME) 80*256kB (ME) 45*512kB (ME) 15*1024kB (ME) 0*2048kB 0*4096kB = 236908kB [ 853.383395] Node 0 Normal: 9267*4kB (UMEH) 1866*8kB (UMH) 6*16kB (UMH) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52156kB [ 853.397045] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 853.405612] 1875 total pagecache pages [ 853.409474] 0 pages in swap cache [ 853.412904] Swap cache stats: add 0, delete 0, find 0/0 [ 853.418240] Free swap = 0kB 05:03:38 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) [ 853.421234] Total swap = 0kB [ 853.424231] 1965969 pages RAM [ 853.427309] 0 pages HighMem/MovableOnly [ 853.431256] 106316 pages reserved 05:03:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) uname(&(0x7f0000000040)=""/64) 05:03:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:38 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) [ 853.627803] audit: type=1326 audit(1529730218.626:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18687 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 853.719514] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 853.730040] syz-executor3 cpuset=syz3 mems_allowed=0 [ 853.735156] CPU: 0 PID: 18692 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 853.741982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.751332] Call Trace: [ 853.753923] dump_stack+0x185/0x1d0 [ 853.757551] warn_alloc+0x430/0x690 [ 853.761184] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:03:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 853.766020] ? kernel_poison_pages+0x40/0x360 [ 853.770520] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 853.775970] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 853.780926] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 853.785873] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.790725] ? __msan_poison_alloca+0x15c/0x1d0 [ 853.795404] kmsan_alloc_page+0x82/0xe0 [ 853.799384] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 853.804146] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.808988] ? __msan_poison_alloca+0x15c/0x1d0 [ 853.813659] ? __should_failslab+0x278/0x2a0 [ 853.818063] ? should_fail+0x57/0xab0 [ 853.821844] ? __should_failslab+0x278/0x2a0 [ 853.826239] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.831073] ? __msan_poison_alloca+0x15c/0x1d0 [ 853.835727] ? kmsan_set_origin+0x9e/0x160 [ 853.839953] alloc_pages_vma+0x1555/0x17f0 [ 853.844176] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 853.849268] handle_mm_fault+0x44ca/0x7ed0 [ 853.853493] __do_page_fault+0xec6/0x1a10 [ 853.857625] do_page_fault+0xb7/0x250 [ 853.861409] ? page_fault+0x8/0x30 [ 853.864931] page_fault+0x1e/0x30 [ 853.868362] RIP: 0033:0x4075fa [ 853.871532] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 853.876875] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 853.884129] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 [ 853.891380] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 853.898729] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d09f2 [ 853.905980] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:38 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) [ 853.977654] audit: type=1326 audit(1529730218.976:1837): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18700 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:39 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:39 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:39 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:39 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:39 executing program 0: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:39 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:39 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 854.909493] audit: type=1326 audit(1529730219.908:1838): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18771 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:39 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:40 executing program 0: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:40 executing program 0: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:03:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) [ 855.833553] audit: type=1326 audit(1529730220.832:1839): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18806 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:40 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) [ 855.922789] audit: type=1326 audit(1529730220.905:1840): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18821 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:40 executing program 7: syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:41 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) [ 856.068265] audit: type=1326 audit(1529730221.025:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18826 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:41 executing program 7: syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:41 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:41 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:41 executing program 7: syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:41 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) [ 856.760148] audit: type=1326 audit(1529730221.758:1842): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18854 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:42 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:42 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:42 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) pkey_alloc(0x0, 0x0) 05:03:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:42 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) [ 857.727885] kauditd_printk_skb: 1 callbacks suppressed [ 857.727909] audit: type=1326 audit(1529730222.726:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18919 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:42 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:43 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:43 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timer_delete(0x0) 05:03:43 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) [ 858.063493] audit: type=1326 audit(1529730223.062:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18947 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:43 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:43 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 858.673417] audit: type=1326 audit(1529730223.672:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18964 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:43 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:44 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) [ 859.123412] audit: type=1326 audit(1529730224.122:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18999 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:44 executing program 6: getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:44 executing program 6: getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 859.638712] audit: type=1326 audit(1529730224.637:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19027 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) [ 859.724011] audit: type=1326 audit(1529730224.722:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19031 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505a7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:44 executing program 6: getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) 05:03:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) 05:03:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) [ 860.016513] audit: type=1326 audit(1529730225.015:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19053 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) [ 860.048200] audit: type=1326 audit(1529730225.043:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19058 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @rand_addr, @dev}, &(0x7f0000000400)=0xc) 05:03:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000000c0)) 05:03:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) [ 860.569095] warn_alloc: 2 callbacks suppressed [ 860.569110] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 860.569120] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 860.569130] syz-executor6 cpuset= [ 860.573733] syz-executor4 cpuset= [ 860.584199] syz6 mems_allowed=0 [ 860.601507] syz4 mems_allowed=0 [ 860.604784] CPU: 0 PID: 19070 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 860.614838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.624168] Call Trace: [ 860.626743] dump_stack+0x185/0x1d0 [ 860.630355] warn_alloc+0x430/0x690 [ 860.633975] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 860.638802] ? kernel_poison_pages+0x40/0x360 [ 860.643283] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 860.649741] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 860.654677] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 860.659616] kmsan_alloc_page+0x82/0xe0 [ 860.663573] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 860.668313] ? kmsan_set_origin_inline+0x6b/0x120 [ 860.673143] ? __msan_poison_alloca+0x15c/0x1d0 [ 860.677794] ? __should_failslab+0x278/0x2a0 [ 860.682197] ? should_fail+0x57/0xab0 [ 860.685977] ? __should_failslab+0x278/0x2a0 [ 860.690370] ? kmsan_set_origin_inline+0x6b/0x120 [ 860.695198] ? __msan_poison_alloca+0x15c/0x1d0 [ 860.699852] ? kmsan_set_origin+0x9e/0x160 [ 860.704076] alloc_pages_vma+0x1555/0x17f0 [ 860.708301] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 860.713401] handle_mm_fault+0x44ca/0x7ed0 [ 860.717617] ? kmsan_set_origin_inline+0x6b/0x120 [ 860.722452] __do_page_fault+0xec6/0x1a10 [ 860.726589] do_page_fault+0xb7/0x250 [ 860.730371] ? page_fault+0x8/0x30 [ 860.733898] page_fault+0x1e/0x30 [ 860.737329] RIP: 0033:0x4075fa [ 860.740500] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 860.745844] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 860.753096] RDX: 935e9f582c8804e2 RSI: 0000000000000000 RDI: 0000000001de4848 [ 860.760345] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 860.767594] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d24b8 [ 860.774843] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 860.782103] warn_alloc_show_mem: 1 callbacks suppressed [ 860.782111] CPU: 1 PID: 19069 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 860.782113] Mem-Info: [ 860.782137] active_anon:168930 inactive_anon:78 isolated_anon:0 [ 860.782137] active_file:1638 inactive_file:742 isolated_file:0 [ 860.782137] unevictable:0 dirty:40 writeback:0 unstable:0 [ 860.782137] slab_reclaimable:3381 slab_unreclaimable:9511 [ 860.782137] mapped:67129 shmem:84 pagetables:1441 bounce:0 [ 860.782137] free:72043 free_pcp:454 free_cma:0 [ 860.787471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 860.794299] Node 0 active_anon:675720kB inactive_anon:312kB active_file:6552kB inactive_file:2968kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268516kB dirty:160kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 860.796687] Call Trace: [ 860.829630] Node 0 [ 860.838978] dump_stack+0x185/0x1d0 [ 860.866899] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 860.869450] warn_alloc+0x430/0x690 [ 860.871649] lowmem_reserve[]: [ 860.875262] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 860.900736] 0 [ 860.904345] ? kernel_poison_pages+0x40/0x360 [ 860.907432] 2817 [ 860.912272] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 860.914040] 7244 [ 860.918518] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 860.920543] 7244 [ 860.926078] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 860.933010] ? kmsan_set_origin_inline+0x6b/0x120 [ 860.935032] Node 0 [ 860.940029] ? __msan_poison_alloca+0x15c/0x1d0 [ 860.944870] DMA32 free:220872kB min:26224kB low:32780kB high:39336kB active_anon:200452kB inactive_anon:36kB active_file:1656kB inactive_file:1144kB unevictable:0kB writepending:108kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:2940kB bounce:0kB free_pcp:528kB local_pcp:184kB free_cma:0kB [ 860.947072] kmsan_alloc_page+0x82/0xe0 [ 860.951703] lowmem_reserve[]: [ 860.980404] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 860.984339] 0 [ 860.987433] ? kmsan_set_origin_inline+0x6b/0x120 [ 860.992152] 0 [ 860.993937] ? __msan_poison_alloca+0x15c/0x1d0 [ 860.998752] 4426 [ 861.000536] ? __should_failslab+0x278/0x2a0 [ 861.005167] 4426 [ 861.007214] ? should_fail+0x57/0xab0 [ 861.013622] ? __should_failslab+0x278/0x2a0 [ 861.017384] Node 0 Normal free:51396kB min:41208kB low:51508kB high:61808kB active_anon:475268kB inactive_anon:276kB active_file:4896kB inactive_file:1824kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2824kB bounce:0kB free_pcp:1288kB local_pcp:568kB free_cma:0kB [ 861.021788] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.051170] lowmem_reserve[]: 0 [ 861.055993] ? __msan_poison_alloca+0x15c/0x1d0 [ 861.056008] ? kmsan_set_origin+0x9e/0x160 [ 861.059256] 0 [ 861.063914] alloc_pages_vma+0x1555/0x17f0 [ 861.068105] 0 [ 861.069896] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 861.074104] 0 [ 861.075897] handle_mm_fault+0x44ca/0x7ed0 [ 861.082743] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.086942] Node 0 DMA: 0*4kB 0*8kB [ 861.091788] __do_page_fault+0xec6/0x1a10 [ 861.091807] do_page_fault+0xb7/0x250 [ 861.095484] 0*16kB [ 861.099614] ? page_fault+0x8/0x30 [ 861.103379] 1*32kB [ 861.105599] page_fault+0x1e/0x30 [ 861.109102] (U) [ 861.111319] RIP: 0033:0x4075fa [ 861.114737] 2*64kB [ 861.116688] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 861.119848] (U) [ 861.127390] 1*128kB [ 861.129336] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 861.129337] (U) 1*256kB [ 861.131652] RDX: f1164beb8b57cb48 RSI: 0000000000000000 RDI: 00000000026e7848 [ 861.138895] (U) [ 861.141544] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 861.148786] 0*512kB [ 861.150738] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d24b8 [ 861.157979] 1*1024kB [ 861.160278] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 861.167516] (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 861.182175] Node 0 DMA32: 5144*4kB (MH) 6119*8kB (M) 1803*16kB (UM) 766*32kB (M) 432*64kB (UM) 185*128kB (UM) 73*256kB (UM) 39*512kB (M) 8*1024kB (M) 2*2048kB (UM) 0*4096kB = 225160kB [ 861.198714] Node 0 Normal: 9155*4kB (UMEH) 1837*8kB (UMH) 1*16kB (H) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51396kB [ 861.212101] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 861.220663] 2468 total pagecache pages [ 861.224528] 0 pages in swap cache [ 861.227958] Swap cache stats: add 0, delete 0, find 0/0 [ 861.233297] Free swap = 0kB [ 861.236291] Total swap = 0kB [ 861.239283] 1965969 pages RAM [ 861.242361] 0 pages HighMem/MovableOnly [ 861.246308] 106316 pages reserved 05:03:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'veth0\x00'}, 0x18) [ 861.291195] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 861.301722] syz-executor5 cpuset=syz5 mems_allowed=0 [ 861.306842] CPU: 0 PID: 19077 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 861.313679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.323027] Call Trace: [ 861.325619] dump_stack+0x185/0x1d0 [ 861.329247] warn_alloc+0x430/0x690 [ 861.332896] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 861.337740] ? kernel_poison_pages+0x40/0x360 [ 861.342236] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 861.347683] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 861.352626] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 861.357649] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.362494] ? __msan_poison_alloca+0x15c/0x1d0 [ 861.367169] kmsan_alloc_page+0x82/0xe0 [ 861.371147] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 861.375910] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.380755] ? __msan_poison_alloca+0x15c/0x1d0 [ 861.385423] ? __should_failslab+0x278/0x2a0 [ 861.389837] ? should_fail+0x57/0xab0 [ 861.393640] ? __should_failslab+0x278/0x2a0 [ 861.398052] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.402900] ? __msan_poison_alloca+0x15c/0x1d0 [ 861.407563] ? kmsan_set_origin+0x9e/0x160 [ 861.411818] alloc_pages_vma+0x1555/0x17f0 [ 861.416042] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 861.421136] handle_mm_fault+0x44ca/0x7ed0 [ 861.425352] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.430195] __do_page_fault+0xec6/0x1a10 [ 861.434330] do_page_fault+0xb7/0x250 [ 861.438111] ? page_fault+0x8/0x30 [ 861.441632] page_fault+0x1e/0x30 [ 861.445065] RIP: 0033:0x4075fa [ 861.448242] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 861.453584] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 861.460835] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 861.468086] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 861.475337] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d278a [ 861.482594] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 861.493795] audit: type=1326 audit(1529730226.491:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19078 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 861.542172] audit: type=1326 audit(1529730226.513:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19083 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 861.566285] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 861.576805] syz-executor2 cpuset=syz2 mems_allowed=0 [ 861.581945] CPU: 1 PID: 19087 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 861.588784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 861.598139] Call Trace: [ 861.600734] dump_stack+0x185/0x1d0 [ 861.604368] warn_alloc+0x430/0x690 [ 861.608017] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 861.612868] ? kernel_poison_pages+0x40/0x360 [ 861.617365] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 861.622836] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 861.627783] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 861.632809] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.637652] ? __msan_poison_alloca+0x15c/0x1d0 [ 861.642331] kmsan_alloc_page+0x82/0xe0 [ 861.647175] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 861.651935] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.656773] ? __msan_poison_alloca+0x15c/0x1d0 [ 861.661439] ? __should_failslab+0x278/0x2a0 [ 861.665848] ? should_fail+0x57/0xab0 [ 861.669644] ? __should_failslab+0x278/0x2a0 [ 861.674036] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.678867] ? __msan_poison_alloca+0x15c/0x1d0 [ 861.683519] ? kmsan_set_origin+0x9e/0x160 [ 861.687742] alloc_pages_vma+0x1555/0x17f0 [ 861.691965] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 861.697064] handle_mm_fault+0x44ca/0x7ed0 [ 861.701287] ? kmsan_set_origin_inline+0x6b/0x120 [ 861.706119] __do_page_fault+0xec6/0x1a10 [ 861.710255] do_page_fault+0xb7/0x250 [ 861.714038] ? page_fault+0x8/0x30 [ 861.717651] page_fault+0x1e/0x30 [ 861.721082] RIP: 0033:0x4075fa [ 861.724249] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 861.729602] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 861.736856] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 861.744104] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 861.751362] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d289d [ 861.758617] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 861.765873] warn_alloc_show_mem: 2 callbacks suppressed [ 861.765876] Mem-Info: [ 861.773613] active_anon:169011 inactive_anon:76 isolated_anon:0 [ 861.773613] active_file:959 inactive_file:973 isolated_file:0 [ 861.773613] unevictable:0 dirty:40 writeback:0 unstable:0 [ 861.773613] slab_reclaimable:3381 slab_unreclaimable:9512 [ 861.773613] mapped:66949 shmem:84 pagetables:1453 bounce:0 [ 861.773613] free:72239 free_pcp:515 free_cma:0 [ 861.806512] Node 0 active_anon:676044kB inactive_anon:304kB active_file:3836kB inactive_file:3892kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267796kB dirty:160kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 861.834426] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 861.860533] lowmem_reserve[]: 0 2817 7244 7244 [ 861.865111] Node 0 DMA32 free:221152kB min:26224kB low:32780kB high:39336kB active_anon:200692kB inactive_anon:28kB active_file:552kB inactive_file:1144kB unevictable:0kB writepending:108kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2944kB pagetables:2988kB bounce:0kB free_pcp:784kB local_pcp:124kB free_cma:0kB [ 861.894340] lowmem_reserve[]: 0 0 4426 4426 [ 861.898649] Node 0 Normal free:51900kB min:41208kB low:51508kB high:61808kB active_anon:475268kB inactive_anon:276kB active_file:3740kB inactive_file:2344kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2824kB bounce:0kB free_pcp:1276kB local_pcp:620kB free_cma:0kB [ 861.928056] lowmem_reserve[]: 0 0 0 0 [ 861.931859] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 861.945062] Node 0 DMA32: 5426*4kB (UMH) 6157*8kB (UM) 1815*16kB (UM) 766*32kB (UM) 434*64kB (UM) 188*128kB (UM) 72*256kB (UM) 38*512kB (M) 7*1024kB (UM) 0*2048kB 0*4096kB = 221408kB [ 861.961484] Node 0 Normal: 9314*4kB (UMEH) 1856*8kB (UMH) 4*16kB (UMH) 1*32kB (U) 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52264kB [ 861.975386] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 861.983939] 2033 total pagecache pages [ 861.987802] 0 pages in swap cache [ 861.991229] Swap cache stats: add 0, delete 0, find 0/0 [ 861.996568] Free swap = 0kB [ 861.999565] Total swap = 0kB [ 862.002557] 1965969 pages RAM [ 862.005637] 0 pages HighMem/MovableOnly [ 862.009585] 106316 pages reserved 05:03:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) fsync(0xffffffffffffffff) 05:03:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) [ 862.121977] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 862.132520] syz-executor4 cpuset=syz4 mems_allowed=0 [ 862.137646] CPU: 1 PID: 19098 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 862.144490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.153844] Call Trace: [ 862.156426] dump_stack+0x185/0x1d0 [ 862.160057] warn_alloc+0x430/0x690 [ 862.163676] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 862.168501] ? kernel_poison_pages+0x40/0x360 [ 862.172980] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 862.178412] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 862.183345] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 862.188358] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.193182] ? __msan_poison_alloca+0x15c/0x1d0 [ 862.197840] kmsan_alloc_page+0x82/0xe0 [ 862.201798] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 862.206535] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.211360] ? __msan_poison_alloca+0x15c/0x1d0 [ 862.216011] ? __should_failslab+0x278/0x2a0 [ 862.220408] ? should_fail+0x57/0xab0 [ 862.224188] ? __should_failslab+0x278/0x2a0 [ 862.228580] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.233406] ? __msan_poison_alloca+0x15c/0x1d0 [ 862.238061] ? kmsan_set_origin+0x9e/0x160 [ 862.242286] alloc_pages_vma+0x1555/0x17f0 [ 862.246511] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 862.251600] handle_mm_fault+0x44ca/0x7ed0 [ 862.255825] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.260666] __do_page_fault+0xec6/0x1a10 [ 862.264804] do_page_fault+0xb7/0x250 [ 862.268586] ? page_fault+0x8/0x30 [ 862.272106] page_fault+0x1e/0x30 [ 862.275541] RIP: 0033:0x4075fa [ 862.278710] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 862.284056] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 862.291318] RDX: f1164beb8b57cb48 RSI: 0000000000000000 RDI: 00000000026e7848 [ 862.298576] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 862.305828] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d2ac9 [ 862.313080] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000100), &(0x7f0000000140), 0x8) 05:03:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) 05:03:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) [ 862.482155] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 862.492682] syz-executor1 cpuset=syz1 mems_allowed=0 [ 862.497804] CPU: 0 PID: 19110 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 862.504642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.513989] Call Trace: [ 862.516568] dump_stack+0x185/0x1d0 [ 862.520183] warn_alloc+0x430/0x690 [ 862.523801] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 862.528628] ? kernel_poison_pages+0x40/0x360 [ 862.533106] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 862.538537] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 862.543461] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 862.548468] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.553291] ? __msan_poison_alloca+0x15c/0x1d0 [ 862.557947] kmsan_alloc_page+0x82/0xe0 [ 862.561910] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 862.566660] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.571486] ? __msan_poison_alloca+0x15c/0x1d0 [ 862.576146] ? __should_failslab+0x278/0x2a0 [ 862.580538] ? should_fail+0x57/0xab0 [ 862.584329] ? __should_failslab+0x278/0x2a0 [ 862.588731] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.593564] ? __msan_poison_alloca+0x15c/0x1d0 [ 862.598218] ? kmsan_set_origin+0x9e/0x160 [ 862.602443] alloc_pages_vma+0x1555/0x17f0 [ 862.606665] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 862.611770] handle_mm_fault+0x44ca/0x7ed0 [ 862.615988] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.620822] __do_page_fault+0xec6/0x1a10 [ 862.624958] do_page_fault+0xb7/0x250 [ 862.628744] ? page_fault+0x8/0x30 [ 862.632265] page_fault+0x1e/0x30 [ 862.635697] RIP: 0033:0x4075fa [ 862.638875] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 862.644231] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 862.652272] RDX: 28865427f26a51b5 RSI: 0000000000000000 RDI: 0000000000e1e848 [ 862.659536] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 862.666786] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d2c31 [ 862.674037] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f00000001c0)) [ 862.710928] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 862.721456] syz-executor6 cpuset=syz6 mems_allowed=0 [ 862.726574] CPU: 1 PID: 19114 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 862.733408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.742756] Call Trace: [ 862.745344] dump_stack+0x185/0x1d0 [ 862.748975] warn_alloc+0x430/0x690 [ 862.752617] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 862.757463] ? kernel_poison_pages+0x40/0x360 [ 862.761970] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 862.767454] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 862.772487] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.777326] ? __msan_poison_alloca+0x15c/0x1d0 [ 862.782005] kmsan_alloc_page+0x82/0xe0 [ 862.785974] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 862.790722] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.795545] ? __msan_poison_alloca+0x15c/0x1d0 [ 862.800194] ? __should_failslab+0x278/0x2a0 [ 862.804588] ? should_fail+0x57/0xab0 [ 862.808367] ? __should_failslab+0x278/0x2a0 [ 862.812762] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.817583] ? __msan_poison_alloca+0x15c/0x1d0 [ 862.822237] ? kmsan_set_origin+0x9e/0x160 [ 862.826470] alloc_pages_vma+0x1555/0x17f0 [ 862.830692] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 862.835784] handle_mm_fault+0x44ca/0x7ed0 [ 862.840006] ? kmsan_set_origin_inline+0x6b/0x120 [ 862.844868] __do_page_fault+0xec6/0x1a10 [ 862.849003] do_page_fault+0xb7/0x250 [ 862.852785] ? page_fault+0x8/0x30 [ 862.856307] page_fault+0x1e/0x30 [ 862.859740] RIP: 0033:0x4075fa [ 862.862913] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 862.868257] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 862.875509] RDX: 935e9f582c8804e2 RSI: 0000000000000000 RDI: 0000000001de4848 [ 862.882758] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 862.890008] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d2d16 [ 862.897528] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 862.906246] kauditd_printk_skb: 3 callbacks suppressed 05:03:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000001c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 05:03:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) [ 862.906265] audit: type=1326 audit(1529730227.905:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19116 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 862.942200] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 862.952710] syz-executor0 cpuset=syz0 mems_allowed=0 [ 862.957814] CPU: 0 PID: 19121 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 862.964631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 862.973971] Call Trace: [ 862.976549] dump_stack+0x185/0x1d0 [ 862.980160] warn_alloc+0x430/0x690 [ 862.983775] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 862.988598] ? kernel_poison_pages+0x40/0x360 [ 862.993083] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 862.998515] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 863.003438] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 863.008445] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.013268] ? __msan_poison_alloca+0x15c/0x1d0 [ 863.017926] kmsan_alloc_page+0x82/0xe0 [ 863.021890] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 863.026627] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.031449] ? __msan_poison_alloca+0x15c/0x1d0 [ 863.036101] ? __should_failslab+0x278/0x2a0 [ 863.040492] ? should_fail+0x57/0xab0 [ 863.044271] ? __should_failslab+0x278/0x2a0 [ 863.048663] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.053486] ? __msan_poison_alloca+0x15c/0x1d0 [ 863.058139] ? kmsan_set_origin+0x9e/0x160 [ 863.062361] alloc_pages_vma+0x1555/0x17f0 [ 863.066581] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 863.071671] handle_mm_fault+0x44ca/0x7ed0 [ 863.075890] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.080723] __do_page_fault+0xec6/0x1a10 [ 863.084870] do_page_fault+0xb7/0x250 [ 863.088668] ? page_fault+0x8/0x30 [ 863.092188] page_fault+0x1e/0x30 [ 863.095620] RIP: 0033:0x4075fa [ 863.098790] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 863.104152] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 863.111413] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 863.118663] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 863.125912] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d2dfb [ 863.133161] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 863.140418] warn_alloc_show_mem: 3 callbacks suppressed [ 863.140420] Mem-Info: [ 863.148168] active_anon:168950 inactive_anon:75 isolated_anon:0 [ 863.148168] active_file:1320 inactive_file:910 isolated_file:0 [ 863.148168] unevictable:0 dirty:64 writeback:0 unstable:0 [ 863.148168] slab_reclaimable:3381 slab_unreclaimable:9508 [ 863.148168] mapped:67135 shmem:83 pagetables:1420 bounce:0 [ 863.148168] free:71919 free_pcp:546 free_cma:0 [ 863.181148] Node 0 active_anon:675800kB inactive_anon:300kB active_file:5280kB inactive_file:3640kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268540kB dirty:256kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 863.209064] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 863.235184] lowmem_reserve[]: 0 2817 7244 7244 [ 863.239756] Node 0 DMA32 free:220288kB min:26224kB low:32780kB high:39336kB active_anon:200368kB inactive_anon:24kB active_file:820kB inactive_file:1908kB unevictable:0kB writepending:176kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2880kB pagetables:2772kB bounce:0kB free_pcp:928kB local_pcp:628kB free_cma:0kB [ 863.269005] lowmem_reserve[]: 0 0 4426 4426 [ 863.273321] Node 0 Normal free:51484kB min:41208kB low:51508kB high:61808kB active_anon:475316kB inactive_anon:276kB active_file:4460kB inactive_file:1732kB unevictable:0kB writepending:80kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2908kB bounce:0kB free_pcp:1256kB local_pcp:636kB free_cma:0kB [ 863.302733] lowmem_reserve[]: 0 0 0 0 [ 863.306525] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 863.319902] Node 0 DMA32: 5114*4kB (UMH) 6109*8kB (UM) 1813*16kB (UM) 773*32kB (UM) 429*64kB (UM) 187*128kB (UM) 73*256kB (UM) 39*512kB (UM) 7*1024kB (UM) 0*2048kB 0*4096kB = 220288kB [ 863.336409] Node 0 Normal: 9135*4kB (MEH) 1851*8kB (UMH) 3*16kB (UH) 1*32kB (U) 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51492kB [ 863.350136] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 863.358688] 2313 total pagecache pages [ 863.362551] 0 pages in swap cache [ 863.365982] Swap cache stats: add 0, delete 0, find 0/0 [ 863.371320] Free swap = 0kB [ 863.374314] Total swap = 0kB [ 863.377308] 1965969 pages RAM [ 863.380389] 0 pages HighMem/MovableOnly [ 863.384337] 106316 pages reserved [ 863.423000] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 863.432882] audit: type=1326 audit(1529730227.935:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19110 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 863.433525] syz-executor3 cpuset=syz3 mems_allowed=0 [ 863.433548] CPU: 0 PID: 19126 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 863.433553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.433557] Call Trace: [ 863.433574] dump_stack+0x185/0x1d0 [ 863.433604] warn_alloc+0x430/0x690 [ 863.484559] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 863.489415] ? kernel_poison_pages+0x40/0x360 [ 863.493930] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 863.499404] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 863.504412] ? update_load_avg+0x1b70/0x2cc0 [ 863.508807] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.513631] ? __msan_poison_alloca+0x15c/0x1d0 [ 863.518288] kmsan_alloc_page+0x82/0xe0 [ 863.522250] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 863.526989] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.531836] ? __msan_poison_alloca+0x15c/0x1d0 [ 863.536487] ? __should_failslab+0x278/0x2a0 [ 863.540879] ? should_fail+0x57/0xab0 [ 863.544666] ? __should_failslab+0x278/0x2a0 [ 863.549063] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.553900] ? __msan_poison_alloca+0x15c/0x1d0 [ 863.558552] ? kmsan_set_origin+0x9e/0x160 [ 863.562777] alloc_pages_vma+0x1555/0x17f0 [ 863.567001] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 863.572093] handle_mm_fault+0x44ca/0x7ed0 [ 863.576307] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.581140] __do_page_fault+0xec6/0x1a10 [ 863.585274] do_page_fault+0xb7/0x250 [ 863.589061] ? page_fault+0x8/0x30 [ 863.592588] page_fault+0x1e/0x30 [ 863.596028] RIP: 0033:0x4075fa [ 863.599202] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 863.604544] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 863.611795] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 05:03:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) fsync(0xffffffffffffffff) [ 863.619051] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 863.626308] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d2fdc [ 863.633560] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f00000002c0)) [ 863.717634] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 863.728158] syz-executor1 cpuset=syz1 mems_allowed=0 [ 863.733281] CPU: 1 PID: 19134 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 863.740117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 863.749469] Call Trace: [ 863.752063] dump_stack+0x185/0x1d0 [ 863.755688] warn_alloc+0x430/0x690 [ 863.759329] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 863.764169] ? kernel_poison_pages+0x40/0x360 [ 863.768666] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 863.774117] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 863.779067] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 863.784091] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.788935] ? __msan_poison_alloca+0x15c/0x1d0 [ 863.793617] kmsan_alloc_page+0x82/0xe0 [ 863.797602] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 863.802361] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.807206] ? __msan_poison_alloca+0x15c/0x1d0 [ 863.811874] ? __should_failslab+0x278/0x2a0 [ 863.816289] ? should_fail+0x57/0xab0 [ 863.820090] ? __should_failslab+0x278/0x2a0 [ 863.824498] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.829353] ? __msan_poison_alloca+0x15c/0x1d0 [ 863.834032] ? kmsan_set_origin+0x9e/0x160 [ 863.838273] alloc_pages_vma+0x1555/0x17f0 [ 863.842512] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 863.847620] handle_mm_fault+0x44ca/0x7ed0 [ 863.851852] ? kmsan_set_origin_inline+0x6b/0x120 [ 863.856708] __do_page_fault+0xec6/0x1a10 [ 863.860861] do_page_fault+0xb7/0x250 [ 863.864659] ? page_fault+0x8/0x30 05:03:48 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000006c0)}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) [ 863.868201] page_fault+0x1e/0x30 [ 863.871645] RIP: 0033:0x4075fa [ 863.874828] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 863.880184] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 863.887451] RDX: 28865427f26a51b5 RSI: 0000000000000000 RDI: 0000000000e1e848 [ 863.894712] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 863.901968] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d3104 [ 863.909220] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:03:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000000), 0x0) fsync(0xffffffffffffffff) 05:03:49 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000006c0)}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) [ 864.024517] audit: type=1326 audit(1529730229.023:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19134 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:49 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000006c0)}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:49 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) close(0xffffffffffffffff) 05:03:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:49 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:49 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) close(0xffffffffffffffff) 05:03:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:50 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) close(0xffffffffffffffff) 05:03:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) [ 865.053478] audit: type=1326 audit(1529730230.052:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19232 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:50 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getitimer(0x0, &(0x7f00000000c0)) 05:03:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:50 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:50 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:50 executing program 3: dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:50 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getitimer(0x0, &(0x7f00000000c0)) 05:03:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:50 executing program 7: pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:50 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) [ 866.019673] audit: type=1326 audit(1529730231.018:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19299 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:51 executing program 7: pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) getitimer(0x0, &(0x7f00000000c0)) 05:03:51 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:51 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:51 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:51 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:51 executing program 7: pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:51 executing program 6: seccomp(0x8000000000000001, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000006c0)=[{0x6}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000680)=0x14) mknod(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:03:51 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:51 executing program 4: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:51 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:52 executing program 4: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) [ 866.952879] audit: type=1326 audit(1529730231.951:1862): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19335 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:52 executing program 5: syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:52 executing program 4: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:52 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:53 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) [ 868.792730] audit: type=1326 audit(1529730233.791:1863): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19479 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) prctl$setfpexc(0xc, 0x0) 05:03:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) prctl$setfpexc(0xc, 0x0) 05:03:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) [ 869.714703] audit: type=1326 audit(1529730234.713:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19535 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) [ 869.801977] audit: type=1326 audit(1529730234.759:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19542 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) prctl$setfpexc(0xc, 0x0) 05:03:54 executing program 1: unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) [ 869.897940] audit: type=1326 audit(1529730234.863:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19550 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) [ 870.023458] audit: type=1326 audit(1529730235.000:1867): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19559 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:55 executing program 1: unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) close(0xffffffffffffffff) 05:03:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:55 executing program 1: unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:55 executing program 6: msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) [ 870.694317] audit: type=1326 audit(1529730235.690:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19580 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:55 executing program 6: msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) [ 870.727868] audit: type=1326 audit(1529730235.714:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19587 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 870.747988] audit: type=1326 audit(1529730235.719:1870): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19585 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 870.767768] audit: type=1326 audit(1529730235.720:1871): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19591 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:55 executing program 6: msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) [ 870.919026] audit: type=1326 audit(1529730235.917:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19604 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) 05:03:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) 05:03:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000040)) 05:03:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) 05:03:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5002e}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) getitimer(0x0, &(0x7f00000000c0)) 05:03:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:03:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50030}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:03:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000a40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:03:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:03:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:03:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:03:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:03:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:03:58 executing program 3: add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:03:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:03:58 executing program 3: add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:03:58 executing program 3: add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:03:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:03:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:03:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:03:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) [ 873.997942] kauditd_printk_skb: 10 callbacks suppressed [ 873.997962] audit: type=1326 audit(1529730238.996:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19777 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:03:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) [ 874.141816] audit: type=1326 audit(1529730239.091:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19788 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:03:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:03:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:03:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:03:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:03:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) unshare(0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000040)=""/63) 05:03:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:03:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:03:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) [ 874.935971] audit: type=1326 audit(1529730239.934:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19828 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) msgget$private(0x0, 0x0) prctl$setfpexc(0xc, 0x0) 05:04:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:04:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:00 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) socket$nl_route(0x10, 0x3, 0x0) [ 875.124608] audit: type=1326 audit(1529730240.122:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19844 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:00 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:04:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:04:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) socket$nl_route(0x10, 0x3, 0x0) 05:04:00 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:01 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) socket$nl_route(0x10, 0x3, 0x0) 05:04:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:04:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:01 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:04:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:01 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f2}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:04:01 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:01 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:01 executing program 5: pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:04:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:01 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) [ 876.725487] audit: type=1326 audit(1529730241.724:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19950 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:01 executing program 5: pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:02 executing program 5: pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:02 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:02 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:04:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) [ 877.704724] audit: type=1326 audit(1529730242.703:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20016 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:02 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000140), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/zero\x00', 0x0, 0x0) 05:04:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) [ 878.688050] audit: type=1326 audit(1529730243.686:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20068 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:03 executing program 6: socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:03 executing program 1: geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) [ 878.797155] audit: type=1326 audit(1529730243.772:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20072 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:04 executing program 6: socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:04 executing program 1: geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:04 executing program 1: geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:04 executing program 6: socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) [ 879.870005] audit: type=1326 audit(1529730244.868:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20143 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5022b}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) [ 880.033445] audit: type=1326 audit(1529730245.031:1892): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20149 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) [ 880.235947] audit: type=1326 audit(1529730245.234:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20171 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x800000006}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) 05:04:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) [ 880.799037] audit: type=1326 audit(1529730245.797:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20179 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) [ 880.871494] audit: type=1326 audit(1529730245.818:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20181 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 880.891563] audit: type=1326 audit(1529730245.839:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20185 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) [ 881.007910] audit: type=1326 audit(1529730245.996:1897): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20198 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) [ 881.280602] audit: type=1326 audit(1529730246.279:1898): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20220 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) [ 881.814752] audit: type=1326 audit(1529730246.813:1899): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20244 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 881.883140] audit: type=1326 audit(1529730246.847:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20248 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)) 05:04:06 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:07 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) socket$nl_route(0x10, 0x3, 0x0) 05:04:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:07 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)}) 05:04:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 05:04:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaa00ffffffffffdf81000000000d08008a08000000007e512e5686b8a498e150d085fa88c54bcafa058a8c4b2b26585f44f25bdabdf36200b93b71151e896bfef1e8dda14a949e918de815d65e4a584ea2b8a02d583c"], 0x0) 05:04:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:08 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:09 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:09 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:09 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:09 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) geteuid() ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 05:04:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:09 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:09 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000b80)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 05:04:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:10 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) [ 885.211028] kauditd_printk_skb: 9 callbacks suppressed [ 885.216554] audit: type=1326 audit(1529730250.209:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20449 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:10 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 885.720659] audit: type=1326 audit(1529730250.719:1911): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20461 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:10 executing program 2: pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) 05:04:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:10 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:11 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:11 executing program 2: pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 05:04:11 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:11 executing program 7: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) [ 886.662925] audit: type=1326 audit(1529730251.661:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20508 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:11 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:11 executing program 7: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:11 executing program 2: pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:11 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:11 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 05:04:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:04:12 executing program 7: accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:12 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 05:04:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) [ 887.624261] audit: type=1326 audit(1529730252.622:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20564 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:12 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:12 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 05:04:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:13 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) 05:04:13 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:13 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:13 executing program 6: 05:04:13 executing program 3: [ 888.569705] audit: type=1326 audit(1529730253.568:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20613 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:13 executing program 6: 05:04:13 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:13 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:13 executing program 3: 05:04:13 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) [ 888.758758] warn_alloc: 23 callbacks suppressed [ 888.758773] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 888.773950] syz-executor2 cpuset=syz2 mems_allowed=0 [ 888.779069] CPU: 1 PID: 20628 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 888.785902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.795248] Call Trace: [ 888.797837] dump_stack+0x185/0x1d0 [ 888.801465] warn_alloc+0x430/0x690 [ 888.805108] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 888.809951] ? kernel_poison_pages+0x40/0x360 [ 888.814451] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 888.819903] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 888.824853] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 888.829876] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 888.835239] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.840080] ? __msan_poison_alloca+0x15c/0x1d0 [ 888.844753] kmsan_alloc_page+0x82/0xe0 [ 888.848725] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 888.853479] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.858315] ? __msan_poison_alloca+0x15c/0x1d0 [ 888.862981] ? __should_failslab+0x278/0x2a0 [ 888.867395] ? should_fail+0x57/0xab0 [ 888.871194] ? __should_failslab+0x278/0x2a0 [ 888.875606] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.880444] ? __msan_poison_alloca+0x15c/0x1d0 [ 888.885113] ? kmsan_set_origin+0x9e/0x160 [ 888.889355] alloc_pages_vma+0x1555/0x17f0 [ 888.893592] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 888.898705] handle_mm_fault+0x44ca/0x7ed0 [ 888.902938] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.907792] __do_page_fault+0xec6/0x1a10 [ 888.911943] do_page_fault+0xb7/0x250 [ 888.915740] ? page_fault+0x8/0x30 [ 888.919279] page_fault+0x1e/0x30 [ 888.922726] RIP: 0033:0x4075fa [ 888.925903] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 888.931257] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 888.938523] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 888.945787] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 888.953086] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d92cf [ 888.960349] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 888.967623] warn_alloc_show_mem: 2 callbacks suppressed [ 888.967626] Mem-Info: [ 888.975399] active_anon:168414 inactive_anon:72 isolated_anon:0 [ 888.975399] active_file:1661 inactive_file:1004 isolated_file:0 [ 888.975399] unevictable:0 dirty:32 writeback:0 unstable:0 [ 888.975399] slab_reclaimable:3383 slab_unreclaimable:9513 [ 888.975399] mapped:67392 shmem:84 pagetables:1416 bounce:0 [ 888.975399] free:54555 free_pcp:461 free_cma:0 [ 889.008502] Node 0 active_anon:673656kB inactive_anon:288kB active_file:6980kB inactive_file:3416kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269452kB dirty:128kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 889.036434] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 889.062574] lowmem_reserve[]: 0 2817 7244 7244 [ 889.067167] Node 0 DMA32 free:151300kB min:26224kB low:32780kB high:39336kB active_anon:198396kB inactive_anon:12kB active_file:2528kB inactive_file:2532kB unevictable:0kB writepending:96kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2944kB pagetables:2840kB bounce:0kB free_pcp:200kB local_pcp:64kB free_cma:0kB [ 889.096338] lowmem_reserve[]: 0 0 4426 4426 [ 889.100672] Node 0 Normal free:51464kB min:41208kB low:51508kB high:61808kB active_anon:475260kB inactive_anon:276kB active_file:4740kB inactive_file:1036kB unevictable:0kB writepending:32kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2824kB bounce:0kB free_pcp:1252kB local_pcp:548kB free_cma:0kB [ 889.130105] lowmem_reserve[]: 0 0 0 0 [ 889.133918] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 889.147155] Node 0 DMA32: 4605*4kB (UMH) 5950*8kB (UM) 1650*16kB (UME) 633*32kB (UM) 331*64kB (UM) 106*128kB (UME) 14*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 151012kB [ 889.162914] Node 0 Normal: 9240*4kB (UMEH) 1847*8kB (UMH) 2*16kB (U) 2*32kB (U) 2*64kB (UH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51960kB [ 889.176754] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 889.185308] 2605 total pagecache pages [ 889.189181] 0 pages in swap cache [ 889.192612] Swap cache stats: add 0, delete 0, find 0/0 [ 889.197949] Free swap = 0kB [ 889.200943] Total swap = 0kB [ 889.203940] 1965969 pages RAM [ 889.207019] 0 pages HighMem/MovableOnly 05:04:13 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:13 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:14 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) [ 889.210968] 106316 pages reserved [ 889.237264] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 889.247785] syz-executor7 cpuset=syz7 mems_allowed=0 [ 889.252904] CPU: 1 PID: 20648 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 889.259733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.269082] Call Trace: [ 889.271675] dump_stack+0x185/0x1d0 [ 889.275302] warn_alloc+0x430/0x690 [ 889.278943] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 889.283781] ? kernel_poison_pages+0x40/0x360 [ 889.288274] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 889.293720] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 889.298667] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 889.303697] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.308538] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.313213] kmsan_alloc_page+0x82/0xe0 [ 889.317189] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 889.321947] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.326788] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.331455] ? __should_failslab+0x278/0x2a0 [ 889.335862] ? should_fail+0x57/0xab0 [ 889.339667] ? __should_failslab+0x278/0x2a0 [ 889.344070] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.348913] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.353582] ? kmsan_set_origin+0x9e/0x160 [ 889.357826] alloc_pages_vma+0x1555/0x17f0 [ 889.362064] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 889.367171] handle_mm_fault+0x44ca/0x7ed0 [ 889.371406] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.376256] __do_page_fault+0xec6/0x1a10 [ 889.380427] do_page_fault+0xb7/0x250 [ 889.384217] ? page_fault+0x8/0x30 [ 889.387741] page_fault+0x1e/0x30 [ 889.391173] RIP: 0033:0x4075fa [ 889.394347] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 889.399698] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 889.406960] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 889.414213] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 889.421460] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d94b4 [ 889.428710] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) [ 889.662640] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 889.673162] syz-executor0 cpuset=syz0 mems_allowed=0 [ 889.678283] CPU: 0 PID: 20658 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 889.685114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.694458] Call Trace: [ 889.697049] dump_stack+0x185/0x1d0 [ 889.700684] warn_alloc+0x430/0x690 [ 889.704320] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 889.709159] ? kernel_poison_pages+0x40/0x360 [ 889.713647] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 889.719087] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 889.724032] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 889.729048] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.733877] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.738543] kmsan_alloc_page+0x82/0xe0 [ 889.742505] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 889.747246] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.752080] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.756731] ? __should_failslab+0x278/0x2a0 [ 889.761117] ? should_fail+0x57/0xab0 [ 889.764897] ? __should_failslab+0x278/0x2a0 [ 889.769283] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.774112] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.778781] ? kmsan_set_origin+0x9e/0x160 [ 889.783026] alloc_pages_vma+0x1555/0x17f0 [ 889.787260] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 889.792344] handle_mm_fault+0x44ca/0x7ed0 [ 889.796566] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.801394] __do_page_fault+0xec6/0x1a10 [ 889.805524] do_page_fault+0xb7/0x250 [ 889.809302] ? page_fault+0x8/0x30 [ 889.812821] page_fault+0x1e/0x30 [ 889.816250] RIP: 0033:0x4075fa [ 889.819417] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 889.824759] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 889.832007] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 889.839253] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 889.846508] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d965d [ 889.853775] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 889.861029] warn_alloc_show_mem: 1 callbacks suppressed [ 889.861032] Mem-Info: [ 889.868767] active_anon:168354 inactive_anon:78 isolated_anon:0 [ 889.868767] active_file:610 inactive_file:723 isolated_file:0 [ 889.868767] unevictable:0 dirty:29 writeback:0 unstable:0 [ 889.868767] slab_reclaimable:3384 slab_unreclaimable:9516 [ 889.868767] mapped:66431 shmem:84 pagetables:1277 bounce:0 [ 889.868767] free:57584 free_pcp:463 free_cma:0 [ 889.901645] Node 0 active_anon:673416kB inactive_anon:312kB active_file:2440kB inactive_file:2892kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:265724kB dirty:116kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 889.929657] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 889.955765] lowmem_reserve[]: 0 2817 7244 7244 [ 889.960332] Node 0 DMA32 free:161604kB min:26224kB low:32780kB high:39336kB active_anon:198132kB inactive_anon:24kB active_file:96kB inactive_file:532kB unevictable:0kB writepending:108kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2240kB pagetables:2276kB bounce:0kB free_pcp:1096kB local_pcp:372kB free_cma:0kB [ 889.989488] lowmem_reserve[]: 0 0 4426 4426 [ 889.993794] Node 0 Normal free:52828kB min:41208kB low:51508kB high:61808kB active_anon:475284kB inactive_anon:288kB active_file:2344kB inactive_file:2360kB unevictable:0kB writepending:8kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2832kB bounce:0kB free_pcp:756kB local_pcp:100kB free_cma:0kB [ 890.023020] lowmem_reserve[]: 0 0 0 0 [ 890.026814] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 890.040007] Node 0 DMA32: 6085*4kB (UMH) 6142*8kB (UM) 1690*16kB (UME) 637*32kB (UM) 354*64kB (UM) 109*128kB (UME) 16*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 161604kB [ 890.055740] Node 0 Normal: 9409*4kB (UMEH) 1879*8kB (UMH) 2*16kB (U) 2*32kB (U) 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52828kB [ 890.069449] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 890.077996] 1425 total pagecache pages [ 890.081858] 0 pages in swap cache [ 890.085283] Swap cache stats: add 0, delete 0, find 0/0 [ 890.090617] Free swap = 0kB [ 890.093607] Total swap = 0kB [ 890.096596] 1965969 pages RAM [ 890.099687] 0 pages HighMem/MovableOnly [ 890.103631] 106316 pages reserved 05:04:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:14 executing program 3: 05:04:14 executing program 6: 05:04:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 890.111854] audit: type=1326 audit(1529730255.110:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20658 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 890.173431] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 890.183957] syz-executor2 cpuset=syz2 mems_allowed=0 [ 890.189072] CPU: 1 PID: 20662 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 890.195904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.205251] Call Trace: [ 890.207848] dump_stack+0x185/0x1d0 [ 890.211482] warn_alloc+0x430/0x690 [ 890.215130] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 890.219973] ? kernel_poison_pages+0x40/0x360 [ 890.224474] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 890.229922] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 890.234870] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 890.239894] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.244735] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.249434] kmsan_alloc_page+0x82/0xe0 [ 890.253417] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 890.258174] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.263017] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.267683] ? __should_failslab+0x278/0x2a0 [ 890.272090] ? should_fail+0x57/0xab0 [ 890.275884] ? __should_failslab+0x278/0x2a0 [ 890.280287] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.285123] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.289799] ? kmsan_set_origin+0x9e/0x160 [ 890.294039] alloc_pages_vma+0x1555/0x17f0 [ 890.298278] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 890.303385] handle_mm_fault+0x44ca/0x7ed0 [ 890.307623] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.312472] __do_page_fault+0xec6/0x1a10 [ 890.316625] do_page_fault+0xb7/0x250 [ 890.320428] ? page_fault+0x8/0x30 05:04:15 executing program 6: 05:04:15 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}}}, 0x108) 05:04:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:15 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000002c0)=0x14) 05:04:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) msgget$private(0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000640)) 05:04:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) [ 890.323964] page_fault+0x1e/0x30 [ 890.327414] RIP: 0033:0x4075fa [ 890.330593] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 890.335946] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 890.343217] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 890.350478] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 890.357738] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d985c [ 890.364999] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 890.400592] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 890.411114] syz-executor1 cpuset=syz1 mems_allowed=0 [ 890.416235] CPU: 1 PID: 20677 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 890.423071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.432419] Call Trace: [ 890.435006] dump_stack+0x185/0x1d0 [ 890.438636] warn_alloc+0x430/0x690 [ 890.442278] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 890.447118] ? kernel_poison_pages+0x40/0x360 [ 890.451601] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 890.457036] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 890.461972] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 890.466978] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.471802] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.476455] kmsan_alloc_page+0x82/0xe0 [ 890.480414] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 890.485151] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.489975] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.494623] ? __should_failslab+0x278/0x2a0 [ 890.499014] ? should_fail+0x57/0xab0 [ 890.502796] ? __should_failslab+0x278/0x2a0 [ 890.507186] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.512008] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.516658] ? kmsan_set_origin+0x9e/0x160 [ 890.520881] alloc_pages_vma+0x1555/0x17f0 [ 890.525101] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 890.530202] handle_mm_fault+0x44ca/0x7ed0 [ 890.534418] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.539249] __do_page_fault+0xec6/0x1a10 [ 890.543382] do_page_fault+0xb7/0x250 [ 890.547169] ? page_fault+0x8/0x30 [ 890.550688] page_fault+0x1e/0x30 [ 890.554122] RIP: 0033:0x4075fa [ 890.557289] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 890.562630] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 890.569880] RDX: 28865427f26a51b5 RSI: 0000000000000000 RDI: 0000000000e1e848 [ 890.577130] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 890.584381] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d993f [ 890.591634] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) [ 890.608670] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 890.619175] syz-executor4 cpuset=syz4 mems_allowed=0 [ 890.624287] CPU: 0 PID: 20681 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 890.631115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.640460] Call Trace: [ 890.643048] dump_stack+0x185/0x1d0 [ 890.647286] warn_alloc+0x430/0x690 [ 890.650930] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 890.655770] ? kernel_poison_pages+0x40/0x360 [ 890.660272] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 890.665742] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 890.670761] ? update_load_avg+0x1b70/0x2cc0 [ 890.675174] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.680013] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.684683] kmsan_alloc_page+0x82/0xe0 [ 890.688653] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 890.693404] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.698242] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.702911] ? __should_failslab+0x278/0x2a0 [ 890.707317] ? should_fail+0x57/0xab0 [ 890.711108] ? __should_failslab+0x278/0x2a0 [ 890.715512] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.720351] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.725022] ? kmsan_set_origin+0x9e/0x160 [ 890.729260] alloc_pages_vma+0x1555/0x17f0 [ 890.733496] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 890.738640] handle_mm_fault+0x44ca/0x7ed0 [ 890.742868] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.747722] __do_page_fault+0xec6/0x1a10 [ 890.751877] do_page_fault+0xb7/0x250 [ 890.755678] ? page_fault+0x8/0x30 05:04:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50031}]}) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') 05:04:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) [ 890.759216] page_fault+0x1e/0x30 [ 890.762661] RIP: 0033:0x4075fa [ 890.765854] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 890.771206] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000000 [ 890.778469] RDX: f1164beb8b57cb48 RSI: 0000000000000000 RDI: 00000000026e7848 [ 890.785730] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 890.792990] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d9a0f [ 890.800250] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 890.832874] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 890.843396] syz-executor3 cpuset=syz3 mems_allowed=0 [ 890.848507] CPU: 0 PID: 20683 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 890.855327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.864686] Call Trace: [ 890.867278] dump_stack+0x185/0x1d0 [ 890.870895] warn_alloc+0x430/0x690 [ 890.874523] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 890.879346] ? kernel_poison_pages+0x40/0x360 [ 890.883829] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 890.889275] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 890.894284] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.899106] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.903763] kmsan_alloc_page+0x82/0xe0 [ 890.907721] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 890.912457] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.917280] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.921929] ? __should_failslab+0x278/0x2a0 [ 890.926321] ? should_fail+0x57/0xab0 [ 890.930100] ? __should_failslab+0x278/0x2a0 [ 890.934489] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.939311] ? __msan_poison_alloca+0x15c/0x1d0 [ 890.943962] ? kmsan_set_origin+0x9e/0x160 [ 890.948186] alloc_pages_vma+0x1555/0x17f0 [ 890.952415] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 890.957515] handle_mm_fault+0x44ca/0x7ed0 [ 890.961732] ? kmsan_set_origin_inline+0x6b/0x120 [ 890.966563] __do_page_fault+0xec6/0x1a10 [ 890.970698] do_page_fault+0xb7/0x250 [ 890.974479] ? page_fault+0x8/0x30 [ 890.978002] page_fault+0x1e/0x30 [ 890.981433] RIP: 0033:0x4075fa [ 890.984602] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 890.989948] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 890.997199] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 [ 891.004449] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 891.011703] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d9af0 [ 891.018954] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 891.026208] warn_alloc_show_mem: 3 callbacks suppressed [ 891.026211] Mem-Info: [ 891.033969] active_anon:168484 inactive_anon:76 isolated_anon:0 [ 891.033969] active_file:720 inactive_file:1101 isolated_file:0 [ 891.033969] unevictable:0 dirty:32 writeback:3 unstable:0 [ 891.033969] slab_reclaimable:3384 slab_unreclaimable:9516 [ 891.033969] mapped:67054 shmem:84 pagetables:1449 bounce:0 [ 891.033969] free:55052 free_pcp:374 free_cma:0 [ 891.066948] Node 0 active_anon:673936kB inactive_anon:304kB active_file:2880kB inactive_file:4404kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268216kB dirty:128kB writeback:12kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 891.094943] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 891.121052] lowmem_reserve[]: 0 2817 7244 7244 [ 891.125629] Node 0 DMA32 free:152592kB min:26224kB low:32780kB high:39336kB active_anon:198512kB inactive_anon:20kB active_file:812kB inactive_file:2848kB unevictable:0kB writepending:132kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:3200kB pagetables:2924kB bounce:0kB free_pcp:1140kB local_pcp:420kB free_cma:0kB [ 891.154945] lowmem_reserve[]: 0 0 4426 4426 [ 891.159251] Node 0 Normal free:51712kB min:41208kB low:51508kB high:61808kB active_anon:475328kB inactive_anon:284kB active_file:2484kB inactive_file:1684kB unevictable:0kB writepending:8kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2872kB bounce:0kB free_pcp:356kB local_pcp:184kB free_cma:0kB [ 891.188483] lowmem_reserve[]: 0 0 0 0 [ 891.192269] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 891.205471] Node 0 DMA32: 4958*4kB (UMH) 5933*8kB (M) 1673*16kB (UME) 637*32kB (UM) 317*64kB (UM) 104*128kB (UME) 16*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 152144kB [ 891.221122] Node 0 Normal: 9054*4kB (UMEH) 1848*8kB (UMH) 0*16kB 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51064kB [ 891.234147] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 891.242700] 1940 total pagecache pages [ 891.246561] 0 pages in swap cache [ 891.249987] Swap cache stats: add 0, delete 0, find 0/0 [ 891.255325] Free swap = 0kB [ 891.258316] Total swap = 0kB [ 891.261309] 1965969 pages RAM [ 891.264389] 0 pages HighMem/MovableOnly [ 891.268339] 106316 pages reserved [ 891.300753] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 891.311275] syz-executor7 cpuset=syz7 mems_allowed=0 [ 891.316408] CPU: 1 PID: 20693 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 891.323238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.332585] Call Trace: [ 891.335175] dump_stack+0x185/0x1d0 [ 891.338809] warn_alloc+0x430/0x690 [ 891.342447] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 891.347286] ? kernel_poison_pages+0x40/0x360 [ 891.351788] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 891.357259] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 891.362283] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.367123] ? __msan_poison_alloca+0x15c/0x1d0 [ 891.371801] kmsan_alloc_page+0x82/0xe0 [ 891.375779] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 891.380540] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.385386] ? __msan_poison_alloca+0x15c/0x1d0 [ 891.390062] ? __should_failslab+0x278/0x2a0 [ 891.394474] ? should_fail+0x57/0xab0 [ 891.398268] ? __should_failslab+0x278/0x2a0 [ 891.402675] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.407519] ? __msan_poison_alloca+0x15c/0x1d0 [ 891.412189] ? kmsan_set_origin+0x9e/0x160 [ 891.416435] alloc_pages_vma+0x1555/0x17f0 [ 891.420677] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 891.425777] handle_mm_fault+0x44ca/0x7ed0 [ 891.429993] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.434825] __do_page_fault+0xec6/0x1a10 [ 891.438958] do_page_fault+0xb7/0x250 [ 891.442741] ? page_fault+0x8/0x30 [ 891.446265] page_fault+0x1e/0x30 05:04:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x0) [ 891.449700] RIP: 0033:0x4075fa [ 891.452870] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 891.458214] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000000 [ 891.465462] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 891.472713] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 891.480478] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d9cc3 [ 891.487735] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) [ 891.499180] audit: type=1326 audit(1529730256.495:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20696 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 891.601094] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 891.611618] syz-executor1 cpuset=syz1 mems_allowed=0 [ 891.616739] CPU: 1 PID: 20700 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 891.623570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.632920] Call Trace: [ 891.635515] dump_stack+0x185/0x1d0 [ 891.639147] warn_alloc+0x430/0x690 [ 891.642786] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 891.647631] ? kernel_poison_pages+0x40/0x360 [ 891.652129] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 891.657582] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 891.662536] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 891.667570] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.672418] ? __msan_poison_alloca+0x15c/0x1d0 [ 891.677095] kmsan_alloc_page+0x82/0xe0 [ 891.681069] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 891.685827] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.690671] ? __msan_poison_alloca+0x15c/0x1d0 [ 891.695335] ? __should_failslab+0x278/0x2a0 [ 891.699745] ? should_fail+0x57/0xab0 [ 891.703542] ? __should_failslab+0x278/0x2a0 [ 891.707939] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.712764] ? __msan_poison_alloca+0x15c/0x1d0 [ 891.717416] ? kmsan_set_origin+0x9e/0x160 [ 891.721639] alloc_pages_vma+0x1555/0x17f0 [ 891.725864] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 891.730953] handle_mm_fault+0x44ca/0x7ed0 [ 891.735167] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.740010] __do_page_fault+0xec6/0x1a10 [ 891.744148] do_page_fault+0xb7/0x250 [ 891.747933] ? page_fault+0x8/0x30 05:04:16 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) [ 891.751463] page_fault+0x1e/0x30 [ 891.754896] RIP: 0033:0x4075fa [ 891.758071] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 891.763413] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 891.770664] RDX: 28865427f26a51b5 RSI: 0000000000000000 RDI: 0000000000e1e848 [ 891.778003] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 891.785252] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d9df0 [ 891.792501] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:16 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) [ 891.819869] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 891.830444] syz-executor4 cpuset=syz4 mems_allowed=0 [ 891.835561] CPU: 1 PID: 20710 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 891.842399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.851748] Call Trace: [ 891.854341] dump_stack+0x185/0x1d0 [ 891.857971] warn_alloc+0x430/0x690 [ 891.861609] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 891.866451] ? kernel_poison_pages+0x40/0x360 [ 891.870953] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 891.876413] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 891.881362] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 891.886396] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.891237] ? __msan_poison_alloca+0x15c/0x1d0 [ 891.895912] kmsan_alloc_page+0x82/0xe0 [ 891.899891] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 891.904647] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.909490] ? __msan_poison_alloca+0x15c/0x1d0 [ 891.914154] ? __should_failslab+0x278/0x2a0 [ 891.918548] ? should_fail+0x57/0xab0 [ 891.922328] ? __should_failslab+0x278/0x2a0 [ 891.926717] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.931561] ? __msan_poison_alloca+0x15c/0x1d0 [ 891.936213] ? kmsan_set_origin+0x9e/0x160 [ 891.940433] alloc_pages_vma+0x1555/0x17f0 [ 891.944657] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 891.949746] handle_mm_fault+0x44ca/0x7ed0 [ 891.953963] ? kmsan_set_origin_inline+0x6b/0x120 [ 891.958796] __do_page_fault+0xec6/0x1a10 [ 891.962931] do_page_fault+0xb7/0x250 [ 891.966716] ? page_fault+0x8/0x30 [ 891.970248] page_fault+0x1e/0x30 [ 891.973683] RIP: 0033:0x4075fa [ 891.976850] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 891.982193] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 891.989445] RDX: f1164beb8b57cb48 RSI: 0000000000000000 RDI: 00000000026e7848 [ 891.996696] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 892.003957] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d9ecb [ 892.011206] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:17 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:17 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 892.346923] audit: type=1326 audit(1529730257.345:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20747 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) socket$packet(0x11, 0x0, 0x300) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 05:04:17 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:17 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) [ 892.564300] audit: type=1326 audit(1529730257.562:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20768 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:17 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) socket$packet(0x11, 0x0, 0x300) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 05:04:17 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:18 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) socket$packet(0x11, 0x0, 0x300) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 05:04:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) [ 893.287611] audit: type=1326 audit(1529730258.285:1919): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20811 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 893.343186] audit: type=1326 audit(1529730258.317:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20816 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:18 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) socket$packet(0x11, 0x0, 0x300) open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) [ 893.534441] audit: type=1326 audit(1529730258.533:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20834 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:18 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe2(&(0x7f0000000300), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) 05:04:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:19 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) [ 894.272879] audit: type=1326 audit(1529730259.271:1922): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20860 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 05:04:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:19 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:19 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'eql\x00'}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000340)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @random="7c2089fdb67a"}, 0x0, {0x2, 0x0, @rand_addr}, 'bridge_slave_1\x00'}) 05:04:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) [ 894.483551] audit: type=1326 audit(1529730259.482:1923): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20882 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:19 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) [ 894.548430] audit: type=1326 audit(1529730259.536:1924): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20889 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x5002d}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) 05:04:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:20 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:20 executing program 6: clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000140)=0x2, 0x4) 05:04:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) [ 895.504702] audit: type=1326 audit(1529730260.503:1925): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20939 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:20 executing program 6: clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:20 executing program 6: clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) [ 896.654008] kauditd_printk_skb: 1 callbacks suppressed [ 896.654028] audit: type=1326 audit(1529730261.652:1927): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21021 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000100)=""/227) 05:04:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) [ 897.629852] audit: type=1326 audit(1529730262.628:1928): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21072 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:22 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:22 executing program 2: perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:23 executing program 4: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:23 executing program 2: perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:23 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) socket$netlink(0x10, 0x3, 0x0) [ 898.586573] audit: type=1326 audit(1529730263.585:1929): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21111 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:23 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:23 executing program 2: perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:23 executing program 4: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) socket$netlink(0x10, 0x3, 0x0) 05:04:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:23 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 899.107177] warn_alloc: 12 callbacks suppressed [ 899.107194] khugepaged: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 899.122160] khugepaged cpuset=/ mems_allowed=0 [ 899.126762] CPU: 0 PID: 802 Comm: khugepaged Not tainted 4.17.0+ #9 [ 899.133163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.142516] Call Trace: [ 899.145109] dump_stack+0x185/0x1d0 [ 899.148740] warn_alloc+0x430/0x690 [ 899.152386] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 899.157230] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 899.162710] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 899.167641] ? try_to_compact_pages+0x1643/0x1a40 [ 899.172486] ? try_to_compact_pages+0x19bf/0x1a40 [ 899.177331] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.182176] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.186847] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 899.192213] ? compaction_defer_reset+0x62/0x3a0 [ 899.196966] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 899.202326] ? compaction_defer_reset+0x109/0x3a0 [ 899.207169] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 899.212530] ? compaction_defer_reset+0x321/0x3a0 [ 899.217372] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 899.222738] kmsan_alloc_page+0x82/0xe0 [ 899.226711] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 899.231466] ? __mmdrop+0x91c/0x930 [ 899.235103] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.239775] ? _cond_resched+0x3c/0xd0 [ 899.243678] khugepaged_do_scan+0x8c16/0xf190 [ 899.248171] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 899.253614] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.258443] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.263107] khugepaged+0xca/0xbc0 [ 899.266625] ? init_wait_entry+0x1a0/0x1a0 [ 899.270839] kthread+0x4db/0x6c0 [ 899.274185] ? start_stop_khugepaged+0x790/0x790 [ 899.278919] ? kthread_blkcg+0xf0/0xf0 [ 899.282784] ret_from_fork+0x35/0x40 [ 899.286482] warn_alloc_show_mem: 3 callbacks suppressed [ 899.286485] Mem-Info: [ 899.294219] active_anon:168349 inactive_anon:74 isolated_anon:18 [ 899.294219] active_file:815 inactive_file:775 isolated_file:2 [ 899.294219] unevictable:0 dirty:60 writeback:0 unstable:0 [ 899.294219] slab_reclaimable:3384 slab_unreclaimable:9523 [ 899.294219] mapped:66826 shmem:84 pagetables:1280 bounce:0 [ 899.294219] free:52538 free_pcp:304 free_cma:0 [ 899.327188] Node 0 active_anon:673396kB inactive_anon:296kB active_file:3260kB inactive_file:3100kB unevictable:0kB isolated(anon):72kB isolated(file):8kB mapped:267304kB dirty:240kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 899.355188] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 899.381301] lowmem_reserve[]: 0 2817 7244 7244 [ 899.385873] Node 0 DMA32 free:141820kB min:26224kB low:32780kB high:39336kB active_anon:198268kB inactive_anon:20kB active_file:964kB inactive_file:2824kB unevictable:0kB writepending:172kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2240kB pagetables:2296kB bounce:0kB free_pcp:64kB local_pcp:44kB free_cma:0kB [ 899.414933] lowmem_reserve[]: 0 0 4426 4426 [ 899.419239] Node 0 Normal free:52428kB min:41208kB low:51508kB high:61808kB active_anon:475260kB inactive_anon:276kB active_file:2644kB inactive_file:880kB unevictable:0kB writepending:68kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2824kB bounce:0kB free_pcp:1240kB local_pcp:464kB free_cma:0kB [ 899.448551] lowmem_reserve[]: 0 0 0 0 [ 899.452345] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 899.465561] Node 0 DMA32: 4617*4kB (UMH) 5470*8kB (UM) 1552*16kB (UME) 570*32kB (UM) 300*64kB (UM) 84*128kB (UME) 4*256kB (UM) 3*512kB (M) 2*1024kB (M) 1*2048kB (M) 0*4096kB = 141908kB [ 899.482145] Node 0 Normal: 9337*4kB (UMEH) 1900*8kB (UMH) 3*16kB (U) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52660kB [ 899.495522] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 899.504091] 1659 total pagecache pages 05:04:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) socket$netlink(0x10, 0x3, 0x0) 05:04:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 899.507967] 0 pages in swap cache [ 899.511414] Swap cache stats: add 0, delete 0, find 0/0 [ 899.516763] Free swap = 0kB [ 899.519769] Total swap = 0kB [ 899.522771] 1965969 pages RAM [ 899.525848] 0 pages HighMem/MovableOnly [ 899.529794] 106316 pages reserved [ 899.566719] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 899.577262] syz-executor7 cpuset=syz7 mems_allowed=0 [ 899.582555] CPU: 1 PID: 21160 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 899.589392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.598751] Call Trace: [ 899.601339] dump_stack+0x185/0x1d0 [ 899.604971] warn_alloc+0x430/0x690 [ 899.608611] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 899.613451] ? kernel_poison_pages+0x40/0x360 [ 899.617954] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 899.623411] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 899.628361] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 899.633387] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.638251] kmsan_alloc_page+0x82/0xe0 [ 899.642581] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 899.647342] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.652187] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.656854] ? __should_failslab+0x278/0x2a0 [ 899.661268] ? should_fail+0x57/0xab0 [ 899.665073] ? __should_failslab+0x278/0x2a0 [ 899.669480] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.674324] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.678999] ? kmsan_set_origin+0x9e/0x160 [ 899.683250] alloc_pages_vma+0x1555/0x17f0 [ 899.687491] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 899.692599] handle_mm_fault+0x44ca/0x7ed0 [ 899.696833] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.701682] __do_page_fault+0xec6/0x1a10 [ 899.705840] do_page_fault+0xb7/0x250 [ 899.709648] ? page_fault+0x8/0x30 [ 899.713188] page_fault+0x1e/0x30 05:04:24 executing program 4: getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:24 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022d}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 899.716634] RIP: 0033:0x4075fa [ 899.719820] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 899.725184] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 899.732452] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 899.739809] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 899.747079] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dbd0e [ 899.754338] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 899.764541] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 899.775066] syz-executor3 cpuset=syz3 mems_allowed=0 [ 899.780187] CPU: 1 PID: 21164 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 899.787021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.796372] Call Trace: [ 899.798968] dump_stack+0x185/0x1d0 [ 899.802598] warn_alloc+0x430/0x690 [ 899.806240] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 899.811086] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 899.816571] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 899.821526] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 899.826558] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.831423] kmsan_alloc_page+0x82/0xe0 [ 899.835409] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 899.840170] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.845015] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.849686] ? __should_failslab+0x278/0x2a0 [ 899.854098] ? should_fail+0x57/0xab0 [ 899.857897] ? __should_failslab+0x278/0x2a0 [ 899.862307] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.867145] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.871815] ? kmsan_set_origin+0x9e/0x160 [ 899.876062] alloc_pages_vma+0x1555/0x17f0 [ 899.880306] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 899.885422] handle_mm_fault+0x44ca/0x7ed0 [ 899.889652] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.894489] __do_page_fault+0xec6/0x1a10 [ 899.898628] do_page_fault+0xb7/0x250 [ 899.902415] ? page_fault+0x8/0x30 [ 899.905936] page_fault+0x1e/0x30 [ 899.909367] RIP: 0033:0x4075fa [ 899.912541] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 899.917882] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 899.925221] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 [ 899.932472] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 899.939724] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dbdd3 [ 899.946976] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 899.958640] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 899.969141] syz-executor5 cpuset=syz5 mems_allowed=0 [ 899.974258] CPU: 1 PID: 21172 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 899.981091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.990448] Call Trace: [ 899.993042] dump_stack+0x185/0x1d0 [ 899.996680] warn_alloc+0x430/0x690 [ 900.000320] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 900.005169] ? kernel_poison_pages+0x40/0x360 [ 900.009681] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 900.015138] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 900.020087] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 900.025117] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.029978] kmsan_alloc_page+0x82/0xe0 [ 900.033970] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 900.038731] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.045669] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.050356] ? __should_failslab+0x278/0x2a0 [ 900.054776] ? should_fail+0x57/0xab0 [ 900.058582] ? __should_failslab+0x278/0x2a0 [ 900.062997] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.067846] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.072525] ? kmsan_set_origin+0x9e/0x160 [ 900.076772] alloc_pages_vma+0x1555/0x17f0 [ 900.081014] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 900.086133] handle_mm_fault+0x44ca/0x7ed0 [ 900.090366] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.095221] __do_page_fault+0xec6/0x1a10 [ 900.099381] do_page_fault+0xb7/0x250 [ 900.103186] ? page_fault+0x8/0x30 [ 900.106731] page_fault+0x1e/0x30 [ 900.110175] RIP: 0033:0x4075fa [ 900.113358] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:04:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 900.118717] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 900.125983] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 900.133247] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 900.140512] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dbe95 [ 900.147782] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 900.161802] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 900.172314] syz-executor6 cpuset=syz6 mems_allowed=0 [ 900.177431] CPU: 1 PID: 21175 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 900.184268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.193623] Call Trace: [ 900.196219] dump_stack+0x185/0x1d0 [ 900.199855] warn_alloc+0x430/0x690 [ 900.203494] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 900.208337] ? kernel_poison_pages+0x40/0x360 [ 900.212840] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 900.218295] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 900.223246] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 900.228270] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.233121] kmsan_alloc_page+0x82/0xe0 [ 900.237096] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 900.241846] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.246675] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.251329] ? __should_failslab+0x278/0x2a0 [ 900.255723] ? should_fail+0x57/0xab0 [ 900.259507] ? __should_failslab+0x278/0x2a0 [ 900.263896] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.268722] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.273374] ? kmsan_set_origin+0x9e/0x160 [ 900.277608] alloc_pages_vma+0x1555/0x17f0 [ 900.281829] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 900.286919] handle_mm_fault+0x44ca/0x7ed0 [ 900.291133] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.295966] __do_page_fault+0xec6/0x1a10 [ 900.300104] do_page_fault+0xb7/0x250 [ 900.303889] ? page_fault+0x8/0x30 [ 900.307413] page_fault+0x1e/0x30 [ 900.310848] RIP: 0033:0x4075fa [ 900.314018] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 900.319374] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 900.326635] RDX: 935e9f582c8804e2 RSI: 0000000000000000 RDI: 0000000001de4848 [ 900.333887] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 900.341140] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dbf61 [ 900.348406] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 900.355674] warn_alloc_show_mem: 3 callbacks suppressed [ 900.355677] Mem-Info: [ 900.363441] active_anon:168439 inactive_anon:76 isolated_anon:0 [ 900.363441] active_file:951 inactive_file:1217 isolated_file:0 [ 900.363441] unevictable:0 dirty:64 writeback:0 unstable:0 [ 900.363441] slab_reclaimable:3384 slab_unreclaimable:9526 [ 900.363441] mapped:66712 shmem:84 pagetables:1407 bounce:0 [ 900.363441] free:49777 free_pcp:500 free_cma:0 [ 900.396857] Node 0 active_anon:673756kB inactive_anon:304kB active_file:3804kB inactive_file:4868kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266848kB dirty:256kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 900.424773] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 900.450890] lowmem_reserve[]: 0 2817 7244 7244 [ 900.455463] Node 0 DMA32 free:131432kB min:26224kB low:32780kB high:39336kB active_anon:198292kB inactive_anon:28kB active_file:1508kB inactive_file:3492kB unevictable:0kB writepending:172kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2944kB pagetables:2708kB bounce:0kB free_pcp:1196kB local_pcp:476kB free_cma:0kB [ 900.484892] lowmem_reserve[]: 0 0 4426 4426 [ 900.489202] Node 0 Normal free:51772kB min:41208kB low:51508kB high:61808kB active_anon:475348kB inactive_anon:276kB active_file:2136kB inactive_file:1384kB unevictable:0kB writepending:84kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2920kB bounce:0kB free_pcp:804kB local_pcp:152kB free_cma:0kB [ 900.518532] lowmem_reserve[]: 0 0 0 0 [ 900.522319] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 900.535518] Node 0 DMA32: 3447*4kB (UMH) 5353*8kB (UM) 1513*16kB (UME) 563*32kB (UM) 280*64kB (UM) 81*128kB (UME) 3*256kB (M) 3*512kB (M) 2*1024kB (M) 0*2048kB 0*4096kB = 131476kB [ 900.551678] Node 0 Normal: 9066*4kB (UMEH) 1875*8kB (UMH) 4*16kB (UM) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51392kB [ 900.565139] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 900.574387] 2269 total pagecache pages [ 900.578257] 0 pages in swap cache [ 900.581687] Swap cache stats: add 0, delete 0, find 0/0 [ 900.587036] Free swap = 0kB [ 900.590038] Total swap = 0kB [ 900.593042] 1965969 pages RAM [ 900.596127] 0 pages HighMem/MovableOnly [ 900.600090] 106316 pages reserved 05:04:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:25 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) [ 900.739975] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 900.750508] syz-executor2 cpuset=syz2 mems_allowed=0 [ 900.755632] CPU: 1 PID: 21191 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 900.762472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.771828] Call Trace: [ 900.774433] dump_stack+0x185/0x1d0 [ 900.778067] warn_alloc+0x430/0x690 [ 900.781708] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 900.786551] ? kernel_poison_pages+0x40/0x360 [ 900.791049] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 900.796504] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 900.801456] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 900.806487] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.811339] kmsan_alloc_page+0x82/0xe0 [ 900.815318] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 900.820086] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.824929] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.829601] ? __should_failslab+0x278/0x2a0 [ 900.834011] ? should_fail+0x57/0xab0 [ 900.837808] ? __should_failslab+0x278/0x2a0 [ 900.842213] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.847053] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.851729] ? kmsan_set_origin+0x9e/0x160 [ 900.855969] alloc_pages_vma+0x1555/0x17f0 [ 900.860210] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 900.865320] handle_mm_fault+0x44ca/0x7ed0 [ 900.869555] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.874411] __do_page_fault+0xec6/0x1a10 [ 900.878561] do_page_fault+0xb7/0x250 [ 900.882364] ? page_fault+0x8/0x30 [ 900.885906] page_fault+0x1e/0x30 05:04:25 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 900.889352] RIP: 0033:0x4075fa [ 900.892537] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 900.897894] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 900.905161] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 900.912428] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 900.919696] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dc1a3 [ 900.926966] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 900.940127] audit: type=1326 audit(1529730265.938:1930): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21175 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:26 executing program 7: openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'wlc\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:04:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) [ 901.103987] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 901.114503] syz-executor7 cpuset=syz7 mems_allowed=0 [ 901.119620] CPU: 0 PID: 21210 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 901.126454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.135808] Call Trace: [ 901.138400] dump_stack+0x185/0x1d0 [ 901.142039] warn_alloc+0x430/0x690 [ 901.145681] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 901.150532] ? kernel_poison_pages+0x40/0x360 [ 901.155029] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 901.160474] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 901.165402] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 901.170412] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.175250] kmsan_alloc_page+0x82/0xe0 [ 901.179212] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 901.183952] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.188777] ? __msan_poison_alloca+0x15c/0x1d0 [ 901.193427] ? __should_failslab+0x278/0x2a0 [ 901.197821] ? should_fail+0x57/0xab0 [ 901.201602] ? __should_failslab+0x278/0x2a0 [ 901.205993] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.210817] ? __msan_poison_alloca+0x15c/0x1d0 [ 901.215468] ? kmsan_set_origin+0x9e/0x160 [ 901.219694] alloc_pages_vma+0x1555/0x17f0 [ 901.223918] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 901.229011] handle_mm_fault+0x44ca/0x7ed0 [ 901.233227] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.238068] __do_page_fault+0xec6/0x1a10 [ 901.242205] do_page_fault+0xb7/0x250 [ 901.245988] ? page_fault+0x8/0x30 [ 901.249507] page_fault+0x1e/0x30 [ 901.252939] RIP: 0033:0x43ceb7 [ 901.256107] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 901.261451] RAX: 00000000200001c0 RBX: 0000000000000000 RCX: 000000007665642f [ 901.268703] RDX: 000000000000000c RSI: 0000000000730020 RDI: 00000000200001c0 [ 901.275952] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000002011940 [ 901.283202] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dc30f [ 901.290452] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 901.297712] warn_alloc_show_mem: 1 callbacks suppressed [ 901.297714] Mem-Info: [ 901.305458] active_anon:168379 inactive_anon:76 isolated_anon:0 [ 901.305458] active_file:989 inactive_file:1420 isolated_file:0 [ 901.305458] unevictable:0 dirty:64 writeback:0 unstable:0 [ 901.305458] slab_reclaimable:3384 slab_unreclaimable:9534 [ 901.305458] mapped:67257 shmem:84 pagetables:1423 bounce:0 [ 901.305458] free:49051 free_pcp:482 free_cma:0 [ 901.338437] Node 0 active_anon:673516kB inactive_anon:304kB active_file:3956kB inactive_file:5680kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269028kB dirty:256kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 901.366349] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 901.392455] lowmem_reserve[]: 0 2817 7244 7244 [ 901.397026] Node 0 DMA32 free:129148kB min:26224kB low:32780kB high:39336kB active_anon:198360kB inactive_anon:28kB active_file:1096kB inactive_file:4804kB unevictable:0kB writepending:172kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:2852kB bounce:0kB free_pcp:576kB local_pcp:148kB free_cma:0kB [ 901.426368] lowmem_reserve[]: 0 0 4426 4426 [ 901.430675] Node 0 Normal free:51152kB min:41208kB low:51508kB high:61808kB active_anon:475388kB inactive_anon:276kB active_file:2204kB inactive_file:1848kB unevictable:0kB writepending:84kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2840kB bounce:0kB free_pcp:1352kB local_pcp:700kB free_cma:0kB [ 901.460079] lowmem_reserve[]: 0 0 0 0 [ 901.463865] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 901.477071] Node 0 DMA32: 3211*4kB (UMH) 5340*8kB (UM) 1486*16kB (ME) 550*32kB (M) 275*64kB (UM) 80*128kB (ME) 4*256kB (UM) 3*512kB (UM) 2*1024kB (UM) 0*2048kB 0*4096kB = 129388kB 05:04:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) [ 901.493237] Node 0 Normal: 9187*4kB (UMEH) 1865*8kB (UMH) 2*16kB (UM) 0*32kB 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51764kB [ 901.506704] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 901.515270] 2541 total pagecache pages [ 901.519131] 0 pages in swap cache [ 901.522561] Swap cache stats: add 0, delete 0, find 0/0 [ 901.527904] Free swap = 0kB [ 901.530902] Total swap = 0kB [ 901.533900] 1965969 pages RAM [ 901.536983] 0 pages HighMem/MovableOnly [ 901.540929] 106316 pages reserved [ 901.561135] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 901.571682] syz-executor0 cpuset=syz0 mems_allowed=0 [ 901.576781] CPU: 1 PID: 21214 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 901.583604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.592938] Call Trace: [ 901.595516] dump_stack+0x185/0x1d0 [ 901.599126] warn_alloc+0x430/0x690 [ 901.602746] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 901.607587] ? kernel_poison_pages+0x40/0x360 [ 901.612072] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 901.617506] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 901.622434] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 901.627439] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.632270] kmsan_alloc_page+0x82/0xe0 [ 901.636235] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 901.640971] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.645794] ? __msan_poison_alloca+0x15c/0x1d0 [ 901.650446] ? __should_failslab+0x278/0x2a0 [ 901.654837] ? should_fail+0x57/0xab0 [ 901.658621] ? __should_failslab+0x278/0x2a0 [ 901.663010] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.667858] ? __msan_poison_alloca+0x15c/0x1d0 [ 901.672508] ? kmsan_set_origin+0x9e/0x160 [ 901.676730] alloc_pages_vma+0x1555/0x17f0 [ 901.680952] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 901.686047] handle_mm_fault+0x44ca/0x7ed0 [ 901.690278] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.695114] __do_page_fault+0xec6/0x1a10 [ 901.699252] do_page_fault+0xb7/0x250 [ 901.703038] ? page_fault+0x8/0x30 [ 901.706567] page_fault+0x1e/0x30 [ 901.710002] RIP: 0033:0x4075fa [ 901.713171] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 901.718515] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 901.725766] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 901.733016] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 901.740267] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dc4d8 [ 901.747517] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 901.763684] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 901.774200] syz-executor5 cpuset=syz5 mems_allowed=0 [ 901.779322] CPU: 0 PID: 21217 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 901.786154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.795503] Call Trace: [ 901.798094] dump_stack+0x185/0x1d0 [ 901.801721] warn_alloc+0x430/0x690 [ 901.805360] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 901.810204] ? kernel_poison_pages+0x40/0x360 [ 901.814702] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 901.820153] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 901.825103] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 901.830132] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.834985] kmsan_alloc_page+0x82/0xe0 [ 901.838962] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 901.843718] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.848555] ? __msan_poison_alloca+0x15c/0x1d0 [ 901.853217] ? __should_failslab+0x278/0x2a0 [ 901.857626] ? should_fail+0x57/0xab0 [ 901.861424] ? __should_failslab+0x278/0x2a0 [ 901.865841] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.870682] ? __msan_poison_alloca+0x15c/0x1d0 [ 901.875341] ? kmsan_set_origin+0x9e/0x160 [ 901.879571] alloc_pages_vma+0x1555/0x17f0 [ 901.883795] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 901.888886] handle_mm_fault+0x44ca/0x7ed0 [ 901.893105] ? kmsan_set_origin_inline+0x6b/0x120 [ 901.897939] __do_page_fault+0xec6/0x1a10 [ 901.902079] do_page_fault+0xb7/0x250 [ 901.905863] ? page_fault+0x8/0x30 [ 901.909384] page_fault+0x1e/0x30 05:04:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) [ 901.912819] RIP: 0033:0x4075fa [ 901.915991] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 901.921333] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 901.928599] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 901.935850] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 901.943099] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dc5a2 [ 901.950348] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 901.973495] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 901.984013] syz-executor0 cpuset=syz0 mems_allowed=0 [ 901.989132] CPU: 0 PID: 21226 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 901.995962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.005316] Call Trace: [ 902.007913] dump_stack+0x185/0x1d0 [ 902.011550] warn_alloc+0x430/0x690 [ 902.015194] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 902.020038] ? kernel_poison_pages+0x40/0x360 [ 902.024541] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 902.029991] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 902.034948] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 902.039891] ? kmsan_set_origin_inline+0x6b/0x120 [ 902.044752] kmsan_alloc_page+0x82/0xe0 [ 902.048729] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 902.053488] ? kmsan_set_origin_inline+0x6b/0x120 [ 902.058336] ? __msan_poison_alloca+0x15c/0x1d0 [ 902.063007] ? __should_failslab+0x278/0x2a0 [ 902.067417] ? should_fail+0x57/0xab0 [ 902.071217] ? __should_failslab+0x278/0x2a0 [ 902.075627] ? kmsan_set_origin_inline+0x6b/0x120 [ 902.080474] ? __msan_poison_alloca+0x15c/0x1d0 [ 902.085147] ? kmsan_set_origin+0x9e/0x160 [ 902.089394] alloc_pages_vma+0x1555/0x17f0 [ 902.093635] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 902.098747] handle_mm_fault+0x44ca/0x7ed0 [ 902.102982] ? kmsan_set_origin_inline+0x6b/0x120 [ 902.107835] __do_page_fault+0xec6/0x1a10 [ 902.111994] do_page_fault+0xb7/0x250 [ 902.115797] ? page_fault+0x8/0x30 [ 902.119338] page_fault+0x1e/0x30 05:04:27 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) [ 902.122786] RIP: 0033:0x4075fa [ 902.125969] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 902.131324] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 902.138590] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 902.145862] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 902.153133] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dc675 [ 902.160402] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) [ 902.280882] audit: type=1326 audit(1529730267.279:1931): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21216 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) [ 902.380857] audit: type=1326 audit(1529730267.379:1932): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21228 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 902.426513] audit: type=1326 audit(1529730267.415:1933): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21251 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) [ 902.495716] audit: type=1326 audit(1529730267.493:1934): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21257 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000280)) wait4(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000140)) 05:04:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 902.941486] audit: type=1326 audit(1529730267.940:1935): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21292 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:28 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) [ 903.347022] audit: type=1326 audit(1529730268.345:1936): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21307 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:28 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) [ 903.471662] audit: type=1326 audit(1529730268.470:1937): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21317 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:28 executing program 1: syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) [ 903.893931] audit: type=1326 audit(1529730268.892:1938): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21333 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) 05:04:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) [ 904.285336] audit: type=1326 audit(1529730269.284:1939): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21358 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 05:04:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) [ 904.421768] audit: type=1326 audit(1529730269.420:1940): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21373 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) fchmod(0xffffffffffffffff, 0x0) 05:04:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:30 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) fchmod(0xffffffffffffffff, 0x0) 05:04:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget(0x1, 0x0, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/40) ioctl$KDDISABIO(r1, 0x4b37) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200040, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000180)=0x3) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0xe) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), 0x4) 05:04:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:30 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) fchmod(0xffffffffffffffff, 0x0) 05:04:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget(0x1, 0x0, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/40) ioctl$KDDISABIO(r1, 0x4b37) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200040, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000180)=0x3) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0xe) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:30 executing program 3: shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:30 executing program 6: accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget(0x1, 0x0, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/40) ioctl$KDDISABIO(r1, 0x4b37) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200040, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000180)=0x3) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0xe) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget(0x1, 0x0, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/40) ioctl$KDDISABIO(r1, 0x4b37) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200040, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000180)=0x3) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0xe) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:31 executing program 6: accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)) 05:04:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget(0x1, 0x0, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/40) ioctl$KDDISABIO(r1, 0x4b37) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200040, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000180)=0x3) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5002e}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:31 executing program 6: accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:04:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f00000000c0)) 05:04:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:31 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget(0x1, 0x0, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/40) ioctl$KDDISABIO(r1, 0x4b37) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200040, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe2(&(0x7f00000000c0), 0x0) 05:04:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget(0x1, 0x0, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/40) ioctl$KDDISABIO(r1, 0x4b37) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe2(&(0x7f00000000c0), 0x0) 05:04:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f00000000c0)) 05:04:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget(0x1, 0x0, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000080)=""/40) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:32 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000001240)) 05:04:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = semget(0x1, 0x0, 0x40) semctl$IPC_RMID(r3, 0x0, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe2(&(0x7f00000000c0), 0x0) 05:04:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x1, 0x0, 0x40) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) [ 907.894529] kauditd_printk_skb: 9 callbacks suppressed [ 907.894548] audit: type=1326 audit(1529730272.893:1950): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21564 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:33 executing program 0: dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:33 executing program 0: dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') semctl$IPC_RMID(0x0, 0x0, 0x0) 05:04:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:33 executing program 0: dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) [ 908.825796] audit: type=1326 audit(1529730273.824:1951): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21617 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000200), 0x1) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:34 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) 05:04:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:34 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) [ 909.879223] audit: type=1326 audit(1529730274.877:1952): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21683 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) [ 909.977557] audit: type=1326 audit(1529730274.974:1953): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21687 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) [ 910.796198] audit: type=1326 audit(1529730275.794:1954): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21739 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:35 executing program 5: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:35 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:35 executing program 7: memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) seccomp(0x1, 0x1, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000600)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) [ 910.935594] audit: type=1326 audit(1529730275.934:1955): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21755 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:36 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@nl=@unspec, &(0x7f0000000140)=0x80) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:36 executing program 5: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:36 executing program 7: memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:36 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:36 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0) 05:04:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000280)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x0) fchmod(0xffffffffffffffff, 0x0) 05:04:36 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000300)=""/118) 05:04:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:36 executing program 7: memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:36 executing program 5: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x0, 0x0, 0x0, 0x50344}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) [ 911.877901] audit: type=1326 audit(1529730276.876:1956): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21794 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:36 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:36 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000300)=""/118) [ 911.947687] audit: type=1326 audit(1529730276.917:1957): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21808 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) [ 912.159162] audit: type=1326 audit(1529730277.157:1958): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21823 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:04:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) timer_delete(0x0) 05:04:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:38 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:04:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) timer_delete(0x0) 05:04:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) [ 913.262891] audit: type=1326 audit(1529730278.261:1959): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21877 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:38 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:04:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) timer_delete(0x0) 05:04:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) 05:04:38 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) 05:04:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000600)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) pipe2(&(0x7f00000000c0), 0x0) 05:04:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, &(0x7f0000000200)=0x80) timer_delete(0x0) 05:04:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) [ 914.246970] warn_alloc: 35 callbacks suppressed [ 914.246987] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 914.262168] syz-executor3 cpuset=syz3 mems_allowed=0 [ 914.267294] CPU: 1 PID: 21932 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 914.274312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.283663] Call Trace: [ 914.286256] dump_stack+0x185/0x1d0 [ 914.289888] warn_alloc+0x430/0x690 05:04:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 914.293555] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 914.298396] ? kernel_poison_pages+0x40/0x360 [ 914.302901] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 914.308350] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 914.313295] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 914.318234] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.323076] ? __msan_poison_alloca+0x15c/0x1d0 [ 914.327752] kmsan_alloc_page+0x82/0xe0 [ 914.331726] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 914.336479] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.341321] ? __msan_poison_alloca+0x15c/0x1d0 [ 914.345976] ? __should_failslab+0x278/0x2a0 [ 914.350370] ? should_fail+0x57/0xab0 [ 914.354155] ? __should_failslab+0x278/0x2a0 [ 914.358547] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.363370] ? __msan_poison_alloca+0x15c/0x1d0 [ 914.368021] ? kmsan_set_origin+0x9e/0x160 [ 914.372247] alloc_pages_vma+0x1555/0x17f0 [ 914.376469] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 914.381561] handle_mm_fault+0x44ca/0x7ed0 [ 914.385778] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.390613] __do_page_fault+0xec6/0x1a10 [ 914.394750] do_page_fault+0xb7/0x250 [ 914.398531] ? page_fault+0x8/0x30 [ 914.402057] page_fault+0x1e/0x30 [ 914.405493] RIP: 0033:0x4075fa [ 914.408661] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 914.414002] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 914.421255] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 [ 914.428503] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 914.435751] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000df666 [ 914.443003] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 914.450258] warn_alloc_show_mem: 3 callbacks suppressed [ 914.450260] Mem-Info: [ 914.457998] active_anon:168367 inactive_anon:75 isolated_anon:14 [ 914.457998] active_file:1213 inactive_file:3527 isolated_file:0 [ 914.457998] unevictable:0 dirty:10 writeback:0 unstable:0 [ 914.457998] slab_reclaimable:3384 slab_unreclaimable:9539 [ 914.457998] mapped:69858 shmem:84 pagetables:1473 bounce:0 [ 914.457998] free:39023 free_pcp:437 free_cma:0 [ 914.491152] Node 0 active_anon:673468kB inactive_anon:300kB active_file:4852kB inactive_file:14108kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:279432kB dirty:40kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 914.519146] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 914.545252] lowmem_reserve[]: 0 2817 7244 7244 [ 914.549820] Node 0 DMA32 free:88708kB min:26224kB low:32780kB high:39336kB active_anon:198436kB inactive_anon:24kB active_file:1916kB inactive_file:14136kB unevictable:0kB writepending:244kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:3068kB bounce:0kB free_pcp:964kB local_pcp:708kB free_cma:0kB [ 914.579138] lowmem_reserve[]: 0 0 4426 4426 [ 914.583443] Node 0 Normal free:51480kB min:41208kB low:51508kB high:61808kB active_anon:475264kB inactive_anon:276kB active_file:2772kB inactive_file:628kB unevictable:0kB writepending:144kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2824kB bounce:0kB free_pcp:784kB local_pcp:84kB free_cma:0kB [ 914.612683] lowmem_reserve[]: 0 0 0 0 [ 914.616468] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 914.629669] Node 0 DMA32: 2084*4kB (MH) 4157*8kB (UMH) 1269*16kB (UMH) 366*32kB (UMH) 163*64kB (MH) 34*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 88392kB [ 914.644604] Node 0 Normal: 9081*4kB (UMEH) 1835*8kB (UMH) 0*16kB 2*32kB (H) 4*64kB (H) 2*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51580kB [ 914.658333] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 914.666890] 4854 total pagecache pages [ 914.670754] 0 pages in swap cache [ 914.674184] Swap cache stats: add 0, delete 0, find 0/0 [ 914.679523] Free swap = 0kB [ 914.682515] Total swap = 0kB [ 914.685511] 1965969 pages RAM [ 914.688591] 0 pages HighMem/MovableOnly [ 914.692539] 106316 pages reserved [ 914.697779] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 914.708277] syz-executor5 cpuset=syz5 mems_allowed=0 [ 914.713396] CPU: 1 PID: 21935 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 914.720230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.729581] Call Trace: [ 914.732172] dump_stack+0x185/0x1d0 [ 914.735805] warn_alloc+0x430/0x690 [ 914.739444] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 914.744282] ? kernel_poison_pages+0x40/0x360 [ 914.748780] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 914.754231] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 914.759210] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 914.764147] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.768990] ? __msan_poison_alloca+0x15c/0x1d0 [ 914.773664] kmsan_alloc_page+0x82/0xe0 [ 914.777640] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 914.782402] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.787248] ? __msan_poison_alloca+0x15c/0x1d0 [ 914.791913] ? __should_failslab+0x278/0x2a0 [ 914.796323] ? should_fail+0x57/0xab0 [ 914.800119] ? __should_failslab+0x278/0x2a0 [ 914.804524] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.809365] ? __msan_poison_alloca+0x15c/0x1d0 [ 914.814035] ? kmsan_set_origin+0x9e/0x160 [ 914.818277] alloc_pages_vma+0x1555/0x17f0 [ 914.822517] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 914.827623] handle_mm_fault+0x44ca/0x7ed0 [ 914.831855] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.836705] __do_page_fault+0xec6/0x1a10 [ 914.840861] do_page_fault+0xb7/0x250 [ 914.844661] ? page_fault+0x8/0x30 [ 914.848198] page_fault+0x1e/0x30 [ 914.851647] RIP: 0033:0x4075fa [ 914.854833] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 914.860191] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 914.867453] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 914.874716] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 914.881978] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000df829 [ 914.889239] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 914.899971] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 914.910473] syz-executor0 cpuset=syz0 mems_allowed=0 [ 914.915592] CPU: 1 PID: 21944 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 914.922423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.931773] Call Trace: [ 914.934364] dump_stack+0x185/0x1d0 [ 914.937991] warn_alloc+0x430/0x690 [ 914.941631] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:04:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) [ 914.946470] ? kernel_poison_pages+0x40/0x360 [ 914.950965] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 914.956439] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 914.961383] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.966226] ? __msan_poison_alloca+0x15c/0x1d0 [ 914.970906] kmsan_alloc_page+0x82/0xe0 [ 914.974883] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 914.979639] ? kmsan_set_origin_inline+0x6b/0x120 [ 914.984477] ? __msan_poison_alloca+0x15c/0x1d0 [ 914.989143] ? __should_failslab+0x278/0x2a0 [ 914.993552] ? should_fail+0x57/0xab0 [ 914.997351] ? __should_failslab+0x278/0x2a0 [ 915.001756] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.006600] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.011273] ? kmsan_set_origin+0x9e/0x160 [ 915.015515] alloc_pages_vma+0x1555/0x17f0 [ 915.019755] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 915.024866] handle_mm_fault+0x44ca/0x7ed0 [ 915.029107] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.033958] __do_page_fault+0xec6/0x1a10 [ 915.038108] do_page_fault+0xb7/0x250 [ 915.041904] ? page_fault+0x8/0x30 [ 915.045445] page_fault+0x1e/0x30 05:04:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) [ 915.048892] RIP: 0033:0x4075fa [ 915.052072] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 915.057432] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 915.064697] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 915.071957] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 915.079221] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000df8f3 [ 915.086484] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) [ 915.199422] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 915.210030] syz-executor4 cpuset=syz4 mems_allowed=0 [ 915.215149] CPU: 1 PID: 21951 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 915.221976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.231324] Call Trace: [ 915.233912] dump_stack+0x185/0x1d0 [ 915.237538] warn_alloc+0x430/0x690 [ 915.241174] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:04:40 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) [ 915.246013] ? kernel_poison_pages+0x40/0x360 [ 915.250513] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 915.255960] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 915.260904] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 915.265840] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.270675] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.275349] kmsan_alloc_page+0x82/0xe0 [ 915.279328] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 915.284083] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.288920] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.293584] ? __should_failslab+0x278/0x2a0 [ 915.297987] ? should_fail+0x57/0xab0 [ 915.301779] ? __should_failslab+0x278/0x2a0 [ 915.306184] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.311024] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.315699] ? kmsan_set_origin+0x9e/0x160 [ 915.319941] alloc_pages_vma+0x1555/0x17f0 [ 915.324181] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 915.329295] handle_mm_fault+0x44ca/0x7ed0 [ 915.333531] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.338385] __do_page_fault+0xec6/0x1a10 [ 915.342545] do_page_fault+0xb7/0x250 [ 915.346346] ? page_fault+0x8/0x30 05:04:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 915.349887] page_fault+0x1e/0x30 [ 915.353334] RIP: 0033:0x4075fa [ 915.356516] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 915.361872] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 915.369140] RDX: f1164beb8b57cb48 RSI: 0000000000000000 RDI: 00000000026e7848 [ 915.376424] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 915.383695] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dfa1f [ 915.390962] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 915.402388] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 915.412892] syz-executor7 cpuset=syz7 mems_allowed=0 [ 915.418002] CPU: 1 PID: 21953 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 915.424830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.434177] Call Trace: [ 915.436769] dump_stack+0x185/0x1d0 [ 915.440404] warn_alloc+0x430/0x690 [ 915.444045] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 915.448888] ? kernel_poison_pages+0x40/0x360 [ 915.453384] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 915.458837] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 915.463778] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 915.468719] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.473561] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.478237] kmsan_alloc_page+0x82/0xe0 [ 915.482721] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 915.487478] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.492322] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.496986] ? __should_failslab+0x278/0x2a0 05:04:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) [ 915.501451] ? should_fail+0x57/0xab0 [ 915.505242] ? __should_failslab+0x278/0x2a0 [ 915.509646] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.514485] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.519156] ? kmsan_set_origin+0x9e/0x160 [ 915.523407] alloc_pages_vma+0x1555/0x17f0 [ 915.527651] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 915.532758] handle_mm_fault+0x44ca/0x7ed0 [ 915.536994] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.541849] __do_page_fault+0xec6/0x1a10 [ 915.546004] do_page_fault+0xb7/0x250 [ 915.549802] ? page_fault+0x8/0x30 05:04:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) [ 915.553338] page_fault+0x1e/0x30 [ 915.556783] RIP: 0033:0x4075fa [ 915.559964] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 915.565320] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 915.572593] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 915.579855] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 915.587120] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dfaea [ 915.594387] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 915.601663] warn_alloc_show_mem: 3 callbacks suppressed [ 915.601666] Mem-Info: [ 915.607670] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 915.609427] active_anon:168437 inactive_anon:76 isolated_anon:23 [ 915.609427] active_file:1297 inactive_file:3412 isolated_file:0 [ 915.609427] unevictable:0 dirty:16 writeback:0 unstable:0 [ 915.609427] slab_reclaimable:3384 slab_unreclaimable:9544 [ 915.609427] mapped:69898 shmem:84 pagetables:1427 bounce:0 [ 915.609427] free:38260 free_pcp:222 free_cma:0 [ 915.619925] syz-executor5 cpuset=syz5 [ 915.653149] Node 0 active_anon:673748kB inactive_anon:304kB active_file:5188kB inactive_file:13648kB unevictable:0kB isolated(anon):92kB isolated(file):0kB mapped:279592kB dirty:64kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 915.653156] Node 0 [ 915.656957] mems_allowed=0 [ 915.684965] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 915.687169] CPU: 0 PID: 21959 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 915.690067] lowmem_reserve[]: [ 915.715543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.722351] 0 [ 915.725428] Call Trace: [ 915.734754] 2817 [ 915.736543] dump_stack+0x185/0x1d0 [ 915.739083] 7244 [ 915.741131] warn_alloc+0x430/0x690 [ 915.744722] 7244 [ 915.746776] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 915.752400] ? kernel_poison_pages+0x40/0x360 [ 915.757207] Node 0 DMA32 free:85176kB min:26224kB low:32780kB high:39336kB active_anon:198236kB inactive_anon:24kB active_file:2404kB inactive_file:13188kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2880kB pagetables:2572kB bounce:0kB free_pcp:552kB local_pcp:108kB free_cma:0kB [ 915.761703] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 915.761720] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 915.790920] lowmem_reserve[]: [ 915.796370] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 915.801255] 0 [ 915.804347] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.809232] 0 [ 915.811017] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.815823] 4426 [ 915.817614] kmsan_alloc_page+0x82/0xe0 [ 915.822251] 4426 [ 915.824298] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 915.830275] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.834993] Node 0 [ 915.839810] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.839831] Normal free:51960kB min:41208kB low:51508kB high:61808kB active_anon:475396kB inactive_anon:280kB active_file:2668kB inactive_file:420kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:3136kB bounce:0kB free_pcp:336kB local_pcp:136kB free_cma:0kB [ 915.839836] lowmem_reserve[]: [ 915.842055] ? __should_failslab+0x278/0x2a0 [ 915.846690] 0 [ 915.875222] ? should_fail+0x57/0xab0 [ 915.878288] 0 [ 915.882685] ? __should_failslab+0x278/0x2a0 [ 915.884453] 0 [ 915.888250] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.890027] 0 [ 915.894416] ? __msan_poison_alloca+0x15c/0x1d0 [ 915.901013] ? kmsan_set_origin+0x9e/0x160 [ 915.902779] Node 0 [ 915.907432] alloc_pages_vma+0x1555/0x17f0 [ 915.911625] DMA: [ 915.913850] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 915.918048] 0*4kB [ 915.920097] handle_mm_fault+0x44ca/0x7ed0 [ 915.925164] 0*8kB [ 915.927297] ? kmsan_set_origin_inline+0x6b/0x120 [ 915.931498] 0*16kB [ 915.933639] __do_page_fault+0xec6/0x1a10 [ 915.938447] 1*32kB [ 915.940676] do_page_fault+0xb7/0x250 [ 915.944781] (U) [ 915.946999] ? page_fault+0x8/0x30 [ 915.950763] 2*64kB [ 915.952718] page_fault+0x1e/0x30 [ 915.956220] (U) [ 915.958434] RIP: 0033:0x4075fa [ 915.961850] 1*128kB (U) [ 915.963808] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 915.966968] 1*256kB [ 915.974943] (U) [ 915.977237] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 915.977244] 0*512kB [ 915.979196] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 915.986435] 1*1024kB [ 915.988736] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 915.995975] (U) [ 915.998360] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dfbb5 [ 916.005686] 1*2048kB [ 916.007637] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 916.014877] (M) 3*4096kB (M) = 15904kB [ 916.028391] Node 0 DMA32: 1432*4kB (UMH) 3335*8kB (UMH) 1148*16kB (UMH) 383*32kB (UMH) 163*64kB (UMH) 42*128kB (UM) 6*256kB (M) 5*512kB (M) 2*1024kB (M) 1*2048kB (M) 0*4096kB = 87032kB [ 916.045012] Node 0 Normal: 9047*4kB (UMEH) 1813*8kB (UMH) 2*16kB (H) 1*32kB (H) 5*64kB (H) 2*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51332kB [ 916.059118] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 916.067683] 4870 total pagecache pages [ 916.071561] 0 pages in swap cache [ 916.075003] Swap cache stats: add 0, delete 0, find 0/0 [ 916.080351] Free swap = 0kB [ 916.083355] Total swap = 0kB [ 916.086363] 1965969 pages RAM [ 916.089456] 0 pages HighMem/MovableOnly [ 916.093419] 106316 pages reserved [ 916.095373] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 916.098451] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 916.107336] syz-executor3 cpuset= [ 916.117794] syz-executor2 cpuset= [ 916.117796] syz3 mems_allowed=0 [ 916.121227] syz2 [ 916.124671] CPU: 0 PID: 21963 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 916.127917] mems_allowed=0 [ 916.129867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.148896] Call Trace: [ 916.151472] dump_stack+0x185/0x1d0 [ 916.155082] warn_alloc+0x430/0x690 [ 916.158702] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 916.163525] ? kernel_poison_pages+0x40/0x360 [ 916.168008] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 916.173438] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 916.178365] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 916.183284] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.188105] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.192761] kmsan_alloc_page+0x82/0xe0 [ 916.196716] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 916.201454] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.206277] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.210927] ? __should_failslab+0x278/0x2a0 [ 916.215318] ? should_fail+0x57/0xab0 [ 916.219100] ? __should_failslab+0x278/0x2a0 [ 916.223491] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.228321] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.232974] ? kmsan_set_origin+0x9e/0x160 [ 916.237199] alloc_pages_vma+0x1555/0x17f0 [ 916.241420] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 916.246512] handle_mm_fault+0x44ca/0x7ed0 [ 916.250729] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.255562] __do_page_fault+0xec6/0x1a10 [ 916.259697] do_page_fault+0xb7/0x250 [ 916.263479] ? page_fault+0x8/0x30 [ 916.267002] page_fault+0x1e/0x30 [ 916.270433] RIP: 0033:0x4075fa [ 916.273603] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 916.278948] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 916.286198] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 [ 916.293450] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 916.300708] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dfd9f [ 916.307959] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 916.315219] CPU: 1 PID: 21955 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 916.322050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.331395] Call Trace: [ 916.333985] dump_stack+0x185/0x1d0 [ 916.337613] warn_alloc+0x430/0x690 [ 916.341252] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 916.346096] ? kernel_poison_pages+0x40/0x360 [ 916.350598] ? __msan_metadata_ptr_for_store_8+0x13/0x20 05:04:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) [ 916.356046] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 916.360993] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 916.365935] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.370775] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.375445] kmsan_alloc_page+0x82/0xe0 [ 916.379426] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 916.384184] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.389026] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.393691] ? __should_failslab+0x278/0x2a0 [ 916.398101] ? should_fail+0x57/0xab0 [ 916.401897] ? __should_failslab+0x278/0x2a0 [ 916.406309] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.411151] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.415825] ? kmsan_set_origin+0x9e/0x160 [ 916.420071] alloc_pages_vma+0x1555/0x17f0 [ 916.421372] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 916.424308] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 916.434766] syz-executor7 cpuset=syz7 mems_allowed=0 [ 916.439855] handle_mm_fault+0x44ca/0x7ed0 [ 916.439869] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.453970] __do_page_fault+0xec6/0x1a10 [ 916.458104] do_page_fault+0xb7/0x250 [ 916.461886] ? page_fault+0x8/0x30 [ 916.465412] page_fault+0x1e/0x30 [ 916.468847] RIP: 0033:0x4075fa [ 916.472015] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 916.477359] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 916.484610] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 916.491863] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 916.499114] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dfda2 [ 916.506361] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 916.513625] CPU: 0 PID: 21967 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 916.520451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.529800] Call Trace: [ 916.532389] dump_stack+0x185/0x1d0 [ 916.536025] warn_alloc+0x430/0x690 [ 916.539662] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 916.544505] ? kernel_poison_pages+0x40/0x360 [ 916.549002] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 916.554472] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 916.559409] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.564245] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.568919] kmsan_alloc_page+0x82/0xe0 [ 916.572888] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 916.577653] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.582491] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.587157] ? __should_failslab+0x278/0x2a0 [ 916.591559] ? should_fail+0x57/0xab0 [ 916.595343] ? __should_failslab+0x278/0x2a0 [ 916.599737] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.604565] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.609221] ? kmsan_set_origin+0x9e/0x160 [ 916.613449] alloc_pages_vma+0x1555/0x17f0 [ 916.617677] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 916.622768] handle_mm_fault+0x44ca/0x7ed0 [ 916.626992] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.631825] __do_page_fault+0xec6/0x1a10 [ 916.635959] do_page_fault+0xb7/0x250 [ 916.639741] ? page_fault+0x8/0x30 [ 916.643264] page_fault+0x1e/0x30 [ 916.647348] RIP: 0033:0x4075fa [ 916.650520] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:04:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501e4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) [ 916.655861] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 916.663109] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 916.670358] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 916.677609] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dfee5 [ 916.684858] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 916.739770] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 916.750288] syz-executor0 cpuset=syz0 mems_allowed=0 [ 916.755401] CPU: 0 PID: 21973 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 916.762228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.771575] Call Trace: [ 916.774162] dump_stack+0x185/0x1d0 [ 916.777788] warn_alloc+0x430/0x690 [ 916.781426] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 916.786265] ? kernel_poison_pages+0x40/0x360 [ 916.790761] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 916.796229] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 916.801250] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.806091] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.810764] kmsan_alloc_page+0x82/0xe0 [ 916.814742] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 916.819495] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.824334] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.828999] ? __should_failslab+0x278/0x2a0 [ 916.833405] ? should_fail+0x57/0xab0 [ 916.837198] ? __should_failslab+0x278/0x2a0 [ 916.841602] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.846444] ? __msan_poison_alloca+0x15c/0x1d0 [ 916.851112] ? kmsan_set_origin+0x9e/0x160 [ 916.855354] alloc_pages_vma+0x1555/0x17f0 [ 916.859594] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 916.864705] handle_mm_fault+0x44ca/0x7ed0 [ 916.868935] ? kmsan_set_origin_inline+0x6b/0x120 [ 916.873787] __do_page_fault+0xec6/0x1a10 [ 916.877941] do_page_fault+0xb7/0x250 [ 916.881743] ? page_fault+0x8/0x30 [ 916.885278] page_fault+0x1e/0x30 [ 916.888722] RIP: 0033:0x4075fa [ 916.891907] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 916.897265] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 916.904532] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 916.911796] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 916.919062] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0023 [ 916.926327] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 916.933620] warn_alloc_show_mem: 4 callbacks suppressed [ 916.933623] Mem-Info: [ 916.941392] active_anon:168404 inactive_anon:75 isolated_anon:0 [ 916.941392] active_file:1328 inactive_file:3543 isolated_file:0 [ 916.941392] unevictable:0 dirty:32 writeback:0 unstable:0 [ 916.941392] slab_reclaimable:3384 slab_unreclaimable:9538 [ 916.941392] mapped:69761 shmem:84 pagetables:1449 bounce:0 [ 916.941392] free:37896 free_pcp:560 free_cma:0 [ 916.974491] Node 0 active_anon:673616kB inactive_anon:300kB active_file:5196kB inactive_file:13812kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278696kB dirty:128kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 917.002509] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 917.028644] lowmem_reserve[]: 0 2817 7244 7244 [ 917.033242] Node 0 DMA32 free:84976kB min:26224kB low:32780kB high:39336kB active_anon:198348kB inactive_anon:20kB active_file:2548kB inactive_file:12516kB unevictable:0kB writepending:120kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:2848kB bounce:0kB free_pcp:976kB local_pcp:148kB free_cma:0kB [ 917.062575] lowmem_reserve[]: 0 0 4426 4426 [ 917.066882] Node 0 Normal free:51208kB min:41208kB low:51508kB high:61808kB active_anon:475500kB inactive_anon:280kB active_file:2764kB inactive_file:692kB unevictable:0kB writepending:8kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2948kB bounce:0kB free_pcp:1376kB local_pcp:700kB free_cma:0kB [ 917.096116] lowmem_reserve[]: 0 0 0 0 [ 917.099906] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 917.113105] Node 0 DMA32: 1550*4kB (UMH) 3351*8kB (UMH) 1132*16kB (UMH) 358*32kB (UMH) 173*64kB (UMH) 39*128kB (UM) 6*256kB (M) 4*512kB (M) 3*1024kB (M) 0*2048kB 0*4096kB = 85296kB 05:04:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) [ 917.129349] Node 0 Normal: 9089*4kB (UMEH) 1819*8kB (UMH) 4*16kB (UH) 2*32kB (UH) 6*64kB (UH) 2*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51676kB [ 917.143680] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 917.152241] 4751 total pagecache pages [ 917.156104] 0 pages in swap cache [ 917.159532] Swap cache stats: add 0, delete 0, find 0/0 [ 917.164868] Free swap = 0kB [ 917.167860] Total swap = 0kB [ 917.170852] 1965969 pages RAM [ 917.173933] 0 pages HighMem/MovableOnly [ 917.177882] 106316 pages reserved 05:04:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 917.333133] audit: type=1326 audit(1529730282.330:1960): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21984 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) [ 917.578541] audit: type=1326 audit(1529730282.577:1961): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22010 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 917.884030] audit: type=1326 audit(1529730282.882:1962): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22002 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000700), &(0x7f0000000740)=0xc) 05:04:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:43 executing program 6: creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000700), &(0x7f0000000740)=0xc) 05:04:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) [ 918.578951] audit: type=1326 audit(1529730283.577:1963): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22053 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:43 executing program 6: creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a3}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) [ 918.647421] audit: type=1326 audit(1529730283.602:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22054 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 918.667298] audit: type=1326 audit(1529730283.610:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22057 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000700), &(0x7f0000000740)=0xc) 05:04:43 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:43 executing program 6: creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) [ 918.984974] audit: type=1326 audit(1529730283.983:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22080 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) 05:04:44 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000700), &(0x7f0000000740)=0xc) 05:04:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) 05:04:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) memfd_create(&(0x7f0000000340)='.selfppp1security\x00', 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000240)) [ 919.601356] warn_alloc: 25 callbacks suppressed [ 919.601372] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 919.616543] syz-executor0 cpuset=syz0 mems_allowed=0 [ 919.621654] CPU: 0 PID: 22094 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 919.628492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.637826] Call Trace: [ 919.640406] dump_stack+0x185/0x1d0 [ 919.644018] warn_alloc+0x430/0x690 [ 919.647639] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 919.652464] ? kernel_poison_pages+0x40/0x360 [ 919.656960] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 919.662393] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.667328] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 919.672247] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.677417] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.682078] kmsan_alloc_page+0x82/0xe0 [ 919.686041] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.690794] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.695617] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.700264] ? __should_failslab+0x278/0x2a0 [ 919.704653] ? should_fail+0x57/0xab0 [ 919.708430] ? __should_failslab+0x278/0x2a0 [ 919.712819] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.717642] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.722292] ? kmsan_set_origin+0x9e/0x160 [ 919.726516] alloc_pages_vma+0x1555/0x17f0 [ 919.730751] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 919.735839] handle_mm_fault+0x44ca/0x7ed0 [ 919.740058] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.744896] __do_page_fault+0xec6/0x1a10 [ 919.749035] do_page_fault+0xb7/0x250 [ 919.752824] ? page_fault+0x8/0x30 [ 919.756342] page_fault+0x1e/0x30 [ 919.759773] RIP: 0033:0x4075fa [ 919.762945] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 919.768300] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 919.775551] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 919.782802] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 919.790054] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0b51 [ 919.797317] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 919.804569] Mem-Info: [ 919.806973] active_anon:168408 inactive_anon:79 isolated_anon:0 [ 919.806973] active_file:1295 inactive_file:1381 isolated_file:0 [ 919.806973] unevictable:0 dirty:64 writeback:0 unstable:0 [ 919.806973] slab_reclaimable:3384 slab_unreclaimable:9538 [ 919.806973] mapped:67500 shmem:84 pagetables:1373 bounce:0 [ 919.806973] free:38948 free_pcp:450 free_cma:0 [ 919.840039] Node 0 active_anon:673632kB inactive_anon:316kB active_file:5180kB inactive_file:5524kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270000kB dirty:256kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 919.867955] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 919.894062] lowmem_reserve[]: 0 2817 7244 7244 [ 919.898635] Node 0 DMA32 free:88612kB min:26224kB low:32780kB high:39336kB active_anon:198464kB inactive_anon:36kB active_file:2464kB inactive_file:5120kB unevictable:0kB writepending:188kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:2608kB bounce:0kB free_pcp:504kB local_pcp:196kB free_cma:0kB [ 919.927868] lowmem_reserve[]: 0 0 4426 4426 [ 919.932176] Node 0 Normal free:51276kB min:41208kB low:51508kB high:61808kB active_anon:475284kB inactive_anon:280kB active_file:2716kB inactive_file:824kB unevictable:0kB writepending:68kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2884kB bounce:0kB free_pcp:1296kB local_pcp:652kB free_cma:0kB [ 919.961492] lowmem_reserve[]: 0 0 0 0 [ 919.965286] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 919.978486] Node 0 DMA32: 2429*4kB (MH) 3776*8kB (UMH) 1123*16kB (UMH) 358*32kB (UMH) 155*64kB (UMH) 33*128kB (M) 4*256kB (UM) 2*512kB (M) 3*1024kB (UM) 0*2048kB 0*4096kB = 88612kB [ 919.994730] Node 0 Normal: 9128*4kB (UMEH) 1808*8kB (UMH) 4*16kB (UH) 1*32kB (H) 5*64kB (H) 2*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51648kB [ 920.008913] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 920.017465] 2745 total pagecache pages [ 920.021327] 0 pages in swap cache [ 920.024757] Swap cache stats: add 0, delete 0, find 0/0 [ 920.030092] Free swap = 0kB [ 920.033087] Total swap = 0kB [ 920.036084] 1965969 pages RAM [ 920.039164] 0 pages HighMem/MovableOnly [ 920.043113] 106316 pages reserved [ 920.050116] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 920.060609] syz-executor2 cpuset=syz2 mems_allowed=0 [ 920.065716] CPU: 0 PID: 22096 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 920.072543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.081896] Call Trace: [ 920.084502] dump_stack+0x185/0x1d0 [ 920.088126] warn_alloc+0x430/0x690 [ 920.091763] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 920.096611] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 920.102062] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 920.107011] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 920.111948] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.116791] ? __msan_poison_alloca+0x15c/0x1d0 [ 920.121467] kmsan_alloc_page+0x82/0xe0 [ 920.125446] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 920.130204] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.135042] ? __msan_poison_alloca+0x15c/0x1d0 [ 920.139710] ? __should_failslab+0x278/0x2a0 [ 920.144118] ? should_fail+0x57/0xab0 [ 920.147919] ? __should_failslab+0x278/0x2a0 [ 920.152326] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.157167] ? __msan_poison_alloca+0x15c/0x1d0 [ 920.161836] ? kmsan_set_origin+0x9e/0x160 [ 920.166078] alloc_pages_vma+0x1555/0x17f0 [ 920.170322] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 920.175432] handle_mm_fault+0x44ca/0x7ed0 [ 920.179948] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.184809] __do_page_fault+0xec6/0x1a10 [ 920.188965] do_page_fault+0xb7/0x250 [ 920.192763] ? page_fault+0x8/0x30 [ 920.196299] page_fault+0x1e/0x30 [ 920.199748] RIP: 0033:0x43ce91 05:04:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:45 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 920.202928] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 920.208287] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 000000000000002f [ 920.215552] RDX: 000000000000000d RSI: 0000000000730020 RDI: 0000000020000000 [ 920.222815] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000002541940 [ 920.230083] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0d11 [ 920.237348] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:45 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 920.438504] audit: type=1326 audit(1529730285.436:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22107 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) [ 920.499525] audit: type=1326 audit(1529730285.458:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22098 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 920.519421] audit: type=1326 audit(1529730285.459:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22113 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505a7}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000180)) 05:04:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) [ 921.111439] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 921.121970] syz-executor3 cpuset=syz3 mems_allowed=0 [ 921.127124] CPU: 1 PID: 22153 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 921.133958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.143306] Call Trace: [ 921.145901] dump_stack+0x185/0x1d0 [ 921.149515] warn_alloc+0x430/0x690 [ 921.153134] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 921.157961] ? kernel_poison_pages+0x40/0x360 [ 921.162441] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 921.167889] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 921.172813] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.177637] ? __msan_poison_alloca+0x15c/0x1d0 [ 921.182299] kmsan_alloc_page+0x82/0xe0 [ 921.186258] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 921.190998] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.195840] ? __msan_poison_alloca+0x15c/0x1d0 [ 921.200490] ? __should_failslab+0x278/0x2a0 [ 921.204885] ? should_fail+0x57/0xab0 [ 921.208666] ? __should_failslab+0x278/0x2a0 [ 921.213065] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.217900] ? __msan_poison_alloca+0x15c/0x1d0 [ 921.222566] ? kmsan_set_origin+0x9e/0x160 [ 921.226790] alloc_pages_vma+0x1555/0x17f0 [ 921.231013] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 921.236104] handle_mm_fault+0x44ca/0x7ed0 [ 921.240322] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.245156] __do_page_fault+0xec6/0x1a10 [ 921.249290] do_page_fault+0xb7/0x250 [ 921.253078] ? page_fault+0x8/0x30 [ 921.256613] page_fault+0x1e/0x30 [ 921.260048] RIP: 0033:0x4075fa [ 921.263223] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 921.268572] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 921.275827] RDX: 684c8f8fbf6013e3 RSI: 0000000000000000 RDI: 0000000001335848 [ 921.283078] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 921.290341] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e1137 [ 921.297595] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 921.304856] warn_alloc_show_mem: 1 callbacks suppressed [ 921.304859] Mem-Info: [ 921.312603] active_anon:168404 inactive_anon:78 isolated_anon:0 [ 921.312603] active_file:1298 inactive_file:1200 isolated_file:0 [ 921.312603] unevictable:0 dirty:73 writeback:0 unstable:0 [ 921.312603] slab_reclaimable:3384 slab_unreclaimable:9544 [ 921.312603] mapped:67281 shmem:84 pagetables:1391 bounce:0 [ 921.312603] free:38697 free_pcp:508 free_cma:0 [ 921.345843] Node 0 active_anon:673616kB inactive_anon:312kB active_file:5192kB inactive_file:4800kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269124kB dirty:292kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 921.373764] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 921.399878] lowmem_reserve[]: 0 2817 7244 7244 [ 921.404454] Node 0 DMA32 free:87388kB min:26224kB low:32780kB high:39336kB active_anon:198336kB inactive_anon:36kB active_file:2476kB inactive_file:3888kB unevictable:0kB writepending:200kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2752kB pagetables:2740kB bounce:0kB free_pcp:676kB local_pcp:60kB free_cma:0kB [ 921.433600] lowmem_reserve[]: 0 0 4426 4426 [ 921.437911] Node 0 Normal free:51496kB min:41208kB low:51508kB high:61808kB active_anon:475264kB inactive_anon:276kB active_file:2716kB inactive_file:912kB unevictable:0kB writepending:92kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2824kB bounce:0kB free_pcp:1356kB local_pcp:628kB free_cma:0kB [ 921.467232] lowmem_reserve[]: 0 0 0 0 [ 921.471018] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 921.484966] Node 0 DMA32: 2109*4kB (UMH) 3589*8kB (UMH) 1102*16kB (UMH) 357*32kB (UMH) 157*64kB (UMH) 37*128kB (UM) 5*256kB (UM) 4*512kB (UM) 3*1024kB (UM) 0*2048kB 0*4096kB = 87388kB [ 921.501479] Node 0 Normal: 9052*4kB (UMEH) 1815*8kB (UMH) 4*16kB (UH) 2*32kB (UH) 6*64kB (UH) 2*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51496kB [ 921.515811] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 921.524362] 2582 total pagecache pages [ 921.528225] 0 pages in swap cache [ 921.531657] Swap cache stats: add 0, delete 0, find 0/0 [ 921.536994] Free swap = 0kB [ 921.539990] Total swap = 0kB [ 921.542984] 1965969 pages RAM [ 921.546064] 0 pages HighMem/MovableOnly [ 921.550022] 106316 pages reserved [ 921.557539] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 921.568033] syz-executor7 cpuset=syz7 mems_allowed=0 [ 921.573151] CPU: 1 PID: 22154 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 921.579983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.589334] Call Trace: [ 921.591925] dump_stack+0x185/0x1d0 [ 921.595552] warn_alloc+0x430/0x690 [ 921.599189] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 921.604027] ? kernel_poison_pages+0x40/0x360 05:04:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x20000000006}]}) socket$inet_tcp(0x2, 0x1, 0x0) get_mempolicy(&(0x7f0000002c40), &(0x7f0000002c80), 0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) 05:04:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 921.608539] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 921.613995] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 921.618948] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 921.623890] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.628735] ? __msan_poison_alloca+0x15c/0x1d0 [ 921.633420] kmsan_alloc_page+0x82/0xe0 [ 921.637425] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 921.642188] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.647036] ? __msan_poison_alloca+0x15c/0x1d0 [ 921.651706] ? __should_failslab+0x278/0x2a0 [ 921.656123] ? should_fail+0x57/0xab0 [ 921.659923] ? __should_failslab+0x278/0x2a0 [ 921.664334] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.669177] ? __msan_poison_alloca+0x15c/0x1d0 [ 921.673851] ? kmsan_set_origin+0x9e/0x160 [ 921.678099] alloc_pages_vma+0x1555/0x17f0 [ 921.682362] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 921.687478] handle_mm_fault+0x44ca/0x7ed0 [ 921.691713] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.696569] __do_page_fault+0xec6/0x1a10 [ 921.700726] do_page_fault+0xb7/0x250 [ 921.704530] ? page_fault+0x8/0x30 [ 921.708069] page_fault+0x1e/0x30 [ 921.711515] RIP: 0033:0x4075fa [ 921.714693] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 921.720048] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 921.727313] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 921.734573] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 921.741825] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e12f5 [ 921.749075] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 921.758029] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 921.768526] syz-executor0 cpuset=syz0 mems_allowed=0 [ 921.773638] CPU: 1 PID: 22156 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 921.780464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.789809] Call Trace: [ 921.792396] dump_stack+0x185/0x1d0 [ 921.796032] warn_alloc+0x430/0x690 [ 921.799671] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 921.804518] ? kernel_poison_pages+0x40/0x360 [ 921.809019] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 921.814477] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 921.819433] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 921.824379] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.829250] ? __msan_poison_alloca+0x15c/0x1d0 [ 921.833927] kmsan_alloc_page+0x82/0xe0 [ 921.837902] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 921.842666] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.847512] ? __msan_poison_alloca+0x15c/0x1d0 [ 921.852183] ? __should_failslab+0x278/0x2a0 [ 921.856599] ? should_fail+0x57/0xab0 [ 921.860398] ? __should_failslab+0x278/0x2a0 [ 921.864811] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.869653] ? __msan_poison_alloca+0x15c/0x1d0 [ 921.874326] ? kmsan_set_origin+0x9e/0x160 [ 921.878570] alloc_pages_vma+0x1555/0x17f0 [ 921.882815] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 921.887929] handle_mm_fault+0x44ca/0x7ed0 [ 921.892168] ? kmsan_set_origin_inline+0x6b/0x120 [ 921.897023] __do_page_fault+0xec6/0x1a10 [ 921.901182] do_page_fault+0xb7/0x250 [ 921.905024] ? page_fault+0x8/0x30 [ 921.908567] page_fault+0x1e/0x30 [ 921.912010] RIP: 0033:0x4075fa [ 921.915192] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 921.920552] RAX: 0000000020000880 RBX: 0000000000000000 RCX: 0000000000000001 [ 921.927820] RDX: 5b28bc30c4ce9cbc RSI: 0000000000000000 RDI: 0000000000eeb848 [ 921.935091] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 921.942356] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e13bd [ 921.949618] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) [ 921.957687] audit: type=1326 audit(1529730286.756:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22165 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 921.978849] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 921.989345] syz-executor6 cpuset=syz6 mems_allowed=0 [ 921.994462] CPU: 1 PID: 22172 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 922.001292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.010638] Call Trace: [ 922.013226] dump_stack+0x185/0x1d0 [ 922.016856] warn_alloc+0x430/0x690 [ 922.020494] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 922.025336] ? kernel_poison_pages+0x40/0x360 [ 922.029838] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 922.035288] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 922.040238] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 922.045183] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.050026] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.054698] kmsan_alloc_page+0x82/0xe0 [ 922.058663] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 922.063402] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.068225] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.072874] ? __should_failslab+0x278/0x2a0 [ 922.077268] ? should_fail+0x57/0xab0 [ 922.081055] ? __should_failslab+0x278/0x2a0 [ 922.085451] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.090275] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.094925] ? kmsan_set_origin+0x9e/0x160 [ 922.099148] alloc_pages_vma+0x1555/0x17f0 [ 922.103369] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 922.108459] handle_mm_fault+0x44ca/0x7ed0 [ 922.112674] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.117509] __do_page_fault+0xec6/0x1a10 [ 922.121642] do_page_fault+0xb7/0x250 [ 922.125437] ? page_fault+0x8/0x30 [ 922.128956] page_fault+0x1e/0x30 [ 922.132389] RIP: 0033:0x4075fa [ 922.135562] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 922.140916] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 922.148167] RDX: 935e9f582c8804e2 RSI: 0000000000000000 RDI: 0000000001de4848 [ 922.155416] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 05:04:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 922.162668] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e149a [ 922.170699] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 922.200500] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 922.211023] syz-executor5 cpuset=syz5 mems_allowed=0 [ 922.216140] CPU: 1 PID: 22178 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 922.222972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.232325] Call Trace: [ 922.234917] dump_stack+0x185/0x1d0 [ 922.238548] warn_alloc+0x430/0x690 [ 922.242189] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 922.247034] ? kernel_poison_pages+0x40/0x360 [ 922.251536] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 922.256987] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 922.261958] kmsan_alloc_meta_for_pages+0x8d/0x3a0 05:04:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) [ 922.266900] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.271745] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.276429] kmsan_alloc_page+0x82/0xe0 [ 922.280409] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 922.285163] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.290003] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.294674] ? __should_failslab+0x278/0x2a0 [ 922.299083] ? should_fail+0x57/0xab0 [ 922.302877] ? __should_failslab+0x278/0x2a0 [ 922.307284] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.312124] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.316796] ? kmsan_set_origin+0x9e/0x160 [ 922.321040] alloc_pages_vma+0x1555/0x17f0 [ 922.325280] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 922.330386] handle_mm_fault+0x44ca/0x7ed0 [ 922.334621] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.339477] __do_page_fault+0xec6/0x1a10 [ 922.343632] do_page_fault+0xb7/0x250 [ 922.347436] ? page_fault+0x8/0x30 [ 922.350977] page_fault+0x1e/0x30 [ 922.354424] RIP: 0033:0x4075fa [ 922.357605] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 922.362966] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 922.370230] RDX: 6e30a580d38b300b RSI: 0000000000000000 RDI: 0000000001f94848 [ 922.377493] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 922.384758] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e1578 [ 922.392023] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 922.399291] warn_alloc_show_mem: 3 callbacks suppressed [ 922.399293] Mem-Info: [ 922.407033] active_anon:168467 inactive_anon:76 isolated_anon:0 [ 922.407033] active_file:919 inactive_file:1159 isolated_file:32 [ 922.407033] unevictable:0 dirty:82 writeback:0 unstable:0 [ 922.407033] slab_reclaimable:3384 slab_unreclaimable:9552 [ 922.407033] mapped:67101 shmem:84 pagetables:1468 bounce:0 [ 922.407033] free:38266 free_pcp:481 free_cma:0 [ 922.440104] Node 0 active_anon:673868kB inactive_anon:304kB active_file:3676kB inactive_file:4636kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:268404kB dirty:328kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 922.468314] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 922.494418] lowmem_reserve[]: 0 2817 7244 7244 [ 922.498986] Node 0 DMA32 free:85656kB min:26224kB low:32780kB high:39336kB active_anon:198592kB inactive_anon:28kB active_file:1876kB inactive_file:3660kB unevictable:0kB writepending:236kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2944kB pagetables:3040kB bounce:0kB free_pcp:728kB local_pcp:40kB free_cma:0kB [ 922.528138] lowmem_reserve[]: 0 0 4426 4426 [ 922.532444] Node 0 Normal free:51504kB min:41208kB low:51508kB high:61808kB active_anon:475276kB inactive_anon:276kB active_file:2172kB inactive_file:912kB unevictable:0kB writepending:92kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2832kB bounce:0kB free_pcp:1196kB local_pcp:520kB free_cma:0kB [ 922.561770] lowmem_reserve[]: 0 0 0 0 [ 922.565557] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 922.578764] Node 0 DMA32: 2133*4kB (UMH) 3614*8kB (MH) 1093*16kB (UMH) 352*32kB (UMH) 161*64kB (UMH) 38*128kB (UM) 3*256kB (M) 3*512kB (M) 2*1024kB (M) 0*2048kB 0*4096kB = 85716kB [ 922.594919] Node 0 Normal: 9106*4kB (UMEH) 1827*8kB (UMH) 6*16kB (UMH) 2*32kB (UH) 6*64kB (UH) 2*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51840kB [ 922.609339] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 05:04:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) [ 922.617891] 2185 total pagecache pages [ 922.621755] 0 pages in swap cache [ 922.625184] Swap cache stats: add 0, delete 0, find 0/0 [ 922.630522] Free swap = 0kB [ 922.633514] Total swap = 0kB [ 922.636508] 1965969 pages RAM [ 922.639586] 0 pages HighMem/MovableOnly [ 922.643536] 106316 pages reserved [ 922.691158] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 922.701790] syz-executor2 cpuset=syz2 mems_allowed=0 [ 922.706912] CPU: 0 PID: 22186 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 922.713741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.723092] Call Trace: [ 922.725683] dump_stack+0x185/0x1d0 [ 922.729303] warn_alloc+0x430/0x690 [ 922.732934] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 922.737771] ? kernel_poison_pages+0x40/0x360 [ 922.742267] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 922.747717] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 922.752660] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 922.757594] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.762428] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.767096] kmsan_alloc_page+0x82/0xe0 [ 922.771415] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 922.776167] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.781001] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.785676] ? __should_failslab+0x278/0x2a0 [ 922.790088] ? should_fail+0x57/0xab0 [ 922.793884] ? __should_failslab+0x278/0x2a0 [ 922.798291] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.803132] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.807804] ? kmsan_set_origin+0x9e/0x160 [ 922.812051] alloc_pages_vma+0x1555/0x17f0 [ 922.816290] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 922.821397] handle_mm_fault+0x44ca/0x7ed0 [ 922.825635] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.830490] __do_page_fault+0xec6/0x1a10 [ 922.834644] do_page_fault+0xb7/0x250 [ 922.838450] ? page_fault+0x8/0x30 05:04:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) [ 922.841990] page_fault+0x1e/0x30 [ 922.845439] RIP: 0033:0x4075fa [ 922.848619] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 922.853983] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000000 [ 922.861250] RDX: d7450aaf0ef07e4c RSI: 0000000000000000 RDI: 0000000002541848 [ 922.868515] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 922.875800] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e1762 [ 922.883060] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 922.898659] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 922.909173] syz-executor7 cpuset=syz7 mems_allowed=0 [ 922.914295] CPU: 1 PID: 22190 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 922.921131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.930486] Call Trace: [ 922.933084] dump_stack+0x185/0x1d0 [ 922.936714] warn_alloc+0x430/0x690 [ 922.940354] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 922.945198] ? kernel_poison_pages+0x40/0x360 [ 922.949701] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 922.955160] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 922.960116] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 922.965058] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.969897] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.974575] kmsan_alloc_page+0x82/0xe0 [ 922.978549] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 922.983301] ? kmsan_set_origin_inline+0x6b/0x120 [ 922.988129] ? __msan_poison_alloca+0x15c/0x1d0 [ 922.992784] ? __should_failslab+0x278/0x2a0 [ 922.997176] ? should_fail+0x57/0xab0 [ 923.000958] ? __should_failslab+0x278/0x2a0 [ 923.005351] ? kmsan_set_origin_inline+0x6b/0x120 [ 923.010176] ? __msan_poison_alloca+0x15c/0x1d0 [ 923.014827] ? kmsan_set_origin+0x9e/0x160 [ 923.019059] alloc_pages_vma+0x1555/0x17f0 [ 923.023285] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 923.028387] handle_mm_fault+0x44ca/0x7ed0 [ 923.032611] ? kmsan_set_origin_inline+0x6b/0x120 [ 923.037446] __do_page_fault+0xec6/0x1a10 [ 923.041584] do_page_fault+0xb7/0x250 [ 923.045370] ? page_fault+0x8/0x30 [ 923.048892] page_fault+0x1e/0x30 [ 923.052323] RIP: 0033:0x4075fa [ 923.055497] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 923.060840] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 923.068091] RDX: c63492aa260693b6 RSI: 0000000000000000 RDI: 0000000002011848 [ 923.075340] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 923.082610] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e1832 [ 923.089859] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:04:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5002e}]}) socket(0x0, 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000003c0)=""/213) 05:04:48 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) [ 923.166153] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 923.176685] syz-executor1 cpuset=syz1 mems_allowed=0 [ 923.181810] CPU: 0 PID: 22199 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 923.188643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 923.197988] Call Trace: [ 923.200568] dump_stack+0x185/0x1d0 [ 923.204185] warn_alloc+0x430/0x690 [ 923.207808] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 923.212635] ? kernel_poison_pages+0x40/0x360 [ 923.217117] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 923.222548] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 923.227474] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 923.232393] ? kmsan_set_origin_inline+0x6b/0x120 [ 923.237228] ? __msan_poison_alloca+0x15c/0x1d0 [ 923.241883] kmsan_alloc_page+0x82/0xe0 [ 923.245847] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 923.250585] ? kmsan_set_origin_inline+0x6b/0x120 [ 923.255423] ? __msan_poison_alloca+0x15c/0x1d0 [ 923.260089] ? __should_failslab+0x278/0x2a0 [ 923.264483] ? should_fail+0x57/0xab0 [ 923.268263] ? __should_failslab+0x278/0x2a0 [ 923.272667] ? kmsan_set_origin_inline+0x6b/0x120 [ 923.277492] ? __msan_poison_alloca+0x15c/0x1d0 [ 923.282578] ? kmsan_set_origin+0x9e/0x160 [ 923.286804] alloc_pages_vma+0x1555/0x17f0 [ 923.291027] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 923.296125] handle_mm_fault+0x44ca/0x7ed0 [ 923.300343] ? kmsan_set_origin_inline+0x6b/0x120 [ 923.305178] __do_page_fault+0xec6/0x1a10 [ 923.309312] do_page_fault+0xb7/0x250 [ 923.313098] ? page_fault+0x8/0x30 [ 923.316618] page_fault+0x1e/0x30 [ 923.320057] RIP: 0033:0x4075fa [ 923.323235] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 923.328578] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 923.335830] RDX: 28865427f26a51b5 RSI: 0000000000000000 RDI: 0000000000e1e848 [ 923.343081] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 923.350335] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e193d [ 923.357601] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 923.364872] warn_alloc_show_mem: 2 callbacks suppressed [ 923.364874] Mem-Info: [ 923.372615] active_anon:168467 inactive_anon:76 isolated_anon:0 [ 923.372615] active_file:1139 inactive_file:896 isolated_file:32 [ 923.372615] unevictable:0 dirty:0 writeback:0 unstable:0 [ 923.372615] slab_reclaimable:3384 slab_unreclaimable:9552 [ 923.372615] mapped:67188 shmem:84 pagetables:1468 bounce:0 [ 923.372615] free:38328 free_pcp:297 free_cma:0 [ 923.405693] Node 0 active_anon:673868kB inactive_anon:304kB active_file:4556kB inactive_file:3584kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:268752kB dirty:0kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 923.433620] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 923.459728] lowmem_reserve[]: 0 2817 7244 7244 [ 923.464296] Node 0 DMA32 free:85968kB min:26224kB low:32780kB high:39336kB active_anon:198592kB inactive_anon:28kB active_file:1868kB inactive_file:3152kB unevictable:0kB writepending:236kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:3072kB pagetables:3040kB bounce:0kB free_pcp:440kB local_pcp:312kB free_cma:0kB [ 923.493533] lowmem_reserve[]: 0 0 4426 4426 [ 923.497849] Node 0 Normal free:51440kB min:41208kB low:51508kB high:61808kB active_anon:475276kB inactive_anon:276kB active_file:2172kB inactive_file:912kB unevictable:0kB writepending:92kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2832kB bounce:0kB free_pcp:748kB local_pcp:664kB free_cma:0kB [ 923.527103] lowmem_reserve[]: 0 0 0 0 [ 923.530892] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 923.544103] Node 0 DMA32: 2186*4kB (UMH) 3642*8kB (UMH) 1106*16kB (UMH) 357*32kB (UMH) 158*64kB (UMH) 33*128kB (UM) 4*256kB (M) 3*512kB (M) 2*1024kB (M) 0*2048kB 0*4096kB = 85944kB [ 923.560352] Node 0 Normal: 8988*4kB (UMEH) 1811*8kB (UMH) 3*16kB (H) 2*32kB (H) 6*64kB (H) 2*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51192kB [ 923.574424] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 923.582977] 2141 total pagecache pages [ 923.586842] 0 pages in swap cache [ 923.590271] Swap cache stats: add 0, delete 0, find 0/0 [ 923.595607] Free swap = 0kB [ 923.598601] Total swap = 0kB [ 923.601597] 1965969 pages RAM [ 923.604679] 0 pages HighMem/MovableOnly [ 923.608626] 106316 pages reserved 05:04:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:48 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) [ 923.814267] audit: type=1326 audit(1529730288.810:1971): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22219 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:48 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) [ 924.477146] audit: type=1326 audit(1529730289.475:1972): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22264 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) [ 924.777558] audit: type=1326 audit(1529730289.776:1973): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22287 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:49 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) [ 925.422991] audit: type=1326 audit(1529730290.421:1974): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22317 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:04:50 executing program 0: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:50 executing program 7: socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:50 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) [ 925.768059] audit: type=1326 audit(1529730290.766:1975): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22337 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:50 executing program 0: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:50 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:50 executing program 4: open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:51 executing program 4: open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 05:04:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:51 executing program 0: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) [ 926.395872] audit: type=1326 audit(1529730291.394:1976): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22372 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:51 executing program 7: socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:51 executing program 4: open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:51 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:52 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:52 executing program 7: socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:52 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x0, &(0x7f00000002c0)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:52 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:52 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:04:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x0, &(0x7f00000002c0)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:52 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:52 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:52 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:04:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x0, &(0x7f00000002c0)}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) [ 927.732153] audit: type=1326 audit(1529730292.730:1977): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22451 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:52 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:04:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:53 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:04:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:53 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:04:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) [ 928.686717] audit: type=1326 audit(1529730293.685:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22516 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) [ 929.341160] warn_alloc: 9 callbacks suppressed [ 929.341195] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 929.356532] udevd cpuset=/ mems_allowed=0 [ 929.360838] CPU: 1 PID: 4483 Comm: udevd Not tainted 4.17.0+ #9 [ 929.366944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.376329] Call Trace: [ 929.378970] dump_stack+0x185/0x1d0 [ 929.382647] warn_alloc+0x430/0x690 [ 929.386339] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 929.391256] ? __msan_poison_alloca+0x15c/0x1d0 [ 929.396031] copy_process+0x778/0x9be0 [ 929.399964] ? expand_files+0x5b/0xe00 [ 929.403915] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 929.409322] ? expand_files+0xa6/0xe00 [ 929.413274] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 929.418677] ? find_next_zero_bit+0x12b/0x2f0 [ 929.423231] ? __msan_poison_alloca+0x141/0x1d0 [ 929.427949] _do_fork+0x353/0xf60 [ 929.431466] __x64_sys_clone+0x15e/0x1b0 [ 929.435572] ? __ia32_sys_vfork+0x70/0x70 [ 929.439757] do_syscall_64+0x15b/0x230 [ 929.443696] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 929.448914] RIP: 0033:0x7f8a6dfa8f46 [ 929.452647] RSP: 002b:00007ffdef12c020 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 929.460399] RAX: ffffffffffffffda RBX: 00007ffdef12c020 RCX: 00007f8a6dfa8f46 [ 929.467706] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 929.475010] RBP: 00007ffdef12c080 R08: 0000000000001183 R09: 0000000000001183 [ 929.483000] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 929.490301] R13: 00007ffdef12c040 R14: 0000000000000005 R15: 0000000000000005 [ 929.497828] Mem-Info: [ 929.500465] active_anon:168461 inactive_anon:74 isolated_anon:0 [ 929.500465] active_file:643 inactive_file:948 isolated_file:64 [ 929.500465] unevictable:0 dirty:19 writeback:0 unstable:0 [ 929.500465] slab_reclaimable:3372 slab_unreclaimable:9535 [ 929.500465] mapped:66737 shmem:84 pagetables:1416 bounce:0 [ 929.500465] free:36022 free_pcp:348 free_cma:0 [ 929.533871] Node 0 active_anon:673844kB inactive_anon:296kB active_file:2572kB inactive_file:3888kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266832kB dirty:76kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 929.561845] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 05:04:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) [ 929.588177] lowmem_reserve[]: 0 2817 7244 7244 [ 929.592886] Node 0 DMA32 free:76996kB min:26224kB low:32780kB high:39336kB active_anon:198512kB inactive_anon:16kB active_file:1004kB inactive_file:2064kB unevictable:0kB writepending:76kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2752kB pagetables:2776kB bounce:0kB free_pcp:316kB local_pcp:40kB free_cma:0kB [ 929.622163] lowmem_reserve[]: 0 0 4426 4426 [ 929.626737] Node 0 Normal free:51012kB min:41208kB low:51508kB high:61808kB active_anon:475332kB inactive_anon:280kB active_file:1240kB inactive_file:1156kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7424kB pagetables:2888kB bounce:0kB free_pcp:272kB local_pcp:36kB free_cma:0kB [ 929.656136] lowmem_reserve[]: 0 0 0 0 [ 929.660106] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 929.673618] Node 0 DMA32: 2506*4kB (UMH) 3792*8kB (UMH) 1022*16kB (UMH) 298*32kB (UMH) 121*64kB (UMH) 22*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 76808kB [ 929.688996] Node 0 Normal: 8894*4kB (UMEH) 1919*8kB (UMEH) 14*16kB (UMH) 3*32kB (H) 3*64kB (UH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51440kB [ 929.703681] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 929.712386] 1698 total pagecache pages [ 929.716375] 0 pages in swap cache [ 929.719950] Swap cache stats: add 0, delete 0, find 0/0 [ 929.725394] Free swap = 0kB [ 929.728547] Total swap = 0kB [ 929.731626] 1965969 pages RAM [ 929.734817] 0 pages HighMem/MovableOnly [ 929.738848] 106316 pages reserved [ 929.746167] syz-executor5: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 929.757670] syz-executor5 cpuset=syz5 mems_allowed=0 [ 929.763041] CPU: 0 PID: 22544 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 929.769910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.779292] Call Trace: [ 929.781932] dump_stack+0x185/0x1d0 [ 929.785593] warn_alloc+0x430/0x690 [ 929.789265] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 929.794139] ? __msan_poison_alloca+0x15c/0x1d0 [ 929.798856] copy_process+0x778/0x9be0 [ 929.803027] ? __msan_poison_alloca+0x15c/0x1d0 [ 929.807717] ? handle_mm_fault+0x74eb/0x7ed0 [ 929.812139] ? handle_mm_fault+0x74eb/0x7ed0 [ 929.816577] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 929.821961] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 929.827958] ? handle_mm_fault+0x1eb0/0x7ed0 [ 929.832376] ? __msan_poison_alloca+0x140/0x1d0 [ 929.837086] _do_fork+0x353/0xf60 [ 929.840561] __x64_sys_clone+0x15e/0x1b0 [ 929.844634] ? __ia32_sys_vfork+0x70/0x70 [ 929.848785] do_syscall_64+0x15b/0x230 [ 929.852683] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 929.857872] RIP: 0033:0x458429 [ 929.861070] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 929.868788] RAX: ffffffffffffffda RBX: 00007f28755bf700 RCX: 0000000000458429 [ 929.876064] RDX: 00007f28755bf9d0 RSI: 00007f28755bedb0 RDI: 00000000003d0f00 [ 929.883339] RBP: 0000000000a3e8a0 R08: 00007f28755bf700 R09: 00007f28755bf700 05:04:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) [ 929.890608] R10: 00007f28755bf9d0 R11: 0000000000000202 R12: 0000000000000000 [ 929.897878] R13: 0000000000a3e81f R14: 00007f28755bf9c0 R15: 0000000000000000 05:04:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 05:04:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) [ 930.054823] syz-executor3: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 930.066351] syz-executor3 cpuset=syz3 mems_allowed=0 [ 930.071651] CPU: 1 PID: 4526 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 930.078479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.087876] Call Trace: [ 930.090512] dump_stack+0x185/0x1d0 [ 930.094186] warn_alloc+0x430/0x690 [ 930.097882] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 930.102758] ? __msan_poison_alloca+0x15c/0x1d0 [ 930.107477] copy_process+0x778/0x9be0 [ 930.111379] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 930.117201] ? ptep_set_access_flags+0x10e/0x1d0 [ 930.121966] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 930.127458] ? handle_mm_fault+0x1eb0/0x7ed0 [ 930.131877] ? __msan_poison_alloca+0x141/0x1d0 [ 930.136568] _do_fork+0x353/0xf60 [ 930.140042] __x64_sys_clone+0x15e/0x1b0 [ 930.144155] ? __ia32_sys_vfork+0x70/0x70 [ 930.148307] do_syscall_64+0x15b/0x230 [ 930.152205] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 930.157395] RIP: 0033:0x45414a [ 930.160584] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 930.168473] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 930.175745] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 930.183012] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001335940 [ 930.190282] R10: 0000000001335c10 R11: 0000000000000246 R12: 0000000000000001 [ 930.197735] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 05:04:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) [ 930.206023] audit: type=1326 audit(1529730295.205:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22553 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:55 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 930.468258] audit: type=1326 audit(1529730295.463:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22568 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:55 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:55 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:04:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) 05:04:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) [ 930.694938] device bridge_slave_1 left promiscuous mode [ 930.700745] bridge0: port 2(bridge_slave_1) entered disabled state [ 930.738465] audit: type=1326 audit(1529730295.737:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22585 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 930.759237] device bridge_slave_0 left promiscuous mode [ 930.765027] bridge0: port 1(bridge_slave_0) entered disabled state 05:04:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:04:55 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 05:04:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 930.958714] audit: type=1326 audit(1529730295.956:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22601 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x20000501a1}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:56 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) [ 931.040167] team0 (unregistering): Port device team_slave_1 removed [ 931.115917] team0 (unregistering): Port device team_slave_0 removed [ 931.170513] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 931.218165] bond0 (unregistering): Releasing backup interface bond_slave_0 05:04:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:04:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) 05:04:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:04:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) [ 931.324729] bond0 (unregistering): Released all slaves [ 931.372300] audit: type=1326 audit(1529730296.370:1983): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22624 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 931.453908] audit: type=1326 audit(1529730296.414:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22627 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:04:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:04:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:04:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) [ 931.682948] IPVS: ftp: loaded support on port[0] = 21 05:04:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:04:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) open(&(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, 0x0, @thr={&(0x7f0000001e40), &(0x7f0000001f00)}}) [ 932.560940] IPVS: ftp: loaded support on port[0] = 21 [ 933.263778] device bridge_slave_1 left promiscuous mode [ 933.269555] bridge0: port 2(bridge_slave_1) entered disabled state [ 933.291178] device bridge_slave_0 left promiscuous mode [ 933.296880] bridge0: port 1(bridge_slave_0) entered disabled state [ 933.308330] device bridge_slave_1 left promiscuous mode [ 933.313917] bridge0: port 2(bridge_slave_1) entered disabled state [ 933.324831] device bridge_slave_0 left promiscuous mode [ 933.330445] bridge0: port 1(bridge_slave_0) entered disabled state [ 933.373761] team0 (unregistering): Port device team_slave_1 removed [ 933.383360] team0 (unregistering): Port device team_slave_0 removed [ 933.393771] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 933.409026] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 933.434250] bond0 (unregistering): Released all slaves [ 933.452198] team0 (unregistering): Port device team_slave_1 removed [ 933.461994] team0 (unregistering): Port device team_slave_0 removed [ 933.471862] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 933.489251] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 933.514888] bond0 (unregistering): Released all slaves [ 933.870723] bridge0: port 1(bridge_slave_0) entered blocking state [ 933.877197] bridge0: port 1(bridge_slave_0) entered disabled state [ 933.896322] device bridge_slave_0 entered promiscuous mode [ 933.926137] bridge0: port 1(bridge_slave_0) entered blocking state [ 933.932628] bridge0: port 1(bridge_slave_0) entered disabled state [ 933.940638] device bridge_slave_0 entered promiscuous mode [ 934.000562] bridge0: port 2(bridge_slave_1) entered blocking state [ 934.007048] bridge0: port 2(bridge_slave_1) entered disabled state [ 934.015982] device bridge_slave_1 entered promiscuous mode [ 934.040223] bridge0: port 2(bridge_slave_1) entered blocking state [ 934.046721] bridge0: port 2(bridge_slave_1) entered disabled state [ 934.067382] device bridge_slave_1 entered promiscuous mode [ 934.078863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 934.135317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 934.188192] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 934.198787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 934.399499] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 934.481584] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 934.495650] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 934.595219] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 934.602356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 934.617654] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 934.697000] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 934.704020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 934.761354] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 934.768425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 934.789939] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 934.798268] team0: Port device team_slave_0 added [ 934.852249] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 934.860433] team0: Port device team_slave_1 added [ 934.914968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 934.936732] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 934.945506] team0: Port device team_slave_0 added [ 934.970413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 934.998881] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 935.006473] team0: Port device team_slave_1 added [ 935.031164] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 935.043225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 935.052102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 935.071312] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 935.099217] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 935.106636] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 935.119656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 935.134720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 935.190160] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 935.197599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 935.213889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 935.252451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 935.259968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 935.271261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 935.740592] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.747134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.753956] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.760446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 935.767834] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 935.875563] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.882043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.888894] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.895323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 935.904522] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 936.607479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 936.615002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 937.976525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 938.128591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 938.187001] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 938.334423] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 938.395255] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 938.401917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 938.410285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 938.538501] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 938.544837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 938.561559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 938.624985] 8021q: adding VLAN 0 to HW filter on device team0 [ 938.751635] 8021q: adding VLAN 0 to HW filter on device team0 05:05:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 05:05:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f00000002c0)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000780)) 05:05:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:05:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) 05:05:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50345}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:05:04 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:05:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @empty, @local}, &(0x7f0000000740)=0xc) [ 939.896399] audit: type=1326 audit(1529730304.895:1985): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23165 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:05:05 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 939.955481] audit: type=1326 audit(1529730304.916:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23170 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 939.975470] audit: type=1326 audit(1529730304.918:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23171 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:05:05 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:05:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:05:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 940.152664] audit: type=1326 audit(1529730305.151:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23190 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:05:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 940.320557] audit: type=1326 audit(1529730305.316:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23197 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:05:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 940.637559] device bridge_slave_1 left promiscuous mode [ 940.643469] bridge0: port 2(bridge_slave_1) entered disabled state [ 940.677537] device bridge_slave_0 left promiscuous mode 05:05:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 940.683378] bridge0: port 1(bridge_slave_0) entered disabled state 05:05:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 940.740800] IPVS: ftp: loaded support on port[0] = 21 [ 940.755201] team0 (unregistering): Port device team_slave_1 removed [ 940.792366] team0 (unregistering): Port device team_slave_0 removed [ 940.845718] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 940.908683] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 940.989918] bond0 (unregistering): Released all slaves [ 941.234174] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 941.245237] udevd cpuset=/ mems_allowed=0 [ 941.249556] CPU: 0 PID: 6662 Comm: udevd Not tainted 4.17.0+ #9 [ 941.255627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.264984] Call Trace: [ 941.267595] dump_stack+0x185/0x1d0 [ 941.271233] warn_alloc+0x430/0x690 [ 941.274885] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 941.279760] ? __msan_poison_alloca+0x15c/0x1d0 [ 941.284488] copy_process+0x778/0x9be0 [ 941.288380] ? expand_files+0x5b/0xe00 [ 941.292286] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 941.297653] ? expand_files+0xa6/0xe00 [ 941.301555] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 941.306944] ? find_next_zero_bit+0x12b/0x2f0 [ 941.311455] ? __msan_poison_alloca+0x141/0x1d0 [ 941.316140] _do_fork+0x353/0xf60 [ 941.319612] __x64_sys_clone+0x15e/0x1b0 [ 941.323688] ? __ia32_sys_vfork+0x70/0x70 [ 941.327841] do_syscall_64+0x15b/0x230 [ 941.331742] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 941.336938] RIP: 0033:0x7f8a6dfa8f46 [ 941.340654] RSP: 002b:00007ffdef12c020 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 941.348380] RAX: ffffffffffffffda RBX: 00007ffdef12c020 RCX: 00007f8a6dfa8f46 [ 941.355649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 941.362924] RBP: 00007ffdef12c080 R08: 0000000000001a06 R09: 0000000000001a06 [ 941.370368] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 941.377812] R13: 00007ffdef12c040 R14: 0000000000000005 R15: 0000000000000005 [ 941.385327] warn_alloc_show_mem: 2 callbacks suppressed [ 941.385335] Mem-Info: [ 941.393295] active_anon:168090 inactive_anon:78 isolated_anon:0 [ 941.393295] active_file:879 inactive_file:822 isolated_file:0 [ 941.393295] unevictable:0 dirty:4 writeback:0 unstable:0 [ 941.393295] slab_reclaimable:3359 slab_unreclaimable:9204 [ 941.393295] mapped:65926 shmem:84 pagetables:1168 bounce:0 [ 941.393295] free:25406 free_pcp:231 free_cma:0 05:05:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)) [ 941.426481] Node 0 active_anon:672360kB inactive_anon:312kB active_file:3260kB inactive_file:3288kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:265328kB dirty:16kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 941.454730] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 941.481197] lowmem_reserve[]: 0 2817 7244 7244 [ 941.485915] Node 0 DMA32 free:48072kB min:26224kB low:32780kB high:39336kB active_anon:198144kB inactive_anon:36kB active_file:2272kB inactive_file:2508kB unevictable:0kB writepending:16kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1964kB bounce:0kB free_pcp:404kB local_pcp:104kB free_cma:0kB [ 941.515381] lowmem_reserve[]: 0 0 4426 4426 [ 941.519844] Node 0 Normal free:32068kB min:41208kB low:51508kB high:61808kB active_anon:474316kB inactive_anon:276kB active_file:1820kB inactive_file:612kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2708kB bounce:0kB free_pcp:544kB local_pcp:0kB free_cma:0kB [ 941.549630] lowmem_reserve[]: 0 0 0 0 [ 941.553561] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 941.567219] Node 0 DMA32: 1532*4kB (UMEH) 3087*8kB (MEH) 707*16kB (UMEH) 141*32kB (UMH) 14*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 47544kB [ 941.582272] Node 0 Normal: 6050*4kB (UMEH) 999*8kB (UMH) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 32192kB [ 941.595302] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 941.604230] 1787 total pagecache pages [ 941.608370] 0 pages in swap cache [ 941.611971] Swap cache stats: add 0, delete 0, find 0/0 [ 941.617408] Free swap = 0kB [ 941.620484] Total swap = 0kB [ 941.623565] 1965969 pages RAM [ 941.626810] 0 pages HighMem/MovableOnly [ 941.630838] 106316 pages reserved 05:05:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:05:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) [ 941.722157] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 941.733519] udevd cpuset=/ mems_allowed=0 [ 941.737911] CPU: 1 PID: 7175 Comm: udevd Not tainted 4.17.0+ #9 [ 941.744002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.753366] Call Trace: [ 941.755982] dump_stack+0x185/0x1d0 [ 941.759620] warn_alloc+0x430/0x690 [ 941.763272] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 941.768168] ? __msan_poison_alloca+0x15c/0x1d0 [ 941.772884] copy_process+0x778/0x9be0 [ 941.776787] ? expand_files+0x5b/0xe00 [ 941.780694] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 941.786066] ? expand_files+0xa6/0xe00 [ 941.789981] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 941.795350] ? find_next_zero_bit+0x12b/0x2f0 [ 941.799862] ? __msan_poison_alloca+0x141/0x1d0 [ 941.804542] _do_fork+0x353/0xf60 [ 941.808013] __x64_sys_clone+0x15e/0x1b0 [ 941.812091] ? __ia32_sys_vfork+0x70/0x70 [ 941.816243] do_syscall_64+0x15b/0x230 [ 941.820142] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 941.825333] RIP: 0033:0x7f8a6dfa8f46 [ 941.829059] RSP: 002b:00007ffdef12c020 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 941.836780] RAX: ffffffffffffffda RBX: 00007ffdef12c020 RCX: 00007f8a6dfa8f46 [ 941.844054] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 941.851330] RBP: 00007ffdef12c080 R08: 0000000000001c07 R09: 0000000000001c07 [ 941.858755] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 941.866031] R13: 00007ffdef12c040 R14: 0000000000000005 R15: 0000000000000005 [ 941.929245] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 941.929647] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 941.940665] syz-executor2 cpuset=/ mems_allowed=0 [ 941.940715] CPU: 1 PID: 23206 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 941.940728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.940739] Call Trace: [ 941.940785] dump_stack+0x185/0x1d0 [ 941.940819] warn_alloc+0x430/0x690 [ 941.940872] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 941.940929] ? __msan_poison_alloca+0x15c/0x1d0 [ 941.940990] copy_process+0x778/0x9be0 [ 941.941039] ? __msan_poison_alloca+0x15c/0x1d0 [ 941.952349] syz-executor7 cpuset= [ 941.957149] ? handle_mm_fault+0x74eb/0x7ed0 [ 941.957190] ? handle_mm_fault+0x74eb/0x7ed0 [ 941.957229] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 941.957281] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 941.964129] syz7 [ 941.973663] ? handle_mm_fault+0x1eb0/0x7ed0 [ 941.976247] mems_allowed=0 [ 941.979830] ? __msan_poison_alloca+0x141/0x1d0 [ 941.979892] _do_fork+0x353/0xf60 [ 942.042420] __x64_sys_clone+0x15e/0x1b0 [ 942.046500] ? __ia32_sys_vfork+0x70/0x70 [ 942.050688] do_syscall_64+0x15b/0x230 [ 942.054602] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 942.059794] RIP: 0033:0x458429 [ 942.062983] RSP: 002b:00007ffe70861918 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 942.070707] RAX: ffffffffffffffda RBX: 00007ffe708619d0 RCX: 0000000000458429 [ 942.077980] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 942.085250] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 942.092523] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 942.099792] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 942.107102] CPU: 0 PID: 4530 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 942.113877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.123237] Call Trace: [ 942.125856] dump_stack+0x185/0x1d0 [ 942.129501] warn_alloc+0x430/0x690 [ 942.133163] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 942.138033] ? __msan_poison_alloca+0x15c/0x1d0 [ 942.142756] copy_process+0x778/0x9be0 [ 942.146654] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 942.152124] ? ptep_set_access_flags+0x10e/0x1d0 [ 942.156887] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 942.162366] ? handle_mm_fault+0x1eb0/0x7ed0 [ 942.166782] ? __msan_poison_alloca+0x141/0x1d0 [ 942.171474] _do_fork+0x353/0xf60 [ 942.174963] __x64_sys_clone+0x15e/0x1b0 [ 942.179032] ? __ia32_sys_vfork+0x70/0x70 [ 942.183197] do_syscall_64+0x15b/0x230 [ 942.187097] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 942.192296] RIP: 0033:0x45414a [ 942.195484] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 942.203201] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 942.210472] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 942.217743] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000002011940 [ 942.225015] R10: 0000000002011c10 R11: 0000000000000246 R12: 0000000000000001 [ 942.232287] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 942.244917] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 942.256629] syz-executor6 cpuset=/ mems_allowed=0 [ 942.261792] CPU: 0 PID: 23203 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 942.268661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.278041] Call Trace: [ 942.280679] dump_stack+0x185/0x1d0 [ 942.284338] warn_alloc+0x430/0x690 [ 942.288041] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 942.292953] ? __msan_poison_alloca+0x15c/0x1d0 [ 942.297695] copy_process+0x778/0x9be0 [ 942.301646] ? __msan_poison_alloca+0x141/0x1d0 [ 942.306364] _do_fork+0x353/0xf60 [ 942.309879] __x64_sys_clone+0x15e/0x1b0 [ 942.313973] ? __ia32_sys_vfork+0x70/0x70 [ 942.318165] do_syscall_64+0x15b/0x230 [ 942.322085] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 942.327291] RIP: 0033:0x41f8b9 [ 942.330489] RSP: 002b:0000000000a3fc00 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 942.338224] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 942.345512] RDX: 0000000000a3fc0c RSI: 0000000000000000 RDI: 0000000000100011 [ 942.352798] RBP: 0000000000a3fdb0 R08: 0000000000a44a60 R09: 000000000000002c [ 942.360084] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000411910 [ 942.367372] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 942.378743] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 942.390129] syz-executor0 cpuset=syz0 mems_allowed=0 [ 942.395388] CPU: 1 PID: 4523 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 942.402173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.411533] Call Trace: [ 942.414143] dump_stack+0x185/0x1d0 [ 942.417781] warn_alloc+0x430/0x690 [ 942.421451] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 942.426323] ? __msan_poison_alloca+0x15c/0x1d0 [ 942.431041] copy_process+0x778/0x9be0 [ 942.434949] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 942.440424] ? ptep_set_access_flags+0x10e/0x1d0 [ 942.445201] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 942.450683] ? handle_mm_fault+0x1eb0/0x7ed0 [ 942.455106] ? __msan_poison_alloca+0x141/0x1d0 [ 942.459954] _do_fork+0x353/0xf60 [ 942.463437] __x64_sys_clone+0x15e/0x1b0 [ 942.467516] ? __ia32_sys_vfork+0x70/0x70 [ 942.471672] do_syscall_64+0x15b/0x230 [ 942.475577] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 942.480769] RIP: 0033:0x45414a [ 942.483958] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 942.491688] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 942.498966] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 942.506236] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000000eeb940 [ 942.513513] R10: 0000000000eebc10 R11: 0000000000000246 R12: 0000000000000001 [ 942.520793] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 942.528185] warn_alloc_show_mem: 4 callbacks suppressed [ 942.528191] Mem-Info: [ 942.536163] active_anon:168079 inactive_anon:75 isolated_anon:0 [ 942.536163] active_file:247 inactive_file:443 isolated_file:21 [ 942.536163] unevictable:0 dirty:20 writeback:0 unstable:0 [ 942.536163] slab_reclaimable:3360 slab_unreclaimable:9191 [ 942.536163] mapped:66051 shmem:84 pagetables:1125 bounce:0 [ 942.536163] free:25157 free_pcp:107 free_cma:0 [ 942.569329] Node 0 active_anon:672316kB inactive_anon:300kB active_file:988kB inactive_file:1772kB unevictable:0kB isolated(anon):0kB isolated(file):84kB mapped:264204kB dirty:80kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 942.597273] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 942.623586] lowmem_reserve[]: 0 2817 7244 7244 [ 942.628294] Node 0 DMA32 free:49712kB min:26224kB low:32780kB high:39336kB active_anon:197992kB inactive_anon:24kB active_file:1084kB inactive_file:2196kB unevictable:0kB writepending:80kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1784kB bounce:0kB free_pcp:776kB local_pcp:132kB free_cma:0kB [ 942.657819] lowmem_reserve[]: 0 0 4426 4426 [ 942.662277] Node 0 Normal free:33816kB min:41208kB low:51508kB high:61808kB active_anon:474324kB inactive_anon:276kB active_file:992kB inactive_file:320kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7104kB pagetables:2716kB bounce:0kB free_pcp:380kB local_pcp:0kB free_cma:0kB [ 942.691402] lowmem_reserve[]: 0 0 0 0 [ 942.695308] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 942.708790] Node 0 DMA32: 2016*4kB (UME) 3343*8kB (UME) 929*16kB (UME) 418*32kB (UM) 613*64kB (UM) 40*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 107656kB [ 942.724320] Node 0 Normal: 6703*4kB (UMEH) 1066*8kB (UMH) 2*16kB (U) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 35372kB [ 942.737653] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 942.746309] 1653 total pagecache pages [ 942.750312] 0 pages in swap cache [ 942.753833] Swap cache stats: add 0, delete 0, find 0/0 [ 942.759280] Free swap = 0kB [ 942.762348] Total swap = 0kB [ 942.765455] 1965969 pages RAM [ 942.768607] 0 pages HighMem/MovableOnly [ 942.772647] 106316 pages reserved [ 942.776617] audit: type=1326 audit(1529730307.775:1990): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23212 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 942.860878] IPVS: ftp: loaded support on port[0] = 21 [ 943.615942] device bridge_slave_1 left promiscuous mode [ 943.621727] bridge0: port 2(bridge_slave_1) entered disabled state [ 943.649224] device bridge_slave_0 left promiscuous mode [ 943.655000] bridge0: port 1(bridge_slave_0) entered disabled state [ 943.684720] device bridge_slave_1 left promiscuous mode [ 943.690403] bridge0: port 2(bridge_slave_1) entered disabled state [ 943.718988] device bridge_slave_0 left promiscuous mode [ 943.724683] bridge0: port 1(bridge_slave_0) entered disabled state [ 943.745597] device bridge_slave_1 left promiscuous mode [ 943.751296] bridge0: port 2(bridge_slave_1) entered disabled state [ 943.764118] device bridge_slave_0 left promiscuous mode [ 943.769761] bridge0: port 1(bridge_slave_0) entered disabled state [ 943.853683] team0 (unregistering): Port device team_slave_1 removed [ 943.864848] team0 (unregistering): Port device team_slave_0 removed [ 943.875800] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 943.904567] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 943.934378] bond0 (unregistering): Released all slaves [ 943.954047] team0 (unregistering): Port device team_slave_1 removed [ 943.965951] team0 (unregistering): Port device team_slave_0 removed [ 943.977812] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 943.993364] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 944.024753] bond0 (unregistering): Released all slaves [ 944.046325] team0 (unregistering): Port device team_slave_1 removed [ 944.057752] team0 (unregistering): Port device team_slave_0 removed [ 944.068813] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 944.085380] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 944.116290] bond0 (unregistering): Released all slaves [ 945.222972] bridge0: port 1(bridge_slave_0) entered blocking state [ 945.229535] bridge0: port 1(bridge_slave_0) entered disabled state [ 945.247282] device bridge_slave_0 entered promiscuous mode [ 945.304169] bridge0: port 2(bridge_slave_1) entered blocking state [ 945.310640] bridge0: port 2(bridge_slave_1) entered disabled state [ 945.318125] device bridge_slave_1 entered promiscuous mode [ 945.368840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 945.422649] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 945.579642] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 945.686779] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 945.789344] IPVS: ftp: loaded support on port[0] = 21 [ 945.950908] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 945.958658] team0: Port device team_slave_0 added [ 946.012789] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 946.020719] team0: Port device team_slave_1 added [ 946.075485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 946.133292] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 946.189477] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 946.197016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 946.214355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 946.252863] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 946.260375] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 946.277954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 946.740457] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.746975] bridge0: port 1(bridge_slave_0) entered disabled state [ 946.770267] device bridge_slave_0 entered promiscuous mode [ 946.850947] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.857432] bridge0: port 2(bridge_slave_1) entered disabled state [ 946.865672] device bridge_slave_1 entered promiscuous mode [ 946.924994] IPVS: ftp: loaded support on port[0] = 21 [ 946.932543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 946.985788] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.992226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 946.999017] bridge0: port 1(bridge_slave_0) entered blocking state [ 947.005417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 947.013189] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 947.032222] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 947.169404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 947.259939] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 947.354835] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 947.459171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 947.467399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 947.789873] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 947.800000] team0: Port device team_slave_0 added [ 947.919975] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 947.928447] team0: Port device team_slave_1 added [ 948.029005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 948.106218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 948.170883] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 948.178599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 948.197889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 948.273483] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 948.280952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 948.297180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 948.311992] bridge0: port 1(bridge_slave_0) entered blocking state [ 948.318437] bridge0: port 1(bridge_slave_0) entered disabled state [ 948.342389] device bridge_slave_0 entered promiscuous mode [ 948.451107] bridge0: port 2(bridge_slave_1) entered blocking state [ 948.457597] bridge0: port 2(bridge_slave_1) entered disabled state [ 948.465773] device bridge_slave_1 entered promiscuous mode [ 948.528021] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 948.594633] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 948.859644] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 948.918830] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 949.231056] bridge0: port 2(bridge_slave_1) entered blocking state [ 949.237571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 949.244378] bridge0: port 1(bridge_slave_0) entered blocking state [ 949.250791] bridge0: port 1(bridge_slave_0) entered forwarding state [ 949.260299] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 949.332030] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 949.341444] team0: Port device team_slave_0 added [ 949.457528] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 949.466892] team0: Port device team_slave_1 added [ 949.566585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 949.574465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 949.590466] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 949.695599] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 949.773282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 949.780722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 949.797734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 949.872052] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 949.879661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 949.894170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 950.183965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 950.250578] 8021q: adding VLAN 0 to HW filter on device bond0 [ 950.529036] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 950.680482] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.686950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 950.693771] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.700201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 950.707942] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 950.858995] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 950.865362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 950.872925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 951.162314] 8021q: adding VLAN 0 to HW filter on device team0 [ 951.191206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 952.709403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 952.906253] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 952.916775] syz-executor3 cpuset=syz3 mems_allowed=0 [ 952.921890] CPU: 0 PID: 23813 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 952.928724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.938073] Call Trace: [ 952.940664] dump_stack+0x185/0x1d0 [ 952.944292] warn_alloc+0x430/0x690 [ 952.947932] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 952.952774] ? kernel_poison_pages+0x40/0x360 [ 952.957272] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 952.962738] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 952.967777] kmsan_alloc_page+0x82/0xe0 [ 952.971750] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 952.976506] ? kmsan_set_origin_inline+0x6b/0x120 [ 952.981519] ? __msan_poison_alloca+0x15c/0x1d0 [ 952.986188] ? __should_failslab+0x278/0x2a0 [ 952.990597] ? should_fail+0x57/0xab0 [ 952.994393] ? __should_failslab+0x278/0x2a0 [ 952.998813] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.003653] ? __msan_poison_alloca+0x15c/0x1d0 [ 953.008322] ? kmsan_set_origin+0x9e/0x160 [ 953.012563] alloc_pages_vma+0x1555/0x17f0 [ 953.016806] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 953.021921] handle_mm_fault+0x44ca/0x7ed0 [ 953.026153] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.031022] __do_page_fault+0xec6/0x1a10 [ 953.035177] do_page_fault+0xb7/0x250 [ 953.038972] ? page_fault+0x8/0x30 [ 953.042510] page_fault+0x1e/0x30 [ 953.045958] RIP: 0033:0x4075fa [ 953.049140] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 953.054494] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 953.061761] RDX: 13a257cff5cf2924 RSI: 0000000000000000 RDI: 0000000001a1e848 [ 953.069028] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 953.076290] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e8d66 [ 953.083556] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 953.090825] Mem-Info: [ 953.093256] active_anon:165704 inactive_anon:78 isolated_anon:0 [ 953.093256] active_file:1133 inactive_file:6020 isolated_file:0 [ 953.093256] unevictable:0 dirty:53 writeback:0 unstable:0 [ 953.093256] slab_reclaimable:3355 slab_unreclaimable:8810 [ 953.093256] mapped:55803 shmem:84 pagetables:1108 bounce:0 [ 953.093256] free:57173 free_pcp:506 free_cma:0 [ 953.126353] Node 0 active_anon:662816kB inactive_anon:312kB active_file:4532kB inactive_file:24080kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:222980kB dirty:212kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 953.154456] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 953.180561] lowmem_reserve[]: 0 2817 7244 7244 [ 953.185133] Node 0 DMA32 free:170644kB min:26224kB low:32780kB high:39336kB active_anon:190564kB inactive_anon:36kB active_file:4028kB inactive_file:23952kB unevictable:0kB writepending:180kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1720kB bounce:0kB free_pcp:652kB local_pcp:32kB free_cma:0kB [ 953.214447] lowmem_reserve[]: 0 0 4426 4426 [ 953.218763] Node 0 Normal free:43152kB min:41208kB low:51508kB high:61808kB active_anon:472536kB inactive_anon:276kB active_file:568kB inactive_file:20kB unevictable:0kB writepending:32kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7104kB pagetables:2712kB bounce:0kB free_pcp:1292kB local_pcp:660kB free_cma:0kB [ 953.247940] lowmem_reserve[]: 0 0 0 0 [ 953.251754] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 953.264974] Node 0 DMA32: 939*4kB (UME) 1163*8kB (UME) 685*16kB (UME) 134*32kB (UM) 10*64kB (UM) 395*128kB (U) 135*256kB (U) 68*512kB (U) 19*1024kB (U) 1*2048kB (M) 0*4096kB = 170388kB [ 953.281604] Node 0 Normal: 7508*4kB (UMEH) 1291*8kB (UMEH) 23*16kB (UM) 14*32kB (UM) 19*64kB (UH) 6*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 43160kB [ 953.296277] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 953.304830] 7208 total pagecache pages [ 953.308691] 0 pages in swap cache [ 953.312127] Swap cache stats: add 0, delete 0, find 0/0 [ 953.317472] Free swap = 0kB [ 953.320464] Total swap = 0kB [ 953.323465] 1965969 pages RAM [ 953.326542] 0 pages HighMem/MovableOnly [ 953.330488] 106316 pages reserved [ 953.441232] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 953.658426] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 953.664768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 953.673906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 953.874431] 8021q: adding VLAN 0 to HW filter on device team0 [ 954.136633] 8021q: adding VLAN 0 to HW filter on device bond0 [ 954.334453] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 954.544640] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 954.551937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 954.560249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 954.753401] 8021q: adding VLAN 0 to HW filter on device team0 05:05:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:05:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 05:05:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={0x73, 0x79, 0x7a}) 05:05:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0x4) 05:05:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 05:05:20 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:05:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000280)) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/15, 0xf) 05:05:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 05:05:20 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) 05:05:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:05:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 05:05:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000280)) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/15, 0xf) 05:05:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={0x73, 0x79, 0x7a}) 05:05:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0x4) 05:05:21 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 956.125902] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 956.136711] udevd cpuset=/ mems_allowed=0 [ 956.141073] CPU: 1 PID: 7175 Comm: udevd Not tainted 4.17.0+ #9 [ 956.147153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.156543] Call Trace: [ 956.159185] dump_stack+0x185/0x1d0 [ 956.162868] warn_alloc+0x430/0x690 [ 956.166570] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 956.171496] ? __msan_poison_alloca+0x15c/0x1d0 [ 956.176262] copy_process+0x778/0x9be0 [ 956.180179] ? expand_files+0x5b/0xe00 [ 956.184119] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 956.189518] ? expand_files+0xa6/0xe00 [ 956.193475] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 956.198880] ? find_next_zero_bit+0x12b/0x2f0 [ 956.203445] ? __msan_poison_alloca+0x141/0x1d0 [ 956.208166] _do_fork+0x353/0xf60 [ 956.211679] __x64_sys_clone+0x15e/0x1b0 [ 956.215784] ? __ia32_sys_vfork+0x70/0x70 [ 956.219964] do_syscall_64+0x15b/0x230 [ 956.223896] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 956.229103] RIP: 0033:0x7f8a6dfa8f46 [ 956.232831] RSP: 002b:00007ffdef12c020 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 956.240576] RAX: ffffffffffffffda RBX: 00007ffdef12c020 RCX: 00007f8a6dfa8f46 [ 956.241041] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 956.247865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 956.247882] RBP: 00007ffdef12c080 R08: 0000000000001c07 R09: 0000000000001c07 [ 956.247900] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 956.247916] R13: 00007ffdef12c040 R14: 0000000000000005 R15: 0000000000000005 [ 956.248150] Mem-Info: [ 956.259790] syz-executor1 cpuset= [ 956.266751] active_anon:165996 inactive_anon:76 isolated_anon:0 [ 956.266751] active_file:1621 inactive_file:5360 isolated_file:74 [ 956.266751] unevictable:0 dirty:34 writeback:0 unstable:0 [ 956.266751] slab_reclaimable:3355 slab_unreclaimable:8816 [ 956.266751] mapped:62578 shmem:84 pagetables:1278 bounce:0 [ 956.266751] free:29866 free_pcp:178 free_cma:0 [ 956.274003] syz1 [ 956.281344] Node 0 active_anon:663984kB inactive_anon:304kB active_file:6484kB inactive_file:21440kB unevictable:0kB isolated(anon):0kB isolated(file):296kB mapped:250312kB dirty:136kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 956.288581] mems_allowed=0 [ 956.290988] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 956.294547] CPU: 0 PID: 24023 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 956.327711] lowmem_reserve[]: [ 956.329631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.329644] Call Trace: [ 956.329700] dump_stack+0x185/0x1d0 [ 956.357899] 0 [ 956.360807] warn_alloc+0x430/0x690 [ 956.360877] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 956.386975] 2817 [ 956.393817] ? __msan_poison_alloca+0x15c/0x1d0 [ 956.393897] copy_process+0x778/0x9be0 [ 956.396960] 7244 [ 956.406310] ? __msan_poison_alloca+0x15c/0x1d0 [ 956.406358] ? handle_mm_fault+0x74eb/0x7ed0 [ 956.408926] 7244 [ 956.412592] ? handle_mm_fault+0x74eb/0x7ed0 [ 956.412637] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 956.418056] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 956.418106] ? handle_mm_fault+0x1eb0/0x7ed0 [ 956.422938] Node 0 [ 956.424986] ? __msan_poison_alloca+0x140/0x1d0 [ 956.425040] _do_fork+0x353/0xf60 05:05:21 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 956.429745] DMA32 free:59568kB min:26224kB low:32780kB high:39336kB active_anon:191284kB inactive_anon:28kB active_file:5964kB inactive_file:21968kB unevictable:0kB writepending:108kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2368kB pagetables:2400kB bounce:0kB free_pcp:712kB local_pcp:8kB free_cma:0kB [ 956.433567] __x64_sys_clone+0x15e/0x1b0 [ 956.433603] ? __ia32_sys_vfork+0x70/0x70 [ 956.435656] lowmem_reserve[]: [ 956.440306] do_syscall_64+0x15b/0x230 [ 956.440354] entry_SYSCALL_64_after_hwframe+0x44/0xa9 05:05:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000280)) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/15, 0xf) [ 956.444747] 0 [ 956.446781] RIP: 0033:0x458429 [ 956.446796] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 956.451230] 0 [ 956.456563] RAX: ffffffffffffffda RBX: 00007f18069df700 RCX: 0000000000458429 [ 956.456580] RDX: 00007f18069df9d0 RSI: 00007f18069dedb0 RDI: 00000000003d0f00 [ 956.456594] RBP: 0000000000a3e8a0 R08: 00007f18069df700 R09: 00007f18069df700 [ 956.456619] R10: 00007f18069df9d0 R11: 0000000000000202 R12: 0000000000000000 [ 956.462590] 4426 05:05:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000002c0)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) [ 956.466963] R13: 0000000000a3e81f R14: 00007f18069df9c0 R15: 0000000000000000 [ 956.581295] 4426 [ 956.583471] Node 0 Normal free:43992kB min:41208kB low:51508kB high:61808kB active_anon:472536kB inactive_anon:276kB active_file:504kB inactive_file:80kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2712kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 956.612355] lowmem_reserve[]: 0 0 0 0 [ 956.616315] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 956.629772] Node 0 DMA32: 758*4kB (UME) 1476*8kB (UME) 675*16kB (UME) 133*32kB (UM) 3*64kB (UM) 0*128kB 0*256kB 1*512kB (U) 14*1024kB (U) 3*2048kB (UM) 0*4096kB = 51080kB [ 956.649177] Node 0 Normal: 7269*4kB (UMEH) 1363*8kB (UME) 25*16kB (UM) 15*32kB (UMH) 14*64kB (UH) 6*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 42524kB [ 956.664333] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 956.671780] syz-executor3: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 956.672996] 5878 total pagecache pages [ 956.684729] syz-executor3 cpuset= [ 956.688556] 0 pages in swap cache [ 956.688581] Swap cache stats: add 0, delete 0, find 0/0 [ 956.692093] syz3 [ 956.695546] Free swap = 0kB [ 956.700924] mems_allowed=0 [ 956.702910] Total swap = 0kB [ 956.705966] CPU: 0 PID: 23214 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 956.708892] 1965969 pages RAM [ 956.711869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.711882] Call Trace: [ 956.711942] dump_stack+0x185/0x1d0 [ 956.718759] 0 pages HighMem/MovableOnly [ 956.721842] warn_alloc+0x430/0x690 [ 956.721896] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 956.731240] 106316 pages reserved [ 956.733827] ? __msan_poison_alloca+0x15c/0x1d0 [ 956.733893] copy_process+0x778/0x9be0 [ 956.761998] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 956.767500] ? ptep_set_access_flags+0x10e/0x1d0 [ 956.772323] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 956.777852] ? handle_mm_fault+0x1eb0/0x7ed0 [ 956.782314] ? __msan_poison_alloca+0x141/0x1d0 [ 956.787047] _do_fork+0x353/0xf60 [ 956.790560] __x64_sys_clone+0x15e/0x1b0 [ 956.794667] ? __ia32_sys_vfork+0x70/0x70 [ 956.798849] do_syscall_64+0x15b/0x230 [ 956.802785] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 956.808083] RIP: 0033:0x45414a [ 956.811284] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 956.819027] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 956.826321] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 956.833616] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001a1e940 [ 956.840934] R10: 0000000001a1ec10 R11: 0000000000000246 R12: 0000000000000001 [ 956.848230] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 956.856719] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 956.863350] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 956.867429] udevd cpuset= [ 956.878702] syz-executor4 cpuset=syz4 mems_allowed=0 [ 956.878761] CPU: 0 PID: 22663 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 956.881529] / [ 956.886588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 956.886607] Call Trace: [ 956.893484] mems_allowed=0 [ 956.895182] dump_stack+0x185/0x1d0 [ 956.895214] warn_alloc+0x430/0x690 [ 956.895264] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 956.895319] ? __msan_poison_alloca+0x15c/0x1d0 [ 956.895393] copy_process+0x778/0x9be0 [ 956.895430] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 956.895475] ? ptep_set_access_flags+0x10e/0x1d0 [ 956.895513] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 956.895562] ? handle_mm_fault+0x1eb0/0x7ed0 [ 956.895598] ? __msan_poison_alloca+0x141/0x1d0 [ 956.955698] _do_fork+0x353/0xf60 [ 956.959184] __x64_sys_clone+0x15e/0x1b0 [ 956.963255] ? __ia32_sys_vfork+0x70/0x70 [ 956.967407] do_syscall_64+0x15b/0x230 [ 956.971308] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 956.976499] RIP: 0033:0x45414a [ 956.979868] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 956.987592] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 956.994864] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 957.002140] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 000000000194f940 [ 957.009413] R10: 000000000194fc10 R11: 0000000000000246 R12: 0000000000000001 [ 957.016691] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 957.024002] CPU: 1 PID: 24021 Comm: udevd Not tainted 4.17.0+ #9 [ 957.029462] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 957.030178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.030192] Call Trace: [ 957.030243] dump_stack+0x185/0x1d0 [ 957.040800] udevd cpuset= [ 957.050171] warn_alloc+0x430/0x690 [ 957.050226] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 957.052780] / [ 957.056431] ? __msan_poison_alloca+0x15c/0x1d0 [ 957.059150] mems_allowed=0 [ 957.062827] copy_process+0x778/0x9be0 [ 957.080756] ? expand_files+0x5b/0xe00 [ 957.084654] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 957.090034] ? expand_files+0xa6/0xe00 [ 957.093952] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 957.099326] ? find_next_zero_bit+0x12b/0x2f0 [ 957.103840] ? __msan_poison_alloca+0x141/0x1d0 [ 957.108522] _do_fork+0x353/0xf60 [ 957.111997] __x64_sys_clone+0x15e/0x1b0 [ 957.116079] ? __ia32_sys_vfork+0x70/0x70 [ 957.120231] do_syscall_64+0x15b/0x230 [ 957.124135] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 957.129336] RIP: 0033:0x7f8a6dfa8f46 [ 957.133048] RSP: 002b:00007ffdef12c020 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 957.140769] RAX: ffffffffffffffda RBX: 00007ffdef12c020 RCX: 00007f8a6dfa8f46 [ 957.148043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 957.155318] RBP: 00007ffdef12c080 R08: 0000000000005dd5 R09: 0000000000005dd5 [ 957.162594] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 957.169864] R13: 00007ffdef12c040 R14: 0000000000000005 R15: 0000000000000005 [ 957.177174] CPU: 0 PID: 23192 Comm: udevd Not tainted 4.17.0+ #9 [ 957.183341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.192811] Call Trace: [ 957.195452] dump_stack+0x185/0x1d0 [ 957.199122] warn_alloc+0x430/0x690 [ 957.202816] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 957.207734] ? __msan_poison_alloca+0x15c/0x1d0 [ 957.212497] copy_process+0x778/0x9be0 [ 957.216413] ? expand_files+0x5b/0xe00 [ 957.220353] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 957.225748] ? expand_files+0xa6/0xe00 [ 957.229696] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 957.235089] ? find_next_zero_bit+0x12b/0x2f0 [ 957.239634] ? __msan_poison_alloca+0x141/0x1d0 [ 957.244344] _do_fork+0x353/0xf60 [ 957.247850] __x64_sys_clone+0x15e/0x1b0 [ 957.251952] ? __ia32_sys_vfork+0x70/0x70 [ 957.256127] do_syscall_64+0x15b/0x230 [ 957.260054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 957.265268] RIP: 0033:0x7f8a6dfa8f46 [ 957.268996] RSP: 002b:00007ffdef12c020 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 957.276829] RAX: ffffffffffffffda RBX: 00007ffdef12c020 RCX: 00007f8a6dfa8f46 [ 957.284125] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 957.291423] RBP: 00007ffdef12c080 R08: 0000000000005a98 R09: 0000000000005a98 [ 957.298727] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 957.306029] R13: 00007ffdef12c040 R14: 0000000000000005 R15: 0000000000000005 [ 957.313716] warn_alloc_show_mem: 4 callbacks suppressed [ 957.313732] Mem-Info: [ 957.321689] active_anon:165955 inactive_anon:73 isolated_anon:0 [ 957.321689] active_file:1719 inactive_file:2350 isolated_file:13 [ 957.321689] unevictable:0 dirty:46 writeback:0 unstable:0 [ 957.321689] slab_reclaimable:3355 slab_unreclaimable:8792 [ 957.321689] mapped:62810 shmem:84 pagetables:1224 bounce:0 [ 957.321689] free:24093 free_pcp:339 free_cma:0 [ 957.355066] Node 0 active_anon:663820kB inactive_anon:292kB active_file:6876kB inactive_file:7932kB unevictable:0kB isolated(anon):0kB isolated(file):76kB mapped:251936kB dirty:184kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 957.383252] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 957.390758] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 957.409586] lowmem_reserve[]: 0 2817 7244 7244 [ 957.409629] Node 0 DMA32 free:49924kB min:26224kB low:32780kB high:39336kB active_anon:191400kB inactive_anon:16kB active_file:6232kB inactive_file:7072kB unevictable:0kB writepending:156kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2176kB pagetables:2180kB bounce:0kB free_pcp:1148kB local_pcp:440kB free_cma:0kB [ 957.409698] lowmem_reserve[]: 0 0 4426 4426 [ 957.409729] Node 0 Normal free:26724kB min:41208kB low:51508kB high:61808kB active_anon:472536kB inactive_anon:276kB active_file:528kB inactive_file:56kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2716kB bounce:0kB free_pcp:208kB local_pcp:88kB free_cma:0kB [ 957.409791] lowmem_reserve[]: 0 0 0 0 [ 957.409828] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB [ 957.420600] udevd cpuset=/ [ 957.425212] (M) [ 957.454557] mems_allowed=0 [ 957.454586] CPU: 1 PID: 2266 Comm: udevd Not tainted 4.17.0+ #9 [ 957.454598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.454617] Call Trace: [ 957.458954] 3*4096kB [ 957.489223] dump_stack+0x185/0x1d0 [ 957.489254] warn_alloc+0x430/0x690 [ 957.489302] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 957.493097] (M) [ 957.504035] ? __msan_poison_alloca+0x15c/0x1d0 [ 957.504115] copy_process+0x778/0x9be0 [ 957.506904] = 15904kB [ 957.508877] ? kmsan_set_origin_inline+0x6b/0x120 [ 957.508913] ? kmsan_set_origin_inline+0x6b/0x120 [ 957.511838] Node 0 [ 957.517891] ? __msan_poison_alloca+0x15c/0x1d0 [ 957.517930] ? _raw_spin_unlock_bh+0x57/0x70 [ 957.527276] DMA32: [ 957.529870] ? __msan_poison_alloca+0x141/0x1d0 [ 957.529909] _do_fork+0x353/0xf60 [ 957.532307] 863*4kB [ 957.535944] __x64_sys_clone+0x15e/0x1b0 [ 957.535980] ? __ia32_sys_vfork+0x70/0x70 [ 957.539595] (ME) [ 957.544425] do_syscall_64+0x15b/0x230 [ 957.544463] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 957.546425] 2682*8kB [ 957.551076] RIP: 0033:0x7f8a6dfa8f46 [ 957.551088] RSP: 002b:00007ffdef133790 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 957.554994] (UME) [ 957.557388] RAX: ffffffffffffffda RBX: 00007ffdef133790 RCX: 00007f8a6dfa8f46 [ 957.557402] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 957.557429] RBP: 00007ffdef1337f0 R08: 00000000000008da R09: 00000000000008da [ 957.562262] 674*16kB [ 957.567078] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 957.567095] R13: 00007ffdef1337b0 R14: 000000000178c250 R15: 0000000000000706 [ 957.663190] syz-executor2 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=1, oom_score_adj=0 [ 957.666362] (ME) 131*32kB (UM) 3*64kB [ 957.679078] syz-executor2 cpuset= [ 957.679084] (UM) 1*128kB [ 957.683010] syz2 [ 957.686467] (U) [ 957.689245] mems_allowed=0 [ 957.691207] 1*256kB (U) 0*512kB [ 957.693251] CPU: 1 PID: 23271 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 957.696157] 3*1024kB [ 957.699495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 957.699507] Call Trace: [ 957.699556] dump_stack+0x185/0x1d0 [ 957.706368] (U) [ 957.708775] dump_header+0x2cc/0x16f0 [ 957.708814] ? __msan_poison_alloca+0x15c/0x1d0 [ 957.718160] 3*2048kB [ 957.720746] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 957.720779] ? ___ratelimit+0x67f/0x760 [ 957.724394] (UM) [ 957.726376] oom_kill_process+0x341/0x2160 [ 957.726415] ? oom_evaluate_task+0x84a/0xb60 [ 957.730202] 0*4096kB [ 957.734868] out_of_memory+0x1700/0x1da0 [ 957.734926] ? __udp4_lib_lookup+0x1540/0x28e0 [ 957.737313] = 49676kB [ 957.742758] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 957.742852] alloc_pages_current+0x6b1/0x970 [ 957.746761] Node 0 [ 957.748834] __get_free_pages+0x2d/0xc0 [ 957.748874] pgd_alloc+0x5b/0x610 [ 957.753089] Normal: [ 957.757483] ? kmsan_set_origin+0x9e/0x160 [ 957.757537] mm_init+0x65c/0xaf0 [ 957.759925] 4569*4kB [ 957.763966] copy_process+0x3707/0x9be0 [ 957.764014] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 957.768575] (ME) [ 957.770974] ? ptep_set_access_flags+0x10e/0x1d0 [ 957.771023] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 957.775851] 734*8kB [ 957.780289] ? __msan_poison_alloca+0x141/0x1d0 [ 957.782509] (UM) [ 957.786492] _do_fork+0x353/0xf60 [ 957.786537] __x64_sys_clone+0x15e/0x1b0 [ 957.789968] 0*16kB [ 957.792282] ? __ia32_sys_vfork+0x70/0x70 [ 957.792316] do_syscall_64+0x15b/0x230 [ 957.796537] 1*32kB [ 957.799895] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 957.799922] RIP: 0033:0x45414a [ 957.802328] (H) [ 957.806273] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 957.806315] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 957.811759] 1*64kB [ 957.813796] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 957.813811] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001831940 [ 957.813836] R10: 0000000001831c10 R11: 0000000000000246 R12: 0000000000000001 [ 957.818584] (H) [ 957.824011] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 957.824247] Mem-Info: [ 957.826372] 0*128kB 0*256kB 0*512kB 0*1024kB [ 957.831162] active_anon:165955 inactive_anon:73 isolated_anon:0 [ 957.831162] active_file:1648 inactive_file:1393 isolated_file:19 [ 957.831162] unevictable:0 dirty:46 writeback:0 unstable:0 [ 957.831162] slab_reclaimable:3355 slab_unreclaimable:8792 [ 957.831162] mapped:62781 shmem:84 pagetables:1224 bounce:0 [ 957.831162] free:23051 free_pcp:366 free_cma:0 [ 957.833161] 0*2048kB 0*4096kB = 24244kB [ 957.836711] Node 0 active_anon:663820kB inactive_anon:292kB active_file:6592kB inactive_file:5572kB unevictable:0kB isolated(anon):0kB isolated(file):76kB mapped:251124kB dirty:184kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 957.840733] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 957.840751] 3166 total pagecache pages [ 957.843025] Node 0 [ 957.847179] 0 pages in swap cache [ 957.847194] Swap cache stats: add 0, delete 0, find 0/0 [ 957.847211] Free swap = 0kB [ 957.851175] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 957.853353] Total swap = 0kB [ 957.853363] 1965969 pages RAM [ 957.853382] 0 pages HighMem/MovableOnly [ 957.858588] lowmem_reserve[]: [ 957.861783] 106316 pages reserved [ 958.045743] syz-executor5: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 958.048357] 0 2817 7244 [ 958.051515] syz-executor5 cpuset=syz5 [ 958.055001] 7244 [ 958.066274] mems_allowed=0 [ 958.068973] Node 0 [ 958.072815] CPU: 0 PID: 24025 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 958.074942] DMA32 free:43320kB min:26224kB low:32780kB high:39336kB active_anon:191400kB inactive_anon:16kB active_file:4584kB inactive_file:4688kB unevictable:0kB writepending:156kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2176kB pagetables:2180kB bounce:0kB free_pcp:1308kB local_pcp:644kB free_cma:0kB [ 958.077787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.077798] Call Trace: [ 958.077843] dump_stack+0x185/0x1d0 [ 958.077880] warn_alloc+0x430/0x690 [ 958.080115] lowmem_reserve[]: [ 958.086970] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 958.087028] ? __msan_poison_alloca+0x15c/0x1d0 [ 958.115755] 0 [ 958.125128] copy_process+0x778/0x9be0 [ 958.125177] ? __msan_poison_alloca+0x15c/0x1d0 [ 958.127752] 0 [ 958.131370] ? handle_mm_fault+0x74eb/0x7ed0 [ 958.131415] ? handle_mm_fault+0x74eb/0x7ed0 [ 958.135038] 4426 [ 958.138129] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 958.138188] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 958.143009] 4426 [ 958.147664] ? handle_mm_fault+0x1eb0/0x7ed0 [ 958.147699] ? __msan_poison_alloca+0x140/0x1d0 [ 958.153402] _do_fork+0x353/0xf60 [ 958.153448] __x64_sys_clone+0x15e/0x1b0 [ 958.158140] Node 0 [ 958.159924] ? __ia32_sys_vfork+0x70/0x70 [ 958.159959] do_syscall_64+0x15b/0x230 [ 958.164436] Normal free:14908kB min:41208kB low:51508kB high:61808kB active_anon:472536kB inactive_anon:276kB active_file:528kB inactive_file:56kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2716kB bounce:0kB free_pcp:412kB local_pcp:292kB free_cma:0kB [ 958.168759] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 958.168786] RIP: 0033:0x458429 [ 958.170855] lowmem_reserve[]: [ 958.176178] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 958.176209] RAX: ffffffffffffffda RBX: 00007f28755bf700 RCX: 0000000000458429 [ 958.176236] RDX: 00007f28755bf9d0 RSI: 00007f28755bedb0 RDI: 00000000003d0f00 [ 958.182213] 0 [ 958.184252] RBP: 0000000000a3e8a0 R08: 00007f28755bf700 R09: 00007f28755bf700 [ 958.184270] R10: 00007f28755bf9d0 R11: 0000000000000202 R12: 0000000000000000 [ 958.184284] R13: 0000000000a3e81f R14: 00007f28755bf9c0 R15: 0000000000000000 [ 958.186351] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 958.188752] 0 [ 958.193445] syz-executor6 cpuset=syz6 [ 958.196936] 0 [ 958.201016] mems_allowed=0 [ 958.203272] 0 [ 958.207455] CPU: 0 PID: 23350 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 958.207479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 958.239968] Call Trace: [ 958.240017] dump_stack+0x185/0x1d0 [ 958.240060] warn_alloc+0x430/0x690 [ 958.245258] Node 0 [ 958.248463] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 958.248525] ? __msan_poison_alloca+0x15c/0x1d0 [ 958.251610] DMA: [ 958.259337] copy_process+0x778/0x9be0 [ 958.259385] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 958.266661] 0*4kB [ 958.273907] ? ptep_set_access_flags+0x10e/0x1d0 [ 958.273963] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 958.275762] 0*8kB [ 958.283033] ? handle_mm_fault+0x1eb0/0x7ed0 [ 958.283071] ? __msan_poison_alloca+0x141/0x1d0 [ 958.290354] 0*16kB [ 958.297623] _do_fork+0x353/0xf60 [ 958.297669] __x64_sys_clone+0x15e/0x1b0 [ 958.308948] 1*32kB [ 958.310732] ? __ia32_sys_vfork+0x70/0x70 [ 958.310768] do_syscall_64+0x15b/0x230 [ 958.314572] (U) [ 958.316373] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 958.316400] RIP: 0033:0x45414a [ 958.319343] 2*64kB [ 958.321103] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 958.321134] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 958.321159] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 958.328007] (U) [ 958.337331] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 000000000140c940 [ 958.337346] R10: 000000000140cc10 R11: 0000000000000246 R12: 0000000000000001 [ 958.337362] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 958.337747] warn_alloc_show_mem: 2 callbacks suppressed [ 958.337755] Mem-Info: [ 958.340002] 1*128kB [ 958.343709] active_anon:165955 inactive_anon:73 isolated_anon:0 [ 958.343709] active_file:1193 inactive_file:1090 isolated_file:35 [ 958.343709] unevictable:0 dirty:46 writeback:0 unstable:0 [ 958.343709] slab_reclaimable:3355 slab_unreclaimable:8792 [ 958.343709] mapped:63778 shmem:84 pagetables:1224 bounce:0 [ 958.343709] free:18533 free_pcp:430 free_cma:0 [ 958.347301] (U) [ 958.349591] Node 0 active_anon:663820kB inactive_anon:292kB active_file:4772kB inactive_file:4360kB unevictable:0kB isolated(anon):0kB isolated(file):140kB mapped:255112kB dirty:184kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 958.349607] Node 0 [ 958.354559] 1*256kB [ 958.359276] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 958.359290] lowmem_reserve[]: [ 958.361377] (U) [ 958.365272] 0 2817 [ 958.370765] 0*512kB [ 958.372923] 7244 7244 [ 958.377717] 1*1024kB [ 958.383187] Node 0 [ 958.385360] (U) [ 958.389824] DMA32 free:43320kB min:26224kB low:32780kB high:39336kB active_anon:191400kB inactive_anon:16kB active_file:4584kB inactive_file:4688kB unevictable:0kB writepending:156kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2176kB pagetables:2180kB bounce:0kB free_pcp:1308kB local_pcp:664kB free_cma:0kB [ 958.389839] lowmem_reserve[]: [ 958.394537] 1*2048kB [ 958.396781] 0 0 [ 958.400272] (M) [ 958.404344] 4426 4426 [ 958.406622] 3*4096kB [ 958.410793] Node 0 [ 958.414707] (M) [ 958.416740] Normal free:14908kB min:41208kB low:51508kB high:61808kB active_anon:472536kB inactive_anon:276kB active_file:528kB inactive_file:56kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2716kB bounce:0kB free_pcp:412kB local_pcp:120kB free_cma:0kB [ 958.416754] lowmem_reserve[]: [ 958.421970] = 15904kB [ 958.425165] 0 0 0 [ 958.427445] Node 0 [ 958.435162] 0 [ 958.442490] DMA32: [ 958.449782] Node 0 DMA: [ 958.451806] 1114*4kB [ 958.459106] 0*4kB [ 958.466394] (UME) [ 958.473680] 0*8kB 0*16kB [ 958.479093] 3047*8kB [ 958.481523] 1*32kB (U) [ 958.486920] (ME) 653*16kB [ 958.520265] 2*64kB [ 958.522264] (UME) [ 958.550405] (U) [ 958.552669] 130*32kB [ 958.555002] 1*128kB (U) [ 958.580568] (UM) [ 958.583701] 1*256kB (U) [ 958.585730] 2*64kB [ 958.587981] 0*512kB 1*1024kB [ 958.590352] (UM) [ 958.592859] (U) 1*2048kB [ 958.595323] 0*128kB [ 958.597569] (M) 3*4096kB [ 958.599594] 0*256kB [ 958.628344] (M) = 15904kB [ 958.631507] 0*512kB [ 958.633955] Node 0 [ 958.635956] 0*1024kB [ 958.637945] DMA32: 1114*4kB [ 958.640486] 0*2048kB [ 958.642904] (UME) 3047*8kB [ 958.645185] 0*4096kB [ 958.648284] (ME) [ 958.676784] = 43568kB [ 958.679906] 653*16kB (UME) [ 958.682357] Node 0 [ 958.684522] 130*32kB (UM) [ 958.686798] Normal: [ 958.688611] 2*64kB (UM) [ 958.690903] 2793*4kB [ 958.693589] 0*128kB 0*256kB [ 958.696070] (UME) [ 958.698207] 0*512kB 0*1024kB [ 958.700394] 393*8kB [ 958.703165] 0*2048kB 0*4096kB [ 958.705626] (UM) [ 958.708218] = 43568kB [ 958.708236] Node 0 [ 958.711103] 0*16kB [ 958.713348] Normal: 2793*4kB [ 958.715547] 1*32kB [ 958.717530] (UME) 393*8kB [ 958.719979] (H) [ 958.722657] (UM) 0*16kB [ 958.724761] 1*64kB [ 958.727438] 1*32kB (H) 1*64kB [ 958.729727] (H) [ 958.732842] (H) 0*128kB [ 958.734951] 0*128kB [ 958.737721] 0*256kB 0*512kB [ 958.740099] 0*256kB [ 958.742870] 0*1024kB 0*2048kB [ 958.745236] 0*512kB [ 958.748010] 0*4096kB = 14412kB [ 958.750386] 0*1024kB [ 958.752656] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 958.752673] 2394 total pagecache pages [ 958.755103] 0*2048kB [ 958.758132] 0 pages in swap cache [ 958.758156] Swap cache stats: add 0, delete 0, find 0/0 [ 958.760592] 0*4096kB [ 958.763537] Free swap = 0kB [ 958.763555] Total swap = 0kB [ 958.765990] = 14412kB [ 958.768071] 1965969 pages RAM [ 958.768087] 0 pages HighMem/MovableOnly [ 958.770536] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 958.773471] 106316 pages reserved [ 958.906236] 1495 total pagecache pages [ 958.910238] 0 pages in swap cache [ 958.913789] Swap cache stats: add 0, delete 0, find 0/0 [ 958.919289] Free swap = 0kB [ 958.922381] Total swap = 0kB [ 958.925512] 1965969 pages RAM [ 958.928686] 0 pages HighMem/MovableOnly [ 958.932771] 106316 pages reserved [ 958.936335] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 958.945151] [ 2266] 0 2266 5476 573 90112 0 -1000 udevd [ 958.953426] [ 4230] 0 4230 2493 573 57344 0 0 dhclient [ 958.961973] [ 4383] 0 4383 14251 175 122880 0 0 rsyslogd [ 958.970516] [ 4426] 0 4426 4725 48 81920 0 0 cron [ 958.978701] [ 4452] 0 4452 12490 161 139264 0 -1000 sshd [ 958.986876] [ 4476] 0 4476 3694 49 73728 0 0 getty [ 958.995177] [ 4477] 0 4477 3694 48 77824 0 0 getty [ 959.003460] [ 4478] 0 4478 3694 48 77824 0 0 getty [ 959.011753] [ 4479] 0 4479 3694 48 77824 0 0 getty [ 959.020002] [ 4480] 0 4480 3694 50 77824 0 0 getty [ 959.028298] [ 4481] 0 4481 3694 50 73728 0 0 getty [ 959.036589] [ 4482] 0 4482 3649 49 73728 0 0 getty [ 959.044886] [ 4497] 0 4497 17821 197 188416 0 0 sshd [ 959.053139] [ 4499] 0 4499 308922 163611 2158592 0 0 syz-fuzzer [ 959.061815] [ 4516] 0 4516 17553 14 118784 0 0 syz-executor1 [ 959.070810] [ 4522] 0 4522 17553 16 118784 0 0 syz-executor5 [ 959.079789] [ 4524] 0 4524 17552 8373 126976 0 0 syz-executor1 [ 959.088776] [ 4528] 0 4528 17552 8287 126976 0 0 syz-executor5 [ 959.097760] [ 7175] 0 7175 5475 624 86016 0 -1000 udevd [ 959.106109] [22652] 0 22652 17553 55 114688 0 0 syz-executor4 [ 959.115130] [23192] 0 23192 5475 565 86016 0 -1000 udevd [ 959.123402] [23207] 0 23207 17553 47 114688 0 0 syz-executor3 [ 959.132434] [23264] 0 23264 17553 132 114688 0 0 syz-executor2 [ 959.141453] [23271] 0 23271 17552 8348 122880 0 0 syz-executor2 [ 959.150474] [23339] 0 23339 17553 132 114688 0 0 syz-executor6 [ 959.159493] [23350] 0 23350 17552 8348 122880 0 0 syz-executor6 [ 959.168471] [23991] 0 23991 17553 132 114688 0 0 syz-executor7 [ 959.177471] [24001] 0 24001 14481 133 94208 0 0 syz-executor0 [ 959.186449] [24014] 0 24014 5475 478 86016 0 -1000 udevd [ 959.194746] [24018] 0 24018 5475 441 86016 0 -1000 udevd [ 959.203027] [24020] 0 24020 5475 260 81920 0 -1000 udevd [ 959.211350] [24021] 0 24021 5475 395 86016 0 -1000 udevd [ 959.219653] [24024] 0 24024 5475 260 81920 0 -1000 udevd [ 959.227937] [24025] 0 24025 17585 8163 131072 0 0 syz-executor5 [ 959.236945] Out of memory: Kill process 4499 (syz-fuzzer) score 88 or sacrifice child [ 959.245203] Killed process 23339 (syz-executor6) total-vm:70212kB, anon-rss:56kB, file-rss:472kB, shmem-rss:0kB [ 959.468322] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 959.480253] syz-executor7 cpuset=/ mems_allowed=0 [ 959.485429] CPU: 0 PID: 23991 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 959.486826] device bridge_slave_1 left promiscuous mode [ 959.492282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.492293] Call Trace: [ 959.492341] dump_stack+0x185/0x1d0 [ 959.492371] warn_alloc+0x430/0x690 [ 959.492419] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 959.498094] bridge0: port 2(bridge_slave_1) entered disabled state [ 959.507164] ? __msan_poison_alloca+0x15c/0x1d0 [ 959.507230] copy_process+0x778/0x9be0 [ 959.536722] ? __msan_poison_alloca+0x15c/0x1d0 [ 959.541416] ? handle_mm_fault+0x74eb/0x7ed0 [ 959.545847] ? handle_mm_fault+0x74eb/0x7ed0 [ 959.550280] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 959.555667] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 959.561658] ? handle_mm_fault+0x1eb0/0x7ed0 [ 959.566092] ? __msan_poison_alloca+0x141/0x1d0 [ 959.570789] _do_fork+0x353/0xf60 [ 959.574265] __x64_sys_clone+0x15e/0x1b0 [ 959.578336] ? __ia32_sys_vfork+0x70/0x70 [ 959.582491] do_syscall_64+0x15b/0x230 [ 959.586390] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 959.591578] RIP: 0033:0x458429 [ 959.594764] RSP: 002b:00007fffd59461f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 959.602494] RAX: ffffffffffffffda RBX: 00007fffd59462b0 RCX: 0000000000458429 [ 959.609767] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 959.617042] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 959.624330] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 959.631597] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 959.639394] Mem-Info: [ 959.641929] active_anon:165934 inactive_anon:72 isolated_anon:0 [ 959.641929] active_file:109 inactive_file:205 isolated_file:7 [ 959.641929] unevictable:0 dirty:0 writeback:0 unstable:0 [ 959.641929] slab_reclaimable:3355 slab_unreclaimable:8764 [ 959.641929] mapped:60551 shmem:84 pagetables:1159 bounce:0 [ 959.641929] free:18867 free_pcp:81 free_cma:0 [ 959.675083] Node 0 active_anon:663736kB inactive_anon:288kB active_file:436kB inactive_file:820kB unevictable:0kB isolated(anon):0kB isolated(file):28kB mapped:242204kB dirty:0kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 959.702856] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 959.729338] lowmem_reserve[]: 0 2817 7244 7244 [ 959.734252] Node 0 DMA32 free:44648kB min:26224kB low:32780kB high:39336kB active_anon:191200kB inactive_anon:12kB active_file:588kB inactive_file:596kB unevictable:0kB writepending:200kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1920kB bounce:0kB free_pcp:220kB local_pcp:120kB free_cma:0kB [ 959.763860] lowmem_reserve[]: 0 0 4426 4426 [ 959.768328] Node 0 Normal free:15420kB min:41208kB low:51508kB high:61808kB active_anon:472536kB inactive_anon:276kB active_file:548kB inactive_file:36kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2716kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 959.797478] lowmem_reserve[]: 0 0 0 0 [ 959.801613] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 959.815783] Node 0 DMA32: 1687*4kB (UME) 3167*8kB (UME) 530*16kB (UME) 105*32kB (UM) 3*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 44116kB [ 959.830684] Node 0 Normal: 3033*4kB (UME) 435*8kB (UME) 2*16kB (U) 1*32kB (H) 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15740kB [ 959.845041] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 959.854186] 755 total pagecache pages [ 959.858080] 0 pages in swap cache [ 959.861618] Swap cache stats: add 0, delete 0, find 0/0 [ 959.867192] Free swap = 0kB [ 959.870305] Total swap = 0kB [ 959.873544] 1965969 pages RAM [ 959.876804] 0 pages HighMem/MovableOnly [ 959.880849] 106316 pages reserved [ 959.891327] syz-executor2 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=1, oom_score_adj=0 [ 959.904155] syz-executor2 cpuset=syz2 mems_allowed=0 [ 959.909398] CPU: 1 PID: 23271 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 959.916272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 959.925622] Call Trace: [ 959.928231] dump_stack+0x185/0x1d0 [ 959.931867] dump_header+0x2cc/0x16f0 [ 959.935675] ? __msan_poison_alloca+0x15c/0x1d0 [ 959.940361] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 959.945813] ? ___ratelimit+0x67f/0x760 [ 959.949795] oom_kill_process+0x341/0x2160 [ 959.954055] ? oom_evaluate_task+0x856/0xb60 [ 959.958487] out_of_memory+0x1700/0x1da0 [ 959.962572] ? __udp4_lib_lookup+0x1540/0x28e0 [ 959.967160] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 959.972063] alloc_pages_current+0x6b1/0x970 [ 959.976494] __get_free_pages+0x2d/0xc0 [ 959.980472] pgd_alloc+0x5b/0x610 [ 959.983928] ? kmsan_set_origin+0x9e/0x160 [ 959.988186] mm_init+0x65c/0xaf0 [ 959.991559] copy_process+0x3707/0x9be0 [ 959.995544] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 960.000996] ? ptep_set_access_flags+0x10e/0x1d0 [ 960.005768] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 960.011239] ? __msan_poison_alloca+0x141/0x1d0 [ 960.015928] _do_fork+0x353/0xf60 [ 960.019398] __x64_sys_clone+0x15e/0x1b0 [ 960.023472] ? __ia32_sys_vfork+0x70/0x70 [ 960.027623] do_syscall_64+0x15b/0x230 [ 960.031521] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 960.036708] RIP: 0033:0x45414a [ 960.039895] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 960.047622] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 960.054892] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 960.062160] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001831940 [ 960.069437] R10: 0000000001831c10 R11: 0000000000000246 R12: 0000000000000001 [ 960.076705] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 960.084946] Mem-Info: [ 960.087507] active_anon:165891 inactive_anon:72 isolated_anon:0 [ 960.087507] active_file:350 inactive_file:244 isolated_file:34 [ 960.087507] unevictable:0 dirty:5 writeback:0 unstable:0 [ 960.087507] slab_reclaimable:3340 slab_unreclaimable:8764 [ 960.087507] mapped:55331 shmem:84 pagetables:1113 bounce:0 [ 960.087507] free:18782 free_pcp:207 free_cma:0 [ 960.120619] Node 0 active_anon:663564kB inactive_anon:288kB active_file:1040kB inactive_file:876kB unevictable:0kB isolated(anon):0kB isolated(file):28kB mapped:221092kB dirty:20kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 960.148607] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 960.174894] lowmem_reserve[]: 0 2817 7244 7244 [ 960.179643] Node 0 DMA32 free:43492kB min:26224kB low:32780kB high:39336kB active_anon:191144kB inactive_anon:12kB active_file:588kB inactive_file:1192kB unevictable:0kB writepending:12kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1736kB bounce:0kB free_pcp:1372kB local_pcp:728kB free_cma:0kB [ 960.208956] lowmem_reserve[]: 0 0 4426 4426 [ 960.213443] Node 0 Normal free:15732kB min:41208kB low:51508kB high:61808kB active_anon:472536kB inactive_anon:276kB active_file:208kB inactive_file:92kB unevictable:0kB writepending:12kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2716kB bounce:0kB free_pcp:160kB local_pcp:36kB free_cma:0kB [ 960.242607] lowmem_reserve[]: 0 0 0 0 [ 960.246577] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 960.260041] Node 0 DMA32: 1647*4kB (UME) 3174*8kB (UME) 531*16kB (UME) 106*32kB (UM) 5*64kB (U) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 44188kB [ 960.274525] Node 0 Normal: 3004*4kB (UME) 435*8kB (UME) 2*16kB (U) 1*32kB (H) 1*64kB (H) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15624kB [ 960.288417] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 960.297118] 381 total pagecache pages [ 960.301021] 0 pages in swap cache [ 960.304575] Swap cache stats: add 0, delete 0, find 0/0 [ 960.310039] Free swap = 0kB [ 960.313159] Total swap = 0kB [ 960.316268] 1965969 pages RAM [ 960.319442] 0 pages HighMem/MovableOnly [ 960.323502] 106316 pages reserved [ 960.327079] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 960.335794] [ 2266] 0 2266 5476 261 90112 0 -1000 udevd [ 960.344099] [ 4230] 0 4230 2493 573 57344 0 0 dhclient [ 960.352629] [ 4383] 0 4383 14251 175 122880 0 0 rsyslogd [ 960.361175] [ 4426] 0 4426 4725 48 81920 0 0 cron [ 960.369344] [ 4452] 0 4452 12490 153 139264 0 -1000 sshd [ 960.377534] [ 4476] 0 4476 3694 41 73728 0 0 getty [ 960.385791] [ 4477] 0 4477 3694 39 77824 0 0 getty [ 960.394103] [ 4478] 0 4478 3694 40 77824 0 0 getty [ 960.402368] [ 4479] 0 4479 3694 40 77824 0 0 getty [ 960.410659] [ 4480] 0 4480 3694 41 77824 0 0 getty [ 960.418929] [ 4481] 0 4481 3694 42 73728 0 0 getty [ 960.427207] [ 4482] 0 4482 3649 40 73728 0 0 getty [ 960.435482] [ 4497] 0 4497 17821 197 188416 0 0 sshd [ 960.443687] [ 4499] 0 4499 308922 163636 2158592 0 0 syz-fuzzer [ 960.452382] [ 4516] 0 4516 17553 14 118784 0 0 syz-executor1 [ 960.461358] [ 4522] 0 4522 17553 16 118784 0 0 syz-executor5 [ 960.470314] [ 4524] 0 4524 17552 8225 126976 0 0 syz-executor1 [ 960.479311] [ 4528] 0 4528 17552 8157 126976 0 0 syz-executor5 [ 960.488275] [ 7175] 0 7175 5475 260 86016 0 -1000 udevd [ 960.496581] [23192] 0 23192 5475 260 86016 0 -1000 udevd [ 960.504837] [23207] 0 23207 17553 15 114688 0 0 syz-executor3 [ 960.513820] [23264] 0 23264 17553 14 114688 0 0 syz-executor2 [ 960.522772] [23271] 0 23271 17552 8225 122880 0 0 syz-executor2 [ 960.531769] [24001] 0 24001 14993 20 98304 0 0 syz-executor0 [ 960.540732] [24014] 0 24014 5475 260 86016 0 -1000 udevd [ 960.549024] [24018] 0 24018 5475 260 86016 0 -1000 udevd [ 960.557286] [24020] 0 24020 82 1 40960 0 -1000 blkid [ 960.565586] [24021] 0 24021 5475 260 86016 0 -1000 udevd [ 960.573846] [24024] 0 24024 42 1 20480 0 -1000 blkid [ 960.582126] Out of memory: Kill process 4499 (syz-fuzzer) score 88 or sacrifice child [ 960.590273] Killed process 4522 (syz-executor5) total-vm:70212kB, anon-rss:64kB, file-rss:0kB, shmem-rss:0kB [ 960.602124] device bridge_slave_0 left promiscuous mode [ 960.607864] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.745833] team0 (unregistering): Port device team_slave_1 removed [ 960.787948] team0 (unregistering): Port device team_slave_0 removed [ 960.802945] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 960.832384] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 960.856940] IPVS: ftp: loaded support on port[0] = 21 [ 960.885802] bond0 (unregistering): Released all slaves [ 962.461460] device bridge_slave_1 left promiscuous mode [ 962.467371] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.479963] device bridge_slave_0 left promiscuous mode [ 962.485670] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.500734] device bridge_slave_1 left promiscuous mode [ 962.506427] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.527439] device bridge_slave_0 left promiscuous mode [ 962.533161] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.545757] device bridge_slave_1 left promiscuous mode [ 962.551443] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.564020] device bridge_slave_0 left promiscuous mode [ 962.569672] bridge0: port 1(bridge_slave_0) entered disabled state [ 962.654831] team0 (unregistering): Port device team_slave_1 removed [ 962.667340] team0 (unregistering): Port device team_slave_0 removed [ 962.678992] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 962.695624] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 962.726426] bond0 (unregistering): Released all slaves [ 962.745890] team0 (unregistering): Port device team_slave_1 removed [ 962.757371] team0 (unregistering): Port device team_slave_0 removed [ 962.768695] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 962.783921] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 962.815406] bond0 (unregistering): Released all slaves [ 962.835042] team0 (unregistering): Port device team_slave_1 removed [ 962.846779] team0 (unregistering): Port device team_slave_0 removed [ 962.858021] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 962.874356] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 962.904293] bond0 (unregistering): Released all slaves [ 963.023768] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.030219] bridge0: port 1(bridge_slave_0) entered disabled state [ 963.047814] device bridge_slave_0 entered promiscuous mode [ 963.112670] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.119177] bridge0: port 2(bridge_slave_1) entered disabled state [ 963.126654] device bridge_slave_1 entered promiscuous mode [ 963.187581] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 963.243392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 963.408268] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 963.515466] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 963.528964] IPVS: ftp: loaded support on port[0] = 21 [ 963.551669] khugepaged: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 963.561936] khugepaged cpuset=/ mems_allowed=0 [ 963.566530] CPU: 0 PID: 802 Comm: khugepaged Not tainted 4.17.0+ #9 [ 963.572933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.582281] Call Trace: [ 963.584866] dump_stack+0x185/0x1d0 [ 963.588487] warn_alloc+0x430/0x690 [ 963.592123] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 963.596958] ? kernel_poison_pages+0x1a0/0x360 [ 963.601560] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 963.606507] ? __alloc_pages_nodemask+0xaa2/0x5cc0 [ 963.611443] kmsan_alloc_page+0x82/0xe0 [ 963.615426] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 963.620188] ? kmsan_set_origin_inline+0x6b/0x120 [ 963.625028] ? __msan_poison_alloca+0x15c/0x1d0 [ 963.629694] ? try_to_del_timer_sync+0x19a/0x8d0 [ 963.634446] ? _raw_spin_lock_irqsave+0x45/0xf0 [ 963.639118] ? kmsan_set_origin_inline+0x6b/0x120 [ 963.643960] ? __msan_poison_alloca+0x15c/0x1d0 [ 963.648627] ? kmsan_set_origin_inline+0x6b/0x120 [ 963.653462] ? __msan_poison_alloca+0x15c/0x1d0 [ 963.658136] ? _cond_resched+0x3c/0xd0 [ 963.662022] ? _vm_normal_page+0xd8/0x420 [ 963.666172] khugepaged_do_scan+0x8c16/0xf190 [ 963.670667] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 963.676134] ? kmsan_set_origin_inline+0x6b/0x120 [ 963.680974] ? init_wait_entry+0x1a0/0x1a0 [ 963.685205] ? __msan_poison_alloca+0x15c/0x1d0 [ 963.689886] khugepaged+0xca/0xbc0 [ 963.693429] ? init_wait_entry+0x1a0/0x1a0 [ 963.697660] kthread+0x4db/0x6c0 [ 963.701019] ? start_stop_khugepaged+0x790/0x790 [ 963.705771] ? kthread_blkcg+0xf0/0xf0 [ 963.709658] ret_from_fork+0x35/0x40 [ 963.713368] Mem-Info: [ 963.715789] active_anon:165663 inactive_anon:78 isolated_anon:0 [ 963.715789] active_file:1395 inactive_file:6301 isolated_file:32 [ 963.715789] unevictable:0 dirty:30 writeback:0 unstable:0 [ 963.715789] slab_reclaimable:3336 slab_unreclaimable:8158 [ 963.715789] mapped:39948 shmem:84 pagetables:988 bounce:0 [ 963.715789] free:103172 free_pcp:584 free_cma:0 [ 963.748975] Node 0 active_anon:662652kB inactive_anon:312kB active_file:4212kB inactive_file:26588kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:159792kB dirty:120kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 963.777171] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 963.803401] lowmem_reserve[]: 0 2817 7244 7244 [ 963.807971] Node 0 DMA32 free:352084kB min:26224kB low:32780kB high:39336kB active_anon:190232kB inactive_anon:36kB active_file:3944kB inactive_file:24472kB unevictable:0kB writepending:120kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1536kB pagetables:1252kB bounce:0kB free_pcp:168kB local_pcp:168kB free_cma:0kB [ 963.837377] lowmem_reserve[]: 0 0 4426 4426 [ 963.841693] Node 0 Normal free:49236kB min:41208kB low:51508kB high:61808kB active_anon:472416kB inactive_anon:276kB active_file:28kB inactive_file:24kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7104kB pagetables:2700kB bounce:0kB free_pcp:1444kB local_pcp:740kB free_cma:0kB [ 963.870660] lowmem_reserve[]: 0 0 0 0 [ 963.874449] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 963.887630] Node 0 DMA32: 603*4kB (UME) 422*8kB (UM) 533*16kB (UME) 1826*32kB (UM) 2371*64kB (UM) 415*128kB (U) 97*256kB (U) 72*512kB (U) 10*1024kB (U) 1*2048kB (M) 0*4096kB = 351596kB [ 963.904204] Node 0 Normal: 8235*4kB (UME) 1623*8kB (UME) 31*16kB (UM) 14*32kB (UH) 19*64kB (UH) 5*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 49236kB [ 963.919045] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 963.927601] 7053 total pagecache pages [ 963.931468] 0 pages in swap cache [ 963.934895] Swap cache stats: add 0, delete 0, find 0/0 [ 963.940232] Free swap = 0kB [ 963.943224] Total swap = 0kB [ 963.946216] 1965969 pages RAM [ 963.949291] 0 pages HighMem/MovableOnly [ 963.953235] 106316 pages reserved [ 963.978966] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 963.986012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 964.339245] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 964.348036] team0: Port device team_slave_0 added [ 964.451215] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 964.470900] team0: Port device team_slave_1 added [ 964.540803] IPVS: ftp: loaded support on port[0] = 21 [ 964.575425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 964.680039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 964.752225] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 964.759723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 964.772410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 964.834393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 964.841837] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 964.855324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 965.482186] bridge0: port 1(bridge_slave_0) entered blocking state [ 965.488667] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.496250] device bridge_slave_0 entered promiscuous mode [ 965.563692] bridge0: port 2(bridge_slave_1) entered blocking state [ 965.570171] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.578315] device bridge_slave_1 entered promiscuous mode [ 965.660274] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 965.737438] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 965.749335] bridge0: port 2(bridge_slave_1) entered blocking state [ 965.755805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 965.762631] bridge0: port 1(bridge_slave_0) entered blocking state [ 965.769148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 965.790098] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 965.896169] bridge0: port 1(bridge_slave_0) entered blocking state [ 965.902632] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.916604] device bridge_slave_0 entered promiscuous mode [ 965.988695] bridge0: port 2(bridge_slave_1) entered blocking state [ 965.995219] bridge0: port 2(bridge_slave_1) entered disabled state [ 966.003405] device bridge_slave_1 entered promiscuous mode [ 966.012595] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 966.048367] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 966.070356] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 966.126879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 966.136881] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 966.254106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 966.261228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 966.324189] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 966.337420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 966.350131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 966.426269] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 966.606679] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 966.614957] team0: Port device team_slave_0 added [ 966.690781] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 966.699237] team0: Port device team_slave_1 added [ 966.774537] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 966.805652] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 966.820895] team0: Port device team_slave_0 added [ 966.845097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 966.898914] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 966.906405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 966.915878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 966.938613] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 966.946354] team0: Port device team_slave_1 added [ 967.000020] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 967.008604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 967.017696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 967.033641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 967.148196] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 967.155223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 967.172938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 967.227439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 967.234864] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 967.244664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 967.337885] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 967.345476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 967.358405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 967.865991] bridge0: port 2(bridge_slave_1) entered blocking state [ 967.872451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 967.879240] bridge0: port 1(bridge_slave_0) entered blocking state [ 967.885664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 967.893345] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 968.056894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 968.212638] bridge0: port 2(bridge_slave_1) entered blocking state [ 968.219130] bridge0: port 2(bridge_slave_1) entered forwarding state [ 968.225930] bridge0: port 1(bridge_slave_0) entered blocking state [ 968.232354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 968.241509] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 969.119640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 969.334172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 969.618732] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 969.962503] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 969.969262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 969.979241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 970.253384] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.248264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 971.259103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 971.496142] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 971.603036] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 971.830401] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 971.836807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 971.847569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 971.908800] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 971.915197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 971.922789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 972.069783] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 972.080312] syz-executor0 cpuset=syz0 mems_allowed=0 [ 972.085448] CPU: 1 PID: 24696 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 972.092283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 972.101637] Call Trace: [ 972.104227] dump_stack+0x185/0x1d0 [ 972.107852] warn_alloc+0x430/0x690 [ 972.111512] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 972.116353] ? kernel_poison_pages+0x40/0x360 [ 972.120855] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 972.126320] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 972.131346] ? kmsan_set_origin_inline+0x6b/0x120 [ 972.136188] ? __msan_poison_alloca+0x15c/0x1d0 [ 972.140871] kmsan_alloc_page+0x82/0xe0 [ 972.144845] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 972.149598] ? kmsan_set_origin_inline+0x6b/0x120 [ 972.154440] ? __msan_poison_alloca+0x15c/0x1d0 [ 972.159105] ? __should_failslab+0x278/0x2a0 [ 972.163512] ? should_fail+0x57/0xab0 [ 972.167308] ? __should_failslab+0x278/0x2a0 [ 972.171715] ? kmsan_set_origin_inline+0x6b/0x120 [ 972.176555] ? __msan_poison_alloca+0x15c/0x1d0 [ 972.181222] ? kmsan_set_origin+0x9e/0x160 [ 972.185461] alloc_pages_vma+0x1555/0x17f0 [ 972.189704] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 972.194817] handle_mm_fault+0x44ca/0x7ed0 [ 972.199049] ? kmsan_set_origin_inline+0x6b/0x120 [ 972.203903] __do_page_fault+0xec6/0x1a10 [ 972.208060] do_page_fault+0xb7/0x250 [ 972.211862] ? page_fault+0x8/0x30 [ 972.215402] page_fault+0x1e/0x30 [ 972.218853] RIP: 0033:0x4075fa [ 972.222037] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 972.227398] RAX: 00000000200001c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 972.234685] RDX: f18ebd65d6489da7 RSI: 0000000000000000 RDI: 0000000001dca848 [ 972.241954] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 972.249223] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ed83c [ 972.256489] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 972.263761] Mem-Info: [ 972.266187] active_anon:165708 inactive_anon:78 isolated_anon:0 [ 972.266187] active_file:1540 inactive_file:5137 isolated_file:0 [ 972.266187] unevictable:0 dirty:3 writeback:0 unstable:0 [ 972.266187] slab_reclaimable:3329 slab_unreclaimable:8245 [ 972.266187] mapped:47036 shmem:84 pagetables:1098 bounce:0 [ 972.266187] free:64039 free_pcp:538 free_cma:0 [ 972.299201] Node 0 active_anon:662832kB inactive_anon:312kB active_file:6160kB inactive_file:20548kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:188144kB dirty:12kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 972.327248] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 972.327817] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.353373] lowmem_reserve[]: 0 2817 7244 7244 [ 972.353389] Node 0 DMA32 free:191032kB min:26224kB low:32780kB high:39336kB active_anon:190348kB inactive_anon:36kB active_file:6240kB inactive_file:20820kB unevictable:0kB writepending:12kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1692kB bounce:0kB free_pcp:308kB local_pcp:176kB free_cma:0kB [ 972.353421] lowmem_reserve[]: 0 0 4426 4426 [ 972.353433] Node 0 Normal free:49724kB min:41208kB low:51508kB high:61808kB active_anon:472400kB inactive_anon:276kB active_file:24kB inactive_file:28kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7104kB pagetables:2700kB bounce:0kB free_pcp:1248kB local_pcp:620kB free_cma:0kB [ 972.353457] lowmem_reserve[]: 0 0 0 0 [ 972.353470] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 972.353527] Node 0 DMA32: 97*4kB (UME) 633*8kB (UME) 396*16kB (UME) 89*32kB (M) 734*64kB (UM) 421*128kB (UM) 98*256kB (UM) 73*512kB (UM) 11*1024kB (UM) 1*2048kB (M) 0*4096kB = 191276kB [ 972.353583] Node 0 Normal: 8285*4kB (UME) 1631*8kB (UME) 33*16kB (UM) 14*32kB (UH) 20*64kB (UH) 6*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 49724kB [ 972.475383] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 972.484019] 6745 total pagecache pages [ 972.487897] 0 pages in swap cache [ 972.491345] Swap cache stats: add 0, delete 0, find 0/0 [ 972.496699] Free swap = 0kB [ 972.499704] Total swap = 0kB [ 972.502706] 1965969 pages RAM [ 972.505820] 0 pages HighMem/MovableOnly [ 972.509779] 106316 pages reserved [ 972.648152] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.783976] audit: type=1326 audit(1529730338.782:1991): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24805 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 974.315191] khugepaged: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 974.325455] khugepaged cpuset=/ mems_allowed=0 [ 974.330048] CPU: 1 PID: 802 Comm: khugepaged Not tainted 4.17.0+ #9 [ 974.336442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.345783] Call Trace: [ 974.348378] dump_stack+0x185/0x1d0 [ 974.352006] warn_alloc+0x430/0x690 [ 974.355642] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 974.360486] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 974.365960] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 974.370895] ? try_to_compact_pages+0x1643/0x1a40 [ 974.375734] ? try_to_compact_pages+0x19bf/0x1a40 [ 974.380574] ? kmsan_set_origin_inline+0x6b/0x120 [ 974.385412] ? __msan_poison_alloca+0x15c/0x1d0 [ 974.390088] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 974.395458] ? compaction_defer_reset+0x62/0x3a0 [ 974.400210] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 974.405573] ? compaction_defer_reset+0x109/0x3a0 [ 974.410413] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 974.415779] ? compaction_defer_reset+0x321/0x3a0 [ 974.420621] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 974.425985] kmsan_alloc_page+0x82/0xe0 [ 974.429960] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 974.434726] ? update_load_avg+0x1bd6/0x2cc0 [ 974.439136] ? __msan_poison_alloca+0x15c/0x1d0 [ 974.443808] ? _cond_resched+0x3c/0xd0 [ 974.447702] khugepaged_do_scan+0x8c16/0xf190 [ 974.452201] ? pick_next_task_fair+0x22c9/0x2530 [ 974.456963] ? kmsan_set_origin_inline+0x6b/0x120 [ 974.461804] ? __msan_poison_alloca+0x15c/0x1d0 [ 974.466486] khugepaged+0xca/0xbc0 [ 974.470023] ? init_wait_entry+0x1a0/0x1a0 [ 974.474259] kthread+0x4db/0x6c0 [ 974.477631] ? start_stop_khugepaged+0x790/0x790 [ 974.482389] ? kthread_blkcg+0xf0/0xf0 [ 974.486278] ret_from_fork+0x35/0x40 [ 974.489982] Mem-Info: [ 974.492409] active_anon:166205 inactive_anon:78 isolated_anon:14 [ 974.492409] active_file:1523 inactive_file:4254 isolated_file:0 [ 974.492409] unevictable:0 dirty:12 writeback:0 unstable:0 [ 974.492409] slab_reclaimable:3331 slab_unreclaimable:8260 [ 974.492409] mapped:46172 shmem:84 pagetables:1044 bounce:0 [ 974.492409] free:61768 free_pcp:484 free_cma:0 [ 974.525594] Node 0 active_anon:664820kB inactive_anon:312kB active_file:6092kB inactive_file:16888kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:184456kB dirty:48kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 974.553595] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 974.579698] lowmem_reserve[]: 0 2817 7244 7244 [ 974.584266] Node 0 DMA32 free:181852kB min:26224kB low:32780kB high:39336kB active_anon:192420kB inactive_anon:36kB active_file:6412kB inactive_file:16896kB unevictable:0kB writepending:48kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1664kB pagetables:1476kB bounce:0kB free_pcp:744kB local_pcp:28kB free_cma:0kB [ 974.613498] lowmem_reserve[]: 0 0 4426 4426 [ 974.617805] Node 0 Normal free:49820kB min:41208kB low:51508kB high:61808kB active_anon:472400kB inactive_anon:276kB active_file:32kB inactive_file:20kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7104kB pagetables:2700kB bounce:0kB free_pcp:1248kB local_pcp:620kB free_cma:0kB [ 974.646778] lowmem_reserve[]: 0 0 0 0 [ 974.650566] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 974.663767] Node 0 DMA32: 167*4kB (UME) 927*8kB (UME) 338*16kB (UME) 95*32kB (UM) 588*64kB (UM) 421*128kB (UM) 98*256kB (UM) 73*512kB (UM) 11*1024kB (UM) 0*2048kB 0*4096kB = 181780kB [ 974.680181] Node 0 Normal: 8285*4kB (UME) 1631*8kB (UME) 33*16kB (UM) 15*32kB (UH) 19*64kB (UH) 7*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 49820kB [ 974.695034] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 974.703595] 5812 total pagecache pages [ 974.707455] 0 pages in swap cache [ 974.710886] Swap cache stats: add 0, delete 0, find 0/0 [ 974.716225] Free swap = 0kB [ 974.719217] Total swap = 0kB [ 974.722209] 1965969 pages RAM [ 974.725288] 0 pages HighMem/MovableOnly [ 974.729245] 106316 pages reserved 05:05:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:05:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0x4) 05:05:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000340)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) 05:05:39 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 974.873707] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 974.884226] syz-executor6 cpuset=syz6 mems_allowed=0 [ 974.889336] CPU: 0 PID: 24811 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 974.896163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.905503] Call Trace: [ 974.908094] dump_stack+0x185/0x1d0 [ 974.911722] warn_alloc+0x430/0x690 [ 974.915357] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 974.920197] ? kernel_poison_pages+0x40/0x360 [ 974.924691] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 974.930139] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 974.935084] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 974.940024] ? kmsan_set_origin_inline+0x6b/0x120 [ 974.944864] ? __msan_poison_alloca+0x15c/0x1d0 [ 974.949538] kmsan_alloc_page+0x82/0xe0 [ 974.953512] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 974.958262] ? kmsan_set_origin_inline+0x6b/0x120 [ 974.963099] ? __msan_poison_alloca+0x15c/0x1d0 [ 974.967766] ? __should_failslab+0x278/0x2a0 [ 974.972173] ? should_fail+0x57/0xab0 [ 974.975967] ? __should_failslab+0x278/0x2a0 [ 974.980368] ? kmsan_set_origin_inline+0x6b/0x120 [ 974.985207] ? __msan_poison_alloca+0x15c/0x1d0 [ 974.989873] ? kmsan_set_origin+0x9e/0x160 [ 974.994117] alloc_pages_vma+0x1555/0x17f0 [ 974.998354] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 975.003460] handle_mm_fault+0x44ca/0x7ed0 [ 975.007692] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.012540] __do_page_fault+0xec6/0x1a10 [ 975.016693] do_page_fault+0xb7/0x250 [ 975.020490] ? page_fault+0x8/0x30 05:05:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={0x73, 0x79, 0x7a}) 05:05:40 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 975.024024] page_fault+0x1e/0x30 [ 975.027467] RIP: 0033:0x4075fa [ 975.030645] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 975.035999] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 975.043261] RDX: 68edd8b4cf4296f2 RSI: 0000000000000000 RDI: 0000000000e44848 [ 975.050525] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 975.057789] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ee339 [ 975.065053] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:05:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 05:05:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:05:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000280)) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/15, 0xf) [ 975.149298] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 975.159819] syz-executor6 cpuset=syz6 mems_allowed=0 [ 975.164936] CPU: 0 PID: 24818 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 975.171764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.181105] Call Trace: [ 975.183694] dump_stack+0x185/0x1d0 [ 975.187320] warn_alloc+0x430/0x690 [ 975.190961] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 975.195803] ? kernel_poison_pages+0x40/0x360 [ 975.200304] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 975.205752] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 975.210692] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 975.215625] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.220465] ? __msan_poison_alloca+0x15c/0x1d0 [ 975.225146] kmsan_alloc_page+0x82/0xe0 [ 975.229122] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 975.233877] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.238720] ? __msan_poison_alloca+0x15c/0x1d0 [ 975.243383] ? __should_failslab+0x278/0x2a0 [ 975.247789] ? should_fail+0x57/0xab0 [ 975.251581] ? __should_failslab+0x278/0x2a0 [ 975.255983] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.260819] ? __msan_poison_alloca+0x15c/0x1d0 [ 975.265483] ? kmsan_set_origin+0x9e/0x160 [ 975.269729] alloc_pages_vma+0x1555/0x17f0 [ 975.273967] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 975.279073] handle_mm_fault+0x44ca/0x7ed0 [ 975.283299] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.288144] __do_page_fault+0xec6/0x1a10 [ 975.292293] do_page_fault+0xb7/0x250 [ 975.296089] ? page_fault+0x8/0x30 05:05:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000340)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) 05:05:40 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 975.299623] page_fault+0x1e/0x30 [ 975.303066] RIP: 0033:0x4075fa [ 975.306245] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 975.311594] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 975.318869] RDX: 68edd8b4cf4296f2 RSI: 0000000000000000 RDI: 0000000000e44848 [ 975.326127] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 975.333389] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ee44c [ 975.340651] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 975.394813] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 975.405338] syz-executor1 cpuset=syz1 mems_allowed=0 [ 975.410454] CPU: 0 PID: 24824 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 975.417282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.426621] Call Trace: [ 975.429198] dump_stack+0x185/0x1d0 [ 975.432816] warn_alloc+0x430/0x690 [ 975.436435] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 975.441262] ? kernel_poison_pages+0x40/0x360 [ 975.445747] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 975.451187] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 975.456132] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 975.461056] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.465971] ? __msan_poison_alloca+0x15c/0x1d0 [ 975.470626] kmsan_alloc_page+0x82/0xe0 [ 975.474584] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 975.479329] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.484153] ? __msan_poison_alloca+0x15c/0x1d0 [ 975.488801] ? __should_failslab+0x278/0x2a0 [ 975.493196] ? should_fail+0x57/0xab0 [ 975.496977] ? __should_failslab+0x278/0x2a0 [ 975.501364] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.506186] ? __msan_poison_alloca+0x15c/0x1d0 [ 975.510837] ? kmsan_set_origin+0x9e/0x160 [ 975.515066] alloc_pages_vma+0x1555/0x17f0 [ 975.519287] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 975.524387] handle_mm_fault+0x44ca/0x7ed0 [ 975.528603] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.533436] __do_page_fault+0xec6/0x1a10 [ 975.537573] do_page_fault+0xb7/0x250 [ 975.541364] ? page_fault+0x8/0x30 [ 975.544885] page_fault+0x1e/0x30 [ 975.548318] RIP: 0033:0x4075fa [ 975.551485] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 975.556827] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 975.564075] RDX: 28865427f26a51b5 RSI: 0000000000000000 RDI: 0000000000e1e848 [ 975.571323] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 975.578572] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ee542 [ 975.585822] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 975.593077] warn_alloc_show_mem: 2 callbacks suppressed [ 975.593079] Mem-Info: [ 975.600825] active_anon:166352 inactive_anon:78 isolated_anon:0 [ 975.600825] active_file:1742 inactive_file:3832 isolated_file:0 [ 975.600825] unevictable:0 dirty:45 writeback:0 unstable:0 [ 975.600825] slab_reclaimable:3331 slab_unreclaimable:8260 [ 975.600825] mapped:46183 shmem:84 pagetables:1081 bounce:0 [ 975.600825] free:58346 free_pcp:444 free_cma:0 [ 975.634322] Node 0 active_anon:665408kB inactive_anon:312kB active_file:6968kB inactive_file:15328kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:184732kB dirty:180kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 975.662319] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 975.688427] lowmem_reserve[]: 0 2817 7244 7244 [ 975.692996] Node 0 DMA32 free:167660kB min:26224kB low:32780kB high:39336kB active_anon:192544kB inactive_anon:36kB active_file:6708kB inactive_file:15552kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2176kB pagetables:1624kB bounce:0kB free_pcp:528kB local_pcp:312kB free_cma:0kB [ 975.722314] lowmem_reserve[]: 0 0 4426 4426 [ 975.726622] Node 0 Normal free:49820kB min:41208kB low:51508kB high:61808kB active_anon:472400kB inactive_anon:276kB active_file:36kB inactive_file:16kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7104kB pagetables:2700kB bounce:0kB free_pcp:1248kB local_pcp:628kB free_cma:0kB [ 975.755602] lowmem_reserve[]: 0 0 0 0 [ 975.759388] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 975.772587] Node 0 DMA32: 2*4kB (ME) 819*8kB (ME) 297*16kB (ME) 82*32kB (UM) 376*64kB (UM) 422*128kB (UM) 99*256kB (UM) 74*512kB (UM) 12*1024kB (UM) 0*2048kB 0*4096kB = 167536kB [ 975.788565] Node 0 Normal: 8285*4kB (UME) 1631*8kB (UME) 33*16kB (UM) 15*32kB (UH) 19*64kB (UH) 7*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 49820kB [ 975.803419] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 975.811968] 5680 total pagecache pages [ 975.815828] 0 pages in swap cache [ 975.819266] Swap cache stats: add 0, delete 0, find 0/0 [ 975.824622] Free swap = 0kB [ 975.827615] Total swap = 0kB [ 975.830610] 1965969 pages RAM [ 975.833688] 0 pages HighMem/MovableOnly [ 975.837634] 106316 pages reserved [ 975.842998] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 975.853491] syz-executor7 cpuset=syz7 mems_allowed=0 [ 975.858605] CPU: 0 PID: 24825 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 975.865433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.874782] Call Trace: [ 975.877374] dump_stack+0x185/0x1d0 [ 975.881004] warn_alloc+0x430/0x690 [ 975.884648] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 975.889492] ? kernel_poison_pages+0x40/0x360 [ 975.893993] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 975.899444] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 975.905259] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 975.910199] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.915128] ? __msan_poison_alloca+0x15c/0x1d0 [ 975.919806] kmsan_alloc_page+0x82/0xe0 [ 975.923785] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 975.928538] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.933376] ? __msan_poison_alloca+0x15c/0x1d0 [ 975.938043] ? __should_failslab+0x278/0x2a0 [ 975.942456] ? should_fail+0x57/0xab0 [ 975.946254] ? __should_failslab+0x278/0x2a0 [ 975.950664] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.955505] ? __msan_poison_alloca+0x15c/0x1d0 [ 975.960171] ? kmsan_set_origin+0x9e/0x160 [ 975.964411] alloc_pages_vma+0x1555/0x17f0 [ 975.968650] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 975.973757] handle_mm_fault+0x44ca/0x7ed0 [ 975.977989] ? kmsan_set_origin_inline+0x6b/0x120 [ 975.983012] __do_page_fault+0xec6/0x1a10 [ 975.987166] do_page_fault+0xb7/0x250 [ 975.990961] ? page_fault+0x8/0x30 [ 975.994495] page_fault+0x1e/0x30 [ 975.997946] RIP: 0033:0x4075fa [ 976.001124] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 976.006481] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 976.013749] RDX: f769cd953f6e47cd RSI: 0000000000000000 RDI: 0000000002a37848 [ 976.021015] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 976.028280] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ee702 [ 976.035539] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 976.049732] audit: type=1326 audit(1529730341.047:1992): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24826 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:05:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) [ 976.227730] IPVS: ftp: loaded support on port[0] = 21 05:05:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5034d}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) [ 976.301559] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 976.313247] syz-executor0 cpuset=syz0 mems_allowed=0 [ 976.318679] CPU: 0 PID: 24029 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 976.325549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.334934] Call Trace: [ 976.337571] dump_stack+0x185/0x1d0 [ 976.341240] warn_alloc+0x430/0x690 [ 976.344945] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 976.349855] ? __msan_poison_alloca+0x15c/0x1d0 [ 976.354596] copy_process+0x778/0x9be0 [ 976.358530] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 976.364016] ? ptep_set_access_flags+0x10e/0x1d0 [ 976.368809] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 976.374321] ? handle_mm_fault+0x1eb0/0x7ed0 [ 976.378766] ? __msan_poison_alloca+0x141/0x1d0 [ 976.383491] _do_fork+0x353/0xf60 [ 976.387008] __x64_sys_clone+0x15e/0x1b0 [ 976.391100] ? __ia32_sys_vfork+0x70/0x70 [ 976.395270] do_syscall_64+0x15b/0x230 [ 976.399197] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 976.404402] RIP: 0033:0x45414a [ 976.407604] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 976.415349] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 976.422643] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 976.429945] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001dca940 [ 976.437240] R10: 0000000001dcac10 R11: 0000000000000246 R12: 0000000000000001 [ 976.444527] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 976.452259] warn_alloc_show_mem: 1 callbacks suppressed [ 976.452266] Mem-Info: [ 976.460820] active_anon:165878 inactive_anon:78 isolated_anon:0 [ 976.460820] active_file:1967 inactive_file:2031 isolated_file:38 [ 976.460820] unevictable:0 dirty:52 writeback:0 unstable:0 [ 976.460820] slab_reclaimable:3331 slab_unreclaimable:8276 [ 976.460820] mapped:55735 shmem:84 pagetables:1132 bounce:0 [ 976.460820] free:30507 free_pcp:90 free_cma:0 [ 976.494452] Node 0 active_anon:663512kB inactive_anon:312kB active_file:7172kB inactive_file:9168kB unevictable:0kB isolated(anon):0kB isolated(file):24kB mapped:223056kB dirty:208kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 976.522968] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 976.549682] lowmem_reserve[]: 0 2817 7244 7244 [ 976.554617] Node 0 DMA32 free:57020kB min:26224kB low:32780kB high:39336kB active_anon:191096kB inactive_anon:36kB active_file:7084kB inactive_file:9864kB unevictable:0kB writepending:188kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1828kB bounce:0kB free_pcp:108kB local_pcp:0kB free_cma:0kB [ 976.584150] lowmem_reserve[]: 0 0 4426 4426 [ 976.588849] Node 0 Normal free:48600kB min:41208kB low:51508kB high:61808kB active_anon:472400kB inactive_anon:276kB active_file:36kB inactive_file:16kB unevictable:0kB writepending:20kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2700kB bounce:0kB free_pcp:144kB local_pcp:0kB free_cma:0kB [ 976.618102] lowmem_reserve[]: 0 0 0 0 [ 976.622324] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 976.636140] Node 0 DMA32: 414*4kB (ME) 1284*8kB (ME) 298*16kB (ME) 83*32kB (UM) 14*64kB (UM) 3*128kB (UM) 3*256kB (UM) 29*512kB (UM) 12*1024kB (UM) 2*2048kB (M) 1*4096kB (U) = 56728kB [ 976.655008] Node 0 Normal: 8219*4kB (UMEH) 1640*8kB (UMEH) 33*16kB (UMH) 14*32kB (UH) 7*64kB (UH) 7*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 48828kB [ 976.670684] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 976.679863] 4421 total pagecache pages [ 976.684210] 0 pages in swap cache [ 976.688003] Swap cache stats: add 0, delete 0, find 0/0 [ 976.693584] Free swap = 0kB [ 976.696895] Total swap = 0kB [ 976.700260] 1965969 pages RAM [ 976.703635] 0 pages HighMem/MovableOnly [ 976.707860] 106316 pages reserved [ 976.823789] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 976.834679] udevd cpuset=/ mems_allowed=0 [ 976.839031] CPU: 0 PID: 24833 Comm: udevd Not tainted 4.17.0+ #9 [ 976.845222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.848647] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 976.854599] Call Trace: [ 976.854646] dump_stack+0x185/0x1d0 [ 976.854687] warn_alloc+0x430/0x690 [ 976.865261] udevd cpuset= [ 976.867854] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 976.867915] ? __msan_poison_alloca+0x15c/0x1d0 [ 976.871522] / [ 976.875181] copy_process+0x778/0x9be0 [ 976.877888] mems_allowed=0 [ 976.882705] ? expand_files+0x5b/0xe00 [ 976.882741] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 976.905097] ? expand_files+0xa6/0xe00 [ 976.909005] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 976.914378] ? find_next_zero_bit+0x12b/0x2f0 [ 976.918893] ? __msan_poison_alloca+0x141/0x1d0 [ 976.923579] _do_fork+0x353/0xf60 [ 976.927059] __x64_sys_clone+0x15e/0x1b0 [ 976.931132] ? __ia32_sys_vfork+0x70/0x70 [ 976.935292] do_syscall_64+0x15b/0x230 [ 976.939194] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 976.944397] RIP: 0033:0x7f8a6dfa8f46 [ 976.949671] RSP: 002b:00007ffdef12c020 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 976.957394] RAX: ffffffffffffffda RBX: 00007ffdef12c020 RCX: 00007f8a6dfa8f46 [ 976.964667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 976.971943] RBP: 00007ffdef12c080 R08: 0000000000006101 R09: 0000000000006101 [ 976.979216] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 976.986487] R13: 00007ffdef12c040 R14: 0000000000000005 R15: 0000000000000005 [ 976.993786] CPU: 1 PID: 2266 Comm: udevd Not tainted 4.17.0+ #9 [ 976.999867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.009251] Call Trace: [ 977.011895] dump_stack+0x185/0x1d0 [ 977.015566] warn_alloc+0x430/0x690 [ 977.019260] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 977.024137] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.028853] copy_process+0x778/0x9be0 [ 977.032751] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.037614] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.043087] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.047764] ? _raw_spin_unlock_bh+0x57/0x70 [ 977.052197] ? __msan_poison_alloca+0x141/0x1d0 [ 977.056895] _do_fork+0x353/0xf60 [ 977.060368] __x64_sys_clone+0x15e/0x1b0 [ 977.064460] ? __ia32_sys_vfork+0x70/0x70 [ 977.068629] do_syscall_64+0x15b/0x230 [ 977.072524] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 977.077722] RIP: 0033:0x7f8a6dfa8f46 [ 977.081443] RSP: 002b:00007ffdef133790 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 977.089160] RAX: ffffffffffffffda RBX: 00007ffdef133790 RCX: 00007f8a6dfa8f46 [ 977.096430] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 977.103698] RBP: 00007ffdef1337f0 R08: 00000000000008da R09: 00000000000008da [ 977.110969] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 977.118237] R13: 00007ffdef1337b0 R14: 000000000178c250 R15: 0000000000000701 [ 977.127582] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 977.128464] udevd invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=1, oom_score_adj=-1000 [ 977.139115] syz-executor2 cpuset= [ 977.151186] udevd cpuset=/ mems_allowed=0 [ 977.151245] CPU: 1 PID: 24832 Comm: udevd Not tainted 4.17.0+ #9 [ 977.154703] syz2 [ 977.158820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.164979] mems_allowed=0 [ 977.166906] Call Trace: [ 977.166951] dump_stack+0x185/0x1d0 [ 977.166989] dump_header+0x2cc/0x16f0 [ 977.189204] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.193900] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 977.199359] ? ___ratelimit+0x67f/0x760 [ 977.203360] oom_kill_process+0x341/0x2160 [ 977.207605] ? oom_evaluate_task+0x856/0xb60 [ 977.212042] out_of_memory+0x1700/0x1da0 [ 977.216152] ? __udp4_lib_lookup+0x1540/0x28e0 [ 977.220750] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 977.225642] alloc_pages_current+0x6b1/0x970 [ 977.230085] __get_free_pages+0x2d/0xc0 [ 977.234077] pgd_alloc+0x5b/0x610 [ 977.237545] ? kmsan_set_origin+0x9e/0x160 [ 977.241807] mm_init+0x65c/0xaf0 [ 977.245209] mm_alloc+0x122/0x180 [ 977.248673] do_execveat_common+0x1154/0x2db0 [ 977.253270] ? getname_flags+0x5da/0xaa0 [ 977.257364] __x64_sys_execve+0x127/0x180 [ 977.261528] ? set_binfmt+0x1b0/0x1b0 [ 977.265335] do_syscall_64+0x15b/0x230 [ 977.269239] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 977.274434] RIP: 0033:0x7f8a6dfa9207 [ 977.278145] RSP: 002b:00007ffdef12c088 EFLAGS: 00000206 ORIG_RAX: 000000000000003b [ 977.285870] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f8a6dfa9207 [ 977.293146] RDX: 0000000001792ea0 RSI: 00007ffdef12c180 RDI: 00007ffdef12d190 [ 977.300419] RBP: 0000000000625500 R08: 0000000000005dd5 R09: 0000000000005dd5 [ 977.307695] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000001792ea0 [ 977.314967] R13: 0000000000000007 R14: 000000000178c250 R15: 0000000000000005 [ 977.322264] CPU: 0 PID: 24826 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 977.322289] Mem-Info: [ 977.329117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.329130] Call Trace: [ 977.329172] dump_stack+0x185/0x1d0 [ 977.331622] active_anon:165878 inactive_anon:78 isolated_anon:0 [ 977.331622] active_file:1002 inactive_file:2704 isolated_file:64 [ 977.331622] unevictable:0 dirty:23 writeback:0 unstable:0 [ 977.331622] slab_reclaimable:3331 slab_unreclaimable:8276 [ 977.331622] mapped:57388 shmem:84 pagetables:1132 bounce:0 [ 977.331622] free:25121 free_pcp:250 free_cma:0 [ 977.340906] warn_alloc+0x430/0x690 [ 977.340962] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 977.343565] Node 0 active_anon:663512kB inactive_anon:312kB active_file:4008kB inactive_file:10816kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:229552kB dirty:92kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 977.347150] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.347260] copy_process+0x778/0x9be0 [ 977.380547] Node 0 [ 977.384162] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.384208] ? handle_mm_fault+0x74eb/0x7ed0 [ 977.389079] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 977.417134] ? handle_mm_fault+0x74eb/0x7ed0 [ 977.417180] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 977.421821] lowmem_reserve[]: [ 977.425711] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 977.425757] ? handle_mm_fault+0x1eb0/0x7ed0 [ 977.427967] 0 [ 977.432627] ? __msan_poison_alloca+0x140/0x1d0 [ 977.432663] _do_fork+0x353/0xf60 [ 977.437068] 2817 [ 977.462577] __x64_sys_clone+0x15e/0x1b0 [ 977.462613] ? __ia32_sys_vfork+0x70/0x70 [ 977.467003] 7244 [ 977.472348] do_syscall_64+0x15b/0x230 [ 977.472389] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 977.475470] 7244 [ 977.481433] RIP: 0033:0x458429 [ 977.481447] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 977.481473] RAX: ffffffffffffffda RBX: 00007fac9c504700 RCX: 0000000000458429 [ 977.481500] RDX: 00007fac9c5049d0 RSI: 00007fac9c503db0 RDI: 00000000003d0f00 [ 977.487686] RBP: 0000000000a3e8a0 R08: 00007fac9c504700 R09: 00007fac9c504700 [ 977.487701] R10: 00007fac9c5049d0 R11: 0000000000000202 R12: 0000000000000000 [ 977.487726] R13: 0000000000a3e81f R14: 00007fac9c5049c0 R15: 0000000000000001 [ 977.492388] Node 0 [ 977.495896] warn_alloc_show_mem: 2 callbacks suppressed [ 977.495903] Mem-Info: [ 977.497949] DMA32 free:48284kB min:26224kB low:32780kB high:39336kB active_anon:191096kB inactive_anon:36kB active_file:4320kB inactive_file:10204kB unevictable:0kB writepending:188kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1828kB bounce:0kB free_pcp:788kB local_pcp:620kB free_cma:0kB [ 977.497964] lowmem_reserve[]: [ 977.502131] active_anon:165878 inactive_anon:78 isolated_anon:0 [ 977.502131] active_file:1002 inactive_file:2704 isolated_file:64 [ 977.502131] unevictable:0 dirty:23 writeback:0 unstable:0 [ 977.502131] slab_reclaimable:3331 slab_unreclaimable:8276 [ 977.502131] mapped:57388 shmem:84 pagetables:1132 bounce:0 [ 977.502131] free:25121 free_pcp:250 free_cma:0 [ 977.506188] 0 0 4426 4426 [ 977.508350] Node 0 active_anon:663512kB inactive_anon:312kB active_file:4008kB inactive_file:10816kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:229552kB dirty:92kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 977.512185] Node 0 Normal free:36296kB min:41208kB low:51508kB high:61808kB active_anon:472400kB inactive_anon:276kB active_file:36kB inactive_file:520kB unevictable:0kB writepending:20kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2700kB bounce:0kB free_pcp:212kB local_pcp:108kB free_cma:0kB [ 977.512254] lowmem_reserve[]: [ 977.517465] Node 0 [ 977.519524] 0 0 0 0 [ 977.522813] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 977.530473] Node 0 DMA: 0*4kB [ 977.537786] lowmem_reserve[]: [ 977.545078] 0*8kB 0*16kB 1*32kB (U) [ 977.552402] 0 [ 977.559680] 2*64kB (U) 1*128kB [ 977.566990] 2817 [ 977.569224] (U) 1*256kB (U) [ 977.574628] 7244 [ 977.577040] 0*512kB 1*1024kB (U) [ 977.605829] 7244 [ 977.608935] 1*2048kB (M) 3*4096kB (M) [ 977.645022] = 15904kB [ 977.645030] Node 0 DMA32: [ 977.673203] Node 0 [ 977.702284] 334*4kB (UME) [ 977.705485] DMA32 free:48284kB min:26224kB low:32780kB high:39336kB active_anon:191096kB inactive_anon:36kB active_file:4320kB inactive_file:10204kB unevictable:0kB writepending:188kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1828kB bounce:0kB free_pcp:788kB local_pcp:168kB free_cma:0kB [ 977.707668] 1582*8kB (UME) 299*16kB [ 977.710036] lowmem_reserve[]: [ 977.735811] (UME) 81*32kB (M) [ 977.739071] 0 [ 977.742158] 7*64kB (M) 3*128kB [ 977.745910] 0 [ 977.747714] (UM) 2*256kB (M) [ 977.751036] 4426 [ 977.753102] 10*512kB (UM) 12*1024kB [ 977.756156] 4426 [ 977.758216] (UM) 2*2048kB (M) [ 977.763771] 1*4096kB (U) = 48312kB [ 977.767698] Node 0 [ 977.770115] Node 0 Normal: 6259*4kB [ 977.773065] Normal free:36296kB min:41208kB low:51508kB high:61808kB active_anon:472400kB inactive_anon:276kB active_file:36kB inactive_file:520kB unevictable:0kB writepending:20kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2700kB bounce:0kB free_pcp:212kB local_pcp:104kB free_cma:0kB [ 977.775236] (MEH) 1391*8kB (MEH) [ 977.778127] lowmem_reserve[]: [ 977.806850] 0*16kB 0*32kB 0*64kB [ 977.810606] 0 [ 977.813719] 0*128kB 0*256kB 0*512kB [ 977.816954] 0 [ 977.818761] 0*1024kB 0*2048kB 0*4096kB [ 977.822080] 0 [ 977.823885] = 36164kB [ 977.823905] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 977.823927] 3858 total pagecache pages [ 977.827066] 0 [ 977.829114] 0 pages in swap cache [ 977.829128] Swap cache stats: add 0, delete 0, find 0/0 [ 977.829145] Free swap = 0kB [ 977.834928] Total swap = 0kB [ 977.834939] 1965969 pages RAM [ 977.834946] 0 pages HighMem/MovableOnly [ 977.834962] 106316 pages reserved [ 977.838167] Node 0 [ 977.841713] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 977.841791] [ 2266] 0 2266 5476 599 90112 0 -1000 udevd [ 977.843983] DMA: [ 977.847718] [ 4230] 0 4230 2493 573 57344 0 0 dhclient [ 977.847762] [ 4383] 0 4383 14251 175 122880 0 0 rsyslogd [ 977.876225] 0*4kB [ 977.879701] [ 4426] 0 4426 4725 48 81920 0 0 cron [ 977.879739] [ 4452] 0 4452 12490 153 139264 0 -1000 sshd [ 977.882841] 0*8kB [ 977.886316] [ 4476] 0 4476 3694 41 73728 0 0 getty [ 977.886353] [ 4477] 0 4477 3694 39 77824 0 0 getty [ 977.888154] 0*16kB [ 977.891888] [ 4478] 0 4478 3694 40 77824 0 0 getty [ 977.891925] [ 4479] 0 4479 3694 40 77824 0 0 getty [ 977.893732] 1*32kB [ 977.897727] [ 4480] 0 4480 3694 41 77824 0 0 getty [ 977.897763] [ 4481] 0 4481 3694 42 73728 0 0 getty [ 977.899561] (U) [ 977.901993] [ 4482] 0 4482 3649 40 73728 0 0 getty [ 977.902031] [ 4497] 0 4497 17821 197 188416 0 0 sshd [ 977.910603] 2*64kB [ 977.914510] [ 4499] 0 4499 308922 165890 2158592 0 0 syz-fuzzer [ 977.914547] [ 4516] 0 4516 17553 14 118784 0 0 syz-executor1 [ 977.916344] (U) [ 977.919821] [ 4524] 0 4524 17552 8083 126976 0 0 syz-executor1 [ 977.919862] [23264] 0 23264 17553 14 114688 0 0 syz-executor2 [ 977.925222] 1*128kB [ 977.928260] [23271] 0 23271 17552 8280 122880 0 0 syz-executor2 [ 977.928298] [24001] 0 24001 17553 15 118784 0 0 syz-executor0 [ 977.931309] (U) [ 977.934443] [24018] 0 24018 5475 597 86016 0 -1000 udevd [ 977.934480] [24021] 0 24021 5475 612 86016 0 -1000 udevd [ 977.938451] 1*256kB [ 977.941924] [24029] 0 24029 17552 8313 126976 0 0 syz-executor0 [ 977.941962] [24069] 0 24069 17553 99 114688 0 0 syz-executor7 [ 977.944193] (U) [ 977.952791] [24081] 0 24081 17552 8298 122880 0 0 syz-executor7 [ 977.952830] [24093] 0 24093 17553 100 114688 0 0 syz-executor6 [ 977.960971] 0*512kB [ 977.963067] [24110] 0 24110 17552 8299 122880 0 0 syz-executor6 [ 977.971508] 1*1024kB [ 977.979941] [24815] 0 24815 17553 100 114688 0 0 syz-executor3 [ 977.979979] [24823] 0 24823 13969 122 90112 0 0 syz-executor4 [ 977.982128] (U) [ 977.990209] [24826] 0 24826 17618 8120 126976 0 0 syz-executor2 [ 977.990248] [24831] 0 24831 17553 8130 114688 0 0 syz-executor3 [ 977.998302] 1*2048kB [ 978.000490] [24832] 0 24832 5475 260 81920 0 -1000 udevd [ 978.000531] [24833] 0 24833 5475 614 86016 0 -1000 udevd [ 978.008666] (M) [ 978.016830] Out of memory: Kill process 4499 (syz-fuzzer) score 89 or sacrifice child [ 978.016898] Killed process 24823 (syz-executor4) total-vm:55876kB, anon-rss:60kB, file-rss:428kB, shmem-rss:0kB [ 978.019107] 3*4096kB (M) = 15904kB [ 978.293458] Node 0 DMA32: 336*4kB (UME) 1641*8kB (UME) 304*16kB (UME) 82*32kB (UM) 10*64kB (UM) 3*128kB (UM) 2*256kB (M) 9*512kB (UM) 12*1024kB (UM) 2*2048kB (M) 1*4096kB (U) = 48584kB [ 978.310595] Node 0 Normal: 6049*4kB (UMEH) 1341*8kB (UMH) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 34924kB 05:05:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000340)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) 05:05:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50345}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100), 0x4) [ 978.323829] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 978.332742] 3978 total pagecache pages [ 978.336959] 0 pages in swap cache [ 978.340531] Swap cache stats: add 0, delete 0, find 0/0 [ 978.346353] Free swap = 0kB [ 978.349617] Total swap = 0kB [ 978.352750] 1965969 pages RAM [ 978.355914] 0 pages HighMem/MovableOnly [ 978.359984] 106316 pages reserved [ 978.366170] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 978.377599] syz-executor1 cpuset=syz1 mems_allowed=0 [ 978.382842] CPU: 1 PID: 4524 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 978.389621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.399002] Call Trace: [ 978.401684] dump_stack+0x185/0x1d0 [ 978.405361] warn_alloc+0x430/0x690 [ 978.409077] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 978.413979] ? __msan_poison_alloca+0x15c/0x1d0 [ 978.418699] copy_process+0x778/0x9be0 [ 978.422604] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 978.428087] ? ptep_set_access_flags+0x10e/0x1d0 [ 978.432856] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 978.438343] ? handle_mm_fault+0x1eb0/0x7ed0 [ 978.442762] ? __msan_poison_alloca+0x141/0x1d0 [ 978.447461] _do_fork+0x353/0xf60 [ 978.450936] __x64_sys_clone+0x15e/0x1b0 [ 978.455004] ? __ia32_sys_vfork+0x70/0x70 [ 978.459155] do_syscall_64+0x15b/0x230 [ 978.463061] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 978.468252] RIP: 0033:0x45414a [ 978.471437] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 978.479151] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 978.486424] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 978.493695] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000000e1e940 [ 978.500962] R10: 0000000000e1ec10 R11: 0000000000000246 R12: 0000000000000001 [ 978.508244] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 978.515875] Mem-Info: [ 978.518430] active_anon:165897 inactive_anon:74 isolated_anon:0 [ 978.518430] active_file:650 inactive_file:2968 isolated_file:66 [ 978.518430] unevictable:0 dirty:2 writeback:0 unstable:0 [ 978.518430] slab_reclaimable:3331 slab_unreclaimable:8290 [ 978.518430] mapped:57437 shmem:84 pagetables:1137 bounce:0 [ 978.518430] free:25018 free_pcp:265 free_cma:0 [ 978.551597] Node 0 active_anon:663588kB inactive_anon:296kB active_file:2600kB inactive_file:10512kB unevictable:0kB isolated(anon):0kB isolated(file):264kB mapped:228240kB dirty:8kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 978.578057] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 978.579714] Node 0 [ 978.590329] udevd cpuset=/ mems_allowed=0 [ 978.590384] CPU: 0 PID: 2266 Comm: udevd Not tainted 4.17.0+ #9 [ 978.592674] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 978.596729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.596741] Call Trace: [ 978.596795] dump_stack+0x185/0x1d0 [ 978.602833] lowmem_reserve[]: [ 978.628335] warn_alloc+0x430/0x690 [ 978.628387] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 978.637743] 0 [ 978.640332] ? __msan_poison_alloca+0x15c/0x1d0 [ 978.640412] copy_process+0x778/0x9be0 [ 978.643988] 2817 [ 978.647975] ? kmsan_set_origin_inline+0x6b/0x120 [ 978.648012] ? kmsan_set_origin_inline+0x6b/0x120 [ 978.651654] 7244 [ 978.656488] ? __msan_poison_alloca+0x15c/0x1d0 [ 978.656526] ? _raw_spin_unlock_bh+0x57/0x70 [ 978.658313] 7244 [ 978.662988] ? __msan_poison_alloca+0x141/0x1d0 [ 978.663028] _do_fork+0x353/0xf60 [ 978.668961] __x64_sys_clone+0x15e/0x1b0 [ 978.668997] ? __ia32_sys_vfork+0x70/0x70 [ 978.673830] Node 0 [ 978.678648] do_syscall_64+0x15b/0x230 [ 978.678688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 978.680798] DMA32 free:51156kB min:26224kB low:32780kB high:39336kB active_anon:191080kB inactive_anon:20kB active_file:2704kB inactive_file:8876kB unevictable:0kB writepending:8kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1792kB pagetables:1832kB bounce:0kB free_pcp:728kB local_pcp:36kB free_cma:0kB [ 978.685381] RIP: 0033:0x7f8a6dfa8f46 [ 978.685395] RSP: 002b:00007ffdef133790 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 978.689826] lowmem_reserve[]: [ 978.691864] RAX: ffffffffffffffda RBX: 00007ffdef133790 RCX: 00007f8a6dfa8f46 [ 978.691880] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 978.691906] RBP: 00007ffdef1337f0 R08: 00000000000008da R09: 00000000000008da [ 978.696571] 0 [ 978.699993] R10: 00007f8a6e8c5a70 R11: 0000000000000246 R12: 0000000000000000 [ 978.700010] R13: 00007ffdef1337b0 R14: 000000000178c250 R15: 0000000000000701 [ 978.801743] 0 4426 4426 [ 978.804526] Node 0 Normal free:35532kB min:41208kB low:51508kB high:61808kB active_anon:472508kB inactive_anon:276kB active_file:180kB inactive_file:656kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2716kB bounce:0kB free_pcp:276kB local_pcp:128kB free_cma:0kB [ 978.833755] lowmem_reserve[]: 0 0 0 0 [ 978.837710] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 978.851178] Node 0 DMA32: 1605*4kB (UME) 2333*8kB (UME) 311*16kB (UME) 88*32kB (UM) 15*64kB (UM) 3*128kB (UM) 2*256kB (M) 9*512kB (UM) 12*1024kB (UM) 2*2048kB (M) 1*4096kB (U) = 59820kB [ 978.868178] Node 0 Normal: 6225*4kB (UME) 1348*8kB (UME) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 35684kB [ 978.881007] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 978.889713] 1380 total pagecache pages [ 978.893666] 0 pages in swap cache [ 978.897213] Swap cache stats: add 0, delete 0, find 0/0 [ 978.902649] Free swap = 0kB [ 978.905763] Total swap = 0kB [ 978.908846] 1965969 pages RAM [ 978.912030] 0 pages HighMem/MovableOnly [ 978.916087] 106316 pages reserved [ 978.920248] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 978.931658] syz-executor6 cpuset=syz6 mems_allowed=0 [ 978.936949] CPU: 0 PID: 24110 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 978.943791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.953151] Call Trace: [ 978.955775] dump_stack+0x185/0x1d0 [ 978.959442] warn_alloc+0x430/0x690 [ 978.963150] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 978.968058] ? __msan_poison_alloca+0x15c/0x1d0 [ 978.972798] copy_process+0x778/0x9be0 [ 978.976707] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 978.982163] ? ptep_set_access_flags+0x10e/0x1d0 [ 978.986934] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 978.992413] ? handle_mm_fault+0x1eb0/0x7ed0 [ 978.996829] ? __msan_poison_alloca+0x141/0x1d0 [ 979.001513] _do_fork+0x353/0xf60 [ 979.004989] __x64_sys_clone+0x15e/0x1b0 [ 979.009063] ? __ia32_sys_vfork+0x70/0x70 [ 979.013210] do_syscall_64+0x15b/0x230 [ 979.017104] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 979.022291] RIP: 0033:0x45414a [ 979.025477] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 979.033189] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 979.040457] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 979.047747] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000000e44940 [ 979.055017] R10: 0000000000e44c10 R11: 0000000000000246 R12: 0000000000000001 [ 979.062289] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 979.124227] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 979.135905] syz-executor7 cpuset=syz7 mems_allowed=0 [ 979.141421] CPU: 0 PID: 24081 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 979.148575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.157958] Call Trace: [ 979.160595] dump_stack+0x185/0x1d0 [ 979.164274] warn_alloc+0x430/0x690 [ 979.167983] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 979.172890] ? __msan_poison_alloca+0x15c/0x1d0 [ 979.177614] copy_process+0x778/0x9be0 [ 979.181547] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 979.187000] ? ptep_set_access_flags+0x10e/0x1d0 [ 979.191761] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 979.197241] ? handle_mm_fault+0x1eb0/0x7ed0 [ 979.201655] ? __msan_poison_alloca+0x141/0x1d0 [ 979.206346] _do_fork+0x353/0xf60 [ 979.209817] __x64_sys_clone+0x15e/0x1b0 [ 979.213887] ? __ia32_sys_vfork+0x70/0x70 [ 979.218047] do_syscall_64+0x15b/0x230 05:05:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 979.221952] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 979.227141] RIP: 0033:0x45414a [ 979.230324] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 979.238041] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 979.245313] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 979.252580] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000002a37940 [ 979.259860] R10: 0000000002a37c10 R11: 0000000000000246 R12: 0000000000000001 [ 979.267138] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 979.340218] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 979.351686] syz-executor2 cpuset=syz2 mems_allowed=0 [ 979.357205] CPU: 0 PID: 23271 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 979.364069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.373445] Call Trace: [ 979.376080] dump_stack+0x185/0x1d0 [ 979.379740] warn_alloc+0x430/0x690 [ 979.383440] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 979.388342] ? __msan_poison_alloca+0x15c/0x1d0 [ 979.393075] copy_process+0x778/0x9be0 [ 979.396999] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 979.402481] ? ptep_set_access_flags+0x10e/0x1d0 [ 979.407268] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 979.412776] ? handle_mm_fault+0x1eb0/0x7ed0 [ 979.417212] ? __msan_poison_alloca+0x141/0x1d0 [ 979.421939] _do_fork+0x353/0xf60 [ 979.425435] __x64_sys_clone+0x15e/0x1b0 [ 979.429523] ? __ia32_sys_vfork+0x70/0x70 [ 979.433696] do_syscall_64+0x15b/0x230 [ 979.437616] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 979.442822] RIP: 0033:0x45414a [ 979.446020] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 979.453760] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 979.461028] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 979.468302] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001831940 [ 979.475571] R10: 0000000001831c10 R11: 0000000000000246 R12: 0000000000000001 [ 979.482847] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 05:05:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000002c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 05:05:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) [ 979.646847] oom_reaper: reaped process 24823 (syz-executor4), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 979.698641] device bridge_slave_1 left promiscuous mode [ 979.704440] bridge0: port 2(bridge_slave_1) entered disabled state [ 979.745675] device bridge_slave_0 left promiscuous mode [ 979.751478] bridge0: port 1(bridge_slave_0) entered disabled state 05:05:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000340)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000300)) [ 979.885515] team0 (unregistering): Port device team_slave_1 removed [ 979.914510] team0 (unregistering): Port device team_slave_0 removed 05:05:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f00000000c0)) [ 979.949114] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 979.984912] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 980.086050] bond0 (unregistering): Released all slaves [ 980.211810] IPVS: ftp: loaded support on port[0] = 21 [ 980.394551] IPVS: ftp: loaded support on port[0] = 21 [ 980.582746] IPVS: ftp: loaded support on port[0] = 21 [ 980.675855] IPVS: ftp: loaded support on port[0] = 21 [ 983.104823] kthreadd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 983.115837] kthreadd cpuset=/ mems_allowed=0 [ 983.120408] CPU: 0 PID: 2 Comm: kthreadd Not tainted 4.17.0+ #9 [ 983.126492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.130951] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 983.135860] Call Trace: [ 983.135905] dump_stack+0x185/0x1d0 [ 983.135946] warn_alloc+0x430/0x690 [ 983.146265] sh cpuset= [ 983.148884] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 983.152471] / [ 983.156106] ? __msan_poison_alloca+0x15c/0x1d0 [ 983.158572] mems_allowed=0 [ 983.163433] copy_process+0x778/0x9be0 [ 983.176597] ? __list_add_valid+0xb8/0x450 [ 983.180851] ? pick_next_task_fair+0x22c9/0x2530 [ 983.185619] ? kthread_blkcg+0xf0/0xf0 [ 983.189517] ? __msan_poison_alloca+0x140/0x1d0 [ 983.194215] _do_fork+0x353/0xf60 [ 983.197687] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 983.203083] ? balance_callback+0x48/0x260 [ 983.207345] ? kthread_blkcg+0xf0/0xf0 [ 983.211257] kernel_thread+0xc6/0xe0 [ 983.214982] ? kthread_blkcg+0xf0/0xf0 [ 983.218879] kthreadd+0x5df/0x940 [ 983.222347] ? kthread_stop+0x680/0x680 [ 983.226329] ret_from_fork+0x35/0x40 [ 983.230083] CPU: 1 PID: 24978 Comm: sh Not tainted 4.17.0+ #9 [ 983.230159] warn_alloc_show_mem: 4 callbacks suppressed [ 983.230166] Mem-Info: [ 983.235982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.235994] Call Trace: [ 983.236028] dump_stack+0x185/0x1d0 [ 983.236070] warn_alloc+0x430/0x690 [ 983.241491] active_anon:166093 inactive_anon:77 isolated_anon:0 [ 983.241491] active_file:1789 inactive_file:5706 isolated_file:96 [ 983.241491] unevictable:0 dirty:69 writeback:0 unstable:0 [ 983.241491] slab_reclaimable:3339 slab_unreclaimable:8613 [ 983.241491] mapped:55776 shmem:83 pagetables:1088 bounce:0 [ 983.241491] free:31914 free_pcp:0 free_cma:0 [ 983.243855] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 983.243914] ? __msan_poison_alloca+0x15c/0x1d0 [ 983.253303] Node 0 active_anon:664372kB inactive_anon:308kB active_file:7156kB inactive_file:22824kB unevictable:0kB isolated(anon):0kB isolated(file):384kB mapped:223104kB dirty:276kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 983.255865] copy_process+0x778/0x9be0 [ 983.259471] Node 0 [ 983.263080] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.263103] ? __msan_poison_alloca+0x15c/0x1d0 [ 983.263127] ? cp_new_stat+0x327/0x9b0 [ 983.263214] ? __msan_poison_alloca+0x141/0x1d0 [ 983.296257] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 983.301040] _do_fork+0x353/0xf60 [ 983.301085] __x64_sys_clone+0x15e/0x1b0 [ 983.305743] lowmem_reserve[]: [ 983.333923] ? __ia32_sys_vfork+0x70/0x70 [ 983.333947] do_syscall_64+0x15b/0x230 [ 983.333988] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 983.337871] 0 [ 983.340076] RIP: 0033:0x7fbbed800f46 [ 983.340091] RSP: 002b:00007ffc346dfa50 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 983.344968] 2817 [ 983.349602] RAX: ffffffffffffffda RBX: 00007ffc346dfa50 RCX: 00007fbbed800f46 [ 983.349619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 983.349633] RBP: 00007ffc346dfa90 R08: 0000000000000000 R09: 000000000000001c [ 983.349658] R10: 00007fbbedcf79d0 R11: 0000000000000246 R12: 0000000000000000 [ 983.353552] 7244 [ 983.358181] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 983.382506] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 983.383797] 7244 [ 983.387254] sh cpuset=/ [ 983.394459] mems_allowed=0 [ 983.394485] CPU: 1 PID: 24980 Comm: sh Not tainted 4.17.0+ #9 [ 983.394498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.394509] Call Trace: [ 983.394553] dump_stack+0x185/0x1d0 [ 983.394584] warn_alloc+0x430/0x690 [ 983.394652] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 983.398775] Node 0 [ 983.402660] ? __msan_poison_alloca+0x15c/0x1d0 [ 983.402735] copy_process+0x778/0x9be0 [ 983.402780] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.408025] DMA32 free:56312kB min:26224kB low:32780kB high:39336kB active_anon:191392kB inactive_anon:12kB active_file:7264kB inactive_file:21912kB unevictable:0kB writepending:248kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2048kB pagetables:1608kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 983.409739] ? __msan_poison_alloca+0x15c/0x1d0 [ 983.409763] ? cp_new_stat+0x327/0x9b0 [ 983.409812] ? __msan_poison_alloca+0x141/0x1d0 [ 983.413506] lowmem_reserve[]: [ 983.421215] _do_fork+0x353/0xf60 [ 983.421260] __x64_sys_clone+0x15e/0x1b0 [ 983.423310] 0 [ 983.430569] ? __ia32_sys_vfork+0x70/0x70 [ 983.430590] do_syscall_64+0x15b/0x230 [ 983.430633] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 983.437893] 0 [ 983.445133] RIP: 0033:0x7f9c39e0df46 [ 983.445149] RSP: 002b:00007ffe44c4a040 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 983.452451] 4426 [ 983.454483] RAX: ffffffffffffffda RBX: 00007ffe44c4a040 RCX: 00007f9c39e0df46 [ 983.454500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 983.454527] RBP: 00007ffe44c4a080 R08: 0000000000000000 R09: 000000000000001c [ 983.461826] 4426 [ 983.472085] R10: 00007f9c3a3049d0 R11: 0000000000000246 R12: 0000000000000000 [ 983.472101] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 983.648392] Node 0 Normal free:51264kB min:41208kB low:51508kB high:61808kB active_anon:472748kB inactive_anon:296kB active_file:284kB inactive_file:824kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2744kB bounce:0kB free_pcp:408kB local_pcp:0kB free_cma:0kB [ 983.677543] lowmem_reserve[]: 0 0 0 0 [ 983.681442] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 983.694930] Node 0 DMA32: 1546*4kB (UME) 594*8kB (UME) 141*16kB (UM) 92*32kB (UME) 9*64kB (UME) 3*128kB (ME) 3*256kB (ME) 26*512kB (UME) 19*1024kB (UME) 6*2048kB (UME) 0*4096kB = 62920kB [ 983.712008] Node 0 Normal: 8212*4kB (UME) 1905*8kB (UME) 34*16kB (UMH) 11*32kB (UH) 15*64kB (UH) 13*128kB (UH) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52120kB [ 983.727454] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 983.736141] 4926 total pagecache pages [ 983.740104] 0 pages in swap cache [ 983.743648] Swap cache stats: add 0, delete 0, find 0/0 [ 983.749094] Free swap = 0kB [ 983.752183] Total swap = 0kB [ 983.755246] 1965969 pages RAM [ 983.758422] 0 pages HighMem/MovableOnly [ 983.762436] 106316 pages reserved [ 983.773272] BUG: unable to handle kernel NULL pointer dereference at 00000000000008cc [ 983.781259] PGD 800000007edf4067 P4D 800000007edf4067 PUD 7edf7067 PMD 0 [ 983.788180] Oops: 0002 [#1] SMP PTI [ 983.791784] Dumping ftrace buffer: [ 983.795302] (ftrace buffer empty) [ 983.798992] Modules linked in: [ 983.802166] CPU: 0 PID: 24975 Comm: ip Not tainted 4.17.0+ #9 [ 983.808025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.817386] RIP: 0010:memset_erms+0x9/0x10 [ 983.821596] RSP: 0000:ffff88009f9beab0 EFLAGS: 00010046 [ 983.826939] RAX: 0000000000000000 RBX: ffff8801d577d7c0 RCX: 0000000000000fb0 [ 983.834197] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008cc [ 983.841446] RBP: ffff88009f9beae0 R08: 000000018040003f R09: 00000000000008cc [ 983.848695] R10: 0000000000000000 R11: 000000018040003f R12: ffff8801d577e098 [ 983.855945] R13: 0000000000000000 R14: 0000000000000286 R15: fffffffffffffff4 [ 983.863195] FS: 00007fb5f67b2700(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 983.871398] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 983.877258] CR2: 00000000000008cc CR3: 000000007ed8c000 CR4: 00000000001406f0 [ 983.884510] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 983.891762] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 983.899010] Call Trace: [ 983.901585] ? kmsan_thread_create+0x56/0xb0 [ 983.905978] __kthread_create_on_node+0x6ba/0x7b0 [ 983.910805] kthread_create_on_node+0x243/0x270 [ 983.915457] ? rcu_free_pwq+0x70/0x70 [ 983.919241] init_rescuer+0x2f2/0x6b0 [ 983.923024] ? cpus_read_unlock+0x3e/0xb0 [ 983.927160] __alloc_workqueue_key+0x1e2e/0x23b0 [ 983.931903] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.936745] ? full_name_hash+0x236/0x320 [ 983.940875] bond_init+0x11f/0x750 [ 983.944395] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 983.949742] ? dev_get_valid_name+0x727/0x740 [ 983.954218] ? bond_arp_send_all+0x16b0/0x16b0 [ 983.958780] register_netdevice+0x2e8/0x2720 [ 983.963169] ? bond_changelink+0x1d0/0x3230 [ 983.967473] ? rtnl_create_link+0xe62/0x1060 [ 983.971865] bond_newlink+0x107/0x1c0 [ 983.975649] ? bond_validate+0x220/0x220 [ 983.979689] rtnl_newlink+0x2721/0x37a0 [ 983.983641] ? rtnl_newlink+0xca5/0x37a0 [ 983.987689] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 983.993033] ? strcmp+0x83/0x160 [ 983.996386] ? rtnl_newlink+0xb4c/0x37a0 [ 984.000426] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 984.005772] ? rtnl_newlink+0xb64/0x37a0 [ 984.009819] ? finish_lock_switch+0x25/0x50 [ 984.014137] ? rtnl_setlink+0x770/0x770 [ 984.018090] rtnetlink_rcv_msg+0xa44/0x1570 [ 984.022398] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.027743] ? netlink_sendmsg+0x76e/0x1350 [ 984.032051] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.036878] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.041527] ? __should_failslab+0x278/0x2a0 [ 984.045916] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.050747] ? kmsan_set_origin+0x9e/0x160 [ 984.054962] netlink_rcv_skb+0x37e/0x600 [ 984.059005] ? rtnetlink_bind+0x120/0x120 [ 984.063135] rtnetlink_rcv+0x50/0x60 [ 984.066828] netlink_unicast+0x1680/0x1750 [ 984.071056] ? rtnetlink_net_exit+0xa0/0xa0 [ 984.075362] netlink_sendmsg+0x104f/0x1350 [ 984.079582] ? netlink_getsockopt+0xc60/0xc60 [ 984.084059] ___sys_sendmsg+0xec8/0x1320 [ 984.088107] ? __fdget+0x4e/0x60 [ 984.091453] ? __fget_light+0x57/0x700 [ 984.095317] ? __fdget+0x4e/0x60 [ 984.098663] ? __fget_light+0x1dc/0x700 [ 984.102618] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 984.107959] ? __fget_light+0x1f5/0x700 [ 984.111924] __x64_sys_sendmsg+0x331/0x460 [ 984.116144] ? ___sys_sendmsg+0x1320/0x1320 [ 984.120445] do_syscall_64+0x15b/0x230 [ 984.124316] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.129485] RIP: 0033:0x7fb5f5ed3320 [ 984.133175] RSP: 002b:00007ffd2b80bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 984.140864] RAX: ffffffffffffffda RBX: 00007ffd2b80fd70 RCX: 00007fb5f5ed3320 [ 984.148112] RDX: 0000000000000000 RSI: 00007ffd2b80bcb0 RDI: 0000000000000013 [ 984.155362] RBP: 00007ffd2b80bcb0 R08: 0000000000000000 R09: 00007fb5f61820b0 [ 984.162611] R10: 0000000000000000 R11: 0000000000000246 R12: 000000005b2dd52d [ 984.169860] R13: 0000000000000000 R14: 00000000006395c0 R15: 00007ffd2b810550 [ 984.177111] Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 [ 984.196232] RIP: memset_erms+0x9/0x10 RSP: ffff88009f9beab0 [ 984.201940] CR2: 00000000000008cc [ 984.205375] ---[ end trace 79e108e6f3232060 ]--- [ 984.210109] Kernel panic - not syncing: Fatal exception [ 984.215936] Dumping ftrace buffer: [ 984.219458] (ftrace buffer empty) [ 984.223141] Kernel Offset: disabled [ 984.226740] Rebooting in 86400 seconds..