0000000000 RDI: 0000000001196848 [ 853.478562] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 853.485819] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0855 [ 853.493073] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:13:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a1}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:31 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5027e}]}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) 02:13:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x20000398, &(0x7f0000000140)}) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000040)) 02:13:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) [ 853.608383] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 853.619016] syz-executor0 cpuset=syz0 mems_allowed=0 [ 853.624144] CPU: 0 PID: 14722 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 853.630983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 853.640352] Call Trace: [ 853.642947] dump_stack+0x185/0x1d0 [ 853.646585] warn_alloc+0x430/0x690 [ 853.650242] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 853.655095] ? kernel_poison_pages+0x40/0x360 [ 853.659600] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 853.665064] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 853.670026] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 853.674982] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.679922] ? __msan_poison_alloca+0x15c/0x1d0 [ 853.684712] kmsan_alloc_page+0x82/0xe0 [ 853.688727] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 853.693494] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.698346] ? __msan_poison_alloca+0x15c/0x1d0 [ 853.703051] ? __should_failslab+0x278/0x2a0 [ 853.707487] ? should_fail+0x57/0xab0 [ 853.711296] ? __should_failslab+0x278/0x2a0 [ 853.715728] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.720582] ? __msan_poison_alloca+0x15c/0x1d0 [ 853.725268] ? kmsan_set_origin+0x9e/0x160 [ 853.729521] alloc_pages_vma+0x1555/0x17f0 [ 853.733795] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 853.738917] handle_mm_fault+0x44ca/0x7ed0 [ 853.743165] ? kmsan_set_origin_inline+0x6b/0x120 [ 853.748028] __do_page_fault+0xec6/0x1a10 [ 853.752198] do_page_fault+0xb7/0x250 [ 853.755999] ? page_fault+0x8/0x30 [ 853.759550] page_fault+0x1e/0x30 [ 853.763031] RIP: 0033:0x4075fa [ 853.766217] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 853.771575] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 853.778935] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 853.786205] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 853.793468] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0988 [ 853.800738] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 853.808014] warn_alloc_show_mem: 3 callbacks suppressed [ 853.808016] Mem-Info: [ 853.815793] active_anon:189038 inactive_anon:76 isolated_anon:0 [ 853.815793] active_file:852 inactive_file:681 isolated_file:0 [ 853.815793] unevictable:0 dirty:31 writeback:0 unstable:0 [ 853.815793] slab_reclaimable:3372 slab_unreclaimable:9485 [ 853.815793] mapped:66909 shmem:84 pagetables:1364 bounce:0 [ 853.815793] free:54976 free_pcp:584 free_cma:0 [ 853.848811] Node 0 active_anon:756152kB inactive_anon:304kB active_file:3408kB inactive_file:2724kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267520kB dirty:124kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 853.877017] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 853.903145] lowmem_reserve[]: 0 2817 7244 7244 [ 853.907724] Node 0 DMA32 free:156000kB min:26224kB low:32780kB high:39336kB active_anon:261336kB inactive_anon:16kB active_file:556kB inactive_file:828kB unevictable:0kB writepending:112kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2496kB pagetables:2336kB bounce:0kB free_pcp:996kB local_pcp:312kB free_cma:0kB [ 853.937129] lowmem_reserve[]: 0 0 4426 4426 [ 853.941450] Node 0 Normal free:55488kB min:41208kB low:51508kB high:61808kB active_anon:494776kB inactive_anon:288kB active_file:3692kB inactive_file:1532kB unevictable:0kB writepending:12kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:3120kB bounce:0kB free_pcp:968kB local_pcp:704kB free_cma:0kB [ 853.970867] lowmem_reserve[]: 0 0 0 0 [ 853.974654] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 853.988751] Node 0 DMA32: 651*4kB (UMH) 4160*8kB (UM) 973*16kB (UM) 581*32kB (UM) 359*64kB (UM) 175*128kB (UM) 71*256kB (M) 30*512kB (UM) 1*1024kB (M) 3*2048kB (UM) 0*4096kB = 156124kB 02:13:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 02:13:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) io_setup(0x0, &(0x7f0000000000)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000040)={0x0, 0x1c9c380}) 02:13:32 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) [ 854.005350] Node 0 Normal: 5158*4kB (UMEH) 1081*8kB (UMEH) 672*16kB (UMEH) 218*32kB (UMH) 134*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 55584kB [ 854.020307] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 854.028859] 1621 total pagecache pages [ 854.032721] 0 pages in swap cache [ 854.036160] Swap cache stats: add 0, delete 0, find 0/0 [ 854.041502] Free swap = 0kB [ 854.044695] Total swap = 0kB [ 854.047694] 1965969 pages RAM [ 854.050773] 0 pages HighMem/MovableOnly [ 854.054731] 106316 pages reserved 02:13:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_open(&(0x7f0000000000)='%\x00', 0x0, 0x0, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 854.108863] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 854.119399] syz-executor6 cpuset=syz6 mems_allowed=0 [ 854.124532] CPU: 0 PID: 14734 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 854.131376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.140728] Call Trace: [ 854.143329] dump_stack+0x185/0x1d0 [ 854.146964] warn_alloc+0x430/0x690 [ 854.150604] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 854.155456] ? kernel_poison_pages+0x40/0x360 [ 854.159980] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 854.165523] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 854.170496] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 854.175446] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.180408] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.185103] kmsan_alloc_page+0x82/0xe0 [ 854.189174] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 854.194197] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.199132] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.203817] ? __should_failslab+0x278/0x2a0 [ 854.208237] ? should_fail+0x57/0xab0 [ 854.212219] ? __should_failslab+0x278/0x2a0 [ 854.216715] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.221563] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.226242] ? kmsan_set_origin+0x9e/0x160 [ 854.230759] alloc_pages_vma+0x1555/0x17f0 [ 854.235015] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 854.240141] handle_mm_fault+0x44ca/0x7ed0 [ 854.244381] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.249242] __do_page_fault+0xec6/0x1a10 [ 854.253492] do_page_fault+0xb7/0x250 [ 854.257301] ? page_fault+0x8/0x30 [ 854.260841] page_fault+0x1e/0x30 [ 854.264378] RIP: 0033:0x4075fa [ 854.267566] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 854.272946] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 854.280227] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 854.287954] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 854.295226] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0b7c [ 854.302686] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:13:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_open(&(0x7f0000000000)='%\x00', 0x0, 0x0, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 854.313494] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 854.324372] syz-executor7 cpuset=syz7 mems_allowed=0 [ 854.329499] CPU: 0 PID: 14736 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 854.336349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.345727] Call Trace: [ 854.348315] dump_stack+0x185/0x1d0 [ 854.352027] warn_alloc+0x430/0x690 [ 854.355646] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 854.360475] ? kernel_poison_pages+0x40/0x360 [ 854.364958] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 854.370389] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 854.375312] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 854.380232] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.385056] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.389724] kmsan_alloc_page+0x82/0xe0 [ 854.393687] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 854.398430] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.403252] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.407911] ? __should_failslab+0x278/0x2a0 [ 854.412312] ? should_fail+0x57/0xab0 [ 854.416092] ? __should_failslab+0x278/0x2a0 [ 854.420483] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.425315] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.429965] ? kmsan_set_origin+0x9e/0x160 [ 854.434274] alloc_pages_vma+0x1555/0x17f0 [ 854.438504] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 854.443608] handle_mm_fault+0x44ca/0x7ed0 [ 854.447911] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.452747] __do_page_fault+0xec6/0x1a10 [ 854.456892] do_page_fault+0xb7/0x250 [ 854.460675] ? page_fault+0x8/0x30 [ 854.464312] page_fault+0x1e/0x30 [ 854.467746] RIP: 0033:0x4075fa [ 854.471016] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 854.476358] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 854.483619] RDX: 652183b3930cb0b2 RSI: 0000000000000000 RDI: 0000000002630848 [ 854.490867] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 854.498117] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0c49 [ 854.505460] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 854.521842] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 854.532451] syz-executor3 cpuset=syz3 mems_allowed=0 [ 854.537668] CPU: 0 PID: 14735 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 854.544531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.554090] Call Trace: [ 854.556692] dump_stack+0x185/0x1d0 [ 854.560330] warn_alloc+0x430/0x690 [ 854.564066] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 854.568920] ? kernel_poison_pages+0x40/0x360 [ 854.573426] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 854.578890] ? try_to_wake_up+0x1cfd/0x2260 [ 854.583233] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 854.588181] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.593031] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.597718] kmsan_alloc_page+0x82/0xe0 [ 854.601718] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 854.606477] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.611320] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.615989] ? __should_failslab+0x278/0x2a0 [ 854.620401] ? should_fail+0x57/0xab0 [ 854.624199] ? __should_failslab+0x278/0x2a0 [ 854.628617] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.633455] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.638110] ? kmsan_set_origin+0x9e/0x160 [ 854.642332] alloc_pages_vma+0x1555/0x17f0 [ 854.646562] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 854.651653] handle_mm_fault+0x44ca/0x7ed0 [ 854.655882] __do_page_fault+0xec6/0x1a10 [ 854.660016] do_page_fault+0xb7/0x250 [ 854.663801] ? page_fault+0x8/0x30 [ 854.667321] page_fault+0x1e/0x30 [ 854.670755] RIP: 0033:0x4075fa [ 854.673928] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 854.679273] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 854.686522] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 854.693773] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 854.701023] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0c47 [ 854.708271] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:13:32 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5027e}]}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) [ 854.716615] audit: type=1326 audit(1529720012.715:1613): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14723 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 854.769426] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 854.779965] syz-executor2 cpuset=syz2 mems_allowed=0 [ 854.785099] CPU: 1 PID: 14745 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 854.792021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 854.801373] Call Trace: [ 854.803969] dump_stack+0x185/0x1d0 [ 854.807606] warn_alloc+0x430/0x690 [ 854.811247] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 854.816107] ? kernel_poison_pages+0x40/0x360 [ 854.820606] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 854.826060] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 854.831032] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 854.835984] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.840839] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.845541] kmsan_alloc_page+0x82/0xe0 [ 854.849520] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 854.854366] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.859384] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.864057] ? __should_failslab+0x278/0x2a0 02:13:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_open(&(0x7f0000000000)='%\x00', 0x0, 0x0, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 02:13:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) mq_open(&(0x7f0000000000)='%\x00', 0x0, 0x0, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 02:13:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) io_setup(0x0, &(0x7f0000000000)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000040)={0x0, 0x1c9c380}) [ 854.868469] ? should_fail+0x57/0xab0 [ 854.872267] ? __should_failslab+0x278/0x2a0 [ 854.876677] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.881519] ? __msan_poison_alloca+0x15c/0x1d0 [ 854.886234] ? kmsan_set_origin+0x9e/0x160 [ 854.890479] alloc_pages_vma+0x1555/0x17f0 [ 854.894722] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 854.899841] handle_mm_fault+0x44ca/0x7ed0 [ 854.904167] ? kmsan_set_origin_inline+0x6b/0x120 [ 854.909029] __do_page_fault+0xec6/0x1a10 [ 854.913189] do_page_fault+0xb7/0x250 02:13:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x20000398, &(0x7f0000000140)}) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000040)) 02:13:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) [ 854.916995] ? page_fault+0x8/0x30 [ 854.920539] page_fault+0x1e/0x30 [ 854.923987] RIP: 0033:0x4075fa [ 854.927263] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 854.932624] RAX: 00000000200001c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 854.939895] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 854.947162] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 854.954446] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0e11 [ 854.961717] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 854.968999] warn_alloc_show_mem: 3 callbacks suppressed [ 854.969002] Mem-Info: [ 854.976789] active_anon:189607 inactive_anon:75 isolated_anon:0 [ 854.976789] active_file:948 inactive_file:744 isolated_file:0 [ 854.976789] unevictable:0 dirty:45 writeback:0 unstable:0 [ 854.976789] slab_reclaimable:3368 slab_unreclaimable:9485 [ 854.976789] mapped:66755 shmem:84 pagetables:1371 bounce:0 [ 854.976789] free:54407 free_pcp:482 free_cma:0 [ 855.009712] Node 0 active_anon:758428kB inactive_anon:300kB active_file:3908kB inactive_file:2976kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266788kB dirty:180kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 855.037991] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 855.064390] lowmem_reserve[]: 0 2817 7244 7244 [ 855.068973] Node 0 DMA32 free:150100kB min:26224kB low:32780kB high:39336kB active_anon:263364kB inactive_anon:16kB active_file:88kB inactive_file:204kB unevictable:0kB writepending:156kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:2140kB bounce:0kB free_pcp:1320kB local_pcp:708kB free_cma:0kB [ 855.098908] lowmem_reserve[]: 0 0 4426 4426 [ 855.103224] Node 0 Normal free:51120kB min:41208kB low:51508kB high:61808kB active_anon:495388kB inactive_anon:284kB active_file:3516kB inactive_file:2396kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:3344kB bounce:0kB free_pcp:640kB local_pcp:100kB free_cma:0kB [ 855.132813] lowmem_reserve[]: 0 0 0 0 [ 855.136615] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 855.149914] Node 0 DMA32: 767*4kB (UMH) 4203*8kB (UM) 975*16kB (UM) 582*32kB (UM) 351*64kB (UM) 170*128kB (UM) 71*256kB (M) 30*512kB (UM) 1*1024kB (M) 0*2048kB 0*4096kB = 149700kB [ 855.166188] Node 0 Normal: 4246*4kB (UMEH) 1087*8kB (UMEH) 670*16kB (UMEH) 204*32kB (MH) 128*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51120kB [ 855.181131] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 855.189692] 1835 total pagecache pages [ 855.193558] 0 pages in swap cache [ 855.197081] Swap cache stats: add 0, delete 0, find 0/0 [ 855.202829] Free swap = 0kB [ 855.205846] Total swap = 0kB [ 855.209017] 1965969 pages RAM [ 855.212116] 0 pages HighMem/MovableOnly [ 855.216166] 106316 pages reserved [ 855.229364] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 855.240405] syz-executor3 cpuset=syz3 mems_allowed=0 [ 855.245645] CPU: 1 PID: 14751 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 855.253289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 855.262931] Call Trace: [ 855.265531] dump_stack+0x185/0x1d0 [ 855.269267] warn_alloc+0x430/0x690 [ 855.272918] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 855.277776] ? kernel_poison_pages+0x40/0x360 [ 855.282289] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 855.287768] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 855.292710] ? kmsan_set_origin_inline+0x6b/0x120 [ 855.297550] ? __msan_poison_alloca+0x15c/0x1d0 [ 855.302225] kmsan_alloc_page+0x82/0xe0 [ 855.306203] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 855.310960] ? kmsan_set_origin_inline+0x6b/0x120 [ 855.315800] ? __msan_poison_alloca+0x15c/0x1d0 [ 855.320468] ? __should_failslab+0x278/0x2a0 [ 855.324881] ? should_fail+0x57/0xab0 [ 855.328682] ? __should_failslab+0x278/0x2a0 [ 855.333089] ? kmsan_set_origin_inline+0x6b/0x120 [ 855.337932] ? __msan_poison_alloca+0x15c/0x1d0 [ 855.342701] ? kmsan_set_origin+0x9e/0x160 [ 855.346941] alloc_pages_vma+0x1555/0x17f0 [ 855.351197] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 855.356318] handle_mm_fault+0x44ca/0x7ed0 [ 855.360562] ? kmsan_set_origin_inline+0x6b/0x120 [ 855.365515] __do_page_fault+0xec6/0x1a10 [ 855.369690] do_page_fault+0xb7/0x250 [ 855.373503] ? page_fault+0x8/0x30 02:13:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) [ 855.377045] page_fault+0x1e/0x30 [ 855.380495] RIP: 0033:0x4075fa [ 855.383768] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 855.389132] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000000 [ 855.396407] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 855.403680] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 855.410956] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d0fdd [ 855.418254] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 855.516384] audit: type=1326 audit(1529720013.513:1614): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14757 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) mq_open(&(0x7f0000000000)='%\x00', 0x0, 0x0, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 02:13:33 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a1}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) [ 855.563379] audit: type=1326 audit(1529720013.550:1615): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14752 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:33 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 02:13:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:33 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) 02:13:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) mq_open(&(0x7f0000000000)='%\x00', 0x0, 0x0, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 02:13:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 02:13:33 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:33 executing program 7: add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:33 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) 02:13:33 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a1}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:34 executing program 7: add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) io_setup(0x0, &(0x7f0000000000)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000040)={0x0, 0x1c9c380}) 02:13:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 02:13:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:34 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) 02:13:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) mq_open(&(0x7f0000000000)='%\x00', 0x0, 0x0, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 02:13:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a1}]}) exit(0x0) [ 856.389910] audit: type=1326 audit(1529720014.388:1616): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14818 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:34 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5027e}]}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) 02:13:34 executing program 7: add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) [ 856.467328] audit: type=1326 audit(1529720014.436:1617): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14823 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 02:13:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a1}]}) exit(0x0) 02:13:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:34 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 02:13:34 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5027e}]}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) 02:13:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) io_setup(0x0, &(0x7f0000000000)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000040)={0x0, 0x1c9c380}) 02:13:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a1}]}) exit(0x0) 02:13:35 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 02:13:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:35 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5027e}]}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) 02:13:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) mq_open(&(0x7f0000000000)='%\x00', 0x0, 0x0, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 857.379384] audit: type=1326 audit(1529720015.378:1618): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14867 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:35 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) [ 857.428324] audit: type=1326 audit(1529720015.405:1619): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14870 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 857.448260] audit: type=1326 audit(1529720015.413:1620): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14863 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:35 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:35 executing program 0: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) [ 857.544758] audit: type=1326 audit(1529720015.543:1621): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14880 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:35 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:35 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:36 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 02:13:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) mq_open(&(0x7f0000000000)='%\x00', 0x0, 0x0, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 858.397256] audit: type=1326 audit(1529720016.395:1622): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14919 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:36 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) [ 858.455171] audit: type=1326 audit(1529720016.453:1623): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14923 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:36 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) 02:13:36 executing program 0: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:36 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:36 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:36 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:36 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 02:13:37 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:37 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:37 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$vcsn(&(0x7f0000000840)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$urandom(&(0x7f0000000a40)='/dev/urandom\x00', 0x0, 0x0) 02:13:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) syz_genetlink_get_family_id$team(&(0x7f0000001880)='team\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000015c0)='IPVS\x00') 02:13:37 executing program 0: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) syz_genetlink_get_family_id$team(&(0x7f0000001880)='team\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000015c0)='IPVS\x00') 02:13:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:38 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:38 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:38 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a1}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:38 executing program 6: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) [ 860.612000] kauditd_printk_skb: 4 callbacks suppressed [ 860.612022] audit: type=1326 audit(1529720018.606:1628): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15046 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:38 executing program 6: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:38 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:38 executing program 6: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:38 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:39 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a1}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x14) 02:13:39 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) [ 861.596403] audit: type=1326 audit(1529720019.591:1629): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15110 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) [ 861.704824] audit: type=1326 audit(1529720019.671:1630): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15120 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:40 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a1}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) [ 862.299079] audit: type=1326 audit(1529720020.296:1631): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15143 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:40 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:40 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) [ 862.621772] audit: type=1326 audit(1529720020.617:1632): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15162 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:40 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:41 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:41 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) [ 863.281815] audit: type=1326 audit(1529720021.280:1633): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15215 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:41 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 02:13:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:41 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:41 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) [ 863.583824] audit: type=1326 audit(1529720021.582:1634): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15234 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) [ 863.989679] audit: type=1326 audit(1529720021.988:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15246 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) 02:13:42 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) [ 864.244149] audit: type=1326 audit(1529720022.242:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15262 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:42 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) [ 864.925202] audit: type=1326 audit(1529720022.923:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15302 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:43 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:43 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a1}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x0) 02:13:43 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) [ 865.894909] kauditd_printk_skb: 1 callbacks suppressed [ 865.894931] audit: type=1326 audit(1529720023.893:1639): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15361 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:43 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50262}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a1}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) [ 866.467259] audit: type=1326 audit(1529720024.465:1640): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15394 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:44 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) [ 866.832178] audit: type=1326 audit(1529720024.830:1641): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15405 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:44 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:45 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) [ 867.191337] audit: type=1326 audit(1529720025.189:1642): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15432 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/65) 02:13:45 executing program 4: pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:45 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) [ 867.443284] audit: type=1326 audit(1529720025.441:1643): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15447 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a1}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:45 executing program 4: pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:45 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) [ 867.793674] audit: type=1326 audit(1529720025.792:1644): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15471 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:45 executing program 4: pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) [ 868.131577] audit: type=1326 audit(1529720026.129:1645): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15490 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0xc) 02:13:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:46 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) [ 868.742200] audit: type=1326 audit(1529720026.740:1646): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15513 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) [ 868.818043] audit: type=1326 audit(1529720026.771:1647): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15524 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 868.887534] warn_alloc: 29 callbacks suppressed [ 868.887551] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 868.887726] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 868.892394] syz-executor6 cpuset= [ 868.902869] syz-executor5 cpuset= [ 868.913345] syz6 mems_allowed=0 [ 868.920200] syz5 mems_allowed=0 [ 868.923468] CPU: 1 PID: 15530 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 868.933530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.942863] Call Trace: [ 868.945450] dump_stack+0x185/0x1d0 [ 868.949062] warn_alloc+0x430/0x690 [ 868.952682] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 868.957514] ? kernel_poison_pages+0x40/0x360 [ 868.962002] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 868.967442] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 868.972374] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 868.977317] kmsan_alloc_page+0x82/0xe0 [ 868.981284] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 868.986026] ? kmsan_set_origin_inline+0x6b/0x120 [ 868.990852] ? __msan_poison_alloca+0x15c/0x1d0 [ 868.995504] ? __should_failslab+0x278/0x2a0 [ 868.999909] ? should_fail+0x57/0xab0 [ 869.003711] ? __should_failslab+0x278/0x2a0 [ 869.008124] ? kmsan_set_origin_inline+0x6b/0x120 [ 869.012950] ? __msan_poison_alloca+0x15c/0x1d0 [ 869.017615] ? kmsan_set_origin+0x9e/0x160 [ 869.021844] alloc_pages_vma+0x1555/0x17f0 [ 869.026069] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 869.031168] handle_mm_fault+0x44ca/0x7ed0 [ 869.035391] ? kmsan_set_origin_inline+0x6b/0x120 [ 869.040230] __do_page_fault+0xec6/0x1a10 [ 869.044372] do_page_fault+0xb7/0x250 [ 869.048167] ? page_fault+0x8/0x30 [ 869.051703] page_fault+0x1e/0x30 [ 869.055139] RIP: 0033:0x4075fa [ 869.058314] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 869.063663] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 869.070921] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 869.078187] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 869.085443] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d4537 [ 869.092701] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 869.099969] warn_alloc_show_mem: 1 callbacks suppressed [ 869.099978] CPU: 0 PID: 15529 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 869.099979] Mem-Info: [ 869.100004] active_anon:189096 inactive_anon:76 isolated_anon:0 [ 869.100004] active_file:1279 inactive_file:1919 isolated_file:0 [ 869.100004] unevictable:0 dirty:19 writeback:0 unstable:0 [ 869.100004] slab_reclaimable:3347 slab_unreclaimable:9477 [ 869.100004] mapped:67607 shmem:84 pagetables:1415 bounce:0 [ 869.100004] free:43599 free_pcp:461 free_cma:0 [ 869.105348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.112185] Node 0 active_anon:756384kB inactive_anon:304kB active_file:5116kB inactive_file:7676kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270428kB dirty:76kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 869.114577] Call Trace: [ 869.147630] Node 0 [ 869.156987] dump_stack+0x185/0x1d0 [ 869.184812] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 869.187366] warn_alloc+0x430/0x690 [ 869.189582] lowmem_reserve[]: [ 869.193204] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 869.218775] 0 [ 869.222407] ? kernel_poison_pages+0x40/0x360 [ 869.225474] 2817 [ 869.230306] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 869.232080] 7244 [ 869.236563] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 869.238592] 7244 [ 869.244042] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 869.250980] ? kmsan_set_origin_inline+0x6b/0x120 [ 869.253006] Node 0 [ 869.258006] ? __msan_poison_alloca+0x15c/0x1d0 [ 869.262837] DMA32 free:107176kB min:26224kB low:32780kB high:39336kB active_anon:261720kB inactive_anon:24kB active_file:1104kB inactive_file:3396kB unevictable:0kB writepending:76kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:2644kB bounce:0kB free_pcp:704kB local_pcp:168kB free_cma:0kB [ 869.265045] kmsan_alloc_page+0x82/0xe0 [ 869.269685] lowmem_reserve[]: [ 869.298308] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 869.302252] 0 [ 869.305342] ? kmsan_set_origin_inline+0x6b/0x120 [ 869.310074] 0 [ 869.311859] ? __msan_poison_alloca+0x15c/0x1d0 [ 869.316667] 4426 [ 869.318464] ? __should_failslab+0x278/0x2a0 [ 869.323092] 4426 [ 869.325157] ? should_fail+0x57/0xab0 [ 869.329531] Node 0 [ 869.331586] ? __should_failslab+0x278/0x2a0 [ 869.335384] Normal free:51316kB min:41208kB low:51508kB high:61808kB active_anon:494664kB inactive_anon:280kB active_file:4012kB inactive_file:4280kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:3016kB bounce:0kB free_pcp:1140kB local_pcp:528kB free_cma:0kB [ 869.337587] ? kmsan_set_origin_inline+0x6b/0x120 [ 869.342237] lowmem_reserve[]: [ 869.370943] ? __msan_poison_alloca+0x15c/0x1d0 [ 869.375770] 0 [ 869.378868] ? kmsan_set_origin+0x9e/0x160 [ 869.383511] 0 [ 869.385328] alloc_pages_vma+0x1555/0x17f0 [ 869.389534] 0 [ 869.391326] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 869.395523] 0 [ 869.397318] handle_mm_fault+0x44ca/0x7ed0 [ 869.404201] ? kmsan_set_origin_inline+0x6b/0x120 [ 869.409618] Node 0 DMA: 0*4kB 0*8kB [ 869.414454] __do_page_fault+0xec6/0x1a10 [ 869.414473] do_page_fault+0xb7/0x250 [ 869.418161] 0*16kB [ 869.422287] ? page_fault+0x8/0x30 [ 869.426053] 1*32kB [ 869.428282] page_fault+0x1e/0x30 [ 869.431791] (U) [ 869.434020] RIP: 0033:0x4075fa [ 869.437439] 2*64kB [ 869.439394] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 869.442558] (U) [ 869.450111] 1*128kB [ 869.452070] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000000 [ 869.452078] (U) [ 869.454385] RDX: feb798c679317740 RSI: 0000000000000000 RDI: 0000000002848848 [ 869.461647] 1*256kB [ 869.463611] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 869.470855] (U) [ 869.473161] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d4537 [ 869.480487] 0*512kB 1*1024kB [ 869.482450] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 869.489695] (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 869.505075] Node 0 DMA32: 35*4kB (UH) 3460*8kB (UM) 841*16kB (UM) 502*32kB (M) 300*64kB (UM) 128*128kB (UM) 41*256kB (UM) 8*512kB (UM) 0*1024kB 2*2048kB (UM) 0*4096kB = 111612kB [ 869.521568] Node 0 Normal: 3747*4kB (UMEH) 1175*8kB (UMEH) 709*16kB (UMEH) 207*32kB (UMH) 128*64kB (UMH) 2*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51316kB [ 869.537255] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 869.545825] 3282 total pagecache pages [ 869.549708] 0 pages in swap cache [ 869.553162] Swap cache stats: add 0, delete 0, find 0/0 [ 869.558518] Free swap = 0kB [ 869.561531] Total swap = 0kB [ 869.564544] 1965969 pages RAM [ 869.567644] 0 pages HighMem/MovableOnly [ 869.571619] 106316 pages reserved 02:13:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000180)=0x14) 02:13:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:47 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) [ 869.674216] audit: type=1326 audit(1529720027.672:1648): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15538 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:47 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:47 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:47 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) 02:13:48 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) exit(0x0) 02:13:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) [ 870.945030] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 870.955571] syz-executor0 cpuset=syz0 mems_allowed=0 [ 870.960692] CPU: 0 PID: 15622 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 870.967532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.976883] Call Trace: [ 870.979488] dump_stack+0x185/0x1d0 [ 870.983124] warn_alloc+0x430/0x690 [ 870.986770] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 870.991614] ? kernel_poison_pages+0x40/0x360 [ 870.996232] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 871.001694] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 871.006642] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 871.011767] ? kmsan_set_origin_inline+0x6b/0x120 [ 871.016622] ? __msan_poison_alloca+0x15c/0x1d0 [ 871.021305] kmsan_alloc_page+0x82/0xe0 [ 871.025284] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 871.030045] ? kmsan_set_origin_inline+0x6b/0x120 [ 871.034889] ? __msan_poison_alloca+0x15c/0x1d0 [ 871.039560] ? __should_failslab+0x278/0x2a0 [ 871.043978] ? should_fail+0x57/0xab0 [ 871.047783] ? __should_failslab+0x278/0x2a0 [ 871.052201] ? kmsan_set_origin_inline+0x6b/0x120 [ 871.057048] ? __msan_poison_alloca+0x15c/0x1d0 [ 871.061729] ? kmsan_set_origin+0x9e/0x160 [ 871.066070] alloc_pages_vma+0x1555/0x17f0 [ 871.070322] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 871.075442] handle_mm_fault+0x44ca/0x7ed0 [ 871.079776] ? kmsan_set_origin_inline+0x6b/0x120 [ 871.084636] __do_page_fault+0xec6/0x1a10 [ 871.088801] do_page_fault+0xb7/0x250 [ 871.092609] ? page_fault+0x8/0x30 [ 871.096158] page_fault+0x1e/0x30 [ 871.099611] RIP: 0033:0x4075fa [ 871.102793] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 871.108154] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 871.115440] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 871.122716] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 871.130107] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d4d40 [ 871.137394] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 871.144680] warn_alloc_show_mem: 1 callbacks suppressed [ 871.144683] Mem-Info: [ 871.152471] active_anon:189096 inactive_anon:75 isolated_anon:0 [ 871.152471] active_file:1339 inactive_file:1654 isolated_file:32 [ 871.152471] unevictable:0 dirty:36 writeback:0 unstable:0 [ 871.152471] slab_reclaimable:3347 slab_unreclaimable:9483 [ 871.152471] mapped:67581 shmem:84 pagetables:1438 bounce:0 [ 871.152471] free:43427 free_pcp:588 free_cma:0 [ 871.185669] Node 0 active_anon:756384kB inactive_anon:300kB active_file:5296kB inactive_file:5724kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:270208kB dirty:144kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 871.213780] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 871.239957] lowmem_reserve[]: 0 2817 7244 7244 [ 871.244568] Node 0 DMA32 free:106896kB min:26224kB low:32780kB high:39336kB active_anon:261820kB inactive_anon:20kB active_file:1616kB inactive_file:1748kB unevictable:0kB writepending:124kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:2864kB bounce:0kB free_pcp:928kB local_pcp:276kB free_cma:0kB [ 871.273918] lowmem_reserve[]: 0 0 4426 4426 [ 871.278251] Node 0 Normal free:54436kB min:41208kB low:51508kB high:61808kB active_anon:494656kB inactive_anon:280kB active_file:2924kB inactive_file:3176kB unevictable:0kB writepending:20kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2888kB bounce:0kB free_pcp:1260kB local_pcp:676kB free_cma:0kB [ 871.307690] lowmem_reserve[]: 0 0 0 0 [ 871.311501] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 871.324740] Node 0 DMA32: 545*4kB (UMH) 3635*8kB (UM) 840*16kB (UM) 493*32kB (UM) 294*64kB (UM) 126*128kB (UM) 35*256kB (M) 5*512kB (M) 1*1024kB (U) 0*2048kB 0*4096kB = 107964kB 02:13:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) [ 871.340768] Node 0 Normal: 4254*4kB (UMEH) 1198*8kB (UMEH) 710*16kB (UMEH) 212*32kB (UMH) 129*64kB (UMH) 2*128kB (U) 2*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 53768kB [ 871.356549] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 871.365121] 2279 total pagecache pages [ 871.369093] 0 pages in swap cache [ 871.372536] Swap cache stats: add 0, delete 0, find 0/0 [ 871.377887] Free swap = 0kB [ 871.380891] Total swap = 0kB [ 871.383897] 1965969 pages RAM [ 871.387081] 0 pages HighMem/MovableOnly [ 871.391125] 106316 pages reserved 02:13:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 871.407625] kauditd_printk_skb: 3 callbacks suppressed [ 871.407645] audit: type=1326 audit(1529720029.406:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15622 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) [ 871.563604] audit: type=1326 audit(1529720029.562:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15645 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)='\x00', 0xfffffffffffffffe) [ 871.732474] audit: type=1326 audit(1529720029.731:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15654 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:49 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) [ 871.924878] audit: type=1326 audit(1529720029.923:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15664 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:49 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:50 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 872.535920] audit: type=1326 audit(1529720030.534:1656): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15699 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) [ 872.898714] audit: type=1326 audit(1529720030.897:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15728 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000001d00)={&(0x7f0000001600)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 02:13:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:51 executing program 2: pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) [ 873.479834] audit: type=1326 audit(1529720031.478:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15746 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 873.499856] audit: type=1326 audit(1529720031.478:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15742 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:51 executing program 2: pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) 02:13:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:51 executing program 2: pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) [ 873.874810] audit: type=1326 audit(1529720031.871:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15776 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:52 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) [ 874.446362] audit: type=1326 audit(1529720032.444:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15793 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:52 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:52 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) 02:13:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:53 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:53 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:53 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:53 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:54 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:54 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:54 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:13:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:54 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:54 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:54 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pkey_alloc(0x0, 0x0) 02:13:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:13:54 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) [ 876.627247] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 876.637902] syz-executor6 cpuset=syz6 mems_allowed=0 [ 876.643041] CPU: 0 PID: 15936 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 876.649882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.659244] Call Trace: [ 876.661849] dump_stack+0x185/0x1d0 [ 876.665491] warn_alloc+0x430/0x690 [ 876.669301] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 876.674163] ? kernel_poison_pages+0x40/0x360 [ 876.678688] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 876.684158] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 876.689127] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 876.694167] ? kmsan_set_origin_inline+0x6b/0x120 [ 876.699024] ? __msan_poison_alloca+0x15c/0x1d0 [ 876.703714] kmsan_alloc_page+0x82/0xe0 [ 876.707697] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 876.712462] ? kmsan_set_origin_inline+0x6b/0x120 [ 876.717305] ? __msan_poison_alloca+0x15c/0x1d0 [ 876.721977] ? __should_failslab+0x278/0x2a0 02:13:54 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) [ 876.726392] ? should_fail+0x57/0xab0 [ 876.730195] ? __should_failslab+0x278/0x2a0 [ 876.734608] ? kmsan_set_origin_inline+0x6b/0x120 [ 876.739460] ? __msan_poison_alloca+0x15c/0x1d0 [ 876.744140] ? kmsan_set_origin+0x9e/0x160 [ 876.748385] alloc_pages_vma+0x1555/0x17f0 [ 876.752633] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 876.757761] handle_mm_fault+0x44ca/0x7ed0 [ 876.762002] ? kmsan_set_origin_inline+0x6b/0x120 [ 876.766861] __do_page_fault+0xec6/0x1a10 [ 876.771024] do_page_fault+0xb7/0x250 [ 876.774824] ? page_fault+0x8/0x30 [ 876.778353] page_fault+0x1e/0x30 [ 876.781795] RIP: 0033:0x4075fa [ 876.784995] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 876.790358] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 876.797618] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 876.804967] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 876.812218] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d6372 [ 876.819490] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 876.826750] Mem-Info: [ 876.829273] active_anon:189073 inactive_anon:78 isolated_anon:0 [ 876.829273] active_file:1362 inactive_file:805 isolated_file:32 [ 876.829273] unevictable:0 dirty:46 writeback:0 unstable:0 [ 876.829273] slab_reclaimable:3347 slab_unreclaimable:9489 [ 876.829273] mapped:67252 shmem:84 pagetables:1411 bounce:0 [ 876.829273] free:40197 free_pcp:490 free_cma:0 [ 876.862430] Node 0 active_anon:756292kB inactive_anon:312kB active_file:5448kB inactive_file:3220kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:269008kB dirty:184kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 876.890606] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 876.916724] lowmem_reserve[]: 0 2817 7244 7244 [ 876.921292] Node 0 DMA32 free:92900kB min:26224kB low:32780kB high:39336kB active_anon:261768kB inactive_anon:36kB active_file:2008kB inactive_file:1780kB unevictable:0kB writepending:140kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2816kB pagetables:2832kB bounce:0kB free_pcp:848kB local_pcp:172kB free_cma:0kB [ 876.950526] lowmem_reserve[]: 0 0 4426 4426 [ 876.954845] Node 0 Normal free:51984kB min:41208kB low:51508kB high:61808kB active_anon:494624kB inactive_anon:276kB active_file:4136kB inactive_file:1592kB unevictable:0kB writepending:44kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2812kB bounce:0kB free_pcp:1112kB local_pcp:692kB free_cma:0kB [ 876.984348] lowmem_reserve[]: 0 0 0 0 [ 876.988158] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 877.001375] Node 0 DMA32: 265*4kB (UMH) 3485*8kB (UM) 746*16kB (UM) 427*32kB (M) 249*64kB (UM) 106*128kB (UM) 28*256kB (UM) 1*512kB (U) 1*1024kB (U) 0*2048kB 0*4096kB = 92748kB [ 877.017275] Node 0 Normal: 4267*4kB (UMEH) 1063*8kB (MEH) 665*16kB (UMEH) 208*32kB (MH) 122*64kB (UMH) 2*128kB (U) 1*256kB (U) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 51700kB [ 877.033096] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 877.041656] 2303 total pagecache pages [ 877.045528] 0 pages in swap cache [ 877.048964] Swap cache stats: add 0, delete 0, find 0/0 [ 877.054304] Free swap = 0kB [ 877.057299] Total swap = 0kB [ 877.060295] 1965969 pages RAM [ 877.063382] 0 pages HighMem/MovableOnly [ 877.067358] 106316 pages reserved 02:13:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050254}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) [ 877.077061] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 877.087762] syz-executor7 cpuset=syz7 mems_allowed=0 [ 877.092886] CPU: 0 PID: 15937 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 877.099905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.109262] Call Trace: [ 877.112033] dump_stack+0x185/0x1d0 [ 877.115675] warn_alloc+0x430/0x690 [ 877.119325] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 877.124178] ? kernel_poison_pages+0x40/0x360 02:13:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) [ 877.128702] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 877.134182] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 877.139218] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.144067] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.148759] kmsan_alloc_page+0x82/0xe0 [ 877.152750] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 877.157519] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.162386] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.167076] ? __should_failslab+0x278/0x2a0 [ 877.171507] ? should_fail+0x57/0xab0 [ 877.175411] ? __should_failslab+0x278/0x2a0 [ 877.179837] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.184693] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.189380] ? kmsan_set_origin+0x9e/0x160 [ 877.193649] alloc_pages_vma+0x1555/0x17f0 [ 877.197902] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 877.203027] handle_mm_fault+0x44ca/0x7ed0 [ 877.207273] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.212139] __do_page_fault+0xec6/0x1a10 [ 877.216303] do_page_fault+0xb7/0x250 [ 877.220111] ? page_fault+0x8/0x30 [ 877.223673] page_fault+0x1e/0x30 [ 877.227122] RIP: 0033:0x4075d5 [ 877.230311] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 877.235677] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 000000000000000c [ 877.242948] RDX: 652183b3930cb0b2 RSI: 0000000000000000 RDI: 0000000002630848 [ 877.250205] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 877.257460] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d6534 [ 877.264714] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 877.273369] kauditd_printk_skb: 2 callbacks suppressed [ 877.273390] audit: type=1326 audit(1529720035.272:1664): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15945 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 877.311457] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 877.321994] syz-executor3 cpuset=syz3 mems_allowed=0 [ 877.327099] CPU: 0 PID: 15935 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 877.334004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.343359] Call Trace: [ 877.345955] dump_stack+0x185/0x1d0 [ 877.349584] warn_alloc+0x430/0x690 [ 877.353293] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 877.358124] ? kernel_poison_pages+0x40/0x360 [ 877.362612] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 877.368054] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.372906] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 877.377939] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.382768] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.387432] kmsan_alloc_page+0x82/0xe0 [ 877.391484] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 877.396230] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.401165] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.405823] ? __should_failslab+0x278/0x2a0 [ 877.410309] ? should_fail+0x57/0xab0 [ 877.414101] ? __should_failslab+0x278/0x2a0 [ 877.418499] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.423336] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.428015] ? kmsan_set_origin+0x9e/0x160 [ 877.432253] alloc_pages_vma+0x1555/0x17f0 [ 877.436479] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 877.441588] handle_mm_fault+0x44ca/0x7ed0 [ 877.445811] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.450668] __do_page_fault+0xec6/0x1a10 [ 877.454806] do_page_fault+0xb7/0x250 [ 877.458689] ? page_fault+0x8/0x30 [ 877.462213] page_fault+0x1e/0x30 [ 877.465660] RIP: 0033:0x4075fa [ 877.468832] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 02:13:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pkey_alloc(0x0, 0x0) [ 877.474268] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 877.481518] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 877.488771] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 877.496024] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d661d [ 877.503281] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:13:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 877.576632] audit: type=1326 audit(1529720035.574:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15935 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 877.609442] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 877.619968] syz-executor4 cpuset=syz4 mems_allowed=0 [ 877.625095] CPU: 0 PID: 15953 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 877.631933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.641291] Call Trace: [ 877.643889] dump_stack+0x185/0x1d0 [ 877.647534] warn_alloc+0x430/0x690 [ 877.651263] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 877.656118] ? kernel_poison_pages+0x40/0x360 [ 877.660635] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 877.666114] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 877.671075] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 877.676113] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.680968] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.685664] kmsan_alloc_page+0x82/0xe0 [ 877.689657] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 877.694434] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.699289] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.703969] ? __should_failslab+0x278/0x2a0 [ 877.708388] ? should_fail+0x57/0xab0 [ 877.712201] ? __should_failslab+0x278/0x2a0 [ 877.716625] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.721488] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.726173] ? kmsan_set_origin+0x9e/0x160 [ 877.730445] alloc_pages_vma+0x1555/0x17f0 [ 877.734702] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 877.739831] handle_mm_fault+0x44ca/0x7ed0 [ 877.744078] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.748945] __do_page_fault+0xec6/0x1a10 [ 877.753114] do_page_fault+0xb7/0x250 [ 877.756931] ? page_fault+0x8/0x30 [ 877.760479] page_fault+0x1e/0x30 [ 877.763928] RIP: 0033:0x4075fa [ 877.767115] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 877.772472] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 877.779748] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 877.787025] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 877.794300] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d6748 [ 877.801577] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 877.810289] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 877.820810] syz-executor2 cpuset=syz2 mems_allowed=0 [ 877.825921] CPU: 1 PID: 15956 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 877.832748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.842100] Call Trace: [ 877.844687] dump_stack+0x185/0x1d0 [ 877.848302] warn_alloc+0x430/0x690 [ 877.851922] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 877.856756] ? kernel_poison_pages+0x40/0x360 [ 877.861243] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 877.866689] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 877.871637] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 877.876658] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.881495] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.886168] kmsan_alloc_page+0x82/0xe0 [ 877.890224] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 877.894988] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.899837] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.904492] ? __should_failslab+0x278/0x2a0 [ 877.908895] ? should_fail+0x57/0xab0 [ 877.912773] ? __should_failslab+0x278/0x2a0 [ 877.917174] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.921999] ? __msan_poison_alloca+0x15c/0x1d0 [ 877.926655] ? kmsan_set_origin+0x9e/0x160 [ 877.930896] alloc_pages_vma+0x1555/0x17f0 [ 877.935298] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 877.940405] handle_mm_fault+0x44ca/0x7ed0 [ 877.944625] ? kmsan_set_origin_inline+0x6b/0x120 [ 877.949476] __do_page_fault+0xec6/0x1a10 [ 877.953616] do_page_fault+0xb7/0x250 [ 877.957400] ? page_fault+0x8/0x30 [ 877.960930] page_fault+0x1e/0x30 [ 877.964364] RIP: 0033:0x4075fa [ 877.967534] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 877.972884] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 877.980231] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 877.987576] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 877.994936] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d6810 [ 878.002206] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 878.009470] warn_alloc_show_mem: 3 callbacks suppressed [ 878.009472] Mem-Info: [ 878.017403] active_anon:189176 inactive_anon:74 isolated_anon:0 [ 878.017403] active_file:743 inactive_file:511 isolated_file:0 [ 878.017403] unevictable:0 dirty:46 writeback:0 unstable:0 [ 878.017403] slab_reclaimable:3346 slab_unreclaimable:9491 [ 878.017403] mapped:66498 shmem:84 pagetables:1365 bounce:0 [ 878.017403] free:40693 free_pcp:449 free_cma:0 [ 878.050299] Node 0 active_anon:756704kB inactive_anon:296kB active_file:2972kB inactive_file:2044kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:265992kB dirty:184kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 878.078304] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 878.104500] lowmem_reserve[]: 0 2817 7244 7244 [ 878.109075] Node 0 DMA32 free:95416kB min:26224kB low:32780kB high:39336kB active_anon:261504kB inactive_anon:20kB active_file:340kB inactive_file:1384kB unevictable:0kB writepending:140kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:3008kB pagetables:2520kB bounce:0kB free_pcp:572kB local_pcp:392kB free_cma:0kB [ 878.138230] lowmem_reserve[]: 0 0 4426 4426 [ 878.142541] Node 0 Normal free:51452kB min:41208kB low:51508kB high:61808kB active_anon:494752kB inactive_anon:276kB active_file:2576kB inactive_file:1096kB unevictable:0kB writepending:44kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2940kB bounce:0kB free_pcp:1224kB local_pcp:560kB free_cma:0kB [ 878.171950] lowmem_reserve[]: 0 0 0 0 [ 878.175740] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 878.189029] Node 0 DMA32: 286*4kB (UMH) 3752*8kB (UM) 776*16kB (UM) 432*32kB (UM) 247*64kB (UM) 105*128kB (M) 28*256kB (UM) 1*512kB (U) 1*1024kB (U) 0*2048kB 0*4096kB = 95352kB [ 878.204945] Node 0 Normal: 4633*4kB (MEH) 1041*8kB (UMEH) 661*16kB (UMEH) 204*32kB (UMH) 117*64kB (UMH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51452kB [ 878.219801] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 878.228355] 1378 total pagecache pages [ 878.232220] 0 pages in swap cache [ 878.235653] Swap cache stats: add 0, delete 0, find 0/0 [ 878.240994] Free swap = 0kB [ 878.243989] Total swap = 0kB [ 878.246986] 1965969 pages RAM [ 878.250070] 0 pages HighMem/MovableOnly [ 878.254026] 106316 pages reserved 02:13:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:13:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000280)=""/204) 02:13:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pkey_alloc(0x0, 0x0) 02:13:56 executing program 5: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050254}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 878.336274] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 878.346805] syz-executor3 cpuset=syz3 mems_allowed=0 [ 878.351938] CPU: 1 PID: 15965 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 878.358779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.368331] Call Trace: [ 878.370929] dump_stack+0x185/0x1d0 [ 878.374569] warn_alloc+0x430/0x690 [ 878.378224] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 878.383171] ? kernel_poison_pages+0x40/0x360 [ 878.387680] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 878.393171] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 878.398213] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.403097] ? __msan_poison_alloca+0x15c/0x1d0 [ 878.407793] kmsan_alloc_page+0x82/0xe0 [ 878.411794] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 878.416563] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.421419] ? __msan_poison_alloca+0x15c/0x1d0 [ 878.426109] ? __should_failslab+0x278/0x2a0 [ 878.430544] ? should_fail+0x57/0xab0 02:13:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) [ 878.434366] ? __should_failslab+0x278/0x2a0 [ 878.438795] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.443653] ? __msan_poison_alloca+0x15c/0x1d0 [ 878.448336] ? kmsan_set_origin+0x9e/0x160 [ 878.452596] alloc_pages_vma+0x1555/0x17f0 [ 878.456853] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 878.461981] handle_mm_fault+0x44ca/0x7ed0 [ 878.466234] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.471101] __do_page_fault+0xec6/0x1a10 [ 878.475282] do_page_fault+0xb7/0x250 [ 878.479095] ? page_fault+0x8/0x30 [ 878.482757] page_fault+0x1e/0x30 02:13:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) [ 878.486210] RIP: 0033:0x4075fa [ 878.489398] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 878.494767] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 878.502047] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 878.509327] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 878.516602] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d6a1f [ 878.523879] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 878.532045] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 878.542561] syz-executor0 cpuset=syz0 mems_allowed=0 [ 878.547680] CPU: 0 PID: 15972 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 878.554522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.563891] Call Trace: [ 878.566490] dump_stack+0x185/0x1d0 [ 878.570129] warn_alloc+0x430/0x690 [ 878.573787] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 878.578689] ? msan_get_shadow_origin_ptr+0x20c/0x230 [ 878.583892] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 878.589361] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 878.594325] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 878.599362] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.604215] ? __msan_poison_alloca+0x15c/0x1d0 [ 878.608900] kmsan_alloc_page+0x82/0xe0 [ 878.612884] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 878.617661] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.622509] ? __msan_poison_alloca+0x15c/0x1d0 [ 878.627189] ? __should_failslab+0x278/0x2a0 [ 878.631627] ? should_fail+0x57/0xab0 [ 878.635447] ? __should_failslab+0x278/0x2a0 [ 878.639849] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.644711] ? __msan_poison_alloca+0x15c/0x1d0 [ 878.649382] ? kmsan_set_origin+0x9e/0x160 [ 878.653648] alloc_pages_vma+0x1555/0x17f0 [ 878.657882] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 878.662982] handle_mm_fault+0x44ca/0x7ed0 [ 878.667226] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.672078] __do_page_fault+0xec6/0x1a10 [ 878.676220] do_page_fault+0xb7/0x250 [ 878.680026] ? page_fault+0x8/0x30 [ 878.683550] page_fault+0x1e/0x30 [ 878.686987] RIP: 0033:0x4075fa [ 878.690244] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 878.695589] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000000 [ 878.702847] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 878.710109] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 878.717551] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d6ae0 [ 878.724804] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 878.734922] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 878.745440] syz-executor7 cpuset=syz7 mems_allowed=0 [ 878.750670] CPU: 0 PID: 15974 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 878.757599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.767052] Call Trace: [ 878.769660] dump_stack+0x185/0x1d0 [ 878.773281] warn_alloc+0x430/0x690 [ 878.777006] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 878.781856] ? kernel_poison_pages+0x40/0x360 [ 878.786352] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 878.791812] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 878.796837] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.801662] ? __msan_poison_alloca+0x15c/0x1d0 [ 878.806324] kmsan_alloc_page+0x82/0xe0 [ 878.810374] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 878.815133] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.819970] ? __msan_poison_alloca+0x15c/0x1d0 [ 878.824712] ? __should_failslab+0x278/0x2a0 [ 878.829107] ? should_fail+0x57/0xab0 [ 878.832889] ? __should_failslab+0x278/0x2a0 [ 878.837281] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.842109] ? __msan_poison_alloca+0x15c/0x1d0 [ 878.846762] ? kmsan_set_origin+0x9e/0x160 [ 878.850999] alloc_pages_vma+0x1555/0x17f0 [ 878.855227] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 878.860329] handle_mm_fault+0x44ca/0x7ed0 [ 878.864548] ? kmsan_set_origin_inline+0x6b/0x120 [ 878.869384] __do_page_fault+0xec6/0x1a10 [ 878.873523] do_page_fault+0xb7/0x250 [ 878.877310] ? page_fault+0x8/0x30 [ 878.880843] page_fault+0x1e/0x30 [ 878.884277] RIP: 0033:0x4075fa 02:13:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 878.887458] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 878.892803] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 878.900062] RDX: 652183b3930cb0b2 RSI: 0000000000000000 RDI: 0000000002630848 [ 878.907318] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 878.914570] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d6bae [ 878.921820] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 878.938119] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 878.948641] syz-executor2 cpuset=syz2 mems_allowed=0 [ 878.953759] CPU: 1 PID: 15980 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 878.960592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.969947] Call Trace: [ 878.972550] dump_stack+0x185/0x1d0 [ 878.976188] warn_alloc+0x430/0x690 [ 878.979835] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 878.984676] ? kernel_poison_pages+0x40/0x360 [ 878.989190] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 878.994651] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 878.999606] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 879.004637] ? kmsan_set_origin_inline+0x6b/0x120 [ 879.009484] ? __msan_poison_alloca+0x15c/0x1d0 [ 879.014169] kmsan_alloc_page+0x82/0xe0 [ 879.018146] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 879.022890] ? kmsan_set_origin_inline+0x6b/0x120 [ 879.027814] ? __msan_poison_alloca+0x15c/0x1d0 [ 879.032482] ? __should_failslab+0x278/0x2a0 [ 879.036886] ? should_fail+0x57/0xab0 [ 879.040683] ? __should_failslab+0x278/0x2a0 [ 879.045081] ? kmsan_set_origin_inline+0x6b/0x120 [ 879.049914] ? __msan_poison_alloca+0x15c/0x1d0 [ 879.054657] ? kmsan_set_origin+0x9e/0x160 [ 879.058881] alloc_pages_vma+0x1555/0x17f0 [ 879.063191] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 879.068285] handle_mm_fault+0x44ca/0x7ed0 [ 879.072503] ? kmsan_set_origin_inline+0x6b/0x120 [ 879.077339] __do_page_fault+0xec6/0x1a10 [ 879.081475] do_page_fault+0xb7/0x250 [ 879.085260] ? page_fault+0x8/0x30 [ 879.088784] page_fault+0x1e/0x30 [ 879.092221] RIP: 0033:0x4075fa [ 879.095392] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 879.100737] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 879.108269] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 879.116231] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 879.123491] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d6c79 [ 879.130850] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 879.138115] warn_alloc_show_mem: 3 callbacks suppressed [ 879.138118] Mem-Info: [ 879.145964] active_anon:189143 inactive_anon:76 isolated_anon:0 [ 879.145964] active_file:869 inactive_file:678 isolated_file:0 [ 879.145964] unevictable:0 dirty:62 writeback:0 unstable:0 [ 879.145964] slab_reclaimable:3346 slab_unreclaimable:9500 [ 879.145964] mapped:66694 shmem:84 pagetables:1374 bounce:0 [ 879.145964] free:40205 free_pcp:640 free_cma:0 [ 879.179143] Node 0 active_anon:756572kB inactive_anon:304kB active_file:3476kB inactive_file:2712kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266776kB dirty:248kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 879.207063] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 879.233195] lowmem_reserve[]: 0 2817 7244 7244 [ 879.237771] Node 0 DMA32 free:93028kB min:26224kB low:32780kB high:39336kB active_anon:261468kB inactive_anon:0kB active_file:692kB inactive_file:2176kB unevictable:0kB writepending:156kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2944kB pagetables:2324kB bounce:0kB free_pcp:1292kB local_pcp:672kB free_cma:0kB [ 879.266922] lowmem_reserve[]: 0 0 4426 4426 [ 879.271234] Node 0 Normal free:51888kB min:41208kB low:51508kB high:61808kB active_anon:495104kB inactive_anon:304kB active_file:2836kB inactive_file:584kB unevictable:0kB writepending:92kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:3172kB bounce:0kB free_pcp:1268kB local_pcp:632kB free_cma:0kB [ 879.300566] lowmem_reserve[]: 0 0 0 0 [ 879.304367] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 879.317589] Node 0 DMA32: 407*4kB (UMH) 3529*8kB (UM) 770*16kB (UM) 431*32kB (UM) 259*64kB (UM) 106*128kB (UM) 27*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 93028kB 02:13:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) [ 879.332878] Node 0 Normal: 4724*4kB (UMEH) 1046*8kB (UMEH) 645*16kB (UMEH) 204*32kB (UMH) 120*64kB (UMH) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51920kB [ 879.348167] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 879.356719] 1631 total pagecache pages [ 879.360582] 0 pages in swap cache [ 879.364015] Swap cache stats: add 0, delete 0, find 0/0 [ 879.369365] Free swap = 0kB [ 879.372369] Total swap = 0kB [ 879.375366] 1965969 pages RAM [ 879.378448] 0 pages HighMem/MovableOnly [ 879.382398] 106316 pages reserved 02:13:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) [ 879.392933] audit: type=1326 audit(1529720037.385:1666): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15971 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 879.431386] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 879.441911] syz-executor7 cpuset=syz7 mems_allowed=0 [ 879.447028] CPU: 0 PID: 15987 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 879.453860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 879.463211] Call Trace: [ 879.465799] dump_stack+0x185/0x1d0 [ 879.469431] warn_alloc+0x430/0x690 [ 879.473072] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 879.477918] ? kernel_poison_pages+0x40/0x360 [ 879.482418] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 879.487894] ? __alloc_pages_nodemask+0xf7b/0x5cc0 02:13:57 executing program 5: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) [ 879.492845] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 879.497885] ? kmsan_set_origin_inline+0x6b/0x120 [ 879.502729] ? __msan_poison_alloca+0x15c/0x1d0 [ 879.507410] kmsan_alloc_page+0x82/0xe0 [ 879.511390] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 879.516150] ? kmsan_set_origin_inline+0x6b/0x120 [ 879.520998] ? __msan_poison_alloca+0x15c/0x1d0 [ 879.525674] ? __should_failslab+0x278/0x2a0 [ 879.530090] ? should_fail+0x57/0xab0 [ 879.533897] ? __should_failslab+0x278/0x2a0 [ 879.538313] ? kmsan_set_origin_inline+0x6b/0x120 [ 879.543162] ? __msan_poison_alloca+0x15c/0x1d0 [ 879.547839] ? kmsan_set_origin+0x9e/0x160 [ 879.552094] alloc_pages_vma+0x1555/0x17f0 [ 879.556341] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 879.561485] handle_mm_fault+0x44ca/0x7ed0 [ 879.565729] ? kmsan_set_origin_inline+0x6b/0x120 [ 879.570599] __do_page_fault+0xec6/0x1a10 [ 879.574765] do_page_fault+0xb7/0x250 [ 879.578573] ? page_fault+0x8/0x30 [ 879.582126] page_fault+0x1e/0x30 [ 879.585584] RIP: 0033:0x4075fa [ 879.588770] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 02:13:57 executing program 5: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) [ 879.594133] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 879.601405] RDX: 652183b3930cb0b2 RSI: 0000000000000000 RDI: 0000000002630848 [ 879.608678] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 879.615949] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d6e66 [ 879.623221] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 879.687567] audit: type=1326 audit(1529720037.686:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15980 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 02:13:57 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:57 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) [ 879.803917] audit: type=1326 audit(1529720037.802:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16004 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) personality(0x0) 02:13:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:58 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:58 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:13:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) [ 880.073367] audit: type=1326 audit(1529720038.072:1669): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16023 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:58 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:58 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) personality(0x0) 02:13:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:13:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:13:58 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:58 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) [ 880.727741] audit: type=1326 audit(1529720038.726:1670): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16065 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:58 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:13:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:13:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe(&(0x7f0000000d80)) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 02:13:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) personality(0x0) 02:13:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) [ 881.056817] audit: type=1326 audit(1529720039.055:1671): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16090 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:13:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:59 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:59 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:13:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:13:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:13:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:13:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:13:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:13:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:13:59 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) [ 881.652756] warn_alloc: 40 callbacks suppressed [ 881.652772] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 881.667970] syz-executor5 cpuset=syz5 mems_allowed=0 [ 881.673253] CPU: 1 PID: 16117 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 881.680093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.689459] Call Trace: [ 881.692055] dump_stack+0x185/0x1d0 [ 881.695691] warn_alloc+0x430/0x690 [ 881.699338] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 881.704181] ? kernel_poison_pages+0x40/0x360 [ 881.708674] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 881.714213] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 881.719150] ? kmsan_set_origin_inline+0x6b/0x120 [ 881.723981] ? __msan_poison_alloca+0x15c/0x1d0 [ 881.728646] kmsan_alloc_page+0x82/0xe0 [ 881.732607] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 881.737347] ? kmsan_set_origin_inline+0x6b/0x120 [ 881.742172] ? __msan_poison_alloca+0x15c/0x1d0 [ 881.746826] ? __should_failslab+0x278/0x2a0 [ 881.751220] ? should_fail+0x57/0xab0 [ 881.755000] ? __should_failslab+0x278/0x2a0 [ 881.759392] ? kmsan_set_origin_inline+0x6b/0x120 [ 881.764218] ? __msan_poison_alloca+0x15c/0x1d0 [ 881.768871] ? kmsan_set_origin+0x9e/0x160 [ 881.773097] alloc_pages_vma+0x1555/0x17f0 [ 881.777322] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 881.782457] handle_mm_fault+0x44ca/0x7ed0 [ 881.786676] ? kmsan_set_origin_inline+0x6b/0x120 [ 881.791514] __do_page_fault+0xec6/0x1a10 [ 881.795651] do_page_fault+0xb7/0x250 [ 881.799482] ? page_fault+0x8/0x30 [ 881.803096] page_fault+0x1e/0x30 [ 881.806545] RIP: 0033:0x4075fa [ 881.809735] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 881.815168] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 881.822428] RDX: feb798c679317740 RSI: 0000000000000000 RDI: 0000000002848848 [ 881.829687] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 881.836948] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d7714 [ 881.844203] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 881.851471] warn_alloc_show_mem: 1 callbacks suppressed [ 881.851475] Mem-Info: [ 881.859231] active_anon:189120 inactive_anon:78 isolated_anon:0 [ 881.859231] active_file:1098 inactive_file:598 isolated_file:0 [ 881.859231] unevictable:0 dirty:18 writeback:0 unstable:0 [ 881.859231] slab_reclaimable:3346 slab_unreclaimable:9502 [ 881.859231] mapped:66820 shmem:84 pagetables:1344 bounce:0 [ 881.859231] free:39425 free_pcp:330 free_cma:0 [ 881.892249] Node 0 active_anon:756480kB inactive_anon:312kB active_file:4392kB inactive_file:2392kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267280kB dirty:72kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 881.920269] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 881.946384] lowmem_reserve[]: 0 2817 7244 7244 [ 881.950961] Node 0 DMA32 free:90344kB min:26224kB low:32780kB high:39336kB active_anon:261560kB inactive_anon:36kB active_file:1784kB inactive_file:1724kB unevictable:0kB writepending:72kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2752kB pagetables:2236kB bounce:0kB free_pcp:736kB local_pcp:652kB free_cma:0kB [ 881.980201] lowmem_reserve[]: 0 0 4426 4426 [ 881.984532] Node 0 Normal free:51452kB min:41208kB low:51508kB high:61808kB active_anon:494904kB inactive_anon:276kB active_file:2608kB inactive_file:668kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:3140kB bounce:0kB free_pcp:584kB local_pcp:288kB free_cma:0kB [ 882.013696] lowmem_reserve[]: 0 0 0 0 [ 882.017590] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 882.030883] Node 0 DMA32: 116*4kB (UMH) 3521*8kB (UM) 743*16kB (UM) 407*32kB (UM) 244*64kB (UM) 101*128kB (UM) 26*256kB (UM) 1*512kB (U) 1*1024kB (U) 0*2048kB 0*4096kB = 90280kB [ 882.046875] Node 0 Normal: 4800*4kB (MEH) 1023*8kB (UMEH) 643*16kB (MEH) 190*32kB (UMH) 117*64kB (UMH) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51368kB [ 882.062001] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 882.070560] 1780 total pagecache pages [ 882.074460] 0 pages in swap cache [ 882.077894] Swap cache stats: add 0, delete 0, find 0/0 [ 882.083252] Free swap = 0kB [ 882.086257] Total swap = 0kB [ 882.089257] 1965969 pages RAM [ 882.092354] 0 pages HighMem/MovableOnly [ 882.096308] 106316 pages reserved [ 882.101724] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 882.112258] syz-executor4 cpuset=syz4 mems_allowed=0 [ 882.117386] CPU: 1 PID: 16118 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 882.124223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.133672] Call Trace: [ 882.136257] dump_stack+0x185/0x1d0 [ 882.139882] warn_alloc+0x430/0x690 [ 882.143510] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 882.148445] ? kernel_poison_pages+0x40/0x360 [ 882.153111] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 882.158553] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 882.163571] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 882.168511] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.173431] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.178105] kmsan_alloc_page+0x82/0xe0 [ 882.182090] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 882.186833] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.191662] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.196316] ? __should_failslab+0x278/0x2a0 [ 882.200726] ? should_fail+0x57/0xab0 [ 882.204510] ? __should_failslab+0x278/0x2a0 [ 882.208901] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.213729] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.218381] ? kmsan_set_origin+0x9e/0x160 [ 882.222614] alloc_pages_vma+0x1555/0x17f0 [ 882.226839] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 882.231932] handle_mm_fault+0x44ca/0x7ed0 [ 882.236154] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.241001] __do_page_fault+0xec6/0x1a10 [ 882.245161] do_page_fault+0xb7/0x250 [ 882.248948] ? page_fault+0x8/0x30 [ 882.252478] page_fault+0x1e/0x30 [ 882.255930] RIP: 0033:0x4075fa [ 882.259109] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 882.264462] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000000 [ 882.271731] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 882.278988] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 882.286248] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d78d5 [ 882.293510] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 882.307991] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 882.318711] syz-executor7 cpuset=syz7 mems_allowed=0 [ 882.323840] CPU: 0 PID: 16120 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 882.330680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.340037] Call Trace: [ 882.342643] dump_stack+0x185/0x1d0 [ 882.346282] warn_alloc+0x430/0x690 [ 882.349926] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 882.354774] ? kernel_poison_pages+0x40/0x360 [ 882.359281] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 882.364757] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 882.369690] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.374517] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.379174] kmsan_alloc_page+0x82/0xe0 [ 882.383137] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 882.387876] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.392700] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.397405] ? __should_failslab+0x278/0x2a0 [ 882.401799] ? should_fail+0x57/0xab0 [ 882.405588] ? __should_failslab+0x278/0x2a0 [ 882.409994] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.414817] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.419484] ? kmsan_set_origin+0x9e/0x160 [ 882.423720] alloc_pages_vma+0x1555/0x17f0 [ 882.427951] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 882.433049] handle_mm_fault+0x44ca/0x7ed0 [ 882.437269] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.442109] __do_page_fault+0xec6/0x1a10 [ 882.446246] do_page_fault+0xb7/0x250 [ 882.450117] ? page_fault+0x8/0x30 [ 882.453730] page_fault+0x1e/0x30 02:14:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:00 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) [ 882.457161] RIP: 0033:0x4075fa [ 882.460440] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 882.465783] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 882.473044] RDX: 652183b3930cb0b2 RSI: 0000000000000000 RDI: 0000000002630848 [ 882.480305] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 882.487556] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d79a3 [ 882.494900] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 882.511789] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 882.522320] syz-executor1 cpuset=syz1 mems_allowed=0 [ 882.527440] CPU: 1 PID: 16130 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 882.534273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.543625] Call Trace: [ 882.546229] dump_stack+0x185/0x1d0 [ 882.549855] warn_alloc+0x430/0x690 [ 882.553492] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 882.558342] ? kernel_poison_pages+0x40/0x360 [ 882.563201] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 882.568662] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 882.573978] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 882.579048] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.583995] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.588688] kmsan_alloc_page+0x82/0xe0 [ 882.592676] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 882.597449] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.602303] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.606988] ? __should_failslab+0x278/0x2a0 [ 882.611418] ? should_fail+0x57/0xab0 [ 882.615242] ? __should_failslab+0x278/0x2a0 [ 882.619658] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.624509] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.629193] ? kmsan_set_origin+0x9e/0x160 [ 882.633510] alloc_pages_vma+0x1555/0x17f0 [ 882.637758] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 882.642878] handle_mm_fault+0x44ca/0x7ed0 [ 882.647122] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.651997] __do_page_fault+0xec6/0x1a10 [ 882.656163] do_page_fault+0xb7/0x250 02:14:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:14:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:14:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:14:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) [ 882.659966] ? page_fault+0x8/0x30 [ 882.663524] page_fault+0x1e/0x30 [ 882.666975] RIP: 0033:0x4075fa [ 882.670169] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 882.675542] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 882.682820] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 882.690101] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 882.697381] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d7a6f [ 882.704656] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 882.718202] audit: type=1326 audit(1529720040.715:1672): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16123 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 882.773247] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 882.784077] syz-executor1 cpuset=syz1 mems_allowed=0 [ 882.789224] CPU: 1 PID: 16130 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 882.796061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.805418] Call Trace: [ 882.808017] dump_stack+0x185/0x1d0 [ 882.811651] warn_alloc+0x430/0x690 [ 882.816159] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 882.821010] ? kernel_poison_pages+0x40/0x360 [ 882.825534] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 882.831020] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 882.835965] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.840834] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.845689] ? __msan_poison_alloca+0x15c/0x1d0 [ 882.850381] kmsan_alloc_page+0x82/0xe0 [ 882.854371] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 882.859150] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 882.864535] ? find_next_bit+0x25b/0x2a0 [ 882.868619] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 882.874004] ? __mod_node_page_state+0x6d/0x430 [ 882.878692] ? __mod_lruvec_page_state+0x36f/0x750 [ 882.883636] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 882.889023] alloc_pages_vma+0x1555/0x17f0 [ 882.893281] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 882.898406] handle_mm_fault+0x44ca/0x7ed0 [ 882.902745] ? kmsan_set_origin_inline+0x6b/0x120 [ 882.907608] __do_page_fault+0xec6/0x1a10 [ 882.911800] do_page_fault+0xb7/0x250 [ 882.915613] ? page_fault+0x8/0x30 [ 882.919169] page_fault+0x1e/0x30 [ 882.922619] RIP: 0033:0x43cec9 [ 882.925807] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 882.931177] RAX: 0000000020fd5ff8 RBX: 0000000000000000 RCX: 0030656c69662f2e [ 882.938453] RDX: 0000000000000008 RSI: 0000000000730170 RDI: 0000000020fd5ff8 [ 882.945728] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000162 [ 882.953003] R10: 0000000000a3e940 R11: 0000000000000246 R12: 00000000000d7a6f [ 882.960305] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 [ 882.967592] warn_alloc_show_mem: 3 callbacks suppressed [ 882.967594] Mem-Info: [ 882.975382] active_anon:189143 inactive_anon:76 isolated_anon:0 [ 882.975382] active_file:946 inactive_file:496 isolated_file:32 [ 882.975382] unevictable:0 dirty:25 writeback:0 unstable:0 [ 882.975382] slab_reclaimable:3346 slab_unreclaimable:9502 [ 882.975382] mapped:66632 shmem:84 pagetables:1365 bounce:0 [ 882.975382] free:39434 free_pcp:526 free_cma:0 [ 883.008416] Node 0 active_anon:756572kB inactive_anon:304kB active_file:2684kB inactive_file:2564kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:266180kB dirty:100kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 883.036512] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 883.062622] lowmem_reserve[]: 0 2817 7244 7244 [ 883.067208] Node 0 DMA32 free:90464kB min:26224kB low:32780kB high:39336kB active_anon:261540kB inactive_anon:28kB active_file:652kB inactive_file:1720kB unevictable:0kB writepending:100kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2880kB pagetables:2232kB bounce:0kB free_pcp:1064kB local_pcp:360kB free_cma:0kB [ 883.096617] lowmem_reserve[]: 0 0 4426 4426 [ 883.100930] Node 0 Normal free:51872kB min:41208kB low:51508kB high:61808kB active_anon:494916kB inactive_anon:276kB active_file:2608kB inactive_file:668kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:3228kB bounce:0kB free_pcp:1132kB local_pcp:468kB free_cma:0kB [ 883.130175] lowmem_reserve[]: 0 0 0 0 [ 883.134117] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 883.147334] Node 0 DMA32: 381*4kB (UMEH) 3535*8kB (UM) 757*16kB (UM) 410*32kB (UM) 247*64kB (UM) 102*128kB (UM) 26*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 90556kB 02:14:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:14:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:14:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) [ 883.162973] Node 0 Normal: 4898*4kB (UMEH) 1032*8kB (UMEH) 647*16kB (UMEH) 189*32kB (UMH) 117*64kB (UMH) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51864kB [ 883.178280] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 883.186835] 1406 total pagecache pages [ 883.190705] 0 pages in swap cache [ 883.194154] Swap cache stats: add 0, delete 0, find 0/0 [ 883.199500] Free swap = 0kB [ 883.202514] Total swap = 0kB [ 883.205511] 1965969 pages RAM [ 883.208682] 0 pages HighMem/MovableOnly [ 883.212634] 106316 pages reserved [ 883.237604] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 883.248170] syz-executor4 cpuset=syz4 mems_allowed=0 [ 883.253297] CPU: 1 PID: 16148 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 883.260146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.269506] Call Trace: [ 883.272101] dump_stack+0x185/0x1d0 [ 883.275779] warn_alloc+0x430/0x690 [ 883.279465] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 883.284322] ? kernel_poison_pages+0x40/0x360 [ 883.288831] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 883.294307] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 883.299268] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 883.304308] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.309186] ? __msan_poison_alloca+0x15c/0x1d0 [ 883.313887] kmsan_alloc_page+0x82/0xe0 [ 883.317884] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 883.322662] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.327540] ? __msan_poison_alloca+0x15c/0x1d0 [ 883.332323] ? __should_failslab+0x278/0x2a0 [ 883.336750] ? should_fail+0x57/0xab0 [ 883.340570] ? __should_failslab+0x278/0x2a0 [ 883.344998] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.349868] ? __msan_poison_alloca+0x15c/0x1d0 [ 883.354569] ? kmsan_set_origin+0x9e/0x160 [ 883.358837] alloc_pages_vma+0x1555/0x17f0 [ 883.363106] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 883.368269] handle_mm_fault+0x44ca/0x7ed0 [ 883.372540] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.377450] __do_page_fault+0xec6/0x1a10 [ 883.381608] do_page_fault+0xb7/0x250 02:14:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001200)='/dev/rtc0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000001300)={0x8}, 0x0) 02:14:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:14:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') [ 883.385407] ? page_fault+0x8/0x30 [ 883.388976] page_fault+0x1e/0x30 [ 883.392511] RIP: 0033:0x4075fa [ 883.395690] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 883.401042] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 883.408302] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 883.415556] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 883.422810] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d7d45 [ 883.430151] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 883.441959] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 883.452487] syz-executor2 cpuset=syz2 mems_allowed=0 [ 883.457616] CPU: 1 PID: 16155 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 883.464483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.473840] Call Trace: [ 883.476439] dump_stack+0x185/0x1d0 [ 883.480072] warn_alloc+0x430/0x690 [ 883.483778] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 883.488666] ? kernel_poison_pages+0x40/0x360 [ 883.493178] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 883.498645] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 883.503621] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 883.508579] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.513442] ? __msan_poison_alloca+0x15c/0x1d0 [ 883.518147] kmsan_alloc_page+0x82/0xe0 [ 883.522140] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 883.526908] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.531770] ? __msan_poison_alloca+0x15c/0x1d0 [ 883.536449] ? kmem_cache_alloc+0x997/0xb70 [ 883.540785] ? ___slab_alloc+0xc1/0x1f50 [ 883.544855] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.549710] ? __msan_poison_alloca+0x15c/0x1d0 [ 883.554398] ? kmsan_set_origin+0x9e/0x160 [ 883.558653] alloc_pages_vma+0x1555/0x17f0 [ 883.562908] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 883.568032] handle_mm_fault+0x44ca/0x7ed0 [ 883.572275] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.577136] __do_page_fault+0xec6/0x1a10 [ 883.581293] do_page_fault+0xb7/0x250 [ 883.585118] ? page_fault+0x8/0x30 [ 883.588677] page_fault+0x1e/0x30 02:14:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:14:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) [ 883.592131] RIP: 0033:0x4075fa [ 883.595311] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 883.600670] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 883.607943] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 883.615217] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 883.622499] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d7e11 [ 883.629773] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 883.646918] audit: type=1326 audit(1529720041.638:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16158 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:01 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:14:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:14:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) [ 883.909011] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 883.919545] syz-executor5 cpuset=syz5 mems_allowed=0 [ 883.924681] CPU: 1 PID: 16174 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 883.931525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.940890] Call Trace: [ 883.943492] dump_stack+0x185/0x1d0 [ 883.947139] warn_alloc+0x430/0x690 [ 883.950791] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 883.955648] ? kernel_poison_pages+0x40/0x360 [ 883.960168] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 883.965632] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 883.970599] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 883.975553] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.980411] ? __msan_poison_alloca+0x15c/0x1d0 [ 883.985107] kmsan_alloc_page+0x82/0xe0 [ 883.989106] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 883.993879] ? kmsan_set_origin_inline+0x6b/0x120 [ 883.998742] ? __msan_poison_alloca+0x15c/0x1d0 [ 884.003420] ? __should_failslab+0x278/0x2a0 [ 884.007841] ? should_fail+0x57/0xab0 [ 884.011655] ? __should_failslab+0x278/0x2a0 [ 884.016077] ? kmsan_set_origin_inline+0x6b/0x120 [ 884.020941] ? __msan_poison_alloca+0x15c/0x1d0 [ 884.025627] ? kmsan_set_origin+0x9e/0x160 [ 884.029967] alloc_pages_vma+0x1555/0x17f0 [ 884.034222] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 884.039352] handle_mm_fault+0x44ca/0x7ed0 [ 884.043606] ? kmsan_set_origin_inline+0x6b/0x120 [ 884.048478] __do_page_fault+0xec6/0x1a10 [ 884.052665] do_page_fault+0xb7/0x250 [ 884.056487] ? page_fault+0x8/0x30 [ 884.060051] page_fault+0x1e/0x30 [ 884.063519] RIP: 0033:0x4075fa [ 884.066712] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 884.072084] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 884.079366] RDX: feb798c679317740 RSI: 0000000000000000 RDI: 0000000002848848 [ 884.086644] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 884.093926] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d7fe4 [ 884.101238] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 884.108552] warn_alloc_show_mem: 2 callbacks suppressed [ 884.108555] Mem-Info: [ 884.116347] active_anon:189089 inactive_anon:76 isolated_anon:0 [ 884.116347] active_file:1128 inactive_file:964 isolated_file:0 [ 884.116347] unevictable:0 dirty:39 writeback:0 unstable:0 [ 884.116347] slab_reclaimable:3347 slab_unreclaimable:9501 [ 884.116347] mapped:67047 shmem:84 pagetables:1388 bounce:0 [ 884.116347] free:38156 free_pcp:447 free_cma:0 [ 884.149447] Node 0 active_anon:756356kB inactive_anon:304kB active_file:4512kB inactive_file:3856kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268188kB dirty:156kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 884.177382] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 884.203527] lowmem_reserve[]: 0 2817 7244 7244 02:14:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:14:01 executing program 3: request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:02 executing program 3: request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:14:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:14:02 executing program 3: request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 884.208216] Node 0 DMA32 free:86056kB min:26224kB low:32780kB high:39336kB active_anon:261480kB inactive_anon:28kB active_file:2036kB inactive_file:3020kB unevictable:0kB writepending:132kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2624kB pagetables:2440kB bounce:0kB free_pcp:1228kB local_pcp:568kB free_cma:0kB [ 884.237573] lowmem_reserve[]: 0 0 4426 4426 [ 884.241921] Node 0 Normal free:51492kB min:41208kB low:51508kB high:61808kB active_anon:494880kB inactive_anon:276kB active_file:2616kB inactive_file:872kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2964kB bounce:0kB free_pcp:1128kB local_pcp:404kB free_cma:0kB [ 884.271271] lowmem_reserve[]: 0 0 0 0 [ 884.275105] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 884.288341] Node 0 DMA32: 135*4kB (UEH) 3314*8kB (UM) 732*16kB (UM) 406*32kB (UM) 231*64kB (M) 102*128kB (UM) 27*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 86508kB [ 884.303549] Node 0 Normal: 4858*4kB (UMEH) 1050*8kB (UMEH) 646*16kB (UMEH) 190*32kB (UMH) 117*64kB (UMH) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51864kB [ 884.318943] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 884.327598] 2175 total pagecache pages [ 884.331550] 0 pages in swap cache [ 884.335072] Swap cache stats: add 0, delete 0, find 0/0 [ 884.340420] Free swap = 0kB [ 884.343417] Total swap = 0kB [ 884.346416] 1965969 pages RAM [ 884.349500] 0 pages HighMem/MovableOnly [ 884.353450] 106316 pages reserved 02:14:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:14:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:14:02 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) [ 884.502958] audit: type=1326 audit(1529720042.501:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16201 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:02 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 884.605456] audit: type=1326 audit(1529720042.588:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16215 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 884.846184] audit: type=1326 audit(1529720042.844:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16174 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:14:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) 02:14:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') [ 885.146890] audit: type=1326 audit(1529720043.145:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16239 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:14:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:03 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) [ 885.478607] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 885.489151] syz-executor0 cpuset=syz0 mems_allowed=0 [ 885.494280] CPU: 1 PID: 16256 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 885.501120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.510495] Call Trace: [ 885.513093] dump_stack+0x185/0x1d0 [ 885.516735] warn_alloc+0x430/0x690 [ 885.520387] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 885.525242] ? kernel_poison_pages+0x40/0x360 [ 885.529762] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 885.535226] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 885.540194] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 885.545158] ? kmsan_set_origin_inline+0x6b/0x120 [ 885.550014] ? __msan_poison_alloca+0x15c/0x1d0 [ 885.554705] kmsan_alloc_page+0x82/0xe0 [ 885.558688] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 885.563452] ? kmsan_set_origin_inline+0x6b/0x120 [ 885.568297] ? __msan_poison_alloca+0x15c/0x1d0 [ 885.572967] ? __should_failslab+0x278/0x2a0 [ 885.577384] ? should_fail+0x57/0xab0 [ 885.581181] ? __should_failslab+0x278/0x2a0 [ 885.585591] ? kmsan_set_origin_inline+0x6b/0x120 [ 885.590436] ? __msan_poison_alloca+0x15c/0x1d0 [ 885.595111] ? kmsan_set_origin+0x9e/0x160 [ 885.599535] alloc_pages_vma+0x1555/0x17f0 [ 885.603810] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 885.608924] handle_mm_fault+0x44ca/0x7ed0 [ 885.613169] ? kmsan_set_origin_inline+0x6b/0x120 [ 885.618028] __do_page_fault+0xec6/0x1a10 [ 885.622189] do_page_fault+0xb7/0x250 [ 885.626014] ? page_fault+0x8/0x30 [ 885.629557] page_fault+0x1e/0x30 [ 885.633003] RIP: 0033:0x4075fa [ 885.636189] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 885.641548] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 885.648818] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 885.656092] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 885.663470] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d8606 [ 885.670751] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 885.678020] Mem-Info: [ 885.680428] active_anon:189095 inactive_anon:76 isolated_anon:14 [ 885.680428] active_file:533 inactive_file:549 isolated_file:0 [ 885.680428] unevictable:0 dirty:24 writeback:29 unstable:0 [ 885.680428] slab_reclaimable:3343 slab_unreclaimable:9514 [ 885.680428] mapped:66351 shmem:84 pagetables:1351 bounce:0 [ 885.680428] free:38522 free_pcp:531 free_cma:0 [ 885.713499] Node 0 active_anon:756380kB inactive_anon:304kB active_file:2132kB inactive_file:2196kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:265404kB dirty:96kB writeback:116kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 885.741594] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 885.767812] lowmem_reserve[]: 0 2817 7244 7244 [ 885.772476] Node 0 DMA32 free:85800kB min:26224kB low:32780kB high:39336kB active_anon:261700kB inactive_anon:20kB active_file:732kB inactive_file:1172kB unevictable:0kB writepending:172kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:2372kB bounce:0kB free_pcp:812kB local_pcp:180kB free_cma:0kB [ 885.801719] lowmem_reserve[]: 0 0 4426 4426 [ 885.806039] Node 0 Normal free:52384kB min:41208kB low:51508kB high:61808kB active_anon:494912kB inactive_anon:284kB active_file:1544kB inactive_file:1128kB unevictable:0kB writepending:40kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:3032kB bounce:0kB free_pcp:1312kB local_pcp:624kB free_cma:0kB [ 885.835459] lowmem_reserve[]: 0 0 0 0 [ 885.839249] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 885.852450] Node 0 DMA32: 470*4kB (UMEH) 3194*8kB (UM) 626*16kB (UM) 364*32kB (UM) 203*64kB (UM) 91*128kB (UM) 16*256kB (UM) 6*512kB (M) 5*1024kB (M) 0*2048kB 0*4096kB = 86024kB [ 885.868436] Node 0 Normal: 4946*4kB (UMEH) 1069*8kB (UMEH) 649*16kB (UMEH) 195*32kB (UMH) 119*64kB (UMH) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52704kB [ 885.883815] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 885.892370] 1119 total pagecache pages [ 885.896250] 0 pages in swap cache [ 885.899682] Swap cache stats: add 0, delete 0, find 0/0 [ 885.905021] Free swap = 0kB [ 885.908015] Total swap = 0kB [ 885.911011] 1965969 pages RAM [ 885.914096] 0 pages HighMem/MovableOnly [ 885.918048] 106316 pages reserved 02:14:03 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) [ 885.933416] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 885.944028] syz-executor3 cpuset=syz3 mems_allowed=0 [ 885.949159] CPU: 1 PID: 16255 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 885.956004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.965536] Call Trace: [ 885.968141] dump_stack+0x185/0x1d0 [ 885.971783] warn_alloc+0x430/0x690 [ 885.975435] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 885.980289] ? kernel_poison_pages+0x40/0x360 [ 885.984801] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 885.990266] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 885.995218] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 886.000495] ? kmsan_set_origin_inline+0x6b/0x120 [ 886.005331] ? __msan_poison_alloca+0x15c/0x1d0 [ 886.009998] kmsan_alloc_page+0x82/0xe0 [ 886.013976] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 886.018718] ? kmsan_set_origin_inline+0x6b/0x120 [ 886.023560] ? __msan_poison_alloca+0x15c/0x1d0 [ 886.028213] ? __should_failslab+0x278/0x2a0 [ 886.032628] ? should_fail+0x57/0xab0 [ 886.036413] ? __should_failslab+0x278/0x2a0 [ 886.040821] ? kmsan_set_origin_inline+0x6b/0x120 [ 886.045660] ? __msan_poison_alloca+0x15c/0x1d0 [ 886.050317] ? kmsan_set_origin+0x9e/0x160 [ 886.054568] alloc_pages_vma+0x1555/0x17f0 [ 886.058793] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 886.063890] handle_mm_fault+0x44ca/0x7ed0 [ 886.068111] ? kmsan_set_origin_inline+0x6b/0x120 [ 886.072954] __do_page_fault+0xec6/0x1a10 [ 886.077099] do_page_fault+0xb7/0x250 [ 886.080893] ? page_fault+0x8/0x30 [ 886.084420] page_fault+0x1e/0x30 [ 886.087857] RIP: 0033:0x4075fa [ 886.091030] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 886.096380] RAX: 0000000020000140 RBX: 0000000000000000 RCX: 0000000000000000 [ 886.103632] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 886.110887] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 886.118145] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d87cd [ 886.125421] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) 02:14:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 886.230276] audit: type=1326 audit(1529720044.225:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16262 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:04 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000140)='blacklist\x00', 0xfffffffffffffffc) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000001c0)) [ 886.312239] audit: type=1326 audit(1529720044.249:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16257 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 886.332192] audit: type=1326 audit(1529720044.251:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16270 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:04 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) [ 886.463920] audit: type=1326 audit(1529720044.406:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16279 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:04 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') [ 886.670887] warn_alloc: 14 callbacks suppressed [ 886.670903] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 886.686329] syz-executor3 cpuset=syz3 mems_allowed=0 [ 886.691448] CPU: 0 PID: 16293 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 886.698285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.707687] Call Trace: [ 886.710388] dump_stack+0x185/0x1d0 [ 886.714031] warn_alloc+0x430/0x690 02:14:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) [ 886.717677] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 886.722524] ? kernel_poison_pages+0x40/0x360 [ 886.727028] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 886.732484] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 886.737441] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 886.742402] ? kmsan_set_origin_inline+0x6b/0x120 [ 886.747252] ? __msan_poison_alloca+0x15c/0x1d0 [ 886.751929] kmsan_alloc_page+0x82/0xe0 [ 886.755906] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 886.760674] ? should_fail+0x57/0xab0 [ 886.764477] ? __should_failslab+0x278/0x2a0 [ 886.768891] ? __msan_poison_alloca+0x15c/0x1d0 [ 886.773570] ? kmsan_set_origin+0x9e/0x160 [ 886.778694] alloc_pages_vma+0x1555/0x17f0 [ 886.783128] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 886.788248] handle_mm_fault+0x44ca/0x7ed0 [ 886.792495] ? kmsan_set_origin_inline+0x6b/0x120 [ 886.797338] __do_page_fault+0xec6/0x1a10 [ 886.801569] do_page_fault+0xb7/0x250 [ 886.805363] ? page_fault+0x8/0x30 [ 886.808894] page_fault+0x1e/0x30 [ 886.812340] RIP: 0033:0x4075fa [ 886.815514] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 886.820861] RAX: 0000000020000140 RBX: 0000000000000000 RCX: 0000000000000001 [ 886.828211] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 886.835475] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 886.842742] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d8aae [ 886.850019] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 886.857291] warn_alloc_show_mem: 1 callbacks suppressed [ 886.857293] Mem-Info: [ 886.865065] active_anon:189164 inactive_anon:77 isolated_anon:0 [ 886.865065] active_file:1139 inactive_file:931 isolated_file:32 [ 886.865065] unevictable:0 dirty:25 writeback:8 unstable:0 [ 886.865065] slab_reclaimable:3343 slab_unreclaimable:9515 [ 886.865065] mapped:67264 shmem:84 pagetables:1312 bounce:0 [ 886.865065] free:36662 free_pcp:349 free_cma:0 [ 886.898251] Node 0 active_anon:756656kB inactive_anon:308kB active_file:4556kB inactive_file:3724kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:269056kB dirty:100kB writeback:32kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 886.926696] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 886.953081] lowmem_reserve[]: 0 2817 7244 7244 [ 886.957663] Node 0 DMA32 free:79304kB min:26224kB low:32780kB high:39336kB active_anon:261968kB inactive_anon:32kB active_file:1792kB inactive_file:3312kB unevictable:0kB writepending:212kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:3008kB pagetables:2372kB bounce:0kB free_pcp:768kB local_pcp:648kB free_cma:0kB [ 886.986904] lowmem_reserve[]: 0 0 4426 4426 [ 886.991217] Node 0 Normal free:51440kB min:41208kB low:51508kB high:61808kB active_anon:494844kB inactive_anon:276kB active_file:2504kB inactive_file:712kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2876kB bounce:0kB free_pcp:628kB local_pcp:348kB free_cma:0kB [ 887.020635] lowmem_reserve[]: 0 0 0 0 [ 887.024424] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 887.037632] Node 0 DMA32: 76*4kB (UMEH) 2833*8kB (UM) 623*16kB (UM) 345*32kB (UM) 186*64kB (UM) 87*128kB (UM) 16*256kB (UM) 6*512kB (M) 5*1024kB (M) 0*2048kB 0*4096kB = 79304kB [ 887.053533] Node 0 Normal: 4787*4kB (UMEH) 1044*8kB (UME) 643*16kB (UMEH) 194*32kB (UMH) 102*64kB (UMH) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 50652kB 02:14:05 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') [ 887.068750] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 887.077308] 2177 total pagecache pages [ 887.081172] 0 pages in swap cache [ 887.084602] Swap cache stats: add 0, delete 0, find 0/0 [ 887.089958] Free swap = 0kB [ 887.092955] Total swap = 0kB [ 887.095954] 1965969 pages RAM [ 887.099035] 0 pages HighMem/MovableOnly [ 887.103005] 106316 pages reserved [ 887.143445] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 887.153985] syz-executor2 cpuset=syz2 mems_allowed=0 [ 887.159115] CPU: 0 PID: 16307 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 887.165961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.175394] Call Trace: [ 887.177989] dump_stack+0x185/0x1d0 [ 887.181723] warn_alloc+0x430/0x690 [ 887.185364] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 887.190207] ? kernel_poison_pages+0x40/0x360 [ 887.194709] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 887.200171] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 887.205126] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 887.210156] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.215086] ? __msan_poison_alloca+0x15c/0x1d0 [ 887.219768] kmsan_alloc_page+0x82/0xe0 [ 887.223746] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 887.228516] ? should_fail+0x57/0xab0 [ 887.232317] ? __should_failslab+0x278/0x2a0 [ 887.236728] ? __msan_poison_alloca+0x15c/0x1d0 [ 887.241411] ? kmsan_set_origin+0x9e/0x160 [ 887.245664] alloc_pages_vma+0x1555/0x17f0 [ 887.249906] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 887.255024] handle_mm_fault+0x44ca/0x7ed0 [ 887.259266] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.264155] __do_page_fault+0xec6/0x1a10 [ 887.268316] do_page_fault+0xb7/0x250 [ 887.272118] ? page_fault+0x8/0x30 [ 887.275661] page_fault+0x1e/0x30 [ 887.279107] RIP: 0033:0x4075d5 [ 887.282462] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 02:14:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:14:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) 02:14:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockname$inet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0)=0x10) [ 887.287817] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 00000000ffffffff [ 887.295082] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 887.302345] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 887.309601] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d8c87 [ 887.316857] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 887.365521] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 887.376054] syz-executor7 cpuset=syz7 mems_allowed=0 [ 887.381175] CPU: 0 PID: 16314 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 887.388001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.397343] Call Trace: [ 887.399926] dump_stack+0x185/0x1d0 [ 887.403543] warn_alloc+0x430/0x690 [ 887.407163] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 887.412085] ? kernel_poison_pages+0x40/0x360 [ 887.416574] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 887.422045] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 887.426974] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.431799] ? __msan_poison_alloca+0x15c/0x1d0 [ 887.436455] kmsan_alloc_page+0x82/0xe0 [ 887.440414] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 887.445161] ? should_fail+0x57/0xab0 [ 887.448946] ? __should_failslab+0x278/0x2a0 [ 887.453337] ? __msan_poison_alloca+0x15c/0x1d0 [ 887.458005] ? kmsan_set_origin+0x9e/0x160 [ 887.462231] alloc_pages_vma+0x1555/0x17f0 [ 887.466456] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 887.471553] handle_mm_fault+0x44ca/0x7ed0 [ 887.475773] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.480608] __do_page_fault+0xec6/0x1a10 [ 887.484843] do_page_fault+0xb7/0x250 [ 887.488634] ? page_fault+0x8/0x30 [ 887.492164] page_fault+0x1e/0x30 [ 887.495597] RIP: 0033:0x4075fa [ 887.498772] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 887.504115] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 02:14:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) [ 887.511367] RDX: 652183b3930cb0b2 RSI: 0000000000000000 RDI: 0000000002630848 [ 887.518630] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 887.525883] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d8d65 [ 887.533139] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 887.581567] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 887.592109] syz-executor1 cpuset=syz1 mems_allowed=0 [ 887.597231] CPU: 0 PID: 16320 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 887.604068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.613427] Call Trace: [ 887.616027] dump_stack+0x185/0x1d0 [ 887.619673] warn_alloc+0x430/0x690 [ 887.623348] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 887.628222] ? kernel_poison_pages+0x40/0x360 [ 887.632722] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 887.638163] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 887.643101] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 887.648035] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.652869] ? __msan_poison_alloca+0x15c/0x1d0 [ 887.657531] kmsan_alloc_page+0x82/0xe0 [ 887.661491] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 887.666236] ? should_fail+0x57/0xab0 [ 887.670016] ? __should_failslab+0x278/0x2a0 [ 887.674428] ? __msan_poison_alloca+0x15c/0x1d0 [ 887.679167] ? kmsan_set_origin+0x9e/0x160 [ 887.683480] alloc_pages_vma+0x1555/0x17f0 [ 887.687703] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 887.692809] handle_mm_fault+0x44ca/0x7ed0 [ 887.697029] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.701863] __do_page_fault+0xec6/0x1a10 [ 887.706014] do_page_fault+0xb7/0x250 [ 887.709796] ? page_fault+0x8/0x30 [ 887.713320] page_fault+0x1e/0x30 [ 887.716768] RIP: 0033:0x4075fa [ 887.719947] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 887.725298] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 887.732551] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 887.739802] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 887.747142] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d8e3b [ 887.754393] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x501c7}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) [ 887.768825] audit: type=1326 audit(1529720045.761:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16315 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 887.770957] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 887.798981] syz-executor1 cpuset=syz1 mems_allowed=0 [ 887.804091] CPU: 0 PID: 16320 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 887.810910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.820247] Call Trace: [ 887.822833] dump_stack+0x185/0x1d0 [ 887.826446] warn_alloc+0x430/0x690 [ 887.830070] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 887.834927] ? kernel_poison_pages+0x40/0x360 [ 887.839414] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 887.844867] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 887.849783] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.854621] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.859451] ? __msan_poison_alloca+0x15c/0x1d0 [ 887.864207] kmsan_alloc_page+0x82/0xe0 [ 887.868185] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 887.872932] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 887.878282] ? memcg_check_events+0x74/0xe90 [ 887.882676] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.887505] ? wp_page_copy+0x1831/0x2470 [ 887.891646] alloc_pages_vma+0x1555/0x17f0 [ 887.895922] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 887.901015] handle_mm_fault+0x44ca/0x7ed0 [ 887.905252] ? kmsan_set_origin_inline+0x6b/0x120 [ 887.910100] __do_page_fault+0xec6/0x1a10 [ 887.914250] do_page_fault+0xb7/0x250 [ 887.918036] ? page_fault+0x8/0x30 [ 887.921568] page_fault+0x1e/0x30 [ 887.925008] RIP: 0033:0x43cec9 [ 887.928183] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 887.933531] RAX: 0000000020fd5ff8 RBX: 0000000000000000 RCX: 0030656c69662f2e [ 887.940792] RDX: 0000000000000008 RSI: 0000000000730170 RDI: 0000000020fd5ff8 [ 887.948053] RBP: 0000000000000000 R08: 0000000000000016 R09: 000000000000000b [ 887.955312] R10: 0000000000a3e940 R11: 0000000000000246 R12: 00000000000d8e3b [ 887.962565] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 [ 887.969960] warn_alloc_show_mem: 3 callbacks suppressed [ 887.969963] Mem-Info: [ 887.977719] active_anon:189128 inactive_anon:75 isolated_anon:0 [ 887.977719] active_file:1105 inactive_file:717 isolated_file:32 [ 887.977719] unevictable:0 dirty:38 writeback:0 unstable:0 [ 887.977719] slab_reclaimable:3343 slab_unreclaimable:9524 [ 887.977719] mapped:67107 shmem:84 pagetables:1350 bounce:0 [ 887.977719] free:36597 free_pcp:682 free_cma:0 [ 888.011523] Node 0 active_anon:756512kB inactive_anon:300kB active_file:4420kB inactive_file:2868kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:268428kB dirty:152kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 888.039622] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 888.065740] lowmem_reserve[]: 0 2817 7244 7244 [ 888.070325] Node 0 DMA32 free:79568kB min:26224kB low:32780kB high:39336kB active_anon:261540kB inactive_anon:24kB active_file:2272kB inactive_file:2684kB unevictable:0kB writepending:152kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2944kB pagetables:2448kB bounce:0kB free_pcp:1312kB local_pcp:668kB free_cma:0kB [ 888.099658] lowmem_reserve[]: 0 0 4426 4426 [ 888.103970] Node 0 Normal free:50916kB min:41208kB low:51508kB high:61808kB active_anon:494856kB inactive_anon:276kB active_file:2292kB inactive_file:288kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2952kB bounce:0kB free_pcp:1416kB local_pcp:696kB free_cma:0kB [ 888.133204] lowmem_reserve[]: 0 0 0 0 [ 888.136994] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 888.150199] Node 0 DMA32: 158*4kB (UMEH) 2866*8kB (UM) 625*16kB (UM) 346*32kB (UM) 188*64kB (UM) 85*128kB (UM) 15*256kB (UM) 6*512kB (M) 5*1024kB (M) 0*2048kB 0*4096kB = 79576kB [ 888.166462] Node 0 Normal: 4845*4kB (UMEH) 1038*8kB (UMEH) 643*16kB (MEH) 196*32kB (MH) 100*64kB (MH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 50644kB [ 888.181145] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 888.189699] 1957 total pagecache pages [ 888.193568] 0 pages in swap cache [ 888.197002] Swap cache stats: add 0, delete 0, find 0/0 [ 888.202344] Free swap = 0kB [ 888.205352] Total swap = 0kB [ 888.208350] 1965969 pages RAM [ 888.211434] 0 pages HighMem/MovableOnly [ 888.215384] 106316 pages reserved [ 888.252443] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 888.262976] syz-executor3 cpuset=syz3 mems_allowed=0 [ 888.268205] CPU: 1 PID: 16327 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 888.275054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.284446] Call Trace: [ 888.287080] dump_stack+0x185/0x1d0 [ 888.290718] warn_alloc+0x430/0x690 [ 888.294368] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 888.299224] ? kernel_poison_pages+0x40/0x360 [ 888.303830] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 888.309295] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 888.314251] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 888.319208] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.324094] ? __msan_poison_alloca+0x15c/0x1d0 [ 888.328811] kmsan_alloc_page+0x82/0xe0 [ 888.332812] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 888.337600] ? should_fail+0x57/0xab0 [ 888.341422] ? __should_failslab+0x278/0x2a0 [ 888.345849] ? __msan_poison_alloca+0x15c/0x1d0 [ 888.350538] ? kmsan_set_origin+0x9e/0x160 [ 888.354797] alloc_pages_vma+0x1555/0x17f0 [ 888.359159] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 888.364291] handle_mm_fault+0x44ca/0x7ed0 [ 888.368549] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.373511] __do_page_fault+0xec6/0x1a10 [ 888.377684] do_page_fault+0xb7/0x250 [ 888.381498] ? page_fault+0x8/0x30 [ 888.385052] page_fault+0x1e/0x30 [ 888.388508] RIP: 0033:0x4075fa [ 888.391695] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 02:14:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) [ 888.397145] RAX: 0000000020000140 RBX: 0000000000000000 RCX: 0000000000000001 [ 888.404400] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 888.411668] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 888.418925] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d90dc [ 888.426179] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 888.454754] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 888.465719] syz-executor5 cpuset=syz5 mems_allowed=0 [ 888.470855] CPU: 1 PID: 16335 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 888.477699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.487060] Call Trace: [ 888.489668] dump_stack+0x185/0x1d0 [ 888.493306] warn_alloc+0x430/0x690 [ 888.496957] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 888.501930] ? kernel_poison_pages+0x40/0x360 [ 888.506444] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 888.511918] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 888.516883] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 888.521844] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.526695] ? __msan_poison_alloca+0x15c/0x1d0 [ 888.531385] kmsan_alloc_page+0x82/0xe0 [ 888.535405] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 888.540181] ? should_fail+0x57/0xab0 [ 888.544002] ? __should_failslab+0x278/0x2a0 [ 888.548427] ? __msan_poison_alloca+0x15c/0x1d0 [ 888.553135] ? kmsan_set_origin+0x9e/0x160 [ 888.557391] alloc_pages_vma+0x1555/0x17f0 [ 888.561625] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 888.566744] handle_mm_fault+0x44ca/0x7ed0 [ 888.570965] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.575802] __do_page_fault+0xec6/0x1a10 [ 888.579944] do_page_fault+0xb7/0x250 [ 888.583733] ? page_fault+0x8/0x30 [ 888.587259] page_fault+0x1e/0x30 [ 888.590697] RIP: 0033:0x4075fa [ 888.593868] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 888.599214] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 888.606468] RDX: feb798c679317740 RSI: 0000000000000000 RDI: 0000000002848848 [ 888.613725] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 888.621001] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d91a6 [ 888.628260] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) personality(0x0) 02:14:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:06 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') [ 888.787429] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 888.797962] syz-executor3 cpuset=syz3 mems_allowed=0 [ 888.803088] CPU: 1 PID: 16342 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 888.809929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.820095] Call Trace: [ 888.822696] dump_stack+0x185/0x1d0 [ 888.826360] warn_alloc+0x430/0x690 [ 888.830001] __alloc_pages_nodemask+0x5b1c/0x5cc0 02:14:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) [ 888.834883] ? kernel_poison_pages+0x40/0x360 [ 888.839393] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 888.844885] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 888.849838] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.854690] ? __msan_poison_alloca+0x15c/0x1d0 [ 888.859382] kmsan_alloc_page+0x82/0xe0 [ 888.863374] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 888.868154] ? should_fail+0x57/0xab0 [ 888.871971] ? __should_failslab+0x278/0x2a0 [ 888.876389] ? __msan_poison_alloca+0x15c/0x1d0 [ 888.881100] ? kmsan_set_origin+0x9e/0x160 [ 888.885384] alloc_pages_vma+0x1555/0x17f0 [ 888.889645] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 888.894774] handle_mm_fault+0x44ca/0x7ed0 [ 888.899029] ? kmsan_set_origin_inline+0x6b/0x120 [ 888.903902] __do_page_fault+0xec6/0x1a10 [ 888.908170] do_page_fault+0xb7/0x250 [ 888.911981] ? page_fault+0x8/0x30 [ 888.915525] page_fault+0x1e/0x30 [ 888.918978] RIP: 0033:0x4075fa [ 888.922163] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 888.927528] RAX: 0000000020000140 RBX: 0000000000000000 RCX: 0000000000000001 [ 888.934807] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 888.942084] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 888.949364] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d92f3 [ 888.956805] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 888.972382] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 888.982893] syz-executor2 cpuset=syz2 mems_allowed=0 [ 888.987994] CPU: 1 PID: 16343 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 888.994823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.004156] Call Trace: [ 889.006733] dump_stack+0x185/0x1d0 [ 889.010347] warn_alloc+0x430/0x690 [ 889.013975] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 889.018804] ? kernel_poison_pages+0x40/0x360 [ 889.023287] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 889.028735] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.033575] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 889.038512] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.043337] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.047994] kmsan_alloc_page+0x82/0xe0 [ 889.052051] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 889.056803] ? should_fail+0x57/0xab0 [ 889.060594] ? __should_failslab+0x278/0x2a0 [ 889.064988] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.069644] ? kmsan_set_origin+0x9e/0x160 [ 889.073882] alloc_pages_vma+0x1555/0x17f0 [ 889.078108] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 889.083208] handle_mm_fault+0x44ca/0x7ed0 [ 889.087444] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.092283] __do_page_fault+0xec6/0x1a10 [ 889.096422] do_page_fault+0xb7/0x250 [ 889.100211] ? page_fault+0x8/0x30 [ 889.103733] page_fault+0x1e/0x30 [ 889.107167] RIP: 0033:0x4075d5 [ 889.110339] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 889.115706] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 00000000ffffffff [ 889.122961] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 889.130214] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 889.137468] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d93a9 [ 889.144726] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 889.151998] warn_alloc_show_mem: 3 callbacks suppressed [ 889.152000] Mem-Info: [ 889.159743] active_anon:189116 inactive_anon:74 isolated_anon:0 [ 889.159743] active_file:279 inactive_file:1006 isolated_file:32 [ 889.159743] unevictable:0 dirty:48 writeback:0 unstable:0 [ 889.159743] slab_reclaimable:3342 slab_unreclaimable:9525 [ 889.159743] mapped:66485 shmem:84 pagetables:1383 bounce:0 [ 889.159743] free:37438 free_pcp:296 free_cma:0 [ 889.192807] Node 0 active_anon:756464kB inactive_anon:296kB active_file:1116kB inactive_file:4024kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:265940kB dirty:192kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 889.220897] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 889.247012] lowmem_reserve[]: 0 2817 7244 7244 [ 889.251584] Node 0 DMA32 free:82156kB min:26224kB low:32780kB high:39336kB active_anon:261564kB inactive_anon:20kB active_file:804kB inactive_file:1976kB unevictable:0kB writepending:192kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2752kB pagetables:2560kB bounce:0kB free_pcp:888kB local_pcp:152kB free_cma:0kB [ 889.280733] lowmem_reserve[]: 0 0 4426 4426 [ 889.285053] Node 0 Normal free:51692kB min:41208kB low:51508kB high:61808kB active_anon:494900kB inactive_anon:276kB active_file:1052kB inactive_file:2376kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2972kB bounce:0kB free_pcp:296kB local_pcp:116kB free_cma:0kB [ 889.314299] lowmem_reserve[]: 0 0 0 0 [ 889.318098] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 889.331305] Node 0 DMA32: 581*4kB (UMEH) 3108*8kB (UM) 617*16kB (UM) 338*32kB (UM) 177*64kB (UM) 83*128kB (UM) 15*256kB (M) 7*512kB (M) 5*1024kB (UM) 0*2048kB 0*4096kB = 82372kB [ 889.347290] Node 0 Normal: 4796*4kB (UMEH) 1070*8kB (UMEH) 645*16kB (MEH) 198*32kB (MH) 112*64kB (MH) 2*128kB (H) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51824kB [ 889.362320] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 889.370874] 1426 total pagecache pages [ 889.374755] 0 pages in swap cache [ 889.378190] Swap cache stats: add 0, delete 0, find 0/0 [ 889.383532] Free swap = 0kB [ 889.386526] Total swap = 0kB [ 889.389523] 1965969 pages RAM [ 889.392604] 0 pages HighMem/MovableOnly [ 889.396554] 106316 pages reserved [ 889.434491] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 889.445021] syz-executor6 cpuset=syz6 mems_allowed=0 [ 889.450152] CPU: 1 PID: 16341 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 889.456990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.466349] Call Trace: [ 889.468944] dump_stack+0x185/0x1d0 [ 889.472580] warn_alloc+0x430/0x690 [ 889.476219] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 889.481065] ? kernel_poison_pages+0x40/0x360 [ 889.485570] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 889.491029] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.495904] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 889.500851] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.505691] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.510362] kmsan_alloc_page+0x82/0xe0 [ 889.514335] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 889.519089] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.523751] ? kmsan_set_origin+0x9e/0x160 [ 889.527977] alloc_pages_vma+0x1555/0x17f0 [ 889.532201] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 889.537293] handle_mm_fault+0x44ca/0x7ed0 [ 889.541527] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.546360] __do_page_fault+0xec6/0x1a10 [ 889.550501] do_page_fault+0xb7/0x250 [ 889.554311] ? page_fault+0x8/0x30 [ 889.557835] page_fault+0x1e/0x30 [ 889.561269] RIP: 0033:0x4075fa [ 889.564440] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 889.569784] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 889.577037] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 889.584378] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 889.591630] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d9568 [ 889.598882] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 889.608714] audit: type=1326 audit(1529720047.607:1683): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16342 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d00)='./cgroup.net/syz0\x00', 0x200002, 0x0) 02:14:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:07 executing program 0: msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:07 executing program 0: msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:08 executing program 0: msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) [ 890.152365] audit: type=1326 audit(1529720048.151:1684): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16385 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) prctl$setptracer(0x59616d61, 0x0) 02:14:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6}]}) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0xfffffffffffffff9) accept$alg(0xffffffffffffffff, 0x0, 0x0) 02:14:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) prctl$setptracer(0x59616d61, 0x0) 02:14:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') [ 891.237407] audit: type=1326 audit(1529720049.236:1685): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16444 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) prctl$setptracer(0x59616d61, 0x0) 02:14:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) [ 892.103643] audit: type=1326 audit(1529720050.101:1686): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16477 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:10 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) [ 892.415515] warn_alloc: 6 callbacks suppressed [ 892.415551] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 892.423850] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 892.431594] syz-executor6 cpuset=syz6 mems_allowed=0 [ 892.431669] CPU: 0 PID: 16492 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 892.431697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.443014] syz-executor7 cpuset= [ 892.448068] Call Trace: [ 892.448119] dump_stack+0x185/0x1d0 [ 892.448151] warn_alloc+0x430/0x690 [ 892.448219] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 892.455146] syz7 [ 892.464697] ? __msan_poison_alloca+0x15c/0x1d0 [ 892.468216] mems_allowed=0 [ 892.470780] copy_process+0x778/0x9be0 [ 892.470817] ? msan_get_shadow_origin_ptr+0x1d3/0x230 [ 892.501744] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 892.507155] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 892.513167] ? handle_mm_fault+0x1eb0/0x7ed0 [ 892.517601] ? __msan_poison_alloca+0x140/0x1d0 [ 892.522415] _do_fork+0x353/0xf60 [ 892.525913] __x64_sys_clone+0x15e/0x1b0 [ 892.529990] ? __ia32_sys_vfork+0x70/0x70 [ 892.534151] do_syscall_64+0x15b/0x230 [ 892.538163] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 892.543356] RIP: 0033:0x458429 [ 892.546556] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 892.554391] RAX: ffffffffffffffda RBX: 00007f2fa986d700 RCX: 0000000000458429 [ 892.563147] RDX: 00007f2fa986d9d0 RSI: 00007f2fa986cdb0 RDI: 00000000003d0f00 [ 892.570437] RBP: 0000000000a3e8a0 R08: 00007f2fa986d700 R09: 00007f2fa986d700 [ 892.577713] R10: 00007f2fa986d9d0 R11: 0000000000000202 R12: 0000000000000000 [ 892.584984] R13: 0000000000a3e81f R14: 00007f2fa986d9c0 R15: 0000000000000000 [ 892.592288] CPU: 1 PID: 4516 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 892.592589] warn_alloc_show_mem: 1 callbacks suppressed [ 892.592596] Mem-Info: [ 892.599151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.599163] Call Trace: [ 892.599206] dump_stack+0x185/0x1d0 [ 892.599244] warn_alloc+0x430/0x690 [ 892.604694] active_anon:189106 inactive_anon:73 isolated_anon:0 [ 892.604694] active_file:867 inactive_file:1148 isolated_file:45 [ 892.604694] unevictable:0 dirty:10 writeback:0 unstable:0 [ 892.604694] slab_reclaimable:3334 slab_unreclaimable:9527 [ 892.604694] mapped:66956 shmem:84 pagetables:1371 bounce:0 [ 892.604694] free:36241 free_pcp:31 free_cma:0 [ 892.607048] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 892.607107] ? __msan_poison_alloca+0x15c/0x1d0 [ 892.616500] Node 0 active_anon:756424kB inactive_anon:292kB active_file:3468kB inactive_file:4592kB unevictable:0kB isolated(anon):0kB isolated(file):180kB mapped:267824kB dirty:40kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 892.619081] copy_process+0x778/0x9be0 [ 892.622686] Node 0 [ 892.626314] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 892.626418] ? ptep_set_access_flags+0x10e/0x1d0 [ 892.662992] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 892.667758] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 892.667815] ? handle_mm_fault+0x1eb0/0x7ed0 [ 892.672461] lowmem_reserve[]: [ 892.700499] ? __msan_poison_alloca+0x141/0x1d0 [ 892.700562] _do_fork+0x353/0xf60 [ 892.704439] 0 [ 892.706679] __x64_sys_clone+0x15e/0x1b0 [ 892.706715] ? __ia32_sys_vfork+0x70/0x70 [ 892.712266] 2817 [ 892.717069] do_syscall_64+0x15b/0x230 [ 892.717106] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 892.717141] RIP: 0033:0x45414a [ 892.742841] 7244 [ 892.748261] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 892.748290] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 892.748315] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 892.752727] 7244 [ 892.755825] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000002630940 [ 892.755842] R10: 0000000002630c10 R11: 0000000000000246 R12: 0000000000000001 [ 892.755866] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 892.837750] Node 0 DMA32 free:77876kB min:26224kB low:32780kB high:39336kB active_anon:261492kB inactive_anon:20kB active_file:1688kB inactive_file:2096kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2624kB pagetables:2376kB bounce:0kB free_pcp:728kB local_pcp:0kB free_cma:0kB 02:14:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') [ 892.867438] lowmem_reserve[]: 0 0 4426 4426 [ 892.872182] Node 0 Normal free:51504kB min:41208kB low:51508kB high:61808kB active_anon:495000kB inactive_anon:284kB active_file:1572kB inactive_file:1536kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2952kB bounce:0kB free_pcp:452kB local_pcp:0kB free_cma:0kB [ 892.901798] lowmem_reserve[]: 0 0 0 0 02:14:10 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) [ 892.905906] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 892.919618] Node 0 DMA32: 272*4kB (UMEH) 2831*8kB (UM) 641*16kB (UM) 346*32kB (UM) 177*64kB (UM) 79*128kB (UM) 16*256kB (UM) 6*512kB (M) 3*1024kB (UM) 0*2048kB 0*4096kB = 76744kB [ 892.936171] Node 0 Normal: 4666*4kB (UMEH) 1120*8kB (UMEH) 658*16kB (UMEH) 199*32kB (UMH) 105*64kB (UMH) 2*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51752kB [ 892.952062] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 892.960879] 1703 total pagecache pages [ 892.964864] 0 pages in swap cache [ 892.968401] Swap cache stats: add 0, delete 0, find 0/0 [ 892.973856] Free swap = 0kB [ 892.976951] Total swap = 0kB [ 892.980101] 1965969 pages RAM [ 892.983259] 0 pages HighMem/MovableOnly [ 892.987319] 106316 pages reserved 02:14:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) 02:14:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:11 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) [ 893.390499] audit: type=1326 audit(1529720051.388:1687): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16523 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) [ 893.443294] device bridge_slave_1 left promiscuous mode [ 893.449135] bridge0: port 2(bridge_slave_1) entered disabled state [ 893.532029] device bridge_slave_0 left promiscuous mode [ 893.537863] bridge0: port 1(bridge_slave_0) entered disabled state 02:14:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:11 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) [ 893.686955] audit: type=1326 audit(1529720051.685:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16539 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) [ 893.752207] team0 (unregistering): Port device team_slave_1 removed [ 893.791791] team0 (unregistering): Port device team_slave_0 removed 02:14:11 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) [ 893.831134] bond0 (unregistering): Releasing backup interface bond_slave_1 02:14:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') [ 893.893940] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 894.025560] bond0 (unregistering): Released all slaves 02:14:12 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:12 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:12 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'teql0\x00'}) [ 894.475970] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 894.487509] syz-executor7 cpuset=/ mems_allowed=0 [ 894.492914] CPU: 0 PID: 16543 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 894.499785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.509173] Call Trace: [ 894.511822] dump_stack+0x185/0x1d0 [ 894.515494] warn_alloc+0x430/0x690 [ 894.519184] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 894.524093] ? __msan_poison_alloca+0x15c/0x1d0 [ 894.528834] copy_process+0x778/0x9be0 [ 894.532766] ? __msan_poison_alloca+0x15c/0x1d0 [ 894.537568] ? handle_mm_fault+0x74eb/0x7ed0 [ 894.542039] ? handle_mm_fault+0x74eb/0x7ed0 [ 894.546682] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 894.552088] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 894.558112] ? handle_mm_fault+0x1eb0/0x7ed0 [ 894.562557] ? __msan_poison_alloca+0x141/0x1d0 [ 894.567280] _do_fork+0x353/0xf60 [ 894.570786] __x64_sys_clone+0x15e/0x1b0 [ 894.574888] ? __ia32_sys_vfork+0x70/0x70 [ 894.579062] do_syscall_64+0x15b/0x230 [ 894.583079] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 894.588288] RIP: 0033:0x458429 [ 894.591493] RSP: 002b:00007ffd038061b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 894.599344] RAX: ffffffffffffffda RBX: 00007ffd03806270 RCX: 0000000000458429 [ 894.606724] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 894.614013] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 894.621304] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 894.628594] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 894.636424] warn_alloc_show_mem: 1 callbacks suppressed [ 894.636431] Mem-Info: [ 894.644525] active_anon:189139 inactive_anon:78 isolated_anon:14 [ 894.644525] active_file:621 inactive_file:622 isolated_file:63 [ 894.644525] unevictable:0 dirty:25 writeback:0 unstable:0 [ 894.644525] slab_reclaimable:3326 slab_unreclaimable:9449 [ 894.644525] mapped:66595 shmem:84 pagetables:1278 bounce:0 [ 894.644525] free:36034 free_pcp:189 free_cma:0 [ 894.677786] Node 0 active_anon:756556kB inactive_anon:312kB active_file:2484kB inactive_file:2488kB unevictable:0kB isolated(anon):56kB isolated(file):40kB mapped:266380kB dirty:100kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 894.706186] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 894.732725] lowmem_reserve[]: 0 2817 7244 7244 [ 894.737557] Node 0 DMA32 free:76264kB min:26224kB low:32780kB high:39336kB active_anon:261596kB inactive_anon:40kB active_file:1140kB inactive_file:1908kB unevictable:0kB writepending:72kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:2176kB bounce:0kB free_pcp:600kB local_pcp:12kB free_cma:0kB [ 894.767751] lowmem_reserve[]: 0 0 4426 4426 [ 894.772319] Node 0 Normal free:51136kB min:41208kB low:51508kB high:61808kB active_anon:494892kB inactive_anon:272kB active_file:1788kB inactive_file:412kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2984kB bounce:0kB free_pcp:184kB local_pcp:0kB free_cma:0kB [ 894.801677] lowmem_reserve[]: 0 0 0 0 [ 894.805856] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 894.819621] Node 0 DMA32: 335*4kB (UMEH) 2664*8kB (UME) 545*16kB (ME) 285*32kB (UME) 144*64kB (UME) 63*128kB (UM) 20*256kB (UM) 12*512kB (M) 3*1024kB (ME) 2*2048kB (M) 0*4096kB = 76204kB [ 894.837062] Node 0 Normal: 4930*4kB (UMEH) 1050*8kB (UMEH) 643*16kB (UME) 199*32kB (UMH) 104*64kB (UMH) 2*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51944kB [ 894.853587] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 894.862547] 1340 total pagecache pages [ 894.866693] 0 pages in swap cache [ 894.870352] Swap cache stats: add 0, delete 0, find 0/0 [ 894.875791] Free swap = 0kB [ 894.878899] Total swap = 0kB [ 894.881984] 1965969 pages RAM [ 894.885162] 0 pages HighMem/MovableOnly [ 894.889190] 106316 pages reserved [ 894.893321] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 894.904801] syz-executor1 cpuset=syz1 mems_allowed=0 [ 894.910082] CPU: 1 PID: 16570 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 894.916990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.926373] Call Trace: [ 894.928996] dump_stack+0x185/0x1d0 [ 894.932643] warn_alloc+0x430/0x690 [ 894.936413] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 894.941302] ? __msan_poison_alloca+0x15c/0x1d0 [ 894.946064] copy_process+0x778/0x9be0 [ 894.949996] ? __msan_poison_alloca+0x15c/0x1d0 [ 894.954697] ? handle_mm_fault+0x74eb/0x7ed0 [ 894.959132] ? handle_mm_fault+0x74eb/0x7ed0 [ 894.963563] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 894.968954] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 894.974949] ? handle_mm_fault+0x1eb0/0x7ed0 [ 894.979367] ? __msan_poison_alloca+0x140/0x1d0 [ 894.984082] _do_fork+0x353/0xf60 [ 894.987567] __x64_sys_clone+0x15e/0x1b0 [ 894.991642] ? __ia32_sys_vfork+0x70/0x70 [ 894.995795] do_syscall_64+0x15b/0x230 [ 894.999702] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 895.004917] RIP: 0033:0x458429 [ 895.008118] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 895.015839] RAX: ffffffffffffffda RBX: 00007f678b5c8700 RCX: 0000000000458429 02:14:13 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) [ 895.023123] RDX: 00007f678b5c89d0 RSI: 00007f678b5c7db0 RDI: 00000000003d0f00 [ 895.030398] RBP: 0000000000a3e8a0 R08: 00007f678b5c8700 R09: 00007f678b5c8700 [ 895.037670] R10: 00007f678b5c89d0 R11: 0000000000000202 R12: 0000000000000000 [ 895.044944] R13: 0000000000a3e81f R14: 00007f678b5c89c0 R15: 0000000000000000 [ 895.147748] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 895.158955] udevd cpuset=/ mems_allowed=0 [ 895.163510] CPU: 0 PID: 4472 Comm: udevd Not tainted 4.17.0+ #9 [ 895.169597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.179011] Call Trace: [ 895.181685] dump_stack+0x185/0x1d0 [ 895.185450] warn_alloc+0x430/0x690 [ 895.189151] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 895.194078] ? __msan_poison_alloca+0x15c/0x1d0 [ 895.198856] copy_process+0x778/0x9be0 [ 895.202775] ? expand_files+0x5b/0xe00 [ 895.206693] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 895.212065] ? expand_files+0xa6/0xe00 [ 895.215980] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 895.221351] ? find_next_zero_bit+0x12b/0x2f0 [ 895.225889] ? __msan_poison_alloca+0x141/0x1d0 [ 895.230663] _do_fork+0x353/0xf60 [ 895.234143] __x64_sys_clone+0x15e/0x1b0 [ 895.238217] ? __ia32_sys_vfork+0x70/0x70 [ 895.242369] do_syscall_64+0x15b/0x230 [ 895.246271] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 895.251461] RIP: 0033:0x7f71b28ebf46 [ 895.255179] RSP: 002b:00007ffcb86b4310 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 895.262900] RAX: ffffffffffffffda RBX: 00007ffcb86b4310 RCX: 00007f71b28ebf46 [ 895.270180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 895.277455] RBP: 00007ffcb86b4370 R08: 0000000000001178 R09: 0000000000001178 [ 895.284731] R10: 00007f71b3208a70 R11: 0000000000000246 R12: 0000000000000000 [ 895.292005] R13: 00007ffcb86b4330 R14: 0000000000000005 R15: 0000000000000005 [ 895.508353] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 895.519886] syz-executor6 cpuset=syz6 mems_allowed=0 [ 895.525197] CPU: 1 PID: 16577 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 895.532084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.541488] Call Trace: [ 895.544140] dump_stack+0x185/0x1d0 [ 895.547831] warn_alloc+0x430/0x690 [ 895.551568] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 895.556510] ? __msan_poison_alloca+0x15c/0x1d0 [ 895.561365] copy_process+0x778/0x9be0 [ 895.565320] ? __msan_poison_alloca+0x15c/0x1d0 [ 895.570039] ? handle_mm_fault+0x74eb/0x7ed0 [ 895.574493] ? handle_mm_fault+0x74eb/0x7ed0 [ 895.578929] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 895.584341] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 895.590335] ? handle_mm_fault+0x1eb0/0x7ed0 [ 895.594766] ? __msan_poison_alloca+0x140/0x1d0 [ 895.599464] _do_fork+0x353/0xf60 [ 895.602951] __x64_sys_clone+0x15e/0x1b0 [ 895.607035] ? __ia32_sys_vfork+0x70/0x70 [ 895.611194] do_syscall_64+0x15b/0x230 [ 895.615110] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 895.620303] RIP: 0033:0x458429 [ 895.623516] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 895.631254] RAX: ffffffffffffffda RBX: 00007f2fa986d700 RCX: 0000000000458429 [ 895.638612] RDX: 00007f2fa986d9d0 RSI: 00007f2fa986cdb0 RDI: 00000000003d0f00 [ 895.645889] RBP: 0000000000a3e8a0 R08: 00007f2fa986d700 R09: 00007f2fa986d700 [ 895.653171] R10: 00007f2fa986d9d0 R11: 0000000000000202 R12: 0000000000000000 [ 895.660443] R13: 0000000000a3e81f R14: 00007f2fa986d9c0 R15: 0000000000000000 [ 895.668000] warn_alloc_show_mem: 2 callbacks suppressed [ 895.668017] Mem-Info: [ 895.676014] active_anon:189137 inactive_anon:76 isolated_anon:0 [ 895.676014] active_file:1097 inactive_file:1124 isolated_file:1 [ 895.676014] unevictable:0 dirty:24 writeback:0 unstable:0 [ 895.676014] slab_reclaimable:3324 slab_unreclaimable:9450 [ 895.676014] mapped:61188 shmem:84 pagetables:1379 bounce:0 [ 895.676014] free:35530 free_pcp:288 free_cma:0 [ 895.709397] Node 0 active_anon:756548kB inactive_anon:304kB active_file:3548kB inactive_file:4132kB unevictable:0kB isolated(anon):0kB isolated(file):164kB mapped:244520kB dirty:96kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 895.737510] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 895.763823] lowmem_reserve[]: 0 2817 7244 7244 [ 895.768538] Node 0 DMA32 free:75532kB min:26224kB low:32780kB high:39336kB active_anon:261832kB inactive_anon:20kB active_file:2632kB inactive_file:3412kB unevictable:0kB writepending:100kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2176kB pagetables:2352kB bounce:0kB free_pcp:476kB local_pcp:164kB free_cma:0kB [ 895.798032] lowmem_reserve[]: 0 0 4426 4426 [ 895.802527] Node 0 Normal free:51256kB min:41208kB low:51508kB high:61808kB active_anon:494840kB inactive_anon:280kB active_file:1412kB inactive_file:568kB unevictable:0kB writepending:88kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7488kB pagetables:3008kB bounce:0kB free_pcp:508kB local_pcp:36kB free_cma:0kB [ 895.832002] lowmem_reserve[]: 0 0 0 0 [ 895.835976] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 895.849581] Node 0 DMA32: 911*4kB (UMEH) 2495*8kB (UME) 727*16kB (UME) 922*32kB (UME) 775*64kB (UME) 104*128kB (UM) 38*256kB (UM) 16*512kB (UM) 4*1024kB (ME) 2*2048kB (M) 0*4096kB = 153764kB [ 895.867043] Node 0 Normal: 4804*4kB (UMEH) 1078*8kB (UMEH) 660*16kB (UMEH) 198*32kB (UM) 109*64kB (UMH) 2*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 52224kB [ 895.883447] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 895.892175] 2090 total pagecache pages [ 895.896166] 0 pages in swap cache [ 895.899748] Swap cache stats: add 0, delete 0, find 0/0 [ 895.905209] Free swap = 0kB [ 895.908339] Total swap = 0kB [ 895.911445] 1965969 pages RAM [ 895.914680] 0 pages HighMem/MovableOnly [ 895.918747] 106316 pages reserved [ 898.589633] IPVS: ftp: loaded support on port[0] = 21 [ 899.445394] bridge0: port 1(bridge_slave_0) entered blocking state [ 899.451863] bridge0: port 1(bridge_slave_0) entered disabled state [ 899.459339] device bridge_slave_0 entered promiscuous mode [ 899.498063] bridge0: port 2(bridge_slave_1) entered blocking state [ 899.504597] bridge0: port 2(bridge_slave_1) entered disabled state [ 899.512040] device bridge_slave_1 entered promiscuous mode [ 899.550026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 899.588734] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 899.705487] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 899.747033] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 899.925404] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 899.932694] team0: Port device team_slave_0 added [ 899.970038] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 899.977733] team0: Port device team_slave_1 added [ 900.016601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 900.056863] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 900.097854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 900.139673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 900.532680] bridge0: port 2(bridge_slave_1) entered blocking state [ 900.539455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 900.546474] bridge0: port 1(bridge_slave_0) entered blocking state [ 900.552940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 900.560781] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 901.279638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 902.071754] 8021q: adding VLAN 0 to HW filter on device bond0 [ 902.217796] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 902.359006] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 902.365347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 902.373541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 902.512237] 8021q: adding VLAN 0 to HW filter on device team0 [ 903.376122] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 903.386658] syz-executor7 cpuset=syz7 mems_allowed=0 [ 903.391796] CPU: 0 PID: 16841 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 903.398643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.408353] Call Trace: [ 903.410958] dump_stack+0x185/0x1d0 [ 903.414612] warn_alloc+0x430/0x690 [ 903.418262] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 903.423122] ? kernel_poison_pages+0x40/0x360 [ 903.427747] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 903.433584] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 903.439430] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 903.444478] ? kmsan_set_origin_inline+0x6b/0x120 [ 903.449329] ? __msan_poison_alloca+0x15c/0x1d0 [ 903.454112] kmsan_alloc_page+0x82/0xe0 [ 903.458109] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 903.462884] ? kmsan_set_origin_inline+0x6b/0x120 [ 903.467761] ? __msan_poison_alloca+0x15c/0x1d0 [ 903.472445] ? __should_failslab+0x278/0x2a0 [ 903.476963] ? should_fail+0x57/0xab0 [ 903.480771] ? __should_failslab+0x278/0x2a0 [ 903.485195] ? kmsan_set_origin_inline+0x6b/0x120 [ 903.490049] ? __msan_poison_alloca+0x15c/0x1d0 [ 903.494817] ? kmsan_set_origin+0x9e/0x160 [ 903.499158] alloc_pages_vma+0x1555/0x17f0 [ 903.503405] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 903.508527] handle_mm_fault+0x44ca/0x7ed0 [ 903.512882] ? kmsan_set_origin_inline+0x6b/0x120 [ 903.517754] __do_page_fault+0xec6/0x1a10 [ 903.521922] do_page_fault+0xb7/0x250 [ 903.525735] ? page_fault+0x8/0x30 [ 903.529278] page_fault+0x1e/0x30 [ 903.532729] RIP: 0033:0x4075fa [ 903.535932] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 903.541298] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 903.549093] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 903.556375] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 903.563647] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dcbef [ 903.570916] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 903.578191] Mem-Info: [ 903.580639] active_anon:163421 inactive_anon:78 isolated_anon:14 [ 903.580639] active_file:1107 inactive_file:5861 isolated_file:0 [ 903.580639] unevictable:0 dirty:31 writeback:0 unstable:0 [ 903.580639] slab_reclaimable:3327 slab_unreclaimable:9502 [ 903.580639] mapped:71875 shmem:84 pagetables:1134 bounce:0 [ 903.580639] free:97285 free_pcp:262 free_cma:0 [ 903.613911] Node 0 active_anon:653684kB inactive_anon:312kB active_file:4428kB inactive_file:23444kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:287500kB dirty:124kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 903.642213] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 903.668508] lowmem_reserve[]: 0 2817 7244 7244 [ 903.673086] Node 0 DMA32 free:259360kB min:26224kB low:32780kB high:39336kB active_anon:223056kB inactive_anon:24kB active_file:1828kB inactive_file:20944kB unevictable:0kB writepending:36kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1792kB pagetables:1580kB bounce:0kB free_pcp:756kB local_pcp:716kB free_cma:0kB [ 903.702427] lowmem_reserve[]: 0 0 4426 4426 [ 903.706748] Node 0 Normal free:113876kB min:41208kB low:51508kB high:61808kB active_anon:430744kB inactive_anon:288kB active_file:2784kB inactive_file:3316kB unevictable:0kB writepending:88kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2956kB bounce:0kB free_pcp:292kB local_pcp:212kB free_cma:0kB [ 903.736166] lowmem_reserve[]: 0 0 0 0 [ 903.739989] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 903.753214] Node 0 DMA32: 11964*4kB (UMEH) 6300*8kB (UME) 2356*16kB (UME) 1116*32kB (UME) 789*64kB (UME) 103*128kB (UM) 36*256kB (UM) 17*512kB (UM) 4*1024kB (ME) 1*2048kB (M) 0*4096kB = 259408kB [ 903.770682] Node 0 Normal: 10195*4kB (UMEH) 4258*8kB (UMEH) 885*16kB (UMEH) 280*32kB (UMEH) 176*64kB (UMH) 15*128kB (UMH) 3*256kB (UM) 0*512kB 0*1024kB 1*2048kB (M) 0*4096kB = 113964kB [ 903.787317] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 903.795895] 7068 total pagecache pages [ 903.799790] 0 pages in swap cache [ 903.803248] Swap cache stats: add 0, delete 0, find 0/0 [ 903.808613] Free swap = 0kB [ 903.811623] Total swap = 0kB [ 903.814637] 1965969 pages RAM [ 903.817727] 0 pages HighMem/MovableOnly [ 903.821681] 106316 pages reserved [ 904.060835] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 904.071795] syz-executor4 cpuset=syz4 mems_allowed=0 [ 904.076923] CPU: 0 PID: 16849 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 904.083970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.093332] Call Trace: [ 904.095932] dump_stack+0x185/0x1d0 [ 904.099571] warn_alloc+0x430/0x690 [ 904.103224] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 904.108087] ? kernel_poison_pages+0x40/0x360 [ 904.112609] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 904.118078] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 904.123046] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 904.128126] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.133095] ? __msan_poison_alloca+0x15c/0x1d0 [ 904.137877] kmsan_alloc_page+0x82/0xe0 [ 904.141880] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 904.146659] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.151513] ? __msan_poison_alloca+0x15c/0x1d0 [ 904.156194] ? __should_failslab+0x278/0x2a0 [ 904.160628] ? should_fail+0x57/0xab0 [ 904.164438] ? __should_failslab+0x278/0x2a0 [ 904.168862] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.173718] ? __msan_poison_alloca+0x15c/0x1d0 [ 904.178410] ? kmsan_set_origin+0x9e/0x160 [ 904.182670] alloc_pages_vma+0x1555/0x17f0 [ 904.186928] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 904.192060] handle_mm_fault+0x44ca/0x7ed0 [ 904.196315] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.201187] __do_page_fault+0xec6/0x1a10 [ 904.205362] do_page_fault+0xb7/0x250 [ 904.209177] ? page_fault+0x8/0x30 [ 904.212732] page_fault+0x1e/0x30 [ 904.216188] RIP: 0033:0x4075fa [ 904.219377] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 904.224742] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 904.232020] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 904.239296] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 904.246576] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dce9c [ 904.253862] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 904.315289] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 904.325916] syz-executor5 cpuset=syz5 mems_allowed=0 [ 904.331030] CPU: 0 PID: 16855 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 904.337861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.347210] Call Trace: [ 904.349797] dump_stack+0x185/0x1d0 [ 904.353414] warn_alloc+0x430/0x690 [ 904.357038] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 904.361868] ? kernel_poison_pages+0x40/0x360 [ 904.366441] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 904.371969] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 904.376926] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 904.381864] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.386692] ? __msan_poison_alloca+0x15c/0x1d0 [ 904.391441] kmsan_alloc_page+0x82/0xe0 [ 904.395404] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 904.400234] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.405063] ? __msan_poison_alloca+0x15c/0x1d0 [ 904.409725] ? __should_failslab+0x278/0x2a0 [ 904.414129] ? should_fail+0x57/0xab0 [ 904.417943] ? __should_failslab+0x278/0x2a0 [ 904.422339] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.427174] ? __msan_poison_alloca+0x15c/0x1d0 [ 904.431847] ? kmsan_set_origin+0x9e/0x160 [ 904.436095] alloc_pages_vma+0x1555/0x17f0 [ 904.440856] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 904.445950] handle_mm_fault+0x44ca/0x7ed0 [ 904.450174] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.455014] __do_page_fault+0xec6/0x1a10 [ 904.459153] do_page_fault+0xb7/0x250 02:14:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:22 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:22 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:22 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) [ 904.462941] ? page_fault+0x8/0x30 [ 904.466467] page_fault+0x1e/0x30 [ 904.469905] RIP: 0033:0x4075fa [ 904.473167] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 904.478514] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000000 [ 904.485767] RDX: feb798c679317740 RSI: 0000000000000000 RDI: 0000000002848848 [ 904.493047] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 904.500316] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dcf96 [ 904.507604] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 904.526479] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 904.537100] syz-executor3 cpuset=syz3 mems_allowed=0 [ 904.542232] CPU: 0 PID: 16859 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 904.549071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.558431] Call Trace: [ 904.561035] dump_stack+0x185/0x1d0 [ 904.564706] warn_alloc+0x430/0x690 [ 904.568362] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 904.573227] ? kernel_poison_pages+0x40/0x360 [ 904.577743] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 904.583214] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 904.588205] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 904.593169] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.598038] ? __msan_poison_alloca+0x15c/0x1d0 [ 904.602824] kmsan_alloc_page+0x82/0xe0 [ 904.606819] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 904.611602] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.616460] ? __msan_poison_alloca+0x15c/0x1d0 [ 904.621145] ? __should_failslab+0x278/0x2a0 [ 904.625572] ? should_fail+0x57/0xab0 [ 904.629365] ? __should_failslab+0x278/0x2a0 [ 904.633759] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.638592] ? __msan_poison_alloca+0x15c/0x1d0 [ 904.643263] ? kmsan_set_origin+0x9e/0x160 [ 904.647491] alloc_pages_vma+0x1555/0x17f0 [ 904.651718] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 904.656902] handle_mm_fault+0x44ca/0x7ed0 [ 904.661141] ? kmsan_set_origin_inline+0x6b/0x120 [ 904.666002] __do_page_fault+0xec6/0x1a10 [ 904.670200] do_page_fault+0xb7/0x250 [ 904.673986] ? page_fault+0x8/0x30 [ 904.677513] page_fault+0x1e/0x30 [ 904.680950] RIP: 0033:0x4075fa [ 904.684123] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 904.689473] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 904.696816] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 904.704076] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 904.711337] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dd06e [ 904.718601] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 904.725869] warn_alloc_show_mem: 2 callbacks suppressed [ 904.725872] Mem-Info: [ 904.733639] active_anon:163509 inactive_anon:76 isolated_anon:0 [ 904.733639] active_file:1629 inactive_file:5374 isolated_file:0 [ 904.733639] unevictable:0 dirty:11 writeback:0 unstable:0 [ 904.733639] slab_reclaimable:3327 slab_unreclaimable:9511 [ 904.733639] mapped:71603 shmem:84 pagetables:1208 bounce:0 [ 904.733639] free:94697 free_pcp:410 free_cma:0 [ 904.766710] Node 0 active_anon:654036kB inactive_anon:304kB active_file:6516kB inactive_file:21496kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:286412kB dirty:44kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 904.794909] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 904.821118] lowmem_reserve[]: 0 2817 7244 7244 [ 904.825699] Node 0 DMA32 free:260508kB min:26224kB low:32780kB high:39336kB active_anon:223052kB inactive_anon:16kB active_file:2208kB inactive_file:17648kB unevictable:0kB writepending:8kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1792kB pagetables:1580kB bounce:0kB free_pcp:780kB local_pcp:740kB free_cma:0kB [ 904.855034] lowmem_reserve[]: 0 0 4426 4426 [ 904.859354] Node 0 Normal free:102376kB min:41208kB low:51508kB high:61808kB active_anon:430928kB inactive_anon:288kB active_file:4076kB inactive_file:3796kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7872kB pagetables:3252kB bounce:0kB free_pcp:860kB local_pcp:164kB free_cma:0kB [ 904.888767] lowmem_reserve[]: 0 0 0 0 [ 904.892561] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 904.905866] Node 0 DMA32: 12013*4kB (UMEH) 6661*8kB (UME) 2347*16kB (UME) 1096*32kB (UME) 774*64kB (UME) 98*128kB (UM) 35*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 1*2048kB (M) 0*4096kB = 260876kB [ 904.923250] Node 0 Normal: 9160*4kB (UMEH) 4232*8kB (UMEH) 880*16kB (UMEH) 281*32kB (UMEH) 119*64kB (UMH) 4*128kB (MH) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 101952kB [ 904.939175] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 904.947736] 7074 total pagecache pages [ 904.951606] 0 pages in swap cache [ 904.955123] Swap cache stats: add 0, delete 0, find 0/0 [ 904.960565] Free swap = 0kB [ 904.963599] Total swap = 0kB [ 904.966630] 1965969 pages RAM [ 904.969755] 0 pages HighMem/MovableOnly [ 904.973835] 106316 pages reserved [ 904.988268] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 904.998980] syz-executor1 cpuset=syz1 mems_allowed=0 [ 905.004111] CPU: 0 PID: 16860 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 905.010959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.020341] Call Trace: [ 905.022944] dump_stack+0x185/0x1d0 [ 905.026600] warn_alloc+0x430/0x690 [ 905.030425] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 905.035272] ? kernel_poison_pages+0x40/0x360 [ 905.039782] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 905.045269] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 905.050224] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 905.055262] ? kmsan_set_origin_inline+0x6b/0x120 [ 905.060124] ? __msan_poison_alloca+0x15c/0x1d0 [ 905.064846] kmsan_alloc_page+0x82/0xe0 [ 905.068839] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 905.073639] ? kmsan_set_origin_inline+0x6b/0x120 [ 905.078495] ? __msan_poison_alloca+0x15c/0x1d0 [ 905.083176] ? __should_failslab+0x278/0x2a0 [ 905.087605] ? should_fail+0x57/0xab0 [ 905.091419] ? __should_failslab+0x278/0x2a0 [ 905.095846] ? kmsan_set_origin_inline+0x6b/0x120 [ 905.100706] ? __msan_poison_alloca+0x15c/0x1d0 [ 905.105393] ? kmsan_set_origin+0x9e/0x160 [ 905.109658] alloc_pages_vma+0x1555/0x17f0 [ 905.113917] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 905.119047] handle_mm_fault+0x44ca/0x7ed0 [ 905.123301] ? kmsan_set_origin_inline+0x6b/0x120 [ 905.128174] __do_page_fault+0xec6/0x1a10 [ 905.132361] do_page_fault+0xb7/0x250 02:14:23 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:23 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) [ 905.136185] ? page_fault+0x8/0x30 [ 905.139832] page_fault+0x1e/0x30 [ 905.143293] RIP: 0033:0x4075fa [ 905.146484] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 905.151855] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 905.159135] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 905.166420] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 905.173700] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dd23b [ 905.180975] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:23 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) [ 905.204882] audit: type=1326 audit(1529720063.203:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16862 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:23 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) [ 905.310459] audit: type=1326 audit(1529720063.237:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16857 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:23 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000001c0)) 02:14:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) [ 906.149083] audit: type=1326 audit(1529720064.147:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16907 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) [ 906.209455] audit: type=1326 audit(1529720064.187:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16914 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:24 executing program 3: pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) init_module(&(0x7f00000002c0)='*\x00', 0x2, &(0x7f0000000300)='vmnet1bdevlonodev@\x00') 02:14:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:25 executing program 3: pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) [ 907.155427] audit: type=1326 audit(1529720065.153:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16952 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:25 executing program 3: pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022c}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000140)=0x78) [ 908.088807] audit: type=1326 audit(1529720066.087:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17001 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) [ 908.296478] audit: type=1326 audit(1529720066.295:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17021 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000140)=0x78) 02:14:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) [ 908.462536] audit: type=1326 audit(1529720066.461:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17039 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:26 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:27 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) [ 909.027431] audit: type=1326 audit(1529720067.026:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17067 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 909.060536] audit: type=1326 audit(1529720067.058:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17070 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='\x00', 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000140)=0x78) 02:14:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:27 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:27 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:27 executing program 0: timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) prctl$setptracer(0x59616d61, 0x0) 02:14:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) 02:14:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:28 executing program 0: timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ae}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:28 executing program 0: timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 02:14:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) [ 910.426171] kauditd_printk_skb: 5 callbacks suppressed [ 910.426195] audit: type=1326 audit(1529720068.424:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17152 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) [ 910.491172] audit: type=1326 audit(1529720068.464:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17156 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc_llcp, 0x80, &(0x7f00000002c0), 0x0, &(0x7f0000000300)=""/35, 0x23}, 0x0) 02:14:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0x0, &(0x7f00000002c0)='mountinfo\x00') ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) 02:14:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) [ 911.186008] audit: type=1326 audit(1529720069.183:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17190 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0x0, &(0x7f00000002c0)='mountinfo\x00') ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) 02:14:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:29 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local={0x1, 0x80, 0xc2}, [], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], 0xb0, 0xb0, 0xe0, [@quota={'quota\x00', 0x18}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@broute={'broute\x00', 0x20, 0x0, 0xc0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, &(0x7f0000000040), &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, "00000000000000000000000200", 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x138) 02:14:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) [ 911.496263] audit: type=1326 audit(1529720069.494:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17214 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_procfs(0x0, &(0x7f00000002c0)='mountinfo\x00') ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) 02:14:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:30 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) [ 912.131546] audit: type=1326 audit(1529720070.130:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17240 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) 02:14:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:30 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) [ 912.472471] audit: type=1326 audit(1529720070.471:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17273 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:30 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) keyctl$setperm(0x5, 0x0, 0x0) 02:14:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:31 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) [ 913.076437] audit: type=1326 audit(1529720071.075:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17297 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 913.124158] audit: type=1326 audit(1529720071.108:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17304 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) keyctl$setperm(0x5, 0x0, 0x0) 02:14:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:31 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:31 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) keyctl$setperm(0x5, 0x0, 0x0) 02:14:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getpriority(0x0, 0x0) 02:14:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 02:14:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:32 executing program 4: add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getpriority(0x0, 0x0) 02:14:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) [ 914.035356] audit: type=1326 audit(1529720072.033:1712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17356 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:32 executing program 4: add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) [ 914.118795] audit: type=1326 audit(1529720072.066:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17363 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getpriority(0x0, 0x0) 02:14:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:32 executing program 4: add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) timer_create(0x0, &(0x7f00000004c0), &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000580)={{}, {0x77359400}}, &(0x7f00000005c0)) 02:14:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:32 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:32 executing program 6: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:33 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:33 executing program 6: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:33 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:33 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:33 executing program 6: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:33 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:33 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:33 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:33 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:33 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:34 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:34 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:34 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) [ 916.191536] kauditd_printk_skb: 1 callbacks suppressed [ 916.191558] audit: type=1326 audit(1529720074.190:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17472 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:34 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:34 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:35 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:35 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:35 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) [ 917.101580] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 917.112132] syz-executor6 cpuset=syz6 mems_allowed=0 [ 917.117444] CPU: 1 PID: 17530 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 917.124276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.133628] Call Trace: [ 917.136214] dump_stack+0x185/0x1d0 [ 917.139825] warn_alloc+0x430/0x690 [ 917.143547] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 917.148383] ? kernel_poison_pages+0x40/0x360 [ 917.152866] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 917.158387] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 917.163330] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 917.168339] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.173174] kmsan_alloc_page+0x82/0xe0 [ 917.177146] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 917.181886] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.186713] ? __msan_poison_alloca+0x15c/0x1d0 [ 917.191365] ? __should_failslab+0x278/0x2a0 [ 917.195909] ? should_fail+0x57/0xab0 [ 917.199698] ? __should_failslab+0x278/0x2a0 [ 917.204093] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.208919] ? __msan_poison_alloca+0x15c/0x1d0 [ 917.213580] ? kmsan_set_origin+0x9e/0x160 [ 917.217810] alloc_pages_vma+0x1555/0x17f0 [ 917.222034] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 917.227138] handle_mm_fault+0x44ca/0x7ed0 [ 917.231357] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.236193] __do_page_fault+0xec6/0x1a10 [ 917.240331] do_page_fault+0xb7/0x250 [ 917.244115] ? page_fault+0x8/0x30 [ 917.247639] page_fault+0x1e/0x30 [ 917.251082] RIP: 0033:0x4075fa [ 917.254258] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 917.259604] RAX: 00000000200001c0 RBX: 0000000000000000 RCX: 0000000000000000 [ 917.266859] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 917.274459] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 917.281719] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e018c [ 917.288971] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 917.296245] warn_alloc_show_mem: 1 callbacks suppressed [ 917.296247] Mem-Info: [ 917.303993] active_anon:164188 inactive_anon:78 isolated_anon:0 [ 917.303993] active_file:1944 inactive_file:5222 isolated_file:0 [ 917.303993] unevictable:0 dirty:56 writeback:0 unstable:0 [ 917.303993] slab_reclaimable:3327 slab_unreclaimable:9533 [ 917.303993] mapped:71674 shmem:84 pagetables:1359 bounce:0 [ 917.303993] free:87145 free_pcp:336 free_cma:0 [ 917.337153] Node 0 active_anon:656752kB inactive_anon:312kB active_file:7776kB inactive_file:20888kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:286696kB dirty:224kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 917.365250] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 917.391364] lowmem_reserve[]: 0 2817 7244 7244 [ 917.395944] Node 0 DMA32 free:259076kB min:26224kB low:32780kB high:39336kB active_anon:222944kB inactive_anon:0kB active_file:1996kB inactive_file:16816kB unevictable:0kB writepending:44kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1792kB pagetables:1580kB bounce:0kB free_pcp:1120kB local_pcp:460kB free_cma:0kB [ 917.425462] lowmem_reserve[]: 0 0 4426 4426 [ 917.429776] Node 0 Normal free:73600kB min:41208kB low:51508kB high:61808kB active_anon:433808kB inactive_anon:312kB active_file:5780kB inactive_file:4072kB unevictable:0kB writepending:180kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3856kB bounce:0kB free_pcp:224kB local_pcp:132kB free_cma:0kB [ 917.459311] lowmem_reserve[]: 0 0 0 0 [ 917.463106] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 917.476334] Node 0 DMA32: 12015*4kB (UMEH) 6659*8kB (UME) 2353*16kB (UME) 1099*32kB (UME) 775*64kB (UME) 98*128kB (UM) 35*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 0*2048kB 0*4096kB = 259076kB [ 917.493549] Node 0 Normal: 7564*4kB (MEH) 3444*8kB (MEH) 549*16kB (UMEH) 107*32kB (MEH) 17*64kB (MH) 1*128kB (U) 1*256kB (H) 2*512kB (UH) 1*1024kB (U) 0*2048kB 0*4096kB = 73536kB [ 917.509717] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 917.518361] 7250 total pagecache pages [ 917.522230] 0 pages in swap cache [ 917.525661] Swap cache stats: add 0, delete 0, find 0/0 [ 917.531005] Free swap = 0kB [ 917.534002] Total swap = 0kB [ 917.536999] 1965969 pages RAM [ 917.540098] 0 pages HighMem/MovableOnly [ 917.544056] 106316 pages reserved [ 917.548447] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 917.558970] syz-executor0 cpuset=syz0 mems_allowed=0 [ 917.564103] CPU: 0 PID: 17533 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 917.570948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.580308] Call Trace: [ 917.582915] dump_stack+0x185/0x1d0 [ 917.586555] warn_alloc+0x430/0x690 [ 917.590217] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 917.595077] ? kernel_poison_pages+0x40/0x360 02:14:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) [ 917.599609] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 917.605079] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 917.610052] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 917.615101] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.619968] kmsan_alloc_page+0x82/0xe0 [ 917.623960] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 917.628756] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.633614] ? __msan_poison_alloca+0x15c/0x1d0 [ 917.638296] ? __should_failslab+0x278/0x2a0 [ 917.642718] ? should_fail+0x57/0xab0 [ 917.646528] ? __should_failslab+0x278/0x2a0 [ 917.650952] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.655811] ? __msan_poison_alloca+0x15c/0x1d0 [ 917.660494] ? kmsan_set_origin+0x9e/0x160 [ 917.664751] alloc_pages_vma+0x1555/0x17f0 [ 917.669007] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 917.674136] handle_mm_fault+0x44ca/0x7ed0 [ 917.678488] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.683367] __do_page_fault+0xec6/0x1a10 [ 917.687540] do_page_fault+0xb7/0x250 [ 917.691377] ? page_fault+0x8/0x30 [ 917.694931] page_fault+0x1e/0x30 [ 917.698385] RIP: 0033:0x4075fa 02:14:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) [ 917.701574] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 917.706947] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 917.714223] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 917.721506] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 917.728785] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0192 [ 917.736058] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 917.767172] audit: type=1326 audit(1529720075.765:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17538 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 917.770252] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 917.797430] syz-executor5 cpuset=syz5 mems_allowed=0 [ 917.802558] CPU: 1 PID: 17544 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 917.809398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.818843] Call Trace: [ 917.821443] dump_stack+0x185/0x1d0 [ 917.825088] warn_alloc+0x430/0x690 [ 917.828735] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 917.833618] ? kernel_poison_pages+0x40/0x360 [ 917.838128] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 917.843591] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 917.848553] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 917.853596] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.858463] kmsan_alloc_page+0x82/0xe0 [ 917.862454] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 917.867225] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.872092] ? __msan_poison_alloca+0x15c/0x1d0 [ 917.876774] ? __should_failslab+0x278/0x2a0 [ 917.881285] ? should_fail+0x57/0xab0 [ 917.885100] ? __should_failslab+0x278/0x2a0 [ 917.889521] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.897334] ? __msan_poison_alloca+0x15c/0x1d0 [ 917.902016] ? kmsan_set_origin+0x9e/0x160 [ 917.906268] alloc_pages_vma+0x1555/0x17f0 [ 917.910528] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 917.915732] handle_mm_fault+0x44ca/0x7ed0 [ 917.919977] ? kmsan_set_origin_inline+0x6b/0x120 [ 917.924845] __do_page_fault+0xec6/0x1a10 [ 917.929014] do_page_fault+0xb7/0x250 [ 917.932834] ? page_fault+0x8/0x30 [ 917.936394] page_fault+0x1e/0x30 [ 917.939867] RIP: 0033:0x4075fa [ 917.943103] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 917.948477] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000000 [ 917.955762] RDX: feb798c679317740 RSI: 0000000000000000 RDI: 0000000002848848 02:14:35 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:35 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) [ 917.963040] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 917.970328] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0429 [ 917.977771] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 918.004071] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) 02:14:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) [ 918.014702] syz-executor7 cpuset=syz7 mems_allowed=0 [ 918.019915] CPU: 1 PID: 17559 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 918.026759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 918.036128] Call Trace: [ 918.038728] dump_stack+0x185/0x1d0 [ 918.042372] warn_alloc+0x430/0x690 [ 918.046025] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 918.050899] ? kernel_poison_pages+0x40/0x360 [ 918.055502] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 918.060977] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 918.065948] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 918.070996] ? kmsan_set_origin_inline+0x6b/0x120 [ 918.075876] kmsan_alloc_page+0x82/0xe0 [ 918.079871] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 918.084657] ? kmsan_set_origin_inline+0x6b/0x120 [ 918.089521] ? __msan_poison_alloca+0x15c/0x1d0 [ 918.094212] ? __should_failslab+0x278/0x2a0 [ 918.098644] ? should_fail+0x57/0xab0 [ 918.102462] ? __should_failslab+0x278/0x2a0 [ 918.106900] ? kmsan_set_origin_inline+0x6b/0x120 [ 918.111851] ? __msan_poison_alloca+0x15c/0x1d0 [ 918.116538] ? kmsan_set_origin+0x9e/0x160 [ 918.120793] alloc_pages_vma+0x1555/0x17f0 [ 918.125049] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 918.130223] handle_mm_fault+0x44ca/0x7ed0 [ 918.134476] ? kmsan_set_origin_inline+0x6b/0x120 [ 918.139342] __do_page_fault+0xec6/0x1a10 [ 918.143507] do_page_fault+0xb7/0x250 [ 918.147315] ? page_fault+0x8/0x30 [ 918.150864] page_fault+0x1e/0x30 [ 918.154316] RIP: 0033:0x4075fa [ 918.157512] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 918.162880] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 918.170161] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 918.177445] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 918.184726] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0513 [ 918.192007] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50192}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:36 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000080)=0x44) 02:14:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) [ 918.696653] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 918.707305] syz-executor3 cpuset=syz3 mems_allowed=0 [ 918.712525] CPU: 1 PID: 17575 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 918.719493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 918.728852] Call Trace: [ 918.731457] dump_stack+0x185/0x1d0 [ 918.735101] warn_alloc+0x430/0x690 [ 918.738752] __alloc_pages_nodemask+0x5b1c/0x5cc0 02:14:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) [ 918.743596] ? kernel_poison_pages+0x40/0x360 [ 918.748122] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 918.753594] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 918.758567] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 918.763614] ? kmsan_set_origin_inline+0x6b/0x120 [ 918.768656] kmsan_alloc_page+0x82/0xe0 [ 918.772734] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 918.777517] ? kmsan_set_origin_inline+0x6b/0x120 [ 918.782375] ? __msan_poison_alloca+0x15c/0x1d0 [ 918.787072] ? __should_failslab+0x278/0x2a0 [ 918.791497] ? should_fail+0x57/0xab0 [ 918.795310] ? __should_failslab+0x278/0x2a0 [ 918.799739] ? kmsan_set_origin_inline+0x6b/0x120 [ 918.804597] ? __msan_poison_alloca+0x15c/0x1d0 [ 918.809277] ? kmsan_set_origin+0x9e/0x160 [ 918.813514] alloc_pages_vma+0x1555/0x17f0 [ 918.818771] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 918.824036] handle_mm_fault+0x44ca/0x7ed0 [ 918.828276] ? kmsan_set_origin_inline+0x6b/0x120 [ 918.833125] __do_page_fault+0xec6/0x1a10 [ 918.837282] do_page_fault+0xb7/0x250 [ 918.841080] ? page_fault+0x8/0x30 [ 918.844610] page_fault+0x1e/0x30 [ 918.848047] RIP: 0033:0x4075fa [ 918.851232] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 918.856579] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 918.863847] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 918.871200] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 918.878466] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e07c7 [ 918.885721] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 918.892982] warn_alloc_show_mem: 3 callbacks suppressed [ 918.892984] Mem-Info: [ 918.900747] active_anon:164163 inactive_anon:76 isolated_anon:0 [ 918.900747] active_file:1945 inactive_file:5197 isolated_file:0 [ 918.900747] unevictable:0 dirty:70 writeback:0 unstable:0 [ 918.900747] slab_reclaimable:3327 slab_unreclaimable:9533 [ 918.900747] mapped:71607 shmem:84 pagetables:1349 bounce:0 [ 918.900747] free:86751 free_pcp:448 free_cma:0 [ 918.933818] Node 0 active_anon:656652kB inactive_anon:304kB active_file:7780kB inactive_file:20788kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:286428kB dirty:280kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 918.961826] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 918.987951] lowmem_reserve[]: 0 2817 7244 7244 [ 918.992548] Node 0 DMA32 free:259076kB min:26224kB low:32780kB high:39336kB active_anon:222944kB inactive_anon:0kB active_file:2000kB inactive_file:16660kB unevictable:0kB writepending:44kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1792kB pagetables:1580kB bounce:0kB free_pcp:1272kB local_pcp:612kB free_cma:0kB [ 919.023349] lowmem_reserve[]: 0 0 4426 4426 [ 919.027672] Node 0 Normal free:72024kB min:41208kB low:51508kB high:61808kB active_anon:433708kB inactive_anon:304kB active_file:5780kB inactive_file:4128kB unevictable:0kB writepending:236kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3816kB bounce:0kB free_pcp:520kB local_pcp:212kB free_cma:0kB [ 919.057267] lowmem_reserve[]: 0 0 0 0 [ 919.061068] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 919.074382] Node 0 DMA32: 12015*4kB (UMEH) 6659*8kB (UME) 2353*16kB (UME) 1099*32kB (UME) 775*64kB (UME) 98*128kB (UM) 35*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 0*2048kB 0*4096kB = 259076kB [ 919.091513] Node 0 Normal: 7594*4kB (UMEH) 3450*8kB (UMEH) 544*16kB (UMEH) 97*32kB (UMEH) 17*64kB (MH) 3*128kB (UH) 1*256kB (H) 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 72024kB [ 919.107430] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 919.115988] 7226 total pagecache pages [ 919.119853] 0 pages in swap cache [ 919.123283] Swap cache stats: add 0, delete 0, find 0/0 [ 919.128709] Free swap = 0kB [ 919.131728] Total swap = 0kB [ 919.134726] 1965969 pages RAM [ 919.137814] 0 pages HighMem/MovableOnly [ 919.141774] 106316 pages reserved 02:14:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) [ 919.157997] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 919.168568] syz-executor0 cpuset=syz0 mems_allowed=0 [ 919.173719] CPU: 1 PID: 17578 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 919.180732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.190094] Call Trace: [ 919.192697] dump_stack+0x185/0x1d0 [ 919.196340] warn_alloc+0x430/0x690 [ 919.199994] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 919.204845] ? kernel_poison_pages+0x40/0x360 [ 919.209418] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 919.214977] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 919.219987] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.224823] kmsan_alloc_page+0x82/0xe0 [ 919.228782] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.233528] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.238354] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.243009] ? kmem_cache_alloc+0x997/0xb70 [ 919.247314] ? ___slab_alloc+0xc1/0x1f50 [ 919.251372] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.256218] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.260873] ? kmsan_set_origin+0x9e/0x160 [ 919.265106] alloc_pages_vma+0x1555/0x17f0 [ 919.269346] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 919.274445] handle_mm_fault+0x44ca/0x7ed0 [ 919.278664] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.283503] __do_page_fault+0xec6/0x1a10 [ 919.287644] do_page_fault+0xb7/0x250 [ 919.291454] ? page_fault+0x8/0x30 [ 919.294985] page_fault+0x1e/0x30 [ 919.298504] RIP: 0033:0x4075fa [ 919.301679] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 02:14:37 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 919.307030] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 919.314284] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 919.321539] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 919.328790] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0995 [ 919.336050] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 919.345806] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 919.356334] syz-executor2 cpuset=syz2 mems_allowed=0 [ 919.361459] CPU: 1 PID: 17583 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 919.368300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.377661] Call Trace: [ 919.380266] dump_stack+0x185/0x1d0 [ 919.383920] warn_alloc+0x430/0x690 [ 919.387570] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 919.392430] ? kernel_poison_pages+0x40/0x360 [ 919.396945] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 919.402417] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.407383] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 919.412435] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.417310] kmsan_alloc_page+0x82/0xe0 [ 919.421305] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.426090] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.430953] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.435673] ? __should_failslab+0x278/0x2a0 [ 919.440110] ? should_fail+0x57/0xab0 [ 919.443921] ? __should_failslab+0x278/0x2a0 [ 919.448338] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.453193] ? __msan_poison_alloca+0x15c/0x1d0 02:14:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:37 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 919.457886] ? kmsan_set_origin+0x9e/0x160 [ 919.462140] alloc_pages_vma+0x1555/0x17f0 [ 919.466411] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 919.471537] handle_mm_fault+0x44ca/0x7ed0 [ 919.475787] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.480744] __do_page_fault+0xec6/0x1a10 [ 919.484919] do_page_fault+0xb7/0x250 [ 919.488748] ? page_fault+0x8/0x30 [ 919.492345] page_fault+0x1e/0x30 [ 919.495799] RIP: 0033:0x4075fa [ 919.499001] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 02:14:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) [ 919.504455] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 919.511742] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 919.519022] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 919.526301] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0a51 [ 919.533580] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 919.568201] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 919.578838] syz-executor4 cpuset=syz4 mems_allowed=0 [ 919.583979] CPU: 1 PID: 17603 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 919.590822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.600180] Call Trace: [ 919.602813] dump_stack+0x185/0x1d0 [ 919.606439] warn_alloc+0x430/0x690 [ 919.610113] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 919.614969] ? kernel_poison_pages+0x40/0x360 [ 919.619478] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 919.625006] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.629961] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 919.634974] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.639828] kmsan_alloc_page+0x82/0xe0 [ 919.643822] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.648570] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.653836] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.658494] ? __should_failslab+0x278/0x2a0 [ 919.662898] ? should_fail+0x57/0xab0 [ 919.666688] ? __should_failslab+0x278/0x2a0 [ 919.671095] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.676015] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.680670] ? kmsan_set_origin+0x9e/0x160 [ 919.684897] alloc_pages_vma+0x1555/0x17f0 [ 919.689133] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 919.694235] handle_mm_fault+0x44ca/0x7ed0 [ 919.698457] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.703522] __do_page_fault+0xec6/0x1a10 [ 919.707668] do_page_fault+0xb7/0x250 [ 919.711472] ? page_fault+0x8/0x30 [ 919.714996] page_fault+0x1e/0x30 [ 919.718439] RIP: 0033:0x4075fa [ 919.721612] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 919.726958] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 919.734212] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 919.741467] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 919.748722] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0b2f [ 919.755977] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) [ 919.778029] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 919.788668] syz-executor6 cpuset=syz6 mems_allowed=0 [ 919.793801] CPU: 1 PID: 17601 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 919.800728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.810097] Call Trace: [ 919.812699] dump_stack+0x185/0x1d0 [ 919.816348] warn_alloc+0x430/0x690 [ 919.820002] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 919.824945] ? kernel_poison_pages+0x40/0x360 [ 919.829461] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 919.834936] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.839997] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 919.845044] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.849933] kmsan_alloc_page+0x82/0xe0 [ 919.853920] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.858860] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.863718] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.868400] ? __should_failslab+0x278/0x2a0 [ 919.872920] ? should_fail+0x57/0xab0 [ 919.876738] ? __should_failslab+0x278/0x2a0 [ 919.881170] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.886075] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.890778] ? kmsan_set_origin+0x9e/0x160 [ 919.895036] alloc_pages_vma+0x1555/0x17f0 [ 919.899491] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 919.904615] handle_mm_fault+0x44ca/0x7ed0 [ 919.908873] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.913741] __do_page_fault+0xec6/0x1a10 [ 919.917935] do_page_fault+0xb7/0x250 [ 919.921754] ? page_fault+0x8/0x30 [ 919.925309] page_fault+0x1e/0x30 [ 919.928793] RIP: 0033:0x4075fa [ 919.931984] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 919.937355] RAX: 00000000200001c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 919.944719] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 919.952112] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 919.959393] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0c01 [ 919.966698] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 919.973974] warn_alloc_show_mem: 3 callbacks suppressed [ 919.973976] Mem-Info: [ 919.981734] active_anon:164278 inactive_anon:77 isolated_anon:0 [ 919.981734] active_file:1945 inactive_file:5200 isolated_file:0 [ 919.981734] unevictable:0 dirty:73 writeback:0 unstable:0 [ 919.981734] slab_reclaimable:3327 slab_unreclaimable:9542 [ 919.981734] mapped:71690 shmem:84 pagetables:1358 bounce:0 [ 919.981734] free:86298 free_pcp:584 free_cma:0 [ 920.014903] Node 0 active_anon:657112kB inactive_anon:308kB active_file:7780kB inactive_file:20800kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:286760kB dirty:292kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 920.043116] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 920.069230] lowmem_reserve[]: 0 2817 7244 7244 [ 920.073807] Node 0 DMA32 free:258372kB min:26224kB low:32780kB high:39336kB active_anon:222944kB inactive_anon:0kB active_file:2000kB inactive_file:16660kB unevictable:0kB writepending:44kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1984kB pagetables:1580kB bounce:0kB free_pcp:1272kB local_pcp:612kB free_cma:0kB [ 920.103304] lowmem_reserve[]: 0 0 4426 4426 [ 920.107618] Node 0 Normal free:70916kB min:41208kB low:51508kB high:61808kB active_anon:434168kB inactive_anon:308kB active_file:5780kB inactive_file:4140kB unevictable:0kB writepending:248kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7936kB pagetables:3852kB bounce:0kB free_pcp:1064kB local_pcp:416kB free_cma:0kB [ 920.137119] lowmem_reserve[]: 0 0 0 0 [ 920.140911] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 920.154117] Node 0 DMA32: 12015*4kB (UMEH) 6659*8kB (UME) 2353*16kB (UME) 1099*32kB (UME) 764*64kB (UME) 98*128kB (UM) 35*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 0*2048kB 0*4096kB = 258372kB [ 920.172541] Node 0 Normal: 7507*4kB (UMEH) 3389*8kB (UMEH) 533*16kB (UMEH) 88*32kB (UMEH) 24*64kB (UH) 2*128kB (UH) 1*256kB (H) 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 71044kB [ 920.188476] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 920.197049] 7229 total pagecache pages [ 920.200933] 0 pages in swap cache [ 920.204364] Swap cache stats: add 0, delete 0, find 0/0 [ 920.209703] Free swap = 0kB [ 920.212698] Total swap = 0kB [ 920.215695] 1965969 pages RAM [ 920.218798] 0 pages HighMem/MovableOnly [ 920.222750] 106316 pages reserved [ 920.228848] audit: type=1326 audit(1529720078.226:1717): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17608 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000004c0)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) keyctl$chown(0x4, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') 02:14:38 executing program 1: pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 920.279830] audit: type=1326 audit(1529720078.266:1718): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17603 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 920.355012] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 920.365589] syz-executor3 cpuset=syz3 mems_allowed=0 [ 920.370725] CPU: 1 PID: 17620 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 920.377569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.386931] Call Trace: [ 920.389533] dump_stack+0x185/0x1d0 [ 920.393173] warn_alloc+0x430/0x690 [ 920.396826] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 920.401684] ? kernel_poison_pages+0x40/0x360 [ 920.406197] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 920.411670] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 920.416639] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 920.421679] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.426544] kmsan_alloc_page+0x82/0xe0 [ 920.430532] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 920.435300] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.440158] ? __msan_poison_alloca+0x15c/0x1d0 [ 920.445049] ? __should_failslab+0x278/0x2a0 [ 920.449479] ? should_fail+0x57/0xab0 [ 920.453290] ? __should_failslab+0x278/0x2a0 [ 920.457714] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.462658] ? __msan_poison_alloca+0x15c/0x1d0 [ 920.467354] ? kmsan_set_origin+0x9e/0x160 [ 920.471612] alloc_pages_vma+0x1555/0x17f0 [ 920.475886] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 920.481046] handle_mm_fault+0x44ca/0x7ed0 [ 920.485331] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.490324] __do_page_fault+0xec6/0x1a10 [ 920.494502] do_page_fault+0xb7/0x250 [ 920.498318] ? page_fault+0x8/0x30 [ 920.501872] page_fault+0x1e/0x30 02:14:38 executing program 1: pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 920.505330] RIP: 0033:0x4075fa [ 920.508522] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 920.513893] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 920.521177] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 920.528544] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 920.535837] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0e42 [ 920.543125] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) [ 920.578825] audit: type=1326 audit(1529720078.577:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17633 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:38 executing program 1: pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) [ 920.705327] audit: type=1326 audit(1529720078.703:1720): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17638 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000004c0)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) [ 920.978343] audit: type=1326 audit(1529720078.976:1721): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17654 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) [ 921.059392] audit: type=1326 audit(1529720079.056:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17664 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000004c0)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:39 executing program 0: statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000240), 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 02:14:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) [ 921.624403] audit: type=1326 audit(1529720079.623:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17697 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 921.685489] audit: type=1326 audit(1529720079.663:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17703 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getpriority(0x0, 0x0) 02:14:39 executing program 0: statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) [ 921.919951] audit: type=1326 audit(1529720079.918:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17715 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:39 executing program 0: statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:40 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) [ 922.043827] audit: type=1326 audit(1529720080.042:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17728 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:40 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 02:14:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:40 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) [ 922.608304] audit: type=1326 audit(1529720080.606:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17754 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:40 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) [ 922.852456] audit: type=1326 audit(1529720080.851:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17766 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@proc={0x10}, 0xc, &(0x7f0000000040), 0x0, &(0x7f0000000240)}, 0x0) 02:14:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:40 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:41 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) [ 923.024645] audit: type=1326 audit(1529720081.022:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17783 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) [ 923.153991] audit: type=1326 audit(1529720081.152:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17790 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:41 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) [ 923.789702] audit: type=1326 audit(1529720081.787:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17819 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:41 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:42 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:42 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) [ 924.247064] audit: type=1326 audit(1529720082.245:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17851 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000100)=""/255) 02:14:42 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:42 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setreuid(0x0, 0x0) 02:14:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 02:14:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setreuid(0x0, 0x0) 02:14:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:43 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:43 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) [ 925.216460] warn_alloc: 15 callbacks suppressed [ 925.216478] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 925.231679] syz-executor1 cpuset=syz1 mems_allowed=0 [ 925.236812] CPU: 0 PID: 17907 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 925.243653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 925.253015] Call Trace: [ 925.255613] dump_stack+0x185/0x1d0 [ 925.259247] warn_alloc+0x430/0x690 02:14:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) [ 925.262889] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 925.267736] ? kernel_poison_pages+0x40/0x360 [ 925.272240] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 925.277957] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 925.282938] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 925.287978] ? kmsan_set_origin_inline+0x6b/0x120 [ 925.292827] ? __msan_poison_alloca+0x15c/0x1d0 [ 925.297520] kmsan_alloc_page+0x82/0xe0 [ 925.301512] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 925.306284] ? kmsan_set_origin_inline+0x6b/0x120 [ 925.311144] ? __msan_poison_alloca+0x15c/0x1d0 [ 925.315861] ? __should_failslab+0x278/0x2a0 [ 925.320280] ? should_fail+0x57/0xab0 [ 925.324097] ? __should_failslab+0x278/0x2a0 [ 925.328529] ? kmsan_set_origin_inline+0x6b/0x120 [ 925.333435] ? __msan_poison_alloca+0x15c/0x1d0 [ 925.338122] ? kmsan_set_origin+0x9e/0x160 [ 925.342372] alloc_pages_vma+0x1555/0x17f0 [ 925.346626] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 925.351733] handle_mm_fault+0x44ca/0x7ed0 [ 925.356056] ? kmsan_set_origin_inline+0x6b/0x120 [ 925.360926] __do_page_fault+0xec6/0x1a10 [ 925.365096] do_page_fault+0xb7/0x250 [ 925.368896] ? page_fault+0x8/0x30 [ 925.372421] page_fault+0x1e/0x30 [ 925.375858] RIP: 0033:0x4075fa [ 925.379053] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 925.384510] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 925.391877] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 925.399131] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 925.406393] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e213c [ 925.413818] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 925.421084] warn_alloc_show_mem: 1 callbacks suppressed [ 925.421087] Mem-Info: [ 925.428835] active_anon:164253 inactive_anon:78 isolated_anon:0 [ 925.428835] active_file:1956 inactive_file:4999 isolated_file:0 [ 925.428835] unevictable:0 dirty:92 writeback:0 unstable:0 [ 925.428835] slab_reclaimable:3327 slab_unreclaimable:9523 [ 925.428835] mapped:71435 shmem:84 pagetables:1391 bounce:0 [ 925.428835] free:85130 free_pcp:380 free_cma:0 [ 925.461994] Node 0 active_anon:657012kB inactive_anon:312kB active_file:7824kB inactive_file:19996kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:285740kB dirty:368kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 925.490001] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 925.516206] lowmem_reserve[]: 0 2817 7244 7244 [ 925.520779] Node 0 DMA32 free:260000kB min:26224kB low:32780kB high:39336kB active_anon:224992kB inactive_anon:0kB active_file:2012kB inactive_file:15900kB unevictable:0kB writepending:44kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1580kB bounce:0kB free_pcp:1288kB local_pcp:620kB free_cma:0kB [ 925.550276] lowmem_reserve[]: 0 0 4426 4426 [ 925.554767] Node 0 Normal free:64616kB min:41208kB low:51508kB high:61808kB active_anon:432148kB inactive_anon:312kB active_file:5812kB inactive_file:4212kB unevictable:0kB writepending:324kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3984kB bounce:0kB free_pcp:232kB local_pcp:100kB free_cma:0kB [ 925.584531] lowmem_reserve[]: 0 0 0 0 [ 925.588337] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 925.601631] Node 0 DMA32: 12068*4kB (UMEH) 6714*8kB (UME) 2358*16kB (UME) 1103*32kB (UME) 772*64kB (UME) 98*128kB (UM) 36*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 0*2048kB 0*4096kB = 260000kB [ 925.618679] Node 0 Normal: 6609*4kB (UMEH) 3010*8kB (UMEH) 470*16kB (UMH) 66*32kB (MH) 15*64kB (UH) 3*128kB (UH) 1*256kB (U) 1*512kB (U) 2*1024kB (UH) 0*2048kB 0*4096kB = 64308kB [ 925.634764] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 925.643321] 7039 total pagecache pages [ 925.647203] 0 pages in swap cache [ 925.650637] Swap cache stats: add 0, delete 0, find 0/0 [ 925.655994] Free swap = 0kB [ 925.658990] Total swap = 0kB [ 925.661999] 1965969 pages RAM [ 925.665095] 0 pages HighMem/MovableOnly [ 925.669049] 106316 pages reserved 02:14:43 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:43 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:43 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setreuid(0x0, 0x0) [ 925.835785] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 925.846523] syz-executor6 cpuset=syz6 mems_allowed=0 [ 925.851748] CPU: 0 PID: 17919 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 925.858702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 925.868065] Call Trace: [ 925.870661] dump_stack+0x185/0x1d0 [ 925.874289] warn_alloc+0x430/0x690 [ 925.877914] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 925.882750] ? kernel_poison_pages+0x40/0x360 [ 925.887240] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 925.892689] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 925.897629] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 925.902639] ? kmsan_set_origin_inline+0x6b/0x120 [ 925.907565] kmsan_alloc_page+0x82/0xe0 [ 925.911545] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 925.916318] ? kmsan_set_origin_inline+0x6b/0x120 [ 925.921152] ? __msan_poison_alloca+0x15c/0x1d0 [ 925.925900] ? __should_failslab+0x278/0x2a0 [ 925.930310] ? should_fail+0x57/0xab0 [ 925.934112] ? __should_failslab+0x278/0x2a0 [ 925.938506] ? kmsan_set_origin_inline+0x6b/0x120 [ 925.943332] ? __msan_poison_alloca+0x15c/0x1d0 [ 925.947988] ? kmsan_set_origin+0x9e/0x160 [ 925.952214] alloc_pages_vma+0x1555/0x17f0 [ 925.956612] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 925.961723] handle_mm_fault+0x44ca/0x7ed0 [ 925.966058] ? kmsan_set_origin_inline+0x6b/0x120 [ 925.970900] __do_page_fault+0xec6/0x1a10 [ 925.975401] do_page_fault+0xb7/0x250 [ 925.979190] ? page_fault+0x8/0x30 [ 925.983527] page_fault+0x1e/0x30 [ 925.986974] RIP: 0033:0x4075fa [ 925.990146] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 925.995493] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 926.002839] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 926.010110] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 926.017370] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e23ab [ 926.024625] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 926.034183] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 926.044700] syz-executor7 cpuset=syz7 mems_allowed=0 [ 926.049857] CPU: 0 PID: 17922 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 926.056700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.066096] Call Trace: [ 926.068791] dump_stack+0x185/0x1d0 [ 926.072433] warn_alloc+0x430/0x690 [ 926.076209] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 926.081066] ? kernel_poison_pages+0x40/0x360 02:14:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) [ 926.085594] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 926.091061] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 926.096046] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 926.101087] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.105954] kmsan_alloc_page+0x82/0xe0 [ 926.109956] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 926.114815] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.119673] ? __msan_poison_alloca+0x15c/0x1d0 [ 926.124358] ? __should_failslab+0x278/0x2a0 [ 926.128783] ? should_fail+0x57/0xab0 [ 926.132603] ? __should_failslab+0x278/0x2a0 02:14:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) [ 926.137023] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.141876] ? __msan_poison_alloca+0x15c/0x1d0 [ 926.146567] ? kmsan_set_origin+0x9e/0x160 [ 926.150822] alloc_pages_vma+0x1555/0x17f0 [ 926.155098] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 926.160313] handle_mm_fault+0x44ca/0x7ed0 [ 926.164563] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.169430] __do_page_fault+0xec6/0x1a10 [ 926.173595] do_page_fault+0xb7/0x250 [ 926.177405] ? page_fault+0x8/0x30 [ 926.180957] page_fault+0x1e/0x30 [ 926.184409] RIP: 0033:0x4075fa [ 926.187596] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 926.192960] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 926.200234] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 926.207510] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 926.214872] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e2471 [ 926.222145] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:44 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) [ 926.321636] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 926.332173] syz-executor4 cpuset=syz4 mems_allowed=0 [ 926.337303] CPU: 0 PID: 17940 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 926.344142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.353500] Call Trace: [ 926.356105] dump_stack+0x185/0x1d0 [ 926.359748] warn_alloc+0x430/0x690 [ 926.363402] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 926.368263] ? kernel_poison_pages+0x40/0x360 [ 926.372783] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 926.378258] ? try_to_wake_up+0x1cfd/0x2260 [ 926.382621] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 926.387581] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.392443] ? __msan_poison_alloca+0x15c/0x1d0 [ 926.397134] kmsan_alloc_page+0x82/0xe0 [ 926.401127] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 926.405900] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.410781] ? __msan_poison_alloca+0x15c/0x1d0 [ 926.415466] ? __should_failslab+0x278/0x2a0 [ 926.419891] ? should_fail+0x57/0xab0 [ 926.423704] ? __should_failslab+0x278/0x2a0 [ 926.428154] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.433093] ? __msan_poison_alloca+0x15c/0x1d0 [ 926.437775] ? kmsan_set_origin+0x9e/0x160 [ 926.442112] alloc_pages_vma+0x1555/0x17f0 [ 926.446361] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 926.451483] handle_mm_fault+0x44ca/0x7ed0 [ 926.455728] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.460707] __do_page_fault+0xec6/0x1a10 [ 926.464874] do_page_fault+0xb7/0x250 [ 926.468685] ? page_fault+0x8/0x30 [ 926.472236] page_fault+0x1e/0x30 [ 926.475690] RIP: 0033:0x43ce91 [ 926.478877] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 926.484243] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 000000000000002f [ 926.491521] RDX: 0000000000000015 RSI: 0000000000730020 RDI: 0000000020000080 [ 926.498896] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000258d940 [ 926.506178] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e258f [ 926.513453] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 926.520747] warn_alloc_show_mem: 2 callbacks suppressed [ 926.520750] Mem-Info: [ 926.528551] active_anon:164307 inactive_anon:78 isolated_anon:0 [ 926.528551] active_file:1961 inactive_file:4150 isolated_file:0 [ 926.528551] unevictable:0 dirty:98 writeback:0 unstable:0 [ 926.528551] slab_reclaimable:3327 slab_unreclaimable:9497 [ 926.528551] mapped:70635 shmem:84 pagetables:1331 bounce:0 [ 926.528551] free:85408 free_pcp:587 free_cma:0 [ 926.561676] Node 0 active_anon:657228kB inactive_anon:312kB active_file:7844kB inactive_file:16484kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:282424kB dirty:392kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 926.589702] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 926.615925] lowmem_reserve[]: 0 2817 7244 7244 [ 926.620524] Node 0 DMA32 free:263408kB min:26224kB low:32780kB high:39336kB active_anon:224992kB inactive_anon:0kB active_file:2024kB inactive_file:12188kB unevictable:0kB writepending:44kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1792kB pagetables:1580kB bounce:0kB free_pcp:1348kB local_pcp:620kB free_cma:0kB [ 926.649880] lowmem_reserve[]: 0 0 4426 4426 [ 926.654218] Node 0 Normal free:62320kB min:41208kB low:51508kB high:61808kB active_anon:432128kB inactive_anon:312kB active_file:5820kB inactive_file:4228kB unevictable:0kB writepending:348kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3744kB bounce:0kB free_pcp:908kB local_pcp:292kB free_cma:0kB [ 926.688347] lowmem_reserve[]: 0 0 0 0 [ 926.692160] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 926.705417] Node 0 DMA32: 12085*4kB (UMEH) 7266*8kB (UME) 2350*16kB (UME) 1097*32kB (UME) 773*64kB (UME) 96*128kB (UM) 37*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 0*2048kB 0*4096kB = 264228kB [ 926.722762] Node 0 Normal: 6544*4kB (UMEH) 2981*8kB (UMEH) 464*16kB (UMH) 62*32kB (MH) 21*64kB (UH) 2*128kB (UH) 0*256kB 1*512kB (U) 2*1024kB (UH) 0*2048kB 0*4096kB = 63592kB [ 926.738543] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 926.747127] 6027 total pagecache pages [ 926.751012] 0 pages in swap cache [ 926.754464] Swap cache stats: add 0, delete 0, find 0/0 [ 926.759824] Free swap = 0kB [ 926.762841] Total swap = 0kB [ 926.765855] 1965969 pages RAM [ 926.768969] 0 pages HighMem/MovableOnly [ 926.772936] 106316 pages reserved 02:14:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:44 executing program 7: add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:44 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') [ 926.888387] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 926.899025] syz-executor2 cpuset=syz2 mems_allowed=0 [ 926.904168] CPU: 1 PID: 17946 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 926.911012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 926.920466] Call Trace: [ 926.923076] dump_stack+0x185/0x1d0 [ 926.926731] warn_alloc+0x430/0x690 [ 926.930371] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 926.935225] ? kernel_poison_pages+0x40/0x360 [ 926.939732] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 926.945187] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 926.950144] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 926.955179] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.960030] ? __msan_poison_alloca+0x15c/0x1d0 [ 926.964723] kmsan_alloc_page+0x82/0xe0 [ 926.968711] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 926.973479] ? kmsan_set_origin_inline+0x6b/0x120 [ 926.978421] ? __msan_poison_alloca+0x15c/0x1d0 [ 926.983111] ? __should_failslab+0x278/0x2a0 [ 926.987541] ? should_fail+0x57/0xab0 [ 926.991351] ? __should_failslab+0x278/0x2a0 [ 926.995777] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.000637] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.005324] ? kmsan_set_origin+0x9e/0x160 [ 927.009584] alloc_pages_vma+0x1555/0x17f0 [ 927.013843] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 927.018968] handle_mm_fault+0x44ca/0x7ed0 [ 927.023216] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.028095] __do_page_fault+0xec6/0x1a10 [ 927.032263] do_page_fault+0xb7/0x250 02:14:45 executing program 7: add_key(&(0x7f0000000500)="7472757374656400a74e60095f6f88d07b9186c974f2000000000000da13c63b8d14a77f6b926d8f56175973645c666dba794b85ab6e771a3ee0be1cbe4e6e2089e0df13c201cc841de4dd7d0a82518d4964569a0200c170778cd83c1d22a2018b51d0f93c9cba74966b1e4eb9439740810528240c36696bbfc84d0ac1636dd7afe3732a408b340d3442bfea1bd785eba6354774908c043fc5d22ec2bcbd81183b6ee5846c5b91564a6816f6dcb70274e2b0515855994c368b1fc836c968a26fbd3b3eae781ddb5db88193e147f26076e468cc6bd7e34b7c039131179836220dc4fedf4c341e83b57832bd3c91221fd15165bdef8e0daa62cd6ec6e08e044cc78bca596db71d86483784a5807d9b2f706b4aee8c5d866af989812c3493ec8d6fe697eab76f89e7e75288ede88fcdcdd6bada9e7438eb6e45e43ba9d92f255e66d538e6777a1874ab8dfb212df0f04d61a987b78a1ec5d32ab198", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) [ 927.036089] ? page_fault+0x8/0x30 [ 927.039636] page_fault+0x1e/0x30 [ 927.043089] RIP: 0033:0x4075fa [ 927.046279] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 927.051654] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 927.058939] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 927.066214] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 927.073577] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e27c7 [ 927.080945] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 927.093738] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 927.104276] syz-executor3 cpuset=syz3 mems_allowed=0 [ 927.109384] CPU: 1 PID: 17956 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 927.116310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.125917] Call Trace: [ 927.128509] dump_stack+0x185/0x1d0 [ 927.132223] warn_alloc+0x430/0x690 [ 927.135867] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 927.140694] ? kernel_poison_pages+0x40/0x360 [ 927.145210] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 927.150823] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 927.155757] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 927.160764] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.165594] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.170269] kmsan_alloc_page+0x82/0xe0 [ 927.174235] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 927.178979] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.183805] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.188467] ? __should_failslab+0x278/0x2a0 [ 927.192884] ? should_fail+0x57/0xab0 [ 927.196678] ? __should_failslab+0x278/0x2a0 [ 927.201088] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.205929] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.211301] ? kmsan_set_origin+0x9e/0x160 [ 927.215536] alloc_pages_vma+0x1555/0x17f0 [ 927.219764] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 927.224864] handle_mm_fault+0x44ca/0x7ed0 [ 927.229098] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.233950] __do_page_fault+0xec6/0x1a10 [ 927.238098] do_page_fault+0xb7/0x250 [ 927.241891] ? page_fault+0x8/0x30 [ 927.245417] page_fault+0x1e/0x30 [ 927.248855] RIP: 0033:0x4075fa [ 927.252029] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 927.257394] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 927.264664] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 927.271921] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 927.279180] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e2895 [ 927.286435] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/98) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@loopback={0x0, 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}}) 02:14:45 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) [ 927.295918] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 927.306480] syz-executor1 cpuset=syz1 mems_allowed=0 [ 927.311606] CPU: 0 PID: 17953 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 927.318449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.327810] Call Trace: [ 927.330447] dump_stack+0x185/0x1d0 [ 927.334089] warn_alloc+0x430/0x690 [ 927.337745] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 927.342693] ? kernel_poison_pages+0x40/0x360 [ 927.347211] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 927.352685] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 927.357648] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 927.362723] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.367584] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.372280] kmsan_alloc_page+0x82/0xe0 [ 927.376277] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 927.381051] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.385910] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.390593] ? __should_failslab+0x278/0x2a0 02:14:45 executing program 7: add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) [ 927.395016] ? should_fail+0x57/0xab0 [ 927.398840] ? __should_failslab+0x278/0x2a0 [ 927.403270] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.408212] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.412893] ? kmsan_set_origin+0x9e/0x160 [ 927.417153] alloc_pages_vma+0x1555/0x17f0 [ 927.421438] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 927.426574] handle_mm_fault+0x44ca/0x7ed0 [ 927.430832] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.435705] __do_page_fault+0xec6/0x1a10 [ 927.439884] do_page_fault+0xb7/0x250 02:14:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) [ 927.443719] ? page_fault+0x8/0x30 [ 927.447275] page_fault+0x1e/0x30 [ 927.450739] RIP: 0033:0x4075fa [ 927.453927] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 927.459305] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 927.466781] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 927.474056] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 927.481336] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e2893 [ 927.488618] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 927.502136] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 927.512832] syz-executor6 cpuset=syz6 mems_allowed=0 [ 927.517980] CPU: 1 PID: 17974 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 927.524811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 927.534150] Call Trace: [ 927.536735] dump_stack+0x185/0x1d0 [ 927.540358] warn_alloc+0x430/0x690 [ 927.543978] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 927.548807] ? kernel_poison_pages+0x40/0x360 [ 927.553293] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 927.558745] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 927.563779] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.568610] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.573273] kmsan_alloc_page+0x82/0xe0 [ 927.577236] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 927.581978] ? do_syscall_64+0x15b/0x230 [ 927.586026] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.590957] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.595609] ? __should_failslab+0x278/0x2a0 [ 927.600010] ? should_fail+0x57/0xab0 [ 927.603882] ? __should_failslab+0x278/0x2a0 [ 927.608276] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.613105] ? __msan_poison_alloca+0x15c/0x1d0 [ 927.617787] ? kmsan_set_origin+0x9e/0x160 [ 927.622018] alloc_pages_vma+0x1555/0x17f0 [ 927.626244] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 927.631343] handle_mm_fault+0x44ca/0x7ed0 [ 927.635565] ? kmsan_set_origin_inline+0x6b/0x120 [ 927.640410] __do_page_fault+0xec6/0x1a10 [ 927.644555] do_page_fault+0xb7/0x250 [ 927.648361] page_fault+0x1e/0x30 [ 927.651811] RIP: 0010:__put_user_4+0x1c/0x30 [ 927.656313] RSP: 0018:ffff8800a69dfdb0 EFLAGS: 00010293 [ 927.661689] RAX: 0000000000000013 RBX: 00007fffffffeffd RCX: 0000000020000140 [ 927.668965] RDX: 0000000000000000 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 927.676397] RBP: ffff8800a69dfe78 R08: 0000000001080020 R09: 0000000000000002 [ 927.683654] R10: 0000000000000000 R11: ffffffff87d2e2c0 R12: 0000000000000001 [ 927.690917] R13: 0000000000000000 R14: 0000000020000140 R15: 0000000000000013 [ 927.698197] ? __sys_socketpair+0x1490/0x1490 [ 927.702685] ? __sys_socketpair+0x1cb/0x1490 [ 927.707090] __x64_sys_socketpair+0x117/0x170 [ 927.711574] ? __sys_socketpair+0x1490/0x1490 [ 927.716061] do_syscall_64+0x15b/0x230 [ 927.719941] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 927.725117] RIP: 0033:0x455a99 [ 927.728310] RSP: 002b:00007f2fa986cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 927.736005] RAX: ffffffffffffffda RBX: 00007f2fa986d6d4 RCX: 0000000000455a99 [ 927.743259] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 927.750520] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 927.757777] R10: 0000000020000140 R11: 0000000000000246 R12: 00000000ffffffff [ 927.765033] R13: 00000000004c1d6a R14: 00000000004d2e88 R15: 0000000000000000 [ 927.776283] kauditd_printk_skb: 4 callbacks suppressed [ 927.776304] audit: type=1326 audit(1529720085.774:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17946 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:45 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) [ 927.856191] audit: type=1326 audit(1529720085.802:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17967 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) [ 927.986279] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 927.996814] syz-executor3 cpuset=syz3 mems_allowed=0 [ 928.001938] CPU: 1 PID: 17987 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 928.008784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.018141] Call Trace: [ 928.020730] dump_stack+0x185/0x1d0 [ 928.024347] warn_alloc+0x430/0x690 [ 928.027969] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 928.032802] ? kernel_poison_pages+0x40/0x360 [ 928.037299] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 928.042735] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 928.047666] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 928.052684] ? kmsan_set_origin_inline+0x6b/0x120 [ 928.057521] ? __msan_poison_alloca+0x15c/0x1d0 [ 928.062198] kmsan_alloc_page+0x82/0xe0 [ 928.066170] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 928.071006] ? kmsan_set_origin_inline+0x6b/0x120 [ 928.075854] ? __msan_poison_alloca+0x15c/0x1d0 [ 928.080691] ? __should_failslab+0x278/0x2a0 [ 928.085108] ? should_fail+0x57/0xab0 [ 928.088893] ? __should_failslab+0x278/0x2a0 [ 928.093296] ? kmsan_set_origin_inline+0x6b/0x120 [ 928.098127] ? __msan_poison_alloca+0x15c/0x1d0 [ 928.102801] ? kmsan_set_origin+0x9e/0x160 [ 928.107112] alloc_pages_vma+0x1555/0x17f0 [ 928.111348] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 928.116447] handle_mm_fault+0x44ca/0x7ed0 [ 928.120668] ? kmsan_set_origin_inline+0x6b/0x120 [ 928.125505] __do_page_fault+0xec6/0x1a10 [ 928.129645] do_page_fault+0xb7/0x250 [ 928.133432] ? page_fault+0x8/0x30 [ 928.136957] page_fault+0x1e/0x30 [ 928.140391] RIP: 0033:0x4075fa [ 928.143563] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 928.148911] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 928.156166] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 928.163424] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 928.170703] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e2c11 [ 928.177960] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 928.185346] warn_alloc_show_mem: 4 callbacks suppressed [ 928.185348] Mem-Info: [ 928.193120] active_anon:164270 inactive_anon:74 isolated_anon:0 [ 928.193120] active_file:1982 inactive_file:3946 isolated_file:0 [ 928.193120] unevictable:0 dirty:116 writeback:0 unstable:0 [ 928.193120] slab_reclaimable:3328 slab_unreclaimable:9504 [ 928.193120] mapped:70474 shmem:84 pagetables:1368 bounce:0 [ 928.193120] free:84787 free_pcp:290 free_cma:0 [ 928.226291] Node 0 active_anon:657080kB inactive_anon:296kB active_file:7928kB inactive_file:15784kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:281896kB dirty:464kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 928.254400] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 928.280690] lowmem_reserve[]: 0 2817 7244 7244 [ 928.285269] Node 0 DMA32 free:261560kB min:26224kB low:32780kB high:39336kB active_anon:224992kB inactive_anon:0kB active_file:2076kB inactive_file:11656kB unevictable:0kB writepending:44kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2176kB pagetables:1580kB bounce:0kB free_pcp:760kB local_pcp:132kB free_cma:0kB [ 928.314579] lowmem_reserve[]: 0 0 4426 4426 [ 928.319159] Node 0 Normal free:61684kB min:41208kB low:51508kB high:61808kB active_anon:432088kB inactive_anon:296kB active_file:5852kB inactive_file:4128kB unevictable:0kB writepending:420kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:3892kB bounce:0kB free_pcp:400kB local_pcp:300kB free_cma:0kB [ 928.348670] lowmem_reserve[]: 0 0 0 0 [ 928.352553] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 928.365849] Node 0 DMA32: 12084*4kB (UMEH) 7266*8kB (UME) 2334*16kB (UME) 1085*32kB (UME) 747*64kB (UME) 93*128kB (UM) 37*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 0*2048kB 0*4096kB = 261536kB 02:14:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) [ 928.382887] Node 0 Normal: 6459*4kB (UMEH) 2967*8kB (UMEH) 457*16kB (UMEH) 66*32kB (UMEH) 16*64kB (UH) 3*128kB (U) 1*256kB (H) 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 61684kB [ 928.399149] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 928.407713] 6016 total pagecache pages [ 928.411580] 0 pages in swap cache [ 928.415017] Swap cache stats: add 0, delete 0, find 0/0 [ 928.420364] Free swap = 0kB [ 928.423365] Total swap = 0kB [ 928.426367] 1965969 pages RAM [ 928.429455] 0 pages HighMem/MovableOnly [ 928.433410] 106316 pages reserved 02:14:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) [ 928.518324] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 928.528958] syz-executor1 cpuset=syz1 mems_allowed=0 [ 928.534104] CPU: 1 PID: 17995 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 928.540974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.550335] Call Trace: [ 928.552940] dump_stack+0x185/0x1d0 [ 928.556582] warn_alloc+0x430/0x690 [ 928.560233] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 928.565184] ? kernel_poison_pages+0x40/0x360 [ 928.569701] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 928.575172] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 928.580131] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 928.585233] ? kmsan_set_origin_inline+0x6b/0x120 [ 928.590068] ? __msan_poison_alloca+0x15c/0x1d0 [ 928.594848] kmsan_alloc_page+0x82/0xe0 [ 928.598918] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 928.603663] ? kmsan_set_origin_inline+0x6b/0x120 [ 928.608491] ? __msan_poison_alloca+0x15c/0x1d0 [ 928.613165] ? __should_failslab+0x278/0x2a0 [ 928.617649] ? should_fail+0x57/0xab0 [ 928.621437] ? __should_failslab+0x278/0x2a0 [ 928.625840] ? kmsan_set_origin_inline+0x6b/0x120 [ 928.630673] ? __msan_poison_alloca+0x15c/0x1d0 [ 928.635338] ? kmsan_set_origin+0x9e/0x160 [ 928.639566] alloc_pages_vma+0x1555/0x17f0 [ 928.643889] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 928.648998] handle_mm_fault+0x44ca/0x7ed0 [ 928.653223] ? kmsan_set_origin_inline+0x6b/0x120 [ 928.658083] __do_page_fault+0xec6/0x1a10 [ 928.662226] do_page_fault+0xb7/0x250 [ 928.666013] ? page_fault+0x8/0x30 [ 928.669540] page_fault+0x1e/0x30 [ 928.673073] RIP: 0033:0x4075fa [ 928.677291] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 928.682641] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 928.689916] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 928.697170] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 928.704425] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e2e25 [ 928.711779] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:14:46 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:46 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) 02:14:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:46 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) [ 928.724229] audit: type=1326 audit(1529720086.718:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17992 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:46 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="7472757374656400a74e60095f6f88d07b9186c974f2000000000000da13c63b8d14a77f6b926d8f56175973645c666dba794b85ab6e771a3ee0be1cbe4e6e2089e0df13c201cc841de4dd7d0a82518d4964569a0200c170778cd83c1d22a2018b51d0f93c9cba74966b1e4eb9439740810528240c36696bbfc84d0ac1636dd7afe3732a408b340d3442bfea1bd785eba6354774908c043fc5d22ec2bcbd81183b6ee5846c5b91564a6816f6dcb70274e2b0515855994c368b1fc836c968a26fbd3b3eae781ddb5db88193e147f26076e468cc6bd7e34b7c039131179836220dc4fedf4c341e83b57832bd3c91221fd15165bdef8e0daa62cd6ec6e08e044cc78bca596db71d86483784a5807d9b2f706b4aee8c5d866af989812c3493ec8d6fe697eab76f89e7e75288ede88fcdcdd6bada9e7438eb6e45e43ba9d92f255e66d538e6777a1874ab8dfb212df0f04d61a987b78a1ec5d32ab198", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:47 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:47 executing program 5: accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)) 02:14:47 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:47 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:47 executing program 5: accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) [ 929.475754] audit: type=1326 audit(1529720087.474:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18059 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:47 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:47 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:47 executing program 5: accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x5001e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:47 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:48 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:48 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="7472757374656400a74e60095f6f88d07b9186c974f2000000000000da13c63b8d14a77f6b926d8f56175973645c666dba794b85ab6e771a3ee0be1cbe4e6e2089e0df13c201cc841de4dd7d0a82518d4964569a0200c170778cd83c1d22a2018b51d0f93c9cba74966b1e4eb9439740810528240c36696bbfc84d0ac1636dd7afe3732a408b340d3442bfea1bd785eba6354774908c043fc5d22ec2bcbd81183b6ee5846c5b91564a6816f6dcb70274e2b0515855994c368b1fc836c968a26fbd3b3eae781ddb5db88193e147f26076e468cc6bd7e34b7c039131179836220dc4fedf4c341e83b57832bd3c91221fd15165bdef8e0daa62cd6ec6e08e044cc78bca596db71d86483784a5807d9b2f706b4aee8c5d866af989812c3493ec8d6fe697eab76f89e7e75288ede88fcdcdd6bada9e7438eb6e45e43ba9d92f255e66d538e6777a1874ab8dfb212df0f04d61a987b78a1ec5d32ab198", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) [ 930.403324] warn_alloc: 24 callbacks suppressed [ 930.403339] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 930.418646] syz-executor4 cpuset=syz4 mems_allowed=0 [ 930.423972] CPU: 1 PID: 18101 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 930.430811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.440172] Call Trace: [ 930.442891] dump_stack+0x185/0x1d0 [ 930.446534] warn_alloc+0x430/0x690 [ 930.450293] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 930.455147] ? kernel_poison_pages+0x40/0x360 [ 930.459655] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 930.465119] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 930.470133] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 930.475198] ? kmsan_set_origin_inline+0x6b/0x120 [ 930.480057] ? __msan_poison_alloca+0x15c/0x1d0 [ 930.484752] kmsan_alloc_page+0x82/0xe0 [ 930.488733] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 930.493502] ? kmsan_set_origin_inline+0x6b/0x120 [ 930.498355] ? __msan_poison_alloca+0x15c/0x1d0 [ 930.503028] ? __should_failslab+0x278/0x2a0 [ 930.507447] ? should_fail+0x57/0xab0 [ 930.511258] ? __should_failslab+0x278/0x2a0 [ 930.515684] ? kmsan_set_origin_inline+0x6b/0x120 [ 930.520536] ? __msan_poison_alloca+0x15c/0x1d0 [ 930.525214] ? kmsan_set_origin+0x9e/0x160 [ 930.529465] alloc_pages_vma+0x1555/0x17f0 [ 930.533728] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 930.538848] handle_mm_fault+0x44ca/0x7ed0 [ 930.543179] ? kmsan_set_origin_inline+0x6b/0x120 [ 930.548056] __do_page_fault+0xec6/0x1a10 [ 930.552483] do_page_fault+0xb7/0x250 [ 930.556391] ? page_fault+0x8/0x30 [ 930.559937] page_fault+0x1e/0x30 [ 930.563385] RIP: 0033:0x4075fa [ 930.566571] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 930.572132] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 930.579493] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 930.587046] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 930.594679] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e3582 [ 930.602379] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 930.609734] warn_alloc_show_mem: 1 callbacks suppressed [ 930.609737] Mem-Info: [ 930.617513] active_anon:164196 inactive_anon:78 isolated_anon:0 [ 930.617513] active_file:1983 inactive_file:3827 isolated_file:0 [ 930.617513] unevictable:0 dirty:128 writeback:0 unstable:0 [ 930.617513] slab_reclaimable:3328 slab_unreclaimable:9495 [ 930.617513] mapped:70258 shmem:84 pagetables:1316 bounce:0 [ 930.617513] free:84146 free_pcp:375 free_cma:0 [ 930.651051] Node 0 active_anon:656784kB inactive_anon:312kB active_file:7932kB inactive_file:15308kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:281032kB dirty:512kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 930.679168] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 930.705287] lowmem_reserve[]: 0 2817 7244 7244 [ 930.709859] Node 0 DMA32 free:261960kB min:26224kB low:32780kB high:39336kB active_anon:224992kB inactive_anon:0kB active_file:2076kB inactive_file:11120kB unevictable:0kB writepending:44kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2176kB pagetables:1580kB bounce:0kB free_pcp:832kB local_pcp:132kB free_cma:0kB [ 930.739275] lowmem_reserve[]: 0 0 4426 4426 [ 930.743582] Node 0 Normal free:58720kB min:41208kB low:51508kB high:61808kB active_anon:431724kB inactive_anon:312kB active_file:5856kB inactive_file:4188kB unevictable:0kB writepending:468kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3684kB bounce:0kB free_pcp:668kB local_pcp:172kB free_cma:0kB [ 930.773529] lowmem_reserve[]: 0 0 0 0 [ 930.777525] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 930.790746] Node 0 DMA32: 12114*4kB (UMEH) 7296*8kB (UME) 2334*16kB (UME) 1085*32kB (UME) 745*64kB (UME) 93*128kB (UM) 37*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 0*2048kB 0*4096kB = 261768kB [ 930.807778] Node 0 Normal: 6517*4kB (UMEH) 2796*8kB (UMEH) 422*16kB (UMEH) 42*32kB (UMH) 10*64kB (H) 1*128kB (H) 1*256kB (H) 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 58580kB [ 930.824454] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 930.833099] 5909 total pagecache pages [ 930.836963] 0 pages in swap cache [ 930.840395] Swap cache stats: add 0, delete 0, find 0/0 [ 930.845747] Free swap = 0kB [ 930.848745] Total swap = 0kB [ 930.851743] 1965969 pages RAM [ 930.854828] 0 pages HighMem/MovableOnly [ 930.858780] 106316 pages reserved [ 930.868453] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 930.879101] syz-executor1 cpuset=syz1 mems_allowed=0 [ 930.884226] CPU: 0 PID: 18104 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 930.891068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.900430] Call Trace: [ 930.903032] dump_stack+0x185/0x1d0 [ 930.906675] warn_alloc+0x430/0x690 [ 930.910317] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 930.915166] ? kernel_poison_pages+0x40/0x360 [ 930.919676] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 930.925140] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 930.930102] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 930.935144] ? kmsan_set_origin_inline+0x6b/0x120 [ 930.939998] ? __msan_poison_alloca+0x15c/0x1d0 [ 930.944686] kmsan_alloc_page+0x82/0xe0 [ 930.948672] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 930.953560] ? kmsan_set_origin_inline+0x6b/0x120 [ 930.958594] ? __msan_poison_alloca+0x15c/0x1d0 [ 930.963271] ? __should_failslab+0x278/0x2a0 [ 930.967750] ? should_fail+0x57/0xab0 [ 930.971575] ? __should_failslab+0x278/0x2a0 [ 930.975989] ? kmsan_set_origin_inline+0x6b/0x120 [ 930.980937] ? __msan_poison_alloca+0x15c/0x1d0 [ 930.985791] ? kmsan_set_origin+0x9e/0x160 [ 930.990038] alloc_pages_vma+0x1555/0x17f0 [ 930.994306] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 930.999435] handle_mm_fault+0x44ca/0x7ed0 [ 931.003674] ? kmsan_set_origin_inline+0x6b/0x120 [ 931.008534] __do_page_fault+0xec6/0x1a10 [ 931.012792] do_page_fault+0xb7/0x250 [ 931.016689] ? page_fault+0x8/0x30 [ 931.020236] page_fault+0x1e/0x30 [ 931.023689] RIP: 0033:0x4075fa [ 931.026967] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 931.032361] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 931.039737] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 931.047271] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 02:14:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:49 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:49 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) [ 931.054584] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e3753 [ 931.061977] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 931.070784] audit: type=1326 audit(1529720089.069:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18101 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:49 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) [ 931.342463] audit: type=1326 audit(1529720089.341:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18135 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) [ 931.503042] audit: type=1326 audit(1529720089.501:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18149 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:49 executing program 0: getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:49 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:50 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) [ 932.284508] audit: type=1326 audit(1529720090.283:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18197 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) 02:14:50 executing program 0: getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:50 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) [ 932.454813] audit: type=1326 audit(1529720090.453:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18216 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:50 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:50 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:51 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key(&(0x7f0000000500)="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", &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x11, 0xffffffffffffffff) setreuid(0x0, 0x0) 02:14:51 executing program 0: getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) [ 933.222517] audit: type=1326 audit(1529720091.220:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18244 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 933.258591] audit: type=1326 audit(1529720091.242:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18247 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) [ 933.550745] audit: type=1326 audit(1529720091.549:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18268 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) [ 934.195302] audit: type=1326 audit(1529720092.193:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18299 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:52 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') [ 934.537975] audit: type=1326 audit(1529720092.536:1750): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18332 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x5c) 02:14:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) [ 935.180948] audit: type=1326 audit(1529720093.179:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18356 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) [ 935.314168] audit: type=1326 audit(1529720093.312:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18362 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {0x0, 0x7530}}) 02:14:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) [ 935.521464] audit: type=1326 audit(1529720093.520:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18384 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:54 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) timerfd_create(0x0, 0x0) 02:14:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) [ 936.239744] audit: type=1326 audit(1529720094.238:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18407 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) timerfd_create(0x0, 0x0) [ 936.354839] audit: type=1326 audit(1529720094.353:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18420 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) timerfd_create(0x0, 0x0) 02:14:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:54 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:54 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:54 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:54 executing program 7: msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:54 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000100)='ipddp0\x00') 02:14:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:55 executing program 7: msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:55 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:55 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:55 executing program 7: msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:55 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:55 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) getpgrp(0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) 02:14:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:56 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) 02:14:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:14:56 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:56 executing program 5: request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) [ 938.456607] kauditd_printk_skb: 6 callbacks suppressed [ 938.456629] audit: type=1326 audit(1529720096.454:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18542 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:56 executing program 5: request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) [ 938.723417] audit: type=1326 audit(1529720096.721:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18559 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:14:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:14:57 executing program 5: request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:14:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:57 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:14:57 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:14:57 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f00000009c0)=ANY=[]}, 0x1}, 0x0) 02:14:57 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:14:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:14:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:14:57 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) [ 939.763534] audit: type=1326 audit(1529720097.762:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18625 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:57 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:57 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:14:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:14:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:14:58 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:58 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:14:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:58 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:58 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:14:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 02:14:58 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:14:58 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:58 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:14:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:58 executing program 3: accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:14:58 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:14:58 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) [ 940.938482] audit: type=1326 audit(1529720098.937:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18683 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 02:14:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:14:59 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:14:59 executing program 3: accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) [ 941.156548] audit: type=1326 audit(1529720099.153:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18708 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:14:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:14:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:14:59 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:14:59 executing program 0: statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:14:59 executing program 3: accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) [ 941.413511] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 941.413868] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 941.424167] syz-executor0 cpuset= [ 941.434639] syz-executor3 cpuset= [ 941.434641] syz0 mems_allowed=0 [ 941.438163] syz3 [ 941.441601] CPU: 1 PID: 18727 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 941.444978] mems_allowed=0 [ 941.446941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.466205] Call Trace: [ 941.468817] dump_stack+0x185/0x1d0 [ 941.472431] warn_alloc+0x430/0x690 [ 941.476056] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 941.480900] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 941.486336] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 941.491268] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 941.496352] ? kmsan_set_origin_inline+0x6b/0x120 [ 941.501184] ? __msan_poison_alloca+0x15c/0x1d0 [ 941.505872] kmsan_alloc_page+0x82/0xe0 [ 941.509832] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 941.514573] ? kmsan_set_origin_inline+0x6b/0x120 [ 941.519402] ? __msan_poison_alloca+0x15c/0x1d0 [ 941.524054] ? __should_failslab+0x278/0x2a0 [ 941.528449] ? should_fail+0x57/0xab0 [ 941.532231] ? __should_failslab+0x278/0x2a0 [ 941.536625] ? kmsan_set_origin_inline+0x6b/0x120 [ 941.541453] ? __msan_poison_alloca+0x15c/0x1d0 [ 941.546106] ? kmsan_set_origin+0x9e/0x160 [ 941.550334] alloc_pages_vma+0x1555/0x17f0 [ 941.554559] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 941.559658] handle_mm_fault+0x44ca/0x7ed0 [ 941.563894] ? kmsan_set_origin_inline+0x6b/0x120 [ 941.568818] __do_page_fault+0xec6/0x1a10 [ 941.573046] do_page_fault+0xb7/0x250 [ 941.576833] ? page_fault+0x8/0x30 [ 941.580357] page_fault+0x1e/0x30 [ 941.583798] RIP: 0033:0x43cec9 [ 941.586968] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 941.592313] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0031656c69662f2e [ 941.599575] RDX: 0000000000000008 RSI: 0000000000730020 RDI: 0000000020000080 [ 941.606829] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000001a49940 [ 941.614261] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e6085 [ 941.621526] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 941.628797] warn_alloc_show_mem: 1 callbacks suppressed [ 941.628807] CPU: 0 PID: 18729 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 941.628808] Mem-Info: [ 941.628835] active_anon:164293 inactive_anon:76 isolated_anon:0 [ 941.628835] active_file:2093 inactive_file:2954 isolated_file:0 [ 941.628835] unevictable:0 dirty:20 writeback:0 unstable:0 [ 941.628835] slab_reclaimable:3328 slab_unreclaimable:9513 [ 941.628835] mapped:69592 shmem:84 pagetables:1394 bounce:0 [ 941.628835] free:75673 free_pcp:406 free_cma:0 [ 941.634182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.641030] Node 0 active_anon:657172kB inactive_anon:304kB active_file:8372kB inactive_file:11816kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278368kB dirty:80kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 941.643424] Call Trace: [ 941.676456] Node 0 [ 941.685821] dump_stack+0x185/0x1d0 [ 941.713909] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 941.716468] warn_alloc+0x430/0x690 [ 941.718681] lowmem_reserve[]: [ 941.722391] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 941.747856] 0 [ 941.751485] ? kernel_poison_pages+0x40/0x360 [ 941.754551] 2817 [ 941.759380] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 941.761159] 7244 [ 941.765726] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 941.767766] 7244 [ 941.773216] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 941.780156] ? update_load_avg+0x1b70/0x2cc0 [ 941.782184] Node 0 [ 941.787205] kmsan_alloc_page+0x82/0xe0 [ 941.791590] DMA32 free:235336kB min:26224kB low:32780kB high:39336kB active_anon:225728kB inactive_anon:28kB active_file:2344kB inactive_file:7800kB unevictable:0kB writepending:36kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2496kB pagetables:2408kB bounce:0kB free_pcp:236kB local_pcp:176kB free_cma:0kB [ 941.793795] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 941.797744] lowmem_reserve[]: [ 941.826633] ? kmsan_set_origin_inline+0x6b/0x120 [ 941.831361] 0 [ 941.834449] ? __msan_poison_alloca+0x15c/0x1d0 [ 941.839263] 0 [ 941.841126] ? __should_failslab+0x278/0x2a0 [ 941.845776] 4426 [ 941.847565] ? should_fail+0x57/0xab0 [ 941.851953] 4426 [ 941.853999] ? __should_failslab+0x278/0x2a0 [ 941.859832] ? kmsan_set_origin_inline+0x6b/0x120 [ 941.864218] Node 0 [ 941.869041] ? __msan_poison_alloca+0x15c/0x1d0 [ 941.869062] Normal free:51452kB min:41208kB low:51508kB high:61808kB active_anon:431544kB inactive_anon:276kB active_file:6028kB inactive_file:4016kB unevictable:0kB writepending:44kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3168kB bounce:0kB free_pcp:1388kB local_pcp:660kB free_cma:0kB [ 941.869067] lowmem_reserve[]: [ 941.871307] ? kmsan_set_origin+0x9e/0x160 [ 941.875949] 0 [ 941.904753] alloc_pages_vma+0x1555/0x17f0 [ 941.907835] 0 [ 941.912063] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 941.913828] 0 [ 941.918051] handle_mm_fault+0x44ca/0x7ed0 [ 941.919820] 0 [ 941.924994] ? kmsan_set_origin_inline+0x6b/0x120 [ 941.931020] __do_page_fault+0xec6/0x1a10 [ 941.932796] Node 0 [ 941.937631] do_page_fault+0xb7/0x250 [ 941.941742] DMA: [ 941.943967] ? page_fault+0x8/0x30 [ 941.947740] 0*4kB [ 941.949795] page_fault+0x1e/0x30 [ 941.953309] 0*8kB [ 941.955443] RIP: 0033:0x4075d5 [ 941.958874] 0*16kB [ 941.961020] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 941.964185] 1*32kB [ 941.971741] (U) [ 941.973952] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000010 [ 941.973955] 2*64kB (U) [ 941.975918] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 941.983348] 1*128kB [ 941.985927] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 941.993169] (U) [ 941.995474] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e6085 [ 942.002724] 1*256kB [ 942.004683] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 942.011936] (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 942.028459] Node 0 DMA32: 5217*4kB (UMEH) 7703*8kB (UME) 2323*16kB (UME) 1071*32kB (UME) 724*64kB (UME) 91*128kB (UM) 37*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 3*2048kB (UM) 1*4096kB (M) = 245452kB [ 942.046430] Node 0 Normal: 5925*4kB (UMEH) 2419*8kB (UMEH) 310*16kB (UMEH) 28*32kB (UMH) 10*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 51468kB 02:15:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:15:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:00 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) [ 942.062471] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 942.071047] 5131 total pagecache pages [ 942.074929] 0 pages in swap cache [ 942.078379] Swap cache stats: add 0, delete 0, find 0/0 [ 942.083737] Free swap = 0kB [ 942.086754] Total swap = 0kB [ 942.089766] 1965969 pages RAM [ 942.092860] 0 pages HighMem/MovableOnly [ 942.096907] 106316 pages reserved 02:15:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:15:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) [ 942.159302] audit: type=1326 audit(1529720100.157:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18740 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:15:00 executing program 1: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:15:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) [ 942.372843] audit: type=1326 audit(1529720100.370:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18755 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:00 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:15:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:15:00 executing program 1: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) [ 942.497489] audit: type=1326 audit(1529720100.496:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18769 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:00 executing program 0: statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:15:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) timerfd_create(0x0, 0x0) 02:15:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:15:01 executing program 1: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:15:01 executing program 0: statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) [ 943.125841] audit: type=1326 audit(1529720101.124:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18800 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=""/39}, 0x18) 02:15:01 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:01 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) [ 943.314852] audit: type=1326 audit(1529720101.313:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18817 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:15:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:15:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:15:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:01 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) [ 943.476432] audit: type=1326 audit(1529720101.475:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18824 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 943.558599] audit: type=1326 audit(1529720101.505:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18830 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:02 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:15:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:02 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:02 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:15:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:02 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f0000000000)='%@\\]security\x00', 0xfffffffffffffff9) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[]}, 0x1}, 0x0) 02:15:02 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:15:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:15:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) [ 944.530331] audit: type=1326 audit(1529720102.528:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18882 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:15:02 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) [ 944.603280] audit: type=1326 audit(1529720102.601:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18889 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) [ 944.724743] audit: type=1326 audit(1529720102.723:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18901 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:02 executing program 2: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000001c0)={0x0, @rand_addr, 0x0, 0x0, 'sh\x00'}, 0x2c) 02:15:03 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:03 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') [ 945.532780] audit: type=1326 audit(1529720103.531:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18936 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:15:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:03 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:03 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') [ 945.798786] audit: type=1326 audit(1529720103.797:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18958 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:03 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:04 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:04 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:04 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) [ 946.475079] audit: type=1326 audit(1529720104.473:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18980 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 946.528407] audit: type=1326 audit(1529720104.504:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18985 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000000c0), 0x4) 02:15:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:04 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:04 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) [ 946.762128] audit: type=1326 audit(1529720104.760:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19002 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:04 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:04 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:05 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:05 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:05 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:05 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:05 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) quotactl(0x0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000300)) 02:15:06 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:06 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:06 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x1c) 02:15:06 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:06 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) [ 948.673346] kauditd_printk_skb: 4 callbacks suppressed [ 948.673370] audit: type=1326 audit(1529720106.672:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19118 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:06 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:06 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:07 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:07 executing program 6: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:07 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001300)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000003680)) 02:15:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:07 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') [ 949.399002] audit: type=1326 audit(1529720107.392:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19151 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:07 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 02:15:07 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:07 executing program 6: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:07 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:07 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:07 executing program 6: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:07 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 02:15:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x45, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/69}, &(0x7f0000000280)=0x78) 02:15:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:08 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:08 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:08 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) [ 950.395499] audit: type=1326 audit(1529720108.394:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19221 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:08 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:08 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) [ 950.607848] audit: type=1326 audit(1529720108.606:1789): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19236 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:08 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:08 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:09 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:09 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:09 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) [ 951.321216] audit: type=1326 audit(1529720109.319:1790): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19262 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) [ 951.698414] audit: type=1326 audit(1529720109.697:1791): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19292 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:09 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50280}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:10 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:10 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) [ 952.260873] audit: type=1326 audit(1529720110.259:1792): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19327 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 952.321360] audit: type=1326 audit(1529720110.315:1793): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19335 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 02:15:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000004c0)}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:10 executing program 0: accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) [ 952.668937] audit: type=1326 audit(1529720110.667:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19354 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000004c0)}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) 02:15:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:11 executing program 0: accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000004c0)}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') [ 953.258572] audit: type=1326 audit(1529720111.257:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19381 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:11 executing program 0: accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:11 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 02:15:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:12 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) [ 954.239329] kauditd_printk_skb: 2 callbacks suppressed [ 954.239352] audit: type=1326 audit(1529720112.238:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19431 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) [ 954.382215] audit: type=1326 audit(1529720112.380:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19444 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:12 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) [ 954.572748] audit: type=1326 audit(1529720112.571:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19462 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:13 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:13 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:13 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:13 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) [ 955.170822] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 955.171163] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 955.181397] syz-executor1 cpuset= [ 955.191879] syz-executor4 cpuset= [ 955.191882] syz1 mems_allowed=0 [ 955.195328] syz4 [ 955.198769] CPU: 0 PID: 19474 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 955.202018] mems_allowed=0 [ 955.203968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.223021] Call Trace: [ 955.225621] dump_stack+0x185/0x1d0 [ 955.229237] warn_alloc+0x430/0x690 [ 955.232857] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 955.237690] ? kernel_poison_pages+0x40/0x360 [ 955.242186] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 955.247629] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 955.252565] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 955.257515] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.262361] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.267023] kmsan_alloc_page+0x82/0xe0 [ 955.270997] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 955.275739] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.280657] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.285311] ? __should_failslab+0x278/0x2a0 [ 955.289709] ? should_fail+0x57/0xab0 [ 955.293503] ? __should_failslab+0x278/0x2a0 [ 955.297908] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.302739] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.307403] ? kmsan_set_origin+0x9e/0x160 [ 955.311629] alloc_pages_vma+0x1555/0x17f0 [ 955.316121] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 955.321216] handle_mm_fault+0x44ca/0x7ed0 [ 955.325446] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.330293] __do_page_fault+0xec6/0x1a10 [ 955.334456] do_page_fault+0xb7/0x250 [ 955.338249] ? page_fault+0x8/0x30 [ 955.341772] page_fault+0x1e/0x30 [ 955.345318] RIP: 0033:0x4075fa [ 955.348515] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 955.353858] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 955.361111] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 955.368369] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 955.375652] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e9642 [ 955.383001] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 955.390272] warn_alloc_show_mem: 1 callbacks suppressed [ 955.390281] CPU: 1 PID: 19476 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 955.390282] Mem-Info: [ 955.390307] active_anon:164322 inactive_anon:78 isolated_anon:0 [ 955.390307] active_file:2226 inactive_file:2980 isolated_file:0 [ 955.390307] unevictable:0 dirty:39 writeback:0 unstable:0 [ 955.390307] slab_reclaimable:3328 slab_unreclaimable:9508 [ 955.390307] mapped:69562 shmem:84 pagetables:1311 bounce:0 [ 955.390307] free:66595 free_pcp:366 free_cma:0 [ 955.395650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.402481] Node 0 active_anon:657288kB inactive_anon:312kB active_file:8904kB inactive_file:11920kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278248kB dirty:156kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 955.404869] Call Trace: [ 955.437901] Node 0 [ 955.447267] dump_stack+0x185/0x1d0 [ 955.475271] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 955.477829] warn_alloc+0x430/0x690 [ 955.480031] lowmem_reserve[]: [ 955.483744] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 955.509310] 0 [ 955.512927] ? kernel_poison_pages+0x40/0x360 [ 955.515988] 2817 7244 [ 955.520830] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 955.522602] 7244 [ 955.527090] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 955.535093] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 955.537116] Node 0 [ 955.542039] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.547037] DMA32 free:199080kB min:26224kB low:32780kB high:39336kB active_anon:225768kB inactive_anon:36kB active_file:2776kB inactive_file:7896kB unevictable:0kB writepending:92kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2304kB pagetables:2076kB bounce:0kB free_pcp:152kB local_pcp:76kB free_cma:0kB [ 955.549262] kmsan_alloc_page+0x82/0xe0 [ 955.554071] lowmem_reserve[]: [ 955.582625] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 955.586569] 0 [ 955.589658] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.594390] 0 4426 [ 955.596211] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.601019] 4426 [ 955.603240] ? __should_failslab+0x278/0x2a0 [ 955.609933] ? should_fail+0x57/0xab0 [ 955.614306] Node 0 [ 955.618086] ? __should_failslab+0x278/0x2a0 [ 955.618116] Normal free:51396kB min:41208kB low:51508kB high:61808kB active_anon:431520kB inactive_anon:276kB active_file:6128kB inactive_file:4024kB unevictable:0kB writepending:64kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3168kB bounce:0kB free_pcp:1312kB local_pcp:676kB free_cma:0kB [ 955.620315] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.624695] lowmem_reserve[]: [ 955.653504] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.658318] 0 [ 955.661419] ? kmsan_set_origin+0x9e/0x160 [ 955.666069] 0 [ 955.667862] alloc_pages_vma+0x1555/0x17f0 [ 955.672152] 0 [ 955.673941] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 955.678138] 0 [ 955.679929] handle_mm_fault+0x44ca/0x7ed0 [ 955.685004] Node 0 [ 955.686791] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.690994] DMA: 0*4kB [ 955.693236] __do_page_fault+0xec6/0x1a10 [ 955.698038] 0*8kB [ 955.700611] do_page_fault+0xb7/0x250 [ 955.704721] 0*16kB [ 955.706858] ? page_fault+0x8/0x30 [ 955.710623] 1*32kB [ 955.712839] page_fault+0x1e/0x30 [ 955.716346] (U) [ 955.718566] RIP: 0033:0x4075fa [ 955.721988] 2*64kB [ 955.723961] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 955.727130] (U) [ 955.734684] 1*128kB [ 955.736639] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 955.736646] (U) [ 955.738950] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 955.746204] 1*256kB [ 955.748170] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 955.755417] (U) [ 955.757719] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e9642 [ 955.764966] 0*512kB [ 955.766944] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 955.774275] 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 955.789681] Node 0 DMA32: [ 955.789701] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 955.789704] 3435*4kB (MEH) [ 955.792553] syz-executor7 cpuset= [ 955.803014] 3930*8kB [ 955.805933] syz7 [ 955.809468] (UME) [ 955.811941] mems_allowed=0 [ 955.813898] 2322*16kB [ 955.816025] CPU: 1 PID: 19479 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 955.818920] (UME) [ 955.821395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 955.828201] 1071*32kB [ 955.830325] Call Trace: [ 955.839651] (UME) [ 955.842135] dump_stack+0x185/0x1d0 [ 955.844870] 733*64kB [ 955.847005] warn_alloc+0x430/0x690 [ 955.850589] (UME) [ 955.852989] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 955.856571] 91*128kB [ 955.858704] ? kernel_poison_pages+0x40/0x360 [ 955.863510] (UM) [ 955.865903] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 955.870361] 37*256kB [ 955.872420] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 955.877820] (UM) [ 955.880218] ? apic_timer_interrupt+0xa/0x20 [ 955.885195] 17*512kB [ 955.887237] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.891607] (UM) [ 955.894003] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.898805] 5*1024kB [ 955.900852] kmsan_alloc_page+0x82/0xe0 [ 955.905481] (ME) [ 955.907871] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 955.912089] 0*2048kB [ 955.914136] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.918964] 0*4096kB [ 955.921360] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.926167] = 198460kB [ 955.928564] ? __should_failslab+0x278/0x2a0 [ 955.933197] Node 0 [ 955.935683] ? should_fail+0x57/0xab0 [ 955.940065] Normal: 5925*4kB [ 955.942293] ? __should_failslab+0x278/0x2a0 [ 955.946064] (UMEH) [ 955.949154] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.953614] 2400*8kB [ 955.955843] ? __msan_poison_alloca+0x15c/0x1d0 [ 955.961434] (UMEH) [ 955.963832] ? kmsan_set_origin+0x9e/0x160 [ 955.968564] 313*16kB [ 955.970819] alloc_pages_vma+0x1555/0x17f0 [ 955.975112] (UMEH) [ 955.977525] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 955.982691] 25*32kB [ 955.984933] handle_mm_fault+0x44ca/0x7ed0 [ 955.989988] (UMH) [ 955.992301] ? kmsan_set_origin_inline+0x6b/0x120 [ 955.996587] 12*64kB [ 955.998727] __do_page_fault+0xec6/0x1a10 [ 956.003530] (UH) [ 956.005854] do_page_fault+0xb7/0x250 [ 956.009978] 1*128kB [ 956.012031] ? page_fault+0x8/0x30 [ 956.015795] (H) [ 956.018101] page_fault+0x1e/0x30 [ 956.021612] 1*256kB [ 956.023577] RIP: 0033:0x4075fa [ 956.027002] (H) [ 956.029312] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 956.032478] 1*512kB [ 956.039770] (H) [ 956.042084] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 956.042091] 1*1024kB [ 956.044054] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 956.051299] (H) [ 956.053691] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 956.060937] 0*2048kB [ 956.062894] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e98ac [ 956.070140] 0*4096kB [ 956.072536] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 956.079788] = 51396kB [ 956.091927] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 956.100499] 5290 total pagecache pages [ 956.104369] 0 pages in swap cache [ 956.107805] Swap cache stats: add 0, delete 0, find 0/0 [ 956.113165] Free swap = 0kB [ 956.116180] Total swap = 0kB [ 956.119186] 1965969 pages RAM [ 956.122270] 0 pages HighMem/MovableOnly [ 956.126218] 106316 pages reserved 02:15:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 02:15:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:14 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) [ 956.255518] audit: type=1326 audit(1529720114.254:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19490 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 956.332539] audit: type=1326 audit(1529720114.300:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19493 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:14 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:14 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:14 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:14 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:15 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000004c0)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x5, 0x0, [0x0, 0x200007c0, 0x200009b8, 0x20000ce8], 0x0, &(0x7f0000000500), &(0x7f00000007c0)=ANY=[]}, 0x78) 02:15:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:15 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) [ 957.255040] audit: type=1326 audit(1529720115.253:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19552 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:15 executing program 4: add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:15 executing program 7: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) [ 957.481236] audit: type=1326 audit(1529720115.479:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19569 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:15 executing program 4: add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:15 executing program 7: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) [ 957.663779] audit: type=1326 audit(1529720115.662:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19589 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:16 executing program 4: add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:16 executing program 7: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:16 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:16 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:16 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:16 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:16 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) [ 958.488707] audit: type=1326 audit(1529720116.487:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19636 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:16 executing program 5: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:16 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:16 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:16 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) [ 958.747768] audit: type=1326 audit(1529720116.746:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19654 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x14, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 02:15:17 executing program 5: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:17 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) [ 959.481848] audit: type=1326 audit(1529720117.480:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19687 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:17 executing program 5: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:17 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100), 0x4) 02:15:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) [ 959.685493] audit: type=1326 audit(1529720117.684:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19701 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:17 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) [ 959.741304] audit: type=1326 audit(1529720117.727:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19709 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:18 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:18 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:18 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) [ 960.741177] audit: type=1326 audit(1529720118.739:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19759 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) [ 960.828804] audit: type=1326 audit(1529720118.779:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19764 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:18 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) [ 961.163901] audit: type=1326 audit(1529720119.162:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19791 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x0) 02:15:19 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:19 executing program 6: statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:19 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) [ 961.720361] audit: type=1326 audit(1529720119.719:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19811 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:19 executing program 6: statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:19 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) [ 961.853445] audit: type=1326 audit(1529720119.850:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19817 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:20 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) [ 962.203031] audit: type=1326 audit(1529720120.201:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19846 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:20 executing program 6: statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) [ 962.662438] audit: type=1326 audit(1529720120.661:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19857 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:20 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 02:15:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:20 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:20 executing program 1: memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:20 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) sched_rr_get_interval(0x0, &(0x7f0000000340)) 02:15:21 executing program 0: pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:21 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:21 executing program 1: memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:21 executing program 0: pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:21 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000001280)}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:21 executing program 1: memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:21 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000001280)}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:22 executing program 0: pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000001280)}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0xf6, [], 0x0, &(0x7f0000000000), &(0x7f0000000200)=""/246}, &(0x7f0000000040)=0x78) 02:15:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:22 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) [ 964.575309] kauditd_printk_skb: 3 callbacks suppressed [ 964.575332] audit: type=1326 audit(1529720122.573:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19970 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:22 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:23 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:23 executing program 2: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000003c0)) [ 965.497816] audit: type=1326 audit(1529720123.496:1822): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20024 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) [ 965.553188] audit: type=1326 audit(1529720123.519:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20023 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:23 executing program 2: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) prctl$setendian(0x14, 0x0) 02:15:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:23 executing program 2: ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) prctl$setendian(0x14, 0x0) 02:15:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) 02:15:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) prctl$setendian(0x14, 0x0) [ 966.475324] audit: type=1326 audit(1529720124.473:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20091 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:24 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) [ 966.561848] audit: type=1326 audit(1529720124.546:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20094 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:24 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) [ 966.875180] audit: type=1326 audit(1529720124.873:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20120 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'security\x00'}, &(0x7f0000000480)=0x24) 02:15:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:25 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000001280)=[{0x6}]}) statfs(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)=""/98) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001500)='cgroup.threads\x00', 0x2, 0x0) [ 967.462911] audit: type=1326 audit(1529720125.461:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20132 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) [ 967.532344] audit: type=1326 audit(1529720125.517:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20141 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:25 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) [ 967.639210] audit: type=1326 audit(1529720125.637:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20146 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:25 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:25 executing program 7: pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:25 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) [ 967.942044] audit: type=1326 audit(1529720125.940:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20166 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:26 executing program 7: pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:26 executing program 7: pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) memfd_create(&(0x7f0000000040)='selinuxvmnet0a\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 02:15:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:26 executing program 5: syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:27 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x40000000050254}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000080)) getxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='security.selinux\x00', &(0x7f0000000600)=""/4096, 0x1000) 02:15:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:27 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:27 executing program 5: syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) [ 969.609775] kauditd_printk_skb: 2 callbacks suppressed [ 969.609798] audit: type=1326 audit(1529720127.608:1833): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20258 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 969.706642] audit: type=1326 audit(1529720127.635:1834): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20266 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:27 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:27 executing program 5: syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:27 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) [ 969.934168] audit: type=1326 audit(1529720127.931:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20274 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) shutdown(0xffffffffffffffff, 0x0) 02:15:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:28 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) shutdown(0xffffffffffffffff, 0x0) 02:15:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) [ 970.585603] audit: type=1326 audit(1529720128.584:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20316 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:28 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:28 executing program 3: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:28 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) shutdown(0xffffffffffffffff, 0x0) 02:15:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) [ 970.889886] audit: type=1326 audit(1529720128.888:1837): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20343 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:29 executing program 3: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000140)) 02:15:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:29 executing program 6: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:29 executing program 3: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) [ 971.519920] audit: type=1326 audit(1529720129.518:1838): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20359 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:29 executing program 6: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:29 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) prctl$setendian(0x14, 0x0) 02:15:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) [ 971.864980] audit: type=1326 audit(1529720129.858:1839): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20394 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:29 executing program 6: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) [ 972.009340] audit: type=1326 audit(1529720130.007:1840): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20402 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:30 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:30 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:30 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:30 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:30 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:31 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:31 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) [ 973.082169] audit: type=1326 audit(1529720131.080:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20469 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:31 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:31 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) [ 973.247550] audit: type=1326 audit(1529720131.246:1842): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20478 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:31 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000240)) accept$inet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10) 02:15:31 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:31 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:31 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:32 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:32 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:32 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:32 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) [ 975.007928] kauditd_printk_skb: 2 callbacks suppressed [ 975.007953] audit: type=1326 audit(1529720133.006:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20558 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) 02:15:33 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:33 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) [ 975.210882] audit: type=1326 audit(1529720133.209:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20575 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) [ 975.315649] audit: type=1326 audit(1529720133.314:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20582 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:33 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:33 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:33 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:33 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) [ 975.955889] audit: type=1326 audit(1529720133.954:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20610 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) [ 976.170939] audit: type=1326 audit(1529720134.169:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20631 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180)=""/18, &(0x7f00000001c0)=0x12) 02:15:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) [ 976.867794] audit: type=1326 audit(1529720134.866:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20663 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) shutdown(0xffffffffffffffff, 0x0) 02:15:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) [ 977.137443] audit: type=1326 audit(1529720135.136:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20695 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50190}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) [ 977.355857] audit: type=1326 audit(1529720135.354:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20706 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:35 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) [ 977.807362] audit: type=1326 audit(1529720135.805:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20713 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:35 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:36 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) shmctl$IPC_RMID(0x0, 0x0) 02:15:36 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 02:15:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:36 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:36 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) shmctl$IPC_RMID(0x0, 0x0) 02:15:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) add_key(&(0x7f0000000480)='blacklist\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, &(0x7f0000000500), 0x0, 0x0) flock(0xffffffffffffffff, 0x0) [ 978.397415] audit: type=1326 audit(1529720136.395:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20763 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:36 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) shmctl$IPC_RMID(0x0, 0x0) 02:15:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:36 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'syz_tun\x00'}) 02:15:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/170, &(0x7f0000000200)=0xaa) 02:15:37 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:37 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:38 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:38 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000005024e}]}) msync(&(0x7f0000dff000/0x2000)=nil, 0x2000, 0x0) inotify_init() [ 980.674736] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 980.675080] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 980.685498] syz-executor1 cpuset= [ 980.696064] syz-executor3 cpuset= [ 980.696066] syz1 mems_allowed=0 [ 980.699604] syz3 [ 980.703057] CPU: 0 PID: 20879 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 980.706310] mems_allowed=0 [ 980.708263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.727568] Call Trace: [ 980.730154] dump_stack+0x185/0x1d0 [ 980.733772] warn_alloc+0x430/0x690 [ 980.737399] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 980.742265] ? kernel_poison_pages+0x40/0x360 [ 980.746758] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 980.752202] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 980.757140] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 980.762183] ? kmsan_set_origin_inline+0x6b/0x120 [ 980.767031] ? __msan_poison_alloca+0x15c/0x1d0 [ 980.771700] kmsan_alloc_page+0x82/0xe0 [ 980.775665] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 980.780414] ? kmsan_set_origin_inline+0x6b/0x120 [ 980.785264] ? __msan_poison_alloca+0x15c/0x1d0 [ 980.789927] ? __should_failslab+0x278/0x2a0 [ 980.794333] ? should_fail+0x57/0xab0 [ 980.798142] ? __should_failslab+0x278/0x2a0 [ 980.802977] ? kmsan_set_origin_inline+0x6b/0x120 [ 980.807812] ? __msan_poison_alloca+0x15c/0x1d0 [ 980.812557] ? kmsan_set_origin+0x9e/0x160 [ 980.816822] alloc_pages_vma+0x1555/0x17f0 [ 980.821060] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 980.826206] handle_mm_fault+0x44ca/0x7ed0 [ 980.830525] ? kmsan_set_origin_inline+0x6b/0x120 [ 980.835370] __do_page_fault+0xec6/0x1a10 [ 980.839517] do_page_fault+0xb7/0x250 [ 980.843403] ? page_fault+0x8/0x30 [ 980.846932] page_fault+0x1e/0x30 [ 980.850457] RIP: 0033:0x4075fa [ 980.853646] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 980.858997] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 980.866256] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 980.873518] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 980.880776] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ef9e2 [ 980.888037] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 980.895307] warn_alloc_show_mem: 2 callbacks suppressed [ 980.895317] CPU: 1 PID: 20880 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 980.895318] Mem-Info: [ 980.895342] active_anon:164426 inactive_anon:78 isolated_anon:0 [ 980.895342] active_file:2242 inactive_file:3014 isolated_file:0 [ 980.895342] unevictable:0 dirty:26 writeback:0 unstable:0 [ 980.895342] slab_reclaimable:3328 slab_unreclaimable:9507 [ 980.895342] mapped:69588 shmem:84 pagetables:1285 bounce:0 [ 980.895342] free:48746 free_pcp:435 free_cma:0 [ 980.900690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.907526] Node 0 active_anon:657704kB inactive_anon:312kB active_file:8968kB inactive_file:12056kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278352kB dirty:104kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 980.909915] Call Trace: [ 980.942959] Node 0 [ 980.952318] dump_stack+0x185/0x1d0 [ 980.980348] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 980.982916] warn_alloc+0x430/0x690 [ 980.985131] lowmem_reserve[]: [ 980.988771] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 981.014258] 0 [ 981.017884] ? kernel_poison_pages+0x40/0x360 [ 981.020949] 2817 7244 7244 [ 981.025800] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 981.027585] Node 0 [ 981.032071] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 981.035001] DMA32 free:127676kB min:26224kB low:32780kB high:39336kB active_anon:226144kB inactive_anon:36kB active_file:2832kB inactive_file:8040kB unevictable:0kB writepending:52kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2240kB pagetables:1972kB bounce:0kB free_pcp:444kB local_pcp:184kB free_cma:0kB [ 981.040465] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 981.042684] lowmem_reserve[]: [ 981.047612] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.076399] 0 [ 981.081435] kmsan_alloc_page+0x82/0xe0 [ 981.084513] 0 [ 981.089350] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 981.091130] 4426 [ 981.095094] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.096884] 4426 [ 981.101629] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.108494] ? __should_failslab+0x278/0x2a0 [ 981.110522] Node 0 [ 981.115193] ? should_fail+0x57/0xab0 [ 981.119593] Normal free:51404kB min:41208kB low:51508kB high:61808kB active_anon:431560kB inactive_anon:276kB active_file:6136kB inactive_file:4016kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3168kB bounce:0kB free_pcp:1296kB local_pcp:572kB free_cma:0kB [ 981.121819] ? __should_failslab+0x278/0x2a0 [ 981.125593] lowmem_reserve[]: [ 981.154415] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.158796] 0 [ 981.161895] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.166708] 0 [ 981.168505] ? kmsan_set_origin+0x9e/0x160 [ 981.173228] 0 [ 981.175032] alloc_pages_vma+0x1555/0x17f0 [ 981.179234] 0 [ 981.181031] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 981.187052] handle_mm_fault+0x44ca/0x7ed0 [ 981.192122] Node 0 DMA: [ 981.196352] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.196374] __do_page_fault+0xec6/0x1a10 [ 981.199016] 0*4kB [ 981.203870] do_page_fault+0xb7/0x250 [ 981.207997] 0*8kB [ 981.210144] ? page_fault+0x8/0x30 [ 981.213930] 0*16kB [ 981.216157] page_fault+0x1e/0x30 [ 981.219680] 1*32kB [ 981.221996] RIP: 0033:0x43cec9 [ 981.225515] (U) [ 981.227739] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 981.230922] 2*64kB [ 981.238224] (U) [ 981.240443] RAX: 0000000020fd5ff8 RBX: 0000000000000000 RCX: 0030656c69662f2e [ 981.240454] 1*128kB [ 981.242408] RDX: 0000000000000008 RSI: 0000000000730020 RDI: 0000000020fd5ff8 [ 981.249665] (U) [ 981.252022] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000001bc8940 [ 981.259261] 1*256kB [ 981.261313] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ef9e2 [ 981.268566] (U) [ 981.270880] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 981.278148] 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 981.293918] Node 0 DMA32: 3287*4kB (UMEH) 3903*8kB (UME) 820*16kB (UME) 248*32kB (UME) 415*64kB (UME) 91*128kB (UM) 37*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 2*2048kB (UM) 0*4096kB = 131028kB [ 981.309784] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 981.311166] Node 0 [ 981.321736] syz-executor0 cpuset= [ 981.321740] Normal: 5959*4kB [ 981.323966] syz0 [ 981.327405] (MEH) [ 981.330590] mems_allowed=0 [ 981.332566] 2392*8kB [ 981.334702] CPU: 1 PID: 20886 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 981.337607] (MEH) [ 981.340086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.346916] 311*16kB [ 981.349052] Call Trace: [ 981.358390] (UMEH) [ 981.360809] dump_stack+0x185/0x1d0 [ 981.363361] 26*32kB [ 981.365591] warn_alloc+0x430/0x690 [ 981.369178] (UMH) 11*64kB [ 981.371513] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 981.375128] (UH) [ 981.377973] ? kernel_poison_pages+0x40/0x360 [ 981.382785] 1*128kB [ 981.384931] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 981.389406] (H) [ 981.391741] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 981.397177] 1*256kB [ 981.399165] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.404147] (H) [ 981.406471] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.411279] 1*512kB [ 981.413249] kmsan_alloc_page+0x82/0xe0 [ 981.417895] (H) [ 981.420230] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 981.424185] 1*1024kB [ 981.426155] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.430890] (H) [ 981.433311] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.438225] 0*2048kB [ 981.440197] ? __should_failslab+0x278/0x2a0 [ 981.444840] 0*4096kB [ 981.447263] ? should_fail+0x57/0xab0 [ 981.451647] = 51404kB [ 981.454048] ? __should_failslab+0x278/0x2a0 [ 981.457835] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 981.460245] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.464635] 5340 total pagecache pages [ 981.473296] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.478118] 0 pages in swap cache [ 981.482001] ? kmsan_set_origin+0x9e/0x160 [ 981.486635] Swap cache stats: add 0, delete 0, find 0/0 [ 981.490097] alloc_pages_vma+0x1555/0x17f0 [ 981.494297] Free swap = 0kB [ 981.499740] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 981.503954] Total swap = 0kB [ 981.506979] handle_mm_fault+0x44ca/0x7ed0 [ 981.512053] 1965969 pages RAM [ 981.515056] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.519262] 0 pages HighMem/MovableOnly [ 981.522353] __do_page_fault+0xec6/0x1a10 [ 981.527153] 106316 pages reserved [ 981.531113] do_page_fault+0xb7/0x250 [ 981.539865] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 981.542447] ? page_fault+0x8/0x30 [ 981.552902] syz-executor6 cpuset= [ 981.556416] page_fault+0x1e/0x30 [ 981.556417] syz6 mems_allowed=0 [ 981.559855] RIP: 0033:0x4075fa [ 981.569692] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 981.575033] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 981.582281] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 981.589532] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 981.596782] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000efc5c [ 981.604033] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 981.611295] CPU: 0 PID: 20881 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 981.614198] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 981.618136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.628615] syz-executor7 cpuset= [ 981.637954] Call Trace: [ 981.637976] dump_stack+0x185/0x1d0 [ 981.641440] syz7 [ 981.644023] warn_alloc+0x430/0x690 [ 981.647635] mems_allowed=0 [ 981.649612] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 981.660961] ? kernel_poison_pages+0x40/0x360 [ 981.665480] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 981.670926] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 981.675882] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 981.680829] kmsan_alloc_page+0x82/0xe0 [ 981.684810] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 981.689563] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.694397] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.699076] ? __should_failslab+0x278/0x2a0 [ 981.703492] ? should_fail+0x57/0xab0 [ 981.707281] ? __should_failslab+0x278/0x2a0 [ 981.711678] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.716526] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.721207] ? kmsan_set_origin+0x9e/0x160 [ 981.725451] alloc_pages_vma+0x1555/0x17f0 [ 981.729708] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 981.734818] handle_mm_fault+0x44ca/0x7ed0 [ 981.739049] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.743896] __do_page_fault+0xec6/0x1a10 [ 981.748043] do_page_fault+0xb7/0x250 [ 981.751837] ? page_fault+0x8/0x30 [ 981.755381] page_fault+0x1e/0x30 [ 981.758823] RIP: 0033:0x4075fa [ 981.761996] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 981.767378] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 981.774737] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 981.782092] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 981.789350] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000efd43 [ 981.796612] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 981.803884] CPU: 1 PID: 20883 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 981.805913] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 981.810731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.821203] syz-executor5 cpuset= [ 981.830537] Call Trace: [ 981.830539] syz5 mems_allowed=0 [ 981.833991] dump_stack+0x185/0x1d0 [ 981.843423] warn_alloc+0x430/0x690 [ 981.847053] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 981.851890] ? kernel_poison_pages+0x40/0x360 [ 981.856385] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 981.861824] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 981.866766] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 981.871799] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.876647] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.881317] kmsan_alloc_page+0x82/0xe0 [ 981.885306] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 981.890081] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.894914] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.899672] ? __should_failslab+0x278/0x2a0 [ 981.904249] ? should_fail+0x57/0xab0 [ 981.908035] ? __should_failslab+0x278/0x2a0 [ 981.912427] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.917275] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.921970] ? kmsan_set_origin+0x9e/0x160 [ 981.926218] alloc_pages_vma+0x1555/0x17f0 [ 981.930463] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 981.935569] handle_mm_fault+0x44ca/0x7ed0 [ 981.939797] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.944643] __do_page_fault+0xec6/0x1a10 [ 981.948793] do_page_fault+0xb7/0x250 [ 981.952592] ? page_fault+0x8/0x30 [ 981.956128] page_fault+0x1e/0x30 [ 981.959571] RIP: 0033:0x4075fa [ 981.962806] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 981.968157] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000000 [ 981.975416] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 981.982689] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 981.989956] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000efd8d [ 981.997231] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 982.004508] warn_alloc_show_mem: 3 callbacks suppressed [ 982.004517] CPU: 0 PID: 20884 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 982.004519] Mem-Info: [ 982.004543] active_anon:164455 inactive_anon:78 isolated_anon:0 [ 982.004543] active_file:2242 inactive_file:3014 isolated_file:0 [ 982.004543] unevictable:0 dirty:26 writeback:0 unstable:0 [ 982.004543] slab_reclaimable:3328 slab_unreclaimable:9507 [ 982.004543] mapped:69617 shmem:84 pagetables:1359 bounce:0 [ 982.004543] free:48235 free_pcp:364 free_cma:0 [ 982.009881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.016804] Node 0 active_anon:657820kB inactive_anon:312kB active_file:8968kB inactive_file:12056kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278468kB dirty:104kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 982.019202] Call Trace: [ 982.052331] Node 0 [ 982.061694] dump_stack+0x185/0x1d0 [ 982.089722] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 982.092290] warn_alloc+0x430/0x690 [ 982.094506] lowmem_reserve[]: [ 982.098131] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 982.123616] 0 [ 982.127247] ? kernel_poison_pages+0x40/0x360 [ 982.130325] 2817 [ 982.135166] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 982.136934] 7244 [ 982.141419] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 982.143455] 7244 [ 982.148927] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 982.155876] ? kmsan_set_origin_inline+0x6b/0x120 [ 982.157918] Node 0 [ 982.162858] ? __msan_poison_alloca+0x15c/0x1d0 [ 982.167780] DMA32 free:125632kB min:26224kB low:32780kB high:39336kB active_anon:226244kB inactive_anon:36kB active_file:2832kB inactive_file:8040kB unevictable:0kB writepending:52kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2368kB pagetables:2268kB bounce:0kB free_pcp:160kB local_pcp:68kB free_cma:0kB [ 982.169993] kmsan_alloc_page+0x82/0xe0 [ 982.174643] lowmem_reserve[]: [ 982.203279] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 982.207227] 0 [ 982.210327] ? kmsan_set_origin_inline+0x6b/0x120 [ 982.215059] 0 [ 982.216866] ? __msan_poison_alloca+0x15c/0x1d0 [ 982.221678] 4426 [ 982.223475] ? __should_failslab+0x278/0x2a0 [ 982.228108] 4426 [ 982.230165] ? should_fail+0x57/0xab0 [ 982.234549] Node 0 [ 982.236610] ? __should_failslab+0x278/0x2a0 [ 982.240400] Normal free:51404kB min:41208kB low:51508kB high:61808kB active_anon:431560kB inactive_anon:276kB active_file:6136kB inactive_file:4016kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3168kB bounce:0kB free_pcp:1296kB local_pcp:724kB free_cma:0kB [ 982.242619] ? kmsan_set_origin_inline+0x6b/0x120 [ 982.247002] lowmem_reserve[]: [ 982.275893] ? __msan_poison_alloca+0x15c/0x1d0 [ 982.280792] 0 [ 982.283902] ? kmsan_set_origin+0x9e/0x160 [ 982.288545] 0 [ 982.290348] alloc_pages_vma+0x1555/0x17f0 [ 982.294543] 0 [ 982.296342] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 982.300629] 0 [ 982.302428] handle_mm_fault+0x44ca/0x7ed0 [ 982.309280] ? kmsan_set_origin_inline+0x6b/0x120 [ 982.313488] Node 0 DMA: 0*4kB [ 982.318340] __do_page_fault+0xec6/0x1a10 [ 982.318358] do_page_fault+0xb7/0x250 [ 982.321526] 0*8kB [ 982.325664] ? page_fault+0x8/0x30 [ 982.329438] 0*16kB [ 982.331594] page_fault+0x1e/0x30 [ 982.335119] 1*32kB [ 982.337440] RIP: 0033:0x4075fa [ 982.340863] (U) [ 982.343086] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 982.346364] 2*64kB [ 982.353661] (U) [ 982.355877] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 982.355888] RDX: feb798c679317740 RSI: 0000000000000000 RDI: 0000000002848848 [ 982.357843] 1*128kB [ 982.365101] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 982.372367] (U) [ 982.374679] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000efe4d [ 982.381929] 1*256kB [ 982.383889] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 982.391139] (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 982.407569] Node 0 DMA32: 3255*4kB (MEH) 3894*8kB (UME) 804*16kB (ME) 240*32kB (ME) 400*64kB (UME) 91*128kB (UM) 37*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 1*2048kB (M) 0*4096kB = 127308kB [ 982.424502] Node 0 Normal: 5959*4kB (MEH) 2392*8kB (MEH) 311*16kB (UMEH) 26*32kB (UMH) 11*64kB (UH) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 51404kB [ 982.440459] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 982.449052] 5340 total pagecache pages [ 982.452930] 0 pages in swap cache [ 982.456374] Swap cache stats: add 0, delete 0, find 0/0 [ 982.461722] Free swap = 0kB [ 982.464740] Total swap = 0kB [ 982.467743] 1965969 pages RAM [ 982.470844] 0 pages HighMem/MovableOnly [ 982.474810] 106316 pages reserved 02:15:40 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c) 02:15:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x5001e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) [ 982.599578] kauditd_printk_skb: 5 callbacks suppressed [ 982.599600] audit: type=1326 audit(1529720140.597:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20896 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) [ 982.703006] audit: type=1326 audit(1529720140.701:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20904 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) io_setup(0x0, &(0x7f0000001140)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 02:15:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:40 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) io_setup(0x0, &(0x7f0000001140)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 02:15:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:41 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:41 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) io_setup(0x0, &(0x7f0000001140)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 983.730203] audit: type=1326 audit(1529720141.728:1862): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20977 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:41 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50356}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) [ 983.842231] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 983.852901] syz-executor3 cpuset=syz3 mems_allowed=0 [ 983.858113] CPU: 0 PID: 20983 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 983.864962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.874325] Call Trace: [ 983.876941] dump_stack+0x185/0x1d0 [ 983.877263] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 983.880610] warn_alloc+0x430/0x690 [ 983.891092] syz-executor6 cpuset=syz6 mems_allowed=0 [ 983.894717] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 983.904622] ? kernel_poison_pages+0x40/0x360 [ 983.909117] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 983.914556] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 983.919489] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 983.924430] kmsan_alloc_page+0x82/0xe0 [ 983.928408] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 983.933200] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.938050] ? __msan_poison_alloca+0x15c/0x1d0 [ 983.942712] ? __should_failslab+0x278/0x2a0 [ 983.947288] ? should_fail+0x57/0xab0 [ 983.951075] ? __should_failslab+0x278/0x2a0 [ 983.955485] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.960340] ? __msan_poison_alloca+0x15c/0x1d0 [ 983.965096] ? kmsan_set_origin+0x9e/0x160 [ 983.969347] alloc_pages_vma+0x1555/0x17f0 [ 983.973589] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 983.978685] ? apic_timer_interrupt+0xa/0x20 [ 983.984038] handle_mm_fault+0x44ca/0x7ed0 [ 983.988265] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.993191] __do_page_fault+0xec6/0x1a10 [ 983.997342] do_page_fault+0xb7/0x250 [ 984.001148] ? page_fault+0x8/0x30 [ 984.004677] page_fault+0x1e/0x30 [ 984.008111] RIP: 0033:0x4075fa [ 984.011283] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 984.016630] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 984.024007] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 984.031384] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 984.038747] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f0640 [ 984.046175] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 984.053451] warn_alloc_show_mem: 1 callbacks suppressed [ 984.053460] CPU: 1 PID: 20986 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 984.053462] Mem-Info: [ 984.053486] active_anon:164525 inactive_anon:76 isolated_anon:0 [ 984.053486] active_file:2314 inactive_file:3038 isolated_file:0 [ 984.053486] unevictable:0 dirty:50 writeback:0 unstable:0 [ 984.053486] slab_reclaimable:3328 slab_unreclaimable:9513 [ 984.053486] mapped:69642 shmem:84 pagetables:1382 bounce:0 [ 984.053486] free:46362 free_pcp:400 free_cma:0 [ 984.059009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.065858] Node 0 active_anon:658100kB inactive_anon:304kB active_file:9256kB inactive_file:12152kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278568kB dirty:200kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 984.068254] Call Trace: [ 984.101333] Node 0 [ 984.110690] dump_stack+0x185/0x1d0 [ 984.138698] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 984.141257] warn_alloc+0x430/0x690 [ 984.143473] lowmem_reserve[]: [ 984.147102] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 984.172579] 0 [ 984.176210] ? kernel_poison_pages+0x40/0x360 [ 984.179365] 2817 [ 984.184196] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 984.185967] 7244 [ 984.190450] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 984.192487] 7244 [ 984.197944] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 984.199964] Node 0 [ 984.204889] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.206940] DMA32 free:118072kB min:26224kB low:32780kB high:39336kB active_anon:226492kB inactive_anon:28kB active_file:3120kB inactive_file:8136kB unevictable:0kB writepending:148kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2624kB pagetables:2360kB bounce:0kB free_pcp:464kB local_pcp:364kB free_cma:0kB [ 984.211917] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.214139] lowmem_reserve[]: [ 984.218979] kmsan_alloc_page+0x82/0xe0 [ 984.247668] 0 [ 984.252353] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 984.255424] 0 [ 984.259387] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.261161] 4426 [ 984.265906] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.267680] 4426 [ 984.272508] ? __should_failslab+0x278/0x2a0 [ 984.279213] ? should_fail+0x57/0xab0 [ 984.281253] Node 0 [ 984.285647] ? __should_failslab+0x278/0x2a0 [ 984.289447] Normal free:51472kB min:41208kB low:51508kB high:61808kB active_anon:431560kB inactive_anon:276kB active_file:6136kB inactive_file:4016kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3168kB bounce:0kB free_pcp:1136kB local_pcp:484kB free_cma:0kB [ 984.291649] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.296029] lowmem_reserve[]: [ 984.324824] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.329633] 0 [ 984.332741] ? kmsan_set_origin+0x9e/0x160 [ 984.337374] 0 [ 984.339171] alloc_pages_vma+0x1555/0x17f0 [ 984.343373] 0 [ 984.345168] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 984.349390] 0 [ 984.351199] handle_mm_fault+0x44ca/0x7ed0 [ 984.358066] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.362271] Node 0 DMA: 0*4kB [ 984.367216] __do_page_fault+0xec6/0x1a10 [ 984.367218] 0*8kB 0*16kB [ 984.370406] do_page_fault+0xb7/0x250 [ 984.374525] 1*32kB [ 984.377271] ? page_fault+0x8/0x30 [ 984.381034] (U) [ 984.383261] page_fault+0x1e/0x30 [ 984.386770] 2*64kB [ 984.388732] RIP: 0033:0x43ce91 [ 984.392258] (U) [ 984.394500] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 984.397677] 1*128kB [ 984.404978] (U) [ 984.407277] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 000000000000002f [ 984.407284] 1*256kB [ 984.409244] RDX: 0000000000000015 RSI: 0000000000730020 RDI: 0000000020000100 [ 984.416493] (U) [ 984.418809] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000001a22940 [ 984.426056] 0*512kB [ 984.428029] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f0661 02:15:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) [ 984.435292] 1*1024kB [ 984.437605] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 984.444941] (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 984.459755] Node 0 DMA32: 3102*4kB (MEH) 3890*8kB (ME) 805*16kB (UME) 240*32kB (ME) 294*64kB (UME) 91*128kB (UM) 37*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 2*2048kB (UM) 0*4096kB = 121944kB [ 984.476776] Node 0 Normal: 5960*4kB (UMEH) 2392*8kB (MEH) 311*16kB (UMEH) 26*32kB (UMH) 12*64kB (UH) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 51472kB [ 984.492907] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 984.493282] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 984.501490] 5436 total pagecache pages [ 984.511971] syz-executor7 cpuset= [ 984.515829] 0 pages in swap cache [ 984.515831] syz7 mems_allowed=0 [ 984.519271] Swap cache stats: add 0, delete 0, find 0/0 [ 984.522706] CPU: 1 PID: 20988 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 984.525958] Free swap = 0kB [ 984.531298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.538131] Total swap = 0kB [ 984.541132] Call Trace: [ 984.550481] 1965969 pages RAM [ 984.553494] dump_stack+0x185/0x1d0 [ 984.556052] 0 pages HighMem/MovableOnly [ 984.559145] warn_alloc+0x430/0x690 [ 984.562741] 106316 pages reserved [ 984.566709] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 984.578712] ? kernel_poison_pages+0x40/0x360 [ 984.583245] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 984.588715] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 984.593691] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 984.598738] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.603595] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.608283] kmsan_alloc_page+0x82/0xe0 [ 984.612292] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 984.617151] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.622011] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.626696] ? __should_failslab+0x278/0x2a0 [ 984.631127] ? should_fail+0x57/0xab0 [ 984.634949] ? __should_failslab+0x278/0x2a0 [ 984.639397] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.642692] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 984.644244] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.654715] syz-executor0 cpuset= [ 984.659372] ? kmsan_set_origin+0x9e/0x160 [ 984.659373] syz0 mems_allowed=0 [ 984.662824] alloc_pages_vma+0x1555/0x17f0 [ 984.674506] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 984.679606] handle_mm_fault+0x44ca/0x7ed0 [ 984.683843] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.688683] __do_page_fault+0xec6/0x1a10 [ 984.692826] do_page_fault+0xb7/0x250 [ 984.696614] ? page_fault+0x8/0x30 [ 984.700249] page_fault+0x1e/0x30 [ 984.703688] RIP: 0033:0x4075fa [ 984.706857] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 984.712214] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 984.719482] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 984.726754] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 984.734031] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f08cc 02:15:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) io_setup(0x0, &(0x7f0000001140)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 984.741288] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 984.748568] CPU: 0 PID: 20992 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 984.755436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.765034] Call Trace: [ 984.767659] dump_stack+0x185/0x1d0 [ 984.771306] warn_alloc+0x430/0x690 [ 984.774985] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 984.779839] ? kernel_poison_pages+0x40/0x360 [ 984.784339] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 984.789790] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 984.794758] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 984.799709] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.804548] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.809211] kmsan_alloc_page+0x82/0xe0 [ 984.813172] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 984.817934] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.822769] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.827425] ? __should_failslab+0x278/0x2a0 [ 984.831849] ? should_fail+0x57/0xab0 [ 984.835635] ? __should_failslab+0x278/0x2a0 [ 984.840034] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.844865] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.849526] ? kmsan_set_origin+0x9e/0x160 [ 984.853769] alloc_pages_vma+0x1555/0x17f0 [ 984.857998] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 984.863116] handle_mm_fault+0x44ca/0x7ed0 [ 984.867338] ? kmsan_set_origin_inline+0x6b/0x120 [ 984.872178] __do_page_fault+0xec6/0x1a10 [ 984.876342] do_page_fault+0xb7/0x250 [ 984.880148] ? page_fault+0x8/0x30 [ 984.883678] page_fault+0x1e/0x30 [ 984.887119] RIP: 0033:0x4075fa [ 984.890308] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 984.895667] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 984.902924] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 984.910178] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 984.917432] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f0962 [ 984.924705] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 984.931981] warn_alloc_show_mem: 2 callbacks suppressed [ 984.931984] Mem-Info: [ 984.939748] active_anon:164580 inactive_anon:73 isolated_anon:0 [ 984.939748] active_file:2314 inactive_file:3047 isolated_file:0 [ 984.939748] unevictable:0 dirty:59 writeback:0 unstable:0 [ 984.939748] slab_reclaimable:3328 slab_unreclaimable:9515 [ 984.939748] mapped:69676 shmem:84 pagetables:1393 bounce:0 [ 984.939748] free:47162 free_pcp:532 free_cma:0 [ 984.973182] Node 0 active_anon:658320kB inactive_anon:292kB active_file:9256kB inactive_file:12188kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278704kB dirty:236kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 985.001192] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 985.027312] lowmem_reserve[]: 0 2817 7244 7244 [ 985.031890] Node 0 DMA32 free:121272kB min:26224kB low:32780kB high:39336kB active_anon:226712kB inactive_anon:16kB active_file:3120kB inactive_file:8172kB unevictable:0kB writepending:184kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2560kB pagetables:2400kB bounce:0kB free_pcp:992kB local_pcp:580kB free_cma:0kB [ 985.061213] lowmem_reserve[]: 0 0 4426 4426 [ 985.065531] Node 0 Normal free:51472kB min:41208kB low:51508kB high:61808kB active_anon:431572kB inactive_anon:276kB active_file:6136kB inactive_file:4016kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3172kB bounce:0kB free_pcp:1136kB local_pcp:484kB free_cma:0kB [ 985.094947] lowmem_reserve[]: 0 0 0 0 [ 985.098743] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 985.111949] Node 0 DMA32: 3044*4kB (MEH) 3891*8kB (UME) 805*16kB (UME) 240*32kB (ME) 287*64kB (UME) 91*128kB (UM) 37*256kB (UM) 17*512kB (UM) 5*1024kB (ME) 2*2048kB (UM) 0*4096kB = 121272kB [ 985.128982] Node 0 Normal: 5960*4kB (UMEH) 2392*8kB (MEH) 311*16kB (UMEH) 26*32kB (UMH) 12*64kB (UH) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 51472kB 02:15:43 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) [ 985.144999] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 985.153556] 5445 total pagecache pages [ 985.157428] 0 pages in swap cache [ 985.160974] Swap cache stats: add 0, delete 0, find 0/0 [ 985.166316] Free swap = 0kB [ 985.169313] Total swap = 0kB [ 985.172315] 1965969 pages RAM [ 985.175398] 0 pages HighMem/MovableOnly [ 985.179349] 106316 pages reserved 02:15:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000340)=""/160) 02:15:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x400020000501a0}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) [ 985.345768] audit: type=1326 audit(1529720143.344:1863): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21003 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:43 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) [ 985.426262] audit: type=1326 audit(1529720143.420:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21012 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) [ 985.544625] audit: type=1326 audit(1529720143.543:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21023 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:43 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:43 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:44 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:44 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) [ 986.451229] audit: type=1326 audit(1529720144.448:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21077 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:44 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) [ 986.544054] audit: type=1326 audit(1529720144.542:1867): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21090 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:44 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) [ 986.934225] audit: type=1326 audit(1529720144.932:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21089 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 02:15:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:45 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) [ 987.374946] audit: type=1326 audit(1529720145.372:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21121 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) shmctl$IPC_RMID(0x0, 0x0) 02:15:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:45 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50342}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:45 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) [ 987.711810] kauditd_printk_skb: 1 callbacks suppressed [ 987.711830] audit: type=1326 audit(1529720145.710:1871): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21154 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:45 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) [ 987.786453] audit: type=1326 audit(1529720145.770:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21158 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:46 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:46 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:46 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0x3d) 02:15:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:46 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:46 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:46 executing program 4: socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:46 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) [ 988.706722] audit: type=1326 audit(1529720146.705:1873): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21211 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:46 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:46 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) [ 988.849528] audit: type=1326 audit(1529720146.848:1874): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21218 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:46 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:46 executing program 4: socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:47 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:47 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:47 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:47 executing program 4: socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) [ 989.643892] audit: type=1326 audit(1529720147.642:1875): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21263 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000380)=""/79, 0x4f) 02:15:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:47 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:47 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 989.884840] audit: type=1326 audit(1529720147.883:1876): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21281 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:47 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:47 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:48 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:48 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ftruncate(0xffffffffffffffff, 0x0) 02:15:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) [ 990.617919] audit: type=1326 audit(1529720148.616:1877): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21321 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:48 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ftruncate(0xffffffffffffffff, 0x0) 02:15:48 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:48 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) [ 990.840078] audit: type=1326 audit(1529720148.838:1878): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21331 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ftruncate(0xffffffffffffffff, 0x0) 02:15:49 executing program 7: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:49 executing program 5: socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 02:15:49 executing program 7: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) [ 991.586918] audit: type=1326 audit(1529720149.584:1879): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21375 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:49 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:49 executing program 7: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:49 executing program 5: socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) socket$netlink(0x10, 0x3, 0x0) [ 991.829967] audit: type=1326 audit(1529720149.828:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21396 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:49 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) socket$netlink(0x10, 0x3, 0x0) 02:15:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:50 executing program 5: socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:50 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) socket$netlink(0x10, 0x3, 0x0) 02:15:50 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14}, @in6}}, {{@in6=@dev={0xfe, 0x80}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @rand_addr}}}, 0xe8) 02:15:50 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:50 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:50 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) chroot(&(0x7f0000000400)='./file0\x00') 02:15:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) [ 992.798983] kauditd_printk_skb: 1 callbacks suppressed [ 992.799007] audit: type=1326 audit(1529720150.797:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21457 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:50 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) chroot(&(0x7f0000000400)='./file0\x00') 02:15:50 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:51 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:51 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) [ 993.499857] audit: type=1326 audit(1529720151.498:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21497 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:51 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) chroot(&(0x7f0000000400)='./file0\x00') 02:15:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:51 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 993.722365] warn_alloc: 1 callbacks suppressed [ 993.722381] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 993.737608] syz-executor7 cpuset=syz7 mems_allowed=0 [ 993.742737] CPU: 0 PID: 21501 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 993.749574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.759816] Call Trace: [ 993.762405] dump_stack+0x185/0x1d0 [ 993.766033] warn_alloc+0x430/0x690 [ 993.769910] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 993.774742] ? kernel_poison_pages+0x40/0x360 [ 993.779231] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 993.784671] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 993.790479] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 993.795415] ? kmsan_set_origin_inline+0x6b/0x120 [ 993.800264] ? __msan_poison_alloca+0x15c/0x1d0 [ 993.804927] kmsan_alloc_page+0x82/0xe0 [ 993.808886] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 993.813625] ? kmsan_set_origin_inline+0x6b/0x120 [ 993.818452] ? __msan_poison_alloca+0x15c/0x1d0 [ 993.823104] ? __should_failslab+0x278/0x2a0 [ 993.827496] ? should_fail+0x57/0xab0 [ 993.831274] ? __should_failslab+0x278/0x2a0 [ 993.835665] ? kmsan_set_origin_inline+0x6b/0x120 [ 993.840488] ? __msan_poison_alloca+0x15c/0x1d0 [ 993.845138] ? kmsan_set_origin+0x9e/0x160 [ 993.849361] alloc_pages_vma+0x1555/0x17f0 [ 993.853580] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 993.858670] handle_mm_fault+0x44ca/0x7ed0 [ 993.862885] ? kmsan_set_origin_inline+0x6b/0x120 [ 993.867720] __do_page_fault+0xec6/0x1a10 [ 993.871853] do_page_fault+0xb7/0x250 [ 993.875634] ? page_fault+0x8/0x30 [ 993.879154] page_fault+0x1e/0x30 [ 993.882588] RIP: 0033:0x4075fa [ 993.885759] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 993.891102] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000000 [ 993.898352] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 993.905601] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 993.912939] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f2cda [ 993.920198] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 993.927542] Mem-Info: [ 993.929948] active_anon:165158 inactive_anon:78 isolated_anon:0 [ 993.929948] active_file:2126 inactive_file:1766 isolated_file:0 [ 993.929948] unevictable:0 dirty:72 writeback:0 unstable:0 [ 993.929948] slab_reclaimable:3328 slab_unreclaimable:9514 [ 993.929948] mapped:68395 shmem:84 pagetables:1213 bounce:0 [ 993.929948] free:38110 free_pcp:407 free_cma:0 [ 993.963013] Node 0 active_anon:660632kB inactive_anon:312kB active_file:8504kB inactive_file:7064kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:273580kB dirty:288kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 993.991478] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 994.017677] lowmem_reserve[]: 0 2817 7244 7244 [ 994.022250] Node 0 DMA32 free:85216kB min:26224kB low:32780kB high:39336kB active_anon:228752kB inactive_anon:36kB active_file:2812kB inactive_file:3544kB unevictable:0kB writepending:232kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2624kB pagetables:1584kB bounce:0kB free_pcp:832kB local_pcp:640kB free_cma:0kB [ 994.051487] lowmem_reserve[]: 0 0 4426 4426 [ 994.055806] Node 0 Normal free:51320kB min:41208kB low:51508kB high:61808kB active_anon:431648kB inactive_anon:276kB active_file:5692kB inactive_file:3520kB unevictable:0kB writepending:56kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3268kB bounce:0kB free_pcp:796kB local_pcp:412kB free_cma:0kB [ 994.085226] lowmem_reserve[]: 0 0 0 0 [ 994.089033] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 994.102263] Node 0 DMA32: 3151*4kB (UMH) 4455*8kB (UM) 797*16kB (UM) 225*32kB (UM) 91*64kB (UM) 39*128kB (M) 11*256kB (UM) 6*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 84900kB [ 994.117816] Node 0 Normal: 5930*4kB (UMEH) 2395*8kB (UMEH) 308*16kB (UMEH) 22*32kB (UMH) 10*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 51072kB [ 994.133804] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 994.142353] 3976 total pagecache pages [ 994.146226] 0 pages in swap cache [ 994.149655] Swap cache stats: add 0, delete 0, find 0/0 [ 994.154990] Free swap = 0kB [ 994.158011] Total swap = 0kB [ 994.161006] 1965969 pages RAM [ 994.164086] 0 pages HighMem/MovableOnly [ 994.168035] 106316 pages reserved [ 994.178356] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 994.188862] syz-executor3 cpuset=syz3 mems_allowed=0 [ 994.194062] CPU: 1 PID: 21504 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 994.200891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.210246] Call Trace: [ 994.213183] dump_stack+0x185/0x1d0 [ 994.216807] warn_alloc+0x430/0x690 [ 994.220438] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 994.225276] ? kernel_poison_pages+0x40/0x360 [ 994.229826] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 994.235276] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 994.240188] ? kmsan_set_origin_inline+0x6b/0x120 [ 994.245021] ? kmsan_set_origin_inline+0x6b/0x120 [ 994.249859] ? __msan_poison_alloca+0x15c/0x1d0 [ 994.254607] kmsan_alloc_page+0x82/0xe0 [ 994.258564] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 994.263301] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 994.268649] ? find_next_bit+0x25b/0x2a0 [ 994.272705] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 994.278058] ? memcg_check_events+0x74/0xe90 [ 994.282454] ? kmsan_set_origin_inline+0x6b/0x120 [ 994.287277] ? __msan_poison_alloca+0x15c/0x1d0 [ 994.291931] ? wp_page_copy+0x1831/0x2470 [ 994.296069] alloc_pages_vma+0x1555/0x17f0 [ 994.300296] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 994.305386] handle_mm_fault+0x44ca/0x7ed0 [ 994.309603] ? kmsan_set_origin_inline+0x6b/0x120 [ 994.314462] __do_page_fault+0xec6/0x1a10 [ 994.318618] do_page_fault+0xb7/0x250 [ 994.322408] ? page_fault+0x8/0x30 02:15:52 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) [ 994.325940] page_fault+0x1e/0x30 [ 994.329465] RIP: 0033:0x43cec9 [ 994.332636] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 994.337995] RAX: 0000000020fd5ff8 RBX: 0000000000000000 RCX: 0030656c69662f2e [ 994.345260] RDX: 0000000000000008 RSI: 0000000000730170 RDI: 0000000020fd5ff8 [ 994.352609] RBP: 0000000000000000 R08: 0000000000000016 R09: 000000000000000b [ 994.359870] R10: 0000000000a3e940 R11: 0000000000000246 R12: 00000000000f2cf5 [ 994.367140] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 [ 994.384997] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 994.395535] syz-executor2 cpuset=syz2 mems_allowed=0 [ 994.400675] CPU: 1 PID: 21514 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 994.407517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.416875] Call Trace: [ 994.419476] dump_stack+0x185/0x1d0 [ 994.423110] warn_alloc+0x430/0x690 [ 994.426750] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 994.431607] ? kernel_poison_pages+0x40/0x360 [ 994.436111] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 994.441567] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 994.446516] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 994.451461] ? kmsan_set_origin_inline+0x6b/0x120 [ 994.456323] ? __msan_poison_alloca+0x15c/0x1d0 [ 994.460990] kmsan_alloc_page+0x82/0xe0 [ 994.464952] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 994.469690] ? kmsan_set_origin_inline+0x6b/0x120 [ 994.474512] ? __msan_poison_alloca+0x15c/0x1d0 [ 994.479164] ? __should_failslab+0x278/0x2a0 [ 994.483557] ? should_fail+0x57/0xab0 [ 994.487350] ? __should_failslab+0x278/0x2a0 [ 994.491755] ? kmsan_set_origin_inline+0x6b/0x120 [ 994.496578] ? __msan_poison_alloca+0x15c/0x1d0 [ 994.501233] ? kmsan_set_origin+0x9e/0x160 [ 994.505467] alloc_pages_vma+0x1555/0x17f0 [ 994.509688] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 994.516180] handle_mm_fault+0x44ca/0x7ed0 [ 994.520411] ? kmsan_set_origin_inline+0x6b/0x120 [ 994.525255] __do_page_fault+0xec6/0x1a10 [ 994.529409] do_page_fault+0xb7/0x250 02:15:52 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) [ 994.533212] ? page_fault+0x8/0x30 [ 994.536745] page_fault+0x1e/0x30 [ 994.540196] RIP: 0033:0x4075fa [ 994.543376] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 994.548727] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 994.555990] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 994.563250] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 994.570526] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f2f70 [ 994.577874] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:15:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) rt_sigaction(0x0, &(0x7f0000000300), &(0x7f0000000280), 0x8, &(0x7f00000002c0)) 02:15:52 executing program 6: io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:52 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:52 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) 02:15:52 executing program 6: io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 995.014742] audit: type=1326 audit(1529720153.012:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21533 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:53 executing program 6: io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') [ 995.110813] audit: type=1326 audit(1529720153.039:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21547 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 995.130815] audit: type=1326 audit(1529720153.040:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21551 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:53 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:53 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 995.662439] khugepaged: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 995.672725] khugepaged cpuset=/ mems_allowed=0 [ 995.677333] CPU: 1 PID: 805 Comm: khugepaged Not tainted 4.17.0+ #9 [ 995.683766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.693128] Call Trace: [ 995.695733] dump_stack+0x185/0x1d0 [ 995.699380] warn_alloc+0x430/0x690 [ 995.703021] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 995.707858] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 995.713317] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 995.718236] ? try_to_compact_pages+0x1643/0x1a40 [ 995.723064] ? try_to_compact_pages+0x19bf/0x1a40 [ 995.727898] ? kmsan_set_origin_inline+0x6b/0x120 [ 995.732729] ? __msan_poison_alloca+0x15c/0x1d0 [ 995.737401] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 995.742766] ? compaction_defer_reset+0x62/0x3a0 [ 995.747610] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 995.752972] ? compaction_defer_reset+0x109/0x3a0 [ 995.757811] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 995.763267] ? compaction_defer_reset+0x321/0x3a0 [ 995.768118] ? __alloc_pages_direct_compact+0x3c1/0x4f0 [ 995.773471] kmsan_alloc_page+0x82/0xe0 [ 995.777524] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 995.782272] ? __mmdrop+0x91c/0x930 [ 995.785889] ? __msan_poison_alloca+0x15c/0x1d0 [ 995.790717] ? _cond_resched+0x3c/0xd0 [ 995.794602] khugepaged_do_scan+0x8c16/0xf190 [ 995.799091] ? pick_next_task_fair+0x22c9/0x2530 [ 995.803840] ? kmsan_set_origin_inline+0x6b/0x120 [ 995.808667] ? __msan_poison_alloca+0x15c/0x1d0 [ 995.813337] khugepaged+0xca/0xbc0 [ 995.816864] ? init_wait_entry+0x1a0/0x1a0 [ 995.821096] kthread+0x4db/0x6c0 [ 995.824453] ? start_stop_khugepaged+0x790/0x790 [ 995.829200] ? kthread_blkcg+0xf0/0xf0 [ 995.833078] ret_from_fork+0x35/0x40 [ 995.836795] warn_alloc_show_mem: 2 callbacks suppressed [ 995.836797] Mem-Info: [ 995.844556] active_anon:165157 inactive_anon:74 isolated_anon:14 [ 995.844556] active_file:702 inactive_file:688 isolated_file:0 [ 995.844556] unevictable:0 dirty:0 writeback:22 unstable:0 [ 995.844556] slab_reclaimable:3328 slab_unreclaimable:9514 [ 995.844556] mapped:66781 shmem:84 pagetables:1312 bounce:0 [ 995.844556] free:40744 free_pcp:365 free_cma:0 [ 995.877541] Node 0 active_anon:660628kB inactive_anon:296kB active_file:2808kB inactive_file:2752kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:267124kB dirty:0kB writeback:88kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 995.905459] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 995.931574] lowmem_reserve[]: 0 2817 7244 7244 [ 995.936159] Node 0 DMA32 free:89464kB min:26224kB low:32780kB high:39336kB active_anon:228992kB inactive_anon:12kB active_file:1192kB inactive_file:1336kB unevictable:0kB writepending:256kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2176kB pagetables:1964kB bounce:0kB free_pcp:760kB local_pcp:116kB free_cma:0kB [ 995.965405] lowmem_reserve[]: 0 0 4426 4426 [ 995.969716] Node 0 Normal free:57608kB min:41208kB low:51508kB high:61808kB active_anon:431692kB inactive_anon:284kB active_file:2048kB inactive_file:1744kB unevictable:0kB writepending:48kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3284kB bounce:0kB free_pcp:700kB local_pcp:0kB free_cma:0kB [ 995.998883] lowmem_reserve[]: 0 0 0 0 [ 996.002692] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 996.015896] Node 0 DMA32: 4151*4kB (UMH) 4569*8kB (UM) 796*16kB (UM) 209*32kB (UM) 94*64kB (UM) 37*128kB (UM) 14*256kB (UM) 5*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 89476kB [ 996.031539] Node 0 Normal: 7440*4kB (UMEH) 2438*8kB (UMEH) 317*16kB (UMEH) 23*32kB (UMH) 13*64kB (UMH) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 57824kB [ 996.047703] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 996.056272] 1484 total pagecache pages [ 996.060407] 0 pages in swap cache [ 996.063838] Swap cache stats: add 0, delete 0, find 0/0 [ 996.069177] Free swap = 0kB [ 996.072184] Total swap = 0kB [ 996.075190] 1965969 pages RAM [ 996.078274] 0 pages HighMem/MovableOnly [ 996.082226] 106316 pages reserved 02:15:54 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:54 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) [ 996.345102] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 996.355742] syz-executor6 cpuset=syz6 mems_allowed=0 [ 996.360849] CPU: 1 PID: 21604 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 996.367669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.377005] Call Trace: [ 996.379581] dump_stack+0x185/0x1d0 [ 996.383191] warn_alloc+0x430/0x690 [ 996.386810] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 996.391635] ? kernel_poison_pages+0x40/0x360 [ 996.396116] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 996.401547] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 996.406471] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 996.411396] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.416227] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.420884] kmsan_alloc_page+0x82/0xe0 [ 996.424845] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 996.429589] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.434475] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.439130] ? __should_failslab+0x278/0x2a0 [ 996.443525] ? should_fail+0x57/0xab0 [ 996.447308] ? __should_failslab+0x278/0x2a0 [ 996.451701] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.456528] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.461194] ? kmsan_set_origin+0x9e/0x160 [ 996.465420] alloc_pages_vma+0x1555/0x17f0 [ 996.469647] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 996.474741] handle_mm_fault+0x44ca/0x7ed0 [ 996.478966] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.483806] __do_page_fault+0xec6/0x1a10 [ 996.487951] do_page_fault+0xb7/0x250 [ 996.491736] ? page_fault+0x8/0x30 02:15:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) [ 996.495258] page_fault+0x1e/0x30 [ 996.498696] RIP: 0033:0x4075fa [ 996.501866] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 996.507213] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 996.514463] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 996.521716] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 996.528978] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f3718 [ 996.536328] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 996.548009] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 996.558527] syz-executor3 cpuset=syz3 mems_allowed=0 [ 996.563652] CPU: 0 PID: 21606 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 996.570578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.579930] Call Trace: [ 996.582533] dump_stack+0x185/0x1d0 [ 996.586166] warn_alloc+0x430/0x690 [ 996.589823] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 996.594799] ? kernel_poison_pages+0x40/0x360 [ 996.599305] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 996.604783] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 996.609737] kmsan_alloc_page+0x82/0xe0 [ 996.613889] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 996.618653] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 996.624114] ? find_next_bit+0x25b/0x2a0 [ 996.628274] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 996.633644] ? memcg_check_events+0x74/0xe90 [ 996.638066] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.642919] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.647599] ? wp_page_copy+0x1831/0x2470 [ 996.651764] alloc_pages_vma+0x1555/0x17f0 [ 996.656084] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 996.661211] handle_mm_fault+0x44ca/0x7ed0 [ 996.665543] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.670499] __do_page_fault+0xec6/0x1a10 [ 996.674841] do_page_fault+0xb7/0x250 [ 996.678657] ? page_fault+0x8/0x30 [ 996.682211] page_fault+0x1e/0x30 [ 996.685660] RIP: 0033:0x43cec9 [ 996.688834] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 996.694216] RAX: 0000000020fd5ff8 RBX: 0000000000000000 RCX: 0030656c69662f2e [ 996.701467] RDX: 0000000000000008 RSI: 00000000007300d0 RDI: 0000000020fd5ff8 [ 996.708718] RBP: 0000000000000000 R08: 0000000000000016 R09: 000000000000000f [ 996.715972] R10: 0000000000a3e940 R11: 0000000000000000 R12: 00000000000f371c [ 996.723236] R13: 0000000000000002 R14: 000000000072c920 R15: 0000000000000001 [ 996.765845] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 996.766013] audit: type=1326 audit(1529720154.764:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21605 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 996.776366] syz-executor4 cpuset=syz4 mems_allowed=0 [ 996.776388] CPU: 0 PID: 21611 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 996.776393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.776396] Call Trace: [ 996.776414] dump_stack+0x185/0x1d0 [ 996.776433] warn_alloc+0x430/0x690 [ 996.776455] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 996.776467] ? kernel_poison_pages+0x40/0x360 [ 996.776483] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 996.776496] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 996.776524] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 996.776545] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.776554] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.776584] kmsan_alloc_page+0x82/0xe0 [ 996.865407] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 996.870280] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.875127] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.879806] ? __should_failslab+0x278/0x2a0 [ 996.884224] ? should_fail+0x57/0xab0 [ 996.888031] ? __should_failslab+0x278/0x2a0 [ 996.892498] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.897349] ? __msan_poison_alloca+0x15c/0x1d0 [ 996.902039] ? kmsan_set_origin+0x9e/0x160 [ 996.906292] alloc_pages_vma+0x1555/0x17f0 [ 996.910539] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 996.915657] handle_mm_fault+0x44ca/0x7ed0 [ 996.919894] ? kmsan_set_origin_inline+0x6b/0x120 [ 996.924755] __do_page_fault+0xec6/0x1a10 [ 996.928925] do_page_fault+0xb7/0x250 [ 996.932728] ? page_fault+0x8/0x30 [ 996.936272] page_fault+0x1e/0x30 [ 996.939719] RIP: 0033:0x4075fa [ 996.942901] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 996.948258] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 996.955527] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 996.962888] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 996.970164] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f38bd [ 996.977442] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 996.984724] warn_alloc_show_mem: 2 callbacks suppressed [ 996.984727] Mem-Info: [ 996.992509] active_anon:165205 inactive_anon:76 isolated_anon:0 [ 996.992509] active_file:579 inactive_file:559 isolated_file:32 [ 996.992509] unevictable:0 dirty:27 writeback:0 unstable:0 [ 996.992509] slab_reclaimable:3327 slab_unreclaimable:9514 [ 996.992509] mapped:66395 shmem:84 pagetables:1350 bounce:0 [ 996.992509] free:39827 free_pcp:496 free_cma:0 [ 997.025523] Node 0 active_anon:660820kB inactive_anon:304kB active_file:2236kB inactive_file:2192kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:265580kB dirty:108kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 997.053468] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 997.079598] lowmem_reserve[]: 0 2817 7244 7244 [ 997.084193] Node 0 DMA32 free:89680kB min:26224kB low:32780kB high:39336kB active_anon:228868kB inactive_anon:8kB active_file:620kB inactive_file:500kB unevictable:0kB writepending:32kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2496kB pagetables:1748kB bounce:0kB free_pcp:1088kB local_pcp:408kB free_cma:0kB [ 997.113393] lowmem_reserve[]: 0 0 4426 4426 [ 997.117740] Node 0 Normal free:54732kB min:41208kB low:51508kB high:61808kB active_anon:431952kB inactive_anon:296kB active_file:1864kB inactive_file:2132kB unevictable:0kB writepending:76kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:3652kB bounce:0kB free_pcp:928kB local_pcp:212kB free_cma:0kB [ 997.147088] lowmem_reserve[]: 0 0 0 0 [ 997.150906] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 997.164142] Node 0 DMA32: 4099*4kB (UMH) 4685*8kB (UM) 803*16kB (UM) 206*32kB (UM) 75*64kB (UM) 37*128kB (UM) 15*256kB (UM) 6*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 89764kB [ 997.179810] Node 0 Normal: 6990*4kB (UMEH) 2347*8kB (UMEH) 301*16kB (UMEH) 21*32kB (UMH) 11*64kB (UH) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 54848kB [ 997.195932] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 997.204504] 1186 total pagecache pages [ 997.208381] 0 pages in swap cache [ 997.211823] Swap cache stats: add 0, delete 0, find 0/0 [ 997.217173] Free swap = 0kB [ 997.220275] Total swap = 0kB [ 997.223303] 1965969 pages RAM [ 997.226405] 0 pages HighMem/MovableOnly [ 997.230369] 106316 pages reserved 02:15:55 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) [ 997.254281] audit: type=1326 audit(1529720155.252:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21611 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) [ 997.370040] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 997.380580] syz-executor3 cpuset=syz3 mems_allowed=0 [ 997.385718] CPU: 1 PID: 21626 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 997.392558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.401926] Call Trace: [ 997.404586] dump_stack+0x185/0x1d0 [ 997.408222] warn_alloc+0x430/0x690 [ 997.412021] __alloc_pages_nodemask+0x5b1c/0x5cc0 02:15:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:15:55 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') [ 997.416869] ? kernel_poison_pages+0x40/0x360 [ 997.421389] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 997.426843] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 997.431805] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 997.436755] ? kmsan_set_origin_inline+0x6b/0x120 [ 997.441603] ? __msan_poison_alloca+0x15c/0x1d0 [ 997.446286] kmsan_alloc_page+0x82/0xe0 [ 997.450271] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 997.455038] ? kmsan_set_origin_inline+0x6b/0x120 [ 997.459890] ? __msan_poison_alloca+0x15c/0x1d0 [ 997.464570] ? __should_failslab+0x278/0x2a0 02:15:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/98) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000000)) [ 997.468986] ? should_fail+0x57/0xab0 [ 997.472812] ? __should_failslab+0x278/0x2a0 [ 997.477229] ? kmsan_set_origin_inline+0x6b/0x120 [ 997.482073] ? __msan_poison_alloca+0x15c/0x1d0 [ 997.486748] ? kmsan_set_origin+0x9e/0x160 [ 997.490995] alloc_pages_vma+0x1555/0x17f0 [ 997.495236] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 997.500354] handle_mm_fault+0x44ca/0x7ed0 [ 997.504594] ? kmsan_set_origin_inline+0x6b/0x120 [ 997.509456] __do_page_fault+0xec6/0x1a10 [ 997.513621] do_page_fault+0xb7/0x250 [ 997.517425] ? page_fault+0x8/0x30 [ 997.520967] page_fault+0x1e/0x30 [ 997.524416] RIP: 0033:0x4075fa [ 997.527599] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 997.532959] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 997.540231] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 997.547533] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 997.554810] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f3b19 [ 997.562087] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 997.587565] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 997.598102] syz-executor6 cpuset=syz6 mems_allowed=0 [ 997.603229] CPU: 1 PID: 21628 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 997.610070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.619427] Call Trace: [ 997.622020] dump_stack+0x185/0x1d0 [ 997.625652] warn_alloc+0x430/0x690 [ 997.629288] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 997.634127] ? kernel_poison_pages+0x40/0x360 [ 997.638630] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 997.644082] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 997.649014] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 997.653940] ? kmsan_set_origin_inline+0x6b/0x120 [ 997.658765] ? __msan_poison_alloca+0x15c/0x1d0 [ 997.663425] kmsan_alloc_page+0x82/0xe0 [ 997.667406] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 997.672151] ? should_fail+0x57/0xab0 [ 997.675931] ? __should_failslab+0x278/0x2a0 [ 997.680322] ? __msan_poison_alloca+0x15c/0x1d0 [ 997.684992] ? kmsan_set_origin+0x9e/0x160 [ 997.689234] alloc_pages_vma+0x1555/0x17f0 [ 997.693454] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 997.698542] handle_mm_fault+0x44ca/0x7ed0 [ 997.702758] ? kmsan_set_origin_inline+0x6b/0x120 [ 997.707590] __do_page_fault+0xec6/0x1a10 [ 997.711725] do_page_fault+0xb7/0x250 [ 997.715511] ? page_fault+0x8/0x30 [ 997.719040] page_fault+0x1e/0x30 [ 997.722475] RIP: 0033:0x4075fa [ 997.725643] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 997.730984] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 997.738244] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 997.745492] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 997.752740] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f3be2 [ 997.759990] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 997.769071] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 997.779576] syz-executor5 cpuset=syz5 mems_allowed=0 02:15:55 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) [ 997.784687] CPU: 1 PID: 21632 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 997.791519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.800862] Call Trace: [ 997.803447] dump_stack+0x185/0x1d0 [ 997.807077] warn_alloc+0x430/0x690 [ 997.810712] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 997.815554] ? kernel_poison_pages+0x40/0x360 [ 997.820054] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 997.825503] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 997.830453] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 997.835486] ? kmsan_set_origin_inline+0x6b/0x120 [ 997.840327] ? __msan_poison_alloca+0x15c/0x1d0 [ 997.845007] kmsan_alloc_page+0x82/0xe0 [ 997.848984] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 997.853746] ? should_fail+0x57/0xab0 [ 997.857546] ? __should_failslab+0x278/0x2a0 [ 997.861955] ? __msan_poison_alloca+0x15c/0x1d0 [ 997.866624] ? kmsan_set_origin+0x9e/0x160 [ 997.870868] alloc_pages_vma+0x1555/0x17f0 [ 997.875111] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 997.880221] handle_mm_fault+0x44ca/0x7ed0 02:15:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}, 0x0, 0x0, 0x0, "748dc7a7e4442a13112099bb8a8a7dc324345cb9b6180f024d035cbce4cf0593c3bc60492693c85ba41352a458bbed5a93607c59dfa468aa32adbd1ccf20af601efc1f531a9c6d3b4ac3bb216c26160f"}, 0xd8) 02:15:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) [ 997.884452] ? kmsan_set_origin_inline+0x6b/0x120 [ 997.889302] __do_page_fault+0xec6/0x1a10 [ 997.893457] do_page_fault+0xb7/0x250 [ 997.897262] ? page_fault+0x8/0x30 [ 997.900803] page_fault+0x1e/0x30 [ 997.904251] RIP: 0033:0x4075fa [ 997.907435] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 997.912796] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 997.920064] RDX: feb798c679317740 RSI: 0000000000000000 RDI: 0000000002848848 [ 997.927326] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 997.934590] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f3ca8 [ 997.941854] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:15:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:56 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:56 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') [ 998.164390] audit: type=1326 audit(1529720156.161:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21633 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) [ 998.260296] audit: type=1326 audit(1529720156.184:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21640 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:56 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:56 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:56 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:15:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:56 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:56 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:56 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) [ 998.730678] warn_alloc: 11 callbacks suppressed [ 998.730695] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 998.746066] syz-executor0 cpuset=syz0 mems_allowed=0 [ 998.751197] CPU: 1 PID: 21694 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 998.758048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.767412] Call Trace: [ 998.770097] dump_stack+0x185/0x1d0 [ 998.773824] warn_alloc+0x430/0x690 [ 998.777471] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 998.782324] ? kernel_poison_pages+0x40/0x360 [ 998.786856] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 998.792420] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 998.797388] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 998.802340] ? kmsan_set_origin_inline+0x6b/0x120 [ 998.807288] ? __msan_poison_alloca+0x15c/0x1d0 [ 998.811989] kmsan_alloc_page+0x82/0xe0 [ 998.816979] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 998.821746] ? should_fail+0x57/0xab0 [ 998.825548] ? __should_failslab+0x278/0x2a0 [ 998.829955] ? __msan_poison_alloca+0x15c/0x1d0 [ 998.834630] ? kmsan_set_origin+0x9e/0x160 [ 998.838875] alloc_pages_vma+0x1555/0x17f0 [ 998.843117] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 998.848246] handle_mm_fault+0x44ca/0x7ed0 [ 998.852479] ? kmsan_set_origin_inline+0x6b/0x120 [ 998.857333] __do_page_fault+0xec6/0x1a10 [ 998.861485] do_page_fault+0xb7/0x250 [ 998.865280] ? page_fault+0x8/0x30 [ 998.868819] page_fault+0x1e/0x30 [ 998.872264] RIP: 0033:0x4075fa [ 998.875445] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 998.880795] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 998.888046] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 998.895300] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 998.902552] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f406a [ 998.909800] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 998.917057] warn_alloc_show_mem: 3 callbacks suppressed [ 998.917060] Mem-Info: [ 998.924815] active_anon:164668 inactive_anon:76 isolated_anon:0 [ 998.924815] active_file:987 inactive_file:684 isolated_file:0 [ 998.924815] unevictable:0 dirty:46 writeback:0 unstable:0 [ 998.924815] slab_reclaimable:3325 slab_unreclaimable:9516 [ 998.924815] mapped:66683 shmem:84 pagetables:1332 bounce:0 [ 998.924815] free:40311 free_pcp:545 free_cma:0 [ 998.958077] Node 0 active_anon:658672kB inactive_anon:304kB active_file:3948kB inactive_file:2736kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266732kB dirty:184kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 998.986366] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 999.012478] lowmem_reserve[]: 0 2817 7244 7244 [ 999.017060] Node 0 DMA32 free:92372kB min:26224kB low:32780kB high:39336kB active_anon:226980kB inactive_anon:28kB active_file:1356kB inactive_file:1264kB unevictable:0kB writepending:72kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2112kB pagetables:1888kB bounce:0kB free_pcp:852kB local_pcp:208kB free_cma:0kB [ 999.046219] lowmem_reserve[]: 0 0 4426 4426 [ 999.050529] Node 0 Normal free:52968kB min:41208kB low:51508kB high:61808kB active_anon:431792kB inactive_anon:276kB active_file:2592kB inactive_file:1956kB unevictable:0kB writepending:112kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7616kB pagetables:3440kB bounce:0kB free_pcp:1328kB local_pcp:652kB free_cma:0kB [ 999.080033] lowmem_reserve[]: 0 0 0 0 [ 999.083825] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 999.097034] Node 0 DMA32: 3433*4kB (UMH) 4656*8kB (UM) 779*16kB (UM) 196*32kB (UM) 88*64kB (UM) 37*128kB (UM) 13*256kB (UM) 6*512kB (M) 0*1024kB 3*2048kB (UM) 0*4096kB = 92628kB [ 999.113036] Node 0 Normal: 6781*4kB (UMEH) 2379*8kB (UMEH) 293*16kB (UMEH) 15*32kB (UMH) 5*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 53564kB 02:15:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 999.128981] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 999.137630] 1783 total pagecache pages [ 999.141600] 0 pages in swap cache [ 999.145030] Swap cache stats: add 0, delete 0, find 0/0 [ 999.150368] Free swap = 0kB [ 999.153366] Total swap = 0kB [ 999.156370] 1965969 pages RAM [ 999.159455] 0 pages HighMem/MovableOnly [ 999.163414] 106316 pages reserved 02:15:57 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) setsockopt$sock_void(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x300) 02:15:57 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:57 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) [ 999.249004] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 999.259540] syz-executor3 cpuset=syz3 mems_allowed=0 [ 999.264665] CPU: 0 PID: 21704 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 999.271738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.281111] Call Trace: [ 999.283700] dump_stack+0x185/0x1d0 [ 999.287318] warn_alloc+0x430/0x690 [ 999.290944] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 999.295781] ? kernel_poison_pages+0x40/0x360 [ 999.300270] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 999.305719] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 999.310649] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 999.315675] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.320500] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.325174] kmsan_alloc_page+0x82/0xe0 [ 999.329135] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 999.333880] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.338802] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.343633] ? __should_failslab+0x278/0x2a0 [ 999.348026] ? should_fail+0x57/0xab0 [ 999.351828] ? __should_failslab+0x278/0x2a0 [ 999.356310] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.361148] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.365804] ? kmsan_set_origin+0x9e/0x160 [ 999.370031] alloc_pages_vma+0x1555/0x17f0 [ 999.374259] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 999.379354] handle_mm_fault+0x44ca/0x7ed0 [ 999.383587] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.388435] __do_page_fault+0xec6/0x1a10 [ 999.392588] do_page_fault+0xb7/0x250 [ 999.396383] ? page_fault+0x8/0x30 02:15:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) [ 999.399922] page_fault+0x1e/0x30 [ 999.403360] RIP: 0033:0x4075fa [ 999.406552] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 999.411903] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 999.419164] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 999.426427] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 999.433690] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f4270 [ 999.441040] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 999.469225] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 999.479755] syz-executor4 cpuset=syz4 mems_allowed=0 [ 999.484882] CPU: 0 PID: 21711 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 999.491718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.501071] Call Trace: [ 999.503671] dump_stack+0x185/0x1d0 [ 999.507304] warn_alloc+0x430/0x690 [ 999.510927] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 999.515778] ? kernel_poison_pages+0x40/0x360 [ 999.520263] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 999.525698] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 999.530627] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 999.535560] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.540396] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.545081] kmsan_alloc_page+0x82/0xe0 [ 999.549047] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 999.553790] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.558614] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.563266] ? __should_failslab+0x278/0x2a0 [ 999.567659] ? should_fail+0x57/0xab0 [ 999.571461] ? __should_failslab+0x278/0x2a0 [ 999.575855] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.580681] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.585344] ? kmsan_set_origin+0x9e/0x160 [ 999.589569] alloc_pages_vma+0x1555/0x17f0 [ 999.593798] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 999.598893] handle_mm_fault+0x44ca/0x7ed0 [ 999.603115] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.607973] __do_page_fault+0xec6/0x1a10 [ 999.612112] do_page_fault+0xb7/0x250 [ 999.615901] ? page_fault+0x8/0x30 02:15:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) [ 999.619426] page_fault+0x1e/0x30 [ 999.622859] RIP: 0033:0x4075fa [ 999.626029] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 999.631372] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 999.638638] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 999.645892] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 999.653148] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f434c [ 999.660401] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:15:57 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) [ 999.670712] audit: type=1326 audit(1529720157.669:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21702 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:57 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:57 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:15:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:57 executing program 2: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:15:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') [ 1000.090513] audit: type=1326 audit(1529720158.089:1892): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21742 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:58 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:15:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:58 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) [ 1000.334599] audit: type=1326 audit(1529720158.333:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21755 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1000.433483] audit: type=1326 audit(1529720158.432:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21761 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:15:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:15:58 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:15:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:15:58 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:15:59 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') [ 1001.110986] audit: type=1326 audit(1529720159.109:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21798 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) 02:15:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) [ 1001.279715] audit: type=1326 audit(1529720159.278:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21810 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) 02:15:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:59 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:15:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:15:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:15:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:15:59 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) [ 1001.462674] audit: type=1326 audit(1529720159.461:1897): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21826 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:15:59 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:15:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x8000502ad}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:15:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:15:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) [ 1001.703771] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1001.714419] syz-executor7 cpuset=syz7 mems_allowed=0 [ 1001.719555] CPU: 1 PID: 21841 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1001.726397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.735840] Call Trace: [ 1001.738445] dump_stack+0x185/0x1d0 [ 1001.742079] warn_alloc+0x430/0x690 [ 1001.745722] __alloc_pages_nodemask+0x5b1c/0x5cc0 02:15:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) [ 1001.750567] ? kernel_poison_pages+0x40/0x360 [ 1001.755071] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1001.760625] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1001.765582] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1001.770643] ? kmsan_set_origin_inline+0x6b/0x120 [ 1001.775499] ? __msan_poison_alloca+0x15c/0x1d0 [ 1001.780189] kmsan_alloc_page+0x82/0xe0 [ 1001.784174] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1001.788942] ? kmsan_set_origin_inline+0x6b/0x120 [ 1001.793796] ? __msan_poison_alloca+0x15c/0x1d0 [ 1001.798500] ? __should_failslab+0x278/0x2a0 [ 1001.803350] ? should_fail+0x57/0xab0 [ 1001.807159] ? __should_failslab+0x278/0x2a0 [ 1001.811579] ? kmsan_set_origin_inline+0x6b/0x120 [ 1001.816518] ? __msan_poison_alloca+0x15c/0x1d0 [ 1001.821252] ? kmsan_set_origin+0x9e/0x160 [ 1001.825497] alloc_pages_vma+0x1555/0x17f0 [ 1001.829746] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1001.834868] handle_mm_fault+0x44ca/0x7ed0 [ 1001.839115] ? kmsan_set_origin_inline+0x6b/0x120 [ 1001.843974] __do_page_fault+0xec6/0x1a10 [ 1001.848122] do_page_fault+0xb7/0x250 [ 1001.851924] ? page_fault+0x8/0x30 [ 1001.855451] page_fault+0x1e/0x30 [ 1001.858889] RIP: 0033:0x4075fa [ 1001.862067] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1001.867421] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 1001.874676] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 1001.881938] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1001.889191] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f4c06 [ 1001.896446] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1001.903813] warn_alloc_show_mem: 2 callbacks suppressed [ 1001.903816] Mem-Info: [ 1001.911654] active_anon:164785 inactive_anon:78 isolated_anon:0 [ 1001.911654] active_file:902 inactive_file:697 isolated_file:0 [ 1001.911654] unevictable:0 dirty:52 writeback:0 unstable:0 [ 1001.911654] slab_reclaimable:3325 slab_unreclaimable:9518 [ 1001.911654] mapped:66698 shmem:84 pagetables:1288 bounce:0 [ 1001.911654] free:37434 free_pcp:388 free_cma:0 [ 1001.944729] Node 0 active_anon:659140kB inactive_anon:312kB active_file:3608kB inactive_file:2788kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266792kB dirty:208kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1001.972734] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1001.998852] lowmem_reserve[]: 0 2817 7244 7244 [ 1002.003546] Node 0 DMA32 free:83092kB min:26224kB low:32780kB high:39336kB active_anon:227488kB inactive_anon:12kB active_file:872kB inactive_file:1868kB unevictable:0kB writepending:84kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2368kB pagetables:1800kB bounce:0kB free_pcp:396kB local_pcp:328kB free_cma:0kB [ 1002.032832] lowmem_reserve[]: 0 0 4426 4426 [ 1002.037147] Node 0 Normal free:50740kB min:41208kB low:51508kB high:61808kB active_anon:431952kB inactive_anon:300kB active_file:2652kB inactive_file:956kB unevictable:0kB writepending:124kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7616kB pagetables:3352kB bounce:0kB free_pcp:1156kB local_pcp:436kB free_cma:0kB [ 1002.066558] lowmem_reserve[]: 0 0 0 0 [ 1002.070371] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1002.083576] Node 0 DMA32: 3016*4kB (UMH) 4619*8kB (UM) 758*16kB (UM) 187*32kB (UM) 67*64kB (UM) 33*128kB (UM) 13*256kB (UM) 6*512kB (UM) 1*1024kB (U) 0*2048kB 0*4096kB = 83064kB [ 1002.099569] Node 0 Normal: 6625*4kB (UMEH) 2270*8kB (UMEH) 282*16kB (UMH) 10*32kB (MH) 1*64kB (H) 2*128kB (H) 0*256kB 0*512kB 1*1024kB (H) 0*2048kB 0*4096kB = 50836kB [ 1002.114778] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1002.123333] 1708 total pagecache pages [ 1002.127204] 0 pages in swap cache [ 1002.130724] Swap cache stats: add 0, delete 0, find 0/0 [ 1002.136152] Free swap = 0kB [ 1002.139154] Total swap = 0kB [ 1002.142166] 1965969 pages RAM [ 1002.145263] 0 pages HighMem/MovableOnly [ 1002.149227] 106316 pages reserved 02:16:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) io_setup(0x0, &(0x7f0000000440)) chroot(&(0x7f0000000400)='./file0\x00') 02:16:00 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:16:00 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) [ 1002.329447] audit: type=1326 audit(1529720160.328:1898): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21854 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1002.360792] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1002.371614] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1002.376738] CPU: 0 PID: 21856 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1002.383581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.393030] Call Trace: [ 1002.395629] dump_stack+0x185/0x1d0 [ 1002.399264] warn_alloc+0x430/0x690 [ 1002.402927] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1002.407773] ? kernel_poison_pages+0x40/0x360 [ 1002.412384] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1002.417861] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1002.422824] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1002.428059] ? kmsan_set_origin_inline+0x6b/0x120 [ 1002.432951] ? __msan_poison_alloca+0x15c/0x1d0 [ 1002.437639] kmsan_alloc_page+0x82/0xe0 [ 1002.441641] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1002.446528] ? kmsan_set_origin_inline+0x6b/0x120 [ 1002.451381] ? __msan_poison_alloca+0x15c/0x1d0 [ 1002.456082] ? __should_failslab+0x278/0x2a0 [ 1002.460512] ? should_fail+0x57/0xab0 [ 1002.464327] ? __should_failslab+0x278/0x2a0 [ 1002.468750] ? kmsan_set_origin_inline+0x6b/0x120 [ 1002.473606] ? __msan_poison_alloca+0x15c/0x1d0 [ 1002.478307] ? kmsan_set_origin+0x9e/0x160 [ 1002.482560] alloc_pages_vma+0x1555/0x17f0 [ 1002.486831] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1002.491981] handle_mm_fault+0x44ca/0x7ed0 [ 1002.496315] ? kmsan_set_origin_inline+0x6b/0x120 [ 1002.501176] __do_page_fault+0xec6/0x1a10 [ 1002.505339] do_page_fault+0xb7/0x250 [ 1002.509147] ? page_fault+0x8/0x30 [ 1002.512697] page_fault+0x1e/0x30 [ 1002.516150] RIP: 0033:0x4075fa [ 1002.519361] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1002.524753] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 1002.532031] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 1002.539483] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1002.546766] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f4e98 [ 1002.554121] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:16:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:16:00 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:00 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) [ 1002.712294] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1002.722828] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1002.728076] CPU: 0 PID: 21868 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1002.734926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.744638] Call Trace: [ 1002.747236] dump_stack+0x185/0x1d0 [ 1002.750862] warn_alloc+0x430/0x690 [ 1002.754568] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1002.759399] ? kernel_poison_pages+0x40/0x360 [ 1002.763895] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1002.769334] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1002.774264] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1002.779276] ? kmsan_set_origin_inline+0x6b/0x120 [ 1002.784118] ? __msan_poison_alloca+0x15c/0x1d0 [ 1002.788778] kmsan_alloc_page+0x82/0xe0 [ 1002.792752] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1002.797495] ? kmsan_set_origin_inline+0x6b/0x120 [ 1002.802324] ? __msan_poison_alloca+0x15c/0x1d0 [ 1002.806976] ? __should_failslab+0x278/0x2a0 [ 1002.811385] ? should_fail+0x57/0xab0 [ 1002.815221] ? __should_failslab+0x278/0x2a0 [ 1002.819620] ? kmsan_set_origin_inline+0x6b/0x120 [ 1002.824445] ? __msan_poison_alloca+0x15c/0x1d0 [ 1002.829102] ? kmsan_set_origin+0x9e/0x160 [ 1002.833328] alloc_pages_vma+0x1555/0x17f0 [ 1002.837566] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1002.842672] handle_mm_fault+0x44ca/0x7ed0 [ 1002.846891] ? kmsan_set_origin_inline+0x6b/0x120 [ 1002.851730] __do_page_fault+0xec6/0x1a10 [ 1002.855869] do_page_fault+0xb7/0x250 [ 1002.859657] ? page_fault+0x8/0x30 [ 1002.863184] page_fault+0x1e/0x30 [ 1002.866622] RIP: 0033:0x4075fa [ 1002.869794] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1002.875141] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 1002.882393] RDX: 884624deecdf5932 RSI: 0000000000000000 RDI: 000000000258d848 [ 1002.889651] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1002.896906] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f4ff7 [ 1002.904171] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1002.911434] warn_alloc_show_mem: 1 callbacks suppressed [ 1002.911436] Mem-Info: [ 1002.919180] active_anon:164775 inactive_anon:76 isolated_anon:0 [ 1002.919180] active_file:974 inactive_file:791 isolated_file:0 [ 1002.919180] unevictable:0 dirty:24 writeback:0 unstable:0 [ 1002.919180] slab_reclaimable:3324 slab_unreclaimable:9519 [ 1002.919180] mapped:66673 shmem:84 pagetables:1326 bounce:0 [ 1002.919180] free:37009 free_pcp:346 free_cma:0 [ 1002.952161] Node 0 active_anon:659100kB inactive_anon:304kB active_file:3896kB inactive_file:3164kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266692kB dirty:96kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 262144kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1002.980360] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1003.006582] lowmem_reserve[]: 0 2817 7244 7244 [ 1003.011175] Node 0 DMA32 free:80924kB min:26224kB low:32780kB high:39336kB active_anon:227164kB inactive_anon:20kB active_file:1432kB inactive_file:2284kB unevictable:0kB writepending:84kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2496kB pagetables:1988kB bounce:0kB free_pcp:500kB local_pcp:344kB free_cma:0kB [ 1003.040416] lowmem_reserve[]: 0 0 4426 4426 [ 1003.044730] Node 0 Normal free:51208kB min:41208kB low:51508kB high:61808kB active_anon:432084kB inactive_anon:284kB active_file:2536kB inactive_file:660kB unevictable:0kB writepending:128kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7616kB pagetables:3316kB bounce:0kB free_pcp:884kB local_pcp:336kB free_cma:0kB [ 1003.074344] lowmem_reserve[]: 0 0 0 0 [ 1003.078134] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1003.091338] Node 0 DMA32: 2614*4kB (MH) 4609*8kB (UM) 752*16kB (UM) 186*32kB (UM) 64*64kB (M) 30*128kB (UM) 11*256kB (M) 7*512kB (UM) 1*1024kB (U) 0*2048kB 0*4096kB = 80672kB 02:16:01 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)) [ 1003.107259] Node 0 Normal: 6618*4kB (UMEH) 2265*8kB (UMEH) 271*16kB (UMEH) 9*32kB (H) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 51200kB [ 1003.123174] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1003.131790] 1902 total pagecache pages [ 1003.135667] 0 pages in swap cache [ 1003.139112] Swap cache stats: add 0, delete 0, find 0/0 [ 1003.144552] Free swap = 0kB [ 1003.147551] Total swap = 0kB [ 1003.150559] 1965969 pages RAM [ 1003.153653] 0 pages HighMem/MovableOnly [ 1003.157605] 106316 pages reserved [ 1003.180899] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1003.191544] syz-executor7 cpuset=syz7 mems_allowed=0 [ 1003.196699] CPU: 0 PID: 21866 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1003.203725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.213095] Call Trace: [ 1003.215715] dump_stack+0x185/0x1d0 [ 1003.219454] warn_alloc+0x430/0x690 [ 1003.223103] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1003.228056] ? kernel_poison_pages+0x40/0x360 [ 1003.232842] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1003.238328] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1003.243367] ? kmsan_set_origin_inline+0x6b/0x120 [ 1003.248230] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.252917] kmsan_alloc_page+0x82/0xe0 [ 1003.256904] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1003.261774] ? should_fail+0x57/0xab0 [ 1003.265577] ? __should_failslab+0x278/0x2a0 [ 1003.270005] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.274778] ? kmsan_set_origin+0x9e/0x160 [ 1003.279057] alloc_pages_vma+0x1555/0x17f0 [ 1003.283333] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1003.288462] handle_mm_fault+0x44ca/0x7ed0 [ 1003.292703] ? kmsan_set_origin_inline+0x6b/0x120 [ 1003.297564] __do_page_fault+0xec6/0x1a10 [ 1003.301726] do_page_fault+0xb7/0x250 [ 1003.305532] ? page_fault+0x8/0x30 [ 1003.309079] page_fault+0x1e/0x30 [ 1003.312661] RIP: 0033:0x4075fa [ 1003.315854] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1003.321216] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 1003.328494] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 1003.335775] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1003.343053] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f51cc [ 1003.350328] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:16:01 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:16:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) [ 1003.473002] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1003.483622] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1003.488758] CPU: 0 PID: 21879 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1003.495603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.504971] Call Trace: [ 1003.507683] dump_stack+0x185/0x1d0 [ 1003.511412] warn_alloc+0x430/0x690 [ 1003.515060] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1003.519919] ? kernel_poison_pages+0x40/0x360 [ 1003.524474] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1003.529936] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1003.534895] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1003.539952] ? kmsan_set_origin_inline+0x6b/0x120 [ 1003.544818] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.549510] kmsan_alloc_page+0x82/0xe0 [ 1003.553505] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1003.558283] ? should_fail+0x57/0xab0 [ 1003.562191] ? __should_failslab+0x278/0x2a0 [ 1003.566621] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.571311] ? kmsan_set_origin+0x9e/0x160 [ 1003.575574] alloc_pages_vma+0x1555/0x17f0 [ 1003.580028] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1003.585244] handle_mm_fault+0x44ca/0x7ed0 [ 1003.589491] ? kmsan_set_origin_inline+0x6b/0x120 [ 1003.594451] __do_page_fault+0xec6/0x1a10 [ 1003.598610] do_page_fault+0xb7/0x250 [ 1003.602557] ? page_fault+0x8/0x30 [ 1003.606106] page_fault+0x1e/0x30 [ 1003.609566] RIP: 0033:0x4075fa [ 1003.612753] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1003.618135] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 1003.625414] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 1003.632694] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1003.639953] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f52f0 [ 1003.647206] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:16:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:16:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) [ 1003.782962] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1003.793665] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1003.798797] CPU: 0 PID: 21888 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1003.805637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.814994] Call Trace: [ 1003.817610] dump_stack+0x185/0x1d0 [ 1003.821248] warn_alloc+0x430/0x690 [ 1003.824922] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1003.829850] ? kernel_poison_pages+0x40/0x360 [ 1003.834444] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1003.839893] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1003.844853] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1003.849882] ? kmsan_set_origin_inline+0x6b/0x120 [ 1003.854722] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.859398] kmsan_alloc_page+0x82/0xe0 [ 1003.863393] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1003.868160] ? should_fail+0x57/0xab0 [ 1003.871997] ? __should_failslab+0x278/0x2a0 [ 1003.876417] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.881091] ? kmsan_set_origin+0x9e/0x160 [ 1003.885334] alloc_pages_vma+0x1555/0x17f0 [ 1003.889577] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1003.894707] handle_mm_fault+0x44ca/0x7ed0 [ 1003.898942] ? kmsan_set_origin_inline+0x6b/0x120 [ 1003.903885] __do_page_fault+0xec6/0x1a10 [ 1003.908128] do_page_fault+0xb7/0x250 [ 1003.911958] ? page_fault+0x8/0x30 [ 1003.915520] page_fault+0x1e/0x30 [ 1003.918977] RIP: 0033:0x4075fa [ 1003.922163] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1003.927524] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 1003.934789] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 1003.942055] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1003.949318] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f5426 [ 1003.956583] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1003.963856] warn_alloc_show_mem: 2 callbacks suppressed [ 1003.963859] Mem-Info: [ 1003.971629] active_anon:164775 inactive_anon:74 isolated_anon:0 [ 1003.971629] active_file:368 inactive_file:626 isolated_file:0 [ 1003.971629] unevictable:0 dirty:16 writeback:0 unstable:0 [ 1003.971629] slab_reclaimable:3324 slab_unreclaimable:9520 [ 1003.971629] mapped:66392 shmem:84 pagetables:1352 bounce:0 [ 1003.971629] free:37691 free_pcp:592 free_cma:0 [ 1004.005113] Node 0 active_anon:659100kB inactive_anon:296kB active_file:1220kB inactive_file:2356kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:265336kB dirty:64kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1004.034158] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1004.060447] lowmem_reserve[]: 0 2817 7244 7244 [ 1004.065025] Node 0 DMA32 free:82764kB min:26224kB low:32780kB high:39336kB active_anon:226984kB inactive_anon:20kB active_file:696kB inactive_file:948kB unevictable:0kB writepending:20kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2496kB pagetables:2036kB bounce:0kB free_pcp:1284kB local_pcp:544kB free_cma:0kB [ 1004.094089] lowmem_reserve[]: 0 0 4426 4426 [ 1004.098424] Node 0 Normal free:52096kB min:41208kB low:51508kB high:61808kB active_anon:432116kB inactive_anon:276kB active_file:716kB inactive_file:1240kB unevictable:0kB writepending:44kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7616kB pagetables:3372kB bounce:0kB free_pcp:1184kB local_pcp:496kB free_cma:0kB [ 1004.127746] lowmem_reserve[]: 0 0 0 0 [ 1004.131538] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1004.144844] Node 0 DMA32: 3246*4kB (UMH) 4684*8kB (UM) 761*16kB (UM) 191*32kB (UM) 71*64kB (UM) 29*128kB (M) 12*256kB (UM) 6*512kB (M) 0*1024kB 0*2048kB 0*4096kB = 83144kB [ 1004.160313] Node 0 Normal: 6895*4kB (UMEH) 2293*8kB (UMEH) 270*16kB (UMEH) 9*32kB (H) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 52516kB [ 1004.176311] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1004.184865] 1020 total pagecache pages [ 1004.188732] 0 pages in swap cache [ 1004.192166] Swap cache stats: add 0, delete 0, find 0/0 [ 1004.197516] Free swap = 0kB [ 1004.200512] Total swap = 0kB [ 1004.203512] 1965969 pages RAM [ 1004.206595] 0 pages HighMem/MovableOnly [ 1004.210544] 106316 pages reserved [ 1004.240255] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1004.250772] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1004.255884] CPU: 0 PID: 21889 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1004.262712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.272059] Call Trace: [ 1004.274649] dump_stack+0x185/0x1d0 [ 1004.278280] warn_alloc+0x430/0x690 [ 1004.281919] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1004.286760] ? kernel_poison_pages+0x40/0x360 [ 1004.291262] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1004.296716] ? kmsan_set_origin_inline+0x6b/0x120 [ 1004.301575] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1004.306603] ? kmsan_set_origin_inline+0x6b/0x120 [ 1004.311444] ? __msan_poison_alloca+0x15c/0x1d0 [ 1004.316122] kmsan_alloc_page+0x82/0xe0 [ 1004.320100] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1004.324852] ? kmsan_set_origin_inline+0x6b/0x120 [ 1004.329695] ? __msan_poison_alloca+0x15c/0x1d0 [ 1004.334363] ? __should_failslab+0x278/0x2a0 [ 1004.338770] ? should_fail+0x57/0xab0 [ 1004.342572] ? __should_failslab+0x278/0x2a0 [ 1004.346980] ? kmsan_set_origin_inline+0x6b/0x120 [ 1004.351820] ? __msan_poison_alloca+0x15c/0x1d0 [ 1004.356488] ? kmsan_set_origin+0x9e/0x160 [ 1004.360730] alloc_pages_vma+0x1555/0x17f0 [ 1004.364968] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1004.370082] handle_mm_fault+0x44ca/0x7ed0 [ 1004.374316] ? kmsan_set_origin_inline+0x6b/0x120 [ 1004.379167] __do_page_fault+0xec6/0x1a10 [ 1004.383319] do_page_fault+0xb7/0x250 [ 1004.387117] ? page_fault+0x8/0x30 [ 1004.390654] page_fault+0x1e/0x30 [ 1004.394098] RIP: 0033:0x4075fa [ 1004.397282] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1004.402638] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 1004.409903] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 1004.417278] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1004.424555] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f55d7 [ 1004.431852] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1004.456390] kauditd_printk_skb: 1 callbacks suppressed [ 1004.456411] audit: type=1326 audit(1529720162.455:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21889 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1004.643686] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1004.654230] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1004.659497] CPU: 0 PID: 21903 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1004.666341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.675701] Call Trace: [ 1004.678313] dump_stack+0x185/0x1d0 [ 1004.681952] warn_alloc+0x430/0x690 [ 1004.685633] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1004.690490] ? kernel_poison_pages+0x40/0x360 [ 1004.695017] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1004.700684] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1004.705655] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 1004.710607] ? kmsan_set_origin_inline+0x6b/0x120 [ 1004.715465] ? __msan_poison_alloca+0x15c/0x1d0 [ 1004.720156] kmsan_alloc_page+0x82/0xe0 [ 1004.724142] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1004.728918] ? should_fail+0x57/0xab0 [ 1004.732812] ? __should_failslab+0x278/0x2a0 [ 1004.737233] ? __msan_poison_alloca+0x15c/0x1d0 [ 1004.741914] ? kmsan_set_origin+0x9e/0x160 [ 1004.746170] alloc_pages_vma+0x1555/0x17f0 [ 1004.750429] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1004.755549] handle_mm_fault+0x44ca/0x7ed0 [ 1004.759798] ? kmsan_set_origin_inline+0x6b/0x120 [ 1004.764657] __do_page_fault+0xec6/0x1a10 [ 1004.768819] do_page_fault+0xb7/0x250 [ 1004.772624] ? page_fault+0x8/0x30 [ 1004.776190] page_fault+0x1e/0x30 [ 1004.779642] RIP: 0033:0x4075fa [ 1004.782849] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1004.788210] RAX: 00000000200001c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 1004.795487] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 1004.802948] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1004.810399] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f5783 [ 1004.817684] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1004.824980] warn_alloc_show_mem: 1 callbacks suppressed [ 1004.824983] Mem-Info: [ 1004.832819] active_anon:164818 inactive_anon:78 isolated_anon:0 [ 1004.832819] active_file:536 inactive_file:930 isolated_file:0 [ 1004.832819] unevictable:0 dirty:21 writeback:1 unstable:0 [ 1004.832819] slab_reclaimable:3324 slab_unreclaimable:9522 [ 1004.832819] mapped:66755 shmem:84 pagetables:1287 bounce:0 [ 1004.832819] free:37577 free_pcp:611 free_cma:0 [ 1004.865926] Node 0 active_anon:659272kB inactive_anon:312kB active_file:1880kB inactive_file:3288kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266440kB dirty:84kB writeback:4kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 260096kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1004.893775] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1004.920019] lowmem_reserve[]: 0 2817 7244 7244 [ 1004.924707] Node 0 DMA32 free:83196kB min:26224kB low:32780kB high:39336kB active_anon:227300kB inactive_anon:20kB active_file:532kB inactive_file:1784kB unevictable:0kB writepending:48kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2240kB pagetables:1960kB bounce:0kB free_pcp:1388kB local_pcp:672kB free_cma:0kB [ 1004.953880] lowmem_reserve[]: 0 0 4426 4426 [ 1004.958216] Node 0 Normal free:52720kB min:41208kB low:51508kB high:61808kB active_anon:431972kB inactive_anon:292kB active_file:1216kB inactive_file:1252kB unevictable:0kB writepending:40kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7616kB pagetables:3188kB bounce:0kB free_pcp:1176kB local_pcp:460kB free_cma:0kB [ 1004.988028] lowmem_reserve[]: 0 0 0 0 [ 1004.991927] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1005.005165] Node 0 DMA32: 2881*4kB (UMH) 4690*8kB (UM) 771*16kB (UM) 194*32kB (UM) 69*64kB (UM) 33*128kB (UM) 14*256kB (UM) 7*512kB (UM) 1*1024kB (U) 0*2048kB 0*4096kB = 84420kB [ 1005.021282] Node 0 Normal: 6970*4kB (UMEH) 2340*8kB (UMEH) 285*16kB (UMEH) 9*32kB (H) 5*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 53688kB [ 1005.037011] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1005.045676] 631 total pagecache pages [ 1005.049511] 0 pages in swap cache [ 1005.052988] Swap cache stats: add 0, delete 0, find 0/0 [ 1005.058348] Free swap = 0kB [ 1005.061360] Total swap = 0kB [ 1005.064372] 1965969 pages RAM [ 1005.067464] 0 pages HighMem/MovableOnly [ 1005.071423] 106316 pages reserved 02:16:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:02 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:02 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:16:02 executing program 4: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:16:03 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) [ 1005.219250] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1005.229899] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1005.235123] CPU: 1 PID: 21911 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1005.241987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.251443] Call Trace: [ 1005.254054] dump_stack+0x185/0x1d0 [ 1005.257713] warn_alloc+0x430/0x690 [ 1005.261352] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1005.266203] ? kernel_poison_pages+0x40/0x360 [ 1005.270700] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1005.276158] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1005.281112] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 1005.286068] ? kmsan_set_origin_inline+0x6b/0x120 [ 1005.290926] ? __msan_poison_alloca+0x15c/0x1d0 [ 1005.295679] kmsan_alloc_page+0x82/0xe0 [ 1005.299671] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1005.304444] ? should_fail+0x57/0xab0 [ 1005.308251] ? __should_failslab+0x278/0x2a0 [ 1005.312668] ? __msan_poison_alloca+0x15c/0x1d0 [ 1005.317373] ? kmsan_set_origin+0x9e/0x160 [ 1005.321625] alloc_pages_vma+0x1555/0x17f0 [ 1005.325872] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1005.331076] handle_mm_fault+0x44ca/0x7ed0 [ 1005.335320] ? kmsan_set_origin_inline+0x6b/0x120 [ 1005.340176] __do_page_fault+0xec6/0x1a10 [ 1005.344354] do_page_fault+0xb7/0x250 [ 1005.348165] ? page_fault+0x8/0x30 [ 1005.351714] page_fault+0x1e/0x30 [ 1005.355163] RIP: 0033:0x4075fa [ 1005.358351] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 02:16:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) 02:16:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) [ 1005.363714] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 1005.370998] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 1005.378323] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1005.385599] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f59c2 [ 1005.392877] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1005.460498] audit: type=1326 audit(1529720163.459:1901): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21922 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:16:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:03 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:03 executing program 4: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:16:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:03 executing program 7: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) [ 1005.934889] audit: type=1326 audit(1529720163.933:1902): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21911 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:16:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:16:04 executing program 4: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:16:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 1006.211618] audit: type=1326 audit(1529720164.210:1903): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21959 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:16:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:16:04 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:16:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:04 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:05 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) process_vm_readv(0x0, &(0x7f0000000300), 0x0, &(0x7f0000000500), 0x0, 0x0) 02:16:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) [ 1007.216931] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1007.227724] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1007.232850] CPU: 1 PID: 22012 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1007.239852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.249236] Call Trace: [ 1007.251833] dump_stack+0x185/0x1d0 [ 1007.255468] warn_alloc+0x430/0x690 [ 1007.259113] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1007.263973] ? kernel_poison_pages+0x40/0x360 [ 1007.268495] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1007.273958] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1007.278937] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1007.284066] ? kmsan_set_origin_inline+0x6b/0x120 [ 1007.288929] ? __msan_poison_alloca+0x15c/0x1d0 [ 1007.293613] kmsan_alloc_page+0x82/0xe0 [ 1007.297581] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1007.302449] ? kmsan_set_origin_inline+0x6b/0x120 [ 1007.307282] ? __msan_poison_alloca+0x15c/0x1d0 [ 1007.311932] ? __should_failslab+0x278/0x2a0 [ 1007.316336] ? should_fail+0x57/0xab0 [ 1007.320136] ? __should_failslab+0x278/0x2a0 [ 1007.324529] ? kmsan_set_origin_inline+0x6b/0x120 [ 1007.329355] ? __msan_poison_alloca+0x15c/0x1d0 [ 1007.334011] ? kmsan_set_origin+0x9e/0x160 [ 1007.338238] alloc_pages_vma+0x1555/0x17f0 [ 1007.342463] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1007.347573] handle_mm_fault+0x44ca/0x7ed0 [ 1007.351805] ? msan_get_shadow_origin_ptr+0xf5/0x230 [ 1007.356916] __do_page_fault+0xec6/0x1a10 [ 1007.361142] do_page_fault+0xb7/0x250 [ 1007.364931] ? page_fault+0x8/0x30 [ 1007.368466] page_fault+0x1e/0x30 [ 1007.371907] RIP: 0033:0x4075fa [ 1007.375083] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1007.380431] RAX: 00000000200001c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 1007.387685] RDX: 2bf4013a45b491d0 RSI: 0000000000000000 RDI: 0000000001bc8848 [ 1007.394939] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1007.402193] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f6190 [ 1007.409445] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1007.416708] warn_alloc_show_mem: 1 callbacks suppressed [ 1007.416710] Mem-Info: [ 1007.424454] active_anon:164358 inactive_anon:77 isolated_anon:0 [ 1007.424454] active_file:828 inactive_file:878 isolated_file:0 [ 1007.424454] unevictable:0 dirty:6 writeback:0 unstable:0 [ 1007.424454] slab_reclaimable:3323 slab_unreclaimable:9524 [ 1007.424454] mapped:66629 shmem:84 pagetables:1415 bounce:0 [ 1007.424454] free:36723 free_pcp:287 free_cma:0 [ 1007.457354] Node 0 active_anon:657432kB inactive_anon:308kB active_file:3312kB inactive_file:3512kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266516kB dirty:24kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1007.485186] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1007.511396] lowmem_reserve[]: 0 2817 7244 7244 [ 1007.515968] Node 0 DMA32 free:80576kB min:26224kB low:32780kB high:39336kB active_anon:225396kB inactive_anon:0kB active_file:1592kB inactive_file:2016kB unevictable:0kB writepending:20kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2304kB pagetables:2492kB bounce:0kB free_pcp:196kB local_pcp:108kB free_cma:0kB [ 1007.545118] lowmem_reserve[]: 0 0 4426 4426 [ 1007.549431] Node 0 Normal free:50412kB min:41208kB low:51508kB high:61808kB active_anon:431920kB inactive_anon:308kB active_file:1640kB inactive_file:1316kB unevictable:0kB writepending:4kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7872kB pagetables:3168kB bounce:0kB free_pcp:952kB local_pcp:516kB free_cma:0kB [ 1007.578688] lowmem_reserve[]: 0 0 0 0 [ 1007.582482] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1007.595783] Node 0 DMA32: 2325*4kB (MH) 4646*8kB (UME) 772*16kB (UME) 204*32kB (UME) 67*64kB (UME) 30*128kB (UME) 11*256kB (UME) 6*512kB (UME) 1*1024kB (E) 0*2048kB 0*4096kB = 80388kB [ 1007.612292] Node 0 Normal: 6493*4kB (UMEH) 2272*8kB (UMEH) 286*16kB (UMEH) 10*32kB (UMH) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 50004kB [ 1007.627850] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1007.636502] 1790 total pagecache pages [ 1007.640366] 0 pages in swap cache [ 1007.643796] Swap cache stats: add 0, delete 0, find 0/0 [ 1007.649137] Free swap = 0kB [ 1007.652141] Total swap = 0kB [ 1007.655137] 1965969 pages RAM [ 1007.658218] 0 pages HighMem/MovableOnly [ 1007.662182] 106316 pages reserved [ 1007.667883] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1007.678407] syz-executor6 cpuset=syz6 mems_allowed=0 [ 1007.683533] CPU: 1 PID: 22014 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1007.690373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.699734] Call Trace: [ 1007.702333] dump_stack+0x185/0x1d0 [ 1007.705967] warn_alloc+0x430/0x690 [ 1007.709607] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1007.714455] ? kernel_poison_pages+0x40/0x360 [ 1007.718939] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1007.724374] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1007.729303] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1007.734314] ? kmsan_set_origin_inline+0x6b/0x120 [ 1007.739138] ? __msan_poison_alloca+0x15c/0x1d0 [ 1007.743798] kmsan_alloc_page+0x82/0xe0 [ 1007.747759] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1007.752504] ? should_fail+0x57/0xab0 [ 1007.756287] ? __should_failslab+0x278/0x2a0 [ 1007.760680] ? __msan_poison_alloca+0x15c/0x1d0 [ 1007.765337] ? kmsan_set_origin+0x9e/0x160 [ 1007.769651] alloc_pages_vma+0x1555/0x17f0 [ 1007.773876] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1007.779059] handle_mm_fault+0x44ca/0x7ed0 [ 1007.783291] ? kmsan_set_origin_inline+0x6b/0x120 [ 1007.788138] __do_page_fault+0xec6/0x1a10 [ 1007.792287] do_page_fault+0xb7/0x250 [ 1007.796078] ? page_fault+0x8/0x30 [ 1007.799610] page_fault+0x1e/0x30 [ 1007.803062] RIP: 0033:0x4075fa [ 1007.806237] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1007.811583] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 02:16:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) [ 1007.818922] RDX: 6dd2cca130cf06cb RSI: 0000000000000000 RDI: 0000000001a22848 [ 1007.826175] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1007.833437] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f6353 [ 1007.840689] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1007.850110] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1007.860634] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1007.865760] CPU: 1 PID: 22016 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1007.872671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.882117] Call Trace: [ 1007.884715] dump_stack+0x185/0x1d0 [ 1007.888354] warn_alloc+0x430/0x690 [ 1007.891998] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1007.896880] ? kernel_poison_pages+0x40/0x360 [ 1007.901411] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1007.906895] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1007.911949] ? kmsan_set_origin_inline+0x6b/0x120 02:16:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) [ 1007.916799] ? __msan_poison_alloca+0x15c/0x1d0 [ 1007.921485] kmsan_alloc_page+0x82/0xe0 [ 1007.925466] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1007.930235] ? should_fail+0x57/0xab0 [ 1007.934042] ? __should_failslab+0x278/0x2a0 [ 1007.938482] ? __msan_poison_alloca+0x15c/0x1d0 [ 1007.943159] ? kmsan_set_origin+0x9e/0x160 [ 1007.947412] alloc_pages_vma+0x1555/0x17f0 [ 1007.951660] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1007.956774] handle_mm_fault+0x44ca/0x7ed0 [ 1007.961011] ? kmsan_set_origin_inline+0x6b/0x120 [ 1007.965890] __do_page_fault+0xec6/0x1a10 02:16:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) [ 1007.970242] do_page_fault+0xb7/0x250 [ 1007.974052] ? page_fault+0x8/0x30 [ 1007.977597] page_fault+0x1e/0x30 [ 1007.981047] RIP: 0033:0x4075fa [ 1007.984270] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1007.989721] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 1007.997092] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 1008.004387] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1008.011660] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f6409 [ 1008.018941] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1008.028194] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1008.038704] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1008.043834] CPU: 1 PID: 22020 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1008.050678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.060037] Call Trace: [ 1008.062644] dump_stack+0x185/0x1d0 [ 1008.066279] warn_alloc+0x430/0x690 02:16:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50191}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) [ 1008.069933] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1008.074786] ? kernel_poison_pages+0x40/0x360 [ 1008.079332] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1008.084790] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1008.089841] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1008.094876] ? kmsan_set_origin_inline+0x6b/0x120 [ 1008.099732] ? __msan_poison_alloca+0x15c/0x1d0 [ 1008.104418] kmsan_alloc_page+0x82/0xe0 [ 1008.108405] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1008.113176] ? should_fail+0x57/0xab0 02:16:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) [ 1008.116982] ? __should_failslab+0x278/0x2a0 [ 1008.121399] ? __msan_poison_alloca+0x15c/0x1d0 [ 1008.126077] ? kmsan_set_origin+0x9e/0x160 [ 1008.130329] alloc_pages_vma+0x1555/0x17f0 [ 1008.134581] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1008.139700] handle_mm_fault+0x44ca/0x7ed0 [ 1008.143956] ? kmsan_set_origin_inline+0x6b/0x120 [ 1008.148845] __do_page_fault+0xec6/0x1a10 [ 1008.153004] do_page_fault+0xb7/0x250 [ 1008.156811] ? page_fault+0x8/0x30 [ 1008.160361] page_fault+0x1e/0x30 [ 1008.163818] RIP: 0033:0x4075fa 02:16:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) [ 1008.167005] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1008.172370] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 1008.179744] RDX: 7ffd26e99e8bc696 RSI: 0000000000000000 RDI: 0000000000b58848 [ 1008.187103] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1008.194386] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f64bb [ 1008.201767] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:16:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) [ 1008.242985] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1008.253593] syz-executor7 cpuset=syz7 mems_allowed=0 [ 1008.258720] CPU: 1 PID: 22041 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1008.265554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.274903] Call Trace: [ 1008.277490] dump_stack+0x185/0x1d0 [ 1008.281118] warn_alloc+0x430/0x690 [ 1008.284756] __alloc_pages_nodemask+0x5b1c/0x5cc0 02:16:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) [ 1008.289596] ? kernel_poison_pages+0x40/0x360 [ 1008.294093] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1008.299543] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1008.304487] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1008.309513] ? kmsan_set_origin_inline+0x6b/0x120 [ 1008.314366] ? __msan_poison_alloca+0x15c/0x1d0 [ 1008.319044] kmsan_alloc_page+0x82/0xe0 [ 1008.323019] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1008.327786] ? should_fail+0x57/0xab0 [ 1008.331582] ? __should_failslab+0x278/0x2a0 [ 1008.335992] ? __msan_poison_alloca+0x15c/0x1d0 [ 1008.340667] ? kmsan_set_origin+0x9e/0x160 [ 1008.344917] alloc_pages_vma+0x1555/0x17f0 [ 1008.349158] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1008.354270] handle_mm_fault+0x44ca/0x7ed0 [ 1008.358507] ? kmsan_set_origin_inline+0x6b/0x120 [ 1008.363362] __do_page_fault+0xec6/0x1a10 [ 1008.367522] do_page_fault+0xb7/0x250 [ 1008.371322] ? page_fault+0x8/0x30 [ 1008.374865] page_fault+0x1e/0x30 [ 1008.378312] RIP: 0033:0x4075fa [ 1008.381494] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 02:16:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) [ 1008.386849] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 1008.394115] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 1008.401379] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1008.408643] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f6592 [ 1008.415913] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1008.423187] warn_alloc_show_mem: 3 callbacks suppressed [ 1008.423190] Mem-Info: [ 1008.430959] active_anon:164417 inactive_anon:78 isolated_anon:0 [ 1008.430959] active_file:857 inactive_file:729 isolated_file:11 [ 1008.430959] unevictable:0 dirty:26 writeback:0 unstable:0 [ 1008.430959] slab_reclaimable:3323 slab_unreclaimable:9524 [ 1008.430959] mapped:66826 shmem:84 pagetables:1384 bounce:0 [ 1008.430959] free:35955 free_pcp:483 free_cma:0 [ 1008.463965] Node 0 active_anon:657668kB inactive_anon:312kB active_file:3620kB inactive_file:2684kB unevictable:0kB isolated(anon):0kB isolated(file):44kB mapped:267304kB dirty:104kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1008.491974] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1008.518174] lowmem_reserve[]: 0 2817 7244 7244 [ 1008.522756] Node 0 DMA32 free:77696kB min:26224kB low:32780kB high:39336kB active_anon:225660kB inactive_anon:8kB active_file:1540kB inactive_file:2208kB unevictable:0kB writepending:96kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2432kB pagetables:2368kB bounce:0kB free_pcp:516kB local_pcp:184kB free_cma:0kB [ 1008.551819] lowmem_reserve[]: 0 0 4426 4426 [ 1008.556142] Node 0 Normal free:50220kB min:41208kB low:51508kB high:61808kB active_anon:431892kB inactive_anon:304kB active_file:1708kB inactive_file:672kB unevictable:0kB writepending:8kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7872kB pagetables:3168kB bounce:0kB free_pcp:1244kB local_pcp:516kB free_cma:0kB [ 1008.585377] lowmem_reserve[]: 0 0 0 0 [ 1008.589172] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1008.602379] Node 0 DMA32: 2241*4kB (UMEH) 4645*8kB (M) 745*16kB (ME) 176*32kB (ME) 57*64kB (ME) 26*128kB (UME) 11*256kB (UME) 6*512kB (UME) 1*1024kB (E) 0*2048kB 0*4096kB = 77564kB [ 1008.618626] Node 0 Normal: 6545*4kB (UMEH) 2276*8kB (UMEH) 282*16kB (UME) 7*32kB (UMH) 4*64kB (UH) 1*128kB (H) 1*256kB (H) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 49764kB [ 1008.633746] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1008.642295] 1663 total pagecache pages [ 1008.646156] 0 pages in swap cache [ 1008.649585] Swap cache stats: add 0, delete 0, find 0/0 [ 1008.654920] Free swap = 0kB [ 1008.657915] Total swap = 0kB [ 1008.660909] 1965969 pages RAM [ 1008.664089] 0 pages HighMem/MovableOnly [ 1008.668039] 106316 pages reserved [ 1008.674794] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1008.685294] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1008.690406] CPU: 1 PID: 22044 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1008.697238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.706586] Call Trace: [ 1008.709176] dump_stack+0x185/0x1d0 [ 1008.712810] warn_alloc+0x430/0x690 [ 1008.716534] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1008.721373] ? kernel_poison_pages+0x40/0x360 [ 1008.725867] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1008.731329] ? try_to_wake_up+0x1cfd/0x2260 [ 1008.735667] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1008.740693] ? kmsan_set_origin_inline+0x6b/0x120 [ 1008.745537] ? __msan_poison_alloca+0x15c/0x1d0 [ 1008.750215] kmsan_alloc_page+0x82/0xe0 [ 1008.754191] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1008.758954] ? should_fail+0x57/0xab0 [ 1008.762749] ? __should_failslab+0x278/0x2a0 [ 1008.767157] ? __msan_poison_alloca+0x15c/0x1d0 [ 1008.771836] ? kmsan_set_origin+0x9e/0x160 [ 1008.776077] alloc_pages_vma+0x1555/0x17f0 [ 1008.780325] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1008.785434] handle_mm_fault+0x44ca/0x7ed0 [ 1008.789668] ? kmsan_set_origin_inline+0x6b/0x120 [ 1008.794521] __do_page_fault+0xec6/0x1a10 [ 1008.798666] do_page_fault+0xb7/0x250 [ 1008.802461] ? page_fault+0x8/0x30 [ 1008.805979] page_fault+0x1e/0x30 [ 1008.809505] RIP: 0033:0x4075fa [ 1008.812677] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1008.818616] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 1008.825871] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 [ 1008.833139] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1008.840387] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f6742 [ 1008.847723] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1008.894356] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1008.904881] syz-executor7 cpuset=syz7 mems_allowed=0 [ 1008.910106] CPU: 1 PID: 22041 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1008.917269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.926628] Call Trace: [ 1008.929309] dump_stack+0x185/0x1d0 [ 1008.932958] warn_alloc+0x430/0x690 [ 1008.936609] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1008.941467] ? kernel_poison_pages+0x40/0x360 [ 1008.945985] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1008.951484] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1008.956535] ? kmsan_set_origin_inline+0x6b/0x120 [ 1008.961419] ? kmsan_set_origin_inline+0x6b/0x120 [ 1008.966277] ? __msan_poison_alloca+0x15c/0x1d0 [ 1008.971171] kmsan_alloc_page+0x82/0xe0 [ 1008.975169] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1008.979954] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1008.985331] ? memcg_check_events+0x74/0xe90 [ 1008.989758] ? kmsan_set_origin_inline+0x6b/0x120 [ 1008.994618] ? wp_page_copy+0x1831/0x2470 [ 1008.998782] alloc_pages_vma+0x1555/0x17f0 [ 1009.003039] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1009.008170] handle_mm_fault+0x44ca/0x7ed0 [ 1009.012423] ? kmsan_set_origin_inline+0x6b/0x120 [ 1009.017385] __do_page_fault+0xec6/0x1a10 [ 1009.021575] do_page_fault+0xb7/0x250 [ 1009.025568] ? page_fault+0x8/0x30 [ 1009.029129] page_fault+0x1e/0x30 [ 1009.032570] RIP: 0033:0x43cec9 [ 1009.035742] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 02:16:07 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) [ 1009.041092] RAX: 0000000020fd5ff8 RBX: 0000000000000000 RCX: 0030656c69662f2e [ 1009.048349] RDX: 0000000000000008 RSI: 00000000007300d0 RDI: 0000000020fd5ff8 [ 1009.055698] RBP: 0000000000000000 R08: 0000000000000016 R09: 000000000000000f [ 1009.062954] R10: 0000000000a3e940 R11: 0000000000000246 R12: 00000000000f6592 [ 1009.070299] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 [ 1009.101676] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1009.112305] syz-executor6 cpuset=syz6 mems_allowed=0 [ 1009.117438] CPU: 1 PID: 22058 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1009.124280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.133640] Call Trace: [ 1009.136239] dump_stack+0x185/0x1d0 [ 1009.139873] warn_alloc+0x430/0x690 [ 1009.143500] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1009.148351] ? kernel_poison_pages+0x40/0x360 [ 1009.152848] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1009.158315] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1009.163333] ? kmsan_set_origin_inline+0x6b/0x120 [ 1009.168162] ? __msan_poison_alloca+0x15c/0x1d0 [ 1009.172821] kmsan_alloc_page+0x82/0xe0 [ 1009.176780] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1009.181537] ? should_fail+0x57/0xab0 [ 1009.185319] ? __should_failslab+0x278/0x2a0 [ 1009.189805] ? __msan_poison_alloca+0x15c/0x1d0 [ 1009.194469] ? kmsan_set_origin+0x9e/0x160 [ 1009.198697] alloc_pages_vma+0x1555/0x17f0 [ 1009.202924] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1009.208021] handle_mm_fault+0x44ca/0x7ed0 [ 1009.212241] ? kmsan_set_origin_inline+0x6b/0x120 [ 1009.217088] __do_page_fault+0xec6/0x1a10 [ 1009.221226] do_page_fault+0xb7/0x250 [ 1009.225019] ? page_fault+0x8/0x30 [ 1009.228544] page_fault+0x1e/0x30 [ 1009.231980] RIP: 0033:0x43cf61 [ 1009.235152] RSP: 002b:0000000000a3e978 EFLAGS: 00010246 [ 1009.240500] RAX: 000000000074616e RBX: 0000000000000000 RCX: 0000000000000000 [ 1009.247756] RDX: 0000000000000020 RSI: 0000000000730080 RDI: 0000000020000380 [ 1009.255008] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1009.262275] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f68ea [ 1009.269542] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 02:16:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:07 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 1009.391765] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1009.402317] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1009.407444] CPU: 0 PID: 22063 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1009.414280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.423738] Call Trace: [ 1009.426338] dump_stack+0x185/0x1d0 [ 1009.429981] warn_alloc+0x430/0x690 [ 1009.433626] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1009.438475] ? kernel_poison_pages+0x40/0x360 [ 1009.442980] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1009.448441] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1009.453406] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1009.458535] ? kmsan_set_origin_inline+0x6b/0x120 [ 1009.463385] ? __msan_poison_alloca+0x15c/0x1d0 [ 1009.468069] kmsan_alloc_page+0x82/0xe0 [ 1009.472051] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1009.476823] ? should_fail+0x57/0xab0 [ 1009.480629] ? __should_failslab+0x278/0x2a0 [ 1009.485041] ? __msan_poison_alloca+0x15c/0x1d0 [ 1009.489720] ? kmsan_set_origin+0x9e/0x160 [ 1009.493965] alloc_pages_vma+0x1555/0x17f0 [ 1009.498221] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1009.503344] handle_mm_fault+0x44ca/0x7ed0 [ 1009.507585] ? kmsan_set_origin_inline+0x6b/0x120 [ 1009.512447] __do_page_fault+0xec6/0x1a10 [ 1009.516607] do_page_fault+0xb7/0x250 [ 1009.520419] ? page_fault+0x8/0x30 [ 1009.523960] page_fault+0x1e/0x30 [ 1009.527412] RIP: 0033:0x4075fa [ 1009.530598] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1009.535957] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 1009.543225] RDX: 98548d63947169ab RSI: 0000000000000000 RDI: 0000000001196848 [ 1009.550585] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1009.557856] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f6a0f [ 1009.565126] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1009.572387] warn_alloc_show_mem: 3 callbacks suppressed [ 1009.572389] Mem-Info: [ 1009.580237] active_anon:164358 inactive_anon:76 isolated_anon:0 [ 1009.580237] active_file:503 inactive_file:461 isolated_file:0 [ 1009.580237] unevictable:0 dirty:15 writeback:0 unstable:0 [ 1009.580237] slab_reclaimable:3324 slab_unreclaimable:9535 [ 1009.580237] mapped:66277 shmem:84 pagetables:1208 bounce:0 [ 1009.580237] free:37321 free_pcp:454 free_cma:0 [ 1009.613313] Node 0 active_anon:657432kB inactive_anon:304kB active_file:2012kB inactive_file:1844kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:265108kB dirty:60kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1009.641151] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1009.667259] lowmem_reserve[]: 0 2817 7244 7244 [ 1009.671826] Node 0 DMA32 free:81620kB min:26224kB low:32780kB high:39336kB active_anon:225816kB inactive_anon:12kB active_file:1272kB inactive_file:1652kB unevictable:0kB writepending:148kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2112kB pagetables:1664kB bounce:0kB free_pcp:804kB local_pcp:184kB free_cma:0kB [ 1009.701054] lowmem_reserve[]: 0 0 4426 4426 [ 1009.705370] Node 0 Normal free:51760kB min:41208kB low:51508kB high:61808kB active_anon:431848kB inactive_anon:292kB active_file:1384kB inactive_file:428kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7872kB pagetables:3168kB bounce:0kB free_pcp:1012kB local_pcp:368kB free_cma:0kB [ 1009.734703] lowmem_reserve[]: 0 0 0 0 [ 1009.738489] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1009.751688] Node 0 DMA32: 2847*4kB (UMEH) 4775*8kB (UM) 788*16kB (UME) 180*32kB (UME) 67*64kB (UME) 25*128kB (UME) 10*256kB (UME) 6*512kB (UME) 1*1024kB (E) 0*2048kB 0*4096kB = 82100kB [ 1009.768288] Node 0 Normal: 6803*4kB (UMEH) 2305*8kB (UMEH) 285*16kB (UMEH) 7*32kB (UMH) 1*64kB (H) 0*128kB 1*256kB (H) 2*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 51780kB [ 1009.783417] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1009.792068] 1006 total pagecache pages [ 1009.795942] 0 pages in swap cache [ 1009.799373] Swap cache stats: add 0, delete 0, find 0/0 [ 1009.804715] Free swap = 0kB [ 1009.807712] Total swap = 0kB [ 1009.810797] 1965969 pages RAM [ 1009.813889] 0 pages HighMem/MovableOnly [ 1009.817855] 106316 pages reserved 02:16:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) [ 1009.982789] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1009.993327] syz-executor7 cpuset=syz7 mems_allowed=0 [ 1009.998635] CPU: 0 PID: 22066 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1010.005473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.014828] Call Trace: [ 1010.017429] dump_stack+0x185/0x1d0 [ 1010.021064] warn_alloc+0x430/0x690 [ 1010.024713] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1010.029737] ? kernel_poison_pages+0x40/0x360 [ 1010.034336] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1010.039802] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1010.044764] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1010.049803] ? kmsan_set_origin_inline+0x6b/0x120 [ 1010.054653] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.059337] kmsan_alloc_page+0x82/0xe0 [ 1010.063329] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1010.068196] ? should_fail+0x57/0xab0 [ 1010.072007] ? __should_failslab+0x278/0x2a0 [ 1010.076430] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.081109] ? kmsan_set_origin+0x9e/0x160 [ 1010.085339] alloc_pages_vma+0x1555/0x17f0 [ 1010.089573] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1010.094683] handle_mm_fault+0x44ca/0x7ed0 [ 1010.098912] ? kmsan_set_origin_inline+0x6b/0x120 [ 1010.103758] __do_page_fault+0xec6/0x1a10 [ 1010.107897] do_page_fault+0xb7/0x250 [ 1010.111691] ? page_fault+0x8/0x30 [ 1010.115225] page_fault+0x1e/0x30 [ 1010.118660] RIP: 0033:0x4075fa [ 1010.121830] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1010.127184] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 1010.134441] RDX: 5518b430e5e4aae5 RSI: 0000000000000000 RDI: 000000000209b848 [ 1010.141790] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1010.149043] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f6c5c [ 1010.156307] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:16:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) [ 1010.195421] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1010.206042] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1010.211277] CPU: 1 PID: 22068 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 1010.218121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.227520] Call Trace: [ 1010.230123] dump_stack+0x185/0x1d0 [ 1010.233767] warn_alloc+0x430/0x690 [ 1010.237406] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1010.242470] ? kernel_poison_pages+0x40/0x360 [ 1010.246978] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1010.252440] ? kmsan_set_origin_inline+0x6b/0x120 [ 1010.257312] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1010.262358] ? kmsan_set_origin_inline+0x6b/0x120 [ 1010.267205] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.271874] kmsan_alloc_page+0x82/0xe0 [ 1010.275842] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1010.280591] ? should_fail+0x57/0xab0 [ 1010.284414] ? __should_failslab+0x278/0x2a0 [ 1010.288822] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.293492] ? kmsan_set_origin+0x9e/0x160 [ 1010.297731] alloc_pages_vma+0x1555/0x17f0 [ 1010.301956] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1010.307144] handle_mm_fault+0x44ca/0x7ed0 [ 1010.311453] ? kmsan_set_origin_inline+0x6b/0x120 [ 1010.316289] __do_page_fault+0xec6/0x1a10 [ 1010.320437] do_page_fault+0xb7/0x250 [ 1010.324226] ? page_fault+0x8/0x30 [ 1010.327747] page_fault+0x1e/0x30 [ 1010.331352] RIP: 0033:0x4075fa [ 1010.334522] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 02:16:08 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:07 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) [ 1010.339876] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 1010.347135] RDX: feb798c679317740 RSI: 0000000000000000 RDI: 0000000002848848 [ 1010.354399] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1010.361662] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f6d26 [ 1010.368922] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1010.385870] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1010.396413] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1010.401534] CPU: 1 PID: 22072 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1010.408356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.417691] Call Trace: [ 1010.420267] dump_stack+0x185/0x1d0 [ 1010.423879] warn_alloc+0x430/0x690 [ 1010.427501] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1010.432325] ? kernel_poison_pages+0x40/0x360 [ 1010.436820] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1010.442256] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1010.447202] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1010.452212] ? kmsan_set_origin_inline+0x6b/0x120 [ 1010.457192] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.461854] kmsan_alloc_page+0x82/0xe0 [ 1010.465826] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1010.470589] ? should_fail+0x57/0xab0 [ 1010.474382] ? __should_failslab+0x278/0x2a0 [ 1010.478787] ? __msan_poison_alloca+0x15c/0x1d0 [ 1010.483443] ? kmsan_set_origin+0x9e/0x160 [ 1010.487761] alloc_pages_vma+0x1555/0x17f0 [ 1010.491986] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1010.497087] handle_mm_fault+0x44ca/0x7ed0 [ 1010.501325] ? kmsan_set_origin_inline+0x6b/0x120 [ 1010.506175] __do_page_fault+0xec6/0x1a10 [ 1010.510324] do_page_fault+0xb7/0x250 [ 1010.514111] ? page_fault+0x8/0x30 [ 1010.517634] page_fault+0x1e/0x30 [ 1010.521070] RIP: 0033:0x4075fa [ 1010.524260] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1010.529618] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 1010.536881] RDX: a493a93e13fba2d0 RSI: 0000000000000000 RDI: 0000000001a49848 02:16:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050255}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) [ 1010.544141] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1010.551393] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f6df1 [ 1010.558659] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 02:16:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:08 executing program 6: socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:08 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) [ 1010.697911] audit: type=1326 audit(1529720168.696:1904): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22072 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:16:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:16:08 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) [ 1010.942138] audit: type=1326 audit(1529720168.940:1905): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22093 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:16:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:09 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 02:16:09 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 1011.256281] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1011.267760] syz-executor7 cpuset=syz7 mems_allowed=0 [ 1011.273058] CPU: 1 PID: 22106 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1011.279938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.289323] Call Trace: [ 1011.291966] dump_stack+0x185/0x1d0 [ 1011.295721] warn_alloc+0x430/0x690 [ 1011.299420] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1011.304415] ? __msan_poison_alloca+0x15c/0x1d0 [ 1011.309174] copy_process+0x778/0x9be0 [ 1011.313113] ? __msan_poison_alloca+0x15c/0x1d0 [ 1011.317832] ? handle_mm_fault+0x74eb/0x7ed0 [ 1011.322296] ? handle_mm_fault+0x74eb/0x7ed0 [ 1011.326759] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1011.332183] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1011.338220] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1011.342673] ? __msan_poison_alloca+0x140/0x1d0 [ 1011.347436] _do_fork+0x353/0xf60 [ 1011.351033] __x64_sys_clone+0x15e/0x1b0 [ 1011.355141] ? __ia32_sys_vfork+0x70/0x70 [ 1011.359322] do_syscall_64+0x15b/0x230 [ 1011.363271] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1011.368493] RIP: 0033:0x458429 [ 1011.371700] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1011.379451] RAX: ffffffffffffffda RBX: 00007fe6286e3700 RCX: 0000000000458429 [ 1011.386745] RDX: 00007fe6286e39d0 RSI: 00007fe6286e2db0 RDI: 00000000003d0f00 [ 1011.394132] RBP: 0000000000a3e8a0 R08: 00007fe6286e3700 R09: 00007fe6286e3700 [ 1011.401515] R10: 00007fe6286e39d0 R11: 0000000000000202 R12: 0000000000000000 [ 1011.408818] R13: 0000000000a3e81f R14: 00007fe6286e39c0 R15: 0000000000000000 [ 1011.416324] warn_alloc_show_mem: 3 callbacks suppressed [ 1011.416330] Mem-Info: [ 1011.424355] active_anon:164533 inactive_anon:78 isolated_anon:0 [ 1011.424355] active_file:957 inactive_file:693 isolated_file:31 [ 1011.424355] unevictable:0 dirty:29 writeback:0 unstable:0 [ 1011.424355] slab_reclaimable:3326 slab_unreclaimable:9537 [ 1011.424355] mapped:66781 shmem:84 pagetables:1416 bounce:0 [ 1011.424355] free:35713 free_pcp:96 free_cma:0 [ 1011.457465] Node 0 active_anon:658132kB inactive_anon:312kB active_file:3828kB inactive_file:2772kB unevictable:0kB isolated(anon):0kB isolated(file):124kB mapped:267124kB dirty:116kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 02:16:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) [ 1011.485680] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1011.513602] lowmem_reserve[]: 0 2817 7244 7244 [ 1011.518339] Node 0 DMA32 free:76300kB min:26224kB low:32780kB high:39336kB active_anon:225836kB inactive_anon:36kB active_file:2552kB inactive_file:2388kB unevictable:0kB writepending:96kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2496kB pagetables:2404kB bounce:0kB free_pcp:620kB local_pcp:0kB free_cma:0kB [ 1011.547840] lowmem_reserve[]: 0 0 4426 4426 [ 1011.552300] Node 0 Normal free:51152kB min:41208kB low:51508kB high:61808kB active_anon:431832kB inactive_anon:276kB active_file:1344kB inactive_file:676kB unevictable:0kB writepending:20kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7744kB pagetables:3260kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1011.581400] lowmem_reserve[]: 0 0 0 0 [ 1011.585456] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1011.598993] Node 0 DMA32: 2187*4kB (UMEH) 4692*8kB (UM) 753*16kB (UME) 180*32kB (UME) 60*64kB (UME) 24*128kB (ME) 9*256kB (UME) 6*512kB (UME) 1*1024kB (E) 0*2048kB 0*4096kB = 77404kB [ 1011.615716] Node 0 Normal: 6872*4kB (UMEH) 2309*8kB (UMEH) 287*16kB (UMEH) 6*32kB (UM) 3*64kB (U) 4*128kB (H) 1*256kB (H) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51704kB [ 1011.631541] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1011.640303] 1686 total pagecache pages [ 1011.644327] 0 pages in swap cache [ 1011.647886] Swap cache stats: add 0, delete 0, find 0/0 [ 1011.653398] Free swap = 0kB [ 1011.656509] Total swap = 0kB [ 1011.659727] 1965969 pages RAM [ 1011.662918] 0 pages HighMem/MovableOnly [ 1011.667021] 106316 pages reserved 02:16:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 02:16:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 02:16:09 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:09 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) [ 1011.820905] audit: type=1326 audit(1529720169.819:1906): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22127 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:16:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:16:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) [ 1012.392345] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1012.403808] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1012.409160] CPU: 1 PID: 4518 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1012.415948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.425363] Call Trace: [ 1012.428012] dump_stack+0x185/0x1d0 [ 1012.431699] warn_alloc+0x430/0x690 [ 1012.435411] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1012.440332] ? __msan_poison_alloca+0x15c/0x1d0 [ 1012.445109] copy_process+0x778/0x9be0 [ 1012.449065] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1012.454600] ? ptep_set_access_flags+0x10e/0x1d0 [ 1012.459454] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1012.464988] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1012.469458] ? __msan_poison_alloca+0x141/0x1d0 [ 1012.474210] _do_fork+0x353/0xf60 [ 1012.477761] __x64_sys_clone+0x15e/0x1b0 [ 1012.481943] ? __ia32_sys_vfork+0x70/0x70 [ 1012.486138] do_syscall_64+0x15b/0x230 [ 1012.490081] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1012.495306] RIP: 0033:0x45414a [ 1012.498526] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1012.506286] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 1012.513678] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1012.520957] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 000000000258d940 [ 1012.528230] R10: 000000000258dc10 R11: 0000000000000246 R12: 0000000000000001 [ 1012.535500] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 1012.542973] Mem-Info: [ 1012.545536] active_anon:164490 inactive_anon:78 isolated_anon:0 [ 1012.545536] active_file:831 inactive_file:925 isolated_file:8 [ 1012.545536] unevictable:0 dirty:21 writeback:0 unstable:0 [ 1012.545536] slab_reclaimable:3330 slab_unreclaimable:9538 [ 1012.545536] mapped:66759 shmem:84 pagetables:1365 bounce:0 [ 1012.545536] free:35685 free_pcp:259 free_cma:0 [ 1012.578681] Node 0 active_anon:657960kB inactive_anon:312kB active_file:3324kB inactive_file:3700kB unevictable:0kB isolated(anon):0kB isolated(file):32kB mapped:267036kB dirty:84kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1012.606739] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1012.633177] lowmem_reserve[]: 0 2817 7244 7244 02:16:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:10 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 1012.637900] Node 0 DMA32 free:74952kB min:26224kB low:32780kB high:39336kB active_anon:226388kB inactive_anon:36kB active_file:2124kB inactive_file:3984kB unevictable:0kB writepending:80kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2240kB pagetables:2260kB bounce:0kB free_pcp:360kB local_pcp:0kB free_cma:0kB [ 1012.667216] lowmem_reserve[]: 0 0 4426 4426 [ 1012.671671] Node 0 Normal free:51268kB min:41208kB low:51508kB high:61808kB active_anon:431844kB inactive_anon:276kB active_file:1440kB inactive_file:496kB unevictable:0kB writepending:4kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:3200kB bounce:0kB free_pcp:440kB local_pcp:0kB free_cma:0kB [ 1012.700960] lowmem_reserve[]: 0 0 0 0 [ 1012.704934] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB [ 1012.705043] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1012.705066] syz-executor6 cpuset= [ 1012.711013] (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB [ 1012.722495] syz6 [ 1012.725988] (U) [ 1012.731534] mems_allowed=0 [ 1012.733621] 1*2048kB [ 1012.735641] CPU: 0 PID: 22145 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1012.738574] (M) [ 1012.740952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.740963] Call Trace: [ 1012.741005] dump_stack+0x185/0x1d0 [ 1012.741045] warn_alloc+0x430/0x690 [ 1012.747896] 3*4096kB [ 1012.749865] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1012.749925] ? __msan_poison_alloca+0x15c/0x1d0 [ 1012.759275] (M) [ 1012.761882] copy_process+0x778/0x9be0 [ 1012.761932] ? __msan_poison_alloca+0x15c/0x1d0 [ 1012.765552] = 15904kB [ 1012.769168] ? handle_mm_fault+0x74eb/0x7ed0 [ 1012.769215] ? handle_mm_fault+0x74eb/0x7ed0 [ 1012.771625] Node 0 [ 1012.776466] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1012.776525] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1012.781174] DMA32: [ 1012.783142] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1012.783177] ? __msan_poison_alloca+0x140/0x1d0 [ 1012.787101] 1396*4kB [ 1012.791733] _do_fork+0x353/0xf60 [ 1012.791778] __x64_sys_clone+0x15e/0x1b0 [ 1012.794182] (UMH) [ 1012.798570] ? __ia32_sys_vfork+0x70/0x70 [ 1012.798592] do_syscall_64+0x15b/0x230 [ 1012.798634] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1012.803043] 4739*8kB [ 1012.805243] RIP: 0033:0x458429 [ 1012.805258] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1012.805296] RAX: ffffffffffffffda RBX: 00007f2fa986d700 RCX: 0000000000458429 [ 1012.810706] (UM) [ 1012.816677] RDX: 00007f2fa986d9d0 RSI: 00007f2fa986cdb0 RDI: 00000000003d0f00 [ 1012.816693] RBP: 0000000000a3e8a0 R08: 00007f2fa986d700 R09: 00007f2fa986d700 [ 1012.816707] R10: 00007f2fa986d9d0 R11: 0000000000000202 R12: 0000000000000000 [ 1012.816722] R13: 0000000000a3e81f R14: 00007f2fa986d9c0 R15: 0000000000000000 [ 1012.906592] 764*16kB (UM) 178*32kB (UM) 62*64kB (UM) 24*128kB (UM) 8*256kB (UM) 5*512kB (UM) 1*1024kB (U) 0*2048kB 0*4096kB = 74088kB [ 1012.919027] Node 0 Normal: 6872*4kB (UME) 2309*8kB (UME) 291*16kB (UME) 8*32kB (UMH) 0*64kB 1*128kB (H) 1*256kB (H) 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 51768kB [ 1012.934227] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1012.942961] 1781 total pagecache pages [ 1012.946942] 0 pages in swap cache [ 1012.950505] Swap cache stats: add 0, delete 0, find 0/0 [ 1012.955956] Free swap = 0kB [ 1012.959137] Total swap = 0kB [ 1012.962234] 1965969 pages RAM [ 1012.965427] 0 pages HighMem/MovableOnly [ 1012.969473] 106316 pages reserved [ 1012.976227] audit: type=1326 audit(1529720170.867:1907): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22142 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:16:11 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 02:16:11 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:11 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) dup(0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 02:16:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 02:16:11 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:11 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 1013.469005] audit: type=1326 audit(1529720171.467:1908): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22180 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1013.640363] device bridge_slave_1 left promiscuous mode [ 1013.646247] bridge0: port 2(bridge_slave_1) entered disabled state [ 1013.701513] device bridge_slave_0 left promiscuous mode [ 1013.707367] bridge0: port 1(bridge_slave_0) entered disabled state 02:16:11 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 02:16:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) dup(0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 02:16:11 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50280}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000002300)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f0000000100)=""/179) 02:16:11 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) [ 1013.935238] team0 (unregistering): Port device team_slave_1 removed 02:16:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) dup(0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) [ 1014.005249] team0 (unregistering): Port device team_slave_0 removed [ 1014.105819] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1014.152327] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1014.277282] bond0 (unregistering): Released all slaves 02:16:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:12 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 02:16:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/19) 02:16:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) dup(0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) [ 1014.385221] IPVS: ftp: loaded support on port[0] = 21 [ 1014.496324] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1014.507753] syz-executor6 cpuset=syz6 mems_allowed=0 [ 1014.513016] CPU: 0 PID: 22230 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1014.519898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.529283] Call Trace: [ 1014.531923] dump_stack+0x185/0x1d0 [ 1014.535637] warn_alloc+0x430/0x690 [ 1014.539343] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1014.544272] ? __msan_poison_alloca+0x15c/0x1d0 [ 1014.549062] copy_process+0x778/0x9be0 [ 1014.553007] ? __msan_poison_alloca+0x15c/0x1d0 [ 1014.557728] ? handle_mm_fault+0x74eb/0x7ed0 [ 1014.562193] ? handle_mm_fault+0x74eb/0x7ed0 [ 1014.566661] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1014.572092] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1014.578217] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1014.582686] ? __msan_poison_alloca+0x140/0x1d0 [ 1014.587431] _do_fork+0x353/0xf60 [ 1014.590949] __x64_sys_clone+0x15e/0x1b0 [ 1014.595060] ? __ia32_sys_vfork+0x70/0x70 [ 1014.599337] do_syscall_64+0x15b/0x230 [ 1014.603366] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1014.608605] RIP: 0033:0x458429 [ 1014.611819] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1014.619571] RAX: ffffffffffffffda RBX: 00007f2fa986d700 RCX: 0000000000458429 [ 1014.626881] RDX: 00007f2fa986d9d0 RSI: 00007f2fa986cdb0 RDI: 00000000003d0f00 [ 1014.634191] RBP: 0000000000a3e8a0 R08: 00007f2fa986d700 R09: 00007f2fa986d700 [ 1014.641586] R10: 00007f2fa986d9d0 R11: 0000000000000202 R12: 0000000000000000 [ 1014.648897] R13: 0000000000a3e81f R14: 00007f2fa986d9c0 R15: 0000000000000000 [ 1014.656595] warn_alloc_show_mem: 1 callbacks suppressed [ 1014.656612] Mem-Info: [ 1014.664606] active_anon:164517 inactive_anon:75 isolated_anon:14 [ 1014.664606] active_file:597 inactive_file:527 isolated_file:23 [ 1014.664606] unevictable:0 dirty:38 writeback:0 unstable:0 [ 1014.664606] slab_reclaimable:3330 slab_unreclaimable:9473 [ 1014.664606] mapped:66600 shmem:84 pagetables:1204 bounce:0 [ 1014.664606] free:35654 free_pcp:284 free_cma:0 [ 1014.699026] Node 0 active_anon:658068kB inactive_anon:300kB active_file:2080kB inactive_file:2084kB unevictable:0kB isolated(anon):56kB isolated(file):92kB mapped:265936kB dirty:36kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1014.727232] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1014.753497] lowmem_reserve[]: 0 2817 7244 7244 [ 1014.758255] Node 0 DMA32 free:76604kB min:26224kB low:32780kB high:39336kB active_anon:226228kB inactive_anon:32kB active_file:1396kB inactive_file:1528kB unevictable:0kB writepending:104kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1856kB pagetables:1996kB bounce:0kB free_pcp:1116kB local_pcp:304kB free_cma:0kB [ 1014.787977] lowmem_reserve[]: 0 0 4426 4426 [ 1014.792459] Node 0 Normal free:51356kB min:41208kB low:51508kB high:61808kB active_anon:431804kB inactive_anon:280kB active_file:652kB inactive_file:480kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3168kB bounce:0kB free_pcp:288kB local_pcp:0kB free_cma:0kB [ 1014.821905] lowmem_reserve[]: 0 0 0 0 [ 1014.825978] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1014.839614] Node 0 DMA32: 2407*4kB (UMH) 3586*8kB (UM) 576*16kB (M) 103*32kB (UM) 37*64kB (UM) 26*128kB (UM) 19*256kB (M) 12*512kB (M) 5*1024kB (UM) 2*2048kB (M) 0*4096kB = 76748kB [ 1014.856271] Node 0 Normal: 7040*4kB (UME) 2288*8kB (UME) 261*16kB (UMEH) 5*32kB (UMH) 0*64kB 1*128kB (H) 0*256kB 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 51440kB [ 1014.871219] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1014.879905] 950 total pagecache pages [ 1014.883795] 0 pages in swap cache [ 1014.887344] Swap cache stats: add 0, delete 0, find 0/0 [ 1014.892787] Free swap = 0kB [ 1014.895888] Total swap = 0kB [ 1014.898968] 1965969 pages RAM [ 1014.902180] 0 pages HighMem/MovableOnly [ 1014.906201] 106316 pages reserved [ 1014.910045] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1014.921773] syz-executor7 cpuset=syz7 mems_allowed=0 [ 1014.927048] CPU: 1 PID: 16585 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1014.933923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.943395] Call Trace: [ 1014.946031] dump_stack+0x185/0x1d0 [ 1014.949702] warn_alloc+0x430/0x690 [ 1014.953492] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1014.958498] ? __msan_poison_alloca+0x15c/0x1d0 [ 1014.963250] copy_process+0x778/0x9be0 [ 1014.967195] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1014.972778] ? ptep_set_access_flags+0x10e/0x1d0 [ 1014.977689] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1014.983219] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1014.987688] ? __msan_poison_alloca+0x141/0x1d0 [ 1014.992435] _do_fork+0x353/0xf60 [ 1014.995952] __x64_sys_clone+0x15e/0x1b0 [ 1015.000045] ? __ia32_sys_vfork+0x70/0x70 [ 1015.004204] do_syscall_64+0x15b/0x230 [ 1015.008120] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1015.013322] RIP: 0033:0x45414a [ 1015.016523] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1015.024242] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 1015.031523] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1015.038794] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 000000000209b940 [ 1015.046068] R10: 000000000209bc10 R11: 0000000000000246 R12: 0000000000000001 [ 1015.053345] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 1015.946368] device bridge_slave_1 left promiscuous mode [ 1015.952199] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.967121] device bridge_slave_0 left promiscuous mode [ 1015.972836] bridge0: port 1(bridge_slave_0) entered disabled state [ 1016.004198] team0 (unregistering): Port device team_slave_1 removed [ 1016.014304] team0 (unregistering): Port device team_slave_0 removed [ 1016.023999] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1016.038060] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1016.063684] bond0 (unregistering): Released all slaves [ 1016.285290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1016.291778] bridge0: port 1(bridge_slave_0) entered disabled state [ 1016.299896] device bridge_slave_0 entered promiscuous mode [ 1016.357378] bridge0: port 2(bridge_slave_1) entered blocking state [ 1016.363880] bridge0: port 2(bridge_slave_1) entered disabled state [ 1016.372339] device bridge_slave_1 entered promiscuous mode [ 1016.429788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1016.486946] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1016.642170] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1016.700475] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1016.886182] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1016.893635] team0: Port device team_slave_0 added [ 1016.929386] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1016.936649] team0: Port device team_slave_1 added [ 1016.973524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1017.012890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1017.051331] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1017.058528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1017.067669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1017.100176] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1017.107818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1017.116913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1017.535602] bridge0: port 2(bridge_slave_1) entered blocking state [ 1017.542183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1017.548987] bridge0: port 1(bridge_slave_0) entered blocking state [ 1017.555495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1017.563259] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1018.399339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1019.386854] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1019.518778] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1019.648028] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1019.654331] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1019.662499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1019.787855] 8021q: adding VLAN 0 to HW filter on device team0 [ 1020.627151] audit: type=1326 audit(1529720178.625:1909): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22494 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:16:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)) 02:16:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x4000200005019d}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) 02:16:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)) 02:16:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 02:16:19 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 02:16:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 02:16:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000080)=""/234) 02:16:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000380)={'nat\x00', 0x0, 0x0, 0xb6, [], 0x0, &(0x7f0000000280), &(0x7f00000002c0)=""/182}, &(0x7f0000000400)=0x78) 02:16:19 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 02:16:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50356}]}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) 02:16:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x0, 0x0) utime(&(0x7f0000000480)='./file0\x00', &(0x7f0000000540)) [ 1021.812037] audit: type=1326 audit(1529720179.810:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22527 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 02:16:19 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5018e}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@rc, &(0x7f00000000c0)=0x80, 0x0) 02:16:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x8000502a8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000140)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 1024.293270] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1024.304865] syz-executor7 cpuset=/ mems_allowed=0 [ 1024.309880] CPU: 0 PID: 22550 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1024.316766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.326381] Call Trace: [ 1024.329037] dump_stack+0x185/0x1d0 [ 1024.332814] warn_alloc+0x430/0x690 [ 1024.336517] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1024.341445] ? __msan_poison_alloca+0x15c/0x1d0 [ 1024.346188] copy_process+0x778/0x9be0 [ 1024.350124] ? __msan_poison_alloca+0x15c/0x1d0 [ 1024.354842] ? handle_mm_fault+0x74eb/0x7ed0 [ 1024.359316] ? handle_mm_fault+0x74eb/0x7ed0 [ 1024.363863] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1024.369274] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1024.375401] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1024.379861] ? __msan_poison_alloca+0x141/0x1d0 [ 1024.384669] _do_fork+0x353/0xf60 [ 1024.388198] __x64_sys_clone+0x15e/0x1b0 [ 1024.392412] ? __ia32_sys_vfork+0x70/0x70 [ 1024.396596] do_syscall_64+0x15b/0x230 [ 1024.400533] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1024.405752] RIP: 0033:0x458429 [ 1024.408959] RSP: 002b:00007ffd65f3c4b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1024.416714] RAX: ffffffffffffffda RBX: 00007ffd65f3c570 RCX: 0000000000458429 [ 1024.424033] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 1024.431336] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 1024.438644] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 1024.445946] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1024.453589] warn_alloc_show_mem: 1 callbacks suppressed [ 1024.453595] Mem-Info: [ 1024.461761] active_anon:163595 inactive_anon:78 isolated_anon:0 [ 1024.461761] active_file:1952 inactive_file:1899 isolated_file:32 [ 1024.461761] unevictable:0 dirty:1 writeback:0 unstable:0 [ 1024.461761] slab_reclaimable:3317 slab_unreclaimable:9362 [ 1024.461761] mapped:69396 shmem:84 pagetables:1140 bounce:0 [ 1024.461761] free:30104 free_pcp:344 free_cma:0 [ 1024.495334] Node 0 active_anon:654380kB inactive_anon:312kB active_file:6044kB inactive_file:6068kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:274104kB dirty:4kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 258048kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1024.523409] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1024.550045] lowmem_reserve[]: 0 2817 7244 7244 [ 1024.554978] Node 0 DMA32 free:52844kB min:26224kB low:32780kB high:39336kB active_anon:223256kB inactive_anon:20kB active_file:1788kB inactive_file:244kB unevictable:0kB writepending:4kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:1632kB bounce:0kB free_pcp:696kB local_pcp:0kB free_cma:0kB [ 1024.583994] lowmem_reserve[]: 0 0 4426 4426 [ 1024.588454] Node 0 Normal free:54692kB min:41208kB low:51508kB high:61808kB active_anon:431008kB inactive_anon:292kB active_file:5308kB inactive_file:6552kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7424kB pagetables:2928kB bounce:0kB free_pcp:760kB local_pcp:0kB free_cma:0kB [ 1024.617739] lowmem_reserve[]: 0 0 0 0 [ 1024.621735] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1024.635156] Node 0 DMA32: 3151*4kB (UMH) 3608*8kB (UM) 531*16kB (M) 71*32kB (UM) 9*64kB (UM) 0*128kB 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 53324kB [ 1024.649719] Node 0 Normal: 4676*4kB (UME) 2252*8kB (UME) 618*16kB (UMEH) 177*32kB (UMH) 22*64kB (UH) 6*128kB (MH) 0*256kB 1*512kB (H) 0*1024kB 0*2048kB 0*4096kB = 54960kB [ 1024.665275] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1024.673910] 3109 total pagecache pages [ 1024.677856] 0 pages in swap cache [ 1024.681366] Swap cache stats: add 0, delete 0, find 0/0 [ 1024.686802] Free swap = 0kB [ 1024.689857] Total swap = 0kB [ 1024.692937] 1965969 pages RAM [ 1024.696173] 0 pages HighMem/MovableOnly [ 1024.700213] 106316 pages reserved [ 1026.772969] IPVS: ftp: loaded support on port[0] = 21 [ 1029.202452] IPVS: ftp: loaded support on port[0] = 21 [ 1033.451973] IPVS: ftp: loaded support on port[0] = 21 [ 1036.021058] IPVS: ftp: loaded support on port[0] = 21 [ 1038.282539] IPVS: ftp: loaded support on port[0] = 21 [ 1040.497265] IPVS: ftp: loaded support on port[0] = 21 [ 1042.653900] IPVS: ftp: loaded support on port[0] = 21 [ 1044.955883] IPVS: ftp: loaded support on port[0] = 21 [ 1047.200860] IPVS: ftp: loaded support on port[0] = 21 2018/06/23 02:16:45 executor failed 11 times: executor 7: invalid status 0, exit status: exit status 69 [ 1048.533502] ------------[ cut here ]------------ [ 1048.538436] kernel BUG at mm/kmsan/kmsan.c:909! [ 1048.543985] invalid opcode: 0000 [#1] SMP PTI [ 1048.548580] Dumping ftrace buffer: [ 1048.552136] (ftrace buffer empty) [ 1048.555861] Modules linked in: [ 1048.559074] CPU: 1 PID: 4490 Comm: syz-fuzzer Not tainted 4.17.0+ #9 [ 1048.565583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1048.574979] RIP: 0010:kmsan_free_page+0x2a6/0x2e0 [ 1048.579850] RSP: 0018:ffff88018c94f140 EFLAGS: 00010282 [ 1048.585243] RAX: 0000000000000023 RBX: ffffea0006024d70 RCX: 0000000000000009 [ 1048.592519] RDX: ffff8801fd033c88 RSI: 0000000000000009 RDI: ffffea0006024000 [ 1048.599797] RBP: ffff88018c94f188 R08: 0000000001080020 R09: 0000000000000002 [ 1048.607072] R10: 0000000000000000 R11: ffffffff81c36d50 R12: 0000000000000200 [ 1048.614358] R13: 0000000000000009 R14: 0000000000000009 R15: ffffffff8b58d000 [ 1048.621632] FS: 000000c420028068(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 1048.629848] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1048.635736] CR2: ffffffffff600400 CR3: 00000001ca2d6000 CR4: 00000000001406e0 [ 1048.643096] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1048.650380] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1048.657660] Call Trace: [ 1048.660263] ? __free_pages_ok+0x79/0x1680 [ 1048.664502] __free_pages_ok+0x288/0x1680 [ 1048.668646] ? kmsan_set_origin_inline+0x6b/0x120 [ 1048.673493] ? __msan_poison_alloca+0x15c/0x1d0 [ 1048.678180] ? free_transhuge_page+0x9b/0x470 [ 1048.682706] free_compound_page+0x8e/0xc0 [ 1048.686862] free_transhuge_page+0x3bc/0x470 [ 1048.691286] ? split_huge_page_to_list+0x3520/0x3520 [ 1048.696407] release_pages+0x6ff/0x1650 [ 1048.700421] free_pages_and_swap_cache+0x55b/0x580 [ 1048.705355] tlb_finish_mmu+0x290/0x5c0 [ 1048.709354] exit_mmap+0x539/0x980 [ 1048.712916] __mmput+0x158/0x600 [ 1048.716307] ? __msan_get_context_state+0x20/0xf0 [ 1048.721195] mmput+0xab/0xf0 [ 1048.724250] exit_mm+0x6ed/0x7a0 [ 1048.727622] do_exit+0xc12/0x3930 [ 1048.731088] do_group_exit+0x1a0/0x360 [ 1048.734993] get_signal+0x1405/0x1ec0 [ 1048.738811] ? __msan_poison_alloca+0x15c/0x1d0 [ 1048.743509] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1048.748536] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1048.753759] do_signal+0xb8/0x1d20 [ 1048.757356] ? kmsan_set_origin_inline+0x6b/0x120 [ 1048.762221] ? __msan_poison_alloca+0x15c/0x1d0 [ 1048.766954] ? syscall_return_slowpath+0xe9/0x710 [ 1048.771820] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 1048.776779] ? syscall_return_slowpath+0xe9/0x710 [ 1048.781652] ? prepare_exit_to_usermode+0xec/0x3a0 [ 1048.786625] prepare_exit_to_usermode+0x271/0x3a0 [ 1048.791514] syscall_return_slowpath+0xe9/0x710 [ 1048.796245] ? __x64_sys_pselect6+0x1a2/0x200 [ 1048.800788] do_syscall_64+0x1ad/0x230 [ 1048.804719] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1048.809928] RIP: 0033:0x45d911 [ 1048.813129] RSP: 002b:000000c420037f18 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 1048.821668] RAX: fffffffffffffdfe RBX: 0000000000000006 RCX: 000000000045d911 [ 1048.828940] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1048.836215] RBP: 000000c420037f28 R08: 000000c420037f18 R09: 0000000000000000 [ 1048.843493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000430130 [ 1048.850772] R13: 00000000000000f1 R14: 0000000000000011 R15: 0000000000000000 [ 1048.858047] Code: 8b 7d d0 83 c0 ff 41 89 85 cc 08 00 00 75 48 e8 a1 6b 4a ff 4c 89 7d c0 ff 75 c0 9d 48 83 c4 20 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b 0f 1f 84 00 00 00 00 00 eb fe 0f 0b 66 90 66 2e 0f 1f 84 [ 1048.877407] RIP: kmsan_free_page+0x2a6/0x2e0 RSP: ffff88018c94f140 [ 1048.883939] ---[ end trace 1b317fd4761a2447 ]--- [ 1048.888764] Kernel panic - not syncing: Fatal exception [ 1048.894718] Dumping ftrace buffer: [ 1048.898272] (ftrace buffer empty) [ 1048.901981] Kernel Offset: disabled [ 1048.905617] Rebooting in 86400 seconds..