df}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) 05:23:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) 05:23:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)) [ 586.411796] audit: type=1326 audit(1529731406.410:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3094 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:26 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)) 05:23:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'sed\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:23:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) prctl$setptracer(0x59616d61, 0x0) 05:23:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)) 05:23:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:26 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) prctl$setptracer(0x59616d61, 0x0) 05:23:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)) 05:23:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) prctl$setptracer(0x59616d61, 0x0) 05:23:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) 05:23:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) 05:23:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:27 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)) 05:23:27 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f00000002c0)={{0x0, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'sed\x00'}, {@multicast2=0xe0000002}}, 0x44) 05:23:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:27 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)) 05:23:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:27 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 587.785686] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 587.796227] syz-executor7 cpuset=syz7 mems_allowed=0 [ 587.801345] CPU: 0 PID: 3169 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 587.808092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.817444] Call Trace: [ 587.820034] dump_stack+0x185/0x1d0 [ 587.823665] warn_alloc+0x430/0x690 [ 587.827300] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:23:27 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) [ 587.832145] ? kernel_poison_pages+0x40/0x360 [ 587.836646] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 587.842117] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 587.847157] kmsan_alloc_page+0x82/0xe0 [ 587.851130] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 587.855891] ? kmsan_set_origin_inline+0x6b/0x120 [ 587.860742] ? __msan_poison_alloca+0x15c/0x1d0 [ 587.865682] ? __should_failslab+0x278/0x2a0 [ 587.870100] ? should_fail+0x57/0xab0 [ 587.873908] ? __should_failslab+0x278/0x2a0 [ 587.878322] ? kmsan_set_origin_inline+0x6b/0x120 [ 587.883164] ? __msan_poison_alloca+0x15c/0x1d0 [ 587.887841] ? kmsan_set_origin+0x9e/0x160 [ 587.892084] alloc_pages_vma+0x1555/0x17f0 [ 587.896327] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 587.901443] handle_mm_fault+0x44ca/0x7ed0 [ 587.905729] ? kmsan_set_origin_inline+0x6b/0x120 [ 587.910604] __do_page_fault+0xec6/0x1a10 [ 587.914763] do_page_fault+0xb7/0x250 [ 587.918579] ? page_fault+0x8/0x30 [ 587.922118] page_fault+0x1e/0x30 [ 587.925565] RIP: 0033:0x4075fa [ 587.928840] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 587.934200] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 587.941471] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 587.948745] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 587.956016] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000008fb29 [ 587.963279] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 587.971329] warn_alloc_show_mem: 1 callbacks suppressed [ 587.971332] Mem-Info: [ 587.979102] active_anon:189953 inactive_anon:74 isolated_anon:0 [ 587.979102] active_file:2236 inactive_file:2132 isolated_file:0 [ 587.979102] unevictable:0 dirty:83 writeback:0 unstable:0 [ 587.979102] slab_reclaimable:3333 slab_unreclaimable:9452 [ 587.979102] mapped:69308 shmem:84 pagetables:1436 bounce:0 [ 587.979102] free:217631 free_pcp:379 free_cma:0 [ 588.012259] Node 0 active_anon:759812kB inactive_anon:296kB active_file:8944kB inactive_file:8528kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:277232kB dirty:332kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 588.040177] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 588.066302] lowmem_reserve[]: 0 2817 7244 7244 [ 588.070879] Node 0 DMA32 free:455860kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:548kB inactive_file:0kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1260kB local_pcp:636kB free_cma:0kB [ 588.099766] lowmem_reserve[]: 0 0 4426 4426 [ 588.104077] Node 0 Normal free:398760kB min:41208kB low:51508kB high:61808kB active_anon:529060kB inactive_anon:296kB active_file:8396kB inactive_file:8528kB unevictable:0kB writepending:264kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3552kB bounce:0kB free_pcp:256kB local_pcp:56kB free_cma:0kB [ 588.133486] lowmem_reserve[]: 0 0 0 0 [ 588.137280] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 588.150485] Node 0 DMA32: 18675*4kB (UME) 14205*8kB (UME) 5770*16kB (UME) 1737*32kB (UM) 615*64kB (UME) 235*128kB (UME) 84*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 455860kB [ 588.167792] Node 0 Normal: 14364*4kB (UM) 6195*8kB (UM) 2966*16kB (UM) 2124*32kB (UM) 1483*64kB (UM) 482*128kB (UM) 51*256kB (UM) 7*512kB (UM) 3*1024kB (M) 0*2048kB 0*4096kB = 398760kB [ 588.184398] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 588.192976] 4452 total pagecache pages [ 588.196845] 0 pages in swap cache [ 588.200277] Swap cache stats: add 0, delete 0, find 0/0 [ 588.205616] Free swap = 0kB [ 588.208612] Total swap = 0kB [ 588.211608] 1965969 pages RAM [ 588.214689] 0 pages HighMem/MovableOnly [ 588.218640] 106316 pages reserved 05:23:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:28 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) [ 588.401840] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 588.412376] syz-executor2 cpuset=syz2 mems_allowed=0 [ 588.417495] CPU: 1 PID: 3191 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 588.424242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.433597] Call Trace: [ 588.436187] dump_stack+0x185/0x1d0 [ 588.439816] warn_alloc+0x430/0x690 [ 588.443455] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 588.448299] ? kernel_poison_pages+0x40/0x360 [ 588.452798] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 588.458250] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 588.463201] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 588.468231] ? kmsan_set_origin_inline+0x6b/0x120 [ 588.473089] kmsan_alloc_page+0x82/0xe0 [ 588.477073] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 588.481833] ? kmsan_set_origin_inline+0x6b/0x120 [ 588.486672] ? __msan_poison_alloca+0x15c/0x1d0 [ 588.491339] ? __should_failslab+0x278/0x2a0 [ 588.495755] ? should_fail+0x57/0xab0 [ 588.499550] ? __should_failslab+0x278/0x2a0 [ 588.503958] ? kmsan_set_origin_inline+0x6b/0x120 [ 588.508802] ? __msan_poison_alloca+0x15c/0x1d0 [ 588.513487] ? kmsan_set_origin+0x9e/0x160 [ 588.517732] alloc_pages_vma+0x1555/0x17f0 [ 588.521973] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 588.527094] handle_mm_fault+0x44ca/0x7ed0 [ 588.531329] ? kmsan_set_origin_inline+0x6b/0x120 [ 588.536186] __do_page_fault+0xec6/0x1a10 [ 588.540335] do_page_fault+0xb7/0x250 [ 588.544131] ? page_fault+0x8/0x30 [ 588.547665] page_fault+0x1e/0x30 [ 588.551112] RIP: 0033:0x4075fa [ 588.554295] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 588.559657] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 588.566920] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 588.574184] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 588.581451] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000008fd91 [ 588.588725] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)) 05:23:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) 05:23:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:28 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000005b40)={0x10}, 0xc, &(0x7f0000005d40)={&(0x7f0000005cc0)=ANY=[]}, 0x1}, 0x0) [ 588.743740] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 588.754276] syz-executor1 cpuset=syz1 mems_allowed=0 [ 588.759405] CPU: 1 PID: 3208 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 588.766156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.775506] Call Trace: [ 588.778091] dump_stack+0x185/0x1d0 [ 588.781703] warn_alloc+0x430/0x690 [ 588.785325] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 588.790153] ? kernel_poison_pages+0x40/0x360 [ 588.794633] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 588.800103] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 588.805030] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 588.810074] ? kmsan_set_origin_inline+0x6b/0x120 [ 588.814899] ? __msan_poison_alloca+0x15c/0x1d0 [ 588.819554] kmsan_alloc_page+0x82/0xe0 [ 588.823514] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 588.828252] ? kmsan_set_origin_inline+0x6b/0x120 [ 588.833080] ? __msan_poison_alloca+0x15c/0x1d0 [ 588.837729] ? __should_failslab+0x278/0x2a0 [ 588.842124] ? should_fail+0x57/0xab0 [ 588.845903] ? __should_failslab+0x278/0x2a0 [ 588.850292] ? kmsan_set_origin_inline+0x6b/0x120 [ 588.855135] ? __msan_poison_alloca+0x15c/0x1d0 [ 588.859799] ? kmsan_set_origin+0x9e/0x160 [ 588.864022] alloc_pages_vma+0x1555/0x17f0 [ 588.868243] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 588.873333] handle_mm_fault+0x44ca/0x7ed0 [ 588.877552] ? kmsan_set_origin_inline+0x6b/0x120 [ 588.882387] __do_page_fault+0xec6/0x1a10 [ 588.886521] do_page_fault+0xb7/0x250 [ 588.890305] ? page_fault+0x8/0x30 [ 588.893826] page_fault+0x1e/0x30 [ 588.897262] RIP: 0033:0x4075fa [ 588.900523] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 588.905877] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 588.913130] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 588.920384] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 588.927635] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000008fee5 [ 588.934887] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 588.950049] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 588.960611] syz-executor4 cpuset=syz4 mems_allowed=0 [ 588.965911] CPU: 0 PID: 3215 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 588.972659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.982014] Call Trace: [ 588.984608] dump_stack+0x185/0x1d0 [ 588.988238] warn_alloc+0x430/0x690 [ 588.991881] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:23:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) [ 588.996726] ? kernel_poison_pages+0x40/0x360 [ 589.001222] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 589.006696] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 589.011643] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 589.016671] ? kmsan_set_origin_inline+0x6b/0x120 [ 589.021508] ? __msan_poison_alloca+0x15c/0x1d0 [ 589.026187] kmsan_alloc_page+0x82/0xe0 [ 589.030163] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 589.034924] ? kmsan_set_origin_inline+0x6b/0x120 [ 589.039764] ? __msan_poison_alloca+0x15c/0x1d0 [ 589.044429] ? __should_failslab+0x278/0x2a0 05:23:29 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 589.048836] ? should_fail+0x57/0xab0 [ 589.052629] ? __should_failslab+0x278/0x2a0 [ 589.057038] ? kmsan_set_origin_inline+0x6b/0x120 [ 589.061877] ? __msan_poison_alloca+0x15c/0x1d0 [ 589.066552] ? kmsan_set_origin+0x9e/0x160 [ 589.070794] alloc_pages_vma+0x1555/0x17f0 [ 589.075020] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 589.080116] handle_mm_fault+0x44ca/0x7ed0 [ 589.084335] ? kmsan_set_origin_inline+0x6b/0x120 [ 589.089170] __do_page_fault+0xec6/0x1a10 [ 589.093307] do_page_fault+0xb7/0x250 [ 589.097094] ? page_fault+0x8/0x30 [ 589.100615] page_fault+0x1e/0x30 [ 589.104048] RIP: 0033:0x4075fa [ 589.107218] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 589.112560] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 589.119815] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 589.127066] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 589.134317] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000008ffb5 [ 589.141571] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 589.148830] warn_alloc_show_mem: 2 callbacks suppressed [ 589.148832] Mem-Info: [ 589.156582] active_anon:189921 inactive_anon:77 isolated_anon:0 [ 589.156582] active_file:2158 inactive_file:1581 isolated_file:12 [ 589.156582] unevictable:0 dirty:92 writeback:0 unstable:0 [ 589.156582] slab_reclaimable:3333 slab_unreclaimable:9447 [ 589.156582] mapped:68616 shmem:84 pagetables:1492 bounce:0 [ 589.156582] free:217931 free_pcp:484 free_cma:0 [ 589.189831] Node 0 active_anon:759684kB inactive_anon:308kB active_file:8632kB inactive_file:6324kB unevictable:0kB isolated(anon):0kB isolated(file):48kB mapped:274464kB dirty:368kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 589.217833] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 589.243940] lowmem_reserve[]: 0 2817 7244 7244 [ 589.248511] Node 0 DMA32 free:455860kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:524kB inactive_file:24kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1260kB local_pcp:636kB free_cma:0kB [ 589.277482] lowmem_reserve[]: 0 0 4426 4426 [ 589.281793] Node 0 Normal free:399960kB min:41208kB low:51508kB high:61808kB active_anon:531060kB inactive_anon:308kB active_file:7992kB inactive_file:6416kB unevictable:0kB writepending:300kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3776kB bounce:0kB free_pcp:676kB local_pcp:108kB free_cma:0kB [ 589.311304] lowmem_reserve[]: 0 0 0 0 [ 589.315096] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 589.328299] Node 0 DMA32: 18675*4kB (UME) 14205*8kB (UME) 5770*16kB (UME) 1737*32kB (UM) 615*64kB (UME) 235*128kB (UME) 84*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 455860kB [ 589.345586] Node 0 Normal: 14595*4kB (UM) 6365*8kB (UM) 2961*16kB (UM) 2124*32kB (UM) 1479*64kB (M) 481*128kB (UM) 49*256kB (M) 6*512kB (M) 3*1024kB (M) 0*2048kB 0*4096kB = 399556kB [ 589.361927] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 589.370484] 3831 total pagecache pages [ 589.374349] 0 pages in swap cache [ 589.377787] Swap cache stats: add 0, delete 0, find 0/0 [ 589.383137] Free swap = 0kB [ 589.386130] Total swap = 0kB [ 589.389124] 1965969 pages RAM [ 589.392204] 0 pages HighMem/MovableOnly [ 589.396154] 106316 pages reserved [ 589.401073] kauditd_printk_skb: 3 callbacks suppressed [ 589.401096] audit: type=1326 audit(1529731409.399:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3205 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) 05:23:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:29 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 589.589094] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 589.601275] syz-executor6 cpuset=syz6 mems_allowed=0 [ 589.606398] CPU: 1 PID: 3235 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 589.613153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.622597] Call Trace: [ 589.625196] dump_stack+0x185/0x1d0 [ 589.628829] warn_alloc+0x430/0x690 [ 589.632474] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 589.637583] ? kernel_poison_pages+0x40/0x360 [ 589.642110] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 589.647572] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 589.652523] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 589.657564] ? kmsan_set_origin_inline+0x6b/0x120 [ 589.662418] ? __msan_poison_alloca+0x15c/0x1d0 [ 589.667108] kmsan_alloc_page+0x82/0xe0 [ 589.671091] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 589.675852] ? kmsan_set_origin_inline+0x6b/0x120 [ 589.680701] ? __msan_poison_alloca+0x15c/0x1d0 [ 589.685378] ? __should_failslab+0x278/0x2a0 [ 589.689799] ? should_fail+0x57/0xab0 [ 589.693613] ? __should_failslab+0x278/0x2a0 [ 589.698031] ? kmsan_set_origin_inline+0x6b/0x120 [ 589.702884] ? __msan_poison_alloca+0x15c/0x1d0 [ 589.707564] ? kmsan_set_origin+0x9e/0x160 [ 589.711841] alloc_pages_vma+0x1555/0x17f0 [ 589.716105] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 589.721254] handle_mm_fault+0x44ca/0x7ed0 [ 589.725500] ? kmsan_set_origin_inline+0x6b/0x120 [ 589.730381] __do_page_fault+0xec6/0x1a10 [ 589.734548] do_page_fault+0xb7/0x250 [ 589.738377] ? page_fault+0x8/0x30 [ 589.741921] page_fault+0x1e/0x30 [ 589.745372] RIP: 0033:0x4075fa [ 589.748556] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 589.753920] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 589.761193] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 589.768476] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 589.775740] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009022c 05:23:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)) 05:23:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) [ 589.783787] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:29 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) [ 589.903099] audit: type=1326 audit(1529731409.901:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3242 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:30 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500e9}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) 05:23:30 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:30 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000100)) [ 590.686844] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 590.697397] syz-executor1 cpuset=syz1 mems_allowed=0 [ 590.702514] CPU: 0 PID: 3303 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 590.709254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.718601] Call Trace: [ 590.721183] dump_stack+0x185/0x1d0 [ 590.725652] warn_alloc+0x430/0x690 [ 590.729283] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 590.734109] ? kernel_poison_pages+0x40/0x360 [ 590.738597] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 590.744037] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 590.748967] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 590.753903] kmsan_alloc_page+0x82/0xe0 [ 590.757878] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 590.762621] ? kmsan_set_origin_inline+0x6b/0x120 [ 590.767461] ? __msan_poison_alloca+0x15c/0x1d0 [ 590.772116] ? __should_failslab+0x278/0x2a0 [ 590.776515] ? should_fail+0x57/0xab0 [ 590.780300] ? __should_failslab+0x278/0x2a0 [ 590.784697] ? kmsan_set_origin_inline+0x6b/0x120 [ 590.789537] ? __msan_poison_alloca+0x15c/0x1d0 [ 590.794197] ? kmsan_set_origin+0x9e/0x160 [ 590.798447] alloc_pages_vma+0x1555/0x17f0 [ 590.802682] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 590.807778] handle_mm_fault+0x44ca/0x7ed0 [ 590.812014] ? kmsan_set_origin_inline+0x6b/0x120 [ 590.816854] __do_page_fault+0xec6/0x1a10 [ 590.821004] do_page_fault+0xb7/0x250 [ 590.824791] ? page_fault+0x8/0x30 [ 590.828315] page_fault+0x1e/0x30 [ 590.831750] RIP: 0033:0x4075fa [ 590.834923] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 590.840270] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 590.847539] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 590.854791] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 590.862046] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009067e [ 590.869315] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 590.876601] warn_alloc_show_mem: 1 callbacks suppressed [ 590.876603] Mem-Info: [ 590.884352] active_anon:188847 inactive_anon:78 isolated_anon:0 [ 590.884352] active_file:1459 inactive_file:1307 isolated_file:0 [ 590.884352] unevictable:0 dirty:101 writeback:0 unstable:0 [ 590.884352] slab_reclaimable:3333 slab_unreclaimable:9450 [ 590.884352] mapped:67687 shmem:84 pagetables:1428 bounce:0 [ 590.884352] free:218971 free_pcp:418 free_cma:0 [ 590.917598] Node 0 active_anon:755388kB inactive_anon:312kB active_file:5836kB inactive_file:5228kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270748kB dirty:404kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 590.945524] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 590.971655] lowmem_reserve[]: 0 2817 7244 7244 [ 590.976232] Node 0 DMA32 free:455860kB min:26224kB low:32780kB high:39336kB active_anon:224588kB inactive_anon:0kB active_file:548kB inactive_file:0kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1260kB local_pcp:636kB free_cma:0kB [ 591.005122] lowmem_reserve[]: 0 0 4426 4426 [ 591.009435] Node 0 Normal free:404120kB min:41208kB low:51508kB high:61808kB active_anon:530800kB inactive_anon:312kB active_file:5288kB inactive_file:5228kB unevictable:0kB writepending:336kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3520kB bounce:0kB free_pcp:412kB local_pcp:96kB free_cma:0kB [ 591.038842] lowmem_reserve[]: 0 0 0 0 [ 591.042634] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 591.055835] Node 0 DMA32: 18675*4kB (UME) 14205*8kB (UME) 5770*16kB (UME) 1737*32kB (UM) 615*64kB (UME) 235*128kB (UME) 84*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 455860kB [ 591.073128] Node 0 Normal: 14674*4kB (UM) 6706*8kB (UM) 3098*16kB (UM) 2145*32kB (UM) 1477*64kB (UM) 472*128kB (UM) 47*256kB (UM) 7*512kB (M) 3*1024kB (UM) 0*2048kB 0*4096kB = 404184kB [ 591.089732] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 591.098300] 2850 total pagecache pages [ 591.102165] 0 pages in swap cache [ 591.105596] Swap cache stats: add 0, delete 0, find 0/0 [ 591.110940] Free swap = 0kB [ 591.113936] Total swap = 0kB [ 591.116933] 1965969 pages RAM [ 591.120019] 0 pages HighMem/MovableOnly [ 591.123995] 106316 pages reserved 05:23:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 591.187967] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 591.198494] syz-executor2 cpuset=syz2 mems_allowed=0 [ 591.203621] CPU: 0 PID: 3312 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 591.210360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.219705] Call Trace: [ 591.222282] dump_stack+0x185/0x1d0 [ 591.225987] warn_alloc+0x430/0x690 [ 591.229614] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 591.234446] ? kernel_poison_pages+0x40/0x360 [ 591.238930] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 591.244370] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 591.250164] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 591.255086] ? kmsan_set_origin_inline+0x6b/0x120 [ 591.259914] ? __msan_poison_alloca+0x15c/0x1d0 [ 591.264574] kmsan_alloc_page+0x82/0xe0 [ 591.268533] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 591.273274] ? kmsan_set_origin_inline+0x6b/0x120 [ 591.278102] ? __msan_poison_alloca+0x15c/0x1d0 [ 591.282755] ? __should_failslab+0x278/0x2a0 [ 591.287163] ? should_fail+0x57/0xab0 [ 591.290950] ? __should_failslab+0x278/0x2a0 [ 591.295607] ? kmsan_set_origin_inline+0x6b/0x120 [ 591.300449] ? __msan_poison_alloca+0x15c/0x1d0 [ 591.305193] ? kmsan_set_origin+0x9e/0x160 [ 591.309420] alloc_pages_vma+0x1555/0x17f0 [ 591.313656] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 591.318768] handle_mm_fault+0x44ca/0x7ed0 [ 591.322996] ? kmsan_set_origin_inline+0x6b/0x120 [ 591.327837] __do_page_fault+0xec6/0x1a10 [ 591.331984] do_page_fault+0xb7/0x250 [ 591.335777] ? page_fault+0x8/0x30 [ 591.339301] page_fault+0x1e/0x30 [ 591.342738] RIP: 0033:0x4075fa [ 591.345909] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 591.351256] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 591.358511] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 591.365762] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 591.373014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000090873 [ 591.380281] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) [ 591.390330] audit: type=1326 audit(1529731411.388:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3310 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) 05:23:31 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) [ 591.440277] audit: type=1326 audit(1529731411.416:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3299 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 591.597329] audit: type=1326 audit(1529731411.595:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3325 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) 05:23:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:31 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) [ 591.736364] audit: type=1326 audit(1529731411.733:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3336 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 591.814627] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 591.825165] syz-executor4 cpuset=syz4 mems_allowed=0 [ 591.830292] CPU: 1 PID: 3342 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 591.837042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.846393] Call Trace: [ 591.848974] dump_stack+0x185/0x1d0 [ 591.852590] warn_alloc+0x430/0x690 [ 591.856212] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 591.861039] ? kernel_poison_pages+0x40/0x360 [ 591.865528] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 591.870968] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 591.875910] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 591.880838] kmsan_alloc_page+0x82/0xe0 [ 591.884809] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 591.889549] ? kmsan_set_origin_inline+0x6b/0x120 [ 591.894376] ? __msan_poison_alloca+0x15c/0x1d0 [ 591.899029] ? __should_failslab+0x278/0x2a0 [ 591.903436] ? should_fail+0x57/0xab0 [ 591.907229] ? __should_failslab+0x278/0x2a0 [ 591.911885] ? kmsan_set_origin_inline+0x6b/0x120 [ 591.916719] ? __msan_poison_alloca+0x15c/0x1d0 [ 591.921388] ? kmsan_set_origin+0x9e/0x160 [ 591.925616] alloc_pages_vma+0x1555/0x17f0 [ 591.930014] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 591.935193] handle_mm_fault+0x44ca/0x7ed0 [ 591.939423] ? kmsan_set_origin_inline+0x6b/0x120 [ 591.944260] __do_page_fault+0xec6/0x1a10 [ 591.948396] do_page_fault+0xb7/0x250 [ 591.952183] ? page_fault+0x8/0x30 [ 591.955723] page_fault+0x1e/0x30 [ 591.959161] RIP: 0033:0x4075fa [ 591.962334] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 591.967678] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 591.974929] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 591.982180] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 591.989431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000090ae6 [ 591.996684] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500e9}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:32 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) [ 592.147218] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 592.157758] syz-executor2 cpuset=syz2 mems_allowed=0 [ 592.162886] CPU: 0 PID: 3350 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 592.169634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.178979] Call Trace: [ 592.181571] dump_stack+0x185/0x1d0 [ 592.185188] warn_alloc+0x430/0x690 [ 592.188810] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 592.193638] ? kernel_poison_pages+0x40/0x360 [ 592.198119] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 592.203553] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 592.208493] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 592.213426] kmsan_alloc_page+0x82/0xe0 [ 592.217384] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 592.222128] ? kmsan_set_origin_inline+0x6b/0x120 [ 592.226956] ? __msan_poison_alloca+0x15c/0x1d0 [ 592.231622] ? __should_failslab+0x278/0x2a0 [ 592.236022] ? should_fail+0x57/0xab0 [ 592.239891] ? __should_failslab+0x278/0x2a0 [ 592.244286] ? kmsan_set_origin_inline+0x6b/0x120 [ 592.249111] ? __msan_poison_alloca+0x15c/0x1d0 [ 592.253764] ? kmsan_set_origin+0x9e/0x160 [ 592.257995] alloc_pages_vma+0x1555/0x17f0 [ 592.262220] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 592.267310] handle_mm_fault+0x44ca/0x7ed0 [ 592.271529] ? kmsan_set_origin_inline+0x6b/0x120 [ 592.276362] __do_page_fault+0xec6/0x1a10 [ 592.280500] do_page_fault+0xb7/0x250 [ 592.284283] ? page_fault+0x8/0x30 [ 592.287806] page_fault+0x1e/0x30 [ 592.291241] RIP: 0033:0x4075fa [ 592.294410] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 592.299756] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 592.307009] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 592.314270] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 592.321524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000090c32 [ 592.328794] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 592.336051] warn_alloc_show_mem: 2 callbacks suppressed [ 592.336054] Mem-Info: [ 592.343799] active_anon:189909 inactive_anon:78 isolated_anon:0 [ 592.343799] active_file:1442 inactive_file:1332 isolated_file:0 [ 592.343799] unevictable:0 dirty:3 writeback:0 unstable:0 [ 592.343799] slab_reclaimable:3333 slab_unreclaimable:9449 [ 592.343799] mapped:67705 shmem:84 pagetables:1441 bounce:0 [ 592.343799] free:218299 free_pcp:503 free_cma:0 [ 592.376870] Node 0 active_anon:759636kB inactive_anon:312kB active_file:5768kB inactive_file:5328kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270820kB dirty:12kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 592.404709] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 592.430840] lowmem_reserve[]: 0 2817 7244 7244 [ 592.435413] Node 0 DMA32 free:455860kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:548kB inactive_file:0kB unevictable:0kB writepending:12kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1260kB local_pcp:636kB free_cma:0kB [ 592.464300] lowmem_reserve[]: 0 0 4426 4426 [ 592.468613] Node 0 Normal free:401432kB min:41208kB low:51508kB high:61808kB active_anon:531068kB inactive_anon:312kB active_file:5220kB inactive_file:5328kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:3572kB bounce:0kB free_pcp:752kB local_pcp:132kB free_cma:0kB [ 592.498376] lowmem_reserve[]: 0 0 0 0 [ 592.502164] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 592.515363] Node 0 DMA32: 18675*4kB (UME) 14205*8kB (UME) 5770*16kB (UME) 1737*32kB (UM) 615*64kB (UME) 235*128kB (UME) 84*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 455860kB [ 592.532653] Node 0 Normal: 14711*4kB (UM) 6535*8kB (UM) 3013*16kB (UM) 2146*32kB (UM) 1481*64kB (UM) 472*128kB (UM) 47*256kB (UM) 7*512kB (M) 3*1024kB (UM) 0*2048kB 0*4096kB = 401892kB [ 592.549252] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 592.557891] 2858 total pagecache pages [ 592.561754] 0 pages in swap cache [ 592.565183] Swap cache stats: add 0, delete 0, find 0/0 [ 592.570520] Free swap = 0kB [ 592.573522] Total swap = 0kB [ 592.576517] 1965969 pages RAM [ 592.579598] 0 pages HighMem/MovableOnly [ 592.583546] 106316 pages reserved [ 592.609393] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 592.619924] syz-executor4 cpuset=syz4 mems_allowed=0 [ 592.625052] CPU: 0 PID: 3353 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 592.631809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.641165] Call Trace: [ 592.643761] dump_stack+0x185/0x1d0 [ 592.647401] warn_alloc+0x430/0x690 [ 592.651046] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:23:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) 05:23:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) [ 592.655979] ? kernel_poison_pages+0x40/0x360 [ 592.660485] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 592.665964] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 592.670913] ? kmsan_set_origin_inline+0x6b/0x120 [ 592.675765] ? __msan_poison_alloca+0x15c/0x1d0 [ 592.680452] kmsan_alloc_page+0x82/0xe0 [ 592.684435] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 592.689196] ? kmsan_set_origin_inline+0x6b/0x120 [ 592.694044] ? __msan_poison_alloca+0x15c/0x1d0 [ 592.698718] ? __should_failslab+0x278/0x2a0 [ 592.703157] ? should_fail+0x57/0xab0 [ 592.706960] ? __should_failslab+0x278/0x2a0 [ 592.711386] ? kmsan_set_origin_inline+0x6b/0x120 [ 592.716232] ? __msan_poison_alloca+0x15c/0x1d0 [ 592.720905] ? kmsan_set_origin+0x9e/0x160 [ 592.725997] alloc_pages_vma+0x1555/0x17f0 [ 592.730245] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 592.735362] handle_mm_fault+0x44ca/0x7ed0 [ 592.739609] ? kmsan_set_origin_inline+0x6b/0x120 [ 592.744487] __do_page_fault+0xec6/0x1a10 [ 592.748650] do_page_fault+0xb7/0x250 [ 592.752457] ? page_fault+0x8/0x30 [ 592.756001] page_fault+0x1e/0x30 05:23:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)=0x4) [ 592.759448] RIP: 0033:0x4075fa [ 592.762633] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 592.767996] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 592.775400] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 592.782672] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 592.789944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000090e01 [ 592.797216] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) [ 592.891677] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 592.902208] syz-executor1 cpuset=syz1 mems_allowed=0 [ 592.907333] CPU: 0 PID: 3370 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 592.914085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.923463] Call Trace: [ 592.926063] dump_stack+0x185/0x1d0 [ 592.929698] warn_alloc+0x430/0x690 [ 592.933344] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 592.938189] ? kernel_poison_pages+0x40/0x360 [ 592.942691] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 592.948144] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 592.953096] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 592.958040] ? kmsan_set_origin_inline+0x6b/0x120 [ 592.962889] ? __msan_poison_alloca+0x15c/0x1d0 [ 592.967584] kmsan_alloc_page+0x82/0xe0 [ 592.971573] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 592.976332] ? kmsan_set_origin_inline+0x6b/0x120 [ 592.981175] ? __msan_poison_alloca+0x15c/0x1d0 [ 592.985842] ? __should_failslab+0x278/0x2a0 [ 592.990257] ? should_fail+0x57/0xab0 [ 592.994056] ? __should_failslab+0x278/0x2a0 [ 592.998468] ? kmsan_set_origin_inline+0x6b/0x120 [ 593.003315] ? __msan_poison_alloca+0x15c/0x1d0 [ 593.007992] ? kmsan_set_origin+0x9e/0x160 [ 593.012245] alloc_pages_vma+0x1555/0x17f0 [ 593.016494] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 593.021611] handle_mm_fault+0x44ca/0x7ed0 [ 593.025858] ? kmsan_set_origin_inline+0x6b/0x120 [ 593.030716] __do_page_fault+0xec6/0x1a10 [ 593.034875] do_page_fault+0xb7/0x250 [ 593.038680] ? page_fault+0x8/0x30 [ 593.042225] page_fault+0x1e/0x30 [ 593.045676] RIP: 0033:0x4075fa [ 593.048860] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 593.054217] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 593.061485] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 593.068755] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 593.076025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000090f1b [ 593.083292] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500e9}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 593.193458] audit: type=1326 audit(1529731413.192:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3361 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 593.261302] audit: type=1326 audit(1529731413.214:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3366 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:33 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500e9}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 593.397842] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 593.408411] syz-executor4 cpuset=syz4 mems_allowed=0 [ 593.413542] CPU: 0 PID: 3388 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 593.420302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.429935] Call Trace: [ 593.432519] dump_stack+0x185/0x1d0 [ 593.436134] warn_alloc+0x430/0x690 [ 593.439755] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 593.444585] ? kernel_poison_pages+0x40/0x360 [ 593.449068] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 593.454501] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 593.459430] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 593.464350] ? kmsan_set_origin_inline+0x6b/0x120 [ 593.469176] ? __msan_poison_alloca+0x15c/0x1d0 [ 593.473833] kmsan_alloc_page+0x82/0xe0 [ 593.477816] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 593.482561] ? kmsan_set_origin_inline+0x6b/0x120 [ 593.487388] ? __msan_poison_alloca+0x15c/0x1d0 [ 593.492038] ? __should_failslab+0x278/0x2a0 [ 593.496434] ? should_fail+0x57/0xab0 [ 593.500217] ? __should_failslab+0x278/0x2a0 [ 593.504621] ? kmsan_set_origin_inline+0x6b/0x120 [ 593.509450] ? __msan_poison_alloca+0x15c/0x1d0 [ 593.514103] ? kmsan_set_origin+0x9e/0x160 [ 593.518332] alloc_pages_vma+0x1555/0x17f0 [ 593.522553] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 593.527649] handle_mm_fault+0x44ca/0x7ed0 [ 593.531864] ? kmsan_set_origin_inline+0x6b/0x120 [ 593.536700] __do_page_fault+0xec6/0x1a10 [ 593.540837] do_page_fault+0xb7/0x250 [ 593.544619] ? page_fault+0x8/0x30 [ 593.548144] page_fault+0x1e/0x30 [ 593.551664] RIP: 0033:0x4075fa [ 593.554834] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 593.560183] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 593.567434] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 593.574683] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 593.581934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000091115 [ 593.589188] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 593.596448] warn_alloc_show_mem: 2 callbacks suppressed [ 593.596451] Mem-Info: [ 593.604208] active_anon:190484 inactive_anon:73 isolated_anon:0 [ 593.604208] active_file:1304 inactive_file:1252 isolated_file:0 [ 593.604208] unevictable:0 dirty:23 writeback:0 unstable:0 [ 593.604208] slab_reclaimable:3333 slab_unreclaimable:9452 [ 593.604208] mapped:67574 shmem:84 pagetables:1510 bounce:0 [ 593.604208] free:217649 free_pcp:380 free_cma:0 [ 593.637371] Node 0 active_anon:761936kB inactive_anon:292kB active_file:5216kB inactive_file:5008kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270296kB dirty:92kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 593.665198] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 593.691310] lowmem_reserve[]: 0 2817 7244 7244 [ 593.695883] Node 0 DMA32 free:455860kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:548kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1260kB local_pcp:636kB free_cma:0kB [ 593.724771] lowmem_reserve[]: 0 0 4426 4426 [ 593.729083] Node 0 Normal free:398832kB min:41208kB low:51508kB high:61808kB active_anon:531104kB inactive_anon:292kB active_file:5016kB inactive_file:5356kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8384kB pagetables:3848kB bounce:0kB free_pcp:260kB local_pcp:188kB free_cma:0kB [ 593.758487] lowmem_reserve[]: 0 0 0 0 [ 593.762273] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 593.775488] Node 0 DMA32: 18675*4kB (UME) 14205*8kB (UME) 5770*16kB (UME) 1737*32kB (UM) 615*64kB (UME) 235*128kB (UME) 84*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 455860kB [ 593.792788] Node 0 Normal: 14669*4kB (UM) 6581*8kB (M) 2926*16kB (M) 2110*32kB (UM) 1469*64kB (UM) 468*128kB (UM) 47*256kB (UM) 7*512kB (M) 3*1024kB (UM) 0*2048kB 0*4096kB = 398268kB [ 593.809215] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 593.817770] 2611 total pagecache pages [ 593.821636] 0 pages in swap cache [ 593.825066] Swap cache stats: add 0, delete 0, find 0/0 [ 593.830406] Free swap = 0kB [ 593.833401] Total swap = 0kB [ 593.836397] 1965969 pages RAM [ 593.839479] 0 pages HighMem/MovableOnly [ 593.843430] 106316 pages reserved [ 593.885380] audit: type=1326 audit(1529731413.884:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3394 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) prctl$setptracer(0x59616d61, 0x0) 05:23:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) [ 594.026291] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 594.036825] syz-executor5 cpuset=syz5 mems_allowed=0 [ 594.042084] CPU: 1 PID: 3405 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 594.048956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.058306] Call Trace: [ 594.060889] dump_stack+0x185/0x1d0 [ 594.064505] warn_alloc+0x430/0x690 [ 594.068122] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 594.072971] ? kernel_poison_pages+0x40/0x360 [ 594.077462] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 594.082906] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 594.087835] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 594.092757] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.097584] ? __msan_poison_alloca+0x15c/0x1d0 [ 594.102946] kmsan_alloc_page+0x82/0xe0 [ 594.106921] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 594.111672] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.116497] ? __msan_poison_alloca+0x15c/0x1d0 [ 594.121159] ? __should_failslab+0x278/0x2a0 [ 594.125568] ? should_fail+0x57/0xab0 [ 594.129354] ? __should_failslab+0x278/0x2a0 [ 594.133760] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.138591] ? __msan_poison_alloca+0x15c/0x1d0 [ 594.143249] ? kmsan_set_origin+0x9e/0x160 [ 594.147481] alloc_pages_vma+0x1555/0x17f0 [ 594.151705] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 594.156803] handle_mm_fault+0x44ca/0x7ed0 [ 594.161027] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.165868] __do_page_fault+0xec6/0x1a10 [ 594.170014] do_page_fault+0xb7/0x250 05:23:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 594.173799] ? page_fault+0x8/0x30 [ 594.177326] page_fault+0x1e/0x30 [ 594.180762] RIP: 0033:0x4075fa [ 594.183933] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 594.189288] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 594.196544] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 594.203800] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 594.211073] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009138a [ 594.218331] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 594.290102] audit: type=1326 audit(1529731414.288:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3409 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 594.343485] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 594.354025] syz-executor7 cpuset=syz7 mems_allowed=0 [ 594.359156] CPU: 0 PID: 3413 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 594.365936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.375293] Call Trace: [ 594.377894] dump_stack+0x185/0x1d0 [ 594.381534] warn_alloc+0x430/0x690 [ 594.385184] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 594.390035] ? kernel_poison_pages+0x40/0x360 [ 594.394544] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 594.400046] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 594.405081] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.409943] ? __msan_poison_alloca+0x15c/0x1d0 [ 594.414630] kmsan_alloc_page+0x82/0xe0 [ 594.418617] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 594.423381] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.428227] ? __msan_poison_alloca+0x15c/0x1d0 [ 594.432897] ? __should_failslab+0x278/0x2a0 [ 594.437316] ? should_fail+0x57/0xab0 05:23:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) [ 594.441121] ? __should_failslab+0x278/0x2a0 [ 594.445539] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.450430] ? __msan_poison_alloca+0x15c/0x1d0 [ 594.455114] ? kmsan_set_origin+0x9e/0x160 [ 594.459364] alloc_pages_vma+0x1555/0x17f0 [ 594.463609] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 594.468719] ? apic_timer_interrupt+0xa/0x20 [ 594.473136] handle_mm_fault+0x44ca/0x7ed0 [ 594.477373] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.482249] __do_page_fault+0xec6/0x1a10 [ 594.486418] do_page_fault+0xb7/0x250 [ 594.490217] ? page_fault+0x8/0x30 [ 594.493774] page_fault+0x1e/0x30 [ 594.497224] RIP: 0033:0x4075fa [ 594.500417] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 594.505776] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 594.513046] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 594.520404] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 594.527679] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000914c6 [ 594.534966] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:34 executing program 4: add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:34 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) [ 594.743762] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 594.754404] syz-executor3 cpuset=syz3 mems_allowed=0 [ 594.759516] CPU: 1 PID: 3430 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 594.766254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.775599] Call Trace: [ 594.778184] dump_stack+0x185/0x1d0 [ 594.781800] warn_alloc+0x430/0x690 [ 594.785594] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 594.790423] ? kernel_poison_pages+0x40/0x360 [ 594.794907] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 594.800373] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 594.805394] kmsan_alloc_page+0x82/0xe0 [ 594.809353] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 594.814104] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.818932] ? __msan_poison_alloca+0x15c/0x1d0 [ 594.823592] ? __should_failslab+0x278/0x2a0 [ 594.827995] ? should_fail+0x57/0xab0 [ 594.831797] ? __should_failslab+0x278/0x2a0 [ 594.836369] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.841287] ? __msan_poison_alloca+0x15c/0x1d0 [ 594.845949] ? kmsan_set_origin+0x9e/0x160 [ 594.850265] alloc_pages_vma+0x1555/0x17f0 [ 594.854489] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 594.859585] handle_mm_fault+0x44ca/0x7ed0 [ 594.863814] ? kmsan_set_origin_inline+0x6b/0x120 [ 594.868660] __do_page_fault+0xec6/0x1a10 [ 594.872799] do_page_fault+0xb7/0x250 [ 594.876846] ? page_fault+0x8/0x30 [ 594.880371] page_fault+0x1e/0x30 [ 594.883809] RIP: 0033:0x4075d5 [ 594.886986] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 594.892338] RAX: 0000000020005e80 RBX: 0000000000000000 RCX: 0000000000000000 [ 594.899609] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 594.906861] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730088 [ 594.914130] R10: 0000000000a3e940 R11: 0000000000000246 R12: 000000000009164e [ 594.921396] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 [ 594.928655] warn_alloc_show_mem: 2 callbacks suppressed [ 594.928657] Mem-Info: [ 594.936415] active_anon:190496 inactive_anon:76 isolated_anon:0 [ 594.936415] active_file:1251 inactive_file:1084 isolated_file:0 [ 594.936415] unevictable:0 dirty:41 writeback:0 unstable:0 [ 594.936415] slab_reclaimable:3330 slab_unreclaimable:9450 [ 594.936415] mapped:67418 shmem:84 pagetables:1449 bounce:0 [ 594.936415] free:217565 free_pcp:413 free_cma:0 [ 594.969583] Node 0 active_anon:761984kB inactive_anon:304kB active_file:5004kB inactive_file:4336kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269672kB dirty:164kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 311296kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 594.997605] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 595.024157] lowmem_reserve[]: 0 2817 7244 7244 [ 595.028996] Node 0 DMA32 free:455860kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:548kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1260kB local_pcp:624kB free_cma:0kB [ 595.057900] lowmem_reserve[]: 0 0 4426 4426 [ 595.062212] Node 0 Normal free:398496kB min:41208kB low:51508kB high:61808kB active_anon:531316kB inactive_anon:304kB active_file:4456kB inactive_file:4336kB unevictable:0kB writepending:100kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8384kB pagetables:3604kB bounce:0kB free_pcp:392kB local_pcp:168kB free_cma:0kB [ 595.091806] lowmem_reserve[]: 0 0 0 0 [ 595.095599] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 595.108802] Node 0 DMA32: 18675*4kB (UME) 14205*8kB (UME) 5770*16kB (UME) 1737*32kB (UM) 615*64kB (UME) 235*128kB (UME) 84*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 455860kB [ 595.126091] Node 0 Normal: 14588*4kB (M) 6666*8kB (UM) 2998*16kB (UM) 2116*32kB (UM) 1467*64kB (UM) 461*128kB (UM) 45*256kB (M) 7*512kB (M) 3*1024kB (UM) 0*2048kB 0*4096kB = 398432kB 05:23:35 executing program 4: add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) [ 595.142520] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 595.151083] 2419 total pagecache pages [ 595.154947] 0 pages in swap cache [ 595.158405] Swap cache stats: add 0, delete 0, find 0/0 [ 595.163745] Free swap = 0kB [ 595.166740] Total swap = 0kB [ 595.169749] 1965969 pages RAM [ 595.172841] 0 pages HighMem/MovableOnly [ 595.176792] 106316 pages reserved 05:23:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) 05:23:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:35 executing program 4: add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) [ 595.379983] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 595.390516] syz-executor2 cpuset=syz2 mems_allowed=0 [ 595.395639] CPU: 0 PID: 3452 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 595.402391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.411749] Call Trace: [ 595.414345] dump_stack+0x185/0x1d0 [ 595.417981] warn_alloc+0x430/0x690 [ 595.421666] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:23:35 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) [ 595.426517] ? kernel_poison_pages+0x40/0x360 [ 595.431023] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 595.436481] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 595.441440] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 595.446470] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.451317] ? __msan_poison_alloca+0x15c/0x1d0 [ 595.456002] kmsan_alloc_page+0x82/0xe0 [ 595.459988] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 595.464749] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.469602] ? __msan_poison_alloca+0x15c/0x1d0 [ 595.474281] ? __should_failslab+0x278/0x2a0 [ 595.478692] ? should_fail+0x57/0xab0 [ 595.482490] ? __should_failslab+0x278/0x2a0 [ 595.486902] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.491756] ? __msan_poison_alloca+0x15c/0x1d0 [ 595.496439] ? kmsan_set_origin+0x9e/0x160 [ 595.500690] alloc_pages_vma+0x1555/0x17f0 [ 595.504952] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 595.510070] handle_mm_fault+0x44ca/0x7ed0 [ 595.514312] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.519177] __do_page_fault+0xec6/0x1a10 [ 595.523340] do_page_fault+0xb7/0x250 [ 595.527147] ? page_fault+0x8/0x30 05:23:35 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) [ 595.530690] page_fault+0x1e/0x30 [ 595.534139] RIP: 0033:0x4075fa [ 595.537322] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 595.542860] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 595.550166] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 595.554318] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 595.557437] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 595.557442] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000918d3 [ 595.557446] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 595.559828] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 595.568385] syz-executor3 cpuset= [ 595.575646] syz-executor4 cpuset= [ 595.582894] syz3 mems_allowed=0 [ 595.607461] syz4 mems_allowed=0 [ 595.610727] CPU: 1 PID: 3457 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 595.620712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.630134] Call Trace: [ 595.632709] dump_stack+0x185/0x1d0 [ 595.636324] warn_alloc+0x430/0x690 [ 595.639947] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 595.644777] ? kernel_poison_pages+0x40/0x360 [ 595.649262] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 595.654728] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 595.659654] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.664484] ? __msan_poison_alloca+0x15c/0x1d0 [ 595.669145] kmsan_alloc_page+0x82/0xe0 [ 595.673115] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 595.677872] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.682703] ? __msan_poison_alloca+0x15c/0x1d0 [ 595.687364] ? __should_failslab+0x278/0x2a0 [ 595.691759] ? should_fail+0x57/0xab0 [ 595.695554] ? __should_failslab+0x278/0x2a0 [ 595.700039] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.704868] ? __msan_poison_alloca+0x15c/0x1d0 [ 595.709521] ? kmsan_set_origin+0x9e/0x160 [ 595.713750] alloc_pages_vma+0x1555/0x17f0 [ 595.717978] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 595.723084] handle_mm_fault+0x44ca/0x7ed0 [ 595.727306] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.732141] __do_page_fault+0xec6/0x1a10 [ 595.736282] do_page_fault+0xb7/0x250 [ 595.740074] ? page_fault+0x8/0x30 [ 595.743598] page_fault+0x1e/0x30 [ 595.747035] RIP: 0033:0x4075d5 [ 595.750210] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 595.755557] RAX: 0000000020005e80 RBX: 0000000000000000 RCX: 0000000000000000 [ 595.762814] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 595.770072] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730088 [ 595.777326] R10: 0000000000a3e940 R11: 0000000000000246 R12: 0000000000091980 [ 595.784580] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 [ 595.791845] CPU: 0 PID: 3454 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 595.798602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.807962] Call Trace: [ 595.810549] dump_stack+0x185/0x1d0 [ 595.814173] warn_alloc+0x430/0x690 [ 595.817794] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 595.822621] ? kernel_poison_pages+0x40/0x360 [ 595.827103] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 595.832536] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 595.837463] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 595.842471] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.847299] ? __msan_poison_alloca+0x15c/0x1d0 [ 595.851959] kmsan_alloc_page+0x82/0xe0 [ 595.855923] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 595.860666] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.865496] ? __msan_poison_alloca+0x15c/0x1d0 [ 595.870160] ? __should_failslab+0x278/0x2a0 [ 595.874556] ? should_fail+0x57/0xab0 [ 595.878344] ? __should_failslab+0x278/0x2a0 [ 595.882735] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.887562] ? __msan_poison_alloca+0x15c/0x1d0 [ 595.892220] ? kmsan_set_origin+0x9e/0x160 [ 595.896457] alloc_pages_vma+0x1555/0x17f0 [ 595.900681] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 595.905776] handle_mm_fault+0x44ca/0x7ed0 [ 595.909998] ? kmsan_set_origin_inline+0x6b/0x120 [ 595.914834] __do_page_fault+0xec6/0x1a10 [ 595.918975] do_page_fault+0xb7/0x250 [ 595.922768] ? page_fault+0x8/0x30 [ 595.926296] page_fault+0x1e/0x30 [ 595.929732] RIP: 0033:0x43ce91 [ 595.932906] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 595.938254] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000075 [ 595.945508] RDX: 0000000000000005 RSI: 0000000000730020 RDI: 0000000020000180 [ 595.952760] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000dd0940 [ 595.960015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000091987 [ 595.967281] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 595.982638] kauditd_printk_skb: 1 callbacks suppressed [ 595.982659] audit: type=1326 audit(1529731415.980:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3442 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 596.008046] audit: type=1326 audit(1529731415.981:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3443 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) [ 596.124326] audit: type=1326 audit(1529731416.123:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3452 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:36 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) 05:23:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) 05:23:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 05:23:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) [ 596.442891] audit: type=1326 audit(1529731416.441:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3488 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:36 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) [ 596.572772] audit: type=1326 audit(1529731416.474:1198): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3490 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 596.592594] audit: type=1326 audit(1529731416.508:1199): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3492 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:36 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:37 executing program 7: socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) 05:23:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000240)) 05:23:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:37 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in=@local, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000005c80)=0xe8) [ 597.446620] audit: type=1326 audit(1529731417.445:1200): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3544 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 597.496092] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 597.506825] syz-executor7 cpuset=syz7 mems_allowed=0 [ 597.511951] CPU: 1 PID: 3541 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 597.518700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.528055] Call Trace: [ 597.530664] dump_stack+0x185/0x1d0 [ 597.534295] warn_alloc+0x430/0x690 [ 597.537939] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 597.542790] ? kernel_poison_pages+0x40/0x360 [ 597.547294] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 597.552774] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 597.558579] kmsan_alloc_page+0x82/0xe0 [ 597.563013] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 597.567774] ? kmsan_set_origin_inline+0x6b/0x120 [ 597.572617] ? __msan_poison_alloca+0x15c/0x1d0 [ 597.577287] ? __should_failslab+0x278/0x2a0 [ 597.581722] ? should_fail+0x57/0xab0 [ 597.585525] ? __should_failslab+0x278/0x2a0 [ 597.589932] ? kmsan_set_origin_inline+0x6b/0x120 05:23:37 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) [ 597.594773] ? __msan_poison_alloca+0x15c/0x1d0 [ 597.599467] ? kmsan_set_origin+0x9e/0x160 [ 597.603746] alloc_pages_vma+0x1555/0x17f0 [ 597.607994] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 597.613112] handle_mm_fault+0x44ca/0x7ed0 [ 597.617355] ? kmsan_set_origin_inline+0x6b/0x120 [ 597.622221] __do_page_fault+0xec6/0x1a10 [ 597.626400] do_page_fault+0xb7/0x250 [ 597.630204] ? page_fault+0x8/0x30 [ 597.633730] page_fault+0x1e/0x30 [ 597.637180] RIP: 0033:0x4075d5 [ 597.640352] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 597.645698] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000000 [ 597.652954] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 597.660212] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730088 [ 597.667466] R10: 0000000000a3e940 R11: 0000000000000000 R12: 0000000000092085 [ 597.674717] R13: 0000000000000002 R14: 000000000072c920 R15: 0000000000000001 [ 597.681985] warn_alloc_show_mem: 3 callbacks suppressed [ 597.681988] Mem-Info: [ 597.689736] active_anon:189923 inactive_anon:77 isolated_anon:0 [ 597.689736] active_file:1680 inactive_file:770 isolated_file:0 [ 597.689736] unevictable:0 dirty:62 writeback:0 unstable:0 [ 597.689736] slab_reclaimable:3330 slab_unreclaimable:9463 [ 597.689736] mapped:67316 shmem:84 pagetables:1475 bounce:0 [ 597.689736] free:217559 free_pcp:416 free_cma:0 [ 597.722824] Node 0 active_anon:759692kB inactive_anon:308kB active_file:6720kB inactive_file:3080kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269264kB dirty:248kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 597.750739] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 597.777197] lowmem_reserve[]: 0 2817 7244 7244 [ 597.781765] Node 0 DMA32 free:462004kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:548kB inactive_file:0kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1260kB local_pcp:624kB free_cma:0kB [ 597.810654] lowmem_reserve[]: 0 0 4426 4426 [ 597.814971] Node 0 Normal free:392328kB min:41208kB low:51508kB high:61808kB active_anon:531020kB inactive_anon:308kB active_file:6172kB inactive_file:3080kB unevictable:0kB writepending:180kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3708kB bounce:0kB free_pcp:404kB local_pcp:84kB free_cma:0kB [ 597.844390] lowmem_reserve[]: 0 0 0 0 [ 597.848179] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 597.861391] Node 0 DMA32: 18675*4kB (UME) 14205*8kB (UME) 5770*16kB (UME) 1737*32kB (UM) 615*64kB (UME) 235*128kB (UME) 84*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 1*2048kB (M) 1*4096kB (U) = 462004kB [ 597.879383] Node 0 Normal: 14500*4kB (UM) 6636*8kB (UM) 2930*16kB (UM) 2089*32kB (UM) 1460*64kB (UM) 454*128kB (UM) 40*256kB (M) 3*512kB (M) 4*1024kB (UM) 0*2048kB 0*4096kB = 392240kB [ 597.895896] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 597.904449] 2532 total pagecache pages [ 597.908316] 0 pages in swap cache [ 597.911748] Swap cache stats: add 0, delete 0, find 0/0 [ 597.917096] Free swap = 0kB [ 597.920103] Total swap = 0kB [ 597.923116] 1965969 pages RAM [ 597.926205] 0 pages HighMem/MovableOnly [ 597.930157] 106316 pages reserved 05:23:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:37 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:38 executing program 7: socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:38 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@nl=@unspec, &(0x7f0000000000)=0x80) 05:23:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)) 05:23:38 executing program 7: socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:38 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000240)) 05:23:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 598.443849] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 598.454398] syz-executor0 cpuset=syz0 mems_allowed=0 [ 598.459524] CPU: 1 PID: 3599 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 598.466276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.475628] Call Trace: [ 598.478212] dump_stack+0x185/0x1d0 [ 598.481828] warn_alloc+0x430/0x690 [ 598.485451] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 598.490279] ? kernel_poison_pages+0x40/0x360 [ 598.494765] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 598.500201] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 598.505130] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 598.510138] ? kmsan_set_origin_inline+0x6b/0x120 [ 598.514979] ? __msan_poison_alloca+0x15c/0x1d0 [ 598.519646] kmsan_alloc_page+0x82/0xe0 [ 598.523613] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 598.528356] ? kmsan_set_origin_inline+0x6b/0x120 [ 598.533191] ? __msan_poison_alloca+0x15c/0x1d0 [ 598.537842] ? __should_failslab+0x278/0x2a0 [ 598.542236] ? should_fail+0x57/0xab0 [ 598.546019] ? __should_failslab+0x278/0x2a0 [ 598.550410] ? kmsan_set_origin_inline+0x6b/0x120 [ 598.555235] ? __msan_poison_alloca+0x15c/0x1d0 [ 598.559920] ? kmsan_set_origin+0x9e/0x160 [ 598.564147] alloc_pages_vma+0x1555/0x17f0 [ 598.568370] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 598.573483] handle_mm_fault+0x44ca/0x7ed0 [ 598.577702] ? kmsan_set_origin_inline+0x6b/0x120 [ 598.582539] __do_page_fault+0xec6/0x1a10 [ 598.586680] do_page_fault+0xb7/0x250 [ 598.590466] ? page_fault+0x8/0x30 [ 598.594002] page_fault+0x1e/0x30 [ 598.597445] RIP: 0033:0x4075d5 [ 598.600618] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 598.605963] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 000000000000000c [ 598.613221] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 598.620474] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 598.627731] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000924cb [ 598.634989] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) [ 598.714055] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 598.724591] syz-executor0 cpuset=syz0 mems_allowed=0 [ 598.729712] CPU: 1 PID: 3615 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 598.736449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.745784] Call Trace: [ 598.748362] dump_stack+0x185/0x1d0 [ 598.751978] warn_alloc+0x430/0x690 [ 598.755604] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 598.760432] ? kernel_poison_pages+0x40/0x360 [ 598.764912] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 598.770363] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 598.775300] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 598.780320] ? kmsan_set_origin_inline+0x6b/0x120 [ 598.785149] ? __msan_poison_alloca+0x15c/0x1d0 [ 598.789811] kmsan_alloc_page+0x82/0xe0 [ 598.793772] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 598.798515] ? kmsan_set_origin_inline+0x6b/0x120 [ 598.803343] ? __msan_poison_alloca+0x15c/0x1d0 [ 598.808000] ? __should_failslab+0x278/0x2a0 [ 598.812399] ? should_fail+0x57/0xab0 [ 598.816180] ? __should_failslab+0x278/0x2a0 [ 598.820576] ? kmsan_set_origin_inline+0x6b/0x120 [ 598.825416] ? __msan_poison_alloca+0x15c/0x1d0 [ 598.830082] ? kmsan_set_origin+0x9e/0x160 [ 598.834311] alloc_pages_vma+0x1555/0x17f0 [ 598.838551] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 598.843646] handle_mm_fault+0x44ca/0x7ed0 [ 598.847866] ? kmsan_set_origin_inline+0x6b/0x120 [ 598.852703] __do_page_fault+0xec6/0x1a10 [ 598.856853] do_page_fault+0xb7/0x250 [ 598.860642] ? page_fault+0x8/0x30 [ 598.864177] page_fault+0x1e/0x30 [ 598.867611] RIP: 0033:0x4075fa [ 598.870782] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 598.876132] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 598.883397] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 598.890650] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 598.897907] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000925d9 [ 598.905161] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 598.912424] warn_alloc_show_mem: 1 callbacks suppressed [ 598.912426] Mem-Info: [ 598.920171] active_anon:190444 inactive_anon:78 isolated_anon:0 [ 598.920171] active_file:1701 inactive_file:751 isolated_file:0 [ 598.920171] unevictable:0 dirty:63 writeback:0 unstable:0 [ 598.920171] slab_reclaimable:3330 slab_unreclaimable:9464 [ 598.920171] mapped:67333 shmem:84 pagetables:1477 bounce:0 [ 598.920171] free:215035 free_pcp:509 free_cma:0 [ 598.953418] Node 0 active_anon:761776kB inactive_anon:312kB active_file:6804kB inactive_file:3004kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269332kB dirty:252kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 598.981338] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 599.007451] lowmem_reserve[]: 0 2817 7244 7244 [ 599.012038] Node 0 DMA32 free:455860kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:548kB inactive_file:0kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1260kB local_pcp:624kB free_cma:0kB [ 599.040939] lowmem_reserve[]: 0 0 4426 4426 [ 599.045254] Node 0 Normal free:388376kB min:41208kB low:51508kB high:61808kB active_anon:531052kB inactive_anon:312kB active_file:6256kB inactive_file:3004kB unevictable:0kB writepending:184kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3716kB bounce:0kB free_pcp:776kB local_pcp:68kB free_cma:0kB [ 599.074665] lowmem_reserve[]: 0 0 0 0 [ 599.078457] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 599.091659] Node 0 DMA32: 18675*4kB (UME) 14205*8kB (UME) 5770*16kB (UME) 1737*32kB (UM) 615*64kB (UME) 235*128kB (UME) 84*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 455860kB [ 599.108948] Node 0 Normal: 14465*4kB (UM) 6619*8kB (UM) 2920*16kB (UM) 2092*32kB (UM) 1455*64kB (UM) 451*128kB (UM) 40*256kB (UM) 2*512kB (UM) 2*1024kB (UM) 0*2048kB 0*4096kB = 388636kB [ 599.125655] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 599.134223] 2536 total pagecache pages [ 599.138093] 0 pages in swap cache [ 599.141526] Swap cache stats: add 0, delete 0, find 0/0 [ 599.146877] Free swap = 0kB [ 599.149876] Total swap = 0kB [ 599.152874] 1965969 pages RAM [ 599.155956] 0 pages HighMem/MovableOnly [ 599.159912] 106316 pages reserved 05:23:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50030}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) [ 599.166044] audit: type=1326 audit(1529731419.164:1201): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3603 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:39 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) [ 599.383347] audit: type=1326 audit(1529731419.378:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3630 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:39 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:39 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000340)}) socket$nl_route(0x10, 0x3, 0x0) 05:23:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 599.512307] audit: type=1326 audit(1529731419.511:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3640 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 599.574937] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 599.585499] syz-executor7 cpuset=syz7 mems_allowed=0 [ 599.590625] CPU: 0 PID: 3650 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 599.597377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.606739] Call Trace: [ 599.609336] dump_stack+0x185/0x1d0 [ 599.612979] warn_alloc+0x430/0x690 [ 599.616886] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 599.621740] ? kernel_poison_pages+0x40/0x360 [ 599.626253] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 599.631713] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 599.636665] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 599.641704] ? kmsan_set_origin_inline+0x6b/0x120 [ 599.646553] ? __msan_poison_alloca+0x15c/0x1d0 [ 599.651239] kmsan_alloc_page+0x82/0xe0 [ 599.655220] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 599.659992] ? kmsan_set_origin_inline+0x6b/0x120 [ 599.664848] ? __msan_poison_alloca+0x15c/0x1d0 [ 599.669526] ? kmem_cache_alloc+0x997/0xb70 [ 599.673856] ? ___slab_alloc+0xc1/0x1f50 [ 599.677929] ? kmsan_set_origin_inline+0x6b/0x120 [ 599.682816] ? __msan_poison_alloca+0x15c/0x1d0 [ 599.687492] ? kmsan_set_origin+0x9e/0x160 [ 599.691741] alloc_pages_vma+0x1555/0x17f0 [ 599.695987] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 599.701083] handle_mm_fault+0x44ca/0x7ed0 [ 599.705303] ? kmsan_set_origin_inline+0x6b/0x120 [ 599.710141] __do_page_fault+0xec6/0x1a10 [ 599.714277] do_page_fault+0xb7/0x250 [ 599.718072] ? page_fault+0x8/0x30 [ 599.721610] page_fault+0x1e/0x30 [ 599.725047] RIP: 0033:0x4075fa [ 599.728231] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 599.733582] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 599.740831] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 599.748094] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 599.755352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000092936 [ 599.762605] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) [ 599.845232] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 599.855767] syz-executor1 cpuset=syz1 mems_allowed=0 [ 599.860894] CPU: 0 PID: 3658 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 599.867646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 599.876999] Call Trace: [ 599.879605] dump_stack+0x185/0x1d0 [ 599.883244] warn_alloc+0x430/0x690 [ 599.886891] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 599.891739] ? kernel_poison_pages+0x40/0x360 [ 599.896246] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 599.901703] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 599.906656] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 599.911693] ? kmsan_set_origin_inline+0x6b/0x120 [ 599.916549] ? __msan_poison_alloca+0x15c/0x1d0 [ 599.921236] kmsan_alloc_page+0x82/0xe0 [ 599.925214] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 599.929976] ? kmsan_set_origin_inline+0x6b/0x120 [ 599.934836] ? __msan_poison_alloca+0x15c/0x1d0 [ 599.939508] ? __should_failslab+0x278/0x2a0 [ 599.943927] ? should_fail+0x57/0xab0 [ 599.947816] ? __should_failslab+0x278/0x2a0 [ 599.952231] ? kmsan_set_origin_inline+0x6b/0x120 [ 599.957085] ? __msan_poison_alloca+0x15c/0x1d0 [ 599.961764] ? kmsan_set_origin+0x9e/0x160 [ 599.966011] alloc_pages_vma+0x1555/0x17f0 [ 599.970255] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 599.975366] handle_mm_fault+0x44ca/0x7ed0 [ 599.979599] ? kmsan_set_origin_inline+0x6b/0x120 [ 599.984452] __do_page_fault+0xec6/0x1a10 [ 599.988604] do_page_fault+0xb7/0x250 [ 599.992402] ? page_fault+0x8/0x30 [ 599.995953] page_fault+0x1e/0x30 [ 599.999403] RIP: 0033:0x4075fa [ 600.002673] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 600.008030] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 600.015296] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 600.022561] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 600.029923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000092a44 [ 600.037194] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:40 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:40 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:40 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000005e80)) 05:23:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:41 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 05:23:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:41 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) [ 601.371814] kauditd_printk_skb: 2 callbacks suppressed [ 601.371837] audit: type=1326 audit(1529731421.370:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3745 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:41 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:41 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) [ 601.745969] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 601.756513] syz-executor6 cpuset=syz6 mems_allowed=0 [ 601.761639] CPU: 1 PID: 3778 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 601.768391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.777750] Call Trace: [ 601.780348] dump_stack+0x185/0x1d0 [ 601.783981] warn_alloc+0x430/0x690 [ 601.787630] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 601.792484] ? kernel_poison_pages+0x40/0x360 [ 601.796992] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 601.802456] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 601.807419] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 601.812494] kmsan_alloc_page+0x82/0xe0 [ 601.816654] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 601.821422] ? kmsan_set_origin_inline+0x6b/0x120 [ 601.826271] ? __msan_poison_alloca+0x15c/0x1d0 [ 601.830957] ? __should_failslab+0x278/0x2a0 [ 601.835382] ? should_fail+0x57/0xab0 [ 601.839191] ? __should_failslab+0x278/0x2a0 [ 601.843622] ? kmsan_set_origin_inline+0x6b/0x120 [ 601.848480] ? __msan_poison_alloca+0x15c/0x1d0 [ 601.853164] ? kmsan_set_origin+0x9e/0x160 [ 601.857412] alloc_pages_vma+0x1555/0x17f0 [ 601.861659] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 601.866771] handle_mm_fault+0x44ca/0x7ed0 [ 601.871009] ? kmsan_set_origin_inline+0x6b/0x120 [ 601.875894] __do_page_fault+0xec6/0x1a10 [ 601.880050] do_page_fault+0xb7/0x250 [ 601.883868] ? page_fault+0x8/0x30 [ 601.887404] page_fault+0x1e/0x30 [ 601.890841] RIP: 0033:0x4075fa [ 601.894013] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 601.899364] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 601.906629] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 601.913976] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 601.921234] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000931b1 [ 601.928487] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 601.935748] warn_alloc_show_mem: 2 callbacks suppressed [ 601.935751] Mem-Info: [ 601.943522] active_anon:188859 inactive_anon:78 isolated_anon:0 [ 601.943522] active_file:1336 inactive_file:845 isolated_file:0 [ 601.943522] unevictable:0 dirty:18 writeback:0 unstable:0 [ 601.943522] slab_reclaimable:3323 slab_unreclaimable:9456 [ 601.943522] mapped:67004 shmem:84 pagetables:1367 bounce:0 [ 601.943522] free:218748 free_pcp:524 free_cma:0 [ 601.976600] Node 0 active_anon:755436kB inactive_anon:312kB active_file:5344kB inactive_file:3380kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268016kB dirty:72kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 602.004434] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 602.030636] lowmem_reserve[]: 0 2817 7244 7244 [ 602.035213] Node 0 DMA32 free:462252kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:240kB inactive_file:4kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1340kB local_pcp:704kB free_cma:0kB [ 602.064103] lowmem_reserve[]: 0 0 4426 4426 [ 602.068418] Node 0 Normal free:396836kB min:41208kB low:51508kB high:61808kB active_anon:526808kB inactive_anon:312kB active_file:5104kB inactive_file:3376kB unevictable:0kB writepending:12kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7744kB pagetables:3276kB bounce:0kB free_pcp:756kB local_pcp:184kB free_cma:0kB [ 602.097828] lowmem_reserve[]: 0 0 0 0 [ 602.101621] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 602.114823] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 462252kB [ 602.132552] Node 0 Normal: 14537*4kB (UM) 6650*8kB (UM) 2931*16kB (UM) 2074*32kB (UM) 1461*64kB (UM) 438*128kB (UM) 34*256kB (M) 1*512kB (U) 1*1024kB (U) 4*2048kB (UM) 1*4096kB (M) = 396708kB [ 602.149766] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 602.158342] 2278 total pagecache pages [ 602.162216] 0 pages in swap cache [ 602.165647] Swap cache stats: add 0, delete 0, find 0/0 [ 602.170988] Free swap = 0kB [ 602.173985] Total swap = 0kB [ 602.176985] 1965969 pages RAM [ 602.180074] 0 pages HighMem/MovableOnly [ 602.184022] 106316 pages reserved 05:23:42 executing program 6: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:42 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:42 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) [ 602.346000] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 602.356534] syz-executor1 cpuset=syz1 mems_allowed=0 [ 602.361745] CPU: 1 PID: 3791 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 602.368519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.377879] Call Trace: [ 602.380473] dump_stack+0x185/0x1d0 [ 602.384131] warn_alloc+0x430/0x690 [ 602.387780] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 602.392632] ? kernel_poison_pages+0x40/0x360 [ 602.397133] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 602.402592] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 602.407569] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 602.412602] ? kmsan_set_origin_inline+0x6b/0x120 [ 602.417462] kmsan_alloc_page+0x82/0xe0 [ 602.421437] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 602.426202] ? kmsan_set_origin_inline+0x6b/0x120 [ 602.431047] ? __msan_poison_alloca+0x15c/0x1d0 [ 602.435722] ? __should_failslab+0x278/0x2a0 [ 602.440133] ? should_fail+0x57/0xab0 [ 602.443935] ? __should_failslab+0x278/0x2a0 [ 602.448341] ? kmsan_set_origin_inline+0x6b/0x120 [ 602.453183] ? __msan_poison_alloca+0x15c/0x1d0 [ 602.457859] ? kmsan_set_origin+0x9e/0x160 [ 602.462105] alloc_pages_vma+0x1555/0x17f0 [ 602.466345] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 602.471453] handle_mm_fault+0x44ca/0x7ed0 [ 602.475683] ? kmsan_set_origin_inline+0x6b/0x120 [ 602.480553] __do_page_fault+0xec6/0x1a10 [ 602.484705] do_page_fault+0xb7/0x250 [ 602.488501] ? page_fault+0x8/0x30 [ 602.492036] page_fault+0x1e/0x30 05:23:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) [ 602.495484] RIP: 0033:0x43cf61 [ 602.498664] RSP: 002b:0000000000a3e978 EFLAGS: 00010246 [ 602.504017] RAX: 79732f636f72702f RBX: 0000000000000000 RCX: 0000000000000000 [ 602.511282] RDX: 0000000000000020 RSI: 0000000000730020 RDI: 0000000020000380 [ 602.518546] RBP: 0000000000000000 R08: 70692f74656e2f73 R09: 6f632f73762f3476 [ 602.525810] R10: 006b636172746e6e R11: 0000000000000246 R12: 0000000000093409 [ 602.533618] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:42 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) [ 602.554759] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 602.565281] syz-executor6 cpuset=syz6 mems_allowed=0 [ 602.570399] CPU: 0 PID: 3799 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 602.577173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 602.586521] Call Trace: [ 602.589113] dump_stack+0x185/0x1d0 [ 602.592744] warn_alloc+0x430/0x690 [ 602.596387] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:23:42 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) [ 602.601238] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 602.606692] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 602.611653] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 602.616683] ? kmsan_set_origin_inline+0x6b/0x120 [ 602.621541] kmsan_alloc_page+0x82/0xe0 [ 602.625523] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 602.630289] ? kmsan_set_origin_inline+0x6b/0x120 [ 602.635137] ? __msan_poison_alloca+0x15c/0x1d0 [ 602.639808] ? __should_failslab+0x278/0x2a0 [ 602.644227] ? should_fail+0x57/0xab0 [ 602.648028] ? __should_failslab+0x278/0x2a0 [ 602.652437] ? kmsan_set_origin_inline+0x6b/0x120 [ 602.657294] ? __msan_poison_alloca+0x15c/0x1d0 [ 602.661966] ? kmsan_set_origin+0x9e/0x160 [ 602.666211] alloc_pages_vma+0x1555/0x17f0 [ 602.670452] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 602.675581] handle_mm_fault+0x44ca/0x7ed0 [ 602.679841] ? kmsan_set_origin_inline+0x6b/0x120 [ 602.684694] __do_page_fault+0xec6/0x1a10 [ 602.688853] do_page_fault+0xb7/0x250 [ 602.692676] ? page_fault+0x8/0x30 [ 602.696215] page_fault+0x1e/0x30 [ 602.699660] RIP: 0033:0x43cee7 05:23:42 executing program 2: pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) [ 602.702846] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 602.708211] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 706e692f7665642f [ 602.715480] RDX: 0000000000000010 RSI: 0000000000730020 RDI: 0000000020000000 [ 602.722758] RBP: 0000000000000000 R08: 006563696d2f7475 R09: 0000000001b05940 [ 602.730805] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000934d9 [ 602.738083] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:42 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:43 executing program 6: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:43 executing program 2: pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:43 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:43 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 603.133897] audit: type=1326 audit(1529731423.132:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3840 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 603.158983] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 603.169519] syz-executor5 cpuset=syz5 mems_allowed=0 [ 603.174644] CPU: 1 PID: 3844 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 603.181398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.190753] Call Trace: [ 603.193348] dump_stack+0x185/0x1d0 [ 603.196996] warn_alloc+0x430/0x690 [ 603.200638] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 603.205480] ? kernel_poison_pages+0x40/0x360 [ 603.209983] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 603.215438] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 603.220394] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 603.225427] ? kmsan_set_origin_inline+0x6b/0x120 [ 603.230310] kmsan_alloc_page+0x82/0xe0 [ 603.234302] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 603.239077] ? kmsan_set_origin_inline+0x6b/0x120 [ 603.243927] ? __msan_poison_alloca+0x15c/0x1d0 [ 603.248600] ? __should_failslab+0x278/0x2a0 [ 603.253022] ? should_fail+0x57/0xab0 [ 603.256824] ? __should_failslab+0x278/0x2a0 [ 603.261246] ? kmsan_set_origin_inline+0x6b/0x120 [ 603.266098] ? __msan_poison_alloca+0x15c/0x1d0 [ 603.270778] ? kmsan_set_origin+0x9e/0x160 [ 603.275033] alloc_pages_vma+0x1555/0x17f0 [ 603.279297] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 603.284415] handle_mm_fault+0x44ca/0x7ed0 [ 603.288658] ? kmsan_set_origin_inline+0x6b/0x120 [ 603.293519] __do_page_fault+0xec6/0x1a10 [ 603.297685] do_page_fault+0xb7/0x250 [ 603.301491] ? page_fault+0x8/0x30 [ 603.305041] page_fault+0x1e/0x30 [ 603.308504] RIP: 0033:0x4075fa [ 603.311694] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 603.317061] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 603.324347] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 603.331629] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 603.338916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000093736 [ 603.346193] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 603.353477] warn_alloc_show_mem: 2 callbacks suppressed [ 603.353481] Mem-Info: [ 603.361265] active_anon:188337 inactive_anon:72 isolated_anon:0 [ 603.361265] active_file:1356 inactive_file:867 isolated_file:0 [ 603.361265] unevictable:0 dirty:33 writeback:0 unstable:0 [ 603.361265] slab_reclaimable:3323 slab_unreclaimable:9454 [ 603.361265] mapped:66993 shmem:84 pagetables:1444 bounce:0 [ 603.361265] free:217129 free_pcp:546 free_cma:0 [ 603.394371] Node 0 active_anon:753348kB inactive_anon:288kB active_file:5424kB inactive_file:3468kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267972kB dirty:132kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 603.422394] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 603.448688] lowmem_reserve[]: 0 2817 7244 7244 [ 603.453266] Node 0 DMA32 free:466348kB min:26224kB low:32780kB high:39336kB active_anon:224588kB inactive_anon:0kB active_file:224kB inactive_file:20kB unevictable:0kB writepending:16kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1340kB local_pcp:704kB free_cma:0kB [ 603.482248] lowmem_reserve[]: 0 0 4426 4426 [ 603.486571] Node 0 Normal free:379196kB min:41208kB low:51508kB high:61808kB active_anon:530912kB inactive_anon:288kB active_file:5200kB inactive_file:3448kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3584kB bounce:0kB free_pcp:308kB local_pcp:180kB free_cma:0kB [ 603.515891] lowmem_reserve[]: 0 0 0 0 [ 603.519681] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 603.532890] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 5*2048kB (UM) 0*4096kB = 466348kB [ 603.550627] Node 0 Normal: 14143*4kB (UME) 6576*8kB (UME) 2896*16kB (UME) 2060*32kB (UME) 1437*64kB (UME) 432*128kB (UME) 35*256kB (UME) 1*512kB (E) 1*1024kB (E) 0*2048kB 0*4096kB = 379196kB [ 603.568673] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 603.577231] 2350 total pagecache pages [ 603.581093] 0 pages in swap cache 05:23:43 executing program 2: pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:43 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) [ 603.584543] Swap cache stats: add 0, delete 0, find 0/0 [ 603.589893] Free swap = 0kB [ 603.592889] Total swap = 0kB [ 603.595888] 1965969 pages RAM [ 603.598976] 0 pages HighMem/MovableOnly [ 603.602932] 106316 pages reserved 05:23:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:43 executing program 6: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 603.705152] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 603.715688] syz-executor1 cpuset=syz1 mems_allowed=0 [ 603.720814] CPU: 1 PID: 3870 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 603.727591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.736948] Call Trace: [ 603.739572] dump_stack+0x185/0x1d0 [ 603.743207] warn_alloc+0x430/0x690 [ 603.746848] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 603.751694] ? kernel_poison_pages+0x40/0x360 [ 603.756198] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 603.761655] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 603.766608] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 603.771589] kmsan_alloc_page+0x82/0xe0 [ 603.775567] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 603.780335] ? kmsan_set_origin_inline+0x6b/0x120 [ 603.785184] ? __msan_poison_alloca+0x15c/0x1d0 [ 603.789860] ? __should_failslab+0x278/0x2a0 [ 603.794271] ? reschedule_interrupt+0xa/0x20 [ 603.798688] ? kmsan_set_origin_inline+0x6b/0x120 [ 603.803532] ? __msan_poison_alloca+0x15c/0x1d0 [ 603.808211] ? kmsan_set_origin+0x9e/0x160 [ 603.812461] alloc_pages_vma+0x1555/0x17f0 [ 603.816710] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 603.821830] handle_mm_fault+0x44ca/0x7ed0 [ 603.826080] ? kmsan_set_origin_inline+0x6b/0x120 [ 603.830942] __do_page_fault+0xec6/0x1a10 [ 603.835110] do_page_fault+0xb7/0x250 [ 603.838919] ? page_fault+0x8/0x30 [ 603.842470] page_fault+0x1e/0x30 [ 603.845925] RIP: 0033:0x4075fa [ 603.849117] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 603.854473] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000000 [ 603.861742] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 603.869000] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 603.876256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000093958 [ 603.883510] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 603.897516] audit: type=1326 audit(1529731423.890:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3845 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 603.917357] audit: type=1326 audit(1529731423.891:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3872 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:43 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) 05:23:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) [ 604.191949] audit: type=1326 audit(1529731424.190:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3897 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:44 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) [ 604.289843] audit: type=1326 audit(1529731424.258:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3900 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:44 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) [ 604.686050] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 604.696619] syz-executor4 cpuset=syz4 mems_allowed=0 [ 604.701770] CPU: 0 PID: 3930 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 604.708512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.717862] Call Trace: [ 604.720444] dump_stack+0x185/0x1d0 [ 604.724058] warn_alloc+0x430/0x690 [ 604.728689] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 604.733528] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 604.738964] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 604.743911] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 604.748840] kmsan_alloc_page+0x82/0xe0 [ 604.752799] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 604.757541] ? kmsan_set_origin_inline+0x6b/0x120 [ 604.762387] ? __msan_poison_alloca+0x15c/0x1d0 [ 604.767054] ? __should_failslab+0x278/0x2a0 [ 604.771450] ? should_fail+0x57/0xab0 [ 604.775236] ? __should_failslab+0x278/0x2a0 [ 604.779627] ? kmsan_set_origin_inline+0x6b/0x120 [ 604.784456] ? __msan_poison_alloca+0x15c/0x1d0 [ 604.789111] ? kmsan_set_origin+0x9e/0x160 [ 604.793337] alloc_pages_vma+0x1555/0x17f0 [ 604.797565] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 604.802661] handle_mm_fault+0x44ca/0x7ed0 [ 604.806888] ? kmsan_set_origin_inline+0x6b/0x120 [ 604.811723] __do_page_fault+0xec6/0x1a10 [ 604.815862] do_page_fault+0xb7/0x250 [ 604.819662] ? page_fault+0x8/0x30 [ 604.823190] page_fault+0x1e/0x30 [ 604.826622] RIP: 0033:0x4075fa [ 604.829794] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 604.835143] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 604.842400] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 604.849654] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 604.856906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000093d2d [ 604.864157] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 604.871421] warn_alloc_show_mem: 1 callbacks suppressed [ 604.871423] Mem-Info: [ 604.879167] active_anon:190419 inactive_anon:78 isolated_anon:0 [ 604.879167] active_file:1130 inactive_file:815 isolated_file:0 [ 604.879167] unevictable:0 dirty:31 writeback:0 unstable:0 [ 604.879167] slab_reclaimable:3324 slab_unreclaimable:9464 [ 604.879167] mapped:66957 shmem:84 pagetables:1452 bounce:0 [ 604.879167] free:212287 free_pcp:396 free_cma:0 [ 604.912237] Node 0 active_anon:761676kB inactive_anon:312kB active_file:4520kB inactive_file:3260kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267828kB dirty:124kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 604.940154] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 604.966267] lowmem_reserve[]: 0 2817 7244 7244 [ 604.970841] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:244kB inactive_file:0kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1340kB local_pcp:636kB free_cma:0kB [ 604.999996] lowmem_reserve[]: 0 0 4426 4426 [ 605.004364] Node 0 Normal free:377136kB min:41208kB low:51508kB high:61808kB active_anon:530944kB inactive_anon:312kB active_file:4276kB inactive_file:3260kB unevictable:0kB writepending:64kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3616kB bounce:0kB free_pcp:244kB local_pcp:108kB free_cma:0kB [ 605.033777] lowmem_reserve[]: 0 0 0 0 [ 605.037569] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 605.050784] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB [ 605.068439] Node 0 Normal: 14362*4kB (M) 6573*8kB (UM) 2884*16kB (UM) 2051*32kB (UM) 1431*64kB (UM) 432*128kB (UM) 33*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 377136kB [ 605.084167] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 605.092720] 2043 total pagecache pages [ 605.096586] 0 pages in swap cache [ 605.100016] Swap cache stats: add 0, delete 0, find 0/0 [ 605.105355] Free swap = 0kB [ 605.108353] Total swap = 0kB [ 605.111348] 1965969 pages RAM [ 605.114430] 0 pages HighMem/MovableOnly [ 605.118382] 106316 pages reserved [ 605.123702] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 605.134214] syz-executor6 cpuset=syz6 mems_allowed=0 [ 605.139339] CPU: 1 PID: 3932 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 605.146093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.155447] Call Trace: [ 605.158048] dump_stack+0x185/0x1d0 [ 605.161686] warn_alloc+0x430/0x690 [ 605.165328] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 605.170173] ? kernel_poison_pages+0x40/0x360 [ 605.174677] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 605.180134] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 605.185091] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 605.190037] ? kmsan_set_origin_inline+0x6b/0x120 [ 605.194897] ? __msan_poison_alloca+0x15c/0x1d0 [ 605.199576] kmsan_alloc_page+0x82/0xe0 [ 605.203555] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 605.208318] ? kmsan_set_origin_inline+0x6b/0x120 [ 605.213166] ? __msan_poison_alloca+0x15c/0x1d0 [ 605.217837] ? __should_failslab+0x278/0x2a0 [ 605.222249] ? should_fail+0x57/0xab0 [ 605.226048] ? __should_failslab+0x278/0x2a0 [ 605.230465] ? kmsan_set_origin_inline+0x6b/0x120 [ 605.235312] ? __msan_poison_alloca+0x15c/0x1d0 [ 605.239974] ? kmsan_set_origin+0x9e/0x160 [ 605.244206] alloc_pages_vma+0x1555/0x17f0 [ 605.248433] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 605.253540] handle_mm_fault+0x44ca/0x7ed0 [ 605.257760] ? kmsan_set_origin_inline+0x6b/0x120 [ 605.262598] __do_page_fault+0xec6/0x1a10 [ 605.266738] do_page_fault+0xb7/0x250 [ 605.270524] ? page_fault+0x8/0x30 [ 605.274047] page_fault+0x1e/0x30 [ 605.277484] RIP: 0033:0x4075fa [ 605.280670] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 605.286046] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000000 [ 605.293314] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 605.300568] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 605.307821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000093ee3 [ 605.315075] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='com.apple.system.Security\x00', &(0x7f0000000280)=""/78, 0x4e) [ 605.329358] audit: type=1326 audit(1529731425.326:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3935 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:23:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) [ 605.514060] audit: type=1326 audit(1529731425.512:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3945 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:45 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) [ 605.596859] audit: type=1326 audit(1529731425.575:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3952 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) [ 605.704139] audit: type=1326 audit(1529731425.702:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=3964 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 605.785185] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 605.795716] syz-executor4 cpuset=syz4 mems_allowed=0 [ 605.800842] CPU: 1 PID: 3973 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 605.807594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.816976] Call Trace: [ 605.819575] dump_stack+0x185/0x1d0 [ 605.823217] warn_alloc+0x430/0x690 [ 605.826861] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 605.831711] ? kernel_poison_pages+0x40/0x360 [ 605.836219] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 605.841675] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 605.846629] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 605.851592] kmsan_alloc_page+0x82/0xe0 [ 605.855576] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 605.860357] ? kmsan_set_origin_inline+0x6b/0x120 [ 605.865197] ? __msan_poison_alloca+0x15c/0x1d0 [ 605.869869] ? __should_failslab+0x278/0x2a0 [ 605.874280] ? should_fail+0x57/0xab0 [ 605.878080] ? __should_failslab+0x278/0x2a0 [ 605.882486] ? kmsan_set_origin_inline+0x6b/0x120 [ 605.887329] ? __msan_poison_alloca+0x15c/0x1d0 [ 605.892024] ? kmsan_set_origin+0x9e/0x160 [ 605.896270] alloc_pages_vma+0x1555/0x17f0 [ 605.900521] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 605.905637] handle_mm_fault+0x44ca/0x7ed0 [ 605.909879] ? kmsan_set_origin_inline+0x6b/0x120 [ 605.914741] __do_page_fault+0xec6/0x1a10 [ 605.918905] do_page_fault+0xb7/0x250 [ 605.922711] ? page_fault+0x8/0x30 [ 605.926247] page_fault+0x1e/0x30 [ 605.929690] RIP: 0033:0x4075fa [ 605.932873] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 605.938236] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 605.945507] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 605.952778] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 605.960044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000094178 [ 605.967312] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 605.974574] warn_alloc_show_mem: 1 callbacks suppressed [ 605.974577] Mem-Info: [ 605.982331] active_anon:189428 inactive_anon:76 isolated_anon:0 [ 605.982331] active_file:1031 inactive_file:470 isolated_file:0 [ 605.982331] unevictable:0 dirty:31 writeback:0 unstable:0 [ 605.982331] slab_reclaimable:3324 slab_unreclaimable:9464 [ 605.982331] mapped:66682 shmem:84 pagetables:1399 bounce:0 [ 605.982331] free:216037 free_pcp:516 free_cma:0 [ 606.015402] Node 0 active_anon:757712kB inactive_anon:304kB active_file:4124kB inactive_file:1880kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266728kB dirty:124kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 311296kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 606.043427] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 606.069571] lowmem_reserve[]: 0 2817 7244 7244 [ 606.074145] Node 0 DMA32 free:468396kB min:26224kB low:32780kB high:39336kB active_anon:226636kB inactive_anon:0kB active_file:104kB inactive_file:140kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1340kB local_pcp:704kB free_cma:0kB [ 606.103221] lowmem_reserve[]: 0 0 4426 4426 [ 606.107560] Node 0 Normal free:379720kB min:41208kB low:51508kB high:61808kB active_anon:530980kB inactive_anon:304kB active_file:4008kB inactive_file:1924kB unevictable:0kB writepending:64kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7936kB pagetables:3404kB bounce:0kB free_pcp:688kB local_pcp:124kB free_cma:0kB [ 606.137001] lowmem_reserve[]: 0 0 0 0 [ 606.140813] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 606.154056] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 6*2048kB (UM) 0*4096kB = 468396kB 05:23:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) 05:23:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:46 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 606.171831] Node 0 Normal: 15064*4kB (UME) 6626*8kB (UME) 2880*16kB (UME) 2049*32kB (UME) 1448*64kB (UME) 428*128kB (UME) 32*256kB (ME) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 380560kB [ 606.188181] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 606.196745] 1604 total pagecache pages [ 606.200617] 0 pages in swap cache [ 606.204054] Swap cache stats: add 0, delete 0, find 0/0 [ 606.209414] Free swap = 0kB [ 606.212419] Total swap = 0kB [ 606.215416] 1965969 pages RAM [ 606.218504] 0 pages HighMem/MovableOnly [ 606.222469] 106316 pages reserved 05:23:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:46 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:46 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000080)) 05:23:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:46 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) [ 606.657199] kauditd_printk_skb: 1 callbacks suppressed [ 606.657223] audit: type=1326 audit(1529731426.647:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4012 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:46 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) [ 606.766334] audit: type=1326 audit(1529731426.735:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4022 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:47 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:47 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) [ 607.246557] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 607.246570] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 607.246581] syz-executor4 cpuset= [ 607.257106] syz-executor7 cpuset= [ 607.267767] syz4 mems_allowed=0 [ 607.274623] syz7 mems_allowed=0 [ 607.277891] CPU: 1 PID: 4045 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 607.287867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.297201] Call Trace: [ 607.299782] dump_stack+0x185/0x1d0 [ 607.303400] warn_alloc+0x430/0x690 [ 607.307023] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 607.311852] ? kernel_poison_pages+0x40/0x360 [ 607.317379] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 607.322853] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 607.327867] ? kmsan_set_origin_inline+0x6b/0x120 [ 607.332694] ? __msan_poison_alloca+0x15c/0x1d0 [ 607.337355] kmsan_alloc_page+0x82/0xe0 [ 607.341317] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 607.346058] ? do_syscall_64+0x15b/0x230 [ 607.350111] ? kmsan_set_origin_inline+0x6b/0x120 [ 607.355110] ? __msan_poison_alloca+0x15c/0x1d0 [ 607.359764] ? __should_failslab+0x278/0x2a0 [ 607.364162] ? should_fail+0x57/0xab0 [ 607.367948] ? __should_failslab+0x278/0x2a0 [ 607.372342] ? kmsan_set_origin_inline+0x6b/0x120 [ 607.377181] ? __msan_poison_alloca+0x15c/0x1d0 [ 607.381837] ? kmsan_set_origin+0x9e/0x160 [ 607.386069] alloc_pages_vma+0x1555/0x17f0 [ 607.390296] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 607.395394] handle_mm_fault+0x44ca/0x7ed0 [ 607.399614] ? kmsan_set_origin_inline+0x6b/0x120 [ 607.404539] __do_page_fault+0xec6/0x1a10 [ 607.408680] do_page_fault+0xb7/0x250 [ 607.412469] page_fault+0x1e/0x30 [ 607.415912] RIP: 0010:__put_user_4+0x1c/0x30 [ 607.420299] RSP: 0018:ffff880111e3fdb0 EFLAGS: 00010297 [ 607.425648] RAX: 0000000000000013 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 607.433423] RDX: 0000000000000000 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 607.440679] RBP: ffff880111e3fe78 R08: 0000000001080020 R09: 0000000000000002 [ 607.447933] R10: 0000000000000000 R11: ffffffff87d2e2c0 R12: 0000000000000000 [ 607.455189] R13: 0000000000000000 R14: 0000000020000000 R15: 0000000000000013 [ 607.462455] ? __sys_socketpair+0x1490/0x1490 [ 607.466938] ? __sys_socketpair+0x1cb/0x1490 [ 607.471341] __x64_sys_socketpair+0x117/0x170 [ 607.475827] ? __sys_socketpair+0x1490/0x1490 [ 607.480308] do_syscall_64+0x15b/0x230 [ 607.484187] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 607.489362] RIP: 0033:0x455a99 [ 607.492534] RSP: 002b:00007f19c65a8c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 607.500231] RAX: ffffffffffffffda RBX: 00007f19c65a96d4 RCX: 0000000000455a99 [ 607.507485] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 607.514740] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 607.522030] R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff [ 607.529297] R13: 00000000004c1c23 R14: 00000000004d2d08 R15: 0000000000000000 [ 607.536556] Mem-Info: [ 607.536570] CPU: 0 PID: 4044 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 607.536579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.538980] active_anon:189421 inactive_anon:78 isolated_anon:0 [ 607.538980] active_file:1278 inactive_file:531 isolated_file:0 [ 607.538980] unevictable:0 dirty:55 writeback:0 unstable:0 [ 607.538980] slab_reclaimable:3326 slab_unreclaimable:9460 [ 607.538980] mapped:66816 shmem:84 pagetables:1453 bounce:0 [ 607.538980] free:211759 free_pcp:425 free_cma:0 [ 607.545698] Call Trace: [ 607.555072] Node 0 active_anon:757684kB inactive_anon:312kB active_file:5112kB inactive_file:2124kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267264kB dirty:220kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 607.589245] dump_stack+0x185/0x1d0 [ 607.591802] Node 0 [ 607.619722] warn_alloc+0x430/0x690 [ 607.623338] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 607.625547] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 607.629136] lowmem_reserve[]: [ 607.654628] ? kernel_poison_pages+0x40/0x360 [ 607.659435] 0 [ 607.662527] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 607.666988] 2817 [ 607.668791] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 607.674190] 7244 [ 607.676253] kmsan_alloc_page+0x82/0xe0 [ 607.681130] 7244 [ 607.683191] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 607.689176] ? kmsan_set_origin_inline+0x6b/0x120 [ 607.693897] Node 0 [ 607.698717] ? __msan_poison_alloca+0x15c/0x1d0 [ 607.698739] DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:226636kB inactive_anon:0kB active_file:244kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1340kB local_pcp:704kB free_cma:0kB [ 607.698745] lowmem_reserve[]: [ 607.700964] ? __should_failslab+0x278/0x2a0 [ 607.705604] 0 [ 607.733878] ? should_fail+0x57/0xab0 [ 607.736949] 0 [ 607.741339] ? __should_failslab+0x278/0x2a0 [ 607.743109] 4426 [ 607.746892] ? kmsan_set_origin_inline+0x6b/0x120 [ 607.748663] 4426 [ 607.753052] ? __msan_poison_alloca+0x15c/0x1d0 [ 607.759914] ? kmsan_set_origin+0x9e/0x160 [ 607.761941] Node 0 [ 607.766606] alloc_pages_vma+0x1555/0x17f0 [ 607.770828] Normal free:375024kB min:41208kB low:51508kB high:61808kB active_anon:531068kB inactive_anon:312kB active_file:4868kB inactive_file:2124kB unevictable:0kB writepending:156kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3620kB bounce:0kB free_pcp:360kB local_pcp:164kB free_cma:0kB [ 607.773030] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 607.777231] lowmem_reserve[]: [ 607.806111] handle_mm_fault+0x44ca/0x7ed0 [ 607.811184] 0 [ 607.814375] ? kmsan_set_origin_inline+0x6b/0x120 [ 607.818571] 0 0 [ 607.820396] __do_page_fault+0xec6/0x1a10 [ 607.825196] 0 [ 607.827160] do_page_fault+0xb7/0x250 [ 607.833059] ? page_fault+0x8/0x30 [ 607.837872] Node 0 DMA: [ 607.841406] page_fault+0x1e/0x30 [ 607.841418] RIP: 0033:0x4075fa [ 607.844076] 0*4kB [ 607.847508] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 607.850671] 0*8kB [ 607.858146] 0*16kB [ 607.860273] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 607.860276] 1*32kB (U) [ 607.862496] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 607.869739] 2*64kB [ 607.872311] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 607.879649] (U) [ 607.881865] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009472e 05:23:47 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) [ 607.889118] 1*128kB [ 607.891075] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 607.898331] (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 607.915810] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 1*2048kB (M) 0*4096kB = 458156kB [ 607.933494] Node 0 Normal: 14425*4kB (M) 6560*8kB (UM) 2859*16kB (UM) 2031*32kB (UM) 1423*64kB (UM) 427*128kB (UM) 31*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 374580kB [ 607.949255] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 607.957831] 1921 total pagecache pages [ 607.961707] 0 pages in swap cache [ 607.965140] Swap cache stats: add 0, delete 0, find 0/0 [ 607.970487] Free swap = 0kB [ 607.973486] Total swap = 0kB [ 607.976484] 1965969 pages RAM [ 607.979567] 0 pages HighMem/MovableOnly [ 607.983517] 106316 pages reserved 05:23:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)}) 05:23:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:48 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) [ 608.137069] audit: type=1326 audit(1529731428.135:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4041 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 608.198421] audit: type=1326 audit(1529731428.162:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4059 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 608.218260] audit: type=1326 audit(1529731428.170:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4061 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) [ 608.296691] audit: type=1326 audit(1529731428.272:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4069 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:48 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:48 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:48 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 05:23:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) keyctl$get_keyring_id(0x0, 0x0, 0x0) [ 609.119251] audit: type=1326 audit(1529731429.117:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4124 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 05:23:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50030}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000) [ 609.248619] audit: type=1326 audit(1529731429.247:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4140 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:49 executing program 7: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) [ 609.456553] audit: type=1326 audit(1529731429.455:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4154 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:49 executing program 7: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:50 executing program 7: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:23:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:50 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:50 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 05:23:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) [ 610.506534] audit: type=1326 audit(1529731430.505:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4216 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:50 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:50 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:51 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, &(0x7f0000000100)) 05:23:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) [ 611.681543] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 611.692087] syz-executor6 cpuset=syz6 mems_allowed=0 [ 611.697224] CPU: 0 PID: 4306 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 611.703976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.713351] Call Trace: [ 611.716026] dump_stack+0x185/0x1d0 [ 611.719673] warn_alloc+0x430/0x690 [ 611.723319] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 611.728169] ? kernel_poison_pages+0x40/0x360 [ 611.732678] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 611.738162] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 611.743194] ? kmsan_set_origin_inline+0x6b/0x120 [ 611.748042] ? __msan_poison_alloca+0x15c/0x1d0 [ 611.752723] kmsan_alloc_page+0x82/0xe0 [ 611.756708] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 611.761571] ? kmsan_set_origin_inline+0x6b/0x120 [ 611.766426] ? __msan_poison_alloca+0x15c/0x1d0 [ 611.771746] ? __should_failslab+0x278/0x2a0 [ 611.776168] ? should_fail+0x57/0xab0 [ 611.779974] ? __should_failslab+0x278/0x2a0 [ 611.784389] ? kmsan_set_origin_inline+0x6b/0x120 [ 611.789239] ? __msan_poison_alloca+0x15c/0x1d0 [ 611.793985] ? kmsan_set_origin+0x9e/0x160 [ 611.798236] alloc_pages_vma+0x1555/0x17f0 [ 611.802834] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 611.807957] handle_mm_fault+0x44ca/0x7ed0 [ 611.812197] ? kmsan_set_origin_inline+0x6b/0x120 [ 611.817062] __do_page_fault+0xec6/0x1a10 [ 611.821220] do_page_fault+0xb7/0x250 [ 611.825545] ? page_fault+0x8/0x30 05:23:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) [ 611.829110] page_fault+0x1e/0x30 [ 611.832566] RIP: 0033:0x4075fa [ 611.835749] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 611.841109] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 611.848384] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 611.855660] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 611.862942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000095880 [ 611.870219] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 611.877497] warn_alloc_show_mem: 1 callbacks suppressed [ 611.877499] Mem-Info: [ 611.885257] active_anon:189919 inactive_anon:79 isolated_anon:0 [ 611.885257] active_file:1608 inactive_file:621 isolated_file:11 [ 611.885257] unevictable:0 dirty:64 writeback:0 unstable:0 [ 611.885257] slab_reclaimable:3326 slab_unreclaimable:9465 [ 611.885257] mapped:67134 shmem:84 pagetables:1468 bounce:0 [ 611.885257] free:208293 free_pcp:449 free_cma:0 [ 611.918424] Node 0 active_anon:759676kB inactive_anon:316kB active_file:6432kB inactive_file:2484kB unevictable:0kB isolated(anon):0kB isolated(file):44kB mapped:268536kB dirty:256kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 611.946435] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 611.972544] lowmem_reserve[]: 0 2817 7244 7244 [ 611.977121] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:244kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1340kB local_pcp:636kB free_cma:0kB [ 612.006009] lowmem_reserve[]: 0 0 4426 4426 [ 612.010331] Node 0 Normal free:361160kB min:41208kB low:51508kB high:61808kB active_anon:528972kB inactive_anon:316kB active_file:6440kB inactive_file:2736kB unevictable:0kB writepending:192kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3680kB bounce:0kB free_pcp:456kB local_pcp:196kB free_cma:0kB [ 612.039836] lowmem_reserve[]: 0 0 0 0 [ 612.043622] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 612.056824] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB [ 612.074111] Node 0 Normal: 14152*4kB (UM) 6563*8kB (UM) 2815*16kB (UM) 1988*32kB (UM) 1378*64kB (UM) 383*128kB (UM) 24*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 361128kB [ 612.090293] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 612.098852] 2374 total pagecache pages [ 612.102716] 0 pages in swap cache [ 612.106148] Swap cache stats: add 0, delete 0, find 0/0 [ 612.111487] Free swap = 0kB [ 612.114484] Total swap = 0kB [ 612.117483] 1965969 pages RAM [ 612.120570] 0 pages HighMem/MovableOnly [ 612.124532] 106316 pages reserved [ 612.158165] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 612.168698] syz-executor7 cpuset=syz7 mems_allowed=0 [ 612.173819] CPU: 1 PID: 4317 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 612.180566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.189911] Call Trace: [ 612.192493] dump_stack+0x185/0x1d0 [ 612.196108] warn_alloc+0x430/0x690 [ 612.199727] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 612.204553] ? kernel_poison_pages+0x40/0x360 [ 612.209210] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 612.214644] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 612.219583] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 612.224602] kmsan_alloc_page+0x82/0xe0 [ 612.228561] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 612.233302] ? kmsan_set_origin_inline+0x6b/0x120 [ 612.238125] ? __msan_poison_alloca+0x15c/0x1d0 [ 612.242776] ? __should_failslab+0x278/0x2a0 [ 612.247168] ? should_fail+0x57/0xab0 [ 612.250949] ? __should_failslab+0x278/0x2a0 [ 612.255341] ? kmsan_set_origin_inline+0x6b/0x120 [ 612.260165] ? __msan_poison_alloca+0x15c/0x1d0 [ 612.264819] ? kmsan_set_origin+0x9e/0x160 [ 612.269055] alloc_pages_vma+0x1555/0x17f0 [ 612.273288] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 612.278387] handle_mm_fault+0x44ca/0x7ed0 [ 612.282618] ? kmsan_set_origin_inline+0x6b/0x120 [ 612.287451] __do_page_fault+0xec6/0x1a10 [ 612.291591] do_page_fault+0xb7/0x250 [ 612.295377] ? page_fault+0x8/0x30 [ 612.298900] page_fault+0x1e/0x30 [ 612.302334] RIP: 0033:0x4075fa [ 612.305518] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 612.311096] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 612.318350] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 612.325601] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 612.332863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000095a5d [ 612.340115] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:52 executing program 1: accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) [ 612.557827] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 612.568371] syz-executor0 cpuset=syz0 mems_allowed=0 [ 612.573497] CPU: 0 PID: 4331 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 612.580259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.589634] Call Trace: [ 612.592216] dump_stack+0x185/0x1d0 [ 612.595852] warn_alloc+0x430/0x690 [ 612.599491] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 612.604326] ? kernel_poison_pages+0x40/0x360 [ 612.608812] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 612.614269] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 612.619279] ? kmsan_set_origin_inline+0x6b/0x120 [ 612.624107] ? __msan_poison_alloca+0x15c/0x1d0 [ 612.628767] kmsan_alloc_page+0x82/0xe0 [ 612.632731] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 612.637471] ? kmsan_set_origin_inline+0x6b/0x120 [ 612.642297] ? __msan_poison_alloca+0x15c/0x1d0 [ 612.646946] ? __should_failslab+0x278/0x2a0 [ 612.651343] ? should_fail+0x57/0xab0 [ 612.655125] ? __should_failslab+0x278/0x2a0 [ 612.659518] ? kmsan_set_origin_inline+0x6b/0x120 [ 612.664355] ? __msan_poison_alloca+0x15c/0x1d0 [ 612.669012] ? kmsan_set_origin+0x9e/0x160 [ 612.673240] alloc_pages_vma+0x1555/0x17f0 [ 612.677465] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 612.682563] handle_mm_fault+0x44ca/0x7ed0 [ 612.686781] ? kmsan_set_origin_inline+0x6b/0x120 [ 612.691619] __do_page_fault+0xec6/0x1a10 [ 612.695760] do_page_fault+0xb7/0x250 [ 612.699555] ? page_fault+0x8/0x30 [ 612.703099] page_fault+0x1e/0x30 05:23:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) [ 612.706535] RIP: 0033:0x4075fa [ 612.709706] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 612.715052] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 612.722316] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 612.730441] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 612.737708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000095bed [ 612.744960] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:52 executing program 1: accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) [ 612.892531] kauditd_printk_skb: 1 callbacks suppressed [ 612.892551] audit: type=1326 audit(1529731432.891:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4345 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 612.951996] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 612.962549] syz-executor1 cpuset=syz1 mems_allowed=0 [ 612.967675] CPU: 1 PID: 4360 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 612.974425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.983811] Call Trace: [ 612.986419] dump_stack+0x185/0x1d0 [ 612.990051] warn_alloc+0x430/0x690 [ 612.993692] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 612.998538] ? kernel_poison_pages+0x40/0x360 [ 613.003024] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 613.008465] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 613.013420] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 613.018335] ? __msan_metadata_ptr_for_store_4+0x10/0x20 [ 613.023777] ? update_load_avg+0x1bd6/0x2cc0 [ 613.028173] ? kmsan_set_origin_inline+0x6b/0x120 [ 613.033001] ? __msan_poison_alloca+0x15c/0x1d0 [ 613.037661] kmsan_alloc_page+0x82/0xe0 [ 613.041624] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 613.046364] ? kmsan_set_origin_inline+0x6b/0x120 [ 613.051203] ? kmsan_set_origin_inline+0x6b/0x120 [ 613.056031] ? __msan_poison_alloca+0x15c/0x1d0 [ 613.060696] ? __should_failslab+0x278/0x2a0 [ 613.065116] ? should_fail+0x57/0xab0 [ 613.068901] ? __should_failslab+0x278/0x2a0 [ 613.073298] ? kmsan_set_origin_inline+0x6b/0x120 [ 613.078125] ? __msan_poison_alloca+0x15c/0x1d0 [ 613.082780] ? kmsan_set_origin+0x9e/0x160 [ 613.087009] alloc_pages_vma+0x1555/0x17f0 [ 613.091235] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 613.096335] handle_mm_fault+0x44ca/0x7ed0 [ 613.100559] ? kmsan_set_origin_inline+0x6b/0x120 [ 613.105396] __do_page_fault+0xec6/0x1a10 [ 613.109535] do_page_fault+0xb7/0x250 [ 613.113319] ? page_fault+0x8/0x30 [ 613.120415] page_fault+0x1e/0x30 [ 613.123862] RIP: 0033:0x4075d5 [ 613.127035] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 613.132749] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000080 [ 613.140017] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 613.147272] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 613.154528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000095d76 [ 613.161794] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 613.169063] warn_alloc_show_mem: 2 callbacks suppressed [ 613.169065] Mem-Info: [ 613.176822] active_anon:189477 inactive_anon:75 isolated_anon:0 [ 613.176822] active_file:1394 inactive_file:869 isolated_file:0 [ 613.176822] unevictable:0 dirty:73 writeback:0 unstable:0 [ 613.176822] slab_reclaimable:3326 slab_unreclaimable:9459 [ 613.176822] mapped:67172 shmem:84 pagetables:1499 bounce:0 [ 613.176822] free:209158 free_pcp:483 free_cma:0 [ 613.210422] Node 0 active_anon:757908kB inactive_anon:300kB active_file:5576kB inactive_file:3476kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268688kB dirty:292kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 613.238344] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 613.264468] lowmem_reserve[]: 0 2817 7244 7244 [ 613.269040] Node 0 DMA32 free:458156kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:216kB inactive_file:28kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1340kB local_pcp:704kB free_cma:0kB [ 613.298031] lowmem_reserve[]: 0 0 4426 4426 [ 613.302352] Node 0 Normal free:362572kB min:41208kB low:51508kB high:61808kB active_anon:527116kB inactive_anon:300kB active_file:5524kB inactive_file:3144kB unevictable:0kB writepending:228kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3804kB bounce:0kB free_pcp:592kB local_pcp:28kB free_cma:0kB [ 613.331771] lowmem_reserve[]: 0 0 0 0 [ 613.335566] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 613.348783] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 1*2048kB (U) 0*4096kB = 458156kB [ 613.366440] Node 0 Normal: 13831*4kB (M) 6512*8kB (M) 2811*16kB (M) 1986*32kB (UM) 1369*64kB (UM) 381*128kB (M) 23*256kB (UM) 0*512kB 0*1024kB 2*2048kB (UM) 0*4096kB = 362316kB [ 613.382349] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 613.390905] 2368 total pagecache pages [ 613.394772] 0 pages in swap cache [ 613.398205] Swap cache stats: add 0, delete 0, find 0/0 [ 613.403547] Free swap = 0kB [ 613.406545] Total swap = 0kB [ 613.409542] 1965969 pages RAM [ 613.412637] 0 pages HighMem/MovableOnly [ 613.416600] 106316 pages reserved 05:23:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b5}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) eventfd2(0x0, 0x0) 05:23:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:53 executing program 1: accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) [ 613.568635] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 613.579179] syz-executor1 cpuset=syz1 mems_allowed=0 [ 613.584305] CPU: 1 PID: 4374 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 613.591053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.600459] Call Trace: [ 613.603059] dump_stack+0x185/0x1d0 [ 613.606699] warn_alloc+0x430/0x690 [ 613.610360] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 613.615206] ? kernel_poison_pages+0x40/0x360 [ 613.619711] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 613.625190] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 613.630148] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 613.635137] ? kmsan_set_origin_inline+0x6b/0x120 [ 613.639990] ? __msan_poison_alloca+0x15c/0x1d0 [ 613.644679] kmsan_alloc_page+0x82/0xe0 [ 613.648666] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 613.653432] ? kmsan_set_origin_inline+0x6b/0x120 [ 613.658282] ? __msan_poison_alloca+0x15c/0x1d0 [ 613.662960] ? __should_failslab+0x278/0x2a0 [ 613.667376] ? should_fail+0x57/0xab0 [ 613.671178] ? __should_failslab+0x278/0x2a0 [ 613.675594] ? kmsan_set_origin_inline+0x6b/0x120 [ 613.680442] ? __msan_poison_alloca+0x15c/0x1d0 [ 613.685127] ? kmsan_set_origin+0x9e/0x160 [ 613.689379] alloc_pages_vma+0x1555/0x17f0 [ 613.693627] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 613.698743] handle_mm_fault+0x44ca/0x7ed0 [ 613.702987] ? kmsan_set_origin_inline+0x6b/0x120 [ 613.707845] __do_page_fault+0xec6/0x1a10 [ 613.712010] do_page_fault+0xb7/0x250 [ 613.715843] ? page_fault+0x8/0x30 05:23:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 613.719417] page_fault+0x1e/0x30 [ 613.722853] RIP: 0033:0x4075d5 [ 613.726028] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 613.731374] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000080 [ 613.738629] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 613.745882] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 613.753135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000095fe0 [ 613.760387] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 613.777545] audit: type=1326 audit(1529731433.775:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4375 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) eventfd2(0x0, 0x0) 05:23:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) [ 613.924970] audit: type=1326 audit(1529731433.923:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4387 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:54 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) eventfd2(0x0, 0x0) 05:23:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:54 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x8000502b4}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 614.368369] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 614.378914] syz-executor3 cpuset=syz3 mems_allowed=0 [ 614.384047] CPU: 1 PID: 4427 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 614.390827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.400183] Call Trace: [ 614.402785] dump_stack+0x185/0x1d0 [ 614.406419] warn_alloc+0x430/0x690 [ 614.410057] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 614.414902] ? kernel_poison_pages+0x40/0x360 [ 614.419408] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 614.424865] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 614.429840] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 614.434789] ? kmsan_set_origin_inline+0x6b/0x120 [ 614.439642] ? __msan_poison_alloca+0x15c/0x1d0 [ 614.444329] kmsan_alloc_page+0x82/0xe0 [ 614.448324] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 614.453092] ? kmsan_set_origin_inline+0x6b/0x120 [ 614.457944] ? __msan_poison_alloca+0x15c/0x1d0 [ 614.462626] ? __should_failslab+0x278/0x2a0 [ 614.467044] ? should_fail+0x57/0xab0 [ 614.470873] ? __should_failslab+0x278/0x2a0 [ 614.475292] ? kmsan_set_origin_inline+0x6b/0x120 [ 614.480149] ? __msan_poison_alloca+0x15c/0x1d0 [ 614.484833] ? kmsan_set_origin+0x9e/0x160 [ 614.489098] alloc_pages_vma+0x1555/0x17f0 [ 614.493352] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 614.498476] handle_mm_fault+0x44ca/0x7ed0 [ 614.502716] ? kmsan_set_origin_inline+0x6b/0x120 [ 614.507574] __do_page_fault+0xec6/0x1a10 [ 614.511736] do_page_fault+0xb7/0x250 [ 614.515543] ? page_fault+0x8/0x30 [ 614.519089] page_fault+0x1e/0x30 [ 614.522537] RIP: 0033:0x4075fa [ 614.525717] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 614.531091] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 614.538366] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 614.545634] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 614.552903] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000962fb [ 614.560174] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:54 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) [ 614.567452] warn_alloc_show_mem: 1 callbacks suppressed [ 614.567455] Mem-Info: [ 614.575239] active_anon:188383 inactive_anon:76 isolated_anon:0 [ 614.575239] active_file:1242 inactive_file:642 isolated_file:0 [ 614.575239] unevictable:0 dirty:78 writeback:0 unstable:0 [ 614.575239] slab_reclaimable:3325 slab_unreclaimable:9462 [ 614.575239] mapped:67021 shmem:84 pagetables:1299 bounce:0 [ 614.575239] free:212862 free_pcp:465 free_cma:0 [ 614.608357] Node 0 active_anon:755572kB inactive_anon:304kB active_file:5200kB inactive_file:2568kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268084kB dirty:312kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 614.636295] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 614.662418] lowmem_reserve[]: 0 2817 7244 7244 [ 614.666999] Node 0 DMA32 free:462252kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:168kB inactive_file:16kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:704kB free_cma:0kB [ 614.695975] lowmem_reserve[]: 0 0 4426 4426 [ 614.700291] Node 0 Normal free:358672kB min:41208kB low:51508kB high:61808kB active_anon:529312kB inactive_anon:304kB active_file:4948kB inactive_file:2804kB unevictable:0kB writepending:248kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3004kB bounce:0kB free_pcp:260kB local_pcp:132kB free_cma:0kB [ 614.729790] lowmem_reserve[]: 0 0 0 0 [ 614.733589] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 614.746791] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 462252kB [ 614.764515] Node 0 Normal: 14170*4kB (UM) 6554*8kB (UM) 2818*16kB (UM) 1972*32kB (UM) 1360*64kB (UM) 379*128kB (UM) 21*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 358232kB [ 614.780434] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 614.788999] 2034 total pagecache pages [ 614.792875] 0 pages in swap cache [ 614.796323] Swap cache stats: add 0, delete 0, find 0/0 [ 614.801662] Free swap = 0kB [ 614.804668] Total swap = 0kB [ 614.807664] 1965969 pages RAM [ 614.810768] 0 pages HighMem/MovableOnly [ 614.814717] 106316 pages reserved [ 614.866700] audit: type=1326 audit(1529731434.865:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4439 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 05:23:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:54 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:54 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) [ 614.986120] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 614.996652] syz-executor2 cpuset=syz2 mems_allowed=0 [ 615.001775] CPU: 1 PID: 4464 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 615.008518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.017865] Call Trace: [ 615.020449] dump_stack+0x185/0x1d0 [ 615.024068] warn_alloc+0x430/0x690 [ 615.027693] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 615.032523] ? kernel_poison_pages+0x40/0x360 [ 615.037011] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 615.042445] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 615.047371] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 615.052293] ? kmsan_set_origin_inline+0x6b/0x120 [ 615.057117] ? __msan_poison_alloca+0x15c/0x1d0 [ 615.062473] kmsan_alloc_page+0x82/0xe0 [ 615.066432] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 615.071181] ? kmsan_set_origin_inline+0x6b/0x120 [ 615.076009] ? __msan_poison_alloca+0x15c/0x1d0 [ 615.080659] ? kmem_cache_alloc+0x997/0xb70 [ 615.084964] ? ___slab_alloc+0xc1/0x1f50 [ 615.089017] ? kmsan_set_origin_inline+0x6b/0x120 [ 615.093839] ? __msan_poison_alloca+0x15c/0x1d0 [ 615.098494] ? kmsan_set_origin+0x9e/0x160 [ 615.102717] alloc_pages_vma+0x1555/0x17f0 [ 615.106938] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 615.112032] handle_mm_fault+0x44ca/0x7ed0 [ 615.116251] ? kmsan_set_origin_inline+0x6b/0x120 [ 615.121093] __do_page_fault+0xec6/0x1a10 [ 615.125233] do_page_fault+0xb7/0x250 [ 615.129018] ? page_fault+0x8/0x30 [ 615.132541] page_fault+0x1e/0x30 [ 615.135979] RIP: 0033:0x43cf61 [ 615.139156] RSP: 002b:0000000000a3e978 EFLAGS: 00010246 [ 615.144516] RAX: 79732f636f72702f RBX: 0000000000000000 RCX: 0000000000000000 [ 615.151771] RDX: 0000000000000025 RSI: 0000000000730020 RDI: 0000000020000000 [ 615.159024] RBP: 0000000000000000 R08: 70692f74656e2f73 R09: 79732f73762f3476 [ 615.166280] R10: 5f6b636f735f636e R11: 0000000000000246 R12: 0000000000096569 [ 615.173535] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 615.189300] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 615.199836] syz-executor4 cpuset=syz4 mems_allowed=0 [ 615.204967] CPU: 0 PID: 4470 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 615.211729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.221083] Call Trace: [ 615.223679] dump_stack+0x185/0x1d0 [ 615.227313] warn_alloc+0x430/0x690 [ 615.230958] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:23:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) [ 615.235804] ? kernel_poison_pages+0x40/0x360 [ 615.240338] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 615.245791] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 615.250748] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 615.255699] ? kmsan_set_origin_inline+0x6b/0x120 [ 615.260550] ? __msan_poison_alloca+0x15c/0x1d0 [ 615.265248] kmsan_alloc_page+0x82/0xe0 [ 615.269235] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 615.274004] ? kmsan_set_origin_inline+0x6b/0x120 [ 615.278858] ? __msan_poison_alloca+0x15c/0x1d0 [ 615.283532] ? __should_failslab+0x278/0x2a0 [ 615.287951] ? should_fail+0x57/0xab0 [ 615.291756] ? __should_failslab+0x278/0x2a0 [ 615.296178] ? kmsan_set_origin_inline+0x6b/0x120 [ 615.301028] ? __msan_poison_alloca+0x15c/0x1d0 [ 615.305706] ? kmsan_set_origin+0x9e/0x160 [ 615.309983] alloc_pages_vma+0x1555/0x17f0 [ 615.314310] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 615.319409] handle_mm_fault+0x44ca/0x7ed0 [ 615.323643] ? kmsan_set_origin_inline+0x6b/0x120 [ 615.328480] __do_page_fault+0xec6/0x1a10 [ 615.332618] do_page_fault+0xb7/0x250 [ 615.336404] ? page_fault+0x8/0x30 [ 615.339928] page_fault+0x1e/0x30 [ 615.343361] RIP: 0033:0x4075fa [ 615.346534] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 615.351886] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 615.359160] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 615.366417] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 615.373767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000096635 [ 615.381020] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 615.388280] warn_alloc_show_mem: 1 callbacks suppressed [ 615.388282] Mem-Info: [ 615.396044] active_anon:189401 inactive_anon:74 isolated_anon:0 [ 615.396044] active_file:1314 inactive_file:609 isolated_file:0 [ 615.396044] unevictable:0 dirty:81 writeback:0 unstable:0 [ 615.396044] slab_reclaimable:3325 slab_unreclaimable:9473 [ 615.396044] mapped:66882 shmem:84 pagetables:1431 bounce:0 [ 615.396044] free:208727 free_pcp:539 free_cma:0 [ 615.429122] Node 0 active_anon:757604kB inactive_anon:296kB active_file:5256kB inactive_file:2436kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267528kB dirty:324kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 615.457042] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 615.483154] lowmem_reserve[]: 0 2817 7244 7244 [ 615.487727] Node 0 DMA32 free:462252kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:168kB inactive_file:16kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:696kB free_cma:0kB [ 615.516703] lowmem_reserve[]: 0 0 4426 4426 [ 615.521015] Node 0 Normal free:356752kB min:41208kB low:51508kB high:61808kB active_anon:528948kB inactive_anon:296kB active_file:5124kB inactive_file:2536kB unevictable:0kB writepending:260kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3532kB bounce:0kB free_pcp:756kB local_pcp:88kB free_cma:0kB [ 615.550431] lowmem_reserve[]: 0 0 0 0 [ 615.554230] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 615.567442] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 462252kB [ 615.585180] Node 0 Normal: 14358*4kB (UM) 6524*8kB (UM) 2794*16kB (UM) 1969*32kB (UM) 1364*64kB (UM) 374*128kB (UM) 18*256kB (M) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 357112kB [ 615.600906] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 615.609462] 2016 total pagecache pages [ 615.613330] 0 pages in swap cache [ 615.616762] Swap cache stats: add 0, delete 0, find 0/0 [ 615.622104] Free swap = 0kB [ 615.625098] Total swap = 0kB [ 615.628103] 1965969 pages RAM [ 615.631183] 0 pages HighMem/MovableOnly [ 615.635135] 106316 pages reserved 05:23:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) [ 615.644916] audit: type=1326 audit(1529731435.643:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4479 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) keyctl$get_keyring_id(0x0, 0x0, 0x0) 05:23:55 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) [ 615.874414] audit: type=1326 audit(1529731435.873:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4510 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 615.934545] audit: type=1326 audit(1529731435.893:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4466 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 615.954305] audit: type=1326 audit(1529731435.905:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4470 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 616.130331] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 616.141210] syz-executor2 cpuset=syz2 mems_allowed=0 [ 616.146338] CPU: 1 PID: 4535 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 616.153095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.162476] Call Trace: [ 616.165076] dump_stack+0x185/0x1d0 [ 616.168707] warn_alloc+0x430/0x690 [ 616.172353] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 616.177199] ? kernel_poison_pages+0x40/0x360 [ 616.181707] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 616.187185] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 616.192227] ? kmsan_set_origin_inline+0x6b/0x120 [ 616.197093] ? __msan_poison_alloca+0x15c/0x1d0 [ 616.201776] kmsan_alloc_page+0x82/0xe0 [ 616.205782] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 616.210549] ? kmsan_set_origin_inline+0x6b/0x120 [ 616.215400] ? __msan_poison_alloca+0x15c/0x1d0 [ 616.220079] ? __should_failslab+0x278/0x2a0 [ 616.224503] ? should_fail+0x57/0xab0 [ 616.228308] ? __should_failslab+0x278/0x2a0 [ 616.232723] ? kmsan_set_origin_inline+0x6b/0x120 [ 616.237570] ? __msan_poison_alloca+0x15c/0x1d0 [ 616.242236] ? kmsan_set_origin+0x9e/0x160 [ 616.246476] alloc_pages_vma+0x1555/0x17f0 [ 616.250710] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 616.255819] handle_mm_fault+0x44ca/0x7ed0 [ 616.260045] ? kmsan_set_origin_inline+0x6b/0x120 [ 616.264887] __do_page_fault+0xec6/0x1a10 [ 616.269025] do_page_fault+0xb7/0x250 [ 616.272812] ? page_fault+0x8/0x30 [ 616.276339] page_fault+0x1e/0x30 05:23:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:23:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) [ 616.279772] RIP: 0033:0x4075fa [ 616.282944] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 616.288291] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 616.295547] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 616.302803] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 616.310072] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000969e2 [ 616.317332] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 616.356490] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 616.367053] syz-executor1 cpuset=syz1 mems_allowed=0 [ 616.372224] CPU: 1 PID: 4545 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 616.378980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.388340] Call Trace: [ 616.390938] dump_stack+0x185/0x1d0 [ 616.394622] warn_alloc+0x430/0x690 [ 616.398269] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 616.403233] ? kernel_poison_pages+0x40/0x360 [ 616.407750] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 616.413316] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 616.418287] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 616.423337] ? kmsan_set_origin_inline+0x6b/0x120 [ 616.428193] ? __msan_poison_alloca+0x15c/0x1d0 [ 616.432886] kmsan_alloc_page+0x82/0xe0 [ 616.436876] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 616.441645] ? kmsan_set_origin_inline+0x6b/0x120 [ 616.446503] ? __msan_poison_alloca+0x15c/0x1d0 [ 616.451211] ? __should_failslab+0x278/0x2a0 [ 616.455642] ? should_fail+0x57/0xab0 [ 616.459449] ? __should_failslab+0x278/0x2a0 [ 616.463862] ? kmsan_set_origin_inline+0x6b/0x120 [ 616.468735] ? __msan_poison_alloca+0x15c/0x1d0 [ 616.473411] ? kmsan_set_origin+0x9e/0x160 [ 616.477663] alloc_pages_vma+0x1555/0x17f0 [ 616.481932] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 616.487058] handle_mm_fault+0x44ca/0x7ed0 [ 616.491308] ? kmsan_set_origin_inline+0x6b/0x120 [ 616.496447] __do_page_fault+0xec6/0x1a10 [ 616.500612] do_page_fault+0xb7/0x250 [ 616.504423] ? page_fault+0x8/0x30 [ 616.507973] page_fault+0x1e/0x30 [ 616.511429] RIP: 0033:0x4075fa [ 616.514618] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 616.520159] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 616.527434] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 616.534797] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 616.542083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000096ac4 [ 616.549360] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 616.556644] warn_alloc_show_mem: 1 callbacks suppressed [ 616.556647] Mem-Info: [ 616.564434] active_anon:189934 inactive_anon:78 isolated_anon:0 [ 616.564434] active_file:911 inactive_file:598 isolated_file:32 [ 616.564434] unevictable:0 dirty:94 writeback:0 unstable:0 [ 616.564434] slab_reclaimable:3325 slab_unreclaimable:9482 [ 616.564434] mapped:66706 shmem:84 pagetables:1499 bounce:0 [ 616.564434] free:206764 free_pcp:531 free_cma:0 [ 616.597733] Node 0 active_anon:759852kB inactive_anon:312kB active_file:3632kB inactive_file:2508kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:266824kB dirty:376kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 616.625952] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 616.652098] lowmem_reserve[]: 0 2817 7244 7244 05:23:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) [ 616.656702] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:180kB inactive_file:4kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:704kB free_cma:0kB [ 616.685615] lowmem_reserve[]: 0 0 4426 4426 [ 616.689958] Node 0 Normal free:355596kB min:41208kB low:51508kB high:61808kB active_anon:528956kB inactive_anon:312kB active_file:4004kB inactive_file:2196kB unevictable:0kB writepending:312kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3804kB bounce:0kB free_pcp:760kB local_pcp:152kB free_cma:0kB [ 616.719484] lowmem_reserve[]: 0 0 0 0 [ 616.723292] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 616.736593] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB [ 616.753889] Node 0 Normal: 14779*4kB (UME) 6501*8kB (UME) 2773*16kB (UM) 1960*32kB (UME) 1351*64kB (UME) 370*128kB (UME) 17*256kB (ME) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 356388kB [ 616.770143] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 616.778695] 1658 total pagecache pages [ 616.782561] 0 pages in swap cache [ 616.785997] Swap cache stats: add 0, delete 0, find 0/0 [ 616.791353] Free swap = 0kB [ 616.794348] Total swap = 0kB [ 616.797347] 1965969 pages RAM [ 616.800430] 0 pages HighMem/MovableOnly [ 616.804385] 106316 pages reserved [ 616.812840] audit: type=1326 audit(1529731436.807:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4534 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 616.832641] audit: type=1326 audit(1529731436.810:1237): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4550 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:56 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:23:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:23:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:23:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:57 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:23:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:23:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000040), 0x4) 05:23:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:57 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:23:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) [ 617.541870] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 617.552406] syz-executor5 cpuset=syz5 mems_allowed=0 [ 617.558287] CPU: 1 PID: 4614 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 617.565040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.574416] Call Trace: [ 617.577018] dump_stack+0x185/0x1d0 [ 617.580655] warn_alloc+0x430/0x690 [ 617.584299] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 617.589141] ? kernel_poison_pages+0x40/0x360 [ 617.593640] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 617.599101] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 617.604093] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 617.609038] ? kmsan_set_origin_inline+0x6b/0x120 [ 617.613891] ? __msan_poison_alloca+0x15c/0x1d0 [ 617.618573] kmsan_alloc_page+0x82/0xe0 [ 617.622556] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 617.627314] ? kmsan_set_origin_inline+0x6b/0x120 [ 617.632167] ? __msan_poison_alloca+0x15c/0x1d0 [ 617.636837] ? __should_failslab+0x278/0x2a0 [ 617.641251] ? should_fail+0x57/0xab0 [ 617.645055] ? __should_failslab+0x278/0x2a0 [ 617.649486] ? kmsan_set_origin_inline+0x6b/0x120 [ 617.654333] ? __msan_poison_alloca+0x15c/0x1d0 [ 617.659040] ? kmsan_set_origin+0x9e/0x160 [ 617.663305] alloc_pages_vma+0x1555/0x17f0 [ 617.667581] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 617.672702] handle_mm_fault+0x44ca/0x7ed0 [ 617.676944] ? kmsan_set_origin_inline+0x6b/0x120 [ 617.681802] __do_page_fault+0xec6/0x1a10 [ 617.685964] do_page_fault+0xb7/0x250 05:23:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) [ 617.689766] ? page_fault+0x8/0x30 [ 617.693306] page_fault+0x1e/0x30 [ 617.696751] RIP: 0033:0x4075fa [ 617.699935] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 617.705291] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 617.712581] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 617.719856] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 617.727132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000096f65 [ 617.734407] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 617.741687] Mem-Info: [ 617.744120] active_anon:188354 inactive_anon:78 isolated_anon:0 [ 617.744120] active_file:1190 inactive_file:682 isolated_file:0 [ 617.744120] unevictable:0 dirty:95 writeback:0 unstable:0 [ 617.744120] slab_reclaimable:3326 slab_unreclaimable:9482 [ 617.744120] mapped:66969 shmem:84 pagetables:1465 bounce:0 [ 617.744120] free:211109 free_pcp:559 free_cma:0 [ 617.777480] Node 0 active_anon:753444kB inactive_anon:316kB active_file:4784kB inactive_file:2728kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267852kB dirty:404kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 617.805419] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 617.831644] lowmem_reserve[]: 0 2817 7244 7244 [ 617.836240] Node 0 DMA32 free:468396kB min:26224kB low:32780kB high:39336kB active_anon:226636kB inactive_anon:0kB active_file:164kB inactive_file:20kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:704kB free_cma:0kB [ 617.865243] lowmem_reserve[]: 0 0 4426 4426 [ 617.869567] Node 0 Normal free:352692kB min:41208kB low:51508kB high:61808kB active_anon:528896kB inactive_anon:316kB active_file:4736kB inactive_file:2708kB unevictable:0kB writepending:340kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3324kB bounce:0kB free_pcp:372kB local_pcp:132kB free_cma:0kB [ 617.899079] lowmem_reserve[]: 0 0 0 0 [ 617.902877] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 617.916092] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 6*2048kB (UM) 0*4096kB = 468396kB [ 617.933826] Node 0 Normal: 14337*4kB (UME) 6545*8kB (UM) 2771*16kB (UM) 1945*32kB (UM) 1342*64kB (UM) 360*128kB (UM) 17*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 352604kB [ 617.949731] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 617.958291] 2005 total pagecache pages [ 617.962174] 0 pages in swap cache [ 617.965622] Swap cache stats: add 0, delete 0, find 0/0 [ 617.970969] Free swap = 0kB [ 617.973973] Total swap = 0kB [ 617.976981] 1965969 pages RAM [ 617.980082] 0 pages HighMem/MovableOnly [ 617.984043] 106316 pages reserved [ 618.038554] kauditd_printk_skb: 1 callbacks suppressed [ 618.038575] audit: type=1326 audit(1529731438.036:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4614 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500f4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:23:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) [ 618.154279] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 618.164824] syz-executor6 cpuset=syz6 mems_allowed=0 [ 618.169952] CPU: 0 PID: 4634 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 618.177044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.186391] Call Trace: [ 618.188982] dump_stack+0x185/0x1d0 [ 618.192648] warn_alloc+0x430/0x690 [ 618.196268] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 618.201097] ? kernel_poison_pages+0x40/0x360 [ 618.205611] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 618.211046] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 618.215981] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 618.220920] ? kmsan_set_origin_inline+0x6b/0x120 [ 618.225747] ? __msan_poison_alloca+0x15c/0x1d0 [ 618.230422] kmsan_alloc_page+0x82/0xe0 [ 618.234381] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 618.239121] ? kmsan_set_origin_inline+0x6b/0x120 [ 618.243949] ? __msan_poison_alloca+0x15c/0x1d0 [ 618.248632] ? __should_failslab+0x278/0x2a0 [ 618.253030] ? should_fail+0x57/0xab0 [ 618.256818] ? __should_failslab+0x278/0x2a0 [ 618.261214] ? kmsan_set_origin_inline+0x6b/0x120 [ 618.266050] ? __msan_poison_alloca+0x15c/0x1d0 [ 618.270714] ? kmsan_set_origin+0x9e/0x160 [ 618.274949] alloc_pages_vma+0x1555/0x17f0 [ 618.279176] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 618.284269] handle_mm_fault+0x44ca/0x7ed0 [ 618.288490] ? kmsan_set_origin_inline+0x6b/0x120 [ 618.293329] __do_page_fault+0xec6/0x1a10 [ 618.297491] do_page_fault+0xb7/0x250 [ 618.301280] ? page_fault+0x8/0x30 05:23:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:23:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) [ 618.304806] page_fault+0x1e/0x30 [ 618.308243] RIP: 0033:0x4075fa [ 618.311418] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 618.316793] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 618.324076] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 618.331335] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 618.338591] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000971c9 [ 618.345847] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001340)={0x10}, 0xc, &(0x7f0000001480)={&(0x7f00000013c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 05:23:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) [ 618.568045] audit: type=1326 audit(1529731438.566:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4655 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:23:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:23:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:23:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 618.702777] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 618.713318] syz-executor2 cpuset=syz2 mems_allowed=0 [ 618.718443] CPU: 1 PID: 4669 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 618.725253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.734607] Call Trace: [ 618.737214] dump_stack+0x185/0x1d0 [ 618.740848] warn_alloc+0x430/0x690 [ 618.744476] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 618.749304] ? kernel_poison_pages+0x40/0x360 [ 618.753796] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 618.759245] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 618.764175] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 618.769099] ? kmsan_set_origin_inline+0x6b/0x120 [ 618.773926] ? __msan_poison_alloca+0x15c/0x1d0 [ 618.778601] kmsan_alloc_page+0x82/0xe0 [ 618.782563] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 618.787305] ? kmsan_set_origin_inline+0x6b/0x120 [ 618.792145] ? __msan_poison_alloca+0x15c/0x1d0 [ 618.796797] ? __should_failslab+0x278/0x2a0 [ 618.801192] ? should_fail+0x57/0xab0 [ 618.804979] ? __should_failslab+0x278/0x2a0 [ 618.809379] ? kmsan_set_origin_inline+0x6b/0x120 [ 618.814204] ? __msan_poison_alloca+0x15c/0x1d0 [ 618.818860] ? kmsan_set_origin+0x9e/0x160 [ 618.823088] alloc_pages_vma+0x1555/0x17f0 [ 618.827313] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 618.832408] handle_mm_fault+0x44ca/0x7ed0 [ 618.836637] ? kmsan_set_origin_inline+0x6b/0x120 [ 618.841472] __do_page_fault+0xec6/0x1a10 [ 618.845609] do_page_fault+0xb7/0x250 [ 618.849395] ? page_fault+0x8/0x30 [ 618.852920] page_fault+0x1e/0x30 [ 618.856356] RIP: 0033:0x4075fa [ 618.859527] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 618.864886] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 618.872141] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 618.879395] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 618.886661] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000973ee [ 618.893928] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 618.901193] warn_alloc_show_mem: 1 callbacks suppressed [ 618.901197] Mem-Info: [ 618.908944] active_anon:189957 inactive_anon:73 isolated_anon:0 [ 618.908944] active_file:1258 inactive_file:653 isolated_file:32 [ 618.908944] unevictable:0 dirty:16 writeback:0 unstable:0 [ 618.908944] slab_reclaimable:3326 slab_unreclaimable:9475 [ 618.908944] mapped:66937 shmem:84 pagetables:1491 bounce:0 [ 618.908944] free:204758 free_pcp:460 free_cma:0 [ 618.942115] Node 0 active_anon:759828kB inactive_anon:292kB active_file:5032kB inactive_file:2612kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:267748kB dirty:64kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 618.970121] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 618.996247] lowmem_reserve[]: 0 2817 7244 7244 [ 619.000830] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:48kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:704kB free_cma:0kB [ 619.029720] lowmem_reserve[]: 0 0 4426 4426 [ 619.034046] Node 0 Normal free:347020kB min:41208kB low:51508kB high:61808kB active_anon:529152kB inactive_anon:292kB active_file:4908kB inactive_file:2612kB unevictable:0kB writepending:16kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8512kB pagetables:3772kB bounce:0kB free_pcp:440kB local_pcp:96kB free_cma:0kB [ 619.063398] lowmem_reserve[]: 0 0 0 0 [ 619.067197] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 619.080403] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB [ 619.097705] Node 0 Normal: 14149*4kB (UME) 6465*8kB (UM) 2735*16kB (M) 1934*32kB (UM) 1319*64kB (UM) 352*128kB (UM) 14*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 347020kB [ 619.113786] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 619.122343] 2027 total pagecache pages [ 619.126208] 0 pages in swap cache [ 619.129652] Swap cache stats: add 0, delete 0, find 0/0 [ 619.134998] Free swap = 0kB [ 619.138008] Total swap = 0kB [ 619.141021] 1965969 pages RAM [ 619.144103] 0 pages HighMem/MovableOnly [ 619.148054] 106316 pages reserved [ 619.160358] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 619.170883] syz-executor0 cpuset=syz0 mems_allowed=0 [ 619.176005] CPU: 0 PID: 4674 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 619.182767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.192115] Call Trace: [ 619.194698] dump_stack+0x185/0x1d0 [ 619.198311] warn_alloc+0x430/0x690 [ 619.201929] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 619.206754] ? kernel_poison_pages+0x40/0x360 [ 619.211234] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 619.216669] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 619.221597] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 619.226520] ? kmsan_set_origin_inline+0x6b/0x120 [ 619.231349] ? __msan_poison_alloca+0x15c/0x1d0 [ 619.236012] kmsan_alloc_page+0x82/0xe0 [ 619.239989] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 619.244733] ? kmsan_set_origin_inline+0x6b/0x120 [ 619.249568] ? __msan_poison_alloca+0x15c/0x1d0 [ 619.254220] ? __should_failslab+0x278/0x2a0 [ 619.258613] ? should_fail+0x57/0xab0 [ 619.262397] ? __should_failslab+0x278/0x2a0 [ 619.266789] ? kmsan_set_origin_inline+0x6b/0x120 [ 619.271615] ? __msan_poison_alloca+0x15c/0x1d0 [ 619.276272] ? kmsan_set_origin+0x9e/0x160 [ 619.280499] alloc_pages_vma+0x1555/0x17f0 [ 619.284732] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 619.289827] handle_mm_fault+0x44ca/0x7ed0 [ 619.294044] ? kmsan_set_origin_inline+0x6b/0x120 [ 619.298882] __do_page_fault+0xec6/0x1a10 [ 619.303019] do_page_fault+0xb7/0x250 [ 619.306803] ? page_fault+0x8/0x30 05:23:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) [ 619.310330] page_fault+0x1e/0x30 [ 619.313763] RIP: 0033:0x4075fa [ 619.316955] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 619.322308] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 619.329567] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 619.336818] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 619.344072] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000975b8 [ 619.351329] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:23:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:23:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000001340)={0x10}, 0xc, &(0x7f0000001480)={&(0x7f00000013c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 05:23:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:23:59 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:23:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) [ 619.555480] audit: type=1326 audit(1529731439.554:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4687 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 619.624704] audit: type=1326 audit(1529731439.585:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4671 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:23:59 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:23:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:23:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:23:59 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:23:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:23:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:24:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:24:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:24:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:24:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) [ 620.133667] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 620.144217] syz-executor7 cpuset=syz7 mems_allowed=0 [ 620.149347] CPU: 1 PID: 4739 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 620.156101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.165458] Call Trace: [ 620.168052] dump_stack+0x185/0x1d0 [ 620.171688] warn_alloc+0x430/0x690 [ 620.175326] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 620.180174] ? kernel_poison_pages+0x40/0x360 [ 620.184676] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 620.190655] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 620.195630] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 620.200580] ? kmsan_set_origin_inline+0x6b/0x120 [ 620.205431] ? __msan_poison_alloca+0x15c/0x1d0 [ 620.210123] kmsan_alloc_page+0x82/0xe0 [ 620.214113] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 620.218882] ? kmsan_set_origin_inline+0x6b/0x120 [ 620.223738] ? __msan_poison_alloca+0x15c/0x1d0 [ 620.228416] ? __should_failslab+0x278/0x2a0 [ 620.232830] ? should_fail+0x57/0xab0 [ 620.236631] ? __should_failslab+0x278/0x2a0 [ 620.241042] ? kmsan_set_origin_inline+0x6b/0x120 [ 620.245896] ? __msan_poison_alloca+0x15c/0x1d0 [ 620.250576] ? kmsan_set_origin+0x9e/0x160 [ 620.254824] alloc_pages_vma+0x1555/0x17f0 [ 620.259076] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 620.264193] handle_mm_fault+0x44ca/0x7ed0 [ 620.268456] ? kmsan_set_origin_inline+0x6b/0x120 [ 620.273317] __do_page_fault+0xec6/0x1a10 [ 620.277472] do_page_fault+0xb7/0x250 [ 620.281260] ? page_fault+0x8/0x30 [ 620.284811] page_fault+0x1e/0x30 [ 620.288247] RIP: 0033:0x4075fa [ 620.291421] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 620.296769] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 620.304201] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 620.311458] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 620.318713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000097985 [ 620.325972] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 620.333238] warn_alloc_show_mem: 1 callbacks suppressed [ 620.333240] Mem-Info: [ 620.341012] active_anon:189412 inactive_anon:74 isolated_anon:0 [ 620.341012] active_file:1472 inactive_file:849 isolated_file:0 [ 620.341012] unevictable:0 dirty:26 writeback:0 unstable:0 [ 620.341012] slab_reclaimable:3326 slab_unreclaimable:9478 [ 620.341012] mapped:67155 shmem:84 pagetables:1371 bounce:0 [ 620.341012] free:206303 free_pcp:379 free_cma:0 [ 620.374091] Node 0 active_anon:757648kB inactive_anon:296kB active_file:5888kB inactive_file:3396kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268620kB dirty:104kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 620.402015] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 620.428147] lowmem_reserve[]: 0 2817 7244 7244 [ 620.432724] Node 0 DMA32 free:462252kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:124kB inactive_file:60kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:704kB free_cma:0kB [ 620.461720] lowmem_reserve[]: 0 0 4426 4426 [ 620.466046] Node 0 Normal free:347056kB min:41208kB low:51508kB high:61808kB active_anon:528904kB inactive_anon:296kB active_file:5764kB inactive_file:3336kB unevictable:0kB writepending:44kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3292kB bounce:0kB free_pcp:116kB local_pcp:52kB free_cma:0kB [ 620.495382] lowmem_reserve[]: 0 0 0 0 [ 620.499182] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 620.512438] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 462252kB [ 620.530222] Node 0 Normal: 13768*4kB (UME) 6438*8kB (UM) 2740*16kB (UM) 1935*32kB (UM) 1320*64kB (UM) 355*128kB (UM) 14*256kB (UM) 0*512kB 1*1024kB (M) 0*2048kB 0*4096kB = 346864kB [ 620.546474] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 620.555038] 2427 total pagecache pages [ 620.558910] 0 pages in swap cache [ 620.562353] Swap cache stats: add 0, delete 0, find 0/0 [ 620.567695] Free swap = 0kB [ 620.570690] Total swap = 0kB [ 620.573689] 1965969 pages RAM [ 620.576771] 0 pages HighMem/MovableOnly [ 620.580724] 106316 pages reserved [ 620.592732] audit: type=1326 audit(1529731440.590:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4736 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=@dstopts, 0x8) 05:24:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:24:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:24:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 620.654079] audit: type=1326 audit(1529731440.619:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4745 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 620.698291] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 620.708844] syz-executor0 cpuset=syz0 mems_allowed=0 [ 620.713969] CPU: 1 PID: 4755 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 620.720743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.730105] Call Trace: [ 620.732708] dump_stack+0x185/0x1d0 [ 620.736352] warn_alloc+0x430/0x690 [ 620.740002] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 620.744842] ? kernel_poison_pages+0x40/0x360 [ 620.749332] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 620.754779] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 620.759794] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 620.764736] ? kmsan_set_origin_inline+0x6b/0x120 [ 620.769571] ? __msan_poison_alloca+0x15c/0x1d0 [ 620.774243] kmsan_alloc_page+0x82/0xe0 [ 620.778639] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 620.783382] ? kmsan_set_origin_inline+0x6b/0x120 [ 620.788209] ? __msan_poison_alloca+0x15c/0x1d0 [ 620.792863] ? __should_failslab+0x278/0x2a0 [ 620.797261] ? should_fail+0x57/0xab0 [ 620.801668] ? __should_failslab+0x278/0x2a0 [ 620.806084] ? kmsan_set_origin_inline+0x6b/0x120 [ 620.810916] ? __msan_poison_alloca+0x15c/0x1d0 [ 620.815570] ? kmsan_set_origin+0x9e/0x160 [ 620.819799] alloc_pages_vma+0x1555/0x17f0 [ 620.824024] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 620.829135] handle_mm_fault+0x44ca/0x7ed0 [ 620.833367] ? kmsan_set_origin_inline+0x6b/0x120 [ 620.838203] __do_page_fault+0xec6/0x1a10 [ 620.842346] do_page_fault+0xb7/0x250 [ 620.846217] ? page_fault+0x8/0x30 [ 620.849743] page_fault+0x1e/0x30 [ 620.853182] RIP: 0033:0x4075fa [ 620.856357] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 620.861706] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 620.868968] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 620.876233] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 620.883493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000097bba [ 620.891705] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050188}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:24:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) [ 621.014884] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 621.025425] syz-executor4 cpuset=syz4 mems_allowed=0 [ 621.030550] CPU: 1 PID: 4769 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 621.037305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.046667] Call Trace: [ 621.049267] dump_stack+0x185/0x1d0 [ 621.052903] warn_alloc+0x430/0x690 [ 621.056556] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 621.061428] ? kernel_poison_pages+0x40/0x360 [ 621.065917] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 621.071353] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 621.076284] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 621.081216] ? kmsan_set_origin_inline+0x6b/0x120 [ 621.086048] ? __msan_poison_alloca+0x15c/0x1d0 [ 621.090742] kmsan_alloc_page+0x82/0xe0 [ 621.094720] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 621.099472] ? kmsan_set_origin_inline+0x6b/0x120 [ 621.104324] ? __msan_poison_alloca+0x15c/0x1d0 [ 621.108986] ? __should_failslab+0x278/0x2a0 [ 621.113391] ? should_fail+0x57/0xab0 [ 621.117178] ? __should_failslab+0x278/0x2a0 [ 621.121585] ? kmsan_set_origin_inline+0x6b/0x120 [ 621.126431] ? __msan_poison_alloca+0x15c/0x1d0 [ 621.131092] ? kmsan_set_origin+0x9e/0x160 [ 621.135337] alloc_pages_vma+0x1555/0x17f0 [ 621.139568] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 621.144668] handle_mm_fault+0x44ca/0x7ed0 [ 621.148889] ? kmsan_set_origin_inline+0x6b/0x120 [ 621.153723] __do_page_fault+0xec6/0x1a10 [ 621.157861] do_page_fault+0xb7/0x250 [ 621.161666] ? page_fault+0x8/0x30 [ 621.165207] page_fault+0x1e/0x30 [ 621.168645] RIP: 0033:0x4075fa [ 621.171821] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 621.177186] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 621.184446] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 621.191704] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 621.198986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000097cf6 [ 621.206250] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000240)=""/162) 05:24:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) [ 621.218194] audit: type=1326 audit(1529731441.213:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4758 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 621.286268] audit: type=1326 audit(1529731441.284:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4775 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) [ 621.348265] audit: type=1326 audit(1529731441.346:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4779 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) 05:24:01 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 621.451653] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 621.462311] syz-executor6 cpuset=syz6 mems_allowed=0 [ 621.467436] CPU: 0 PID: 4787 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 621.474217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.483579] Call Trace: [ 621.486181] dump_stack+0x185/0x1d0 [ 621.489815] warn_alloc+0x430/0x690 [ 621.493459] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 621.498308] ? kernel_poison_pages+0x40/0x360 [ 621.502810] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 621.508262] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 621.513198] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 621.518125] ? kmsan_set_origin_inline+0x6b/0x120 [ 621.522955] ? __msan_poison_alloca+0x15c/0x1d0 [ 621.527619] kmsan_alloc_page+0x82/0xe0 [ 621.531584] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 621.536326] ? kmsan_set_origin_inline+0x6b/0x120 [ 621.541151] ? __msan_poison_alloca+0x15c/0x1d0 [ 621.545802] ? __should_failslab+0x278/0x2a0 [ 621.550195] ? should_fail+0x57/0xab0 [ 621.553983] ? __should_failslab+0x278/0x2a0 [ 621.558407] ? kmsan_set_origin_inline+0x6b/0x120 [ 621.563234] ? __msan_poison_alloca+0x15c/0x1d0 [ 621.567900] ? kmsan_set_origin+0x9e/0x160 [ 621.572127] alloc_pages_vma+0x1555/0x17f0 [ 621.576358] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 621.581451] handle_mm_fault+0x44ca/0x7ed0 [ 621.585668] ? kmsan_set_origin_inline+0x6b/0x120 [ 621.590504] __do_page_fault+0xec6/0x1a10 [ 621.594644] do_page_fault+0xb7/0x250 [ 621.598456] ? page_fault+0x8/0x30 [ 621.601983] page_fault+0x1e/0x30 [ 621.605421] RIP: 0033:0x4075fa [ 621.608601] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 621.613955] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 621.621211] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 621.628473] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 621.635725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000097eab [ 621.642994] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 621.650252] warn_alloc_show_mem: 2 callbacks suppressed [ 621.650255] Mem-Info: [ 621.658017] active_anon:189968 inactive_anon:76 isolated_anon:0 [ 621.658017] active_file:1473 inactive_file:897 isolated_file:28 [ 621.658017] unevictable:0 dirty:31 writeback:0 unstable:0 [ 621.658017] slab_reclaimable:3326 slab_unreclaimable:9473 [ 621.658017] mapped:67215 shmem:84 pagetables:1477 bounce:0 [ 621.658017] free:203564 free_pcp:576 free_cma:0 [ 621.691442] Node 0 active_anon:759872kB inactive_anon:304kB active_file:5892kB inactive_file:3588kB unevictable:0kB isolated(anon):0kB isolated(file):112kB mapped:268860kB dirty:124kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 621.719535] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 621.745669] lowmem_reserve[]: 0 2817 7244 7244 [ 621.750243] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:124kB inactive_file:60kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:696kB free_cma:0kB [ 621.779303] lowmem_reserve[]: 0 0 4426 4426 [ 621.783628] Node 0 Normal free:342244kB min:41208kB low:51508kB high:61808kB active_anon:529084kB inactive_anon:304kB active_file:5684kB inactive_file:3760kB unevictable:0kB writepending:64kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3716kB bounce:0kB free_pcp:904kB local_pcp:172kB free_cma:0kB [ 621.813906] lowmem_reserve[]: 0 0 0 0 [ 621.817709] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 621.830914] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB 05:24:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) [ 621.848223] Node 0 Normal: 13585*4kB (UME) 6409*8kB (UM) 2717*16kB (UM) 1925*32kB (UM) 1310*64kB (UM) 347*128kB (UM) 13*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 342268kB [ 621.865081] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 621.873633] 2451 total pagecache pages [ 621.877513] 0 pages in swap cache [ 621.880947] Swap cache stats: add 0, delete 0, find 0/0 [ 621.886289] Free swap = 0kB [ 621.889286] Total swap = 0kB [ 621.892283] 1965969 pages RAM [ 621.895369] 0 pages HighMem/MovableOnly [ 621.899322] 106316 pages reserved [ 621.927427] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 621.937960] syz-executor4 cpuset=syz4 mems_allowed=0 [ 621.943091] CPU: 1 PID: 4793 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 621.949843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.959195] Call Trace: [ 621.961785] dump_stack+0x185/0x1d0 [ 621.965420] warn_alloc+0x430/0x690 [ 621.969067] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 621.973916] ? kernel_poison_pages+0x40/0x360 [ 621.978418] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 621.983963] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 621.989789] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 621.994713] ? kmsan_set_origin_inline+0x6b/0x120 [ 621.999646] ? __msan_poison_alloca+0x15c/0x1d0 [ 622.004308] kmsan_alloc_page+0x82/0xe0 [ 622.008269] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 622.013011] ? kmsan_set_origin_inline+0x6b/0x120 [ 622.017836] ? __msan_poison_alloca+0x15c/0x1d0 [ 622.022575] ? __should_failslab+0x278/0x2a0 [ 622.026993] ? should_fail+0x57/0xab0 [ 622.030780] ? __should_failslab+0x278/0x2a0 [ 622.035172] ? kmsan_set_origin_inline+0x6b/0x120 [ 622.040004] ? __msan_poison_alloca+0x15c/0x1d0 [ 622.044660] ? kmsan_set_origin+0x9e/0x160 [ 622.048885] alloc_pages_vma+0x1555/0x17f0 [ 622.053111] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 622.058206] handle_mm_fault+0x44ca/0x7ed0 [ 622.062424] ? kmsan_set_origin_inline+0x6b/0x120 [ 622.067258] __do_page_fault+0xec6/0x1a10 [ 622.071396] do_page_fault+0xb7/0x250 [ 622.075180] ? page_fault+0x8/0x30 [ 622.078705] page_fault+0x1e/0x30 [ 622.082139] RIP: 0033:0x4075fa [ 622.085312] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 622.090657] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 622.097915] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 622.105184] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 622.112456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000098087 [ 622.119708] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:02 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) [ 622.128679] audit: type=1326 audit(1529731442.127:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4787 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:02 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:24:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:24:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) [ 622.461664] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 622.472199] syz-executor7 cpuset=syz7 mems_allowed=0 [ 622.477325] CPU: 0 PID: 4825 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 622.484077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.493448] Call Trace: [ 622.496046] dump_stack+0x185/0x1d0 [ 622.499668] warn_alloc+0x430/0x690 [ 622.503318] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 622.508148] ? kernel_poison_pages+0x40/0x360 [ 622.512648] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 622.518084] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 622.523014] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 622.527936] ? kmsan_set_origin_inline+0x6b/0x120 [ 622.532760] ? __msan_poison_alloca+0x15c/0x1d0 [ 622.537440] kmsan_alloc_page+0x82/0xe0 [ 622.541399] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 622.546139] ? kmsan_set_origin_inline+0x6b/0x120 [ 622.550966] ? __msan_poison_alloca+0x15c/0x1d0 [ 622.555627] ? __should_failslab+0x278/0x2a0 [ 622.560028] ? should_fail+0x57/0xab0 [ 622.563809] ? __should_failslab+0x278/0x2a0 [ 622.568212] ? kmsan_set_origin_inline+0x6b/0x120 [ 622.573046] ? __msan_poison_alloca+0x15c/0x1d0 [ 622.577699] ? kmsan_set_origin+0x9e/0x160 [ 622.581925] alloc_pages_vma+0x1555/0x17f0 [ 622.586158] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 622.591248] handle_mm_fault+0x44ca/0x7ed0 [ 622.595464] ? kmsan_set_origin_inline+0x6b/0x120 [ 622.600312] __do_page_fault+0xec6/0x1a10 [ 622.604454] do_page_fault+0xb7/0x250 [ 622.608237] ? page_fault+0x8/0x30 [ 622.611758] page_fault+0x1e/0x30 [ 622.615195] RIP: 0033:0x4075fa [ 622.618364] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 622.623709] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 622.630962] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 622.638233] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 622.645499] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009829d [ 622.652762] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 622.660025] warn_alloc_show_mem: 1 callbacks suppressed [ 622.660027] Mem-Info: [ 622.667768] active_anon:189981 inactive_anon:74 isolated_anon:14 [ 622.667768] active_file:1399 inactive_file:1131 isolated_file:0 [ 622.667768] unevictable:0 dirty:37 writeback:0 unstable:0 [ 622.667768] slab_reclaimable:3326 slab_unreclaimable:9476 [ 622.667768] mapped:67315 shmem:84 pagetables:1513 bounce:0 [ 622.667768] free:203543 free_pcp:425 free_cma:0 [ 622.701098] Node 0 active_anon:759924kB inactive_anon:296kB active_file:5596kB inactive_file:4524kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:269260kB dirty:148kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 622.729985] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 622.756103] lowmem_reserve[]: 0 2817 7244 7244 [ 622.760672] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:180kB inactive_file:4kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:696kB free_cma:0kB [ 622.789561] lowmem_reserve[]: 0 0 4426 4426 [ 622.793873] Node 0 Normal free:342160kB min:41208kB low:51508kB high:61808kB active_anon:529136kB inactive_anon:296kB active_file:5764kB inactive_file:4560kB unevictable:0kB writepending:88kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8576kB pagetables:3860kB bounce:0kB free_pcp:300kB local_pcp:116kB free_cma:0kB [ 622.823282] lowmem_reserve[]: 0 0 0 0 [ 622.827072] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 622.840288] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB [ 622.857580] Node 0 Normal: 13383*4kB (UME) 6375*8kB (UM) 2800*16kB (UM) 1950*32kB (UM) 1301*64kB (M) 340*128kB (M) 14*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 342100kB [ 622.873308] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 622.881877] 2613 total pagecache pages [ 622.885739] 0 pages in swap cache [ 622.889173] Swap cache stats: add 0, delete 0, find 0/0 [ 622.894511] Free swap = 0kB [ 622.897515] Total swap = 0kB [ 622.900512] 1965969 pages RAM [ 622.903592] 0 pages HighMem/MovableOnly [ 622.907541] 106316 pages reserved [ 622.912976] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 622.923486] syz-executor6 cpuset=syz6 mems_allowed=0 [ 622.928614] CPU: 0 PID: 4826 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 622.935368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.944722] Call Trace: [ 622.947335] dump_stack+0x185/0x1d0 [ 622.950960] warn_alloc+0x430/0x690 [ 622.954596] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 622.959437] ? kernel_poison_pages+0x40/0x360 [ 622.963956] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 622.969405] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 622.974357] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 622.979297] ? kmsan_set_origin_inline+0x6b/0x120 [ 622.984146] ? __msan_poison_alloca+0x15c/0x1d0 [ 622.988829] kmsan_alloc_page+0x82/0xe0 [ 622.992810] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 622.997574] ? kmsan_set_origin_inline+0x6b/0x120 [ 623.002416] ? __msan_poison_alloca+0x15c/0x1d0 [ 623.007085] ? __should_failslab+0x278/0x2a0 [ 623.011498] ? should_fail+0x57/0xab0 [ 623.015298] ? __should_failslab+0x278/0x2a0 [ 623.019706] ? kmsan_set_origin_inline+0x6b/0x120 [ 623.024549] ? __msan_poison_alloca+0x15c/0x1d0 [ 623.029225] ? kmsan_set_origin+0x9e/0x160 [ 623.033473] alloc_pages_vma+0x1555/0x17f0 [ 623.037714] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 623.042832] handle_mm_fault+0x44ca/0x7ed0 [ 623.047082] ? kmsan_set_origin_inline+0x6b/0x120 [ 623.051940] __do_page_fault+0xec6/0x1a10 [ 623.056094] do_page_fault+0xb7/0x250 [ 623.059911] ? page_fault+0x8/0x30 [ 623.063450] page_fault+0x1e/0x30 [ 623.066901] RIP: 0033:0x4075fa [ 623.070087] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 623.075450] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 623.082718] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 623.089988] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 623.097259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000098460 [ 623.104545] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:03 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/123, &(0x7f0000000140)=0x7b) 05:24:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:03 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 623.467255] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 623.477806] syz-executor6 cpuset=syz6 mems_allowed=0 [ 623.482916] CPU: 1 PID: 4856 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 623.489662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.499009] Call Trace: [ 623.501594] dump_stack+0x185/0x1d0 [ 623.505207] warn_alloc+0x430/0x690 [ 623.508826] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 623.513670] ? kernel_poison_pages+0x40/0x360 [ 623.518153] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 623.523590] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 623.528518] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 623.533438] ? kmsan_set_origin_inline+0x6b/0x120 [ 623.538277] ? __msan_poison_alloca+0x15c/0x1d0 [ 623.542937] kmsan_alloc_page+0x82/0xe0 [ 623.546897] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 623.551635] ? kmsan_set_origin_inline+0x6b/0x120 [ 623.556458] ? __msan_poison_alloca+0x15c/0x1d0 [ 623.561918] ? __should_failslab+0x278/0x2a0 [ 623.566663] ? should_fail+0x57/0xab0 [ 623.570445] ? __should_failslab+0x278/0x2a0 [ 623.574835] ? kmsan_set_origin_inline+0x6b/0x120 [ 623.579661] ? __msan_poison_alloca+0x15c/0x1d0 [ 623.584316] ? kmsan_set_origin+0x9e/0x160 [ 623.588541] alloc_pages_vma+0x1555/0x17f0 [ 623.592764] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 623.597868] handle_mm_fault+0x44ca/0x7ed0 [ 623.602089] ? kmsan_set_origin_inline+0x6b/0x120 [ 623.606929] __do_page_fault+0xec6/0x1a10 [ 623.611079] do_page_fault+0xb7/0x250 [ 623.614867] ? page_fault+0x8/0x30 [ 623.618393] page_fault+0x1e/0x30 [ 623.621828] RIP: 0033:0x4075fa [ 623.625005] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 623.630353] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 623.637617] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 623.644872] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 623.652126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000098683 [ 623.659378] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 623.666638] warn_alloc_show_mem: 1 callbacks suppressed [ 623.666640] Mem-Info: [ 623.674392] active_anon:189437 inactive_anon:73 isolated_anon:4 [ 623.674392] active_file:1385 inactive_file:1167 isolated_file:1 [ 623.674392] unevictable:0 dirty:54 writeback:0 unstable:0 [ 623.674392] slab_reclaimable:3326 slab_unreclaimable:9477 [ 623.674392] mapped:67357 shmem:84 pagetables:1471 bounce:0 [ 623.674392] free:203461 free_pcp:409 free_cma:0 [ 623.707548] Node 0 active_anon:757748kB inactive_anon:292kB active_file:5540kB inactive_file:4668kB unevictable:0kB isolated(anon):16kB isolated(file):4kB mapped:269428kB dirty:216kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 623.735566] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 623.761675] lowmem_reserve[]: 0 2817 7244 7244 [ 623.766248] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:184kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:704kB free_cma:0kB [ 623.795130] lowmem_reserve[]: 0 0 4426 4426 [ 623.799441] Node 0 Normal free:341832kB min:41208kB low:51508kB high:61808kB active_anon:529004kB inactive_anon:292kB active_file:5356kB inactive_file:4668kB unevictable:0kB writepending:152kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3692kB bounce:0kB free_pcp:236kB local_pcp:140kB free_cma:0kB [ 623.828937] lowmem_reserve[]: 0 0 0 0 [ 623.832727] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 623.845926] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB [ 623.863236] Node 0 Normal: 13427*4kB (ME) 6368*8kB (UM) 2752*16kB (UM) 1950*32kB (UM) 1304*64kB (UM) 339*128kB (M) 15*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 341772kB [ 623.878966] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 623.887540] 2643 total pagecache pages [ 623.891414] 0 pages in swap cache [ 623.894848] Swap cache stats: add 0, delete 0, find 0/0 [ 623.900195] Free swap = 0kB [ 623.903190] Total swap = 0kB [ 623.906186] 1965969 pages RAM [ 623.909268] 0 pages HighMem/MovableOnly [ 623.913217] 106316 pages reserved [ 623.920207] kauditd_printk_skb: 1 callbacks suppressed [ 623.920230] audit: type=1326 audit(1529731443.918:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4851 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 623.952066] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 623.962585] syz-executor2 cpuset=syz2 mems_allowed=0 [ 623.967709] CPU: 1 PID: 4859 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 623.974459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.983819] Call Trace: [ 623.986417] dump_stack+0x185/0x1d0 [ 623.990052] warn_alloc+0x430/0x690 [ 623.993695] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 623.998540] ? kernel_poison_pages+0x40/0x360 [ 624.003037] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 624.008494] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 624.013443] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 624.018383] ? kmsan_set_origin_inline+0x6b/0x120 [ 624.023223] ? __msan_poison_alloca+0x15c/0x1d0 [ 624.027900] kmsan_alloc_page+0x82/0xe0 [ 624.031878] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 624.036635] ? kmsan_set_origin_inline+0x6b/0x120 [ 624.041477] ? __msan_poison_alloca+0x15c/0x1d0 [ 624.046140] ? __should_failslab+0x278/0x2a0 [ 624.050544] ? should_fail+0x57/0xab0 [ 624.054345] ? __should_failslab+0x278/0x2a0 [ 624.058753] ? kmsan_set_origin_inline+0x6b/0x120 [ 624.063616] ? __msan_poison_alloca+0x15c/0x1d0 [ 624.068294] ? kmsan_set_origin+0x9e/0x160 [ 624.072533] alloc_pages_vma+0x1555/0x17f0 [ 624.076777] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 624.081884] handle_mm_fault+0x44ca/0x7ed0 [ 624.086109] ? kmsan_set_origin_inline+0x6b/0x120 [ 624.090949] __do_page_fault+0xec6/0x1a10 [ 624.095098] do_page_fault+0xb7/0x250 [ 624.098894] ? page_fault+0x8/0x30 [ 624.102425] page_fault+0x1e/0x30 [ 624.105857] RIP: 0033:0x4075fa [ 624.109029] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:24:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) [ 624.114382] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 624.121634] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 624.128893] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 624.136156] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009886f [ 624.143409] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:04 executing program 5: creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:24:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:04 executing program 5: creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:24:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:04 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:04 executing program 5: creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:24:04 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 624.836067] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 624.846602] syz-executor7 cpuset=syz7 mems_allowed=0 [ 624.851721] CPU: 0 PID: 4920 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 624.858459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.867797] Call Trace: [ 624.870380] dump_stack+0x185/0x1d0 [ 624.874005] warn_alloc+0x430/0x690 [ 624.877627] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 624.882456] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 624.887891] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 624.892815] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 624.897736] ? kmsan_set_origin_inline+0x6b/0x120 [ 624.902566] ? __msan_poison_alloca+0x15c/0x1d0 [ 624.907223] kmsan_alloc_page+0x82/0xe0 [ 624.911180] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 624.915919] ? kmsan_set_origin_inline+0x6b/0x120 [ 624.920746] ? __msan_poison_alloca+0x15c/0x1d0 [ 624.925399] ? __should_failslab+0x278/0x2a0 [ 624.929810] ? should_fail+0x57/0xab0 [ 624.933590] ? __should_failslab+0x278/0x2a0 [ 624.937991] ? kmsan_set_origin_inline+0x6b/0x120 [ 624.942816] ? __msan_poison_alloca+0x15c/0x1d0 [ 624.947470] ? kmsan_set_origin+0x9e/0x160 [ 624.951694] alloc_pages_vma+0x1555/0x17f0 [ 624.955932] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 624.961024] handle_mm_fault+0x44ca/0x7ed0 [ 624.965239] ? kmsan_set_origin_inline+0x6b/0x120 [ 624.970074] __do_page_fault+0xec6/0x1a10 [ 624.974209] do_page_fault+0xb7/0x250 [ 624.977997] ? page_fault+0x8/0x30 [ 624.981520] page_fault+0x1e/0x30 [ 624.985084] RIP: 0033:0x4075fa [ 624.988254] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 624.993596] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 625.000848] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 625.008099] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 625.015347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000098be3 [ 625.022596] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 625.029851] warn_alloc_show_mem: 1 callbacks suppressed [ 625.029853] Mem-Info: [ 625.037595] active_anon:189896 inactive_anon:75 isolated_anon:0 [ 625.037595] active_file:1347 inactive_file:1189 isolated_file:0 [ 625.037595] unevictable:0 dirty:69 writeback:0 unstable:0 [ 625.037595] slab_reclaimable:3326 slab_unreclaimable:9462 [ 625.037595] mapped:67353 shmem:84 pagetables:1454 bounce:0 [ 625.037595] free:203554 free_pcp:435 free_cma:0 [ 625.070746] Node 0 active_anon:759584kB inactive_anon:300kB active_file:5388kB inactive_file:4756kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269412kB dirty:276kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 301056kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 625.098659] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 625.124773] lowmem_reserve[]: 0 2817 7244 7244 [ 625.129358] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:184kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:696kB free_cma:0kB [ 625.158246] lowmem_reserve[]: 0 0 4426 4426 [ 625.162555] Node 0 Normal free:342204kB min:41208kB low:51508kB high:61808kB active_anon:528800kB inactive_anon:300kB active_file:5332kB inactive_file:4756kB unevictable:0kB writepending:212kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3624kB bounce:0kB free_pcp:340kB local_pcp:220kB free_cma:0kB [ 625.192056] lowmem_reserve[]: 0 0 0 0 [ 625.195842] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 625.209044] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB [ 625.226331] Node 0 Normal: 13424*4kB (ME) 6344*8kB (UM) 2714*16kB (UM) 1925*32kB (UM) 1299*64kB (UM) 336*128kB (UM) 17*256kB (UM) 2*512kB (M) 1*1024kB (M) 0*2048kB 0*4096kB = 342016kB [ 625.242926] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 625.251480] 2652 total pagecache pages [ 625.255343] 0 pages in swap cache [ 625.258787] Swap cache stats: add 0, delete 0, find 0/0 [ 625.264124] Free swap = 0kB [ 625.267117] Total swap = 0kB [ 625.270114] 1965969 pages RAM [ 625.273195] 0 pages HighMem/MovableOnly [ 625.277144] 106316 pages reserved 05:24:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:05 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:24:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) [ 625.461341] audit: type=1326 audit(1529731445.460:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4939 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 625.622000] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 625.632533] syz-executor1 cpuset=syz1 mems_allowed=0 [ 625.637658] CPU: 0 PID: 4951 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 625.644406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.653762] Call Trace: [ 625.656360] dump_stack+0x185/0x1d0 [ 625.659992] warn_alloc+0x430/0x690 [ 625.663642] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 625.668627] ? kernel_poison_pages+0x40/0x360 [ 625.673130] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 625.678595] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 625.684066] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 625.689012] ? kmsan_set_origin_inline+0x6b/0x120 [ 625.693860] ? __msan_poison_alloca+0x15c/0x1d0 [ 625.698546] kmsan_alloc_page+0x82/0xe0 [ 625.702528] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 625.707289] ? kmsan_set_origin_inline+0x6b/0x120 [ 625.712131] ? __msan_poison_alloca+0x15c/0x1d0 [ 625.716802] ? __should_failslab+0x278/0x2a0 [ 625.721223] ? should_fail+0x57/0xab0 [ 625.725026] ? __should_failslab+0x278/0x2a0 [ 625.729441] ? kmsan_set_origin_inline+0x6b/0x120 [ 625.734288] ? __msan_poison_alloca+0x15c/0x1d0 [ 625.738959] ? kmsan_set_origin+0x9e/0x160 [ 625.743200] alloc_pages_vma+0x1555/0x17f0 [ 625.747441] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 625.752572] handle_mm_fault+0x44ca/0x7ed0 [ 625.756806] ? kmsan_set_origin_inline+0x6b/0x120 [ 625.761662] __do_page_fault+0xec6/0x1a10 [ 625.765815] do_page_fault+0xb7/0x250 05:24:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050187}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 625.769612] ? page_fault+0x8/0x30 [ 625.773147] page_fault+0x1e/0x30 [ 625.776590] RIP: 0033:0x4075fa [ 625.779772] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 625.785128] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 625.792390] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 625.799669] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 625.806934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000098ef5 [ 625.814199] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 625.861938] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 625.872469] syz-executor2 cpuset=syz2 mems_allowed=0 [ 625.877602] CPU: 0 PID: 4958 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 625.884353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.893711] Call Trace: [ 625.896304] dump_stack+0x185/0x1d0 [ 625.899935] warn_alloc+0x430/0x690 [ 625.903575] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:24:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) [ 625.908413] ? kernel_poison_pages+0x40/0x360 [ 625.912909] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 625.918357] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 625.923308] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 625.928245] ? kmsan_set_origin_inline+0x6b/0x120 [ 625.933092] ? __msan_poison_alloca+0x15c/0x1d0 [ 625.937766] kmsan_alloc_page+0x82/0xe0 [ 625.941748] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 625.946512] ? kmsan_set_origin_inline+0x6b/0x120 [ 625.951359] ? __msan_poison_alloca+0x15c/0x1d0 [ 625.956031] ? __should_failslab+0x278/0x2a0 [ 625.960444] ? should_fail+0x57/0xab0 [ 625.964240] ? __should_failslab+0x278/0x2a0 [ 625.968652] ? kmsan_set_origin_inline+0x6b/0x120 [ 625.973491] ? __msan_poison_alloca+0x15c/0x1d0 [ 625.978165] ? kmsan_set_origin+0x9e/0x160 [ 625.982418] alloc_pages_vma+0x1555/0x17f0 [ 625.986673] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 625.991771] handle_mm_fault+0x44ca/0x7ed0 [ 625.995997] ? kmsan_set_origin_inline+0x6b/0x120 [ 626.000834] __do_page_fault+0xec6/0x1a10 [ 626.004978] do_page_fault+0xb7/0x250 [ 626.008772] ? page_fault+0x8/0x30 [ 626.012293] page_fault+0x1e/0x30 [ 626.015724] RIP: 0033:0x4075fa [ 626.018896] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 626.024239] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 626.031582] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 626.038833] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 626.046087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000098fe5 [ 626.053342] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 626.060599] warn_alloc_show_mem: 1 callbacks suppressed [ 626.060601] Mem-Info: [ 626.068484] active_anon:188915 inactive_anon:74 isolated_anon:0 [ 626.068484] active_file:1127 inactive_file:765 isolated_file:0 [ 626.068484] unevictable:0 dirty:75 writeback:0 unstable:0 [ 626.068484] slab_reclaimable:3326 slab_unreclaimable:9454 [ 626.068484] mapped:66969 shmem:84 pagetables:1477 bounce:0 [ 626.068484] free:204704 free_pcp:518 free_cma:0 [ 626.101571] Node 0 active_anon:755660kB inactive_anon:296kB active_file:4508kB inactive_file:3060kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267876kB dirty:300kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 626.129491] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 626.159856] lowmem_reserve[]: 0 2817 7244 7244 [ 626.164447] Node 0 DMA32 free:462252kB min:26224kB low:32780kB high:39336kB active_anon:226636kB inactive_anon:0kB active_file:28kB inactive_file:156kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:696kB free_cma:0kB [ 626.193605] lowmem_reserve[]: 0 0 4426 4426 [ 626.197919] Node 0 Normal free:340660kB min:41208kB low:51508kB high:61808kB active_anon:529024kB inactive_anon:296kB active_file:4484kB inactive_file:3064kB unevictable:0kB writepending:236kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3716kB bounce:0kB free_pcp:672kB local_pcp:252kB free_cma:0kB [ 626.227419] lowmem_reserve[]: 0 0 0 0 [ 626.231232] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 626.244436] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 462252kB [ 626.262160] Node 0 Normal: 13924*4kB (UME) 6335*8kB (M) 2699*16kB (M) 1910*32kB (M) 1294*64kB (UM) 330*128kB (M) 12*256kB (UM) 1*512kB (U) 1*1024kB (M) 0*2048kB 0*4096kB = 340344kB [ 626.278414] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 626.286984] 1984 total pagecache pages [ 626.290856] 0 pages in swap cache [ 626.294294] Swap cache stats: add 0, delete 0, find 0/0 [ 626.299635] Free swap = 0kB [ 626.302632] Total swap = 0kB [ 626.305630] 1965969 pages RAM [ 626.308712] 0 pages HighMem/MovableOnly 05:24:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000180)}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) [ 626.312752] 106316 pages reserved 05:24:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 626.471425] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 626.481966] syz-executor0 cpuset=syz0 mems_allowed=0 [ 626.487095] CPU: 1 PID: 4976 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 626.493870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.503224] Call Trace: [ 626.505802] dump_stack+0x185/0x1d0 [ 626.509417] warn_alloc+0x430/0x690 [ 626.513052] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 626.517889] ? kernel_poison_pages+0x40/0x360 [ 626.522376] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 626.527842] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 626.532769] ? kmsan_set_origin_inline+0x6b/0x120 [ 626.537603] ? __msan_poison_alloca+0x15c/0x1d0 [ 626.542271] kmsan_alloc_page+0x82/0xe0 [ 626.546232] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 626.550978] ? kmsan_set_origin_inline+0x6b/0x120 [ 626.555811] ? __msan_poison_alloca+0x15c/0x1d0 [ 626.560477] ? __should_failslab+0x278/0x2a0 [ 626.564899] ? should_fail+0x57/0xab0 [ 626.568697] ? __should_failslab+0x278/0x2a0 [ 626.573097] ? kmsan_set_origin_inline+0x6b/0x120 [ 626.577929] ? __msan_poison_alloca+0x15c/0x1d0 [ 626.582587] ? kmsan_set_origin+0x9e/0x160 [ 626.586828] alloc_pages_vma+0x1555/0x17f0 [ 626.591052] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 626.596160] handle_mm_fault+0x44ca/0x7ed0 [ 626.600382] ? kmsan_set_origin_inline+0x6b/0x120 [ 626.605219] __do_page_fault+0xec6/0x1a10 [ 626.609357] do_page_fault+0xb7/0x250 [ 626.613141] ? page_fault+0x8/0x30 [ 626.616688] page_fault+0x1e/0x30 [ 626.620127] RIP: 0033:0x4075fa [ 626.623298] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 626.628644] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 626.635908] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 626.643337] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 626.650593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000099243 [ 626.657864] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:24:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000180)}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) [ 626.679519] audit: type=1326 audit(1529731446.678:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4975 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:06 executing program 1: accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) [ 626.751828] audit: type=1326 audit(1529731446.725:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=4983 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 626.865450] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 626.875985] syz-executor2 cpuset=syz2 mems_allowed=0 [ 626.881120] CPU: 0 PID: 4995 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 626.887874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.897237] Call Trace: [ 626.899833] dump_stack+0x185/0x1d0 [ 626.903468] warn_alloc+0x430/0x690 [ 626.907112] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:24:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000180)}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) [ 626.911963] ? kernel_poison_pages+0x40/0x360 [ 626.916473] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 626.921933] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 626.926895] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 626.931848] ? kmsan_set_origin_inline+0x6b/0x120 [ 626.936742] ? __msan_poison_alloca+0x15c/0x1d0 [ 626.941434] kmsan_alloc_page+0x82/0xe0 [ 626.945422] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 626.950185] ? kmsan_set_origin_inline+0x6b/0x120 [ 626.955038] ? __msan_poison_alloca+0x15c/0x1d0 [ 626.959725] ? __should_failslab+0x278/0x2a0 [ 626.964146] ? should_fail+0x57/0xab0 [ 626.967959] ? __should_failslab+0x278/0x2a0 [ 626.972385] ? kmsan_set_origin_inline+0x6b/0x120 [ 626.977243] ? __msan_poison_alloca+0x15c/0x1d0 [ 626.981927] ? kmsan_set_origin+0x9e/0x160 [ 626.986184] alloc_pages_vma+0x1555/0x17f0 [ 626.990459] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 626.995594] handle_mm_fault+0x44ca/0x7ed0 [ 626.999843] ? kmsan_set_origin_inline+0x6b/0x120 [ 627.004721] __do_page_fault+0xec6/0x1a10 [ 627.008883] do_page_fault+0xb7/0x250 [ 627.012689] ? page_fault+0x8/0x30 05:24:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) [ 627.016234] page_fault+0x1e/0x30 [ 627.019681] RIP: 0033:0x4075fa [ 627.022862] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 627.028224] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 627.035500] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 627.042773] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 627.050053] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000993d1 [ 627.057330] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 627.064611] warn_alloc_show_mem: 1 callbacks suppressed [ 627.064614] Mem-Info: [ 627.072395] active_anon:189427 inactive_anon:76 isolated_anon:0 [ 627.072395] active_file:972 inactive_file:734 isolated_file:0 [ 627.072395] unevictable:0 dirty:87 writeback:0 unstable:0 [ 627.072395] slab_reclaimable:3325 slab_unreclaimable:9460 [ 627.072395] mapped:66854 shmem:84 pagetables:1472 bounce:0 [ 627.072395] free:203102 free_pcp:542 free_cma:0 [ 627.105409] Node 0 active_anon:757708kB inactive_anon:304kB active_file:3888kB inactive_file:2936kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267416kB dirty:348kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 627.133348] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 627.159478] lowmem_reserve[]: 0 2817 7244 7244 05:24:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 627.164076] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:104kB inactive_file:80kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:696kB free_cma:0kB [ 627.193093] lowmem_reserve[]: 0 0 4426 4426 05:24:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 627.197428] Node 0 Normal free:340376kB min:41208kB low:51508kB high:61808kB active_anon:529032kB inactive_anon:304kB active_file:4324kB inactive_file:2820kB unevictable:0kB writepending:284kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3696kB bounce:0kB free_pcp:884kB local_pcp:268kB free_cma:0kB [ 627.226946] lowmem_reserve[]: 0 0 0 0 [ 627.230761] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 627.243997] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB 05:24:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x10000020000501ab}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) [ 627.261325] Node 0 Normal: 14099*4kB (ME) 6348*8kB (UM) 2712*16kB (UM) 1910*32kB (UME) 1299*64kB (UME) 330*128kB (UM) 10*256kB (ME) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 339628kB [ 627.277360] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 627.285935] 1814 total pagecache pages [ 627.289820] 0 pages in swap cache [ 627.293268] Swap cache stats: add 0, delete 0, find 0/0 [ 627.298625] Free swap = 0kB [ 627.301633] Total swap = 0kB [ 627.304642] 1965969 pages RAM [ 627.307733] 0 pages HighMem/MovableOnly [ 627.311715] 106316 pages reserved 05:24:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:07 executing program 1: accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) [ 627.562232] audit: type=1326 audit(1529731447.560:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5029 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000040)) 05:24:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:07 executing program 1: accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 627.687916] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 627.698456] syz-executor1 cpuset=syz1 mems_allowed=0 [ 627.703585] CPU: 0 PID: 5039 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 627.710354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.719712] Call Trace: [ 627.722293] dump_stack+0x185/0x1d0 [ 627.725911] warn_alloc+0x430/0x690 [ 627.729533] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 627.734367] ? kernel_poison_pages+0x40/0x360 [ 627.738848] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 627.744280] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 627.749206] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 627.754125] ? kmsan_set_origin_inline+0x6b/0x120 [ 627.758953] ? __msan_poison_alloca+0x15c/0x1d0 [ 627.763872] kmsan_alloc_page+0x82/0xe0 [ 627.767835] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 627.772579] ? kmsan_set_origin_inline+0x6b/0x120 [ 627.777401] ? __msan_poison_alloca+0x15c/0x1d0 [ 627.782053] ? __should_failslab+0x278/0x2a0 [ 627.786453] ? should_fail+0x57/0xab0 [ 627.790233] ? __should_failslab+0x278/0x2a0 [ 627.794629] ? kmsan_set_origin_inline+0x6b/0x120 [ 627.799451] ? __msan_poison_alloca+0x15c/0x1d0 [ 627.804102] ? kmsan_set_origin+0x9e/0x160 [ 627.808326] alloc_pages_vma+0x1555/0x17f0 [ 627.812549] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 627.817642] handle_mm_fault+0x44ca/0x7ed0 [ 627.821856] ? kmsan_set_origin_inline+0x6b/0x120 [ 627.826692] __do_page_fault+0xec6/0x1a10 [ 627.830826] do_page_fault+0xb7/0x250 [ 627.834609] ? page_fault+0x8/0x30 [ 627.838131] page_fault+0x1e/0x30 [ 627.841579] RIP: 0033:0x4075d5 [ 627.844836] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 627.850179] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 000000000000006e [ 627.857432] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 627.864688] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 627.871942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000099707 [ 627.879195] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 627.898801] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 627.909324] syz-executor6 cpuset=syz6 mems_allowed=0 [ 627.914445] CPU: 1 PID: 5045 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 627.921196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.930550] Call Trace: [ 627.933141] dump_stack+0x185/0x1d0 [ 627.936773] warn_alloc+0x430/0x690 [ 627.940402] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 627.945241] ? kernel_poison_pages+0x40/0x360 [ 627.949722] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 627.955158] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 627.960086] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 627.965012] ? kmsan_set_origin_inline+0x6b/0x120 [ 627.969838] ? __msan_poison_alloca+0x15c/0x1d0 [ 627.974510] kmsan_alloc_page+0x82/0xe0 [ 627.978467] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 627.983206] ? kmsan_set_origin_inline+0x6b/0x120 [ 627.988053] ? __msan_poison_alloca+0x15c/0x1d0 [ 627.992724] ? __should_failslab+0x278/0x2a0 [ 627.997124] ? should_fail+0x57/0xab0 [ 628.000917] ? __should_failslab+0x278/0x2a0 [ 628.005311] ? kmsan_set_origin_inline+0x6b/0x120 [ 628.010135] ? __msan_poison_alloca+0x15c/0x1d0 [ 628.014788] ? kmsan_set_origin+0x9e/0x160 [ 628.019014] alloc_pages_vma+0x1555/0x17f0 [ 628.023237] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 628.028327] handle_mm_fault+0x44ca/0x7ed0 [ 628.032544] ? kmsan_set_origin_inline+0x6b/0x120 [ 628.037388] __do_page_fault+0xec6/0x1a10 [ 628.041526] do_page_fault+0xb7/0x250 [ 628.045313] ? page_fault+0x8/0x30 [ 628.048834] page_fault+0x1e/0x30 [ 628.052265] RIP: 0033:0x4075fa [ 628.055434] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 628.060778] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 628.068032] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 628.075288] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 628.082541] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000997da [ 628.089796] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 628.097055] warn_alloc_show_mem: 1 callbacks suppressed [ 628.097061] Mem-Info: [ 628.105151] active_anon:189387 inactive_anon:75 isolated_anon:0 [ 628.105151] active_file:1065 inactive_file:691 isolated_file:32 [ 628.105151] unevictable:0 dirty:91 writeback:0 unstable:0 [ 628.105151] slab_reclaimable:3329 slab_unreclaimable:9489 [ 628.105151] mapped:66744 shmem:84 pagetables:1451 bounce:0 [ 628.105151] free:204103 free_pcp:605 free_cma:0 [ 628.138406] Node 0 active_anon:757548kB inactive_anon:300kB active_file:4260kB inactive_file:2764kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:266976kB dirty:364kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 628.166497] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 628.193136] lowmem_reserve[]: 0 2817 7244 7244 [ 628.197706] Node 0 DMA32 free:462252kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:172kB inactive_file:12kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:704kB free_cma:0kB [ 628.226686] lowmem_reserve[]: 0 0 4426 4426 [ 628.230999] Node 0 Normal free:338256kB min:41208kB low:51508kB high:61808kB active_anon:528912kB inactive_anon:300kB active_file:4088kB inactive_file:2752kB unevictable:0kB writepending:300kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3612kB bounce:0kB free_pcp:1020kB local_pcp:304kB free_cma:0kB [ 628.260578] lowmem_reserve[]: 0 0 0 0 [ 628.264366] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 628.277566] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 462252kB 05:24:08 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) [ 628.295285] Node 0 Normal: 14091*4kB (UME) 6343*8kB (UME) 2696*16kB (UME) 1903*32kB (UM) 1292*64kB (UM) 330*128kB (UM) 9*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 338372kB [ 628.311363] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 628.319927] 1861 total pagecache pages [ 628.323796] 0 pages in swap cache [ 628.327232] Swap cache stats: add 0, delete 0, find 0/0 [ 628.332667] Free swap = 0kB [ 628.335666] Total swap = 0kB [ 628.338676] 1965969 pages RAM [ 628.341758] 0 pages HighMem/MovableOnly [ 628.345711] 106316 pages reserved 05:24:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 628.355188] audit: type=1326 audit(1529731448.353:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5035 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 628.419833] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 628.430360] syz-executor0 cpuset=syz0 mems_allowed=0 [ 628.435484] CPU: 0 PID: 5052 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 628.442236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.449328] audit: type=1326 audit(1529731448.384:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5044 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 628.451586] Call Trace: [ 628.451607] dump_stack+0x185/0x1d0 [ 628.451624] warn_alloc+0x430/0x690 [ 628.451651] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 628.451664] ? kernel_poison_pages+0x40/0x360 [ 628.451683] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 628.451695] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 628.451727] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 628.451765] ? kmsan_set_origin_inline+0x6b/0x120 [ 628.510505] ? __msan_poison_alloca+0x15c/0x1d0 [ 628.515196] kmsan_alloc_page+0x82/0xe0 [ 628.519182] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 628.523948] ? kmsan_set_origin_inline+0x6b/0x120 [ 628.528794] ? __msan_poison_alloca+0x15c/0x1d0 [ 628.533469] ? __should_failslab+0x278/0x2a0 [ 628.537899] ? should_fail+0x57/0xab0 [ 628.541791] ? __should_failslab+0x278/0x2a0 [ 628.546214] ? kmsan_set_origin_inline+0x6b/0x120 [ 628.551083] ? __msan_poison_alloca+0x15c/0x1d0 [ 628.555756] ? kmsan_set_origin+0x9e/0x160 [ 628.560011] alloc_pages_vma+0x1555/0x17f0 [ 628.564238] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 628.569333] handle_mm_fault+0x44ca/0x7ed0 [ 628.573552] ? kmsan_set_origin_inline+0x6b/0x120 [ 628.578389] __do_page_fault+0xec6/0x1a10 [ 628.582524] do_page_fault+0xb7/0x250 [ 628.586306] ? page_fault+0x8/0x30 [ 628.589832] page_fault+0x1e/0x30 [ 628.593362] RIP: 0033:0x4075fa [ 628.596530] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 628.601876] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 628.609127] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 05:24:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) [ 628.616379] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 628.623631] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000999e3 [ 628.630880] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000340)=""/38) 05:24:08 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) [ 628.808600] audit: type=1326 audit(1529731448.807:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5065 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:08 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:08 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 628.854433] audit: type=1326 audit(1529731448.842:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5068 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:08 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:09 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:09 executing program 6: syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:09 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:09 executing program 6: syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) [ 629.177389] audit: type=1326 audit(1529731449.171:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5093 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:09 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:09 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:09 executing program 6: syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000180)=[{0x6}]}) creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) connect(0xffffffffffffffff, &(0x7f00000001c0)=@xdp={0x2c}, 0x80) 05:24:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) [ 629.781789] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 629.792434] syz-executor1 cpuset=syz1 mems_allowed=0 [ 629.797821] CPU: 0 PID: 5128 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 629.804580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.814023] Call Trace: [ 629.816624] dump_stack+0x185/0x1d0 [ 629.820257] warn_alloc+0x430/0x690 [ 629.823898] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:24:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) [ 629.828743] ? kernel_poison_pages+0x40/0x360 [ 629.833246] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 629.838700] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 629.843655] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 629.848606] ? kmsan_set_origin_inline+0x6b/0x120 [ 629.853451] ? __msan_poison_alloca+0x15c/0x1d0 [ 629.858133] kmsan_alloc_page+0x82/0xe0 [ 629.862109] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 629.866865] ? kmsan_set_origin_inline+0x6b/0x120 [ 629.871739] ? __msan_poison_alloca+0x15c/0x1d0 [ 629.876408] ? __should_failslab+0x278/0x2a0 [ 629.880835] ? should_fail+0x57/0xab0 [ 629.884635] ? __should_failslab+0x278/0x2a0 [ 629.889045] ? kmsan_set_origin_inline+0x6b/0x120 [ 629.893894] ? __msan_poison_alloca+0x15c/0x1d0 [ 629.898579] ? kmsan_set_origin+0x9e/0x160 [ 629.902829] alloc_pages_vma+0x1555/0x17f0 [ 629.907074] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 629.912190] handle_mm_fault+0x44ca/0x7ed0 [ 629.916423] ? kmsan_set_origin_inline+0x6b/0x120 [ 629.921263] __do_page_fault+0xec6/0x1a10 [ 629.925422] do_page_fault+0xb7/0x250 [ 629.929208] ? page_fault+0x8/0x30 [ 629.932730] page_fault+0x1e/0x30 [ 629.936162] RIP: 0033:0x4075fa [ 629.939332] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 629.944676] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 629.951928] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 629.959176] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 629.966428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000099f35 [ 629.973680] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 629.980938] warn_alloc_show_mem: 1 callbacks suppressed [ 629.980941] Mem-Info: [ 629.988682] active_anon:189923 inactive_anon:76 isolated_anon:0 [ 629.988682] active_file:1264 inactive_file:642 isolated_file:0 [ 629.988682] unevictable:0 dirty:95 writeback:0 unstable:0 [ 629.988682] slab_reclaimable:3329 slab_unreclaimable:9490 [ 629.988682] mapped:66684 shmem:84 pagetables:1425 bounce:0 [ 629.988682] free:201994 free_pcp:397 free_cma:0 [ 630.021747] Node 0 active_anon:759692kB inactive_anon:304kB active_file:5056kB inactive_file:2568kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266736kB dirty:380kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 630.050629] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 630.076750] lowmem_reserve[]: 0 2817 7244 7244 [ 630.081325] Node 0 DMA32 free:456108kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:180kB inactive_file:4kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1400kB local_pcp:696kB free_cma:0kB [ 630.110216] lowmem_reserve[]: 0 0 4426 4426 [ 630.114532] Node 0 Normal free:335964kB min:41208kB low:51508kB high:61808kB active_anon:528928kB inactive_anon:304kB active_file:4780kB inactive_file:2964kB unevictable:0kB writepending:316kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3508kB bounce:0kB free_pcp:188kB local_pcp:100kB free_cma:0kB [ 630.144033] lowmem_reserve[]: 0 0 0 0 [ 630.147826] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 630.161029] Node 0 DMA32: 18671*4kB (UME) 14218*8kB (UME) 5776*16kB (UME) 1737*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456108kB [ 630.178337] Node 0 Normal: 13846*4kB (UME) 6315*8kB (UME) 2687*16kB (UME) 1896*32kB (UM) 1284*64kB (UM) 322*128kB (UM) 9*256kB (UM) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 335776kB [ 630.194680] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 630.203235] 2008 total pagecache pages [ 630.207099] 0 pages in swap cache [ 630.210545] Swap cache stats: add 0, delete 0, find 0/0 [ 630.215897] Free swap = 0kB [ 630.218891] Total swap = 0kB [ 630.221889] 1965969 pages RAM [ 630.224974] 0 pages HighMem/MovableOnly [ 630.228931] 106316 pages reserved [ 630.235947] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 630.246454] syz-executor6 cpuset=syz6 mems_allowed=0 [ 630.251581] CPU: 1 PID: 5136 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 630.258334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.267695] Call Trace: [ 630.270290] dump_stack+0x185/0x1d0 [ 630.273918] warn_alloc+0x430/0x690 [ 630.277554] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 630.282398] ? kernel_poison_pages+0x40/0x360 [ 630.286907] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 630.292367] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 630.297323] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 630.302271] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.307116] ? __msan_poison_alloca+0x15c/0x1d0 [ 630.311795] kmsan_alloc_page+0x82/0xe0 [ 630.315797] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 630.320553] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.325407] ? __msan_poison_alloca+0x15c/0x1d0 [ 630.330093] ? __should_failslab+0x278/0x2a0 [ 630.334500] ? should_fail+0x57/0xab0 [ 630.338370] ? __should_failslab+0x278/0x2a0 [ 630.342759] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.347597] ? __msan_poison_alloca+0x15c/0x1d0 [ 630.352260] ? kmsan_set_origin+0x9e/0x160 [ 630.356483] alloc_pages_vma+0x1555/0x17f0 [ 630.360708] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 630.365808] handle_mm_fault+0x44ca/0x7ed0 [ 630.370028] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.374876] __do_page_fault+0xec6/0x1a10 [ 630.379016] do_page_fault+0xb7/0x250 [ 630.382803] ? page_fault+0x8/0x30 05:24:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 05:24:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) [ 630.386355] page_fault+0x1e/0x30 [ 630.389794] RIP: 0033:0x4075fa [ 630.392970] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 630.398326] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 630.405582] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 630.412838] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 630.420093] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009a0fb [ 630.427351] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 630.467539] audit: type=1326 audit(1529731450.463:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5134 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) [ 630.505412] audit: type=1326 audit(1529731450.488:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5143 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 630.573951] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 630.584485] syz-executor1 cpuset=syz1 mems_allowed=0 [ 630.589608] CPU: 0 PID: 5152 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 630.596355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.605749] Call Trace: [ 630.608355] dump_stack+0x185/0x1d0 [ 630.611995] warn_alloc+0x430/0x690 [ 630.615640] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 630.620488] ? kernel_poison_pages+0x40/0x360 [ 630.624993] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 630.630456] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 630.635420] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 630.640373] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.645227] ? __msan_poison_alloca+0x15c/0x1d0 [ 630.649923] kmsan_alloc_page+0x82/0xe0 [ 630.654356] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 630.659122] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.663969] ? __msan_poison_alloca+0x15c/0x1d0 [ 630.668643] ? __should_failslab+0x278/0x2a0 [ 630.673059] ? should_fail+0x57/0xab0 [ 630.676863] ? __should_failslab+0x278/0x2a0 [ 630.681296] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.686145] ? __msan_poison_alloca+0x15c/0x1d0 [ 630.690825] ? kmsan_set_origin+0x9e/0x160 [ 630.695069] alloc_pages_vma+0x1555/0x17f0 [ 630.699315] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 630.704432] handle_mm_fault+0x44ca/0x7ed0 [ 630.708674] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.713536] __do_page_fault+0xec6/0x1a10 [ 630.717747] do_page_fault+0xb7/0x250 05:24:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) [ 630.721554] ? page_fault+0x8/0x30 [ 630.725996] page_fault+0x1e/0x30 [ 630.729446] RIP: 0033:0x4075fa [ 630.733412] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 630.738763] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 630.746034] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 630.753301] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 630.760577] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009a24d [ 630.767869] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 630.790174] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 630.800705] syz-executor6 cpuset=syz6 mems_allowed=0 [ 630.805834] CPU: 0 PID: 5159 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 630.812592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.821954] Call Trace: [ 630.824550] dump_stack+0x185/0x1d0 [ 630.828186] warn_alloc+0x430/0x690 [ 630.831829] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 630.836675] ? kernel_poison_pages+0x40/0x360 [ 630.841177] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 630.846634] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 630.851599] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 630.856598] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.861449] ? __msan_poison_alloca+0x15c/0x1d0 [ 630.866138] kmsan_alloc_page+0x82/0xe0 [ 630.870124] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 630.874888] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.879738] ? __msan_poison_alloca+0x15c/0x1d0 [ 630.884414] ? __should_failslab+0x278/0x2a0 [ 630.888842] ? should_fail+0x57/0xab0 [ 630.892655] ? __should_failslab+0x278/0x2a0 [ 630.897070] ? kmsan_set_origin_inline+0x6b/0x120 [ 630.901920] ? __msan_poison_alloca+0x15c/0x1d0 [ 630.906601] ? kmsan_set_origin+0x9e/0x160 [ 630.910857] alloc_pages_vma+0x1555/0x17f0 [ 630.915101] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 630.920226] handle_mm_fault+0x44ca/0x7ed0 [ 630.924484] __do_page_fault+0xec6/0x1a10 [ 630.928649] do_page_fault+0xb7/0x250 [ 630.932456] ? page_fault+0x8/0x30 [ 630.936005] page_fault+0x1e/0x30 [ 630.939456] RIP: 0033:0x4075fa [ 630.942639] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 630.948032] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 630.955302] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 630.962579] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 630.969856] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009a325 [ 630.977118] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 630.984395] warn_alloc_show_mem: 2 callbacks suppressed [ 630.984398] Mem-Info: [ 630.992172] active_anon:188890 inactive_anon:74 isolated_anon:0 [ 630.992172] active_file:962 inactive_file:676 isolated_file:0 [ 630.992172] unevictable:0 dirty:102 writeback:0 unstable:0 [ 630.992172] slab_reclaimable:3328 slab_unreclaimable:9492 [ 630.992172] mapped:66631 shmem:84 pagetables:1365 bounce:0 [ 630.992172] free:205303 free_pcp:493 free_cma:0 [ 631.025271] Node 0 active_anon:755560kB inactive_anon:296kB active_file:3848kB inactive_file:2704kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:266524kB dirty:408kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 631.053208] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 631.079367] lowmem_reserve[]: 0 2817 7244 7244 [ 631.083976] Node 0 DMA32 free:464424kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:24kB inactive_file:160kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1336kB local_pcp:696kB free_cma:0kB [ 631.112982] lowmem_reserve[]: 0 0 4426 4426 [ 631.117317] Node 0 Normal free:340884kB min:41208kB low:51508kB high:61808kB active_anon:526820kB inactive_anon:296kB active_file:3748kB inactive_file:2544kB unevictable:0kB writepending:348kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3268kB bounce:0kB free_pcp:636kB local_pcp:76kB free_cma:0kB [ 631.146737] lowmem_reserve[]: 0 0 0 0 [ 631.150534] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 631.163781] Node 0 DMA32: 18670*4kB (UME) 14222*8kB (UME) 5776*16kB (UME) 1740*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 4*2048kB (UM) 0*4096kB = 464424kB 05:24:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) [ 631.181500] Node 0 Normal: 14190*4kB (UME) 6334*8kB (UME) 2688*16kB (UME) 1894*32kB (UM) 1291*64kB (UM) 320*128kB (UM) 8*256kB (M) 0*512kB 0*1024kB 2*2048kB (UM) 0*4096kB = 340776kB [ 631.197899] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 631.206482] 1690 total pagecache pages [ 631.210363] 0 pages in swap cache [ 631.213795] Swap cache stats: add 0, delete 0, find 0/0 [ 631.219143] Free swap = 0kB [ 631.222146] Total swap = 0kB [ 631.225157] 1965969 pages RAM [ 631.228243] 0 pages HighMem/MovableOnly [ 631.232205] 106316 pages reserved 05:24:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) [ 631.289663] audit: type=1326 audit(1529731451.288:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5166 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:11 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) [ 631.466715] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 631.477239] syz-executor6 cpuset=syz6 mems_allowed=0 [ 631.482362] CPU: 0 PID: 5183 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 631.489116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.498472] Call Trace: [ 631.501062] dump_stack+0x185/0x1d0 [ 631.504686] warn_alloc+0x430/0x690 [ 631.508318] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 631.513183] ? kernel_poison_pages+0x40/0x360 [ 631.517679] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 631.523126] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 631.528072] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 631.533017] ? kmsan_set_origin_inline+0x6b/0x120 [ 631.537861] ? __msan_poison_alloca+0x15c/0x1d0 [ 631.542543] kmsan_alloc_page+0x82/0xe0 [ 631.546526] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 631.551282] ? kmsan_set_origin_inline+0x6b/0x120 [ 631.556131] ? __msan_poison_alloca+0x15c/0x1d0 [ 631.560799] ? __should_failslab+0x278/0x2a0 [ 631.565211] ? should_fail+0x57/0xab0 [ 631.569019] ? __should_failslab+0x278/0x2a0 [ 631.573433] ? kmsan_set_origin_inline+0x6b/0x120 [ 631.578277] ? __msan_poison_alloca+0x15c/0x1d0 [ 631.582946] ? kmsan_set_origin+0x9e/0x160 [ 631.587188] alloc_pages_vma+0x1555/0x17f0 [ 631.591430] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 631.596541] handle_mm_fault+0x44ca/0x7ed0 [ 631.600780] ? kmsan_set_origin_inline+0x6b/0x120 [ 631.605643] __do_page_fault+0xec6/0x1a10 [ 631.609802] do_page_fault+0xb7/0x250 [ 631.613612] ? page_fault+0x8/0x30 05:24:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x0, @multicast2=0xe0000002}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @multicast2=0xe0000002}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)='ip_vti0\x00'}) 05:24:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) [ 631.617157] page_fault+0x1e/0x30 [ 631.620608] RIP: 0033:0x4075fa [ 631.623797] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 631.629158] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 631.636430] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 631.643692] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 631.650953] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009a5ca [ 631.658224] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) [ 631.721743] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 631.733390] syz-executor3 cpuset=syz3 mems_allowed=0 [ 631.738520] CPU: 0 PID: 5192 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 631.745285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.754638] Call Trace: [ 631.757221] dump_stack+0x185/0x1d0 [ 631.760835] warn_alloc+0x430/0x690 [ 631.764471] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 631.769310] ? kernel_poison_pages+0x40/0x360 [ 631.773791] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 631.779225] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 631.784151] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 631.789083] ? kmsan_set_origin_inline+0x6b/0x120 [ 631.793910] ? __msan_poison_alloca+0x15c/0x1d0 [ 631.798574] kmsan_alloc_page+0x82/0xe0 [ 631.802544] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 631.807378] ? kmsan_set_origin_inline+0x6b/0x120 [ 631.813335] ? __msan_poison_alloca+0x15c/0x1d0 [ 631.817990] ? __should_failslab+0x278/0x2a0 [ 631.822388] ? should_fail+0x57/0xab0 [ 631.826172] ? __should_failslab+0x278/0x2a0 [ 631.830569] ? kmsan_set_origin_inline+0x6b/0x120 [ 631.835408] ? __msan_poison_alloca+0x15c/0x1d0 [ 631.840065] ? kmsan_set_origin+0x9e/0x160 [ 631.844288] alloc_pages_vma+0x1555/0x17f0 [ 631.848512] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 631.853617] handle_mm_fault+0x44ca/0x7ed0 [ 631.857846] ? kmsan_set_origin_inline+0x6b/0x120 [ 631.862684] __do_page_fault+0xec6/0x1a10 [ 631.866821] do_page_fault+0xb7/0x250 [ 631.870606] ? page_fault+0x8/0x30 [ 631.874129] page_fault+0x1e/0x30 [ 631.877568] RIP: 0033:0x4075fa [ 631.880741] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 631.886519] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 631.893769] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 631.901457] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 631.908725] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009a6c9 [ 631.915979] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 631.966578] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 631.977123] syz-executor6 cpuset=syz6 mems_allowed=0 [ 631.982253] CPU: 1 PID: 5201 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 631.989005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.998388] Call Trace: [ 632.000978] dump_stack+0x185/0x1d0 [ 632.004598] warn_alloc+0x430/0x690 [ 632.008216] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 632.013043] ? kernel_poison_pages+0x40/0x360 [ 632.017532] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 632.022970] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 632.027905] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 632.032830] ? kmsan_set_origin_inline+0x6b/0x120 [ 632.037663] ? __msan_poison_alloca+0x15c/0x1d0 [ 632.042326] kmsan_alloc_page+0x82/0xe0 [ 632.046291] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 632.051033] ? kmsan_set_origin_inline+0x6b/0x120 [ 632.055864] ? __msan_poison_alloca+0x15c/0x1d0 [ 632.060529] ? __should_failslab+0x278/0x2a0 [ 632.064927] ? should_fail+0x57/0xab0 [ 632.068715] ? __should_failslab+0x278/0x2a0 [ 632.073113] ? kmsan_set_origin_inline+0x6b/0x120 [ 632.077939] ? __msan_poison_alloca+0x15c/0x1d0 [ 632.082597] ? kmsan_set_origin+0x9e/0x160 [ 632.086823] alloc_pages_vma+0x1555/0x17f0 [ 632.091046] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 632.096146] handle_mm_fault+0x44ca/0x7ed0 [ 632.100375] ? kmsan_set_origin_inline+0x6b/0x120 [ 632.105211] __do_page_fault+0xec6/0x1a10 [ 632.109355] do_page_fault+0xb7/0x250 [ 632.113140] ? page_fault+0x8/0x30 [ 632.116664] page_fault+0x1e/0x30 [ 632.120099] RIP: 0033:0x4075fa [ 632.123289] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 632.128635] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 632.135889] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 632.143157] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 632.150429] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009a7be [ 632.157704] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 632.165141] warn_alloc_show_mem: 2 callbacks suppressed [ 632.165143] Mem-Info: [ 632.172994] active_anon:189453 inactive_anon:74 isolated_anon:0 [ 632.172994] active_file:1357 inactive_file:1452 isolated_file:0 [ 632.172994] unevictable:0 dirty:21 writeback:0 unstable:0 [ 632.172994] slab_reclaimable:3328 slab_unreclaimable:9493 [ 632.172994] mapped:67528 shmem:84 pagetables:1459 bounce:0 [ 632.172994] free:199857 free_pcp:436 free_cma:0 [ 632.206160] Node 0 active_anon:757812kB inactive_anon:296kB active_file:5428kB inactive_file:5808kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270112kB dirty:84kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 632.234105] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 632.260307] lowmem_reserve[]: 0 2817 7244 7244 [ 632.264895] Node 0 DMA32 free:456232kB min:26224kB low:32780kB high:39336kB active_anon:228684kB inactive_anon:0kB active_file:108kB inactive_file:16kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1336kB local_pcp:640kB free_cma:0kB [ 632.293986] lowmem_reserve[]: 0 0 4426 4426 [ 632.298315] Node 0 Normal free:327292kB min:41208kB low:51508kB high:61808kB active_anon:528836kB inactive_anon:296kB active_file:5320kB inactive_file:5676kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3644kB bounce:0kB free_pcp:408kB local_pcp:88kB free_cma:0kB [ 632.327651] lowmem_reserve[]: 0 0 0 0 [ 632.331447] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 632.344652] Node 0 DMA32: 18670*4kB (UME) 14222*8kB (UME) 5776*16kB (UME) 1740*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456232kB [ 632.361945] Node 0 Normal: 12782*4kB (ME) 6286*8kB (UME) 2672*16kB (UME) 1880*32kB (UM) 1269*64kB (UM) 309*128kB (UM) 7*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 326888kB [ 632.377883] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 632.386462] 2873 total pagecache pages [ 632.390341] 0 pages in swap cache [ 632.393778] Swap cache stats: add 0, delete 0, find 0/0 [ 632.399372] Free swap = 0kB [ 632.402382] Total swap = 0kB [ 632.405382] 1965969 pages RAM [ 632.408465] 0 pages HighMem/MovableOnly [ 632.412419] 106316 pages reserved 05:24:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 632.446053] audit: type=1326 audit(1529731452.444:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5200 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) [ 632.621086] audit: type=1326 audit(1529731452.619:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5211 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f6}]}) set_mempolicy(0x0, &(0x7f0000000300), 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) [ 632.926357] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 632.936891] syz-executor3 cpuset=syz3 mems_allowed=0 [ 632.942003] CPU: 0 PID: 5233 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 632.948741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.958081] Call Trace: [ 632.960664] dump_stack+0x185/0x1d0 [ 632.964281] warn_alloc+0x430/0x690 [ 632.967921] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 632.972751] ? kernel_poison_pages+0x40/0x360 [ 632.977235] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 632.982673] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 632.987608] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 632.992531] ? kmsan_set_origin_inline+0x6b/0x120 [ 632.997361] ? __msan_poison_alloca+0x15c/0x1d0 [ 633.002022] kmsan_alloc_page+0x82/0xe0 [ 633.005991] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 633.010731] ? kmsan_set_origin_inline+0x6b/0x120 [ 633.015563] ? __msan_poison_alloca+0x15c/0x1d0 [ 633.020217] ? __should_failslab+0x278/0x2a0 [ 633.024616] ? should_fail+0x57/0xab0 [ 633.028399] ? __should_failslab+0x278/0x2a0 [ 633.032794] ? kmsan_set_origin_inline+0x6b/0x120 [ 633.037624] ? __msan_poison_alloca+0x15c/0x1d0 [ 633.042279] ? kmsan_set_origin+0x9e/0x160 [ 633.046505] alloc_pages_vma+0x1555/0x17f0 [ 633.050743] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 633.055835] handle_mm_fault+0x44ca/0x7ed0 [ 633.060067] ? kmsan_set_origin_inline+0x6b/0x120 [ 633.064904] __do_page_fault+0xec6/0x1a10 [ 633.069044] do_page_fault+0xb7/0x250 [ 633.072833] ? page_fault+0x8/0x30 [ 633.076358] page_fault+0x1e/0x30 [ 633.079793] RIP: 0033:0x4075fa [ 633.082968] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 633.088319] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 633.095576] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 633.102828] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 633.110084] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009ab7d [ 633.117339] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) [ 633.223615] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 633.234184] syz-executor2 cpuset=syz2 mems_allowed=0 [ 633.239315] CPU: 1 PID: 5247 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 633.246084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.255445] Call Trace: [ 633.258044] dump_stack+0x185/0x1d0 [ 633.261692] warn_alloc+0x430/0x690 [ 633.265344] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 633.270197] ? kernel_poison_pages+0x40/0x360 [ 633.274714] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 633.280181] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 633.285143] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 633.290101] ? kmsan_set_origin_inline+0x6b/0x120 [ 633.294954] ? __msan_poison_alloca+0x15c/0x1d0 [ 633.299650] kmsan_alloc_page+0x82/0xe0 [ 633.303639] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 633.308440] ? kmsan_set_origin_inline+0x6b/0x120 [ 633.313296] ? __msan_poison_alloca+0x15c/0x1d0 [ 633.317974] ? __should_failslab+0x278/0x2a0 [ 633.322396] ? should_fail+0x57/0xab0 [ 633.326207] ? __should_failslab+0x278/0x2a0 [ 633.330635] ? kmsan_set_origin_inline+0x6b/0x120 [ 633.335506] ? __msan_poison_alloca+0x15c/0x1d0 [ 633.340194] ? kmsan_set_origin+0x9e/0x160 [ 633.344453] alloc_pages_vma+0x1555/0x17f0 [ 633.348708] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 633.353838] handle_mm_fault+0x44ca/0x7ed0 [ 633.358091] ? kmsan_set_origin_inline+0x6b/0x120 [ 633.362956] __do_page_fault+0xec6/0x1a10 [ 633.367124] do_page_fault+0xb7/0x250 [ 633.370935] ? page_fault+0x8/0x30 [ 633.374484] page_fault+0x1e/0x30 [ 633.377939] RIP: 0033:0x4075fa [ 633.381129] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 633.386499] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 633.393778] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 633.401051] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 633.408335] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009aca7 [ 633.415612] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 633.422898] warn_alloc_show_mem: 1 callbacks suppressed [ 633.422901] Mem-Info: [ 633.430691] active_anon:189932 inactive_anon:74 isolated_anon:0 [ 633.430691] active_file:1350 inactive_file:1364 isolated_file:0 [ 633.430691] unevictable:0 dirty:26 writeback:0 unstable:0 [ 633.430691] slab_reclaimable:3328 slab_unreclaimable:9493 [ 633.430691] mapped:67504 shmem:84 pagetables:1460 bounce:0 [ 633.430691] free:200086 free_pcp:541 free_cma:0 [ 633.463954] Node 0 active_anon:759728kB inactive_anon:296kB active_file:5400kB inactive_file:5456kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270016kB dirty:104kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 633.491880] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 633.518011] lowmem_reserve[]: 0 2817 7244 7244 [ 633.522590] Node 0 DMA32 free:456232kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:120kB inactive_file:4kB unevictable:0kB writepending:48kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1336kB local_pcp:640kB free_cma:0kB [ 633.551484] lowmem_reserve[]: 0 0 4426 4426 [ 633.555798] Node 0 Normal free:328208kB min:41208kB low:51508kB high:61808kB active_anon:528812kB inactive_anon:296kB active_file:5280kB inactive_file:5804kB unevictable:0kB writepending:56kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3648kB bounce:0kB free_pcp:708kB local_pcp:152kB free_cma:0kB [ 633.586040] lowmem_reserve[]: 0 0 0 0 [ 633.589839] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 633.603045] Node 0 DMA32: 18670*4kB (UME) 14222*8kB (UME) 5776*16kB (UME) 1740*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456232kB 05:24:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) [ 633.620344] Node 0 Normal: 12886*4kB (UME) 6299*8kB (UME) 2680*16kB (UME) 1883*32kB (UM) 1274*64kB (UM) 308*128kB (UM) 7*256kB (M) 1*512kB (M) 0*1024kB 0*2048kB 0*4096kB = 328336kB [ 633.636617] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 633.645175] 2799 total pagecache pages [ 633.649041] 0 pages in swap cache [ 633.652491] Swap cache stats: add 0, delete 0, find 0/0 [ 633.657854] Free swap = 0kB [ 633.660854] Total swap = 0kB [ 633.663854] 1965969 pages RAM [ 633.666948] 0 pages HighMem/MovableOnly [ 633.671003] 106316 pages reserved 05:24:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) accept$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000140)) 05:24:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f6}]}) set_mempolicy(0x0, &(0x7f0000000300), 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) [ 633.873454] audit: type=1326 audit(1529731453.872:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5267 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 633.910613] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 633.921617] syz-executor6 cpuset=syz6 mems_allowed=0 [ 633.926749] CPU: 1 PID: 5273 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 633.933504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.942861] Call Trace: [ 633.945465] dump_stack+0x185/0x1d0 [ 633.949102] warn_alloc+0x430/0x690 [ 633.952743] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 633.957615] ? kernel_poison_pages+0x40/0x360 [ 633.962129] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 633.967582] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 633.972544] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 633.977480] ? kmsan_set_origin_inline+0x6b/0x120 [ 633.982312] ? __msan_poison_alloca+0x15c/0x1d0 [ 633.987008] kmsan_alloc_page+0x82/0xe0 [ 633.990978] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 633.995742] ? kmsan_set_origin_inline+0x6b/0x120 [ 634.000572] ? __msan_poison_alloca+0x15c/0x1d0 [ 634.005229] ? __should_failslab+0x278/0x2a0 [ 634.009628] ? should_fail+0x57/0xab0 [ 634.013421] ? __should_failslab+0x278/0x2a0 [ 634.017818] ? kmsan_set_origin_inline+0x6b/0x120 [ 634.022653] ? __msan_poison_alloca+0x15c/0x1d0 [ 634.027325] ? kmsan_set_origin+0x9e/0x160 [ 634.031554] alloc_pages_vma+0x1555/0x17f0 [ 634.035788] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 634.040883] handle_mm_fault+0x44ca/0x7ed0 [ 634.045104] ? kmsan_set_origin_inline+0x6b/0x120 [ 634.049941] __do_page_fault+0xec6/0x1a10 [ 634.054090] do_page_fault+0xb7/0x250 [ 634.057875] ? page_fault+0x8/0x30 [ 634.061404] page_fault+0x1e/0x30 [ 634.064843] RIP: 0033:0x4075fa [ 634.068017] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:24:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 634.073364] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 634.080708] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 634.087966] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 634.095577] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009af56 [ 634.102833] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 634.168753] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 634.179291] syz-executor3 cpuset=syz3 mems_allowed=0 [ 634.184423] CPU: 0 PID: 5281 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 634.191187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.200550] Call Trace: [ 634.203175] dump_stack+0x185/0x1d0 [ 634.206822] warn_alloc+0x430/0x690 [ 634.210479] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 634.215337] ? kernel_poison_pages+0x40/0x360 [ 634.219850] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 634.225322] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 634.230292] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 634.235247] ? kmsan_set_origin_inline+0x6b/0x120 [ 634.240122] ? __msan_poison_alloca+0x15c/0x1d0 [ 634.244812] kmsan_alloc_page+0x82/0xe0 [ 634.248840] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 634.253612] ? kmsan_set_origin_inline+0x6b/0x120 [ 634.258480] ? __msan_poison_alloca+0x15c/0x1d0 [ 634.263258] ? __should_failslab+0x278/0x2a0 [ 634.267681] ? should_fail+0x57/0xab0 [ 634.271493] ? __should_failslab+0x278/0x2a0 [ 634.275916] ? kmsan_set_origin_inline+0x6b/0x120 [ 634.280785] ? __msan_poison_alloca+0x15c/0x1d0 [ 634.285465] ? kmsan_set_origin+0x9e/0x160 [ 634.289719] alloc_pages_vma+0x1555/0x17f0 [ 634.293964] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 634.299080] handle_mm_fault+0x44ca/0x7ed0 [ 634.303326] ? kmsan_set_origin_inline+0x6b/0x120 [ 634.308199] __do_page_fault+0xec6/0x1a10 [ 634.312366] do_page_fault+0xb7/0x250 [ 634.316168] ? page_fault+0x8/0x30 [ 634.319715] page_fault+0x1e/0x30 [ 634.323167] RIP: 0033:0x4075fa [ 634.326353] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 634.331718] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 634.338989] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 634.346263] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 634.353539] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009b058 [ 634.360820] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 634.371641] khugepaged: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 634.381905] khugepaged cpuset=/ mems_allowed=0 [ 634.386506] CPU: 1 PID: 803 Comm: khugepaged Not tainted 4.17.0+ #9 [ 634.392904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.402255] Call Trace: [ 634.404855] dump_stack+0x185/0x1d0 [ 634.408466] warn_alloc+0x430/0x690 [ 634.412087] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 634.416914] ? kernel_poison_pages+0x1a0/0x360 [ 634.421481] ? ret_from_fork+0x35/0x40 [ 634.425352] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 634.430788] ? __save_stack_trace+0x90d/0xb00 [ 634.435276] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 634.440192] ? __list_add_valid+0xb8/0x450 [ 634.444420] ? __alloc_pages_nodemask+0xaa2/0x5cc0 [ 634.449336] kmsan_alloc_page+0x82/0xe0 [ 634.453291] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 634.458028] ? kmem_cache_free+0xec/0x2bc0 [ 634.462250] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 634.467592] ? kmem_cache_free+0x89d/0x2bc0 [ 634.471896] ? __mmdrop+0x91c/0x930 [ 634.475594] ? kmsan_set_origin_inline+0x6b/0x120 [ 634.480415] ? __msan_poison_alloca+0x15c/0x1d0 [ 634.485068] ? _cond_resched+0x3c/0xd0 [ 634.488937] ? _vm_normal_page+0xd8/0x420 [ 634.493076] khugepaged_do_scan+0x8c16/0xf190 [ 634.497556] ? pick_next_task_fair+0x22c9/0x2530 [ 634.502299] ? kmsan_set_origin_inline+0x6b/0x120 [ 634.507126] ? __msan_poison_alloca+0x15c/0x1d0 [ 634.511792] khugepaged+0xca/0xbc0 [ 634.515313] ? init_wait_entry+0x1a0/0x1a0 [ 634.519536] kthread+0x4db/0x6c0 [ 634.522886] ? start_stop_khugepaged+0x790/0x790 [ 634.527624] ? kthread_blkcg+0xf0/0xf0 [ 634.531493] ret_from_fork+0x35/0x40 [ 634.535195] warn_alloc_show_mem: 2 callbacks suppressed [ 634.535197] Mem-Info: [ 634.542957] active_anon:189922 inactive_anon:76 isolated_anon:14 [ 634.542957] active_file:822 inactive_file:919 isolated_file:0 [ 634.542957] unevictable:0 dirty:40 writeback:0 unstable:0 [ 634.542957] slab_reclaimable:3328 slab_unreclaimable:9493 [ 634.542957] mapped:66864 shmem:84 pagetables:1469 bounce:0 [ 634.542957] free:201600 free_pcp:585 free_cma:0 [ 634.576034] Node 0 active_anon:759688kB inactive_anon:304kB active_file:3288kB inactive_file:3676kB unevictable:0kB isolated(anon):56kB isolated(file):0kB mapped:267456kB dirty:160kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 634.604039] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 634.630152] lowmem_reserve[]: 0 2817 7244 7244 [ 634.634735] Node 0 DMA32 free:456232kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1336kB local_pcp:640kB free_cma:0kB [ 634.663630] lowmem_reserve[]: 0 0 4426 4426 [ 634.667941] Node 0 Normal free:334264kB min:41208kB low:51508kB high:61808kB active_anon:529044kB inactive_anon:304kB active_file:3692kB inactive_file:3668kB unevictable:0kB writepending:96kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3684kB bounce:0kB free_pcp:1004kB local_pcp:304kB free_cma:0kB [ 634.697459] lowmem_reserve[]: 0 0 0 0 [ 634.701267] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 634.714472] Node 0 DMA32: 18670*4kB (UME) 14222*8kB (UME) 5776*16kB (UME) 1740*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456232kB [ 634.731775] Node 0 Normal: 14042*4kB (UME) 6384*8kB (UME) 2705*16kB (UME) 1892*32kB (UM) 1261*64kB (UM) 304*128kB (UM) 4*256kB (M) 3*512kB (UM) 1*1024kB (M) 0*2048kB 0*4096kB = 334264kB [ 634.748480] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 634.757033] 1839 total pagecache pages [ 634.760910] 0 pages in swap cache [ 634.764343] Swap cache stats: add 0, delete 0, find 0/0 [ 634.769680] Free swap = 0kB [ 634.772675] Total swap = 0kB [ 634.775672] 1965969 pages RAM [ 634.778755] 0 pages HighMem/MovableOnly [ 634.782707] 106316 pages reserved 05:24:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) [ 634.917963] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 634.918194] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 634.928533] syz-executor6 cpuset= [ 634.939001] syz-executor5 cpuset= [ 634.939003] syz6 mems_allowed=0 [ 634.942445] syz5 [ 634.945881] CPU: 1 PID: 5291 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 634.949125] mems_allowed=0 [ 634.951077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.970115] Call Trace: [ 634.972707] dump_stack+0x185/0x1d0 [ 634.976320] warn_alloc+0x430/0x690 [ 634.979950] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 634.985018] ? kernel_poison_pages+0x40/0x360 [ 634.989583] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 634.995018] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 634.999949] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 635.004959] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.009787] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.014446] kmsan_alloc_page+0x82/0xe0 [ 635.018408] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 635.023151] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.027979] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.032643] ? __should_failslab+0x278/0x2a0 [ 635.037039] ? should_fail+0x57/0xab0 [ 635.040823] ? __should_failslab+0x278/0x2a0 [ 635.045215] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.050040] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.054699] ? kmsan_set_origin+0x9e/0x160 [ 635.058935] alloc_pages_vma+0x1555/0x17f0 [ 635.063162] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 635.068258] handle_mm_fault+0x44ca/0x7ed0 [ 635.072478] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.077317] __do_page_fault+0xec6/0x1a10 [ 635.081455] do_page_fault+0xb7/0x250 [ 635.085239] ? page_fault+0x8/0x30 [ 635.088783] page_fault+0x1e/0x30 [ 635.092218] RIP: 0033:0x4075fa [ 635.095392] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 635.100739] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 635.108001] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 635.115254] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 635.122507] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009b345 [ 635.129762] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 635.137029] CPU: 0 PID: 5292 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 635.144222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.153582] Call Trace: [ 635.156174] dump_stack+0x185/0x1d0 [ 635.159803] warn_alloc+0x430/0x690 [ 635.163440] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 635.168283] ? kernel_poison_pages+0x40/0x360 [ 635.172785] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 635.178242] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 635.183191] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 635.188309] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.193186] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.197869] kmsan_alloc_page+0x82/0xe0 [ 635.201854] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 635.206618] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.211462] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.216225] ? __should_failslab+0x278/0x2a0 [ 635.220639] ? should_fail+0x57/0xab0 [ 635.224443] ? __should_failslab+0x278/0x2a0 [ 635.228854] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.233700] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.238368] ? kmsan_set_origin+0x9e/0x160 [ 635.242598] alloc_pages_vma+0x1555/0x17f0 [ 635.246822] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 635.251920] handle_mm_fault+0x44ca/0x7ed0 [ 635.256141] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.260986] __do_page_fault+0xec6/0x1a10 [ 635.265129] do_page_fault+0xb7/0x250 [ 635.268912] ? page_fault+0x8/0x30 [ 635.272432] page_fault+0x1e/0x30 [ 635.275865] RIP: 0033:0x4075fa [ 635.279052] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 635.284655] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 635.291908] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 635.299161] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 635.306416] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009b345 05:24:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) [ 635.313670] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) [ 635.440188] audit: type=1326 audit(1529731455.438:1266): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5294 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 635.519802] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 635.530313] syz-executor4 cpuset=syz4 mems_allowed=0 [ 635.535871] CPU: 0 PID: 5310 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 635.542625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.551982] Call Trace: [ 635.554583] dump_stack+0x185/0x1d0 [ 635.558221] warn_alloc+0x430/0x690 [ 635.561861] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 635.566712] ? kernel_poison_pages+0x40/0x360 [ 635.571211] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 635.576669] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 635.581624] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 635.586571] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.591423] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.596116] kmsan_alloc_page+0x82/0xe0 [ 635.600095] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 635.605294] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.610141] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.614813] ? __should_failslab+0x278/0x2a0 [ 635.619224] ? should_fail+0x57/0xab0 [ 635.623023] ? __should_failslab+0x278/0x2a0 [ 635.627459] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.632309] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.636986] ? kmsan_set_origin+0x9e/0x160 [ 635.641238] alloc_pages_vma+0x1555/0x17f0 [ 635.645484] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 635.650613] handle_mm_fault+0x44ca/0x7ed0 [ 635.654853] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.659704] __do_page_fault+0xec6/0x1a10 [ 635.663857] do_page_fault+0xb7/0x250 05:24:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) [ 635.667662] ? page_fault+0x8/0x30 [ 635.671202] page_fault+0x1e/0x30 [ 635.674649] RIP: 0033:0x4075fa [ 635.677832] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 635.683198] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 635.690467] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 635.697726] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 635.704990] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009b59f [ 635.712245] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 635.778683] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 635.789224] syz-executor0 cpuset=syz0 mems_allowed=0 [ 635.794349] CPU: 0 PID: 5321 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 635.801187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.810543] Call Trace: [ 635.813144] dump_stack+0x185/0x1d0 [ 635.816779] warn_alloc+0x430/0x690 [ 635.820432] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 635.825280] ? kernel_poison_pages+0x40/0x360 [ 635.829790] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 635.835242] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 635.840196] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 635.845145] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.849996] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.854661] kmsan_alloc_page+0x82/0xe0 [ 635.858638] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 635.863379] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.868202] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.872851] ? __should_failslab+0x278/0x2a0 [ 635.877255] ? should_fail+0x57/0xab0 [ 635.881046] ? __should_failslab+0x278/0x2a0 [ 635.885446] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.890273] ? __msan_poison_alloca+0x15c/0x1d0 [ 635.894926] ? kmsan_set_origin+0x9e/0x160 [ 635.899151] alloc_pages_vma+0x1555/0x17f0 [ 635.903399] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 635.908488] handle_mm_fault+0x44ca/0x7ed0 [ 635.912704] ? kmsan_set_origin_inline+0x6b/0x120 [ 635.917540] __do_page_fault+0xec6/0x1a10 [ 635.921682] do_page_fault+0xb7/0x250 [ 635.925469] ? page_fault+0x8/0x30 [ 635.928997] page_fault+0x1e/0x30 [ 635.932431] RIP: 0033:0x4075fa [ 635.935605] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 635.940948] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 635.948202] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 635.955463] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 635.962716] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009b6a2 [ 635.969986] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 635.977248] warn_alloc_show_mem: 3 callbacks suppressed [ 635.977250] Mem-Info: [ 635.985346] active_anon:189916 inactive_anon:76 isolated_anon:7 [ 635.985346] active_file:1635 inactive_file:1121 isolated_file:0 [ 635.985346] unevictable:0 dirty:58 writeback:0 unstable:0 [ 635.985346] slab_reclaimable:3325 slab_unreclaimable:9501 [ 635.985346] mapped:67549 shmem:84 pagetables:1450 bounce:0 [ 635.985346] free:204112 free_pcp:536 free_cma:0 [ 636.018507] Node 0 active_anon:759664kB inactive_anon:304kB active_file:6540kB inactive_file:4484kB unevictable:0kB isolated(anon):28kB isolated(file):0kB mapped:270196kB dirty:232kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 636.046513] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 636.072718] lowmem_reserve[]: 0 2817 7244 7244 [ 636.077293] Node 0 DMA32 free:456232kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:56kB inactive_file:68kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1336kB local_pcp:696kB free_cma:0kB [ 636.106192] lowmem_reserve[]: 0 0 4426 4426 [ 636.110504] Node 0 Normal free:344312kB min:41208kB low:51508kB high:61808kB active_anon:528896kB inactive_anon:304kB active_file:6484kB inactive_file:4536kB unevictable:0kB writepending:168kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8384kB pagetables:3608kB bounce:0kB free_pcp:808kB local_pcp:108kB free_cma:0kB [ 636.140000] lowmem_reserve[]: 0 0 0 0 [ 636.143790] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 636.156993] Node 0 DMA32: 18670*4kB (UME) 14222*8kB (UME) 5776*16kB (UME) 1740*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456232kB [ 636.174285] Node 0 Normal: 13449*4kB (UME) 6675*8kB (UME) 2881*16kB (UME) 1943*32kB (UM) 1254*64kB (UM) 290*128kB (UM) 11*256kB (UM) 9*512kB (M) 4*1024kB (M) 0*2048kB 0*4096kB = 344364kB [ 636.191150] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 636.199741] 2841 total pagecache pages [ 636.203625] 0 pages in swap cache [ 636.207057] Swap cache stats: add 0, delete 0, find 0/0 [ 636.212407] Free swap = 0kB [ 636.215402] Total swap = 0kB [ 636.218402] 1965969 pages RAM [ 636.221483] 0 pages HighMem/MovableOnly [ 636.225435] 106316 pages reserved 05:24:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 636.233245] audit: type=1326 audit(1529731456.230:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5291 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) 05:24:16 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) [ 636.417868] audit: type=1326 audit(1529731456.416:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5331 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 636.621168] audit: type=1326 audit(1529731456.619:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5344 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 636.631486] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 636.651867] syz-executor5 cpuset=syz5 mems_allowed=0 [ 636.656988] CPU: 0 PID: 5350 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 636.663737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.673088] Call Trace: [ 636.675684] dump_stack+0x185/0x1d0 [ 636.679318] warn_alloc+0x430/0x690 [ 636.682955] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 636.687793] ? kernel_poison_pages+0x40/0x360 [ 636.692392] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 636.697836] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 636.702794] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 636.707722] ? kmsan_set_origin_inline+0x6b/0x120 [ 636.712577] ? __msan_poison_alloca+0x15c/0x1d0 [ 636.717234] kmsan_alloc_page+0x82/0xe0 [ 636.721195] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 636.726772] ? kmsan_set_origin_inline+0x6b/0x120 [ 636.731615] ? __msan_poison_alloca+0x15c/0x1d0 [ 636.736265] ? __should_failslab+0x278/0x2a0 [ 636.740676] ? should_fail+0x57/0xab0 [ 636.744458] ? __should_failslab+0x278/0x2a0 [ 636.748857] ? kmsan_set_origin_inline+0x6b/0x120 [ 636.753682] ? __msan_poison_alloca+0x15c/0x1d0 [ 636.758337] ? kmsan_set_origin+0x9e/0x160 [ 636.762577] alloc_pages_vma+0x1555/0x17f0 [ 636.766812] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 636.771909] handle_mm_fault+0x44ca/0x7ed0 [ 636.776126] ? kmsan_set_origin_inline+0x6b/0x120 [ 636.780966] __do_page_fault+0xec6/0x1a10 [ 636.785109] do_page_fault+0xb7/0x250 [ 636.788891] ? page_fault+0x8/0x30 [ 636.792434] page_fault+0x1e/0x30 [ 636.795870] RIP: 0033:0x4075fa [ 636.799051] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 636.804396] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 636.811661] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 05:24:16 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) [ 636.818915] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 636.826169] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009b9f7 [ 636.833424] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) [ 636.955205] audit: type=1326 audit(1529731456.953:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5360 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 636.995910] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 637.006450] syz-executor1 cpuset=syz1 mems_allowed=0 [ 637.011656] CPU: 0 PID: 5364 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 637.018415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.027772] Call Trace: [ 637.030369] dump_stack+0x185/0x1d0 [ 637.034005] warn_alloc+0x430/0x690 [ 637.037652] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 637.042501] ? kernel_poison_pages+0x40/0x360 [ 637.047006] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 637.052470] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 637.057429] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 637.062469] ? kmsan_set_origin_inline+0x6b/0x120 [ 637.067329] ? __msan_poison_alloca+0x15c/0x1d0 [ 637.072014] kmsan_alloc_page+0x82/0xe0 [ 637.076007] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 637.080775] ? kmsan_set_origin_inline+0x6b/0x120 [ 637.085625] ? __msan_poison_alloca+0x15c/0x1d0 [ 637.090303] ? __should_failslab+0x278/0x2a0 [ 637.094721] ? should_fail+0x57/0xab0 [ 637.098525] ? __should_failslab+0x278/0x2a0 [ 637.102957] ? kmsan_set_origin_inline+0x6b/0x120 [ 637.107809] ? __msan_poison_alloca+0x15c/0x1d0 [ 637.112484] ? kmsan_set_origin+0x9e/0x160 [ 637.116727] alloc_pages_vma+0x1555/0x17f0 [ 637.120969] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 637.126083] handle_mm_fault+0x44ca/0x7ed0 [ 637.130319] ? kmsan_set_origin_inline+0x6b/0x120 [ 637.135207] __do_page_fault+0xec6/0x1a10 [ 637.139379] do_page_fault+0xb7/0x250 [ 637.143178] ? page_fault+0x8/0x30 [ 637.146706] page_fault+0x1e/0x30 [ 637.150140] RIP: 0033:0x4075fa [ 637.153311] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 637.158657] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 637.165908] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 637.173161] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 637.180414] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009bb61 [ 637.187681] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 637.194953] warn_alloc_show_mem: 1 callbacks suppressed [ 637.194956] Mem-Info: [ 637.202701] active_anon:189986 inactive_anon:74 isolated_anon:6 [ 637.202701] active_file:792 inactive_file:677 isolated_file:32 [ 637.202701] unevictable:0 dirty:64 writeback:0 unstable:0 [ 637.202701] slab_reclaimable:3325 slab_unreclaimable:9503 [ 637.202701] mapped:66759 shmem:84 pagetables:1455 bounce:0 [ 637.202701] free:207188 free_pcp:520 free_cma:0 [ 637.235795] Node 0 active_anon:759944kB inactive_anon:296kB active_file:3168kB inactive_file:2708kB unevictable:0kB isolated(anon):24kB isolated(file):128kB mapped:267036kB dirty:256kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 637.264333] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 637.290448] lowmem_reserve[]: 0 2817 7244 7244 [ 637.295041] Node 0 DMA32 free:456232kB min:26224kB low:32780kB high:39336kB active_anon:230732kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1336kB local_pcp:696kB free_cma:0kB [ 637.323939] lowmem_reserve[]: 0 0 4426 4426 [ 637.328259] Node 0 Normal free:356616kB min:41208kB low:51508kB high:61808kB active_anon:529256kB inactive_anon:296kB active_file:3272kB inactive_file:2804kB unevictable:0kB writepending:192kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3628kB bounce:0kB free_pcp:744kB local_pcp:104kB free_cma:0kB [ 637.357763] lowmem_reserve[]: 0 0 0 0 [ 637.361569] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 637.374782] Node 0 DMA32: 18670*4kB (UME) 14222*8kB (UME) 5776*16kB (UME) 1740*32kB (UM) 614*64kB (UME) 234*128kB (UME) 85*256kB (UM) 30*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 456232kB [ 637.392086] Node 0 Normal: 14211*4kB (UME) 6884*8kB (UME) 3054*16kB (UME) 1991*32kB (UM) 1261*64kB (UM) 278*128kB (UM) 14*256kB (UM) 12*512kB (UM) 6*1024kB (M) 0*2048kB 0*4096kB = 356652kB [ 637.409090] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 637.417648] 1522 total pagecache pages [ 637.421516] 0 pages in swap cache [ 637.424948] Swap cache stats: add 0, delete 0, find 0/0 [ 637.430291] Free swap = 0kB [ 637.433289] Total swap = 0kB [ 637.436294] 1965969 pages RAM [ 637.439374] 0 pages HighMem/MovableOnly [ 637.443325] 106316 pages reserved 05:24:17 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) syslog(0x0, &(0x7f0000001900)=""/178, 0xb2) accept$alg(0xffffffffffffff9c, 0x0, 0x0) 05:24:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 637.747711] audit: type=1326 audit(1529731457.746:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5383 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:17 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:17 executing program 5: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:18 executing program 5: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) [ 638.077386] audit: type=1326 audit(1529731458.075:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5407 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:18 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:18 executing program 1: mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:18 executing program 5: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:18 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:18 executing program 0: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) [ 638.683450] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 638.693981] syz-executor2 cpuset=syz2 mems_allowed=0 [ 638.699097] CPU: 1 PID: 5443 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 638.705831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.715168] Call Trace: [ 638.717746] dump_stack+0x185/0x1d0 [ 638.721361] warn_alloc+0x430/0x690 [ 638.724988] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 638.730089] ? kernel_poison_pages+0x40/0x360 [ 638.734576] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 638.740011] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 638.744937] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 638.749867] kmsan_alloc_page+0x82/0xe0 [ 638.753826] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 638.758563] ? kmsan_set_origin_inline+0x6b/0x120 [ 638.763396] ? __msan_poison_alloca+0x15c/0x1d0 [ 638.768076] ? __should_failslab+0x278/0x2a0 [ 638.772467] ? should_fail+0x57/0xab0 [ 638.776246] ? __should_failslab+0x278/0x2a0 [ 638.780636] ? kmsan_set_origin_inline+0x6b/0x120 [ 638.785460] ? __msan_poison_alloca+0x15c/0x1d0 [ 638.790150] ? kmsan_set_origin+0x9e/0x160 [ 638.794374] alloc_pages_vma+0x1555/0x17f0 [ 638.798596] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 638.803687] handle_mm_fault+0x44ca/0x7ed0 [ 638.807907] ? kmsan_set_origin_inline+0x6b/0x120 [ 638.812774] __do_page_fault+0xec6/0x1a10 [ 638.816911] do_page_fault+0xb7/0x250 [ 638.820694] ? page_fault+0x8/0x30 [ 638.824217] page_fault+0x1e/0x30 [ 638.827649] RIP: 0033:0x4075fa [ 638.830820] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 638.836163] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 638.843413] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 638.850662] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 638.857915] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009c1fb [ 638.865168] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 638.872422] Mem-Info: [ 638.874828] active_anon:185549 inactive_anon:78 isolated_anon:0 [ 638.874828] active_file:1513 inactive_file:1249 isolated_file:0 [ 638.874828] unevictable:0 dirty:70 writeback:0 unstable:0 [ 638.874828] slab_reclaimable:3322 slab_unreclaimable:9496 [ 638.874828] mapped:67245 shmem:84 pagetables:1471 bounce:0 [ 638.874828] free:209339 free_pcp:449 free_cma:0 [ 638.907992] Node 0 active_anon:742196kB inactive_anon:312kB active_file:6052kB inactive_file:4996kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268980kB dirty:280kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 638.935908] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 638.962016] lowmem_reserve[]: 0 2817 7244 7244 [ 638.966585] Node 0 DMA32 free:473904kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:64kB inactive_file:60kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1296kB local_pcp:640kB free_cma:0kB [ 638.995644] lowmem_reserve[]: 0 0 4426 4426 [ 638.999954] Node 0 Normal free:347548kB min:41208kB low:51508kB high:61808kB active_anon:528888kB inactive_anon:312kB active_file:5988kB inactive_file:4936kB unevictable:0kB writepending:216kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3692kB bounce:0kB free_pcp:500kB local_pcp:204kB free_cma:0kB [ 639.029548] lowmem_reserve[]: 0 0 0 0 [ 639.033340] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 639.046546] Node 0 DMA32: 18704*4kB (UME) 14266*8kB (UME) 5808*16kB (UME) 1771*32kB (UM) 641*64kB (UME) 257*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 1*2048kB (U) 0*4096kB = 473904kB [ 639.064276] Node 0 Normal: 11765*4kB (UME) 6841*8kB (UME) 3048*16kB (UME) 1998*32kB (UM) 1252*64kB (UM) 276*128kB (UM) 10*256kB (UM) 9*512kB (UM) 6*1024kB (M) 2*2048kB (UM) 0*4096kB = 347356kB [ 639.081576] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 639.090132] 2846 total pagecache pages [ 639.093999] 0 pages in swap cache [ 639.097439] Swap cache stats: add 0, delete 0, find 0/0 [ 639.102777] Free swap = 0kB [ 639.105769] Total swap = 0kB [ 639.108767] 1965969 pages RAM [ 639.111852] 0 pages HighMem/MovableOnly [ 639.115803] 106316 pages reserved 05:24:19 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:19 executing program 1: mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 05:24:19 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:19 executing program 0: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) [ 639.280141] audit: type=1326 audit(1529731459.278:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5458 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:19 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:19 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:19 executing program 1: mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:19 executing program 0: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:19 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:19 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) [ 640.204291] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 640.214824] syz-executor6 cpuset=syz6 mems_allowed=0 [ 640.219944] CPU: 0 PID: 5520 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 640.226691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.236038] Call Trace: [ 640.238633] dump_stack+0x185/0x1d0 [ 640.242260] warn_alloc+0x430/0x690 [ 640.245898] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 640.250739] ? kernel_poison_pages+0x40/0x360 [ 640.255242] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 640.260691] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 640.265624] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 640.270563] kmsan_alloc_page+0x82/0xe0 [ 640.274522] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 640.279278] ? kmsan_set_origin_inline+0x6b/0x120 [ 640.284106] ? __msan_poison_alloca+0x15c/0x1d0 [ 640.288759] ? __should_failslab+0x278/0x2a0 [ 640.293153] ? should_fail+0x57/0xab0 [ 640.296934] ? __should_failslab+0x278/0x2a0 [ 640.301329] ? kmsan_set_origin_inline+0x6b/0x120 [ 640.306156] ? __msan_poison_alloca+0x15c/0x1d0 [ 640.310810] ? kmsan_set_origin+0x9e/0x160 [ 640.315036] alloc_pages_vma+0x1555/0x17f0 [ 640.319260] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 640.324358] handle_mm_fault+0x44ca/0x7ed0 [ 640.328581] ? kmsan_set_origin_inline+0x6b/0x120 [ 640.333418] __do_page_fault+0xec6/0x1a10 [ 640.337558] do_page_fault+0xb7/0x250 [ 640.341341] ? page_fault+0x8/0x30 [ 640.344864] page_fault+0x1e/0x30 [ 640.348299] RIP: 0033:0x4075fa [ 640.351471] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 640.356820] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 640.364086] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 640.371341] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 640.378595] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009c7eb [ 640.385939] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 640.393197] Mem-Info: [ 640.395612] active_anon:185024 inactive_anon:78 isolated_anon:0 [ 640.395612] active_file:1537 inactive_file:1223 isolated_file:0 [ 640.395612] unevictable:0 dirty:75 writeback:0 unstable:0 [ 640.395612] slab_reclaimable:3322 slab_unreclaimable:9481 [ 640.395612] mapped:67402 shmem:84 pagetables:1446 bounce:0 [ 640.395612] free:209738 free_pcp:437 free_cma:0 [ 640.428891] Node 0 active_anon:740096kB inactive_anon:312kB active_file:6148kB inactive_file:4892kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269608kB dirty:300kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 301056kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 640.456813] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 640.482926] lowmem_reserve[]: 0 2817 7244 7244 [ 640.487509] Node 0 DMA32 free:484144kB min:26224kB low:32780kB high:39336kB active_anon:209212kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1296kB local_pcp:656kB free_cma:0kB [ 640.516403] lowmem_reserve[]: 0 0 4426 4426 [ 640.520716] Node 0 Normal free:338904kB min:41208kB low:51508kB high:61808kB active_anon:530884kB inactive_anon:312kB active_file:6024kB inactive_file:4892kB unevictable:0kB writepending:236kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3592kB bounce:0kB free_pcp:452kB local_pcp:180kB free_cma:0kB [ 640.550213] lowmem_reserve[]: 0 0 0 0 [ 640.554123] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 640.567331] Node 0 DMA32: 18704*4kB (UME) 14266*8kB (UME) 5808*16kB (UME) 1771*32kB (UM) 641*64kB (UME) 257*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 6*2048kB (UM) 0*4096kB = 484144kB [ 640.585145] Node 0 Normal: 11768*4kB (UME) 6235*8kB (UME) 3048*16kB (UME) 2001*32kB (UM) 1258*64kB (UM) 276*128kB (UM) 10*256kB (UM) 9*512kB (UM) 6*1024kB (M) 0*2048kB 0*4096kB = 338904kB [ 640.602190] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 640.610741] 2844 total pagecache pages [ 640.614607] 0 pages in swap cache [ 640.618037] Swap cache stats: add 0, delete 0, find 0/0 [ 640.623383] Free swap = 0kB [ 640.626377] Total swap = 0kB [ 640.629372] 1965969 pages RAM [ 640.632980] 0 pages HighMem/MovableOnly [ 640.636934] 106316 pages reserved 05:24:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:20 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:21 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) [ 641.200089] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 641.210624] syz-executor5 cpuset=syz5 mems_allowed=0 [ 641.216094] CPU: 0 PID: 5572 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 641.222849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.232205] Call Trace: [ 641.234811] dump_stack+0x185/0x1d0 [ 641.238427] warn_alloc+0x430/0x690 [ 641.242052] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 641.246900] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 641.252345] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 641.257295] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 641.262227] kmsan_alloc_page+0x82/0xe0 [ 641.266205] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 641.270947] ? kmsan_set_origin_inline+0x6b/0x120 [ 641.275863] ? __msan_poison_alloca+0x15c/0x1d0 [ 641.280537] ? __should_failslab+0x278/0x2a0 [ 641.284943] ? should_fail+0x57/0xab0 [ 641.288731] ? __should_failslab+0x278/0x2a0 [ 641.293125] ? kmsan_set_origin_inline+0x6b/0x120 [ 641.297960] ? __msan_poison_alloca+0x15c/0x1d0 [ 641.302625] ? kmsan_set_origin+0x9e/0x160 [ 641.306865] alloc_pages_vma+0x1555/0x17f0 [ 641.311091] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 641.316183] handle_mm_fault+0x44ca/0x7ed0 [ 641.320403] ? kmsan_set_origin_inline+0x6b/0x120 [ 641.325240] __do_page_fault+0xec6/0x1a10 [ 641.329379] do_page_fault+0xb7/0x250 [ 641.333166] ? page_fault+0x8/0x30 [ 641.336695] page_fault+0x1e/0x30 [ 641.340131] RIP: 0033:0x4075fa [ 641.343305] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:24:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 641.348653] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 641.355908] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 641.363164] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 641.370416] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009cbcf [ 641.377671] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:21 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:21 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) [ 641.778693] audit: type=1326 audit(1529731461.777:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5595 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 641.823327] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 641.823354] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 641.833853] syz-executor6 cpuset= [ 641.844322] syz-executor1 cpuset= [ 641.844325] syz6 mems_allowed=0 [ 641.847756] syz1 [ 641.851190] CPU: 0 PID: 5619 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 641.854439] mems_allowed=0 [ 641.856405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.875365] Call Trace: [ 641.877944] dump_stack+0x185/0x1d0 [ 641.881562] warn_alloc+0x430/0x690 [ 641.885182] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 641.890010] ? kernel_poison_pages+0x40/0x360 [ 641.894496] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 641.899943] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 641.904877] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 641.909887] ? kmsan_set_origin_inline+0x6b/0x120 [ 641.914731] ? __msan_poison_alloca+0x15c/0x1d0 [ 641.919393] kmsan_alloc_page+0x82/0xe0 [ 641.923355] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 641.928094] ? kmsan_set_origin_inline+0x6b/0x120 [ 641.932933] ? __msan_poison_alloca+0x15c/0x1d0 [ 641.937586] ? __should_failslab+0x278/0x2a0 [ 641.941982] ? should_fail+0x57/0xab0 [ 641.945764] ? __should_failslab+0x278/0x2a0 [ 641.950170] ? kmsan_set_origin_inline+0x6b/0x120 [ 641.954997] ? __msan_poison_alloca+0x15c/0x1d0 [ 641.959649] ? kmsan_set_origin+0x9e/0x160 [ 641.963886] alloc_pages_vma+0x1555/0x17f0 [ 641.968113] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 641.973313] handle_mm_fault+0x44ca/0x7ed0 [ 641.977532] ? kmsan_set_origin_inline+0x6b/0x120 [ 641.982378] __do_page_fault+0xec6/0x1a10 [ 641.986531] do_page_fault+0xb7/0x250 [ 641.990329] ? page_fault+0x8/0x30 [ 641.993861] page_fault+0x1e/0x30 [ 641.997299] RIP: 0033:0x4075fa [ 642.000473] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 642.005821] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 642.013080] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 642.020340] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 642.027606] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009ce3e [ 642.034863] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 642.042136] warn_alloc_show_mem: 1 callbacks suppressed [ 642.042144] CPU: 1 PID: 5618 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 642.042146] Mem-Info: [ 642.042171] active_anon:186097 inactive_anon:73 isolated_anon:0 [ 642.042171] active_file:1547 inactive_file:1341 isolated_file:0 [ 642.042171] unevictable:0 dirty:82 writeback:0 unstable:0 [ 642.042171] slab_reclaimable:3322 slab_unreclaimable:9475 [ 642.042171] mapped:67533 shmem:84 pagetables:1493 bounce:0 [ 642.042171] free:204946 free_pcp:351 free_cma:0 [ 642.047506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.054264] Node 0 active_anon:744388kB inactive_anon:292kB active_file:6188kB inactive_file:5364kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270132kB dirty:328kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 642.056656] Call Trace: [ 642.089777] Node 0 [ 642.099157] dump_stack+0x185/0x1d0 [ 642.127074] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 642.129633] warn_alloc+0x430/0x690 [ 642.131832] lowmem_reserve[]: [ 642.135452] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 642.160927] 0 [ 642.164548] ? kernel_poison_pages+0x40/0x360 [ 642.167622] 2817 [ 642.172452] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 642.174232] 7244 [ 642.178732] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 642.180745] 7244 [ 642.186196] kmsan_alloc_page+0x82/0xe0 [ 642.193246] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 642.195274] Node 0 [ 642.199234] ? kmsan_set_origin_inline+0x6b/0x120 [ 642.203978] DMA32 free:471856kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1296kB local_pcp:656kB free_cma:0kB [ 642.206183] ? __msan_poison_alloca+0x15c/0x1d0 [ 642.210995] lowmem_reserve[]: [ 642.239268] ? __should_failslab+0x278/0x2a0 [ 642.243903] 0 [ 642.246996] ? should_fail+0x57/0xab0 [ 642.251377] 0 [ 642.253173] ? __should_failslab+0x278/0x2a0 [ 642.256937] 4426 [ 642.258744] ? kmsan_set_origin_inline+0x6b/0x120 [ 642.263116] 4426 [ 642.265171] ? __msan_poison_alloca+0x15c/0x1d0 [ 642.272027] ? kmsan_set_origin+0x9e/0x160 [ 642.276661] Node 0 Normal free:332024kB min:41208kB low:51508kB high:61808kB active_anon:531080kB inactive_anon:292kB active_file:6064kB inactive_file:5364kB unevictable:0kB writepending:264kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3780kB bounce:0kB free_pcp:108kB local_pcp:72kB free_cma:0kB [ 642.280902] alloc_pages_vma+0x1555/0x17f0 [ 642.280921] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 642.310302] lowmem_reserve[]: [ 642.314536] handle_mm_fault+0x44ca/0x7ed0 [ 642.319607] 0 [ 642.322695] ? kmsan_set_origin_inline+0x6b/0x120 [ 642.326895] 0 [ 642.328689] __do_page_fault+0xec6/0x1a10 [ 642.333497] 0 [ 642.335288] do_page_fault+0xb7/0x250 [ 642.339395] 0 [ 642.341187] ? page_fault+0x8/0x30 [ 642.346747] page_fault+0x1e/0x30 [ 642.350250] Node 0 [ 642.353678] RIP: 0033:0x4075fa [ 642.353680] DMA: 0*4kB [ 642.355900] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 642.359150] 0*8kB [ 642.367047] 0*16kB [ 642.369180] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 642.369188] 1*32kB [ 642.372086] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 642.379338] (U) [ 642.381555] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 642.388803] 2*64kB [ 642.390760] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009ce3e [ 642.398002] (U) [ 642.400217] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 642.407478] 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 642.425286] Node 0 DMA32: 18704*4kB (UME) 14266*8kB (UME) 5808*16kB (UME) 1771*32kB (UM) 641*64kB (UME) 257*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 1*4096kB (M) = 475952kB [ 642.443046] Node 0 Normal: 11635*4kB (UME) 5834*8kB (UME) 2885*16kB (UME) 2000*32kB (UM) 1255*64kB (UM) 277*128kB (UM) 10*256kB (UM) 9*512kB (UM) 6*1024kB (M) 3*2048kB (UM) 0*4096kB = 338604kB [ 642.460384] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 642.468947] 2972 total pagecache pages [ 642.474209] 0 pages in swap cache [ 642.477642] Swap cache stats: add 0, delete 0, find 0/0 [ 642.482988] Free swap = 0kB [ 642.485992] Total swap = 0kB [ 642.488996] 1965969 pages RAM [ 642.492170] 0 pages HighMem/MovableOnly [ 642.496122] 106316 pages reserved 05:24:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) [ 642.549256] audit: type=1326 audit(1529731462.505:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5617 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 05:24:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) [ 642.759198] audit: type=1326 audit(1529731462.757:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5642 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 05:24:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) [ 642.926110] audit: type=1326 audit(1529731462.924:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5659 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) [ 643.030239] audit: type=1326 audit(1529731462.997:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5665 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 643.050089] audit: type=1326 audit(1529731463.028:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5668 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 643.114979] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 643.125525] syz-executor3 cpuset=syz3 mems_allowed=0 [ 643.130744] CPU: 1 PID: 5676 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 643.137495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.146850] Call Trace: [ 643.149450] dump_stack+0x185/0x1d0 [ 643.153103] warn_alloc+0x430/0x690 [ 643.156748] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 643.161613] ? kernel_poison_pages+0x40/0x360 [ 643.166104] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 643.171545] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 643.176491] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 643.181425] kmsan_alloc_page+0x82/0xe0 [ 643.185398] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 643.190137] ? kmsan_set_origin_inline+0x6b/0x120 [ 643.194962] ? __msan_poison_alloca+0x15c/0x1d0 [ 643.199620] ? __should_failslab+0x278/0x2a0 [ 643.204016] ? should_fail+0x57/0xab0 [ 643.207798] ? __should_failslab+0x278/0x2a0 [ 643.212189] ? kmsan_set_origin_inline+0x6b/0x120 [ 643.217016] ? __msan_poison_alloca+0x15c/0x1d0 [ 643.221673] ? kmsan_set_origin+0x9e/0x160 [ 643.225899] alloc_pages_vma+0x1555/0x17f0 [ 643.230122] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 643.235219] handle_mm_fault+0x44ca/0x7ed0 [ 643.239440] ? kmsan_set_origin_inline+0x6b/0x120 [ 643.244273] __do_page_fault+0xec6/0x1a10 [ 643.248410] do_page_fault+0xb7/0x250 [ 643.252212] ? page_fault+0x8/0x30 [ 643.255735] page_fault+0x1e/0x30 [ 643.259170] RIP: 0033:0x4075fa [ 643.262343] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 643.267687] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 643.274939] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 643.282190] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 643.289441] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009d34a [ 643.296694] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 643.303951] warn_alloc_show_mem: 1 callbacks suppressed [ 643.303954] Mem-Info: [ 643.311708] active_anon:186668 inactive_anon:74 isolated_anon:0 [ 643.311708] active_file:1549 inactive_file:1373 isolated_file:0 [ 643.311708] unevictable:0 dirty:93 writeback:0 unstable:0 [ 643.311708] slab_reclaimable:3322 slab_unreclaimable:9476 [ 643.311708] mapped:67520 shmem:84 pagetables:1489 bounce:0 [ 643.311708] free:203877 free_pcp:384 free_cma:0 [ 643.344868] Node 0 active_anon:746672kB inactive_anon:296kB active_file:6196kB inactive_file:5492kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270080kB dirty:372kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 643.372786] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 643.398897] lowmem_reserve[]: 0 2817 7244 7244 [ 643.403470] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 643.432368] lowmem_reserve[]: 0 0 4426 4426 [ 643.436682] Node 0 Normal free:327500kB min:41208kB low:51508kB high:61808kB active_anon:531252kB inactive_anon:296kB active_file:6072kB inactive_file:5492kB unevictable:0kB writepending:308kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3764kB bounce:0kB free_pcp:212kB local_pcp:116kB free_cma:0kB [ 643.466177] lowmem_reserve[]: 0 0 0 0 [ 643.469971] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 643.483178] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 643.500674] Node 0 Normal: 11549*4kB (UME) 5827*8kB (ME) 2642*16kB (UME) 2001*32kB (UM) 1242*64kB (UM) 278*128kB (UM) 10*256kB (UM) 9*512kB (UM) 6*1024kB (M) 0*2048kB 0*4096kB = 327500kB [ 643.517454] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 643.526010] 3006 total pagecache pages [ 643.529874] 0 pages in swap cache [ 643.533305] Swap cache stats: add 0, delete 0, find 0/0 [ 643.538645] Free swap = 0kB [ 643.541639] Total swap = 0kB [ 643.544649] 1965969 pages RAM [ 643.547733] 0 pages HighMem/MovableOnly [ 643.551686] 106316 pages reserved 05:24:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:23 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) [ 643.683685] audit: type=1326 audit(1529731463.682:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5677 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) [ 643.750124] audit: type=1326 audit(1529731463.748:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5689 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 643.845744] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 643.856274] syz-executor2 cpuset=syz2 mems_allowed=0 [ 643.861387] CPU: 0 PID: 5699 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 643.868125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.877484] Call Trace: [ 643.880065] dump_stack+0x185/0x1d0 [ 643.883677] warn_alloc+0x430/0x690 [ 643.887299] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 643.892127] ? kernel_poison_pages+0x40/0x360 [ 643.898086] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 643.903538] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 643.908489] kmsan_alloc_page+0x82/0xe0 [ 643.912451] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 643.917203] ? kmsan_set_origin_inline+0x6b/0x120 [ 643.922045] ? __msan_poison_alloca+0x15c/0x1d0 [ 643.926703] ? __should_failslab+0x278/0x2a0 [ 643.931102] ? should_fail+0x57/0xab0 [ 643.934887] ? __should_failslab+0x278/0x2a0 [ 643.939982] ? kmsan_set_origin_inline+0x6b/0x120 [ 643.944817] ? __msan_poison_alloca+0x15c/0x1d0 [ 643.949473] ? kmsan_set_origin+0x9e/0x160 [ 643.953700] alloc_pages_vma+0x1555/0x17f0 [ 643.957929] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 643.963036] handle_mm_fault+0x44ca/0x7ed0 [ 643.967257] ? kmsan_set_origin_inline+0x6b/0x120 [ 643.972093] __do_page_fault+0xec6/0x1a10 [ 643.976234] do_page_fault+0xb7/0x250 [ 643.980023] ? page_fault+0x8/0x30 [ 643.983548] page_fault+0x1e/0x30 [ 643.987004] RIP: 0033:0x4075fa [ 643.990176] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:24:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 643.995523] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 644.002792] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 644.010060] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 644.017326] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009d625 [ 644.024587] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) [ 644.136199] audit: type=1326 audit(1529731464.132:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5703 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:24 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) [ 644.225792] audit: type=1326 audit(1529731464.224:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5705 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 644.328905] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 644.339452] syz-executor2 cpuset=syz2 mems_allowed=0 [ 644.344585] CPU: 1 PID: 5719 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 644.351344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.360875] Call Trace: [ 644.363473] dump_stack+0x185/0x1d0 [ 644.367107] warn_alloc+0x430/0x690 [ 644.370730] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 644.375576] ? kernel_poison_pages+0x40/0x360 [ 644.380085] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 644.385539] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 644.390470] kmsan_alloc_page+0x82/0xe0 [ 644.394429] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 644.399170] ? kmsan_set_origin_inline+0x6b/0x120 [ 644.403998] ? __msan_poison_alloca+0x15c/0x1d0 [ 644.408655] ? __should_failslab+0x278/0x2a0 [ 644.413069] ? should_fail+0x57/0xab0 [ 644.416856] ? __should_failslab+0x278/0x2a0 [ 644.421254] ? kmsan_set_origin_inline+0x6b/0x120 [ 644.426089] ? __msan_poison_alloca+0x15c/0x1d0 [ 644.430747] ? kmsan_set_origin+0x9e/0x160 [ 644.434982] alloc_pages_vma+0x1555/0x17f0 [ 644.439227] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 644.444327] handle_mm_fault+0x44ca/0x7ed0 [ 644.448550] ? kmsan_set_origin_inline+0x6b/0x120 [ 644.453409] __do_page_fault+0xec6/0x1a10 [ 644.457552] do_page_fault+0xb7/0x250 [ 644.461347] ? page_fault+0x8/0x30 [ 644.464876] page_fault+0x1e/0x30 [ 644.468316] RIP: 0033:0x4075fa [ 644.471491] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 644.476840] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 644.484098] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 644.491356] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 644.498613] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009d802 [ 644.505880] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 644.513144] warn_alloc_show_mem: 1 callbacks suppressed [ 644.513147] Mem-Info: [ 644.520896] active_anon:186680 inactive_anon:76 isolated_anon:0 [ 644.520896] active_file:1628 inactive_file:1305 isolated_file:0 [ 644.520896] unevictable:0 dirty:99 writeback:0 unstable:0 [ 644.520896] slab_reclaimable:3322 slab_unreclaimable:9454 [ 644.520896] mapped:67593 shmem:84 pagetables:1452 bounce:0 [ 644.520896] free:203171 free_pcp:545 free_cma:0 [ 644.554495] Node 0 active_anon:746720kB inactive_anon:304kB active_file:6512kB inactive_file:5220kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270372kB dirty:396kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 644.582503] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 644.608978] lowmem_reserve[]: 0 2817 7244 7244 [ 644.613561] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 644.643940] lowmem_reserve[]: 0 0 4426 4426 [ 644.648259] Node 0 Normal free:324676kB min:41208kB low:51508kB high:61808kB active_anon:531384kB inactive_anon:304kB active_file:6156kB inactive_file:5220kB unevictable:0kB writepending:332kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8384kB pagetables:3616kB bounce:0kB free_pcp:856kB local_pcp:128kB free_cma:0kB [ 644.678367] lowmem_reserve[]: 0 0 0 0 [ 644.682165] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 644.695373] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 644.712924] Node 0 Normal: 11475*4kB (UME) 5835*8kB (UME) 2556*16kB (UME) 1945*32kB (UM) 1251*64kB (UM) 278*128kB (UM) 10*256kB (UM) 9*512kB (UM) 6*1024kB (M) 0*2048kB 0*4096kB = 324676kB [ 644.729897] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 644.740106] 3016 total pagecache pages [ 644.743973] 0 pages in swap cache [ 644.747411] Swap cache stats: add 0, delete 0, find 0/0 [ 644.752753] Free swap = 0kB [ 644.755750] Total swap = 0kB [ 644.758752] 1965969 pages RAM [ 644.761844] 0 pages HighMem/MovableOnly [ 644.765804] 106316 pages reserved [ 644.776145] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 644.786681] syz-executor1 cpuset=syz1 mems_allowed=0 [ 644.791814] CPU: 1 PID: 5720 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 644.798647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.808011] Call Trace: [ 644.810617] dump_stack+0x185/0x1d0 [ 644.814243] warn_alloc+0x430/0x690 [ 644.817902] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 644.822731] ? kernel_poison_pages+0x40/0x360 [ 644.827217] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 644.832656] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 644.837589] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 644.842515] ? kmsan_set_origin_inline+0x6b/0x120 [ 644.847360] ? __msan_poison_alloca+0x15c/0x1d0 [ 644.852022] kmsan_alloc_page+0x82/0xe0 [ 644.855988] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 644.860733] ? kmsan_set_origin_inline+0x6b/0x120 [ 644.865563] ? __msan_poison_alloca+0x15c/0x1d0 [ 644.870218] ? __should_failslab+0x278/0x2a0 [ 644.874617] ? should_fail+0x57/0xab0 [ 644.878403] ? __should_failslab+0x278/0x2a0 [ 644.882798] ? kmsan_set_origin_inline+0x6b/0x120 [ 644.887633] ? __msan_poison_alloca+0x15c/0x1d0 [ 644.892296] ? apic_timer_interrupt+0xa/0x20 [ 644.896704] alloc_pages_vma+0x1555/0x17f0 [ 644.901459] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 644.906569] handle_mm_fault+0x44ca/0x7ed0 [ 644.910797] ? kmsan_set_origin_inline+0x6b/0x120 [ 644.915672] __do_page_fault+0xec6/0x1a10 [ 644.920436] do_page_fault+0xb7/0x250 [ 644.924222] ? page_fault+0x8/0x30 [ 644.927744] page_fault+0x1e/0x30 [ 644.931183] RIP: 0033:0x4075fa [ 644.934360] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 644.939709] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 644.946966] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 644.954228] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 644.961486] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009d9c7 [ 644.968739] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:25 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) 05:24:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) 05:24:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:25 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:25 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) mq_unlink(&(0x7f0000000000)='/dev/uinput\x00') openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) 05:24:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:25 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) [ 645.814590] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 645.825148] syz-executor4 cpuset=syz4 mems_allowed=0 [ 645.830277] CPU: 1 PID: 5789 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 645.837068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.846427] Call Trace: [ 645.849021] dump_stack+0x185/0x1d0 [ 645.852659] warn_alloc+0x430/0x690 [ 645.856301] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 645.861148] ? kernel_poison_pages+0x40/0x360 [ 645.865649] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 645.871104] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 645.876114] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 645.881147] ? update_load_avg+0x1b70/0x2cc0 [ 645.885582] kmsan_alloc_page+0x82/0xe0 [ 645.889564] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 645.894327] ? kmsan_set_origin_inline+0x6b/0x120 [ 645.899182] ? __msan_poison_alloca+0x15c/0x1d0 [ 645.903857] ? __should_failslab+0x278/0x2a0 [ 645.908271] ? should_fail+0x57/0xab0 [ 645.912077] ? __should_failslab+0x278/0x2a0 [ 645.916485] ? kmsan_set_origin_inline+0x6b/0x120 [ 645.921328] ? __msan_poison_alloca+0x15c/0x1d0 [ 645.926005] ? kmsan_set_origin+0x9e/0x160 [ 645.930252] alloc_pages_vma+0x1555/0x17f0 [ 645.934501] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 645.939618] handle_mm_fault+0x44ca/0x7ed0 [ 645.943861] ? kmsan_set_origin_inline+0x6b/0x120 [ 645.948727] __do_page_fault+0xec6/0x1a10 [ 645.952893] do_page_fault+0xb7/0x250 [ 645.956702] ? page_fault+0x8/0x30 [ 645.960252] page_fault+0x1e/0x30 [ 645.963701] RIP: 0033:0x4075fa [ 645.966888] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 645.972274] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 645.979549] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 645.986823] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 645.994095] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009ddd5 [ 646.001373] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 646.008656] warn_alloc_show_mem: 1 callbacks suppressed [ 646.008659] Mem-Info: [ 646.016476] active_anon:186121 inactive_anon:76 isolated_anon:0 [ 646.016476] active_file:968 inactive_file:1004 isolated_file:0 [ 646.016476] unevictable:0 dirty:21 writeback:0 unstable:0 [ 646.016476] slab_reclaimable:3322 slab_unreclaimable:9456 [ 646.016476] mapped:66985 shmem:84 pagetables:1472 bounce:0 [ 646.016476] free:203249 free_pcp:576 free_cma:0 [ 646.049575] Node 0 active_anon:744484kB inactive_anon:304kB active_file:3872kB inactive_file:4248kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267940kB dirty:84kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 646.077444] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 646.103576] lowmem_reserve[]: 0 2817 7244 7244 [ 646.108157] Node 0 DMA32 free:478248kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:112kB inactive_file:12kB unevictable:0kB writepending:56kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 646.137141] lowmem_reserve[]: 0 0 4426 4426 [ 646.141461] Node 0 Normal free:326072kB min:41208kB low:51508kB high:61808kB active_anon:531164kB inactive_anon:304kB active_file:4068kB inactive_file:4176kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3696kB bounce:0kB free_pcp:996kB local_pcp:288kB free_cma:0kB [ 646.170909] lowmem_reserve[]: 0 0 0 0 [ 646.174706] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 646.187995] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 478248kB [ 646.205819] Node 0 Normal: 12613*4kB (UME) 5884*8kB (UME) 2554*16kB (UME) 1840*32kB (UM) 1251*64kB (UM) 278*128kB (UM) 7*256kB (UM) 6*512kB (UM) 4*1024kB (M) 2*2048kB (M) 0*4096kB = 325972kB [ 646.222944] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 646.232029] 2198 total pagecache pages [ 646.235901] 0 pages in swap cache [ 646.240050] Swap cache stats: add 0, delete 0, find 0/0 [ 646.245395] Free swap = 0kB [ 646.248398] Total swap = 0kB [ 646.251398] 1965969 pages RAM [ 646.254490] 0 pages HighMem/MovableOnly [ 646.258440] 106316 pages reserved 05:24:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 05:24:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) eventfd(0x0) 05:24:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) eventfd(0x0) 05:24:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000100)) 05:24:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000008200)=[{{&(0x7f0000000000)=@ethernet, 0x80, &(0x7f0000000480)=[{&(0x7f0000000300)}], 0x1, 0x0, 0x0, 0x24040841}, 0x2}, {{&(0x7f0000000500)=@l2={0x1f, 0x2, {0x200, 0x8, 0x10001, 0x8001, 0x40, 0x6}, 0x0, 0x3}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001700)="cfb55fbccdf99f36fdec6b76d6aa60e97a31d764edc7e78b34340973aeb627da7402a3a30aa0afffa63624f34ebaec7bd8dff19bdb9da3dc94c75bd635ac79b80ecf483469f6ec1a85b848944be7265f98f44c6a1f8f1f1a5d70537b4cd7db94b86e82f75532fb302ea022e989e08c8f09a9ab199b380071fe2f668940723f1f", 0x80}, {&(0x7f00000017c0)="e6aeeda7265bb922a2cd6928830f7665239a9b4a00bfce1f8bce97be86b5716984f2959866b82aa5ce8010063dae8d1dbc0bd1a1a90ee248f94562551cf175f574003b8abecce0448153972ca82beaf29c90f8a51138a3e290f7f0303351fdd2a7ec0d91eae4c43f8e1f2f01447433", 0x6f}], 0x3, &(0x7f00000030c0)=[{0x108, 0x107, 0xffffffffffff2675, "96475eecbb769f19fb2dbf800a310e586b2f2d69a44046af5299c2becd7d190318a46f33af69c206671fe2c8df27681a768557557ade3ed9c02998a310ca3778d69107d8283a34b9a3674ccb877a86b65d114185ce970b7656533a91627c7a275c7d638382301153b75ef54829f1df6e9ac78bc55a00fca5d27d5656f75f1270fa75876c76d58ea1e717c74aa6f910dc0acf772f864552d62b807b241afbf03ebd3518dd6679c9b7827b492f61dc37e56d97a22f757b027e73b128c6668f57eaa63403f42656760e6fced0e5e21834134183034cc09d8ea222c0adb7662321e6cf8237b870d7fdefc1f1b165418de7251e88ec4220bfa7"}, {0xb8, 0x13f, 0x4, "b3a5dcf455dcc67cc596a98900b837892d96bfce8ec4e1e60dad7042daefaf67cb83de7262d10f6dea7e008c154b5cc02d05b9bbe707c2500c080ce4e819a06bdb7351e5afd4af8436c6a1e4e374d82049ce9249e5728c77feda1f55dcd5e9d8c7127112bf32911a1b794d67763e8a8b9c18402df25d6350c575dc30f8c04d4c32bc65f0d5bcceb07bcc457efd2716f3b4fe6508258a2fb07a0c83119fef6712752cfd3c5185ab5c"}, {0x1010, 0x10f, 0x2, "b5b3c30ad7f57f30432c97e01a6dc447f2157a20dee4c65e8fafe249f4e6fa9ce11156a6528c7fdfdaaea41bfce7e8210be83d41850ed8f34d1f0fd327ea6f81c255468a8c4a8a9b5f83f716faa033d2d6611502433fd49677a2e85c570aa90ea3650782ef5760690699621f4197d076d30551f53f83a1cc61ef0548b94d61112e736d33f16ae8dbca6cf0277df5eebc45f2a46032618dc1b1b070c7985862f7c2a00f0fd2f3e1eca00812c131abed75e8532859656c6c2789b3b551747aea9b883c28db4292d376cd474e0e75bc6936c7092558f28c311bc625be8e37a238ceb77f3739cdb6a2949090f5627763098dfa85f57ed0b1a4a30fcc4bee9b8afc65f2575449236b5fcc83bee5a8144564da60d105924a307fda52be80e14fdd1fc93b234308cbd55c7850492223352d7cf4456057b4ed86d0cd0c8335f8f5c4fae3415848824e058349277e0101a2383dab521c1169f73992ac8b6d02843fa48a10b1f76cab1bb9549a0e7bb6a4899c3f6511f355644798f21d656429953568213df1cd9ff2aee84e8afb24d2dc35f105571bb4d265b997a8054addbe99db23d1e21221b92026c80b16c169e7f9f52f1830858682f51d7f6323c68fb87a8db48a5fd8ba639544e36cf83dd50f757e7a33a6828ffe79e74b9eb75fe7e8b9eae80e4fe69bb8aa8fb82d15ff3afeded7063582b42a0cae37a8d6f7716579ce298ad41b4c2d16109949ff0c1a4d57d68bb4cb2a5750baa40e984890c4440b32dad1ab54af1ca0b60d1776fed779d573964e4328efc653f383d7596e1840b03499612bb845cb0cb3320552847e81ba7d02f2cbdde1a509b24169bde05c7d2d2e349ce5f25e1627e95e7769d6d8224e1cf104eb7d252b174a90e218e44af0c4ab8a84382176679aa7f1c778cccc0a80257c1e8a2d262f0f240186dc9caa0bf8fac7a473c8ac613e5eaf4432088941f3b8390ff6a7442824fc60fa5e82b9aac63e039e3ebc968c08714d7ee869bc29affa115e2b5d6529afa318e5b0cde7421ec9c3e08c6219f0c3efe3d02669244f0f66aed8a554428afcea0b1c7adfc56f0297373afdf722c33adea2189476008327aa7a1600bc6f74877b7c057188bfcf9fcc5075505366802bfd37e20f16d8135281ef4407725dd57592423f323c2496070d16cf1cfaa8260020aa256be9fe0da32897a2ee253e3b4adc64d7a96151c9705608fe57be3435ee2d1ea136419f42254274997645c463a97219de51bb9559049efa11cd27a06834e220ed5a692d6c14fad907787e81cd1c872ec2948550010375ea7701cb856eb25e2984d0041aac0c9a32044fc6e5beca369742f0bd768bc6335cc41fa79fb1d440b5b5956dfd704e4fda43034fb0ebf1500a409b4ecee5bee563339b1d2b041c5d8c6770acf2ba1f53bac837a716ec557d878cd67046e2e8ea8980bbb876fbab22b316333b49ac69f7c6506a827da5b8575e053c5b06b8feb45f0476d877d30acb5fe8feae5dce441e46841cd3e365f91348d5996efdc0cc3c6afd93ed0e167f044b705432772275df134b51d025b4d537c8801ddd4f78dbcdb26bbe3b52544be32663e3c3afa8a0fb0ad328af0fefdafdc56731fb85ab7400131fed2562651ab68990dc29346acd9aec3d39bdeef45cb8ba795b72aadea0ad5b04c0bd4a8d814e8d814613070a7e0568b654e3718f21f4c7e7652d8248da413617f7aedc0ca729ad0018c9dfc5a7b737484144d3b6fb6422ce99df5dc21bd9d412647ab74a93e317830c67584f0b3a03ed60c24d3a281de469041ab7eab4e6f72d90e408554a04c1b99560b23a9b22f97f2800e19af70b1d1298ece610eb6c96040c010f861705d5466ff984b5b30f138b61db02267623b110b6e6f17c9707fed2e635c3a655dde46e3fbebe0d277b150f52d5770a018a21c54f1aa179b9ad1910427493609377505df71d61762355e3b2282db0dad0c7e997eca2924f74f1715a278f303aec11dfd57d090ed82c63441b914bfbd7f85cf6bccd00c03c77e3690938e1e4ee1407dd26625a804d0638504a2afef9946ae62636e297dc77608704bf75891960bc3f95fd29056fa78a4edaac5cbc12857ec107febcad22e363a2c80470e2ad07991b527d37c74b72bcf4e04c91e548d3d2c1a5ac095d695cc4f5b205b9e530009852a2b56d1ec6c484e6eb47f375a2d38be246b2760beb786df8e61827c7b1b5daacc0b27f965d3560c6af9a54bcec01d6214571953edf429b1642aea88cdf1f84038b21bda8a010cf52d03679fc211824dc69bbdf85a0a7f7b0fbd1c8c8d0222db4a0540199c60a7180fd8493bf1a4cb8f17d8db8fed65f2b82595a8b9f01baa530b0e7464a71d76dba758d2d0af42a4d34e779437acadb149661d708a0627adb43cc4aee4423351c8a2fbbda5d96b926dd88fb03b2d25c1ab8a30f857d524477904909fa92407d736b5a2d6f8479f45d82a6c6f8aeb0e4a89e6dc8d2be222c3c0851e428f118ef7e50df02c25fd60abf5495adf0e1a5eb2018f9a10adb73ca225f42ecbf1068e7622dab07e82a7452f4603908e2ef67a006bbfee3f6d08149fc38e35f7c56d1932fa441285dfa7dad1afd7b5a91dd58780f34d914150b0780e5eea552d9ee8dea7d9f03a270f6c7073d686c8f3b749355f6c67f601a82526c1ce595ff1b91c03cc9f13023d1a962c72e4ac63941e7a9b27708840a85a34531528e38ec863cb4896e3e0dbb358ec677dd564066cd37c609df6b8d5bc3f1b1490731a326370188f1562aa6b3ad80aa6405fc081c6490bedce3369b71306dbe2931773a7f196429f5b1fe6bcc3d3657230b612736ab8de2b46ee4c682bc9fbe65053d5724d00686dd47ecb9ff14cd961a8932c51ee4e82d8fd3e85a17e3a64eeb129d7af808702eab237162239f036fdeb0489625849c88c96e66ec2090028a31928a5d620d5297f2eee0675b9f0956000b04379f0d9e3a3535f8a9b10b0b0217c86c7ab221dc4f156def816af95edfd9418b9aaeb0434a52df2fa4bd88a1f65f5adf1edaad0239173ce20e73d6bc56dd4f63980c0b06092d34af0957ea835e3d74eefc46cf9e1c0a7827a2d8c772a51c5398ffcd2b657f4fa0b1edb64714ad4a7a6878fd0f6e47955bafa10658e509d52571ed82acd8a87fa151fb6f7b7ea3d819a6510ab62b9b2f5ce1bb2e314aba761bae04f27defc355780b58f66c3ef0fc53bc496d811d644f6fe371f48db1ca0c9aedb69a9f9ae29b74a9c4c29f7648715d567db363071e491a02a434757a6074c89a997daadacc4964c780e8a1f247e76efa5290b8c41afb34c9945ca409f6e8b339515611bd3640905ca93a19c23593095ce86090258eb88615fa6c11e215c16b5d1a6b94c7c8702e66918b456d28023884775abf182aac7f8b368de7fdf3ebc094e800c915a23fd23ac504445806521632c21462dc9939d275d867526830793bef488d2328172b3e513bb8e4cef38a0af9ebd9bbb850fceea3545eac0f1ceab3e7f7b372a2c33e5cdb10bc89aa5126bbbb7008146d147270d275cd18de46d123e0df93f160de1338e1ec40d2777c0c04539b8a2f3179329386c68d8432b5ce53942317a5472744bbfc3f34e53efad13e3e14ee9c278b38c61a5c72434adb4d6e6672e24421e40280b574d4a233a391eb0219b2e2d3d07e47cf94bd1ff81553489631fe1e9a7988dffa4b50fc636ffb260a5d215d989a7e2c4a5bbd08b0dcbfc5ce7bcd49beb562a0e02dde125fcd285fe65522dbc372ece1918a308fb54bd94bcfaafcf747e199136cabc78f722e85751df7f552610791203a95650d9a5812574ed2d0b39d11cf327c27e3725480f9e6b6a2696a733d841bbfbb3516c4a73515a4a79b1c060b2f2c9260dcffa26f76cad1c1a5b5acbaff206b4fe679df87a08954c77b0e1e9a49227a2a6050771cbac02026ae310e6a563bdabab3b37793cfa40421c6f0ae8119e4813c0ea2327c3037cb923285eddd82f35d039719ee1420432bc1c0c645a62d8ac18ad8f0e622f4f3c070290ddf5141e33be4a51f5caabf40eff597a2a62848899fc600fb0ff569109204b21b82eae96c50eed902c66f0ae9dda5fcbc3f340f27f10cfa3450223a154382ded56708d0644514a35872d395c2f96300fda80cd7b462792b22d79cbad39d6062c111421563a7c850d1855be2bec67408b388a198edc975af27432d616f3fae62f5415598e42ce839c58816eb560021363132e36cebac4b01a33fc6e0b98dff66b347b28abb631f48daf38d2f0ab2d18bba58ec8d3ae56f933e80329ed34c682a58a7586dbefae17cc880f057aa08ad49d6483aa8a877939f82a6019dc88fdedc7f40ab6fbd38dfe91ebf1c2f182e7f05d5492b3a5e03198d426b15d0dcb333d52ddbb71700ff8ea2b736b846d4d2536289ecf38922cf7bb61c9b69ae12dc7a24c91cd9bcce502c4a32b1de48fe33a9a9fa42c7a5e6ac85d417fc98ae48fdcb41234777fa29846450450f9e91a08725c6ffb96a8885d819b6d6fc04bf98dcac46d3cd2653a7481f9923372be550049b7efd3b9a2110aff8c5b3418181ec1ce8d1a14d06cee249877d5f0302f330ea0cf721aba4f678110bfb9893b075d2ac23fcf9a31ec4fd75dddab6ef1812b06489f6ae94e1c6f6662bafbb0879034c02a724ecc2ea0cc8cf4a7d2e969289eca51d1bc86a768ae9e6dd54d04879d70d4d7218bc14cd566864ada96329db1742702bfbe38a70d7021e14df8c8d35e700d9d435b18f484ca5aeea926cca0c9f24a42f41f3c824d9912a5fdf19d3f17866fa818571f3422e64dd832f2db06b0eb234a36bd34a36bd3e0b5fcf7dafe2151490652e96d8c5ba02e9449ec32c1ddbd90abe9287ca7502bbb45d54376703925111b133a650fa4dc36a7e391381bb45ae8e734eecfc15b0f36d491ba819a13b7754b6b701e7240672ff88fa8b234c6a5e9118a410d55c2ec0ef44bbce813d1737b2c9e15f297b093b8db4636e6c29736f35ad20a5067bd22777a1ffb252a9ecaf10c64b08f0aa446dbfb7fd3416ea38cac10a5aac8e5ad8d63d7e72c15bf801c89b08135d1d025bb7d21fa3dde634d0d72e84a34a9f80b903b46550e82a0a95a542d7de4295142b3b2267eed31abc4099d2648f8e9d1d8331154128129e68dfec8cce87e94b36e3d473a6285f0a2a9c81144458cdab9ceba5f77c05d62f4e349e901122ac7ebaf3f51df47d8e99defa4393963b77c21224be1b778609d8fcf98e0ddfeb6d3fe175014a56148befadd864a4733a1f99da1d1d3f219bd57c2fce2129b23d6bc5b9e40120b87bcc86619f6f20feb1fac88c0ab3f7d39ff724d2956729d33cec88cf86b3243f89cb6d12de9f5c78c89bc9b101e255438b5f722bc14f1b7b81edcc59221b4610c537dd38f9f04b8ec486a211baf366856b3eb597d754b392aca8b35c3c215dbbde75c34f28ebd59229be01147a6cc2cdb8368e5c067dfb2b7e4769647d2ee08e1b3f013cbaf92f398573245c0b9266d122f74c1d094341f6515178aae5527c936fbfa528558509a896f260d520cab2c77771d9e138e9f42c006c9b02054f52a0e02fb24791a5c98bf4ac1d56bc1209fd810bc480dfd418c847cac00eb8d2a8aee3501677219dbe4fd2b49218739f612a70e77c6814d3e62ae52e62c83efaa06e4f4b418ae102c4958688a182f7f061ef352aaf9c752fd54f9489bf838ff4f79696cc15ffac9f25bc5a06618a8b3a107976f1cfff64ef50901f199617746b608e570c1ab7da4fc36a687d037c4c8f6462b9ded8"}, {0x48, 0x109, 0x9, "77a5457e9975287213e6410542947715e5de7dce09aae009c510c7579ce441aa6b7d9f6ec90e8eb97e112999e8d68cd6912405669f"}], 0x1218}, 0x5}, {{&(0x7f0000001d00)=@generic={0x1b, "7c685ae01a8790ff84da8dcb0b2743bdbeda4b1488bcbe6d6ee6387ea11d7215d1b192b17cc2c73ebf052f977c42b458cbc049805b5be0e457232c8b9b092e33499777f4893f2e7414264e60f49798bc9c63feb267c0267dde38416960eb871ff3e996a64d63e55eef372bced7ce9b80c8da6182a96e8310c4ce33104fff"}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001e80)="c1f49fdce1ac9e745663a98e58592a3a", 0x10}, {&(0x7f0000001f80)="9a34439613fdf01c0d0ffb62cda704dc4e149edf5fa0d309ce145b996de1d6a7d2233a2659630597be55ba6e0c3944f625c3e5372713c43441a113fe36f28134afa741d8f6ddd20f682f3f0694969e25705cba6a70565da27361a28a68a725d28b34ce85bcca96277c8c2d973e983aa420104bd68ed38d7b4bcfc62336592361f74017ac2ae9b33a0f911ab0e75111b82a9688dca1234f6ef3ade41086dab211b9cefc210e33a0635bbbe04322a1ac94c4835be2c577af51", 0xb8}, {&(0x7f0000002180)="59ce29afddeb21b9d04bb8f7d59b3511f1426f85b0b24f2afc9c4cdb558705294b5417521759c45ebf594e3ca1515ea59b", 0x31}, {&(0x7f0000002200)="0e15a82906f3753dfc7742bfa9ba7bd76153aceb2e0760b2ad7985c0120251420687fe1ef288dc4cf203fd6a867806613365bec4473969d873e8fcd98799ab5ac6927f714bee03ece1839e98f1dcc33b4d22a4617af1a36700a27be3c50fc28207547116638a064aca16a2115612bb1e27eda577f72ef72487c896ba570b3461", 0x80}, {&(0x7f0000002300)="fbfb582a0e37976e27888d4336e8fcca0b4dc4a4971a0f560b8dd87bb22834e7335ed4793208929ebe4bd751b96f9cf7ccfb79deee863af5d08fd926889b29e8f55e09340635a53d0dfba129eeb3451ee85bcf160afbc356f0876caa3235", 0x5e}], 0x5, &(0x7f0000002440), 0x0, 0x4}, 0x3}, {{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000002540)="41abe5602cb2e77e00487562f965f5ff8c4a9df288934e3628228294c8be93ef8ce1d1edb947dda2aa2db5860c8a614190b3ceaa81398ae4e570458881e26470068be76e3a25e0cfe21e266d17b21a642c10c26372fda4638bb39c0e04889ea21907eb267ce063246ef07dd2eb9bcb42a1da733b46b55b68bee434a02dfb12e6972190069a586e8c68f94b218938022e9b80158046739d4aef4f5ccebbf6231bb6eb274257043b8abf79252a7aba94810507436cdb60c22e0286dd4c82f10e597a903fbef0db9dd6d838a3b7ae3bec684df2cb0f728028", 0xd7}, {&(0x7f0000002680)="10e2795973849a90d31c871a8dd3da845d5a84ecc719afd8149f7d645d8315ed2f11007fa7e78e9e28208d670488191d3057e05f4e330ebcd73400dfb26f0a640ed62deb532da3bdf0285fce3ab016b81b8dbf5bcaa70ac7de8f2986b21e5cf5859c63b60090f26d82c49674fa5919406cc44e93b89d7fddef9b7cc3552ee84b4805d5891efa3e83de9aea9cbfac66e5b7187e25e0fc6f8388915b82a275260a263d04a6823e57256a93320501d623e2a4b4bf", 0xb3}, {&(0x7f0000002800)="6b70fa736b653a982fca193c0c1a54af1278651e7b92a3245234941b3a7fe34ef52763318f54c91a2a24fcf735ad59e70babac0032a90b4943cc1a34e4840e26a29947a91f56892e952e82796dda23680b6ea640488c7f4b6299f3dce031f56b5a41b805bd9a2af2480765d180fd1afa1bdbd73059c4a59067989cb4da0bf33596b957a026465d73e7cfd99536d40cf8943b0bf3962125bf455048c2976093a92ef837cce04f208ff98da8b027bb07591fee26cf654116", 0xb7}, {&(0x7f0000002900)="66561b9232d45b689127e9dd65b54497ffd09c47a2bf732f785b9e6a7a3d34cfce7d8859954b98ae7101cbab43743c7a7dee3899c3fa05b182c72af756184ed5d9d33bf3639f471677299af39d8147dae55d16eac599089e96c13eac639d4f284b650615db25914c2e136bdb5ce8fe8069ff5a88f94399f551905bbe2191e81d96e7ee09e22fc8d125601004dcb4e4b89b83973f7bbd0e8d7899245e938590185bccc6306d9b788d5218ed5b3ea02a993de21779c5da7f81037ea5", 0xbb}], 0x4, &(0x7f0000005400)=[{0x100, 0x104, 0x9, "b3d43128c34beb540942b2955ba4923cff14ba8b6ff93315b8f52dd572bdeb65c4bc33af1af4449ba7a27bd908494a8e2827dc63ce0d4a9bb7ca40ad0af0ab883b2dc08b6f60639fe492fead4b772d118c103f0c17b84b4f263cb7230d53c4c95b0d69ece76091b8cd2da288be8a29c15d1d3284361fd7c27b234f5e02c9fa06bff210c34a0ed1da856e97c42873735de3b09b887ef48932d913b23a7735107b066be1ed573df3ff593c7c3b20f772d1780f97e94668120e5f8d12357ffb447eac070cd2aa362d0d01a4f9da123ff71f617bc846e772fed61ab4556ca70aa08af5f234c8b0aed23712685b68c4"}, {0xd8, 0x119, 0x80000001, "8561a1a30835c8abcbcda37e53d304347156b0eba700d42e1e533a1ea51c079c1e656003fce488ddda809f1403ba2dfc04055dbb0058af4251106aee2c72902b62cc5aa6dc0c192fa5f57b09b44ea1cf795fcc8321d6e31488a21a72b5d7b91704c5de0fbe72ce816078041244200a0a4c8895f33878a5521713e3e7e68e116227593c703d4b3e703c0665d2a83aa69c3e9ff0349675115641b73216699b3020ec573f82dac58110ffc987f4754ecbacd76681f85ca17b87c643fc65cbf65720a7f929c27d"}, {0xb0, 0x104, 0x3f, "2c9d1e4653ba810d5ee88e4a0e0cb966a0456f03bec370eca6063f4eb6c19737eca75dcfa20514e8aee32526a108a923e74ef6b4ad36fa602c7ad1606816fc72be323413cb4c9560b61b133e8e7c88403a5c7555867e033dc03180c96c7d2f487cc03a9471a61cedfff871bc91894d698b8708a9a46404cd71791176be6289166d91b31d730a975aab86f454ea8f4fa3cd6c9321f180119e4bf9a1c356"}, {0xc8, 0x13f, 0x9, "bafdd35c9d3a846b378ee1e98164ea9a55290bc045083338ee0cf6973beb91e7a83906718d4d06abbecc6f3ba1378980fdef9b252c9474aaf2dc965db1611995367a0c1308ad0d831115ddf86a87299a353d0dcb5f6283e0be1da7a4cc0d3e13473d83a8318069194f4bad906f33a30b16a0bcf5d7d74fb668c914dbe1d96b51b9b2858fd4e4da5cd36c9f72d69263d6d4e5e06ec44822fb82987e21d1005fe6247e197dcb2397f19ef511011be017219a"}], 0x350, 0x4841}, 0x40}, {{&(0x7f00000079c0)=@l2={0x1f, 0x7ff, {0x100000001, 0xe1, 0x8000, 0x6, 0x1}, 0x4}, 0x80, &(0x7f0000003040)=[{&(0x7f0000007a40)="13f7ca160e9f79b5f54db0c936c65ed83919cbddf2022e78fa1be2ac2ff111ceb4f89eb6f125af99fedb9681fcf07f894f1b4eb4cb686316581425cc31ae9970887f2dfb383369b448f33281a269303da5e5b20786de6e9a9cc04d766189aa695f2df8fc9f9819aa0ed47f5de74961d3d39f896a9c92f495d3635c8e5add23eb4bf8bb6b44e78a3902b18155a1b0cd97a4a340a5659fce26e6db58704e00f25f5129bef4be27cd22", 0xa8}, {&(0x7f0000007bc0)="0c8600c9f2e9e2b2746de89abed7efb06941028353e7d96994985a2043337913092e550c088b64b27555f7880c1878e8e316f7a55921d3883daa456e514f59fda9305dd3fc3b3e77a369c06f700e72fc6152cf49c25f445a3be03b6a960ef3ebf9d8baf7fd0f2dd03691a3bdc08ffd2de32c8ffe5c8d9af23af73cc1cedefa194354950a08795d3d6cdf14936ae0a0025bc2", 0x92}], 0x2, 0x0, 0x0, 0x1}, 0x40}], 0x5, 0xc000) sendmmsg(r0, &(0x7f0000008f80)=[{{&(0x7f0000008a00)=@pptp={0x18, 0x2, {0x3, @multicast2=0xe0000002}}, 0x80, &(0x7f0000008f00)=[{&(0x7f0000008a80)="2fab48227fb1b6ae204fe3e5badca9b8c6631580be688d3546d94c52cae6e73b797d7d6f2a6c3f18173560a5930bac1ab97c7bfc6d5f9d66b41e06a281fba059727baa26ef7ba765d9dff8add3ce485bc70098f3b550ca21bb1ee5e889088823b2f14d882c4efaa6b0dfc8d072aa2f951d9ff8c46f308978b1", 0x79}, {&(0x7f0000008c00)="563538060980c738a44b284e099d3c628a4b16cdf1d8ab6dd671260f32c238528358f406483f0d3026f2d24f573aa1d33e9eb6d37d6ac42572b7916aa4e1eb3554afe012ad5531e9fe209e1f920c0da2f971ab0d21ab82c8187fecdcb31200bd8d5c9e75810d02a9540e4311b0ee688b1c2092a8ed9858d3297a678a9857b5339570b8d4be01e2bcb36fc131125eaac2598e5daf302818464d799d5484a9f1ec8164bf37b6da3b54e356565ea4901e08475cf8074eb4a300b00a111f", 0xbc}, {&(0x7f0000008d00)="ebdcac", 0x3}, {&(0x7f0000008e40)="ed90e42c2d2f6daa7812044fde8eab086c2c9099f4b781eab3e258ae178e5abf1fbc258da2ece04c4964ecf11c35a587df1bc78b573e816426d8b580c500a41ef611050346e568f8180ae879b392f343383b7108b14f9203ebcf97bed50ed8677c67f41d6bbfa5e682e313001ea0427c6662513d49f0b24808bbe523d34fc3c36a3b3d7d9f5656ca3ab07b01e89f7dc53d84b63ffab1be413a3ddcef8c59", 0x9e}], 0x4, 0x0, 0x0, 0x20000000}, 0x8}], 0x1, 0x8000) 05:24:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file1\x00'}, 0x10) 05:24:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) eventfd(0x0) 05:24:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:27 executing program 7: socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:27 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) [ 647.659344] kauditd_printk_skb: 6 callbacks suppressed [ 647.659367] audit: type=1326 audit(1529731467.658:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5904 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:27 executing program 7: socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:27 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000000c0)) 05:24:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:27 executing program 7: socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:24:28 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:28 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 05:24:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 648.612353] audit: type=1326 audit(1529731468.611:1291): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5950 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) [ 648.668859] audit: type=1326 audit(1529731468.660:1292): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5960 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000012c0)={&(0x7f0000001280)='./file0\x00'}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001200)=@filter={'filter\x00', 0xe, 0x6, 0x90, [0x0, 0x20000300, 0x20000578, 0x200005a8], 0x0, &(0x7f00000000c0), &(0x7f0000000300)=[{0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x4}]}, 0x108) 05:24:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) [ 648.822574] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 648.833115] syz-executor1 cpuset=syz1 mems_allowed=0 [ 648.838250] CPU: 1 PID: 5974 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 648.845006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.854367] Call Trace: [ 648.856969] dump_stack+0x185/0x1d0 [ 648.860606] warn_alloc+0x430/0x690 [ 648.864253] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 648.869105] ? kernel_poison_pages+0x40/0x360 [ 648.873596] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 648.879039] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 648.883989] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 648.889019] kmsan_alloc_page+0x82/0xe0 [ 648.892990] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 648.897731] ? kmsan_set_origin_inline+0x6b/0x120 [ 648.902561] ? __msan_poison_alloca+0x15c/0x1d0 [ 648.907217] ? __should_failslab+0x278/0x2a0 [ 648.911614] ? should_fail+0x57/0xab0 [ 648.915399] ? __should_failslab+0x278/0x2a0 [ 648.919795] ? kmsan_set_origin_inline+0x6b/0x120 [ 648.924627] ? __msan_poison_alloca+0x15c/0x1d0 [ 648.929300] ? kmsan_set_origin+0x9e/0x160 [ 648.933529] alloc_pages_vma+0x1555/0x17f0 [ 648.937752] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 648.942847] handle_mm_fault+0x44ca/0x7ed0 [ 648.947066] ? kmsan_set_origin_inline+0x6b/0x120 [ 648.951902] __do_page_fault+0xec6/0x1a10 [ 648.956041] do_page_fault+0xb7/0x250 [ 648.959833] ? page_fault+0x8/0x30 [ 648.963358] page_fault+0x1e/0x30 [ 648.966795] RIP: 0033:0x4075fa [ 648.969969] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 648.975321] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 648.982591] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 648.989928] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 648.997181] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009e995 [ 649.004435] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 649.011705] Mem-Info: [ 649.014133] active_anon:185658 inactive_anon:75 isolated_anon:0 [ 649.014133] active_file:1733 inactive_file:1235 isolated_file:0 [ 649.014133] unevictable:0 dirty:41 writeback:0 unstable:0 [ 649.014133] slab_reclaimable:3322 slab_unreclaimable:9464 [ 649.014133] mapped:67650 shmem:84 pagetables:1488 bounce:0 [ 649.014133] free:199497 free_pcp:479 free_cma:0 [ 649.047311] Node 0 active_anon:742632kB inactive_anon:300kB active_file:6932kB inactive_file:4940kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270600kB dirty:164kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 649.075227] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 649.101336] lowmem_reserve[]: 0 2817 7244 7244 [ 649.105906] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 649.134893] lowmem_reserve[]: 0 0 4426 4426 [ 649.139206] Node 0 Normal free:309980kB min:41208kB low:51508kB high:61808kB active_anon:529312kB inactive_anon:300kB active_file:6808kB inactive_file:4940kB unevictable:0kB writepending:100kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3760kB bounce:0kB free_pcp:592kB local_pcp:156kB free_cma:0kB [ 649.168703] lowmem_reserve[]: 0 0 0 0 [ 649.172496] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 649.185708] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 649.203094] Node 0 Normal: 11342*4kB (UME) 5816*8kB (UME) 2536*16kB (UME) 1820*32kB (UM) 1213*64kB (UM) 269*128kB (UM) 5*256kB (M) 5*512kB (UM) 3*1024kB (M) 0*2048kB 0*4096kB = 309688kB 05:24:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 649.219782] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 649.228340] 3052 total pagecache pages [ 649.232205] 0 pages in swap cache [ 649.235639] Swap cache stats: add 0, delete 0, find 0/0 [ 649.240989] Free swap = 0kB [ 649.243988] Total swap = 0kB [ 649.246986] 1965969 pages RAM [ 649.250075] 0 pages HighMem/MovableOnly [ 649.254027] 106316 pages reserved 05:24:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) [ 649.430050] audit: type=1326 audit(1529731469.428:1293): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=5989 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:29 executing program 0: ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000012c0)={&(0x7f0000001280)='./file0\x00'}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000001200)=@filter={'filter\x00', 0xe, 0x6, 0x90, [0x0, 0x20000300, 0x20000578, 0x200005a8], 0x0, &(0x7f00000000c0), &(0x7f0000000300)=[{0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x4}]}, 0x108) 05:24:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000000)) [ 649.605110] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 649.615645] syz-executor7 cpuset=syz7 mems_allowed=0 [ 649.620754] CPU: 0 PID: 6004 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 649.627492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.636836] Call Trace: [ 649.639418] dump_stack+0x185/0x1d0 [ 649.643030] warn_alloc+0x430/0x690 [ 649.646650] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 649.651480] ? kernel_poison_pages+0x40/0x360 [ 649.655992] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 649.661430] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 649.666365] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 649.671371] ? kmsan_set_origin_inline+0x6b/0x120 [ 649.676204] kmsan_alloc_page+0x82/0xe0 [ 649.680165] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 649.684906] ? kmsan_set_origin_inline+0x6b/0x120 [ 649.689731] ? __msan_poison_alloca+0x15c/0x1d0 [ 649.694383] ? __should_failslab+0x278/0x2a0 [ 649.698780] ? should_fail+0x57/0xab0 [ 649.702758] ? __should_failslab+0x278/0x2a0 [ 649.707151] ? kmsan_set_origin_inline+0x6b/0x120 [ 649.711991] ? __msan_poison_alloca+0x15c/0x1d0 [ 649.716667] ? kmsan_set_origin+0x9e/0x160 [ 649.720893] alloc_pages_vma+0x1555/0x17f0 [ 649.725116] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 649.730210] handle_mm_fault+0x44ca/0x7ed0 [ 649.734430] ? kmsan_set_origin_inline+0x6b/0x120 [ 649.739267] __do_page_fault+0xec6/0x1a10 [ 649.743405] do_page_fault+0xb7/0x250 [ 649.747186] ? page_fault+0x8/0x30 [ 649.750708] page_fault+0x1e/0x30 [ 649.754143] RIP: 0033:0x4075fa [ 649.757318] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 649.762666] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 649.769917] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 649.777170] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 649.784428] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009eca4 05:24:29 executing program 0: ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) [ 649.799240] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 649.812208] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 649.822744] syz-executor4 cpuset=syz4 mems_allowed=0 [ 649.827869] CPU: 0 PID: 6003 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 649.834613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.843961] Call Trace: [ 649.846559] dump_stack+0x185/0x1d0 [ 649.850190] warn_alloc+0x430/0x690 [ 649.853823] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 649.858655] ? kernel_poison_pages+0x40/0x360 [ 649.863145] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 649.868621] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 649.873639] ? kmsan_set_origin_inline+0x6b/0x120 [ 649.878486] kmsan_alloc_page+0x82/0xe0 [ 649.882450] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 649.887202] ? kmsan_set_origin_inline+0x6b/0x120 [ 649.892203] ? __msan_poison_alloca+0x15c/0x1d0 [ 649.896855] ? __should_failslab+0x278/0x2a0 [ 649.901255] ? should_fail+0x57/0xab0 [ 649.905041] ? __should_failslab+0x278/0x2a0 [ 649.909436] ? kmsan_set_origin_inline+0x6b/0x120 [ 649.914264] ? __msan_poison_alloca+0x15c/0x1d0 [ 649.918935] ? kmsan_set_origin+0x9e/0x160 [ 649.923161] alloc_pages_vma+0x1555/0x17f0 [ 649.927388] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 649.932484] handle_mm_fault+0x44ca/0x7ed0 [ 649.936704] ? kmsan_set_origin_inline+0x6b/0x120 [ 649.941539] __do_page_fault+0xec6/0x1a10 [ 649.945677] do_page_fault+0xb7/0x250 [ 649.949466] ? page_fault+0x8/0x30 [ 649.952999] page_fault+0x1e/0x30 [ 649.956447] RIP: 0033:0x4075fa [ 649.959621] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 649.964972] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 649.972232] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 649.979487] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 649.986743] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009ed73 [ 649.994082] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 650.001346] warn_alloc_show_mem: 1 callbacks suppressed [ 650.001349] Mem-Info: [ 650.009104] active_anon:186152 inactive_anon:75 isolated_anon:0 [ 650.009104] active_file:1626 inactive_file:1248 isolated_file:0 [ 650.009104] unevictable:0 dirty:44 writeback:0 unstable:0 [ 650.009104] slab_reclaimable:3322 slab_unreclaimable:9455 [ 650.009104] mapped:67399 shmem:84 pagetables:1483 bounce:0 [ 650.009104] free:200732 free_pcp:380 free_cma:0 [ 650.042356] Node 0 active_anon:744608kB inactive_anon:300kB active_file:6504kB inactive_file:4992kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269596kB dirty:176kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 650.070275] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 650.096386] lowmem_reserve[]: 0 2817 7244 7244 [ 650.100961] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 650.130295] lowmem_reserve[]: 0 0 4426 4426 [ 650.134611] Node 0 Normal free:314920kB min:41208kB low:51508kB high:61808kB active_anon:529252kB inactive_anon:300kB active_file:6380kB inactive_file:4992kB unevictable:0kB writepending:112kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8384kB pagetables:3740kB bounce:0kB free_pcp:196kB local_pcp:60kB free_cma:0kB [ 650.164041] lowmem_reserve[]: 0 0 0 0 [ 650.167834] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 650.181036] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 650.198427] Node 0 Normal: 11479*4kB (ME) 5813*8kB (ME) 2533*16kB (ME) 1820*32kB (UM) 1208*64kB (M) 266*128kB (M) 5*256kB (UM) 3*512kB (M) 3*1024kB (UM) 3*2048kB (UM) 0*4096kB = 314580kB [ 650.215205] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 650.223766] 2958 total pagecache pages [ 650.227630] 0 pages in swap cache [ 650.231060] Swap cache stats: add 0, delete 0, find 0/0 [ 650.236397] Free swap = 0kB [ 650.239391] Total swap = 0kB [ 650.242388] 1965969 pages RAM [ 650.245469] 0 pages HighMem/MovableOnly [ 650.249421] 106316 pages reserved 05:24:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:30 executing program 0: ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:30 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 650.489870] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 650.500418] syz-executor7 cpuset=syz7 mems_allowed=0 [ 650.505548] CPU: 0 PID: 6035 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 650.512307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.521663] Call Trace: [ 650.524261] dump_stack+0x185/0x1d0 [ 650.528878] warn_alloc+0x430/0x690 [ 650.532531] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:24:30 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) [ 650.537399] ? kernel_poison_pages+0x40/0x360 [ 650.543483] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 650.548963] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 650.553957] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 650.558929] kmsan_alloc_page+0x82/0xe0 [ 650.562918] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 650.567696] ? kmsan_set_origin_inline+0x6b/0x120 [ 650.572566] ? __msan_poison_alloca+0x15c/0x1d0 [ 650.577250] ? __should_failslab+0x278/0x2a0 [ 650.581672] ? should_fail+0x57/0xab0 [ 650.585654] ? __should_failslab+0x278/0x2a0 [ 650.590079] ? kmsan_set_origin_inline+0x6b/0x120 [ 650.594961] ? __msan_poison_alloca+0x15c/0x1d0 [ 650.599645] ? kmsan_set_origin+0x9e/0x160 [ 650.603898] alloc_pages_vma+0x1555/0x17f0 [ 650.608161] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 650.613287] handle_mm_fault+0x44ca/0x7ed0 [ 650.617533] ? kmsan_set_origin_inline+0x6b/0x120 [ 650.622429] __do_page_fault+0xec6/0x1a10 [ 650.626599] do_page_fault+0xb7/0x250 [ 650.631110] ? page_fault+0x8/0x30 [ 650.634677] page_fault+0x1e/0x30 [ 650.638134] RIP: 0033:0x4075fa [ 650.641324] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 650.646691] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 650.653966] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 650.661245] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 650.668619] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009f019 [ 650.675911] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) 05:24:30 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) [ 650.740054] audit: type=1326 audit(1529731470.738:1294): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6029 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) 05:24:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) [ 650.873730] audit: type=1326 audit(1529731470.872:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6055 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) [ 651.023656] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 651.034194] syz-executor4 cpuset=syz4 mems_allowed=0 [ 651.039319] CPU: 0 PID: 6071 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 651.046072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.055455] Call Trace: [ 651.058053] dump_stack+0x185/0x1d0 [ 651.061685] warn_alloc+0x430/0x690 [ 651.065327] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:24:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) [ 651.070176] ? kernel_poison_pages+0x40/0x360 [ 651.074692] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 651.080152] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 651.085111] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 651.090082] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.094939] ? __msan_poison_alloca+0x15c/0x1d0 [ 651.099625] kmsan_alloc_page+0x82/0xe0 [ 651.103610] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 651.108375] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.113221] ? __msan_poison_alloca+0x15c/0x1d0 [ 651.117892] ? __should_failslab+0x278/0x2a0 [ 651.122306] ? should_fail+0x57/0xab0 [ 651.126108] ? __should_failslab+0x278/0x2a0 [ 651.130525] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.135385] ? __msan_poison_alloca+0x15c/0x1d0 [ 651.140100] ? kmsan_set_origin+0x9e/0x160 [ 651.144362] alloc_pages_vma+0x1555/0x17f0 [ 651.148615] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 651.153738] handle_mm_fault+0x44ca/0x7ed0 [ 651.158003] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.162876] __do_page_fault+0xec6/0x1a10 [ 651.167048] do_page_fault+0xb7/0x250 [ 651.170859] ? page_fault+0x8/0x30 [ 651.174402] page_fault+0x1e/0x30 [ 651.177851] RIP: 0033:0x4075fa [ 651.181039] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 651.186751] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 651.194023] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 651.201296] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 651.208745] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009f22f [ 651.216015] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 651.223301] warn_alloc_show_mem: 1 callbacks suppressed [ 651.223303] Mem-Info: [ 651.231088] active_anon:186171 inactive_anon:76 isolated_anon:0 [ 651.231088] active_file:1667 inactive_file:1219 isolated_file:0 [ 651.231088] unevictable:0 dirty:56 writeback:0 unstable:0 [ 651.231088] slab_reclaimable:3322 slab_unreclaimable:9456 [ 651.231088] mapped:67388 shmem:84 pagetables:1444 bounce:0 [ 651.231088] free:200418 free_pcp:529 free_cma:0 [ 651.264278] Node 0 active_anon:744800kB inactive_anon:304kB active_file:6668kB inactive_file:4876kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270248kB dirty:224kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 651.292209] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 651.318445] lowmem_reserve[]: 0 2817 7244 7244 [ 651.323064] Node 0 DMA32 free:478248kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 651.353286] lowmem_reserve[]: 0 0 4426 4426 [ 651.357641] Node 0 Normal free:314152kB min:41208kB low:51508kB high:61808kB active_anon:529188kB inactive_anon:304kB active_file:6544kB inactive_file:4876kB unevictable:0kB writepending:160kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3584kB bounce:0kB free_pcp:1068kB local_pcp:428kB free_cma:0kB [ 651.387248] lowmem_reserve[]: 0 0 0 0 [ 651.391059] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 651.404313] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 4*2048kB (UM) 0*4096kB = 480296kB 05:24:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 05:24:31 executing program 1: memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) [ 651.422162] Node 0 Normal: 11518*4kB (UME) 5864*8kB (UME) 2540*16kB (UME) 1820*32kB (UM) 1223*64kB (UM) 265*128kB (UM) 5*256kB (UM) 3*512kB (M) 2*1024kB (UM) 5*2048kB (UM) 0*4096kB = 319160kB [ 651.439413] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 651.447991] 2970 total pagecache pages [ 651.451876] 0 pages in swap cache [ 651.455322] Swap cache stats: add 0, delete 0, find 0/0 [ 651.460675] Free swap = 0kB [ 651.463685] Total swap = 0kB [ 651.466701] 1965969 pages RAM [ 651.469796] 0 pages HighMem/MovableOnly [ 651.473765] 106316 pages reserved [ 651.491642] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 651.502180] syz-executor5 cpuset=syz5 mems_allowed=0 [ 651.507313] CPU: 1 PID: 6087 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 651.514074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.523432] Call Trace: [ 651.526026] dump_stack+0x185/0x1d0 [ 651.529657] warn_alloc+0x430/0x690 [ 651.533299] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 651.538143] ? kernel_poison_pages+0x40/0x360 [ 651.542642] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 651.548097] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 651.553083] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 651.559059] kmsan_alloc_page+0x82/0xe0 [ 651.563989] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 651.569449] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.574299] ? __msan_poison_alloca+0x15c/0x1d0 [ 651.578992] ? __should_failslab+0x278/0x2a0 [ 651.583408] ? should_fail+0x57/0xab0 [ 651.587202] ? __should_failslab+0x278/0x2a0 [ 651.591608] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.596456] ? __msan_poison_alloca+0x15c/0x1d0 [ 651.601133] ? apic_timer_interrupt+0xa/0x20 [ 651.605552] alloc_pages_vma+0x1555/0x17f0 [ 651.609793] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 651.614908] handle_mm_fault+0x44ca/0x7ed0 [ 651.619147] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.624012] __do_page_fault+0xec6/0x1a10 [ 651.628173] do_page_fault+0xb7/0x250 [ 651.631980] ? page_fault+0x8/0x30 [ 651.635796] page_fault+0x1e/0x30 [ 651.639249] RIP: 0033:0x4075fa [ 651.642434] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 651.647798] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 651.655108] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 651.662381] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 651.669746] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009f403 [ 651.677018] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 651.690426] audit: type=1326 audit(1529731471.689:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6095 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:31 executing program 1: memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) [ 651.844638] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 651.855179] syz-executor7 cpuset=syz7 mems_allowed=0 [ 651.860305] CPU: 0 PID: 6106 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 651.867052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.876403] Call Trace: [ 651.878998] dump_stack+0x185/0x1d0 [ 651.882626] warn_alloc+0x430/0x690 [ 651.886263] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:24:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:31 executing program 1: memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) [ 651.891104] ? kernel_poison_pages+0x40/0x360 [ 651.895603] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 651.901057] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 651.906011] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 651.911055] kmsan_alloc_page+0x82/0xe0 [ 651.915126] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 651.919906] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.924756] ? __msan_poison_alloca+0x15c/0x1d0 [ 651.929433] ? __should_failslab+0x278/0x2a0 [ 651.933850] ? should_fail+0x57/0xab0 [ 651.937658] ? __should_failslab+0x278/0x2a0 [ 651.942078] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.946929] ? __msan_poison_alloca+0x15c/0x1d0 [ 651.951608] ? kmsan_set_origin+0x9e/0x160 [ 651.955859] alloc_pages_vma+0x1555/0x17f0 [ 651.960106] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 651.965227] handle_mm_fault+0x44ca/0x7ed0 [ 651.969482] ? kmsan_set_origin_inline+0x6b/0x120 [ 651.974356] __do_page_fault+0xec6/0x1a10 [ 651.978608] do_page_fault+0xb7/0x250 [ 651.982415] ? page_fault+0x8/0x30 [ 651.985964] page_fault+0x1e/0x30 [ 651.989422] RIP: 0033:0x4075fa 05:24:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) [ 651.992607] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 651.997970] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 652.005336] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 652.012626] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 652.019899] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009f564 [ 652.028058] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 652.165787] audit: type=1326 audit(1529731472.164:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6106 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) [ 652.634889] audit: type=1326 audit(1529731472.633:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6142 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 652.686386] audit: type=1326 audit(1529731472.675:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6139 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@nl=@unspec, &(0x7f0000000000)=0x80) 05:24:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) [ 652.818876] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 652.829414] syz-executor2 cpuset=syz2 mems_allowed=0 [ 652.834528] CPU: 0 PID: 6156 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 652.841369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.850723] Call Trace: [ 652.853305] dump_stack+0x185/0x1d0 [ 652.856917] warn_alloc+0x430/0x690 [ 652.860537] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 652.865385] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 652.870821] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 652.875748] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 652.880681] kmsan_alloc_page+0x82/0xe0 [ 652.884654] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 652.889406] ? kmsan_set_origin_inline+0x6b/0x120 [ 652.894420] ? __msan_poison_alloca+0x15c/0x1d0 [ 652.899088] ? __should_failslab+0x278/0x2a0 [ 652.903488] ? should_fail+0x57/0xab0 [ 652.907273] ? __should_failslab+0x278/0x2a0 [ 652.911678] ? kmsan_set_origin_inline+0x6b/0x120 [ 652.916508] ? __msan_poison_alloca+0x15c/0x1d0 [ 652.921164] ? kmsan_set_origin+0x9e/0x160 [ 652.925393] alloc_pages_vma+0x1555/0x17f0 [ 652.929618] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 652.934724] handle_mm_fault+0x44ca/0x7ed0 [ 652.938945] ? kmsan_set_origin_inline+0x6b/0x120 [ 652.943783] __do_page_fault+0xec6/0x1a10 [ 652.947919] do_page_fault+0xb7/0x250 [ 652.951703] ? page_fault+0x8/0x30 [ 652.955235] page_fault+0x1e/0x30 [ 652.958668] RIP: 0033:0x4075fa [ 652.961843] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 652.967190] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 652.974444] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 652.981699] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 652.988966] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009f932 [ 652.996226] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 653.003492] warn_alloc_show_mem: 2 callbacks suppressed [ 653.003494] Mem-Info: [ 653.011240] active_anon:186136 inactive_anon:76 isolated_anon:0 [ 653.011240] active_file:1701 inactive_file:1265 isolated_file:0 [ 653.011240] unevictable:0 dirty:67 writeback:0 unstable:0 [ 653.011240] slab_reclaimable:3322 slab_unreclaimable:9457 [ 653.011240] mapped:67440 shmem:84 pagetables:1444 bounce:0 [ 653.011240] free:197921 free_pcp:438 free_cma:0 [ 653.044400] Node 0 active_anon:744544kB inactive_anon:304kB active_file:6804kB inactive_file:5060kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269760kB dirty:268kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 653.072319] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 653.098429] lowmem_reserve[]: 0 2817 7244 7244 [ 653.103005] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 653.132337] lowmem_reserve[]: 0 0 4426 4426 [ 653.136878] Node 0 Normal free:303676kB min:41208kB low:51508kB high:61808kB active_anon:531256kB inactive_anon:304kB active_file:6680kB inactive_file:5060kB unevictable:0kB writepending:204kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3584kB bounce:0kB free_pcp:428kB local_pcp:188kB free_cma:0kB [ 653.166375] lowmem_reserve[]: 0 0 0 0 [ 653.170167] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 653.183375] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 653.200754] Node 0 Normal: 11367*4kB (ME) 5810*8kB (UME) 2529*16kB (UME) 1816*32kB (M) 1204*64kB (M) 264*128kB (UM) 5*256kB (UM) 2*512kB (M) 0*1024kB 0*2048kB 0*4096kB = 303676kB [ 653.216836] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 653.225402] 3050 total pagecache pages [ 653.229276] 0 pages in swap cache [ 653.232717] Swap cache stats: add 0, delete 0, find 0/0 [ 653.238067] Free swap = 0kB [ 653.241064] Total swap = 0kB [ 653.244064] 1965969 pages RAM [ 653.247145] 0 pages HighMem/MovableOnly [ 653.251105] 106316 pages reserved [ 653.272944] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 653.295888] syz-executor7 cpuset=syz7 mems_allowed=0 [ 653.300995] CPU: 0 PID: 6160 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 653.307729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.317065] Call Trace: [ 653.319652] dump_stack+0x185/0x1d0 [ 653.323262] warn_alloc+0x430/0x690 [ 653.326897] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 653.331725] ? kernel_poison_pages+0x40/0x360 [ 653.336304] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 653.341744] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 653.347549] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 653.352475] ? kmsan_set_origin_inline+0x6b/0x120 [ 653.357303] ? __msan_poison_alloca+0x15c/0x1d0 [ 653.361964] kmsan_alloc_page+0x82/0xe0 [ 653.366019] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 653.370762] ? kmsan_set_origin_inline+0x6b/0x120 [ 653.375591] ? __msan_poison_alloca+0x15c/0x1d0 [ 653.380241] ? __should_failslab+0x278/0x2a0 [ 653.384646] ? should_fail+0x57/0xab0 [ 653.388429] ? __should_failslab+0x278/0x2a0 [ 653.392823] ? kmsan_set_origin_inline+0x6b/0x120 [ 653.397649] ? __msan_poison_alloca+0x15c/0x1d0 [ 653.402307] ? kmsan_set_origin+0x9e/0x160 [ 653.406533] alloc_pages_vma+0x1555/0x17f0 [ 653.410762] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 653.415857] handle_mm_fault+0x44ca/0x7ed0 [ 653.420078] ? kmsan_set_origin_inline+0x6b/0x120 [ 653.424920] __do_page_fault+0xec6/0x1a10 [ 653.429069] do_page_fault+0xb7/0x250 [ 653.432856] ? page_fault+0x8/0x30 05:24:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) [ 653.436404] page_fault+0x1e/0x30 [ 653.439846] RIP: 0033:0x4075fa [ 653.443016] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 653.448363] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 653.455624] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 653.462891] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 653.470155] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009faf8 [ 653.477416] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) [ 653.778257] audit: type=1326 audit(1529731473.777:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6183 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) syncfs(0xffffffffffffffff) 05:24:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) [ 653.838830] audit: type=1326 audit(1529731473.830:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6160 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) [ 653.920082] audit: type=1326 audit(1529731473.918:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6182 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 654.002873] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 654.013410] syz-executor5 cpuset=syz5 mems_allowed=0 [ 654.018618] CPU: 0 PID: 6198 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 654.025445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.034818] Call Trace: [ 654.037402] dump_stack+0x185/0x1d0 [ 654.041016] warn_alloc+0x430/0x690 [ 654.044642] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 654.049472] ? kernel_poison_pages+0x40/0x360 [ 654.053956] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 654.059395] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 654.074916] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 654.079847] kmsan_alloc_page+0x82/0xe0 [ 654.083807] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 654.088558] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.093386] ? __msan_poison_alloca+0x15c/0x1d0 [ 654.098037] ? __should_failslab+0x278/0x2a0 [ 654.102433] ? should_fail+0x57/0xab0 [ 654.106218] ? __should_failslab+0x278/0x2a0 [ 654.110613] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.115441] ? __msan_poison_alloca+0x15c/0x1d0 [ 654.120099] ? kmsan_set_origin+0x9e/0x160 [ 654.124323] alloc_pages_vma+0x1555/0x17f0 [ 654.128547] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 654.133649] handle_mm_fault+0x44ca/0x7ed0 [ 654.137871] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.142708] __do_page_fault+0xec6/0x1a10 [ 654.146846] do_page_fault+0xb7/0x250 [ 654.150630] ? page_fault+0x8/0x30 [ 654.154151] page_fault+0x1e/0x30 [ 654.157593] RIP: 0033:0x4075fa [ 654.160773] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 654.166116] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 654.173371] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 654.180625] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 654.187969] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009fdd2 [ 654.195227] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 654.202500] warn_alloc_show_mem: 1 callbacks suppressed [ 654.202502] Mem-Info: [ 654.210351] active_anon:186175 inactive_anon:73 isolated_anon:0 [ 654.210351] active_file:1701 inactive_file:1272 isolated_file:0 [ 654.210351] unevictable:0 dirty:74 writeback:0 unstable:0 [ 654.210351] slab_reclaimable:3322 slab_unreclaimable:9457 [ 654.210351] mapped:67489 shmem:84 pagetables:1450 bounce:0 [ 654.210351] free:198586 free_pcp:520 free_cma:0 [ 654.243595] Node 0 active_anon:744700kB inactive_anon:292kB active_file:6804kB inactive_file:5088kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269956kB dirty:296kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 654.271512] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 654.297627] lowmem_reserve[]: 0 2817 7244 7244 [ 654.302201] Node 0 DMA32 free:478248kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 654.331098] lowmem_reserve[]: 0 0 4426 4426 [ 654.335864] Node 0 Normal free:300192kB min:41208kB low:51508kB high:61808kB active_anon:531424kB inactive_anon:292kB active_file:6680kB inactive_file:5088kB unevictable:0kB writepending:232kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3608kB bounce:0kB free_pcp:756kB local_pcp:76kB free_cma:0kB [ 654.365275] lowmem_reserve[]: 0 0 0 0 [ 654.369066] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 654.382282] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 478248kB [ 654.400368] Node 0 Normal: 11392*4kB (UME) 5824*8kB (UME) 2517*16kB (UME) 1803*32kB (UM) 1198*64kB (UM) 255*128kB (UM) 3*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 300208kB [ 654.416380] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 654.424935] 3057 total pagecache pages [ 654.428803] 0 pages in swap cache [ 654.432234] Swap cache stats: add 0, delete 0, find 0/0 [ 654.437573] Free swap = 0kB [ 654.440576] Total swap = 0kB [ 654.443572] 1965969 pages RAM [ 654.446653] 0 pages HighMem/MovableOnly [ 654.450608] 106316 pages reserved 05:24:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x20006}]}) socket$packet(0x11, 0x0, 0x300) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 05:24:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) [ 654.534000] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 654.544621] syz-executor1 cpuset=syz1 mems_allowed=0 [ 654.549766] CPU: 0 PID: 6207 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 654.556502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.565838] Call Trace: [ 654.568422] dump_stack+0x185/0x1d0 [ 654.572045] warn_alloc+0x430/0x690 [ 654.575684] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 654.580533] ? kernel_poison_pages+0x40/0x360 [ 654.585029] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 654.590469] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 654.595405] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 654.600339] kmsan_alloc_page+0x82/0xe0 [ 654.604303] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 654.609050] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.613970] ? __msan_poison_alloca+0x15c/0x1d0 [ 654.618628] ? __should_failslab+0x278/0x2a0 [ 654.623024] ? should_fail+0x57/0xab0 [ 654.626809] ? __should_failslab+0x278/0x2a0 [ 654.631217] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.636047] ? __msan_poison_alloca+0x15c/0x1d0 [ 654.640705] ? kmsan_set_origin+0x9e/0x160 [ 654.644932] alloc_pages_vma+0x1555/0x17f0 [ 654.649158] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 654.654268] handle_mm_fault+0x44ca/0x7ed0 [ 654.658491] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.663331] __do_page_fault+0xec6/0x1a10 [ 654.667468] do_page_fault+0xb7/0x250 [ 654.671264] ? page_fault+0x8/0x30 [ 654.674792] page_fault+0x1e/0x30 [ 654.678228] RIP: 0033:0x4075fa [ 654.681414] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 654.686763] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 654.694021] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 654.701279] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 654.708536] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000009ffe5 [ 654.715797] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 654.726199] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 654.736711] syz-executor7 cpuset=syz7 mems_allowed=0 [ 654.741838] CPU: 1 PID: 6206 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 654.748608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.757976] Call Trace: [ 654.760567] dump_stack+0x185/0x1d0 [ 654.764183] warn_alloc+0x430/0x690 [ 654.767803] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 654.772630] ? kernel_poison_pages+0x40/0x360 [ 654.783374] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 654.788810] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 654.793753] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 654.798675] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.803512] ? __msan_poison_alloca+0x15c/0x1d0 [ 654.808174] kmsan_alloc_page+0x82/0xe0 [ 654.812146] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 654.816887] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.821715] ? __msan_poison_alloca+0x15c/0x1d0 [ 654.826369] ? __should_failslab+0x278/0x2a0 [ 654.830766] ? should_fail+0x57/0xab0 [ 654.834548] ? __should_failslab+0x278/0x2a0 [ 654.838941] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.843778] ? __msan_poison_alloca+0x15c/0x1d0 [ 654.848432] ? kmsan_set_origin+0x9e/0x160 [ 654.852654] alloc_pages_vma+0x1555/0x17f0 [ 654.856876] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 654.861971] handle_mm_fault+0x44ca/0x7ed0 [ 654.866196] ? kmsan_set_origin_inline+0x6b/0x120 [ 654.871039] __do_page_fault+0xec6/0x1a10 [ 654.875182] do_page_fault+0xb7/0x250 [ 654.879060] ? page_fault+0x8/0x30 [ 654.882586] page_fault+0x1e/0x30 [ 654.886020] RIP: 0033:0x4075fa [ 654.889204] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 654.894554] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 654.901830] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 654.909082] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 654.916349] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a00a5 [ 654.923604] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[]}, 0x1}, 0x0) eventfd(0x0) 05:24:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), 0x4) 05:24:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) [ 655.007861] audit: type=1326 audit(1529731475.006:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6215 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) syncfs(0xffffffffffffffff) [ 655.076546] audit: type=1326 audit(1529731475.049:1304): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6217 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) [ 655.254330] audit: type=1326 audit(1529731475.253:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6206 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) syncfs(0xffffffffffffffff) 05:24:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) [ 655.726557] audit: type=1326 audit(1529731475.724:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6259 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f4}]}) socket$inet_tcp(0x2, 0x1, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000280)=""/4096) 05:24:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:35 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:35 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) 05:24:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) [ 655.999420] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 656.010311] syz-executor0 cpuset=syz0 mems_allowed=0 [ 656.015437] CPU: 0 PID: 6275 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 656.022184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.031536] Call Trace: [ 656.034120] dump_stack+0x185/0x1d0 [ 656.037735] warn_alloc+0x430/0x690 [ 656.041355] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 656.046190] ? kernel_poison_pages+0x40/0x360 [ 656.050671] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 656.056107] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 656.061036] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 656.065989] kmsan_alloc_page+0x82/0xe0 [ 656.070055] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 656.075672] ? kmsan_set_origin_inline+0x6b/0x120 [ 656.080509] ? __msan_poison_alloca+0x15c/0x1d0 [ 656.085169] ? __should_failslab+0x278/0x2a0 [ 656.089589] ? should_fail+0x57/0xab0 [ 656.093379] ? __should_failslab+0x278/0x2a0 [ 656.098386] ? kmsan_set_origin_inline+0x6b/0x120 [ 656.103222] ? __msan_poison_alloca+0x15c/0x1d0 [ 656.107905] ? kmsan_set_origin+0x9e/0x160 [ 656.112143] alloc_pages_vma+0x1555/0x17f0 [ 656.116372] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 656.121471] handle_mm_fault+0x44ca/0x7ed0 [ 656.125691] ? kmsan_set_origin_inline+0x6b/0x120 [ 656.130533] __do_page_fault+0xec6/0x1a10 [ 656.134695] do_page_fault+0xb7/0x250 [ 656.138488] ? page_fault+0x8/0x30 [ 656.142012] page_fault+0x1e/0x30 [ 656.145449] RIP: 0033:0x4075fa [ 656.148625] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 656.153974] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 656.161261] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 656.168525] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 656.175794] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a059f [ 656.183048] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 656.190309] warn_alloc_show_mem: 2 callbacks suppressed [ 656.190312] Mem-Info: [ 656.198065] active_anon:186141 inactive_anon:77 isolated_anon:0 [ 656.198065] active_file:1698 inactive_file:1262 isolated_file:0 [ 656.198065] unevictable:0 dirty:17 writeback:0 unstable:0 [ 656.198065] slab_reclaimable:3322 slab_unreclaimable:9452 [ 656.198065] mapped:67458 shmem:84 pagetables:1496 bounce:0 [ 656.198065] free:196008 free_pcp:417 free_cma:0 [ 656.231237] Node 0 active_anon:744564kB inactive_anon:308kB active_file:6792kB inactive_file:5048kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269832kB dirty:68kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 656.259078] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 656.285192] lowmem_reserve[]: 0 2817 7244 7244 [ 656.289780] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:52kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 656.318674] lowmem_reserve[]: 0 0 4426 4426 [ 656.322996] Node 0 Normal free:296024kB min:41208kB low:51508kB high:61808kB active_anon:531256kB inactive_anon:308kB active_file:6668kB inactive_file:5048kB unevictable:0kB writepending:16kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3792kB bounce:0kB free_pcp:344kB local_pcp:132kB free_cma:0kB [ 656.352406] lowmem_reserve[]: 0 0 0 0 [ 656.356221] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 656.369429] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 656.386811] Node 0 Normal: 11334*4kB (UME) 5772*8kB (UME) 2496*16kB (ME) 1793*32kB (UM) 1177*64kB (UM) 249*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 296024kB [ 656.402285] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 656.410844] 3044 total pagecache pages [ 656.414714] 0 pages in swap cache [ 656.418150] Swap cache stats: add 0, delete 0, find 0/0 [ 656.423517] Free swap = 0kB [ 656.426516] Total swap = 0kB [ 656.429515] 1965969 pages RAM [ 656.432600] 0 pages HighMem/MovableOnly [ 656.436559] 106316 pages reserved [ 656.445572] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 656.456086] syz-executor2 cpuset=syz2 mems_allowed=0 [ 656.461227] CPU: 0 PID: 6282 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 656.467978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.477360] Call Trace: [ 656.479959] dump_stack+0x185/0x1d0 [ 656.483600] warn_alloc+0x430/0x690 [ 656.487248] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 656.492103] ? kernel_poison_pages+0x40/0x360 [ 656.496608] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 656.502069] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 656.507015] ? kmsan_set_origin_inline+0x6b/0x120 [ 656.511847] ? __msan_poison_alloca+0x15c/0x1d0 [ 656.516511] kmsan_alloc_page+0x82/0xe0 [ 656.520487] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 656.525231] ? do_syscall_64+0x15b/0x230 [ 656.529282] ? kmsan_set_origin_inline+0x6b/0x120 [ 656.534126] ? __msan_poison_alloca+0x15c/0x1d0 [ 656.538782] ? __should_failslab+0x278/0x2a0 [ 656.543184] ? should_fail+0x57/0xab0 [ 656.546976] ? __should_failslab+0x278/0x2a0 [ 656.551386] ? kmsan_set_origin_inline+0x6b/0x120 [ 656.556219] ? __msan_poison_alloca+0x15c/0x1d0 [ 656.560879] ? kmsan_set_origin+0x9e/0x160 [ 656.565113] alloc_pages_vma+0x1555/0x17f0 [ 656.569340] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 656.574443] handle_mm_fault+0x44ca/0x7ed0 [ 656.578672] ? kmsan_set_origin_inline+0x6b/0x120 [ 656.583526] __do_page_fault+0xec6/0x1a10 [ 656.587690] do_page_fault+0xb7/0x250 [ 656.591480] page_fault+0x1e/0x30 [ 656.594931] RIP: 0010:__put_user_4+0x1c/0x30 [ 656.599321] RSP: 0018:ffff880115a9fdb0 EFLAGS: 00010297 [ 656.604669] RAX: 0000000000000013 RBX: 00007fffffffeffd RCX: 0000000020000100 [ 656.611943] RDX: 0000000000000000 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 656.619201] RBP: ffff880115a9fe78 R08: 0000000001080020 R09: 0000000000000002 [ 656.626474] R10: 0000000000000000 R11: ffffffff87d2e2c0 R12: 0000000000000000 [ 656.633736] R13: 0000000000000000 R14: 0000000020000100 R15: 0000000000000013 [ 656.641012] ? __sys_socketpair+0x1490/0x1490 [ 656.645500] ? __sys_socketpair+0x1cb/0x1490 [ 656.649908] __x64_sys_socketpair+0x117/0x170 [ 656.655089] ? __sys_socketpair+0x1490/0x1490 [ 656.659577] do_syscall_64+0x15b/0x230 [ 656.663546] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 656.668750] RIP: 0033:0x455a99 [ 656.671926] RSP: 002b:00007f64239d6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 656.679625] RAX: ffffffffffffffda RBX: 00007f64239d76d4 RCX: 0000000000455a99 [ 656.686881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 656.694141] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 05:24:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) [ 656.701486] R10: 0000000020000100 R11: 0000000000000246 R12: 00000000ffffffff [ 656.708745] R13: 00000000004c1c23 R14: 00000000004d2d08 R15: 0000000000000000 05:24:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) flock(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 05:24:36 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:36 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:36 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000140)) 05:24:37 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x20000501a1}]}) flock(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 657.040744] audit: type=1326 audit(1529731477.039:1307): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6305 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 657.119785] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 657.130319] syz-executor7 cpuset=syz7 mems_allowed=0 [ 657.135451] CPU: 1 PID: 6322 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 657.142205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.151562] Call Trace: [ 657.154145] dump_stack+0x185/0x1d0 [ 657.157760] warn_alloc+0x430/0x690 [ 657.161444] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 657.166280] ? kernel_poison_pages+0x40/0x360 [ 657.170777] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 657.176217] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 657.181149] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 657.186105] kmsan_alloc_page+0x82/0xe0 [ 657.190083] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 657.194826] ? kmsan_set_origin_inline+0x6b/0x120 [ 657.199657] ? __msan_poison_alloca+0x15c/0x1d0 [ 657.204314] ? __should_failslab+0x278/0x2a0 [ 657.208727] ? should_fail+0x57/0xab0 [ 657.212516] ? __should_failslab+0x278/0x2a0 [ 657.216913] ? kmsan_set_origin_inline+0x6b/0x120 [ 657.221765] ? __msan_poison_alloca+0x15c/0x1d0 [ 657.226437] ? kmsan_set_origin+0x9e/0x160 [ 657.230664] alloc_pages_vma+0x1555/0x17f0 [ 657.234900] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 657.240004] handle_mm_fault+0x44ca/0x7ed0 [ 657.244226] ? kmsan_set_origin_inline+0x6b/0x120 [ 657.249084] __do_page_fault+0xec6/0x1a10 [ 657.253309] do_page_fault+0xb7/0x250 [ 657.257097] ? page_fault+0x8/0x30 [ 657.260629] page_fault+0x1e/0x30 [ 657.264072] RIP: 0033:0x4075fa [ 657.267247] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 657.272594] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 657.279854] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 657.287112] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 657.294466] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a09ff [ 657.301898] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 657.309172] warn_alloc_show_mem: 1 callbacks suppressed [ 657.309175] Mem-Info: [ 657.317282] active_anon:186679 inactive_anon:75 isolated_anon:0 [ 657.317282] active_file:1698 inactive_file:1271 isolated_file:0 [ 657.317282] unevictable:0 dirty:28 writeback:0 unstable:0 [ 657.317282] slab_reclaimable:3322 slab_unreclaimable:9452 [ 657.317282] mapped:67576 shmem:84 pagetables:1513 bounce:0 [ 657.317282] free:195221 free_pcp:489 free_cma:0 [ 657.350463] Node 0 active_anon:746716kB inactive_anon:300kB active_file:6792kB inactive_file:5084kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:270304kB dirty:112kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 309248kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 657.378401] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 657.406093] lowmem_reserve[]: 0 2817 7244 7244 [ 657.410674] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 657.439574] lowmem_reserve[]: 0 0 4426 4426 [ 657.443900] Node 0 Normal free:292876kB min:41208kB low:51508kB high:61808kB active_anon:531272kB inactive_anon:300kB active_file:6668kB inactive_file:5084kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3860kB bounce:0kB free_pcp:632kB local_pcp:444kB free_cma:0kB [ 657.473744] lowmem_reserve[]: 0 0 0 0 [ 657.477622] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 657.490837] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 657.508224] Node 0 Normal: 11249*4kB (ME) 5744*8kB (UME) 2487*16kB (UME) 1779*32kB (UM) 1167*64kB (UM) 236*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 292564kB [ 657.523697] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 657.532253] 3053 total pagecache pages [ 657.536120] 0 pages in swap cache [ 657.539556] Swap cache stats: add 0, delete 0, find 0/0 [ 657.544898] Free swap = 0kB [ 657.547896] Total swap = 0kB [ 657.550892] 1965969 pages RAM [ 657.553978] 0 pages HighMem/MovableOnly [ 657.558853] 106316 pages reserved 05:24:37 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:37 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:37 executing program 3: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) [ 657.718111] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 657.728651] syz-executor3 cpuset=syz3 mems_allowed=0 [ 657.733787] CPU: 0 PID: 6337 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 657.740546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.749910] Call Trace: [ 657.752496] dump_stack+0x185/0x1d0 [ 657.756136] warn_alloc+0x430/0x690 [ 657.759778] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 657.764626] ? kernel_poison_pages+0x40/0x360 [ 657.769112] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 657.774568] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 657.779501] kmsan_alloc_page+0x82/0xe0 [ 657.783463] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 657.788202] ? do_syscall_64+0x15b/0x230 [ 657.792247] ? kmsan_set_origin_inline+0x6b/0x120 [ 657.797078] ? __msan_poison_alloca+0x15c/0x1d0 [ 657.801730] ? __should_failslab+0x278/0x2a0 [ 657.806134] ? should_fail+0x57/0xab0 [ 657.809923] ? __should_failslab+0x278/0x2a0 [ 657.814322] ? kmsan_set_origin_inline+0x6b/0x120 [ 657.819153] ? __msan_poison_alloca+0x15c/0x1d0 [ 657.823822] ? kmsan_set_origin+0x9e/0x160 [ 657.828052] alloc_pages_vma+0x1555/0x17f0 [ 657.832281] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 657.837378] handle_mm_fault+0x44ca/0x7ed0 [ 657.841598] ? kmsan_set_origin_inline+0x6b/0x120 [ 657.846439] __do_page_fault+0xec6/0x1a10 [ 657.850582] do_page_fault+0xb7/0x250 [ 657.854370] page_fault+0x1e/0x30 [ 657.857810] RIP: 0010:__put_user_4+0x1c/0x30 [ 657.862209] RSP: 0018:ffff8801a705fdb0 EFLAGS: 00010293 [ 657.867578] RAX: 0000000000000013 RBX: 00007fffffffeffd RCX: 0000000020000140 [ 657.874831] RDX: 0000000000000000 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 657.882096] RBP: ffff8801a705fe78 R08: 0000000001080020 R09: 0000000000000002 [ 657.889350] R10: 0000000000000000 R11: ffffffff87d2e2c0 R12: 0000000000000000 [ 657.896614] R13: 0000000000000000 R14: 0000000020000140 R15: 0000000000000013 [ 657.903895] ? __sys_socketpair+0x1490/0x1490 [ 657.908382] ? __sys_socketpair+0x1cb/0x1490 [ 657.912794] __x64_sys_socketpair+0x117/0x170 [ 657.917281] ? __sys_socketpair+0x1490/0x1490 [ 657.921775] do_syscall_64+0x15b/0x230 [ 657.925654] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 657.930828] RIP: 0033:0x455a99 [ 657.934000] RSP: 002b:00007ff57f669c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 657.941872] RAX: ffffffffffffffda RBX: 00007ff57f66a6d4 RCX: 0000000000455a99 [ 657.949131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000a [ 657.956404] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 657.963674] R10: 0000000020000140 R11: 0000000000000246 R12: 00000000ffffffff [ 657.970929] R13: 00000000004c1c4e R14: 00000000004d2d50 R15: 0000000000000000 05:24:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:38 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) 05:24:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000080)=0x4) 05:24:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) [ 658.214582] audit: type=1326 audit(1529731478.213:1308): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6355 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50030}]}) pipe(&(0x7f0000000000)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/173) 05:24:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) [ 658.438084] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 658.448619] syz-executor2 cpuset=syz2 mems_allowed=0 [ 658.453746] CPU: 1 PID: 6376 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 658.460508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.469866] Call Trace: [ 658.472463] dump_stack+0x185/0x1d0 [ 658.476122] warn_alloc+0x430/0x690 [ 658.479780] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 658.484645] ? kernel_poison_pages+0x40/0x360 [ 658.489158] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 658.494621] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 658.499581] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 658.504634] kmsan_alloc_page+0x82/0xe0 [ 658.508628] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 658.513399] ? kmsan_set_origin_inline+0x6b/0x120 [ 658.518864] ? __msan_poison_alloca+0x15c/0x1d0 [ 658.524249] ? __should_failslab+0x278/0x2a0 [ 658.528673] ? should_fail+0x57/0xab0 [ 658.532486] ? __should_failslab+0x278/0x2a0 [ 658.536910] ? kmsan_set_origin_inline+0x6b/0x120 [ 658.541768] ? __msan_poison_alloca+0x15c/0x1d0 [ 658.546459] ? kmsan_set_origin+0x9e/0x160 [ 658.550715] alloc_pages_vma+0x1555/0x17f0 [ 658.555007] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 658.560131] handle_mm_fault+0x44ca/0x7ed0 [ 658.564376] ? kmsan_set_origin_inline+0x6b/0x120 [ 658.569237] __do_page_fault+0xec6/0x1a10 [ 658.573419] do_page_fault+0xb7/0x250 [ 658.577232] ? page_fault+0x8/0x30 [ 658.580783] page_fault+0x1e/0x30 [ 658.584262] RIP: 0033:0x4075fa [ 658.587452] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 658.592813] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 658.600099] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 658.607382] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 658.614748] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a0f25 [ 658.622022] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 658.629311] warn_alloc_show_mem: 1 callbacks suppressed [ 658.629314] Mem-Info: [ 658.637111] active_anon:185101 inactive_anon:78 isolated_anon:0 [ 658.637111] active_file:1661 inactive_file:1129 isolated_file:0 [ 658.637111] unevictable:0 dirty:43 writeback:0 unstable:0 [ 658.637111] slab_reclaimable:3322 slab_unreclaimable:9456 [ 658.637111] mapped:67271 shmem:84 pagetables:1515 bounce:0 [ 658.637111] free:199562 free_pcp:567 free_cma:0 [ 658.670297] Node 0 active_anon:740404kB inactive_anon:312kB active_file:6512kB inactive_file:4632kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269084kB dirty:172kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 658.698254] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 658.724385] lowmem_reserve[]: 0 2817 7244 7244 [ 658.728977] Node 0 DMA32 free:484392kB min:26224kB low:32780kB high:39336kB active_anon:211260kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 658.757882] lowmem_reserve[]: 0 0 4426 4426 [ 658.762195] Node 0 Normal free:299516kB min:41208kB low:51508kB high:61808kB active_anon:529136kB inactive_anon:312kB active_file:6248kB inactive_file:4496kB unevictable:0kB writepending:108kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7936kB pagetables:3868kB bounce:0kB free_pcp:1012kB local_pcp:376kB free_cma:0kB [ 658.792914] lowmem_reserve[]: 0 0 0 0 [ 658.796708] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 658.810265] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 6*2048kB (UM) 0*4096kB = 484392kB 05:24:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:38 executing program 3: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) [ 658.828173] Node 0 Normal: 11719*4kB (UME) 5783*8kB (UME) 2472*16kB (UME) 1762*32kB (UM) 1172*64kB (UM) 230*128kB (UM) 0*256kB 0*512kB 0*1024kB 3*2048kB (UM) 0*4096kB = 299668kB [ 658.844169] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 658.852734] 2819 total pagecache pages [ 658.856604] 0 pages in swap cache [ 658.860037] Swap cache stats: add 0, delete 0, find 0/0 [ 658.865394] Free swap = 0kB [ 658.868402] Total swap = 0kB [ 658.871406] 1965969 pages RAM [ 658.874493] 0 pages HighMem/MovableOnly [ 658.878456] 106316 pages reserved [ 658.931420] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 658.941967] syz-executor0 cpuset=syz0 mems_allowed=0 [ 658.947100] CPU: 0 PID: 6387 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 658.953879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.963244] Call Trace: [ 658.965840] dump_stack+0x185/0x1d0 [ 658.969500] warn_alloc+0x430/0x690 [ 658.973145] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 658.977999] ? kernel_poison_pages+0x40/0x360 [ 658.982510] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 658.987994] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 658.992957] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 658.998179] kmsan_alloc_page+0x82/0xe0 [ 659.002161] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 659.007276] ? kmsan_set_origin_inline+0x6b/0x120 [ 659.012124] ? __msan_poison_alloca+0x15c/0x1d0 [ 659.016807] ? __should_failslab+0x278/0x2a0 [ 659.021233] ? should_fail+0x57/0xab0 [ 659.025070] ? __should_failslab+0x278/0x2a0 [ 659.029476] ? kmsan_set_origin_inline+0x6b/0x120 [ 659.034310] ? __msan_poison_alloca+0x15c/0x1d0 [ 659.039001] ? kmsan_set_origin+0x9e/0x160 [ 659.043248] alloc_pages_vma+0x1555/0x17f0 [ 659.047487] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 659.052584] handle_mm_fault+0x44ca/0x7ed0 [ 659.056809] ? kmsan_set_origin_inline+0x6b/0x120 [ 659.061647] __do_page_fault+0xec6/0x1a10 [ 659.065800] do_page_fault+0xb7/0x250 [ 659.069586] ? page_fault+0x8/0x30 [ 659.073111] page_fault+0x1e/0x30 [ 659.076545] RIP: 0033:0x4075fa 05:24:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) [ 659.079724] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 659.085104] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 659.092368] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 659.099625] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 659.106879] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a1113 [ 659.115455] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:39 executing program 3: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:39 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x501e4}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) [ 660.594364] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 660.594385] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 660.604905] syz-executor1 cpuset= [ 660.615387] syz-executor2 cpuset= [ 660.615389] syz1 mems_allowed=0 [ 660.618826] syz2 [ 660.622267] CPU: 1 PID: 6524 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 660.625529] mems_allowed=0 [ 660.627481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.646462] Call Trace: [ 660.649042] dump_stack+0x185/0x1d0 [ 660.652667] warn_alloc+0x430/0x690 [ 660.656294] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 660.662185] ? kernel_poison_pages+0x40/0x360 [ 660.666672] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 660.672112] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 660.677134] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 660.682072] kmsan_alloc_page+0x82/0xe0 [ 660.686035] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 660.690799] ? kmsan_set_origin_inline+0x6b/0x120 [ 660.695628] ? __msan_poison_alloca+0x15c/0x1d0 [ 660.700285] ? __should_failslab+0x278/0x2a0 [ 660.704686] ? should_fail+0x57/0xab0 [ 660.708474] ? __should_failslab+0x278/0x2a0 [ 660.712873] ? kmsan_set_origin_inline+0x6b/0x120 [ 660.717704] ? __msan_poison_alloca+0x15c/0x1d0 [ 660.722366] ? kmsan_set_origin+0x9e/0x160 [ 660.726612] alloc_pages_vma+0x1555/0x17f0 [ 660.730844] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 660.735941] handle_mm_fault+0x44ca/0x7ed0 [ 660.740161] ? kmsan_set_origin_inline+0x6b/0x120 [ 660.745018] __do_page_fault+0xec6/0x1a10 [ 660.749160] do_page_fault+0xb7/0x250 [ 660.752948] ? page_fault+0x8/0x30 [ 660.756475] page_fault+0x1e/0x30 [ 660.759912] RIP: 0033:0x4075fa [ 660.763082] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 660.768439] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 660.775694] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 660.782947] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 660.790201] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a1792 [ 660.797457] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 660.804718] warn_alloc_show_mem: 1 callbacks suppressed [ 660.804727] CPU: 0 PID: 6525 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 660.804729] Mem-Info: [ 660.804752] active_anon:184646 inactive_anon:76 isolated_anon:0 [ 660.804752] active_file:1586 inactive_file:1148 isolated_file:0 [ 660.804752] unevictable:0 dirty:53 writeback:0 unstable:0 [ 660.804752] slab_reclaimable:3322 slab_unreclaimable:9463 [ 660.804752] mapped:67397 shmem:84 pagetables:1543 bounce:0 [ 660.804752] free:193147 free_pcp:390 free_cma:0 [ 660.810110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.816856] Node 0 active_anon:738584kB inactive_anon:304kB active_file:6344kB inactive_file:4592kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269588kB dirty:212kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 660.819245] Call Trace: [ 660.852369] Node 0 [ 660.861720] dump_stack+0x185/0x1d0 [ 660.889636] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 660.892193] warn_alloc+0x430/0x690 [ 660.894394] lowmem_reserve[]: [ 660.898015] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 660.923503] 0 [ 660.927122] ? kernel_poison_pages+0x40/0x360 [ 660.930189] 2817 [ 660.935017] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 660.936786] 7244 [ 660.941265] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 660.943293] 7244 [ 660.948741] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 660.955676] ? kmsan_set_origin_inline+0x6b/0x120 [ 660.957704] Node 0 [ 660.962620] ? __msan_poison_alloca+0x15c/0x1d0 [ 660.967451] DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:211260kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 660.969655] kmsan_alloc_page+0x82/0xe0 [ 660.974292] lowmem_reserve[]: [ 661.002575] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 661.006508] 0 [ 661.009598] ? kmsan_set_origin_inline+0x6b/0x120 [ 661.014322] 0 [ 661.016114] ? __msan_poison_alloca+0x15c/0x1d0 [ 661.020924] 4426 [ 661.022723] ? __should_failslab+0x278/0x2a0 [ 661.027360] 4426 [ 661.029414] ? should_fail+0x57/0xab0 [ 661.035838] ? __should_failslab+0x278/0x2a0 [ 661.039609] Node 0 [ 661.044006] ? kmsan_set_origin_inline+0x6b/0x120 [ 661.044029] Normal free:284580kB min:41208kB low:51508kB high:61808kB active_anon:527256kB inactive_anon:304kB active_file:6220kB inactive_file:4592kB unevictable:0kB writepending:148kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3980kB bounce:0kB free_pcp:236kB local_pcp:92kB free_cma:0kB [ 661.044034] lowmem_reserve[]: [ 661.046254] ? __msan_poison_alloca+0x15c/0x1d0 [ 661.051066] 0 0 [ 661.079871] ? kmsan_set_origin+0x9e/0x160 [ 661.082941] 0 [ 661.087601] alloc_pages_vma+0x1555/0x17f0 [ 661.089543] 0 [ 661.093772] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 661.099766] handle_mm_fault+0x44ca/0x7ed0 [ 661.101532] Node 0 [ 661.106624] ? kmsan_set_origin_inline+0x6b/0x120 [ 661.110827] DMA: [ 661.113056] __do_page_fault+0xec6/0x1a10 [ 661.117865] 0*4kB [ 661.119921] do_page_fault+0xb7/0x250 [ 661.124030] 0*8kB [ 661.126166] ? page_fault+0x8/0x30 [ 661.129930] 0*16kB [ 661.132067] page_fault+0x1e/0x30 [ 661.135575] 1*32kB [ 661.137794] RIP: 0033:0x4075fa [ 661.141214] (U) [ 661.143431] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 661.146599] 2*64kB [ 661.153892] (U) [ 661.156103] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 661.156111] 1*128kB [ 661.158068] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 661.165332] (U) [ 661.167637] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 661.174885] 1*256kB [ 661.176842] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a1791 [ 661.184092] (U) [ 661.186395] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 661.193644] 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 661.209394] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 1*2048kB (M) 0*4096kB = 474152kB [ 661.227183] Node 0 Normal: 11485*4kB (ME) 5668*8kB (UME) 2394*16kB (ME) 1713*32kB (M) 1129*64kB (UM) 216*128kB (UM) 0*256kB 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 284820kB 05:24:41 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) [ 661.242865] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 661.251430] 2818 total pagecache pages [ 661.255299] 0 pages in swap cache [ 661.258738] Swap cache stats: add 0, delete 0, find 0/0 [ 661.264079] Free swap = 0kB [ 661.267081] Total swap = 0kB [ 661.270092] 1965969 pages RAM [ 661.273177] 0 pages HighMem/MovableOnly [ 661.277135] 106316 pages reserved 05:24:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) [ 661.351474] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 661.362015] syz-executor0 cpuset=syz0 mems_allowed=0 [ 661.367153] CPU: 1 PID: 6534 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 661.373918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.383280] Call Trace: [ 661.385885] dump_stack+0x185/0x1d0 [ 661.389539] warn_alloc+0x430/0x690 [ 661.393205] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 661.398076] ? kernel_poison_pages+0x40/0x360 [ 661.402601] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 661.408108] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 661.413160] ? kmsan_set_origin_inline+0x6b/0x120 [ 661.418034] kmsan_alloc_page+0x82/0xe0 [ 661.422043] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 661.426821] ? do_syscall_64+0x15b/0x230 [ 661.430905] ? kmsan_set_origin_inline+0x6b/0x120 [ 661.435792] ? __msan_poison_alloca+0x15c/0x1d0 [ 661.440486] ? __should_failslab+0x278/0x2a0 [ 661.444922] ? should_fail+0x57/0xab0 [ 661.448743] ? __should_failslab+0x278/0x2a0 [ 661.453178] ? kmsan_set_origin_inline+0x6b/0x120 [ 661.458058] ? __msan_poison_alloca+0x15c/0x1d0 [ 661.462761] ? kmsan_set_origin+0x9e/0x160 [ 661.467038] alloc_pages_vma+0x1555/0x17f0 [ 661.471300] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 661.476403] handle_mm_fault+0x44ca/0x7ed0 [ 661.480623] ? kmsan_set_origin_inline+0x6b/0x120 [ 661.485461] __do_page_fault+0xec6/0x1a10 [ 661.489601] do_page_fault+0xb7/0x250 [ 661.493394] page_fault+0x1e/0x30 [ 661.496854] RIP: 0010:__put_user_4+0x1c/0x30 [ 661.501245] RSP: 0018:ffff88021f69fdb0 EFLAGS: 00010297 [ 661.506595] RAX: 0000000000000013 RBX: 00007fffffffeffd RCX: 00000000200000c0 [ 661.513853] RDX: 0000000000000000 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 661.521112] RBP: ffff88021f69fe78 R08: 0000000001080020 R09: 0000000000000002 [ 661.528372] R10: 0000000000000000 R11: ffffffff87d2e2c0 R12: 0000000000000003 [ 661.535628] R13: 0000000000000000 R14: 00000000200000c0 R15: 0000000000000013 [ 661.542900] ? __sys_socketpair+0x1490/0x1490 [ 661.547392] ? __sys_socketpair+0x1cb/0x1490 [ 661.551895] __x64_sys_socketpair+0x117/0x170 [ 661.556381] ? __sys_socketpair+0x1490/0x1490 [ 661.562614] do_syscall_64+0x15b/0x230 [ 661.566495] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 661.571671] RIP: 0033:0x455a99 [ 661.574845] RSP: 002b:00007f9140812c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 661.582539] RAX: ffffffffffffffda RBX: 00007f91408136d4 RCX: 0000000000455a99 [ 661.589797] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 0000000000000002 [ 661.597056] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 661.604313] R10: 00000000200000c0 R11: 0000000000000246 R12: 00000000ffffffff [ 661.611588] R13: 00000000004c1d28 R14: 00000000004d2e40 R15: 0000000000000000 [ 661.618856] warn_alloc_show_mem: 1 callbacks suppressed [ 661.618859] Mem-Info: [ 661.626626] active_anon:186180 inactive_anon:72 isolated_anon:0 [ 661.626626] active_file:1140 inactive_file:1245 isolated_file:32 [ 661.626626] unevictable:0 dirty:24 writeback:29 unstable:0 [ 661.626626] slab_reclaimable:3322 slab_unreclaimable:9462 [ 661.626626] mapped:67227 shmem:83 pagetables:1476 bounce:0 [ 661.626626] free:193408 free_pcp:620 free_cma:0 [ 661.660085] Node 0 active_anon:744720kB inactive_anon:288kB active_file:4560kB inactive_file:4980kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:268908kB dirty:96kB writeback:116kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 661.688282] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 661.714406] lowmem_reserve[]: 0 2817 7244 7244 [ 661.718987] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 661.747902] lowmem_reserve[]: 0 0 4426 4426 [ 661.752219] Node 0 Normal free:285624kB min:41208kB low:51508kB high:61808kB active_anon:529284kB inactive_anon:288kB active_file:4564kB inactive_file:5096kB unevictable:0kB writepending:148kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8704kB pagetables:3712kB bounce:0kB free_pcp:1156kB local_pcp:464kB free_cma:0kB [ 661.781803] lowmem_reserve[]: 0 0 0 0 [ 661.785596] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 661.798799] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 661.816190] Node 0 Normal: 11842*4kB (UME) 5706*8kB (UME) 2415*16kB (UME) 1713*32kB (UM) 1123*64kB (M) 215*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 285864kB [ 661.831664] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 661.840219] 2469 total pagecache pages [ 661.844085] 0 pages in swap cache [ 661.847515] Swap cache stats: add 0, delete 0, find 0/0 [ 661.852865] Free swap = 0kB [ 661.855860] Total swap = 0kB [ 661.858856] 1965969 pages RAM [ 661.861938] 0 pages HighMem/MovableOnly [ 661.865889] 106316 pages reserved [ 661.884064] audit: type=1326 audit(1529731481.881:1309): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6538 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) 05:24:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) [ 662.107070] audit: type=1326 audit(1529731482.105:1310): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6556 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:42 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) 05:24:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) [ 662.480668] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 662.491232] syz-executor4 cpuset=syz4 mems_allowed=0 [ 662.496453] CPU: 1 PID: 6590 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 662.503208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.512563] Call Trace: [ 662.515152] dump_stack+0x185/0x1d0 [ 662.518777] warn_alloc+0x430/0x690 [ 662.522407] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 662.527245] ? kernel_poison_pages+0x40/0x360 [ 662.531736] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 662.537174] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 662.542113] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 662.547047] kmsan_alloc_page+0x82/0xe0 [ 662.551029] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 662.555785] ? kmsan_set_origin_inline+0x6b/0x120 [ 662.560613] ? __msan_poison_alloca+0x15c/0x1d0 [ 662.565283] ? __should_failslab+0x278/0x2a0 [ 662.569682] ? should_fail+0x57/0xab0 [ 662.573467] ? __should_failslab+0x278/0x2a0 [ 662.577862] ? kmsan_set_origin_inline+0x6b/0x120 [ 662.582689] ? __msan_poison_alloca+0x15c/0x1d0 [ 662.587344] ? kmsan_set_origin+0x9e/0x160 [ 662.591572] alloc_pages_vma+0x1555/0x17f0 [ 662.595812] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 662.600909] handle_mm_fault+0x44ca/0x7ed0 [ 662.605306] ? kmsan_set_origin_inline+0x6b/0x120 [ 662.610147] __do_page_fault+0xec6/0x1a10 [ 662.614287] do_page_fault+0xb7/0x250 [ 662.618073] ? page_fault+0x8/0x30 [ 662.621600] page_fault+0x1e/0x30 [ 662.625035] RIP: 0033:0x4075fa [ 662.628225] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 662.633574] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 662.640838] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 662.648095] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 662.655348] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a1ef0 [ 662.662607] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 662.669867] Mem-Info: [ 662.672281] active_anon:186181 inactive_anon:72 isolated_anon:0 [ 662.672281] active_file:1401 inactive_file:926 isolated_file:0 [ 662.672281] unevictable:0 dirty:24 writeback:0 unstable:0 [ 662.672281] slab_reclaimable:3322 slab_unreclaimable:9462 [ 662.672281] mapped:67140 shmem:83 pagetables:1433 bounce:0 [ 662.672281] free:193785 free_pcp:591 free_cma:0 [ 662.705358] Node 0 active_anon:744724kB inactive_anon:288kB active_file:5604kB inactive_file:3704kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268560kB dirty:96kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 662.733197] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 662.759320] lowmem_reserve[]: 0 2817 7244 7244 [ 662.763895] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 662.792788] lowmem_reserve[]: 0 0 4426 4426 [ 662.797104] Node 0 Normal free:287132kB min:41208kB low:51508kB high:61808kB active_anon:529388kB inactive_anon:288kB active_file:5572kB inactive_file:4072kB unevictable:0kB writepending:148kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3540kB bounce:0kB free_pcp:1040kB local_pcp:360kB free_cma:0kB [ 662.826705] lowmem_reserve[]: 0 0 0 0 [ 662.830502] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 662.843709] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 662.861364] Node 0 Normal: 12003*4kB (UME) 5700*8kB (UME) 2405*16kB (UME) 1713*32kB (M) 1131*64kB (UM) 216*128kB (UM) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 287196kB [ 662.877188] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 662.885748] 2453 total pagecache pages [ 662.889618] 0 pages in swap cache [ 662.893058] Swap cache stats: add 0, delete 0, find 0/0 [ 662.898400] Free swap = 0kB [ 662.901402] Total swap = 0kB [ 662.904422] 1965969 pages RAM [ 662.907507] 0 pages HighMem/MovableOnly [ 662.911462] 106316 pages reserved [ 662.925669] audit: type=1326 audit(1529731482.920:1311): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6563 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 662.945363] audit: type=1326 audit(1529731482.924:1312): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6588 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 662.969826] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 662.980347] syz-executor1 cpuset=syz1 mems_allowed=0 [ 662.985451] CPU: 0 PID: 6584 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 662.992273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.001618] Call Trace: [ 663.004211] dump_stack+0x185/0x1d0 [ 663.007829] warn_alloc+0x430/0x690 [ 663.011467] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 663.016299] ? kernel_poison_pages+0x40/0x360 [ 663.020785] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 663.026228] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 663.032027] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 663.036951] ? kmsan_set_origin_inline+0x6b/0x120 [ 663.041780] ? __msan_poison_alloca+0x15c/0x1d0 [ 663.046439] kmsan_alloc_page+0x82/0xe0 [ 663.050400] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 663.055140] ? kmsan_set_origin_inline+0x6b/0x120 [ 663.059973] ? __msan_poison_alloca+0x15c/0x1d0 [ 663.064634] ? __should_failslab+0x278/0x2a0 [ 663.069031] ? should_fail+0x57/0xab0 [ 663.072816] ? __should_failslab+0x278/0x2a0 [ 663.077210] ? kmsan_set_origin_inline+0x6b/0x120 [ 663.082040] ? __msan_poison_alloca+0x15c/0x1d0 [ 663.086696] ? kmsan_set_origin+0x9e/0x160 [ 663.090922] alloc_pages_vma+0x1555/0x17f0 [ 663.095160] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 663.100256] handle_mm_fault+0x44ca/0x7ed0 [ 663.104481] ? kmsan_set_origin_inline+0x6b/0x120 [ 663.109320] __do_page_fault+0xec6/0x1a10 [ 663.113479] do_page_fault+0xb7/0x250 [ 663.117266] ? page_fault+0x8/0x30 [ 663.120789] page_fault+0x1e/0x30 [ 663.124225] RIP: 0033:0x4075fa [ 663.127400] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:24:43 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:43 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) [ 663.132746] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 663.140003] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 663.147254] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 663.154509] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a20d9 [ 663.161764] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) [ 663.316758] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 663.327298] syz-executor3 cpuset=syz3 mems_allowed=0 [ 663.332427] CPU: 0 PID: 6605 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 663.339611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.348969] Call Trace: [ 663.351576] dump_stack+0x185/0x1d0 [ 663.355215] warn_alloc+0x430/0x690 [ 663.358867] __alloc_pages_nodemask+0x5b1c/0x5cc0 05:24:43 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) [ 663.363735] ? kernel_poison_pages+0x40/0x360 [ 663.368249] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 663.373715] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 663.378680] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 663.383644] kmsan_alloc_page+0x82/0xe0 [ 663.387636] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 663.392416] ? kmsan_set_origin_inline+0x6b/0x120 [ 663.397275] ? __msan_poison_alloca+0x15c/0x1d0 [ 663.401958] ? __should_failslab+0x278/0x2a0 [ 663.406386] ? should_fail+0x57/0xab0 [ 663.410206] ? __should_failslab+0x278/0x2a0 05:24:43 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) [ 663.414634] ? kmsan_set_origin_inline+0x6b/0x120 [ 663.419492] ? __msan_poison_alloca+0x15c/0x1d0 [ 663.424182] ? kmsan_set_origin+0x9e/0x160 [ 663.428439] alloc_pages_vma+0x1555/0x17f0 [ 663.432696] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 663.437823] handle_mm_fault+0x44ca/0x7ed0 [ 663.442070] ? kmsan_set_origin_inline+0x6b/0x120 [ 663.446939] __do_page_fault+0xec6/0x1a10 [ 663.451105] do_page_fault+0xb7/0x250 [ 663.454917] ? page_fault+0x8/0x30 [ 663.458469] page_fault+0x1e/0x30 [ 663.461949] RIP: 0033:0x4075fa 05:24:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) [ 663.465141] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 663.470510] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 663.477790] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 663.485066] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 663.492344] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a2234 [ 663.499621] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:43 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) [ 663.530044] audit: type=1326 audit(1529731483.528:1313): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6604 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) [ 663.585475] audit: type=1326 audit(1529731483.565:1314): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6615 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) [ 663.672374] audit: type=1326 audit(1529731483.670:1315): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6625 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:43 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:43 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:43 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:44 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) [ 664.250417] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 664.250734] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 664.260979] syz-executor0 cpuset= [ 664.271451] syz-executor1 cpuset= [ 664.271453] syz0 mems_allowed=0 [ 664.274889] syz1 [ 664.278331] CPU: 1 PID: 6671 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 664.281584] mems_allowed=0 [ 664.283539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.302510] Call Trace: [ 664.305102] dump_stack+0x185/0x1d0 [ 664.308718] warn_alloc+0x430/0x690 [ 664.312344] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 664.317175] ? kernel_poison_pages+0x40/0x360 [ 664.321665] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 664.327108] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 664.332052] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 664.336981] ? kmsan_set_origin_inline+0x6b/0x120 [ 664.341817] ? __msan_poison_alloca+0x15c/0x1d0 [ 664.346659] kmsan_alloc_page+0x82/0xe0 [ 664.350626] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 664.355400] ? kmsan_set_origin_inline+0x6b/0x120 [ 664.360242] ? __msan_poison_alloca+0x15c/0x1d0 [ 664.364902] ? __should_failslab+0x278/0x2a0 [ 664.369303] ? should_fail+0x57/0xab0 [ 664.373092] ? __should_failslab+0x278/0x2a0 [ 664.377501] ? kmsan_set_origin_inline+0x6b/0x120 [ 664.382333] ? __msan_poison_alloca+0x15c/0x1d0 [ 664.386994] ? kmsan_set_origin+0x9e/0x160 [ 664.391221] alloc_pages_vma+0x1555/0x17f0 [ 664.395481] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 664.400584] handle_mm_fault+0x44ca/0x7ed0 [ 664.404808] ? kmsan_set_origin_inline+0x6b/0x120 [ 664.409648] __do_page_fault+0xec6/0x1a10 [ 664.413793] do_page_fault+0xb7/0x250 [ 664.417585] ? page_fault+0x8/0x30 [ 664.421117] page_fault+0x1e/0x30 [ 664.424558] RIP: 0033:0x4075fa [ 664.427733] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 664.433086] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 664.440345] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 664.447608] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 664.454889] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a25da [ 664.462148] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 664.469418] warn_alloc_show_mem: 2 callbacks suppressed [ 664.469426] CPU: 0 PID: 6673 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 664.469428] Mem-Info: [ 664.469453] active_anon:185095 inactive_anon:78 isolated_anon:0 [ 664.469453] active_file:1330 inactive_file:928 isolated_file:0 [ 664.469453] unevictable:0 dirty:25 writeback:0 unstable:0 [ 664.469453] slab_reclaimable:3322 slab_unreclaimable:9476 [ 664.469453] mapped:67042 shmem:84 pagetables:1410 bounce:0 [ 664.469453] free:193691 free_pcp:371 free_cma:0 [ 664.474789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.481537] Node 0 active_anon:740380kB inactive_anon:312kB active_file:5320kB inactive_file:3712kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:268168kB dirty:100kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 664.483933] Call Trace: [ 664.517058] Node 0 [ 664.526418] dump_stack+0x185/0x1d0 [ 664.554344] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 664.556907] warn_alloc+0x430/0x690 [ 664.559111] lowmem_reserve[]: [ 664.562741] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 664.588218] 0 [ 664.591855] ? kernel_poison_pages+0x40/0x360 [ 664.594920] 2817 [ 664.599747] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 664.601518] 7244 [ 664.606003] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 664.608031] 7244 [ 664.613480] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 664.620436] kmsan_alloc_page+0x82/0xe0 [ 664.622455] Node 0 [ 664.627459] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 664.631433] DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:60kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 664.633642] ? kmsan_set_origin_inline+0x6b/0x120 [ 664.638370] lowmem_reserve[]: [ 664.666648] ? __msan_poison_alloca+0x15c/0x1d0 [ 664.671456] 0 [ 664.674553] ? __should_failslab+0x278/0x2a0 [ 664.679195] 0 [ 664.680984] ? should_fail+0x57/0xab0 [ 664.685356] 4426 [ 664.687139] ? __should_failslab+0x278/0x2a0 [ 664.690906] 4426 [ 664.692953] ? kmsan_set_origin_inline+0x6b/0x120 [ 664.699377] ? __msan_poison_alloca+0x15c/0x1d0 [ 664.704190] Node 0 [ 664.708961] ? kmsan_set_origin+0x9e/0x160 [ 664.708983] Normal free:286756kB min:41208kB low:51508kB high:61808kB active_anon:527128kB inactive_anon:312kB active_file:5196kB inactive_file:3712kB unevictable:0kB writepending:40kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:3448kB bounce:0kB free_pcp:160kB local_pcp:88kB free_cma:0kB [ 664.708988] lowmem_reserve[]: [ 664.711216] alloc_pages_vma+0x1555/0x17f0 [ 664.715424] 0 [ 664.745198] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 664.748273] 0 [ 664.752594] handle_mm_fault+0x44ca/0x7ed0 [ 664.754388] 0 [ 664.759493] ? kmsan_set_origin_inline+0x6b/0x120 [ 664.761263] 0 [ 664.765497] __do_page_fault+0xec6/0x1a10 [ 664.772087] do_page_fault+0xb7/0x250 [ 664.773867] Node 0 [ 664.777999] ? page_fault+0x8/0x30 [ 664.781764] DMA: [ 664.783985] page_fault+0x1e/0x30 [ 664.787491] 0*4kB [ 664.789533] RIP: 0033:0x4075ad [ 664.792960] 0*8kB [ 664.795092] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 664.798344] 0*16kB [ 664.805814] 1*32kB [ 664.808028] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000000 [ 664.808030] (U) 2*64kB [ 664.810270] RDX: 436b352fe2a91e1c RSI: 0000000020000080 RDI: 0000000000d5c848 [ 664.817517] (U) [ 664.820083] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 664.827335] 1*128kB [ 664.829291] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a25da [ 664.836540] (U) [ 664.838874] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 664.846122] 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 664.862894] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 5*2048kB (UM) 0*4096kB = 482344kB [ 664.880735] Node 0 Normal: 11919*4kB (ME) 5653*8kB (UME) 2386*16kB (UME) 1699*32kB (M) 1134*64kB (UM) 217*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 285796kB [ 664.896170] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 664.904749] 2342 total pagecache pages [ 664.908655] 0 pages in swap cache [ 664.912112] Swap cache stats: add 0, delete 0, find 0/0 [ 664.917471] Free swap = 0kB [ 664.920495] Total swap = 0kB [ 664.923516] 1965969 pages RAM [ 664.926617] 0 pages HighMem/MovableOnly [ 664.930591] 106316 pages reserved 05:24:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) 05:24:45 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) socket$unix(0x1, 0x0, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 05:24:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) [ 665.080065] audit: type=1326 audit(1529731485.078:1316): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6695 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) [ 665.349602] audit: type=1326 audit(1529731485.348:1317): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6714 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) [ 666.360177] audit: type=1326 audit(1529731486.358:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6777 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) [ 666.436543] audit: type=1326 audit(1529731486.428:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6787 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000000040), 0x0, &(0x7f0000000540), 0x0, 0x0) 05:24:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050187}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) [ 667.362658] audit: type=1326 audit(1529731487.361:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6834 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 667.431144] audit: type=1326 audit(1529731487.392:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6846 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:47 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) [ 667.742859] audit: type=1326 audit(1529731487.741:1322): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6869 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) 05:24:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50010}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:48 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:48 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:48 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 668.594277] kauditd_printk_skb: 2 callbacks suppressed [ 668.594301] audit: type=1326 audit(1529731488.591:1325): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6914 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) 05:24:48 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:48 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 668.722290] audit: type=1326 audit(1529731488.721:1326): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6922 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:49 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:49 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp\x00') linkat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) [ 669.306653] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 669.306908] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 669.317436] syz-executor5 cpuset= [ 669.327912] syz-executor2 cpuset= [ 669.327914] syz5 mems_allowed=0 [ 669.331544] syz2 [ 669.334985] CPU: 1 PID: 6944 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 669.338233] mems_allowed=0 [ 669.340182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.359138] Call Trace: [ 669.361716] dump_stack+0x185/0x1d0 [ 669.365328] warn_alloc+0x430/0x690 [ 669.368948] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 669.373781] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 669.379218] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 669.384147] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 669.389085] kmsan_alloc_page+0x82/0xe0 [ 669.393080] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 669.398082] ? kmsan_set_origin_inline+0x6b/0x120 [ 669.402922] ? __msan_poison_alloca+0x15c/0x1d0 [ 669.407576] ? __should_failslab+0x278/0x2a0 [ 669.411970] ? should_fail+0x57/0xab0 [ 669.415754] ? __should_failslab+0x278/0x2a0 [ 669.420146] ? kmsan_set_origin_inline+0x6b/0x120 [ 669.424973] ? __msan_poison_alloca+0x15c/0x1d0 [ 669.429627] ? kmsan_set_origin+0x9e/0x160 [ 669.433851] alloc_pages_vma+0x1555/0x17f0 [ 669.438078] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 669.443199] handle_mm_fault+0x44ca/0x7ed0 [ 669.447421] ? kmsan_set_origin_inline+0x6b/0x120 [ 669.452257] __do_page_fault+0xec6/0x1a10 [ 669.456402] do_page_fault+0xb7/0x250 [ 669.460187] ? page_fault+0x8/0x30 [ 669.463712] page_fault+0x1e/0x30 [ 669.467149] RIP: 0033:0x4075fa [ 669.470321] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 669.475667] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 669.482919] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 669.490176] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 669.497434] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a399a [ 669.504690] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 669.511954] warn_alloc_show_mem: 1 callbacks suppressed [ 669.511962] CPU: 0 PID: 6945 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 669.511963] Mem-Info: [ 669.511989] active_anon:185613 inactive_anon:78 isolated_anon:0 [ 669.511989] active_file:1529 inactive_file:1057 isolated_file:0 [ 669.511989] unevictable:0 dirty:45 writeback:0 unstable:0 [ 669.511989] slab_reclaimable:3322 slab_unreclaimable:9469 [ 669.511989] mapped:67320 shmem:84 pagetables:1480 bounce:0 [ 669.511989] free:188619 free_pcp:371 free_cma:0 [ 669.517338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.524096] Node 0 active_anon:742452kB inactive_anon:312kB active_file:6116kB inactive_file:4228kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269280kB dirty:180kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 669.526485] Call Trace: [ 669.560326] Node 0 [ 669.569685] dump_stack+0x185/0x1d0 [ 669.597609] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 669.600167] warn_alloc+0x430/0x690 [ 669.602369] lowmem_reserve[]: [ 669.606003] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 669.631471] 0 [ 669.635102] ? kernel_poison_pages+0x40/0x360 [ 669.638170] 2817 [ 669.642997] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 669.644763] 7244 [ 669.649260] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 669.651275] 7244 [ 669.656714] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 669.663759] ? kmsan_set_origin_inline+0x6b/0x120 [ 669.665791] Node 0 [ 669.671138] ? __msan_poison_alloca+0x15c/0x1d0 [ 669.675969] DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 669.678174] kmsan_alloc_page+0x82/0xe0 [ 669.682808] lowmem_reserve[]: [ 669.711087] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 669.715028] 0 [ 669.718121] ? kmsan_set_origin_inline+0x6b/0x120 [ 669.722841] 0 [ 669.724641] ? __msan_poison_alloca+0x15c/0x1d0 [ 669.729446] 4426 [ 669.731234] ? __should_failslab+0x278/0x2a0 [ 669.735871] 4426 [ 669.737922] ? should_fail+0x57/0xab0 [ 669.744353] ? __should_failslab+0x278/0x2a0 [ 669.748121] Node 0 [ 669.752514] ? kmsan_set_origin_inline+0x6b/0x120 [ 669.752536] Normal free:266468kB min:41208kB low:51508kB high:61808kB active_anon:529212kB inactive_anon:312kB active_file:5992kB inactive_file:4228kB unevictable:0kB writepending:116kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8384kB pagetables:3728kB bounce:0kB free_pcp:160kB local_pcp:140kB free_cma:0kB [ 669.752542] lowmem_reserve[]: [ 669.754776] ? __msan_poison_alloca+0x15c/0x1d0 [ 669.759591] 0 [ 669.788483] ? kmsan_set_origin+0x9e/0x160 [ 669.791554] 0 [ 669.796215] alloc_pages_vma+0x1555/0x17f0 [ 669.797982] 0 [ 669.802202] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 669.803972] 0 [ 669.808205] handle_mm_fault+0x44ca/0x7ed0 [ 669.815065] ? kmsan_set_origin_inline+0x6b/0x120 [ 669.816840] Node 0 [ 669.821074] __do_page_fault+0xec6/0x1a10 [ 669.825876] DMA: [ 669.828108] do_page_fault+0xb7/0x250 [ 669.832219] 0*4kB [ 669.834268] ? page_fault+0x8/0x30 [ 669.838036] 0*8kB [ 669.840183] page_fault+0x1e/0x30 [ 669.843688] 0*16kB [ 669.845817] RIP: 0033:0x4075d5 [ 669.849240] 1*32kB [ 669.851454] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 669.854618] (U) [ 669.862176] 2*64kB [ 669.864129] RAX: 00000000200003c0 RBX: 0000000000000000 RCX: 0000000000000008 [ 669.864136] (U) [ 669.866352] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 669.873595] 1*128kB [ 669.875554] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730088 [ 669.882792] (U) [ 669.885095] R10: 0000000000a3e940 R11: 0000000000000246 R12: 00000000000a3998 [ 669.892338] 1*256kB [ 669.894307] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 [ 669.901557] (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 669.918002] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 4*2048kB (UM) 0*4096kB = 480296kB [ 669.935110] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 669.935896] Node 0 Normal: [ 669.946385] syz-executor0 cpuset=syz0 [ 669.949392] 11328*4kB [ 669.949401] mems_allowed=0 [ 669.949414] CPU: 0 PID: 6951 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 669.953181] (ME) [ 669.955669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.958583] 5398*8kB [ 669.965315] Call Trace: [ 669.967356] (UME) [ 669.976724] dump_stack+0x185/0x1d0 [ 669.979098] 2236*16kB [ 669.981686] warn_alloc+0x430/0x690 [ 669.983797] (UME) [ 669.987417] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 669.989878] 1601*32kB [ 669.993492] ? kernel_poison_pages+0x40/0x360 [ 669.995615] (UM) [ 670.000450] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 670.002915] 1049*64kB [ 670.007395] ? switch_fpu_finish+0x6e/0x4f0 [ 670.009427] (UM) [ 670.014875] ? __switch_to+0x2b3/0x420 [ 670.017341] 181*128kB [ 670.021663] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 670.023681] (UM) [ 670.027566] ? kmsan_set_origin_inline+0x6b/0x120 [ 670.030043] 0*256kB [ 670.035052] ? __msan_poison_alloca+0x15c/0x1d0 [ 670.037090] 0*512kB [ 670.041928] kmsan_alloc_page+0x82/0xe0 [ 670.044220] 0*1024kB [ 670.048880] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 670.051169] 0*2048kB [ 670.055130] ? kmsan_set_origin_inline+0x6b/0x120 [ 670.057505] 0*4096kB [ 670.062243] ? __msan_poison_alloca+0x15c/0x1d0 [ 670.064620] = 265808kB [ 670.069445] ? kmem_cache_alloc+0x997/0xb70 [ 670.071831] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 670.076480] ? ___slab_alloc+0xc1/0x1f50 [ 670.078949] 2670 total pagecache pages [ 670.083271] ? kmsan_set_origin_inline+0x6b/0x120 [ 670.091817] 0 pages in swap cache [ 670.095877] ? __msan_poison_alloca+0x15c/0x1d0 [ 670.099741] Swap cache stats: add 0, delete 0, find 0/0 [ 670.104578] ? kmsan_set_origin+0x9e/0x160 [ 670.107997] Free swap = 0kB [ 670.112664] alloc_pages_vma+0x1555/0x17f0 [ 670.118000] Total swap = 0kB [ 670.122227] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 670.125209] 1965969 pages RAM [ 670.129436] handle_mm_fault+0x44ca/0x7ed0 [ 670.132422] 0 pages HighMem/MovableOnly [ 670.137506] ? kmsan_set_origin_inline+0x6b/0x120 [ 670.140581] 106316 pages reserved [ 670.144821] __do_page_fault+0xec6/0x1a10 [ 670.161301] do_page_fault+0xb7/0x250 [ 670.165119] ? page_fault+0x8/0x30 [ 670.168672] page_fault+0x1e/0x30 [ 670.172123] RIP: 0033:0x4075fa [ 670.175298] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 670.180667] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 670.187929] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 670.195190] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 670.202446] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a3c0e 05:24:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000680)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/157, &(0x7f0000000400)=0x9d) [ 670.209704] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 670.308455] audit: type=1326 audit(1529731490.306:1327): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6957 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 670.328176] audit: type=1326 audit(1529731490.306:1328): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6959 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14) 05:24:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) [ 670.357687] audit: type=1326 audit(1529731490.355:1329): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6951 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14) 05:24:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000100)={0x0, @loopback=0x7f000001, 0x0, 0x0, 'ovf\x00'}, 0x2c) 05:24:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 670.948753] audit: type=1326 audit(1529731490.947:1330): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6997 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 05:24:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000001c0)=0x1e) 05:24:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x14) [ 671.316494] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 671.316756] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 671.327054] syz-executor6 cpuset= [ 671.337649] syz-executor5 cpuset= [ 671.337651] syz6 mems_allowed=0 [ 671.341172] syz5 [ 671.344611] CPU: 1 PID: 7021 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 671.347861] mems_allowed=0 [ 671.349813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.369124] Call Trace: [ 671.371700] dump_stack+0x185/0x1d0 [ 671.375314] warn_alloc+0x430/0x690 [ 671.378946] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 671.383783] ? kernel_poison_pages+0x40/0x360 [ 671.388269] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 671.393706] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 671.398637] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 671.403920] kmsan_alloc_page+0x82/0xe0 [ 671.407883] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 671.412626] ? kmsan_set_origin_inline+0x6b/0x120 [ 671.417455] ? __msan_poison_alloca+0x15c/0x1d0 [ 671.422120] ? __should_failslab+0x278/0x2a0 [ 671.426525] ? should_fail+0x57/0xab0 [ 671.430312] ? __should_failslab+0x278/0x2a0 [ 671.434707] ? kmsan_set_origin_inline+0x6b/0x120 [ 671.439539] ? __msan_poison_alloca+0x15c/0x1d0 [ 671.444194] ? kmsan_set_origin+0x9e/0x160 [ 671.448420] alloc_pages_vma+0x1555/0x17f0 [ 671.452643] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 671.457736] handle_mm_fault+0x44ca/0x7ed0 [ 671.461954] ? kmsan_set_origin_inline+0x6b/0x120 [ 671.466792] __do_page_fault+0xec6/0x1a10 [ 671.470946] do_page_fault+0xb7/0x250 [ 671.474735] ? page_fault+0x8/0x30 [ 671.478264] page_fault+0x1e/0x30 [ 671.481705] RIP: 0033:0x4075fa [ 671.484878] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 671.490229] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000000 [ 671.497487] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 671.504755] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 671.512010] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a4174 [ 671.519264] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 671.526529] warn_alloc_show_mem: 2 callbacks suppressed [ 671.526537] CPU: 0 PID: 7024 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 671.526539] Mem-Info: [ 671.526563] active_anon:184593 inactive_anon:76 isolated_anon:0 [ 671.526563] active_file:1749 inactive_file:5545 isolated_file:0 [ 671.526563] unevictable:0 dirty:58 writeback:0 unstable:0 [ 671.526563] slab_reclaimable:3322 slab_unreclaimable:9470 [ 671.526563] mapped:71944 shmem:84 pagetables:1421 bounce:0 [ 671.526563] free:183241 free_pcp:415 free_cma:0 [ 671.531906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.538648] Node 0 active_anon:738372kB inactive_anon:304kB active_file:6996kB inactive_file:22180kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:287776kB dirty:232kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 671.541060] Call Trace: [ 671.575059] Node 0 [ 671.584416] dump_stack+0x185/0x1d0 [ 671.612419] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 671.614973] warn_alloc+0x430/0x690 [ 671.617186] lowmem_reserve[]: [ 671.620804] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 671.646274] 0 [ 671.649891] ? kernel_poison_pages+0x40/0x360 [ 671.652960] 2817 [ 671.657789] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 671.659557] 7244 [ 671.664032] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 671.666069] 7244 [ 671.671519] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 671.678455] ? kmsan_set_origin_inline+0x6b/0x120 [ 671.680491] Node 0 [ 671.685491] ? __msan_poison_alloca+0x15c/0x1d0 [ 671.690334] DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:209212kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 671.692540] kmsan_alloc_page+0x82/0xe0 [ 671.697185] lowmem_reserve[]: [ 671.725455] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 671.729394] 0 [ 671.732486] ? kmsan_set_origin_inline+0x6b/0x120 [ 671.737207] 0 [ 671.739000] ? __msan_poison_alloca+0x15c/0x1d0 [ 671.743806] 4426 [ 671.745594] ? __should_failslab+0x278/0x2a0 [ 671.750228] 4426 [ 671.752290] ? should_fail+0x57/0xab0 [ 671.758711] ? __should_failslab+0x278/0x2a0 [ 671.762476] Node 0 [ 671.766937] ? kmsan_set_origin_inline+0x6b/0x120 [ 671.766958] Normal free:244956kB min:41208kB low:51508kB high:61808kB active_anon:529080kB inactive_anon:304kB active_file:6872kB inactive_file:22180kB unevictable:0kB writepending:168kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:3492kB bounce:0kB free_pcp:336kB local_pcp:208kB free_cma:0kB [ 671.766963] lowmem_reserve[]: [ 671.769181] ? __msan_poison_alloca+0x15c/0x1d0 [ 671.773994] 0 [ 671.802962] ? kmsan_set_origin+0x9e/0x160 [ 671.806031] 0 [ 671.810689] alloc_pages_vma+0x1555/0x17f0 [ 671.812453] 0 [ 671.816675] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 671.818440] 0 [ 671.822673] handle_mm_fault+0x44ca/0x7ed0 [ 671.829618] ? kmsan_set_origin_inline+0x6b/0x120 [ 671.831386] Node 0 [ 671.835797] __do_page_fault+0xec6/0x1a10 [ 671.840595] DMA: [ 671.842823] do_page_fault+0xb7/0x250 [ 671.846930] 0*4kB [ 671.848974] ? page_fault+0x8/0x30 [ 671.852738] 0*8kB [ 671.854870] page_fault+0x1e/0x30 [ 671.858377] 0*16kB [ 671.860508] RIP: 0033:0x4075fa [ 671.863929] 1*32kB [ 671.866150] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 671.869314] (U) [ 671.876860] 2*64kB [ 671.878809] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 671.878815] (U) [ 671.881029] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 671.888274] 1*128kB [ 671.890243] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 671.897496] (U) [ 671.899816] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a4174 [ 671.907067] 1*256kB [ 671.909024] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 671.916271] (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 671.932708] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 2*2048kB (UM) 0*4096kB = 476200kB [ 671.950570] Node 0 Normal: 6606*4kB (UME) 5374*8kB (ME) 2226*16kB (UME) 1557*32kB (UM) 1041*64kB (UM) 179*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 244392kB [ 671.966059] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 671.974621] 7465 total pagecache pages [ 671.978486] 0 pages in swap cache [ 671.981920] Swap cache stats: add 0, delete 0, find 0/0 [ 671.987783] Free swap = 0kB [ 671.990780] Total swap = 0kB [ 671.993777] 1965969 pages RAM [ 671.996872] 0 pages HighMem/MovableOnly [ 672.000824] 106316 pages reserved 05:24:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) [ 672.164847] audit: type=1326 audit(1529731492.163:1331): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7032 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000180)={'ah\x00'}, &(0x7f00000001c0)=0x1e) 05:24:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000300)}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:53 executing program 3: epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) [ 673.062833] audit: type=1326 audit(1529731493.061:1332): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7086 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:53 executing program 3: epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:53 executing program 3: epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x0, 0x0, 0x0, 0x501e4}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) [ 673.991706] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 674.002247] syz-executor3 cpuset=syz3 mems_allowed=0 [ 674.007369] CPU: 1 PID: 7157 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 674.014111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.023461] Call Trace: [ 674.026054] dump_stack+0x185/0x1d0 [ 674.029684] warn_alloc+0x430/0x690 [ 674.033307] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 674.038139] ? kernel_poison_pages+0x40/0x360 [ 674.042627] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 674.048070] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 674.053009] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 674.058031] kmsan_alloc_page+0x82/0xe0 [ 674.062001] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 674.066751] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.071582] ? __msan_poison_alloca+0x15c/0x1d0 [ 674.076243] ? __should_failslab+0x278/0x2a0 [ 674.080646] ? should_fail+0x57/0xab0 [ 674.084453] ? __should_failslab+0x278/0x2a0 [ 674.088858] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.093694] ? __msan_poison_alloca+0x15c/0x1d0 [ 674.098356] ? kmsan_set_origin+0x9e/0x160 [ 674.102592] alloc_pages_vma+0x1555/0x17f0 [ 674.106825] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 674.111927] handle_mm_fault+0x44ca/0x7ed0 [ 674.116152] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.121000] __do_page_fault+0xec6/0x1a10 [ 674.125144] do_page_fault+0xb7/0x250 [ 674.128938] ? page_fault+0x8/0x30 [ 674.132468] page_fault+0x1e/0x30 [ 674.135907] RIP: 0033:0x4075fa [ 674.139081] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 674.144433] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 674.151691] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 674.158958] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 674.166219] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a4be7 [ 674.173475] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 674.180738] warn_alloc_show_mem: 1 callbacks suppressed [ 674.180741] Mem-Info: [ 674.188505] active_anon:185610 inactive_anon:74 isolated_anon:0 [ 674.188505] active_file:1795 inactive_file:5615 isolated_file:0 [ 674.188505] unevictable:0 dirty:67 writeback:0 unstable:0 [ 674.188505] slab_reclaimable:3322 slab_unreclaimable:9478 [ 674.188505] mapped:71949 shmem:84 pagetables:1455 bounce:0 [ 674.188505] free:181542 free_pcp:427 free_cma:0 [ 674.221684] Node 0 active_anon:742440kB inactive_anon:296kB active_file:7180kB inactive_file:22460kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:287796kB dirty:268kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 674.249694] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 674.275826] lowmem_reserve[]: 0 2817 7244 7244 [ 674.280416] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 674.309311] lowmem_reserve[]: 0 0 4426 4426 [ 674.313642] Node 0 Normal free:238160kB min:41208kB low:51508kB high:61808kB active_anon:526960kB inactive_anon:296kB active_file:7056kB inactive_file:22460kB unevictable:0kB writepending:204kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3628kB bounce:0kB free_pcp:384kB local_pcp:272kB free_cma:0kB [ 674.343230] lowmem_reserve[]: 0 0 0 0 [ 674.347024] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 674.360252] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 674.377648] Node 0 Normal: 6550*4kB (ME) 5143*8kB (ME) 2130*16kB (ME) 1539*32kB (M) 1017*64kB (UM) 163*128kB (UM) 0*256kB 1*512kB (U) 1*1024kB (U) 0*2048kB 0*4096kB = 238160kB [ 674.393474] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 674.402031] 7494 total pagecache pages [ 674.405906] 0 pages in swap cache [ 674.409342] Swap cache stats: add 0, delete 0, find 0/0 [ 674.414686] Free swap = 0kB [ 674.417683] Total swap = 0kB [ 674.420680] 1965969 pages RAM [ 674.423764] 0 pages HighMem/MovableOnly [ 674.427713] 106316 pages reserved [ 674.433862] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 674.444367] syz-executor4 cpuset=syz4 mems_allowed=0 [ 674.449474] CPU: 1 PID: 7159 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 674.456204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.465538] Call Trace: [ 674.468119] dump_stack+0x185/0x1d0 [ 674.471737] warn_alloc+0x430/0x690 [ 674.475362] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 674.480202] ? kernel_poison_pages+0x40/0x360 [ 674.484689] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 674.490129] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 674.495062] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 674.500078] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 674.505430] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.510269] kmsan_alloc_page+0x82/0xe0 [ 674.514232] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 674.518986] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.523819] ? __msan_poison_alloca+0x15c/0x1d0 [ 674.528478] ? __should_failslab+0x278/0x2a0 [ 674.532916] ? should_fail+0x57/0xab0 [ 674.536707] ? __should_failslab+0x278/0x2a0 [ 674.541109] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.545943] ? __msan_poison_alloca+0x15c/0x1d0 [ 674.550618] ? kmsan_set_origin+0x9e/0x160 [ 674.554846] alloc_pages_vma+0x1555/0x17f0 [ 674.559076] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 674.564175] handle_mm_fault+0x44ca/0x7ed0 [ 674.568406] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.573243] __do_page_fault+0xec6/0x1a10 [ 674.577385] do_page_fault+0xb7/0x250 [ 674.581173] ? page_fault+0x8/0x30 [ 674.584702] page_fault+0x1e/0x30 [ 674.588146] RIP: 0033:0x4075fa [ 674.591322] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 674.596685] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 674.603946] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 674.611203] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 674.618460] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a4da0 [ 674.625719] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 674.633845] audit: type=1326 audit(1529731494.632:1333): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7158 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 674.668134] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 674.678864] syz-executor5 cpuset=syz5 mems_allowed=0 [ 674.684166] CPU: 0 PID: 7167 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 674.691028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.700389] Call Trace: [ 674.702992] dump_stack+0x185/0x1d0 [ 674.706635] warn_alloc+0x430/0x690 [ 674.710892] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 674.715740] ? kernel_poison_pages+0x40/0x360 [ 674.720258] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 674.726832] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 674.731788] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 674.736813] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.741668] kmsan_alloc_page+0x82/0xe0 [ 674.745639] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 674.750408] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.755242] ? __msan_poison_alloca+0x15c/0x1d0 [ 674.759900] ? __should_failslab+0x278/0x2a0 [ 674.764302] ? should_fail+0x57/0xab0 [ 674.768107] ? __should_failslab+0x278/0x2a0 [ 674.772521] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.777356] ? __msan_poison_alloca+0x15c/0x1d0 [ 674.782015] ? kmsan_set_origin+0x9e/0x160 [ 674.786503] alloc_pages_vma+0x1555/0x17f0 [ 674.790732] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 674.795828] handle_mm_fault+0x44ca/0x7ed0 [ 674.800050] ? kmsan_set_origin_inline+0x6b/0x120 [ 674.804890] __do_page_fault+0xec6/0x1a10 [ 674.809043] do_page_fault+0xb7/0x250 [ 674.812845] ? page_fault+0x8/0x30 [ 674.816380] page_fault+0x1e/0x30 [ 674.819825] RIP: 0033:0x4075fa [ 674.823000] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 674.828346] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 674.835617] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 05:24:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 674.842871] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 674.850127] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a4e8b [ 674.857383] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) [ 674.894374] audit: type=1326 audit(1529731494.892:1334): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7172 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 674.944745] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 674.955290] syz-executor0 cpuset=syz0 mems_allowed=0 [ 674.960418] CPU: 0 PID: 7175 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 674.967166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.976522] Call Trace: [ 674.979143] dump_stack+0x185/0x1d0 [ 674.982777] warn_alloc+0x430/0x690 [ 674.986598] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 674.991583] ? kernel_poison_pages+0x40/0x360 [ 674.996087] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 675.001574] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 675.006637] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 675.012018] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.016887] kmsan_alloc_page+0x82/0xe0 [ 675.021357] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 675.026131] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.031008] ? __msan_poison_alloca+0x15c/0x1d0 [ 675.035691] ? __should_failslab+0x278/0x2a0 [ 675.040114] ? should_fail+0x57/0xab0 [ 675.043920] ? __should_failslab+0x278/0x2a0 [ 675.048337] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.053188] ? __msan_poison_alloca+0x15c/0x1d0 [ 675.057870] ? kmsan_set_origin+0x9e/0x160 [ 675.062122] alloc_pages_vma+0x1555/0x17f0 [ 675.066375] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 675.071508] handle_mm_fault+0x44ca/0x7ed0 [ 675.075754] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.080613] __do_page_fault+0xec6/0x1a10 [ 675.084770] do_page_fault+0xb7/0x250 [ 675.088566] ? page_fault+0x8/0x30 [ 675.092102] page_fault+0x1e/0x30 [ 675.097196] RIP: 0033:0x4075fa [ 675.100369] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 675.105721] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 675.112981] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 675.120237] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 675.127491] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a4fa0 [ 675.134747] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 675.142013] warn_alloc_show_mem: 2 callbacks suppressed [ 675.142015] Mem-Info: [ 675.149786] active_anon:185637 inactive_anon:76 isolated_anon:0 [ 675.149786] active_file:2060 inactive_file:5117 isolated_file:0 [ 675.149786] unevictable:0 dirty:75 writeback:0 unstable:0 [ 675.149786] slab_reclaimable:3322 slab_unreclaimable:9478 [ 675.149786] mapped:71857 shmem:84 pagetables:1502 bounce:0 [ 675.149786] free:181122 free_pcp:495 free_cma:0 [ 675.182946] Node 0 active_anon:742548kB inactive_anon:304kB active_file:8240kB inactive_file:20468kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:287428kB dirty:300kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 675.210962] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 675.237102] lowmem_reserve[]: 0 2817 7244 7244 [ 675.241676] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 675.270566] lowmem_reserve[]: 0 0 4426 4426 [ 675.274880] Node 0 Normal free:236480kB min:41208kB low:51508kB high:61808kB active_anon:527340kB inactive_anon:304kB active_file:8080kB inactive_file:20720kB unevictable:0kB writepending:236kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3816kB bounce:0kB free_pcp:656kB local_pcp:40kB free_cma:0kB [ 675.304377] lowmem_reserve[]: 0 0 0 0 [ 675.308171] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 675.321380] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 675.338760] Node 0 Normal: 6610*4kB (UME) 5145*8kB (UME) 2137*16kB (UME) 1541*32kB (UM) 1013*64kB (UM) 160*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 236416kB [ 675.354228] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 675.362782] 7316 total pagecache pages [ 675.366650] 0 pages in swap cache [ 675.370083] Swap cache stats: add 0, delete 0, find 0/0 [ 675.375421] Free swap = 0kB [ 675.378427] Total swap = 0kB [ 675.381424] 1965969 pages RAM [ 675.384506] 0 pages HighMem/MovableOnly [ 675.388457] 106316 pages reserved 05:24:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) [ 675.396650] audit: type=1326 audit(1529731495.394:1335): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7167 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) [ 675.521266] audit: type=1326 audit(1529731495.519:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7185 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 675.527028] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 675.551348] syz-executor3 cpuset=syz3 mems_allowed=0 [ 675.556478] CPU: 0 PID: 7190 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 675.563232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.572605] Call Trace: [ 675.575216] dump_stack+0x185/0x1d0 [ 675.578856] warn_alloc+0x430/0x690 [ 675.582500] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 675.587387] ? kernel_poison_pages+0x40/0x360 [ 675.591895] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 675.597349] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 675.602291] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 675.607309] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.612156] kmsan_alloc_page+0x82/0xe0 [ 675.616126] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 675.620870] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.625704] ? __msan_poison_alloca+0x15c/0x1d0 [ 675.630358] ? __should_failslab+0x278/0x2a0 [ 675.634754] ? should_fail+0x57/0xab0 [ 675.638542] ? __should_failslab+0x278/0x2a0 [ 675.642943] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.647774] ? __msan_poison_alloca+0x15c/0x1d0 [ 675.652605] ? kmsan_set_origin+0x9e/0x160 [ 675.656851] alloc_pages_vma+0x1555/0x17f0 [ 675.661082] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 675.666193] handle_mm_fault+0x44ca/0x7ed0 [ 675.670420] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.675280] __do_page_fault+0xec6/0x1a10 [ 675.679425] do_page_fault+0xb7/0x250 [ 675.683231] ? page_fault+0x8/0x30 [ 675.686758] page_fault+0x1e/0x30 [ 675.690197] RIP: 0033:0x4075fa [ 675.693372] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 675.698722] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 675.705983] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 675.713262] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 675.720518] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a51e6 [ 675.727772] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 675.757628] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 675.768245] syz-executor1 cpuset=syz1 mems_allowed=0 [ 675.773413] CPU: 0 PID: 7195 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 675.780168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.789525] Call Trace: [ 675.792111] dump_stack+0x185/0x1d0 [ 675.795731] warn_alloc+0x430/0x690 [ 675.799361] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 675.804192] ? kernel_poison_pages+0x40/0x360 [ 675.808677] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 675.814112] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 675.820259] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 675.825264] ? update_load_avg+0x1b70/0x2cc0 [ 675.829663] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.834501] kmsan_alloc_page+0x82/0xe0 [ 675.838466] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 675.843221] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.848054] ? __msan_poison_alloca+0x15c/0x1d0 [ 675.852712] ? __should_failslab+0x278/0x2a0 [ 675.857115] ? should_fail+0x57/0xab0 [ 675.860913] ? __should_failslab+0x278/0x2a0 [ 675.865312] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.870140] ? __msan_poison_alloca+0x15c/0x1d0 [ 675.874796] ? kmsan_set_origin+0x9e/0x160 [ 675.879024] alloc_pages_vma+0x1555/0x17f0 [ 675.883266] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 675.888366] handle_mm_fault+0x44ca/0x7ed0 [ 675.892845] ? kmsan_set_origin_inline+0x6b/0x120 [ 675.897683] __do_page_fault+0xec6/0x1a10 [ 675.901824] do_page_fault+0xb7/0x250 [ 675.905616] ? page_fault+0x8/0x30 [ 675.909142] page_fault+0x1e/0x30 [ 675.912577] RIP: 0033:0x4075fa [ 675.915762] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:24:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/4096) 05:24:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) [ 675.921110] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 675.928457] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 675.935714] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 675.942974] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a52ca [ 675.950236] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:56 executing program 0: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) [ 676.051622] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 676.062147] syz-executor6 cpuset=syz6 mems_allowed=0 [ 676.067269] CPU: 0 PID: 7204 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 676.074021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.083382] Call Trace: [ 676.085983] dump_stack+0x185/0x1d0 [ 676.089625] warn_alloc+0x430/0x690 [ 676.093264] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 676.098096] ? kernel_poison_pages+0x40/0x360 [ 676.102583] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 676.108036] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 676.113047] ? kmsan_set_origin_inline+0x6b/0x120 [ 676.117885] kmsan_alloc_page+0x82/0xe0 [ 676.121847] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 676.126947] ? kmsan_set_origin_inline+0x6b/0x120 [ 676.131779] ? __msan_poison_alloca+0x15c/0x1d0 [ 676.136451] ? __should_failslab+0x278/0x2a0 [ 676.140848] ? should_fail+0x57/0xab0 [ 676.144641] ? __should_failslab+0x278/0x2a0 [ 676.149064] ? kmsan_set_origin_inline+0x6b/0x120 [ 676.153897] ? __msan_poison_alloca+0x15c/0x1d0 [ 676.158558] ? kmsan_set_origin+0x9e/0x160 [ 676.162784] alloc_pages_vma+0x1555/0x17f0 [ 676.167014] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 676.172112] handle_mm_fault+0x44ca/0x7ed0 [ 676.176336] ? kmsan_set_origin_inline+0x6b/0x120 [ 676.181174] __do_page_fault+0xec6/0x1a10 [ 676.185325] do_page_fault+0xb7/0x250 [ 676.189110] ? page_fault+0x8/0x30 [ 676.192634] page_fault+0x1e/0x30 [ 676.196068] RIP: 0033:0x4075fa [ 676.199417] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 676.204766] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 676.212043] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 676.219300] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 676.226566] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a53f3 [ 676.233830] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 676.241105] warn_alloc_show_mem: 2 callbacks suppressed [ 676.241107] Mem-Info: [ 676.248857] active_anon:185652 inactive_anon:74 isolated_anon:0 [ 676.248857] active_file:2091 inactive_file:5132 isolated_file:0 [ 676.248857] unevictable:0 dirty:85 writeback:0 unstable:0 [ 676.248857] slab_reclaimable:3322 slab_unreclaimable:9478 [ 676.248857] mapped:71945 shmem:84 pagetables:1462 bounce:0 [ 676.248857] free:180762 free_pcp:504 free_cma:0 [ 676.282023] Node 0 active_anon:742608kB inactive_anon:296kB active_file:8364kB inactive_file:20528kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:287780kB dirty:340kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 676.310029] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 676.336158] lowmem_reserve[]: 0 2817 7244 7244 [ 676.340746] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 676.369656] lowmem_reserve[]: 0 0 4426 4426 [ 676.373981] Node 0 Normal free:235040kB min:41208kB low:51508kB high:61808kB active_anon:527328kB inactive_anon:296kB active_file:8240kB inactive_file:20528kB unevictable:0kB writepending:276kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8448kB pagetables:3656kB bounce:0kB free_pcp:692kB local_pcp:188kB free_cma:0kB [ 676.403579] lowmem_reserve[]: 0 0 0 0 [ 676.407378] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 676.420592] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 676.438005] Node 0 Normal: 6645*4kB (UME) 5025*8kB (UME) 2092*16kB (UME) 1542*32kB (UM) 1012*64kB (UM) 158*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 234588kB [ 676.453478] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 676.462037] 7307 total pagecache pages [ 676.465924] 0 pages in swap cache [ 676.469368] Swap cache stats: add 0, delete 0, find 0/0 [ 676.474713] Free swap = 0kB [ 676.477727] Total swap = 0kB [ 676.480732] 1965969 pages RAM [ 676.483832] 0 pages HighMem/MovableOnly [ 676.487802] 106316 pages reserved 05:24:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) [ 676.560424] audit: type=1326 audit(1529731496.559:1337): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7200 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000300)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) 05:24:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 676.760454] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 676.771007] syz-executor1 cpuset=syz1 mems_allowed=0 [ 676.776142] CPU: 0 PID: 7225 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 676.782929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.792291] Call Trace: [ 676.794899] dump_stack+0x185/0x1d0 [ 676.798541] warn_alloc+0x430/0x690 [ 676.802212] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 676.807072] ? kernel_poison_pages+0x40/0x360 [ 676.811595] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 676.817086] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 676.822132] ? kmsan_set_origin_inline+0x6b/0x120 [ 676.827004] kmsan_alloc_page+0x82/0xe0 [ 676.830997] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 676.835769] ? kmsan_set_origin_inline+0x6b/0x120 [ 676.840646] ? __msan_poison_alloca+0x15c/0x1d0 [ 676.845352] ? __should_failslab+0x278/0x2a0 [ 676.849771] ? should_fail+0x57/0xab0 [ 676.853576] ? __should_failslab+0x278/0x2a0 05:24:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 676.857989] ? kmsan_set_origin_inline+0x6b/0x120 [ 676.862839] ? __msan_poison_alloca+0x15c/0x1d0 [ 676.867518] ? kmsan_set_origin+0x9e/0x160 [ 676.871781] alloc_pages_vma+0x1555/0x17f0 [ 676.876037] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 676.881164] handle_mm_fault+0x44ca/0x7ed0 [ 676.885411] ? kmsan_set_origin_inline+0x6b/0x120 [ 676.890279] __do_page_fault+0xec6/0x1a10 [ 676.894448] do_page_fault+0xb7/0x250 [ 676.898256] ? page_fault+0x8/0x30 [ 676.901806] page_fault+0x1e/0x30 [ 676.905287] RIP: 0033:0x4075fa 05:24:56 executing program 4: accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:56 executing program 0: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) [ 676.908474] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 676.913841] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 676.921121] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 676.928402] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 676.935701] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a56b7 [ 676.942979] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 676.952572] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 676.963097] syz-executor2 cpuset=syz2 mems_allowed=0 [ 676.968227] CPU: 0 PID: 7227 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 676.974977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.984330] Call Trace: [ 676.986920] dump_stack+0x185/0x1d0 [ 676.990539] warn_alloc+0x430/0x690 [ 676.994166] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 676.999000] ? kernel_poison_pages+0x40/0x360 [ 677.003485] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 677.008941] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 677.013877] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 677.018888] ? kmsan_set_origin_inline+0x6b/0x120 [ 677.023725] kmsan_alloc_page+0x82/0xe0 [ 677.027686] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 677.032432] ? kmsan_set_origin_inline+0x6b/0x120 [ 677.037264] ? __msan_poison_alloca+0x15c/0x1d0 [ 677.041919] ? __should_failslab+0x278/0x2a0 [ 677.046317] ? should_fail+0x57/0xab0 [ 677.050101] ? __should_failslab+0x278/0x2a0 [ 677.054508] ? kmsan_set_origin_inline+0x6b/0x120 [ 677.059352] ? __msan_poison_alloca+0x15c/0x1d0 [ 677.064014] ? kmsan_set_origin+0x9e/0x160 [ 677.068254] alloc_pages_vma+0x1555/0x17f0 [ 677.072491] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 677.077861] handle_mm_fault+0x44ca/0x7ed0 [ 677.082082] ? kmsan_set_origin_inline+0x6b/0x120 [ 677.086924] __do_page_fault+0xec6/0x1a10 [ 677.091236] do_page_fault+0xb7/0x250 [ 677.095029] ? page_fault+0x8/0x30 [ 677.098559] page_fault+0x1e/0x30 [ 677.101999] RIP: 0033:0x4075fa [ 677.105174] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 677.110520] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 677.117779] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 677.125033] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 677.132292] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a5777 [ 677.139557] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:24:57 executing program 4: accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 677.370343] audit: type=1326 audit(1529731497.368:1338): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7227 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:24:57 executing program 0: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:57 executing program 4: accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:57 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:57 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) [ 677.553211] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 677.564734] syz-executor7 cpuset=syz7 mems_allowed=0 [ 677.569873] CPU: 1 PID: 7270 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 677.576631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.586191] Call Trace: [ 677.588800] dump_stack+0x185/0x1d0 [ 677.592440] warn_alloc+0x430/0x690 [ 677.596106] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 677.600977] ? kernel_poison_pages+0x40/0x360 [ 677.605487] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 677.611001] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 677.616041] ? kmsan_set_origin_inline+0x6b/0x120 [ 677.620938] kmsan_alloc_page+0x82/0xe0 [ 677.624922] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 677.629682] ? do_syscall_64+0x15b/0x230 [ 677.633751] ? kmsan_set_origin_inline+0x6b/0x120 [ 677.638699] ? __msan_poison_alloca+0x15c/0x1d0 [ 677.643388] ? __should_failslab+0x278/0x2a0 [ 677.647815] ? should_fail+0x57/0xab0 [ 677.651626] ? __should_failslab+0x278/0x2a0 [ 677.656066] ? kmsan_set_origin_inline+0x6b/0x120 [ 677.660923] ? __msan_poison_alloca+0x15c/0x1d0 [ 677.666081] ? kmsan_set_origin+0x9e/0x160 [ 677.670357] alloc_pages_vma+0x1555/0x17f0 [ 677.674640] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 677.679773] handle_mm_fault+0x44ca/0x7ed0 [ 677.684031] ? kmsan_set_origin_inline+0x6b/0x120 [ 677.688914] __do_page_fault+0xec6/0x1a10 [ 677.693125] do_page_fault+0xb7/0x250 [ 677.696973] page_fault+0x1e/0x30 [ 677.700449] RIP: 0010:__put_user_4+0x1c/0x30 [ 677.704859] RSP: 0018:ffff880141e4fdb0 EFLAGS: 00010297 [ 677.710407] RAX: 0000000000000013 RBX: 00007fffffffeffd RCX: 0000000020000100 [ 677.717687] RDX: 0000000000000000 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 677.724962] RBP: ffff880141e4fe78 R08: 0000000001080020 R09: 0000000000000002 [ 677.732233] R10: 0000000000000000 R11: ffffffff87d2e2c0 R12: 0000000000000000 [ 677.739494] R13: 0000000000000000 R14: 0000000020000100 R15: 0000000000000013 [ 677.746794] ? __sys_socketpair+0x1490/0x1490 [ 677.751293] ? __sys_socketpair+0x1cb/0x1490 [ 677.755696] __x64_sys_socketpair+0x117/0x170 [ 677.760187] ? __sys_socketpair+0x1490/0x1490 [ 677.764689] do_syscall_64+0x15b/0x230 [ 677.768575] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 677.773791] RIP: 0033:0x455a99 [ 677.776970] RSP: 002b:00007f4965255c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 677.784673] RAX: ffffffffffffffda RBX: 00007f49652566d4 RCX: 0000000000455a99 [ 677.791931] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 677.799190] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 677.806445] R10: 0000000020000100 R11: 0000000000000246 R12: 00000000ffffffff [ 677.813709] R13: 00000000004c1c23 R14: 00000000004d2d08 R15: 0000000000000000 [ 677.821148] warn_alloc_show_mem: 2 callbacks suppressed [ 677.821151] Mem-Info: [ 677.828906] active_anon:184607 inactive_anon:73 isolated_anon:0 [ 677.828906] active_file:2113 inactive_file:5054 isolated_file:0 [ 677.828906] unevictable:0 dirty:94 writeback:0 unstable:0 [ 677.828906] slab_reclaimable:3322 slab_unreclaimable:9481 [ 677.828906] mapped:71989 shmem:84 pagetables:1372 bounce:0 [ 677.828906] free:183498 free_pcp:558 free_cma:0 [ 677.862597] Node 0 active_anon:738428kB inactive_anon:292kB active_file:8452kB inactive_file:20216kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:287956kB dirty:376kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 677.892707] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 677.918829] lowmem_reserve[]: 0 2817 7244 7244 [ 677.923417] Node 0 DMA32 free:484392kB min:26224kB low:32780kB high:39336kB active_anon:211260kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 677.952315] lowmem_reserve[]: 0 0 4426 4426 [ 677.956636] Node 0 Normal free:233696kB min:41208kB low:51508kB high:61808kB active_anon:527256kB inactive_anon:292kB active_file:8328kB inactive_file:20564kB unevictable:0kB writepending:312kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3296kB bounce:0kB free_pcp:908kB local_pcp:336kB free_cma:0kB [ 677.986225] lowmem_reserve[]: 0 0 0 0 [ 677.990019] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 678.003245] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 6*2048kB (UM) 0*4096kB = 484392kB [ 678.021075] Node 0 Normal: 6984*4kB (UME) 5065*8kB (UME) 2090*16kB (UME) 1519*32kB (UM) 1006*64kB (UM) 147*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 233704kB [ 678.036556] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 678.045118] 7280 total pagecache pages [ 678.049000] 0 pages in swap cache [ 678.052436] Swap cache stats: add 0, delete 0, find 0/0 [ 678.057789] Free swap = 0kB [ 678.060788] Total swap = 0kB [ 678.064052] 1965969 pages RAM [ 678.067135] 0 pages HighMem/MovableOnly [ 678.071089] 106316 pages reserved 05:24:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:24:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:58 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) [ 678.149775] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 678.160343] syz-executor3 cpuset=syz3 mems_allowed=0 [ 678.165487] CPU: 1 PID: 7283 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 678.172227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.181570] Call Trace: [ 678.184148] dump_stack+0x185/0x1d0 [ 678.187782] warn_alloc+0x430/0x690 [ 678.191403] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 678.196234] ? kernel_poison_pages+0x40/0x360 [ 678.200720] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 678.206162] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 678.211106] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 678.216324] ? kmsan_set_origin_inline+0x6b/0x120 [ 678.221350] kmsan_alloc_page+0x82/0xe0 [ 678.225331] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 678.230078] ? kmsan_set_origin_inline+0x6b/0x120 [ 678.234909] ? __msan_poison_alloca+0x15c/0x1d0 [ 678.239654] ? __should_failslab+0x278/0x2a0 [ 678.244059] ? should_fail+0x57/0xab0 [ 678.247850] ? __should_failslab+0x278/0x2a0 [ 678.252249] ? kmsan_set_origin_inline+0x6b/0x120 [ 678.257084] ? __msan_poison_alloca+0x15c/0x1d0 [ 678.261746] ? kmsan_set_origin+0x9e/0x160 [ 678.265987] alloc_pages_vma+0x1555/0x17f0 [ 678.270219] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 678.275315] handle_mm_fault+0x44ca/0x7ed0 [ 678.279537] ? kmsan_set_origin_inline+0x6b/0x120 [ 678.284376] __do_page_fault+0xec6/0x1a10 [ 678.288518] do_page_fault+0xb7/0x250 [ 678.292312] ? page_fault+0x8/0x30 [ 678.295838] page_fault+0x1e/0x30 [ 678.299277] RIP: 0033:0x4075fa [ 678.302452] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 678.307806] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 678.315162] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 678.322424] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 678.329683] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a5c25 [ 678.337125] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:24:58 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) [ 678.457296] audit: type=1326 audit(1529731498.456:1339): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7267 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:58 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:24:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:24:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:58 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:24:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:24:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:24:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:24:59 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:24:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 679.401508] audit: type=1326 audit(1529731499.399:1340): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7316 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:24:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:24:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:24:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:24:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:24:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:24:59 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:24:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:24:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:25:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) [ 680.034434] audit: type=1326 audit(1529731500.031:1341): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7390 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:00 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:25:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:25:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 680.218055] warn_alloc: 6 callbacks suppressed [ 680.218072] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 680.218082] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 680.218114] syz-executor6 cpuset= [ 680.222726] syz-executor2 cpuset= [ 680.233212] syz6 mems_allowed=0 [ 680.250570] syz2 mems_allowed=0 [ 680.253847] CPU: 0 PID: 7408 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 680.263844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.273186] Call Trace: [ 680.275767] dump_stack+0x185/0x1d0 [ 680.279381] warn_alloc+0x430/0x690 [ 680.283015] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 680.287846] ? kernel_poison_pages+0x40/0x360 [ 680.292332] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 680.297780] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 680.302710] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 680.307725] ? kmsan_set_origin_inline+0x6b/0x120 [ 680.312564] ? __msan_poison_alloca+0x15c/0x1d0 [ 680.317225] kmsan_alloc_page+0x82/0xe0 [ 680.321187] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 680.325931] ? kmsan_set_origin_inline+0x6b/0x120 [ 680.330761] ? __msan_poison_alloca+0x15c/0x1d0 [ 680.335417] ? __should_failslab+0x278/0x2a0 [ 680.339815] ? should_fail+0x57/0xab0 [ 680.343603] ? __should_failslab+0x278/0x2a0 [ 680.348013] ? kmsan_set_origin_inline+0x6b/0x120 [ 680.352844] ? __msan_poison_alloca+0x15c/0x1d0 [ 680.357505] ? kmsan_set_origin+0x9e/0x160 [ 680.361734] alloc_pages_vma+0x1555/0x17f0 [ 680.365973] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 680.371075] handle_mm_fault+0x44ca/0x7ed0 [ 680.375306] ? kmsan_set_origin_inline+0x6b/0x120 [ 680.380149] __do_page_fault+0xec6/0x1a10 [ 680.384311] do_page_fault+0xb7/0x250 [ 680.388103] ? page_fault+0x8/0x30 [ 680.391631] page_fault+0x1e/0x30 [ 680.395072] RIP: 0033:0x4075fa [ 680.398245] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 680.403594] RAX: 0000000020000240 RBX: 0000000000000000 RCX: 0000000000000001 [ 680.410850] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 680.418107] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 680.425362] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a6439 [ 680.432715] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 680.439991] warn_alloc_show_mem: 1 callbacks suppressed [ 680.440000] CPU: 1 PID: 7406 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 680.440002] Mem-Info: [ 680.440028] active_anon:185157 inactive_anon:78 isolated_anon:0 [ 680.440028] active_file:2157 inactive_file:5010 isolated_file:0 [ 680.440028] unevictable:0 dirty:109 writeback:0 unstable:0 [ 680.440028] slab_reclaimable:3322 slab_unreclaimable:9474 [ 680.440028] mapped:71994 shmem:84 pagetables:1514 bounce:0 [ 680.440028] free:184937 free_pcp:481 free_cma:0 [ 680.445364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.452216] Node 0 active_anon:740628kB inactive_anon:312kB active_file:8628kB inactive_file:20040kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:287976kB dirty:436kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 680.454606] Call Trace: [ 680.487815] Node 0 [ 680.497261] dump_stack+0x185/0x1d0 [ 680.525262] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 680.527818] warn_alloc+0x430/0x690 [ 680.530021] lowmem_reserve[]: [ 680.533641] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 680.559115] 0 [ 680.562748] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 680.565813] 2817 [ 680.570639] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 680.572408] 7244 [ 680.577860] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 680.579889] 7244 [ 680.584827] ? kmsan_set_origin_inline+0x6b/0x120 [ 680.591851] ? __msan_poison_alloca+0x15c/0x1d0 [ 680.593890] Node 0 [ 680.598735] kmsan_alloc_page+0x82/0xe0 [ 680.603405] DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:211260kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 680.605607] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 680.609548] lowmem_reserve[]: [ 680.637821] ? kmsan_set_origin_inline+0x6b/0x120 [ 680.642556] 0 [ 680.645650] ? __msan_poison_alloca+0x15c/0x1d0 [ 680.650570] 0 [ 680.652358] ? __should_failslab+0x278/0x2a0 [ 680.657002] 4426 [ 680.658801] ? should_fail+0x57/0xab0 [ 680.663174] 4426 [ 680.665221] ? __should_failslab+0x278/0x2a0 [ 680.671036] ? kmsan_set_origin_inline+0x6b/0x120 [ 680.675417] Node 0 [ 680.680238] ? __msan_poison_alloca+0x15c/0x1d0 [ 680.680260] Normal free:251740kB min:41208kB low:51508kB high:61808kB active_anon:529348kB inactive_anon:312kB active_file:8504kB inactive_file:20040kB unevictable:0kB writepending:372kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8512kB pagetables:3864kB bounce:0kB free_pcp:600kB local_pcp:176kB free_cma:0kB [ 680.680266] lowmem_reserve[]: [ 680.682489] ? kmsan_set_origin+0x9e/0x160 [ 680.687126] 0 [ 680.716617] alloc_pages_vma+0x1555/0x17f0 [ 680.719690] 0 [ 680.723914] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 680.726461] 0 [ 680.730699] handle_mm_fault+0x44ca/0x7ed0 [ 680.732450] 0 [ 680.737535] ? kmsan_set_origin_inline+0x6b/0x120 [ 680.743537] __do_page_fault+0xec6/0x1a10 [ 680.745299] Node 0 [ 680.750128] do_page_fault+0xb7/0x250 [ 680.754233] DMA: 0*4kB [ 680.756463] ? page_fault+0x8/0x30 [ 680.760228] 0*8kB [ 680.762794] page_fault+0x1e/0x30 [ 680.766312] 0*16kB [ 680.768440] RIP: 0033:0x4075fa [ 680.771861] 1*32kB [ 680.774077] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 680.777238] (U) [ 680.784786] 2*64kB [ 680.786735] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 680.786742] (U) [ 680.788974] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 680.796218] 1*128kB [ 680.798171] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 680.805426] (U) [ 680.807746] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a6439 [ 680.814990] 1*256kB [ 680.816945] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 680.824192] (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 680.841125] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 2*2048kB (UM) 0*4096kB = 476200kB 05:25:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:25:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) [ 680.858984] Node 0 Normal: 6085*4kB (UME) 5344*8kB (UME) 2483*16kB (UME) 1653*32kB (UM) 979*64kB (UM) 112*128kB (UM) 8*256kB (M) 12*512kB (M) 6*1024kB (M) 1*2048kB (M) 0*4096kB = 253092kB [ 680.875893] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 680.884827] 7251 total pagecache pages [ 680.888707] 0 pages in swap cache [ 680.892153] Swap cache stats: add 0, delete 0, find 0/0 [ 680.897510] Free swap = 0kB [ 680.900519] Total swap = 0kB [ 680.903537] 1965969 pages RAM [ 680.906725] 0 pages HighMem/MovableOnly [ 680.910690] 106316 pages reserved [ 680.950476] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 680.961011] syz-executor4 cpuset=syz4 mems_allowed=0 [ 680.966153] CPU: 1 PID: 7416 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 680.972904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.982256] Call Trace: [ 680.984859] dump_stack+0x185/0x1d0 [ 680.988500] warn_alloc+0x430/0x690 [ 680.992146] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 680.996997] ? kernel_poison_pages+0x40/0x360 [ 681.001503] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 681.007002] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 681.011966] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 681.016952] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 681.022338] ? kmsan_set_origin_inline+0x6b/0x120 [ 681.027194] ? __msan_poison_alloca+0x15c/0x1d0 [ 681.031879] kmsan_alloc_page+0x82/0xe0 [ 681.035858] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 681.040617] ? kmsan_set_origin_inline+0x6b/0x120 [ 681.045576] ? __msan_poison_alloca+0x15c/0x1d0 [ 681.050244] ? __should_failslab+0x278/0x2a0 [ 681.054657] ? should_fail+0x57/0xab0 [ 681.058544] ? __should_failslab+0x278/0x2a0 [ 681.062957] ? kmsan_set_origin_inline+0x6b/0x120 [ 681.067802] ? __msan_poison_alloca+0x15c/0x1d0 [ 681.072473] ? kmsan_set_origin+0x9e/0x160 [ 681.076731] alloc_pages_vma+0x1555/0x17f0 [ 681.080971] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 681.086079] handle_mm_fault+0x44ca/0x7ed0 [ 681.090301] ? kmsan_set_origin_inline+0x6b/0x120 [ 681.095142] __do_page_fault+0xec6/0x1a10 [ 681.099296] do_page_fault+0xb7/0x250 [ 681.103082] ? page_fault+0x8/0x30 [ 681.106608] page_fault+0x1e/0x30 [ 681.110058] RIP: 0033:0x4075fa [ 681.113234] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 681.118781] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 681.126035] RDX: 37b30e0cc1bfa4bb RSI: 0000000000000000 RDI: 0000000000dd0848 [ 681.133288] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 681.140541] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a6715 [ 681.147795] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:25:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) epoll_create(0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 05:25:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:25:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:25:01 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:25:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:25:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) [ 681.372145] audit: type=1326 audit(1529731501.370:1342): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7432 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:25:01 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:01 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:25:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:25:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:25:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) [ 681.729794] audit: type=1326 audit(1529731501.728:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7463 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:02 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:02 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:25:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:25:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:25:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000140)={'team_slave_1\x00'}) [ 682.295398] audit: type=1326 audit(1529731502.294:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7478 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:25:02 executing program 6: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:02 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:25:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) msgsnd(0x0, &(0x7f0000000200), 0x8, 0x0) 05:25:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:25:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:25:02 executing program 6: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:02 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) [ 682.744184] audit: type=1326 audit(1529731502.742:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7523 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) msgsnd(0x0, &(0x7f0000000200), 0x8, 0x0) [ 682.805101] audit: type=1326 audit(1529731502.764:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7532 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:03 executing program 6: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:03 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:25:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) msgsnd(0x0, &(0x7f0000000200), 0x8, 0x0) 05:25:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) [ 683.228107] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 683.228417] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 683.238681] syz-executor7 cpuset= [ 683.249148] syz-executor6 cpuset= [ 683.249150] syz7 mems_allowed=0 [ 683.252581] syz6 [ 683.256015] CPU: 1 PID: 7549 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 683.259306] mems_allowed=0 [ 683.261258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.280210] Call Trace: [ 683.282787] dump_stack+0x185/0x1d0 [ 683.286414] warn_alloc+0x430/0x690 [ 683.290038] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 683.294868] ? kernel_poison_pages+0x40/0x360 [ 683.299351] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 683.304789] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 683.309721] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 683.314657] kmsan_alloc_page+0x82/0xe0 [ 683.318637] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 683.323380] ? kmsan_set_origin_inline+0x6b/0x120 [ 683.328206] ? __msan_poison_alloca+0x15c/0x1d0 [ 683.332863] ? __should_failslab+0x278/0x2a0 [ 683.337267] ? should_fail+0x57/0xab0 [ 683.341072] ? __should_failslab+0x278/0x2a0 [ 683.345468] ? kmsan_set_origin_inline+0x6b/0x120 [ 683.350295] ? __msan_poison_alloca+0x15c/0x1d0 [ 683.354950] ? kmsan_set_origin+0x9e/0x160 [ 683.359179] alloc_pages_vma+0x1555/0x17f0 [ 683.363404] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 683.368504] handle_mm_fault+0x44ca/0x7ed0 [ 683.372728] ? kmsan_set_origin_inline+0x6b/0x120 [ 683.377567] __do_page_fault+0xec6/0x1a10 [ 683.381704] do_page_fault+0xb7/0x250 [ 683.385492] ? page_fault+0x8/0x30 [ 683.389019] page_fault+0x1e/0x30 [ 683.392457] RIP: 0033:0x4075fa [ 683.395630] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 683.400978] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 683.408244] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 683.415500] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 683.422760] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a6ffb [ 683.430016] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 683.437276] warn_alloc_show_mem: 2 callbacks suppressed [ 683.437285] CPU: 0 PID: 7552 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 683.437287] Mem-Info: [ 683.437311] active_anon:186131 inactive_anon:78 isolated_anon:0 [ 683.437311] active_file:2488 inactive_file:3747 isolated_file:0 [ 683.437311] unevictable:0 dirty:122 writeback:0 unstable:0 [ 683.437311] slab_reclaimable:3322 slab_unreclaimable:9490 [ 683.437311] mapped:70946 shmem:84 pagetables:1496 bounce:0 [ 683.437311] free:181597 free_pcp:397 free_cma:0 [ 683.442644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.449471] Node 0 active_anon:744524kB inactive_anon:312kB active_file:9952kB inactive_file:14988kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:283784kB dirty:488kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 683.451870] Call Trace: [ 683.485084] Node 0 [ 683.494436] dump_stack+0x185/0x1d0 [ 683.522441] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 683.524998] warn_alloc+0x430/0x690 [ 683.527203] lowmem_reserve[]: [ 683.530823] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 683.556291] 0 [ 683.559923] ? kernel_poison_pages+0x40/0x360 [ 683.562993] 2817 [ 683.567905] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 683.569675] 7244 [ 683.574155] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 683.576186] 7244 [ 683.581634] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 683.588575] ? kmsan_set_origin_inline+0x6b/0x120 [ 683.590602] Node 0 [ 683.595604] ? __msan_poison_alloca+0x15c/0x1d0 [ 683.600434] DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 683.602657] kmsan_alloc_page+0x82/0xe0 [ 683.607290] lowmem_reserve[]: [ 683.635581] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 683.639505] 0 [ 683.642609] ? kmsan_set_origin_inline+0x6b/0x120 [ 683.647329] 0 [ 683.649127] ? __msan_poison_alloca+0x15c/0x1d0 [ 683.653932] 4426 [ 683.655725] ? __should_failslab+0x278/0x2a0 [ 683.660453] 4426 [ 683.662513] ? should_fail+0x57/0xab0 [ 683.668937] ? __should_failslab+0x278/0x2a0 [ 683.672712] Node 0 Normal free:238380kB min:41208kB low:51508kB high:61808kB active_anon:531172kB inactive_anon:312kB active_file:9828kB inactive_file:14988kB unevictable:0kB writepending:424kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3792kB bounce:0kB free_pcp:264kB local_pcp:148kB free_cma:0kB [ 683.677124] ? kmsan_set_origin_inline+0x6b/0x120 [ 683.677140] ? __msan_poison_alloca+0x15c/0x1d0 [ 683.706697] lowmem_reserve[]: [ 683.711534] ? kmsan_set_origin+0x9e/0x160 [ 683.716165] 0 [ 683.719266] alloc_pages_vma+0x1555/0x17f0 [ 683.724768] 0 [ 683.726564] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 683.730755] 0 [ 683.732553] handle_mm_fault+0x44ca/0x7ed0 [ 683.737613] 0 [ 683.739400] ? kmsan_set_origin_inline+0x6b/0x120 [ 683.745415] __do_page_fault+0xec6/0x1a10 [ 683.750214] Node 0 DMA: 0*4kB 0*8kB [ 683.754357] do_page_fault+0xb7/0x250 [ 683.754373] ? page_fault+0x8/0x30 [ 683.758058] 0*16kB [ 683.761839] page_fault+0x1e/0x30 [ 683.765344] 1*32kB [ 683.767563] RIP: 0033:0x43cee7 [ 683.770985] (U) [ 683.773205] RSP: 002b:0000000000a3e978 EFLAGS: 00010202 [ 683.776369] 2*64kB [ 683.783672] (U) [ 683.785883] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 706e692f7665642f [ 683.785885] 1*128kB (U) [ 683.787845] RDX: 0000000000000010 RSI: 0000000000730020 RDI: 0000000020000000 [ 683.795355] 1*256kB [ 683.798008] RBP: 0000000000000000 R08: 006563696d2f7475 R09: 0000000001b05940 [ 683.805682] (U) [ 683.807995] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a6ffb [ 683.815239] 0*512kB [ 683.817187] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 683.834023] 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 683.839829] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 5*2048kB (UM) 0*4096kB = 482344kB [ 683.857664] Node 0 Normal: 6980*4kB (UME) 4588*8kB (UME) 2364*16kB (UME) 1648*32kB (UM) 975*64kB (UM) 105*128kB (UM) 4*256kB (M) 5*512kB (M) 3*1024kB (M) 0*2048kB 0*4096kB = 237680kB 05:25:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) [ 683.874101] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 683.882656] 6319 total pagecache pages [ 683.886530] 0 pages in swap cache [ 683.889965] Swap cache stats: add 0, delete 0, find 0/0 [ 683.895311] Free swap = 0kB [ 683.898305] Total swap = 0kB [ 683.901304] 1965969 pages RAM [ 683.904388] 0 pages HighMem/MovableOnly [ 683.908336] 106316 pages reserved 05:25:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) msgsnd(0x0, &(0x7f0000000200), 0x8, 0x0) 05:25:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/148, 0x94, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) 05:25:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 683.987723] audit: type=1326 audit(1529731503.986:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7562 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 684.072510] audit: type=1326 audit(1529731504.047:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7547 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) [ 684.187710] audit: type=1326 audit(1529731504.186:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7576 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:25:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) 05:25:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={@dev, @remote}, &(0x7f0000000240)=0xc) 05:25:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) [ 684.410084] audit: type=1326 audit(1529731504.408:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7598 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) 05:25:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) io_setup(0x0, &(0x7f0000000040)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000280)=@mangle={'mangle\x00', 0x1f, 0x6, 0x470, 0x2e0, 0x0, 0x0, 0x2e0, 0xe8, 0x4a0, 0x4a0, 0x4a0, 0x4a0, 0x4a0, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x98, 0xc0}, @inet=@TOS={0x28, 'TOS\x00'}}, {{@ip={@multicast1=0xe0000001, @multicast1=0xe0000001, 0x0, 0x0, 'sit0\x00', 'irlan0\x00'}, 0x0, 0x98, 0xc0}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@rand_addr, @broadcast=0xffffffff, 0x0, 0x0, 'bond0\x00', 'bcsh0\x00'}, 0x0, 0x98, 0xd8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@loopback=0x7f000001}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4d0) 05:25:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:25:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a7}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 685.361879] kauditd_printk_skb: 2 callbacks suppressed [ 685.361900] audit: type=1326 audit(1529731505.360:1353): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7665 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 685.453941] audit: type=1326 audit(1529731505.397:1354): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7661 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 685.871587] audit: type=1326 audit(1529731505.870:1355): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7685 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000580)) 05:25:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 686.309414] audit: type=1326 audit(1529731506.308:1356): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7720 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 686.402450] audit: type=1326 audit(1529731506.401:1357): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7728 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x20000501a8}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) [ 686.862367] audit: type=1326 audit(1529731506.861:1358): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7751 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) [ 687.018194] audit: type=1326 audit(1529731507.016:1359): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7755 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:25:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000001900)='/dev/urandom\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/70, 0x46) 05:25:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 687.396967] audit: type=1326 audit(1529731507.395:1360): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7777 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00'}, &(0x7f0000000040)=0x24) 05:25:07 executing program 3: accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:07 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) [ 687.807060] audit: type=1326 audit(1529731507.805:1361): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7805 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:07 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:07 executing program 3: accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:07 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) [ 688.014863] audit: type=1326 audit(1529731508.013:1362): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7821 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:08 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:08 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:08 executing program 3: accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:08 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x500f4}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) clock_settime(0x0, &(0x7f00000000c0)) 05:25:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502a9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000700), 0x0) 05:25:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:08 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:08 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 05:25:08 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:08 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:08 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:09 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:09 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:09 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:09 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) close(0xffffffffffffffff) 05:25:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) close(0xffffffffffffffff) 05:25:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) close(0xffffffffffffffff) 05:25:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:10 executing program 7: lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:10 executing program 7: lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:11 executing program 2: modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000505aa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lseek(0xffffffffffffffff, 0x0, 0x0) [ 691.134934] kauditd_printk_skb: 1 callbacks suppressed [ 691.134959] audit: type=1326 audit(1529731511.133:1364): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8034 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:11 executing program 7: lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:11 executing program 2: modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:11 executing program 5: socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:11 executing program 2: modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') [ 691.458317] audit: type=1326 audit(1529731511.456:1365): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8061 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:12 executing program 5: socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5022a}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') [ 692.061823] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 692.072355] syz-executor6 cpuset=syz6 mems_allowed=0 [ 692.077463] CPU: 0 PID: 8088 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 692.084301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.093647] Call Trace: [ 692.096231] dump_stack+0x185/0x1d0 [ 692.099842] warn_alloc+0x430/0x690 [ 692.103462] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 692.108292] ? kernel_poison_pages+0x40/0x360 [ 692.112779] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 692.118212] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 692.123142] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 692.128072] kmsan_alloc_page+0x82/0xe0 [ 692.132031] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 692.136775] ? kmsan_set_origin_inline+0x6b/0x120 [ 692.141612] ? __msan_poison_alloca+0x15c/0x1d0 [ 692.146264] ? __should_failslab+0x278/0x2a0 [ 692.150661] ? should_fail+0x57/0xab0 [ 692.154442] ? __should_failslab+0x278/0x2a0 [ 692.158850] ? kmsan_set_origin_inline+0x6b/0x120 [ 692.163689] ? __msan_poison_alloca+0x15c/0x1d0 [ 692.168435] ? kmsan_set_origin+0x9e/0x160 [ 692.172666] alloc_pages_vma+0x1555/0x17f0 [ 692.176889] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 692.181993] handle_mm_fault+0x44ca/0x7ed0 [ 692.186217] ? kmsan_set_origin_inline+0x6b/0x120 [ 692.191054] __do_page_fault+0xec6/0x1a10 [ 692.195193] do_page_fault+0xb7/0x250 [ 692.198987] ? page_fault+0x8/0x30 [ 692.202514] page_fault+0x1e/0x30 [ 692.205947] RIP: 0033:0x4075fa [ 692.209121] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 692.214465] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 692.221719] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 692.228978] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 692.236234] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a927d [ 692.243486] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 692.250744] warn_alloc_show_mem: 1 callbacks suppressed [ 692.250746] Mem-Info: [ 692.258536] active_anon:185631 inactive_anon:78 isolated_anon:0 [ 692.258536] active_file:2616 inactive_file:3775 isolated_file:0 [ 692.258536] unevictable:0 dirty:138 writeback:0 unstable:0 [ 692.258536] slab_reclaimable:3322 slab_unreclaimable:9468 [ 692.258536] mapped:71112 shmem:84 pagetables:1453 bounce:0 [ 692.258536] free:176372 free_pcp:440 free_cma:0 [ 692.291793] Node 0 active_anon:742524kB inactive_anon:312kB active_file:10464kB inactive_file:15100kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:284448kB dirty:552kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 692.319887] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 692.346100] lowmem_reserve[]: 0 2817 7244 7244 [ 692.350683] Node 0 DMA32 free:474152kB min:26224kB low:32780kB high:39336kB active_anon:213308kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 692.379577] lowmem_reserve[]: 0 0 4426 4426 [ 692.383892] Node 0 Normal free:215432kB min:41208kB low:51508kB high:61808kB active_anon:529216kB inactive_anon:312kB active_file:10340kB inactive_file:15100kB unevictable:0kB writepending:488kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3620kB bounce:0kB free_pcp:436kB local_pcp:132kB free_cma:0kB [ 692.413571] lowmem_reserve[]: 0 0 0 0 [ 692.417367] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 692.430582] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 1*2048kB (U) 0*4096kB = 474152kB [ 692.448312] Node 0 Normal: 6802*4kB (ME) 4586*8kB (UME) 1913*16kB (ME) 1403*32kB (UM) 916*64kB (UM) 94*128kB (UM) 1*256kB (U) 2*512kB (U) 0*1024kB 2*2048kB (UM) 0*4096kB = 215432kB [ 692.464572] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 692.473140] 6475 total pagecache pages [ 692.477007] 0 pages in swap cache [ 692.480441] Swap cache stats: add 0, delete 0, find 0/0 [ 692.485786] Free swap = 0kB [ 692.488783] Total swap = 0kB [ 692.491784] 1965969 pages RAM [ 692.494867] 0 pages HighMem/MovableOnly [ 692.498817] 106316 pages reserved 05:25:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') [ 692.567148] audit: type=1326 audit(1529731512.565:1366): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8081 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:12 executing program 5: socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 692.650735] audit: type=1326 audit(1529731512.587:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8091 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 692.670559] audit: type=1326 audit(1529731512.590:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8095 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') [ 692.713797] audit: type=1326 audit(1529731512.712:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8107 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:12 executing program 6: lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:12 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) [ 692.812406] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 692.822999] syz-executor2 cpuset=syz2 mems_allowed=0 [ 692.828138] CPU: 1 PID: 8112 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 692.834894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.844252] Call Trace: [ 692.846852] dump_stack+0x185/0x1d0 [ 692.850488] warn_alloc+0x430/0x690 [ 692.854131] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 692.858979] ? kernel_poison_pages+0x40/0x360 [ 692.863494] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 692.868958] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 692.873922] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 692.878885] kmsan_alloc_page+0x82/0xe0 [ 692.882873] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 692.887639] ? kmsan_set_origin_inline+0x6b/0x120 [ 692.892489] ? __msan_poison_alloca+0x15c/0x1d0 [ 692.897166] ? __should_failslab+0x278/0x2a0 [ 692.901586] ? should_fail+0x57/0xab0 [ 692.905407] ? __should_failslab+0x278/0x2a0 [ 692.909829] ? kmsan_set_origin_inline+0x6b/0x120 [ 692.914681] ? __msan_poison_alloca+0x15c/0x1d0 [ 692.919371] ? kmsan_set_origin+0x9e/0x160 [ 692.923623] alloc_pages_vma+0x1555/0x17f0 [ 692.927880] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 692.932996] handle_mm_fault+0x44ca/0x7ed0 [ 692.937222] ? kmsan_set_origin_inline+0x6b/0x120 [ 692.942060] __do_page_fault+0xec6/0x1a10 [ 692.946195] do_page_fault+0xb7/0x250 [ 692.949982] ? page_fault+0x8/0x30 [ 692.953507] page_fault+0x1e/0x30 [ 692.956941] RIP: 0033:0x4075fa [ 692.960114] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 692.965460] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 692.972735] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 692.979989] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 692.987241] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a9567 [ 692.994498] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 693.034419] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 693.044956] syz-executor5 cpuset=syz5 mems_allowed=0 [ 693.050082] CPU: 0 PID: 8119 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 693.056837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.066197] Call Trace: [ 693.068791] dump_stack+0x185/0x1d0 [ 693.072427] warn_alloc+0x430/0x690 [ 693.076072] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 693.080920] ? kernel_poison_pages+0x40/0x360 [ 693.085429] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 693.090895] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 693.095848] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 693.100801] ? kmsan_set_origin_inline+0x6b/0x120 [ 693.105654] ? __msan_poison_alloca+0x15c/0x1d0 [ 693.110337] kmsan_alloc_page+0x82/0xe0 [ 693.114320] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 693.119082] ? kmsan_set_origin_inline+0x6b/0x120 [ 693.123929] ? __msan_poison_alloca+0x15c/0x1d0 [ 693.128599] ? __should_failslab+0x278/0x2a0 05:25:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000100)=0x6e) sched_getattr(0x0, &(0x7f0000000000), 0x30, 0x0) 05:25:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') [ 693.133016] ? should_fail+0x57/0xab0 [ 693.136818] ? __should_failslab+0x278/0x2a0 [ 693.141234] ? kmsan_set_origin_inline+0x6b/0x120 [ 693.146080] ? __msan_poison_alloca+0x15c/0x1d0 [ 693.150758] ? kmsan_set_origin+0x9e/0x160 [ 693.155009] alloc_pages_vma+0x1555/0x17f0 [ 693.159278] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 693.164400] handle_mm_fault+0x44ca/0x7ed0 [ 693.168662] ? kmsan_set_origin_inline+0x6b/0x120 [ 693.173523] __do_page_fault+0xec6/0x1a10 [ 693.177687] do_page_fault+0xb7/0x250 [ 693.181493] ? page_fault+0x8/0x30 [ 693.185039] page_fault+0x1e/0x30 [ 693.188499] RIP: 0033:0x4075fa [ 693.191684] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 693.197055] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 693.204325] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 693.211597] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 693.218873] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a9646 [ 693.226167] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 693.238493] audit: type=1326 audit(1529731513.237:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8128 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:13 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:13 executing program 6: lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) [ 693.452611] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 693.463150] syz-executor7 cpuset=syz7 mems_allowed=0 [ 693.468284] CPU: 1 PID: 8138 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 693.475060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.484421] Call Trace: [ 693.487023] dump_stack+0x185/0x1d0 [ 693.490669] warn_alloc+0x430/0x690 [ 693.494320] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 693.499162] ? kernel_poison_pages+0x40/0x360 [ 693.503660] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 693.509106] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 693.514057] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 693.518998] ? kmsan_set_origin_inline+0x6b/0x120 [ 693.523834] ? __msan_poison_alloca+0x15c/0x1d0 [ 693.528492] kmsan_alloc_page+0x82/0xe0 [ 693.532455] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 693.537196] ? kmsan_set_origin_inline+0x6b/0x120 [ 693.542022] ? __msan_poison_alloca+0x15c/0x1d0 [ 693.546681] ? __should_failslab+0x278/0x2a0 [ 693.551079] ? should_fail+0x57/0xab0 [ 693.555037] ? __should_failslab+0x278/0x2a0 [ 693.560595] ? kmsan_set_origin_inline+0x6b/0x120 [ 693.565426] ? __msan_poison_alloca+0x15c/0x1d0 [ 693.570087] ? kmsan_set_origin+0x9e/0x160 [ 693.574315] alloc_pages_vma+0x1555/0x17f0 [ 693.578546] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 693.583657] handle_mm_fault+0x44ca/0x7ed0 [ 693.587884] ? kmsan_set_origin_inline+0x6b/0x120 [ 693.592735] __do_page_fault+0xec6/0x1a10 [ 693.596874] do_page_fault+0xb7/0x250 [ 693.600664] ? page_fault+0x8/0x30 [ 693.604188] page_fault+0x1e/0x30 [ 693.607624] RIP: 0033:0x4075fa [ 693.610796] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 693.616145] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 693.623403] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 693.630657] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 693.637917] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a97ec [ 693.645172] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 693.652437] warn_alloc_show_mem: 2 callbacks suppressed [ 693.652440] Mem-Info: [ 693.660191] active_anon:186712 inactive_anon:78 isolated_anon:0 [ 693.660191] active_file:2536 inactive_file:3764 isolated_file:0 [ 693.660191] unevictable:0 dirty:17 writeback:0 unstable:0 [ 693.660191] slab_reclaimable:3322 slab_unreclaimable:9468 [ 693.660191] mapped:70986 shmem:84 pagetables:1392 bounce:0 [ 693.660191] free:174352 free_pcp:440 free_cma:0 [ 693.693355] Node 0 active_anon:746848kB inactive_anon:312kB active_file:10144kB inactive_file:15056kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:283944kB dirty:68kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 307200kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 693.721364] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 693.747596] lowmem_reserve[]: 0 2817 7244 7244 [ 693.752610] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:36kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 693.781506] lowmem_reserve[]: 0 0 4426 4426 [ 693.785824] Node 0 Normal free:209400kB min:41208kB low:51508kB high:61808kB active_anon:531332kB inactive_anon:312kB active_file:10020kB inactive_file:15180kB unevictable:0kB writepending:32kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3376kB bounce:0kB free_pcp:436kB local_pcp:160kB free_cma:0kB [ 693.815412] lowmem_reserve[]: 0 0 0 0 [ 693.819211] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 693.832421] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 693.849821] Node 0 Normal: 6864*4kB (ME) 4573*8kB (UME) 1910*16kB (ME) 1403*32kB (UM) 910*64kB (UM) 89*128kB (M) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 209128kB [ 693.864862] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 693.873421] 6386 total pagecache pages [ 693.877289] 0 pages in swap cache [ 693.880724] Swap cache stats: add 0, delete 0, find 0/0 [ 693.886067] Free swap = 0kB [ 693.889065] Total swap = 0kB [ 693.892064] 1965969 pages RAM [ 693.895147] 0 pages HighMem/MovableOnly [ 693.899098] 106316 pages reserved [ 693.904914] audit: type=1326 audit(1529731513.903:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8143 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) 05:25:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:14 executing program 6: lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:14 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000240)}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) [ 694.141275] audit: type=1326 audit(1529731514.139:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8156 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000000c0)) setfsgid(0x0) 05:25:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) [ 694.257566] audit: type=1326 audit(1529731514.245:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8168 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') [ 694.451787] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 694.462350] syz-executor7 cpuset=syz7 mems_allowed=0 [ 694.467473] CPU: 0 PID: 8164 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 694.474221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.483577] Call Trace: [ 694.486173] dump_stack+0x185/0x1d0 [ 694.489830] warn_alloc+0x430/0x690 [ 694.493472] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 694.498322] ? kernel_poison_pages+0x40/0x360 [ 694.502824] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 694.508278] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 694.514100] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 694.519062] kmsan_alloc_page+0x82/0xe0 [ 694.523045] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 694.527810] ? kmsan_set_origin_inline+0x6b/0x120 [ 694.532658] ? __msan_poison_alloca+0x15c/0x1d0 [ 694.537334] ? __should_failslab+0x278/0x2a0 [ 694.541759] ? should_fail+0x57/0xab0 [ 694.545565] ? __should_failslab+0x278/0x2a0 [ 694.549983] ? kmsan_set_origin_inline+0x6b/0x120 [ 694.554835] ? __msan_poison_alloca+0x15c/0x1d0 [ 694.559517] ? kmsan_set_origin+0x9e/0x160 [ 694.563792] alloc_pages_vma+0x1555/0x17f0 [ 694.568041] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 694.573159] handle_mm_fault+0x44ca/0x7ed0 [ 694.577403] ? kmsan_set_origin_inline+0x6b/0x120 [ 694.582263] __do_page_fault+0xec6/0x1a10 [ 694.586422] do_page_fault+0xb7/0x250 [ 694.590228] ? page_fault+0x8/0x30 [ 694.593771] page_fault+0x1e/0x30 [ 694.597222] RIP: 0033:0x4075fa 05:25:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) 05:25:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000000c0)) setfsgid(0x0) 05:25:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) [ 694.600409] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 694.605769] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 694.613044] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 694.620317] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 694.627590] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a9bd3 [ 694.634866] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:25:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000000c0)) setfsgid(0x0) [ 695.039651] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 695.051059] syz-executor7 cpuset=syz7 mems_allowed=0 [ 695.056187] CPU: 1 PID: 8203 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 695.062922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.072265] Call Trace: [ 695.074850] dump_stack+0x185/0x1d0 [ 695.078466] warn_alloc+0x430/0x690 [ 695.082088] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 695.086932] ? kernel_poison_pages+0x40/0x360 [ 695.091419] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 695.096853] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 695.101831] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 695.106769] kmsan_alloc_page+0x82/0xe0 [ 695.110745] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 695.115487] ? kmsan_set_origin_inline+0x6b/0x120 [ 695.120330] ? __msan_poison_alloca+0x15c/0x1d0 [ 695.124992] ? __should_failslab+0x278/0x2a0 [ 695.129394] ? should_fail+0x57/0xab0 [ 695.133178] ? __should_failslab+0x278/0x2a0 [ 695.137577] ? kmsan_set_origin_inline+0x6b/0x120 [ 695.142421] ? __msan_poison_alloca+0x15c/0x1d0 [ 695.147084] ? kmsan_set_origin+0x9e/0x160 [ 695.151318] alloc_pages_vma+0x1555/0x17f0 [ 695.155549] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 695.160647] handle_mm_fault+0x44ca/0x7ed0 [ 695.164873] ? kmsan_set_origin_inline+0x6b/0x120 [ 695.169716] __do_page_fault+0xec6/0x1a10 [ 695.173871] do_page_fault+0xb7/0x250 [ 695.177658] ? page_fault+0x8/0x30 [ 695.181194] page_fault+0x1e/0x30 [ 695.184632] RIP: 0033:0x4075fa [ 695.187805] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 695.193152] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 695.200409] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 695.207661] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 695.214917] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000a9e1f [ 695.222264] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 695.229528] warn_alloc_show_mem: 1 callbacks suppressed [ 695.229530] Mem-Info: [ 695.237303] active_anon:186141 inactive_anon:78 isolated_anon:0 [ 695.237303] active_file:2549 inactive_file:2780 isolated_file:0 [ 695.237303] unevictable:0 dirty:39 writeback:0 unstable:0 [ 695.237303] slab_reclaimable:3322 slab_unreclaimable:9465 [ 695.237303] mapped:70056 shmem:84 pagetables:1410 bounce:0 [ 695.237303] free:174822 free_pcp:363 free_cma:0 [ 695.270663] Node 0 active_anon:744564kB inactive_anon:312kB active_file:10196kB inactive_file:11120kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:280224kB dirty:156kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 695.298762] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 695.325858] lowmem_reserve[]: 0 2817 7244 7244 [ 695.330873] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 695.359777] lowmem_reserve[]: 0 0 4426 4426 [ 695.364094] Node 0 Normal free:211280kB min:41208kB low:51508kB high:61808kB active_anon:529060kB inactive_anon:312kB active_file:10072kB inactive_file:11120kB unevictable:0kB writepending:92kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3448kB bounce:0kB free_pcp:128kB local_pcp:76kB free_cma:0kB [ 695.393594] lowmem_reserve[]: 0 0 0 0 [ 695.397389] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 695.410606] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 695.428008] Node 0 Normal: 7756*4kB (UME) 4614*8kB (UME) 1889*16kB (UME) 1371*32kB (UM) 897*64kB (UM) 92*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 211216kB [ 695.443370] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 695.451929] 5413 total pagecache pages [ 695.455812] 0 pages in swap cache [ 695.459255] Swap cache stats: add 0, delete 0, find 0/0 [ 695.464597] Free swap = 0kB [ 695.467595] Total swap = 0kB [ 695.470602] 1965969 pages RAM [ 695.473686] 0 pages HighMem/MovableOnly [ 695.477637] 106316 pages reserved 05:25:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000180)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 05:25:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x501df}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={@rand_addr, @multicast1}, &(0x7f0000000140)=0x8) 05:25:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x501df}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x20000501a8}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) 05:25:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') [ 695.779817] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 695.790377] syz-executor2 cpuset=syz2 mems_allowed=0 [ 695.795524] CPU: 1 PID: 8238 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 695.802279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.811641] Call Trace: [ 695.814262] dump_stack+0x185/0x1d0 [ 695.817915] warn_alloc+0x430/0x690 [ 695.821554] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 695.826399] ? kernel_poison_pages+0x40/0x360 [ 695.830920] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 695.836391] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 695.841368] kmsan_alloc_page+0x82/0xe0 [ 695.845345] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 695.850114] ? kmsan_set_origin_inline+0x6b/0x120 [ 695.854962] ? __msan_poison_alloca+0x15c/0x1d0 [ 695.859641] ? __should_failslab+0x278/0x2a0 [ 695.864072] ? should_fail+0x57/0xab0 [ 695.867874] ? __should_failslab+0x278/0x2a0 [ 695.872284] ? kmsan_set_origin_inline+0x6b/0x120 [ 695.877134] ? __msan_poison_alloca+0x15c/0x1d0 [ 695.881812] ? kmsan_set_origin+0x9e/0x160 [ 695.886060] alloc_pages_vma+0x1555/0x17f0 [ 695.890300] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 695.895415] handle_mm_fault+0x44ca/0x7ed0 [ 695.899652] ? kmsan_set_origin_inline+0x6b/0x120 [ 695.904506] __do_page_fault+0xec6/0x1a10 [ 695.908662] do_page_fault+0xb7/0x250 [ 695.912465] ? page_fault+0x8/0x30 [ 695.916010] page_fault+0x1e/0x30 [ 695.919465] RIP: 0033:0x4075fa [ 695.922647] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 05:25:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) mq_open(&(0x7f0000000100)='[,\x00', 0x0, 0x0, &(0x7f0000000140)) 05:25:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) [ 695.928005] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 695.935277] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 695.942549] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 695.949822] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aa103 [ 695.957095] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:25:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) [ 696.172657] kauditd_printk_skb: 3 callbacks suppressed [ 696.172680] audit: type=1326 audit(1529731516.171:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8238 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a0}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 05:25:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050184}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) 05:25:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) [ 696.514510] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 696.525051] syz-executor6 cpuset=syz6 mems_allowed=0 [ 696.530156] CPU: 1 PID: 8275 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 696.536926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.546335] Call Trace: [ 696.548917] dump_stack+0x185/0x1d0 [ 696.552531] warn_alloc+0x430/0x690 [ 696.556156] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 696.560992] ? kernel_poison_pages+0x40/0x360 [ 696.565477] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 696.570913] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 696.575840] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 696.580780] kmsan_alloc_page+0x82/0xe0 [ 696.584740] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 696.589480] ? kmsan_set_origin_inline+0x6b/0x120 [ 696.594319] ? __msan_poison_alloca+0x15c/0x1d0 [ 696.598975] ? kmem_cache_alloc+0x997/0xb70 [ 696.603300] ? ___slab_alloc+0xc1/0x1f50 [ 696.607346] ? kmsan_set_origin_inline+0x6b/0x120 [ 696.612170] ? __msan_poison_alloca+0x15c/0x1d0 [ 696.616826] ? kmsan_set_origin+0x9e/0x160 [ 696.621058] alloc_pages_vma+0x1555/0x17f0 [ 696.625286] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 696.630394] handle_mm_fault+0x44ca/0x7ed0 [ 696.634615] ? kmsan_set_origin_inline+0x6b/0x120 [ 696.639463] __do_page_fault+0xec6/0x1a10 [ 696.643601] do_page_fault+0xb7/0x250 [ 696.647387] ? page_fault+0x8/0x30 [ 696.650926] page_fault+0x1e/0x30 [ 696.654373] RIP: 0033:0x4075fa [ 696.657548] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 696.662895] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 696.670147] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 696.677403] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 696.684654] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aa3e2 [ 696.691908] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 696.699167] warn_alloc_show_mem: 1 callbacks suppressed [ 696.699169] Mem-Info: [ 696.707014] active_anon:186677 inactive_anon:78 isolated_anon:0 [ 696.707014] active_file:2549 inactive_file:2789 isolated_file:0 [ 696.707014] unevictable:0 dirty:48 writeback:0 unstable:0 [ 696.707014] slab_reclaimable:3322 slab_unreclaimable:9467 [ 696.707014] mapped:70166 shmem:84 pagetables:1452 bounce:0 [ 696.707014] free:173558 free_pcp:386 free_cma:0 [ 696.740184] Node 0 active_anon:746708kB inactive_anon:312kB active_file:10196kB inactive_file:11156kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:280664kB dirty:192kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 303104kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 696.768281] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 696.802120] lowmem_reserve[]: 0 2817 7244 7244 [ 696.806698] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:668kB free_cma:0kB [ 696.835590] lowmem_reserve[]: 0 0 4426 4426 [ 696.839906] Node 0 Normal free:206224kB min:41208kB low:51508kB high:61808kB active_anon:531264kB inactive_anon:312kB active_file:10072kB inactive_file:11156kB unevictable:0kB writepending:128kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3616kB bounce:0kB free_pcp:220kB local_pcp:112kB free_cma:0kB [ 696.869593] lowmem_reserve[]: 0 0 0 0 [ 696.873388] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 696.886606] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 696.904012] Node 0 Normal: 7702*4kB (ME) 4513*8kB (UME) 1827*16kB (UME) 1336*32kB (UM) 874*64kB (UM) 89*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 206224kB [ 696.919234] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 696.927803] 5422 total pagecache pages [ 696.931671] 0 pages in swap cache [ 696.935109] Swap cache stats: add 0, delete 0, find 0/0 [ 696.940462] Free swap = 0kB [ 696.943462] Total swap = 0kB [ 696.946474] 1965969 pages RAM [ 696.949561] 0 pages HighMem/MovableOnly [ 696.953525] 106316 pages reserved 05:25:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) [ 697.061844] audit: type=1326 audit(1529731517.059:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8283 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a0}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 05:25:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) 05:25:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) [ 697.197408] audit: type=1326 audit(1529731517.195:1379): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8292 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) [ 697.272942] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 697.283476] syz-executor1 cpuset=syz1 mems_allowed=0 [ 697.288593] CPU: 0 PID: 8301 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 697.295345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.304722] Call Trace: [ 697.307317] dump_stack+0x185/0x1d0 [ 697.310950] warn_alloc+0x430/0x690 [ 697.314588] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 697.319429] ? kernel_poison_pages+0x40/0x360 [ 697.323931] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 697.329385] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 697.334346] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 697.339303] kmsan_alloc_page+0x82/0xe0 [ 697.343278] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 697.348033] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.352875] ? __msan_poison_alloca+0x15c/0x1d0 [ 697.357546] ? __should_failslab+0x278/0x2a0 [ 697.361958] ? should_fail+0x57/0xab0 [ 697.365755] ? __should_failslab+0x278/0x2a0 [ 697.370161] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.375001] ? __msan_poison_alloca+0x15c/0x1d0 [ 697.379676] ? kmsan_set_origin+0x9e/0x160 [ 697.383919] alloc_pages_vma+0x1555/0x17f0 [ 697.388164] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 697.393302] handle_mm_fault+0x44ca/0x7ed0 [ 697.397543] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.402400] __do_page_fault+0xec6/0x1a10 [ 697.406559] do_page_fault+0xb7/0x250 [ 697.410358] ? page_fault+0x8/0x30 [ 697.413896] page_fault+0x1e/0x30 [ 697.417340] RIP: 0033:0x4075fa 05:25:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) [ 697.420523] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 697.425885] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 697.433154] RDX: 436b352fe2a91e1c RSI: 0000000000000000 RDI: 0000000000d5c848 [ 697.440426] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 697.447697] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aa6d8 [ 697.454965] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:25:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) [ 697.468231] audit: type=1326 audit(1529731517.462:1380): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8295 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 697.537573] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 697.548102] syz-executor0 cpuset=syz0 mems_allowed=0 [ 697.553226] CPU: 0 PID: 8310 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 697.554482] audit: type=1326 audit(1529731517.487:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8303 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 697.559976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.559980] Call Trace: [ 697.560000] dump_stack+0x185/0x1d0 [ 697.560016] warn_alloc+0x430/0x690 [ 697.560040] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 697.560053] ? kernel_poison_pages+0x40/0x360 [ 697.560071] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 697.560102] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 697.560133] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.623284] ? __msan_poison_alloca+0x15c/0x1d0 [ 697.629099] kmsan_alloc_page+0x82/0xe0 [ 697.633100] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 697.637868] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.642716] ? __msan_poison_alloca+0x15c/0x1d0 [ 697.647404] ? __should_failslab+0x278/0x2a0 [ 697.651819] ? should_fail+0x57/0xab0 [ 697.655626] ? __should_failslab+0x278/0x2a0 [ 697.664568] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.669419] ? __msan_poison_alloca+0x15c/0x1d0 [ 697.674098] ? kmsan_set_origin+0x9e/0x160 [ 697.678350] alloc_pages_vma+0x1555/0x17f0 [ 697.682629] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 697.687757] handle_mm_fault+0x44ca/0x7ed0 [ 697.691989] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.696844] __do_page_fault+0xec6/0x1a10 [ 697.701002] do_page_fault+0xb7/0x250 [ 697.704804] ? page_fault+0x8/0x30 [ 697.708342] page_fault+0x1e/0x30 [ 697.711786] RIP: 0033:0x4075fa [ 697.714964] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 697.720320] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 697.727599] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 05:25:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a0}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) [ 697.734899] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 697.742169] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aa7e1 [ 697.749530] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 697.781965] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 697.792496] syz-executor3 cpuset=syz3 mems_allowed=0 [ 697.797621] CPU: 0 PID: 8313 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 697.804467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.813822] Call Trace: [ 697.816415] dump_stack+0x185/0x1d0 [ 697.820051] warn_alloc+0x430/0x690 [ 697.823725] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 697.828577] ? kernel_poison_pages+0x40/0x360 [ 697.833073] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 697.838520] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 697.843467] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 697.848411] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.853255] ? __msan_poison_alloca+0x15c/0x1d0 [ 697.857927] kmsan_alloc_page+0x82/0xe0 [ 697.861904] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 697.866658] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.871496] ? __msan_poison_alloca+0x15c/0x1d0 [ 697.876161] ? __should_failslab+0x278/0x2a0 [ 697.880573] ? should_fail+0x57/0xab0 [ 697.884367] ? __should_failslab+0x278/0x2a0 [ 697.888772] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.893613] ? __msan_poison_alloca+0x15c/0x1d0 [ 697.898297] ? kmsan_set_origin+0x9e/0x160 [ 697.902547] alloc_pages_vma+0x1555/0x17f0 [ 697.906788] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 697.911897] handle_mm_fault+0x44ca/0x7ed0 [ 697.916130] ? kmsan_set_origin_inline+0x6b/0x120 [ 697.920982] __do_page_fault+0xec6/0x1a10 [ 697.925139] do_page_fault+0xb7/0x250 [ 697.928939] ? page_fault+0x8/0x30 [ 697.932477] page_fault+0x1e/0x30 [ 697.935926] RIP: 0033:0x4075fa [ 697.939109] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 697.944468] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 697.955910] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 697.963186] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 697.970459] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aa8d5 [ 697.977730] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 697.985012] warn_alloc_show_mem: 2 callbacks suppressed [ 697.985015] Mem-Info: [ 697.992791] active_anon:186764 inactive_anon:76 isolated_anon:0 [ 697.992791] active_file:2549 inactive_file:2557 isolated_file:0 [ 697.992791] unevictable:0 dirty:52 writeback:0 unstable:0 [ 697.992791] slab_reclaimable:3322 slab_unreclaimable:9467 [ 697.992791] mapped:69933 shmem:84 pagetables:1463 bounce:0 [ 697.992791] free:173002 free_pcp:553 free_cma:0 [ 698.025998] Node 0 active_anon:747056kB inactive_anon:304kB active_file:10196kB inactive_file:10228kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:279732kB dirty:208kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 311296kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 698.054111] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 698.080250] lowmem_reserve[]: 0 2817 7244 7244 [ 698.084850] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 698.113760] lowmem_reserve[]: 0 0 4426 4426 [ 698.118097] Node 0 Normal free:204000kB min:41208kB low:51508kB high:61808kB active_anon:531476kB inactive_anon:304kB active_file:10072kB inactive_file:10148kB unevictable:0kB writepending:144kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:3660kB bounce:0kB free_pcp:764kB local_pcp:160kB free_cma:0kB [ 698.147795] lowmem_reserve[]: 0 0 0 0 [ 698.151607] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 698.164847] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 478248kB [ 698.182703] Node 0 Normal: 7856*4kB (UME) 4503*8kB (UME) 1807*16kB (UME) 1314*32kB (UM) 869*64kB (UM) 84*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 204776kB [ 698.198039] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 698.206638] 5136 total pagecache pages [ 698.210519] 0 pages in swap cache [ 698.213986] Swap cache stats: add 0, delete 0, find 0/0 [ 698.219349] Free swap = 0kB [ 698.222360] Total swap = 0kB [ 698.225368] 1965969 pages RAM [ 698.228460] 0 pages HighMem/MovableOnly 05:25:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) close(0xffffffffffffffff) [ 698.232422] 106316 pages reserved 05:25:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6}]}) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/242, 0xf2) mq_unlink(&(0x7f0000000040)='mime_typeem1ppp1eth1eth1selinuxsecurityGPL}bdevkeyring/ppp1\'wlan0user\x00') 05:25:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) [ 698.261568] audit: type=1326 audit(1529731518.260:1382): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8318 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) [ 698.363131] audit: type=1326 audit(1529731518.360:1383): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8322 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 698.446266] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 698.456800] syz-executor0 cpuset=syz0 mems_allowed=0 [ 698.461937] CPU: 1 PID: 8331 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 698.468696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.478058] Call Trace: [ 698.480657] dump_stack+0x185/0x1d0 [ 698.484296] warn_alloc+0x430/0x690 [ 698.487940] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 698.492788] ? kernel_poison_pages+0x40/0x360 [ 698.497294] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 698.502751] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 698.507707] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 698.512655] ? kmsan_set_origin_inline+0x6b/0x120 [ 698.517503] ? __msan_poison_alloca+0x15c/0x1d0 [ 698.522186] kmsan_alloc_page+0x82/0xe0 [ 698.526173] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 698.530932] ? kmsan_set_origin_inline+0x6b/0x120 [ 698.535784] ? __msan_poison_alloca+0x15c/0x1d0 [ 698.540443] ? __should_failslab+0x278/0x2a0 [ 698.544857] ? should_fail+0x57/0xab0 [ 698.548651] ? __should_failslab+0x278/0x2a0 [ 698.553069] ? kmsan_set_origin_inline+0x6b/0x120 [ 698.557901] ? __msan_poison_alloca+0x15c/0x1d0 [ 698.562565] ? kmsan_set_origin+0x9e/0x160 [ 698.566792] alloc_pages_vma+0x1555/0x17f0 [ 698.571017] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 698.576114] handle_mm_fault+0x44ca/0x7ed0 [ 698.580332] ? kmsan_set_origin_inline+0x6b/0x120 [ 698.585168] __do_page_fault+0xec6/0x1a10 [ 698.589309] do_page_fault+0xb7/0x250 [ 698.593106] ? page_fault+0x8/0x30 05:25:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x1000000000000006, 0x0, 0x0, 0x502a0}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) [ 698.596642] page_fault+0x1e/0x30 [ 698.600081] RIP: 0033:0x4075fa [ 698.603254] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 698.608600] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 698.615863] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 698.623129] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 698.630382] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aab6e [ 698.637634] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:25:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) [ 698.667049] audit: type=1326 audit(1529731518.386:1384): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8324 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 698.689985] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 698.700501] syz-executor3 cpuset=syz3 mems_allowed=0 [ 698.705621] CPU: 0 PID: 8336 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 698.712365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.721702] Call Trace: [ 698.724299] dump_stack+0x185/0x1d0 [ 698.728652] warn_alloc+0x430/0x690 [ 698.732277] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 698.737103] ? kernel_poison_pages+0x40/0x360 [ 698.741587] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 698.747022] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 698.751948] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 698.756881] ? kmsan_set_origin_inline+0x6b/0x120 [ 698.761717] ? __msan_poison_alloca+0x15c/0x1d0 [ 698.766375] kmsan_alloc_page+0x82/0xe0 [ 698.770338] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 698.775080] ? kmsan_set_origin_inline+0x6b/0x120 [ 698.779909] ? __msan_poison_alloca+0x15c/0x1d0 [ 698.784562] ? __should_failslab+0x278/0x2a0 [ 698.788959] ? should_fail+0x57/0xab0 [ 698.792747] ? __should_failslab+0x278/0x2a0 [ 698.797138] ? kmsan_set_origin_inline+0x6b/0x120 [ 698.801965] ? __msan_poison_alloca+0x15c/0x1d0 [ 698.806628] ? kmsan_set_origin+0x9e/0x160 [ 698.810865] alloc_pages_vma+0x1555/0x17f0 [ 698.815090] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 698.820192] handle_mm_fault+0x44ca/0x7ed0 [ 698.824411] ? kmsan_set_origin_inline+0x6b/0x120 [ 698.829247] __do_page_fault+0xec6/0x1a10 [ 698.833386] do_page_fault+0xb7/0x250 [ 698.837170] ? page_fault+0x8/0x30 [ 698.840692] page_fault+0x1e/0x30 [ 698.844127] RIP: 0033:0x4075fa [ 698.847309] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 698.852678] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 698.859933] RDX: 40ee7a3e45d016d8 RSI: 0000000000000000 RDI: 0000000001f7c848 [ 698.867204] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 698.874459] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aac61 [ 698.881712] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 698.921783] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 698.932352] syz-executor6 cpuset=syz6 mems_allowed=0 [ 698.937485] CPU: 0 PID: 8339 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 698.944240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.953602] Call Trace: [ 698.956207] dump_stack+0x185/0x1d0 [ 698.959848] warn_alloc+0x430/0x690 [ 698.963513] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 698.968379] ? kernel_poison_pages+0x40/0x360 [ 698.972888] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 698.978378] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 698.983339] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 698.988290] ? kmsan_set_origin_inline+0x6b/0x120 [ 698.993143] ? __msan_poison_alloca+0x15c/0x1d0 [ 698.997825] kmsan_alloc_page+0x82/0xe0 [ 699.001805] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 699.006576] ? kmsan_set_origin_inline+0x6b/0x120 [ 699.011424] ? __msan_poison_alloca+0x15c/0x1d0 [ 699.016090] ? __should_failslab+0x278/0x2a0 [ 699.020593] ? should_fail+0x57/0xab0 [ 699.024392] ? __should_failslab+0x278/0x2a0 [ 699.028807] ? kmsan_set_origin_inline+0x6b/0x120 [ 699.033652] ? __msan_poison_alloca+0x15c/0x1d0 [ 699.038328] ? kmsan_set_origin+0x9e/0x160 [ 699.042580] alloc_pages_vma+0x1555/0x17f0 [ 699.046826] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 699.051943] handle_mm_fault+0x44ca/0x7ed0 [ 699.056186] ? kmsan_set_origin_inline+0x6b/0x120 [ 699.061051] __do_page_fault+0xec6/0x1a10 [ 699.065213] do_page_fault+0xb7/0x250 [ 699.069018] ? page_fault+0x8/0x30 [ 699.072567] page_fault+0x1e/0x30 [ 699.076022] RIP: 0033:0x4075fa [ 699.079206] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 699.084570] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 699.091842] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 699.099118] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 699.106391] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aad49 [ 699.113668] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 699.120945] warn_alloc_show_mem: 2 callbacks suppressed [ 699.120948] Mem-Info: [ 699.128727] active_anon:186704 inactive_anon:76 isolated_anon:0 [ 699.128727] active_file:2502 inactive_file:2285 isolated_file:0 [ 699.128727] unevictable:0 dirty:69 writeback:0 unstable:0 [ 699.128727] slab_reclaimable:3322 slab_unreclaimable:9468 [ 699.128727] mapped:69512 shmem:84 pagetables:1455 bounce:0 [ 699.128727] free:173033 free_pcp:563 free_cma:0 [ 699.161944] Node 0 active_anon:746816kB inactive_anon:304kB active_file:10008kB inactive_file:9024kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:277932kB dirty:276kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 311296kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 699.189972] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 699.216111] lowmem_reserve[]: 0 2817 7244 7244 [ 699.220710] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:215356kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 699.249721] lowmem_reserve[]: 0 0 4426 4426 [ 699.254058] Node 0 Normal free:204124kB min:41208kB low:51508kB high:61808kB active_anon:531460kB inactive_anon:304kB active_file:10000kB inactive_file:8828kB unevictable:0kB writepending:212kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8320kB pagetables:3628kB bounce:0kB free_pcp:888kB local_pcp:240kB free_cma:0kB [ 699.283652] lowmem_reserve[]: 0 0 0 0 [ 699.287443] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 699.300649] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 699.318025] Node 0 Normal: 8099*4kB (ME) 4476*8kB (UME) 1791*16kB (UME) 1304*32kB (UM) 854*64kB (UM) 84*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 203996kB [ 699.333239] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 699.341796] 4787 total pagecache pages [ 699.345665] 0 pages in swap cache [ 699.349095] Swap cache stats: add 0, delete 0, find 0/0 [ 699.354435] Free swap = 0kB [ 699.357435] Total swap = 0kB [ 699.360432] 1965969 pages RAM [ 699.363512] 0 pages HighMem/MovableOnly [ 699.367462] 106316 pages reserved 05:25:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) 05:25:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) [ 699.479791] audit: type=1326 audit(1529731519.478:1385): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8345 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x20000505aa}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000540)) 05:25:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:19 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) lstat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) lseek(0xffffffffffffffff, 0x0, 0x0) [ 700.252350] audit: type=1326 audit(1529731520.250:1386): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8401 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:20 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:20 executing program 4: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:20 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:20 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:21 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) [ 701.190731] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 701.190810] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 701.201379] syz-executor5 cpuset= [ 701.211867] syz-executor7 cpuset= [ 701.211869] syz5 mems_allowed=0 [ 701.215307] syz7 [ 701.218757] CPU: 0 PID: 8458 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 701.222010] mems_allowed=0 [ 701.223963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.242920] Call Trace: [ 701.245495] dump_stack+0x185/0x1d0 [ 701.249106] warn_alloc+0x430/0x690 [ 701.252728] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 701.257558] ? kernel_poison_pages+0x40/0x360 [ 701.262041] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 701.267494] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 701.272438] kmsan_alloc_page+0x82/0xe0 [ 701.276400] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 701.281140] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.285967] ? __msan_poison_alloca+0x15c/0x1d0 [ 701.290618] ? __should_failslab+0x278/0x2a0 [ 701.295014] ? should_fail+0x57/0xab0 [ 701.298803] ? __should_failslab+0x278/0x2a0 [ 701.303203] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.308036] ? __msan_poison_alloca+0x15c/0x1d0 [ 701.312697] ? kmsan_set_origin+0x9e/0x160 [ 701.316927] alloc_pages_vma+0x1555/0x17f0 [ 701.321172] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 701.326285] handle_mm_fault+0x44ca/0x7ed0 [ 701.330505] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.335356] __do_page_fault+0xec6/0x1a10 [ 701.339497] do_page_fault+0xb7/0x250 [ 701.343283] ? page_fault+0x8/0x30 [ 701.346808] page_fault+0x1e/0x30 [ 701.350241] RIP: 0033:0x4075fa [ 701.353414] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 701.358759] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 701.366013] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 701.373267] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 701.380525] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ab626 [ 701.387785] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 701.395046] Mem-Info: [ 701.395056] CPU: 1 PID: 8454 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 701.395066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.397486] active_anon:185093 inactive_anon:78 isolated_anon:0 [ 701.397486] active_file:2498 inactive_file:2176 isolated_file:0 [ 701.397486] unevictable:0 dirty:76 writeback:0 unstable:0 [ 701.397486] slab_reclaimable:3322 slab_unreclaimable:9438 [ 701.397486] mapped:69344 shmem:84 pagetables:1446 bounce:0 [ 701.397486] free:172616 free_pcp:365 free_cma:0 [ 701.404206] Call Trace: [ 701.413586] Node 0 active_anon:740372kB inactive_anon:312kB active_file:9992kB inactive_file:8704kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:277376kB dirty:304kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 301056kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 701.446706] dump_stack+0x185/0x1d0 [ 701.449257] Node 0 [ 701.477178] warn_alloc+0x430/0x690 [ 701.480791] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 701.483004] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 701.486592] lowmem_reserve[]: [ 701.512089] ? kernel_poison_pages+0x40/0x360 [ 701.516905] 0 [ 701.520008] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 701.524472] 2817 [ 701.526260] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 701.531677] 7244 [ 701.533738] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 701.538617] 7244 [ 701.540669] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.545645] Node 0 [ 701.547689] ? __msan_poison_alloca+0x15c/0x1d0 [ 701.552516] DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:209212kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 701.554720] kmsan_alloc_page+0x82/0xe0 [ 701.559379] lowmem_reserve[]: [ 701.587669] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 701.591604] 0 [ 701.594693] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.599422] 0 [ 701.601206] ? __msan_poison_alloca+0x15c/0x1d0 [ 701.606010] 4426 4426 [ 701.607804] ? __should_failslab+0x278/0x2a0 [ 701.614917] ? should_fail+0x57/0xab0 [ 701.619289] Node 0 [ 701.623079] ? __should_failslab+0x278/0x2a0 [ 701.623107] Normal free:202456kB min:41208kB low:51508kB high:61808kB active_anon:531160kB inactive_anon:312kB active_file:9868kB inactive_file:8704kB unevictable:0kB writepending:240kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3592kB bounce:0kB free_pcp:136kB local_pcp:68kB free_cma:0kB [ 701.625308] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.629685] lowmem_reserve[]: [ 701.658482] ? __msan_poison_alloca+0x15c/0x1d0 [ 701.663292] 0 [ 701.666382] ? kmsan_set_origin+0x9e/0x160 [ 701.671013] 0 [ 701.672808] alloc_pages_vma+0x1555/0x17f0 [ 701.677005] 0 [ 701.678798] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 701.682994] 0 [ 701.684793] handle_mm_fault+0x44ca/0x7ed0 [ 701.691653] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.695854] Node 0 DMA: 0*4kB 0*8kB [ 701.700688] __do_page_fault+0xec6/0x1a10 [ 701.700707] do_page_fault+0xb7/0x250 [ 701.704395] 0*16kB [ 701.708525] ? page_fault+0x8/0x30 [ 701.712298] 1*32kB [ 701.714520] page_fault+0x1e/0x30 [ 701.718037] (U) [ 701.720259] RIP: 0033:0x4075fa [ 701.723683] 2*64kB [ 701.725649] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 701.728814] (U) [ 701.736376] 1*128kB [ 701.738331] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 701.738333] (U) 1*256kB [ 701.740642] RDX: bba5e54075fdc689 RSI: 0000000000000000 RDI: 0000000000bb2848 [ 701.747901] (U) [ 701.750552] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 701.757807] 0*512kB [ 701.759766] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ab626 [ 701.767020] 1*1024kB [ 701.769327] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 701.776571] (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 701.788446] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 701.791250] Node 0 DMA32: [ 701.801724] syz-executor0 cpuset=syz0 mems_allowed=0 [ 701.804556] 18704*4kB (UME) 14267*8kB [ 701.809659] CPU: 1 PID: 8456 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 701.809669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.813527] (UME) [ 701.820264] Call Trace: [ 701.829613] 5811*16kB [ 701.831748] dump_stack+0x185/0x1d0 [ 701.834293] (UME) [ 701.836773] warn_alloc+0x430/0x690 [ 701.840367] 1771*32kB [ 701.842509] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 701.846095] (UM) [ 701.848576] ? kernel_poison_pages+0x40/0x360 [ 701.853387] 642*64kB [ 701.855438] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 701.859897] (UME) [ 701.862312] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 701.867713] 258*128kB [ 701.869854] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.874826] (UME) [ 701.877310] ? __msan_poison_alloca+0x15c/0x1d0 [ 701.882120] 100*256kB [ 701.884257] kmsan_alloc_page+0x82/0xe0 [ 701.888887] (UM) [ 701.891372] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 701.895325] 40*512kB [ 701.897382] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.902103] (UM) [ 701.904500] ? __msan_poison_alloca+0x15c/0x1d0 [ 701.909308] 13*1024kB [ 701.911360] ? __should_failslab+0x278/0x2a0 [ 701.915999] (UME) [ 701.918487] ? should_fail+0x57/0xab0 [ 701.922859] 0*2048kB [ 701.924992] ? __should_failslab+0x278/0x2a0 [ 701.928759] 0*4096kB [ 701.931153] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.935547] = 472104kB [ 701.937937] ? __msan_poison_alloca+0x15c/0x1d0 [ 701.942747] Node 0 [ 701.945231] ? kmsan_set_origin+0x9e/0x160 [ 701.949864] Normal: [ 701.952092] alloc_pages_vma+0x1555/0x17f0 [ 701.956287] 8230*4kB [ 701.958599] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 701.962795] (UME) [ 701.965192] handle_mm_fault+0x44ca/0x7ed0 [ 701.970258] 4437*8kB [ 701.972392] ? kmsan_set_origin_inline+0x6b/0x120 [ 701.976600] (UME) [ 701.979012] __do_page_fault+0xec6/0x1a10 [ 701.983814] 1746*16kB [ 701.985952] do_page_fault+0xb7/0x250 [ 701.990073] (ME) [ 701.992552] ? page_fault+0x8/0x30 [ 701.992567] page_fault+0x1e/0x30 [ 701.996337] 1278*32kB [ 701.998379] RIP: 0033:0x4075d5 [ 702.001887] (UM) [ 702.005317] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 702.007786] 847*64kB [ 702.012994] (UM) [ 702.018344] RAX: 0000000020000140 RBX: 0000000000000000 RCX: 0000000000000000 [ 702.020724] 82*128kB [ 702.022764] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 702.030015] (UM) [ 702.032406] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730088 [ 702.039647] 0*256kB [ 702.041689] R10: 0000000000a3e940 R11: 0000000000000246 R12: 00000000000ab61a [ 702.048931] 0*512kB 0*1024kB [ 702.051242] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 [ 702.058489] 0*2048kB 0*4096kB = 201952kB [ 702.072902] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 702.081477] 4758 total pagecache pages [ 702.085356] 0 pages in swap cache [ 702.088801] Swap cache stats: add 0, delete 0, find 0/0 [ 702.094153] Free swap = 0kB [ 702.097158] Total swap = 0kB [ 702.100168] 1965969 pages RAM [ 702.103259] 0 pages HighMem/MovableOnly [ 702.107217] 106316 pages reserved 05:25:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:22 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:22 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:22 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:22 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:22 executing program 7: mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:22 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:22 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:22 executing program 7: mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:23 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:23 executing program 7: mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:23 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:23 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:23 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) [ 703.436323] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 703.446962] syz-executor0 cpuset=syz0 mems_allowed=0 [ 703.452085] CPU: 0 PID: 8587 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 703.458838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.468195] Call Trace: [ 703.470784] dump_stack+0x185/0x1d0 [ 703.474441] warn_alloc+0x430/0x690 [ 703.478074] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 703.482908] ? kernel_poison_pages+0x40/0x360 [ 703.487395] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 703.492841] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 703.497777] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 703.502793] kmsan_alloc_page+0x82/0xe0 [ 703.506752] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 703.511511] ? kmsan_set_origin_inline+0x6b/0x120 [ 703.516334] ? __msan_poison_alloca+0x15c/0x1d0 [ 703.520990] ? __should_failslab+0x278/0x2a0 [ 703.525388] ? should_fail+0x57/0xab0 [ 703.529171] ? __should_failslab+0x278/0x2a0 [ 703.533560] ? kmsan_set_origin_inline+0x6b/0x120 [ 703.538385] ? __msan_poison_alloca+0x15c/0x1d0 [ 703.543044] ? kmsan_set_origin+0x9e/0x160 [ 703.547269] alloc_pages_vma+0x1555/0x17f0 [ 703.551490] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 703.556583] handle_mm_fault+0x44ca/0x7ed0 [ 703.560815] ? kmsan_set_origin_inline+0x6b/0x120 [ 703.565653] __do_page_fault+0xec6/0x1a10 [ 703.569789] do_page_fault+0xb7/0x250 [ 703.573573] ? page_fault+0x8/0x30 [ 703.577109] page_fault+0x1e/0x30 [ 703.580546] RIP: 0033:0x4075fa [ 703.583720] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 703.589069] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000000 [ 703.596337] RDX: a7e08bc1b0215a3c RSI: 0000000000000000 RDI: 0000000000d09848 [ 703.603590] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 703.610932] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000abeeb [ 703.618185] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 703.625540] warn_alloc_show_mem: 2 callbacks suppressed [ 703.625542] Mem-Info: [ 703.633293] active_anon:184722 inactive_anon:76 isolated_anon:0 [ 703.633293] active_file:2498 inactive_file:2188 isolated_file:0 [ 703.633293] unevictable:0 dirty:88 writeback:0 unstable:0 [ 703.633293] slab_reclaimable:3322 slab_unreclaimable:9442 [ 703.633293] mapped:69572 shmem:84 pagetables:1562 bounce:0 [ 703.633293] free:173088 free_pcp:602 free_cma:0 [ 703.666455] Node 0 active_anon:738888kB inactive_anon:304kB active_file:9992kB inactive_file:8752kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:278288kB dirty:352kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 313344kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 703.694374] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 703.720503] lowmem_reserve[]: 0 2817 7244 7244 [ 703.725269] Node 0 DMA32 free:484392kB min:26224kB low:32780kB high:39336kB active_anon:209212kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1324kB local_pcp:656kB free_cma:0kB [ 703.754165] lowmem_reserve[]: 0 0 4426 4426 [ 703.758481] Node 0 Normal free:192056kB min:41208kB low:51508kB high:61808kB active_anon:529656kB inactive_anon:304kB active_file:9868kB inactive_file:8752kB unevictable:0kB writepending:288kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8576kB pagetables:4056kB bounce:0kB free_pcp:1084kB local_pcp:396kB free_cma:0kB [ 703.788071] lowmem_reserve[]: 0 0 0 0 [ 703.791865] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 703.805244] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 6*2048kB (UM) 0*4096kB = 484392kB [ 703.823062] Node 0 Normal: 7964*4kB (UME) 4360*8kB (UME) 1669*16kB (UME) 1200*32kB (UM) 790*64kB (UM) 76*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 192128kB 05:25:23 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) [ 703.838382] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 703.846940] 4770 total pagecache pages [ 703.850808] 0 pages in swap cache [ 703.854241] Swap cache stats: add 0, delete 0, find 0/0 [ 703.859582] Free swap = 0kB [ 703.862579] Total swap = 0kB [ 703.865578] 1965969 pages RAM [ 703.868865] 0 pages HighMem/MovableOnly [ 703.872817] 106316 pages reserved 05:25:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:23 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:24 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000502b2}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:24 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) [ 704.374556] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 704.385099] syz-executor5 cpuset=syz5 mems_allowed=0 [ 704.390228] CPU: 0 PID: 8635 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 704.396986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.406352] Call Trace: [ 704.408948] dump_stack+0x185/0x1d0 [ 704.412582] warn_alloc+0x430/0x690 [ 704.416307] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 704.421157] ? kernel_poison_pages+0x40/0x360 [ 704.425671] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 704.431156] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 704.436196] ? kmsan_set_origin_inline+0x6b/0x120 [ 704.441061] kmsan_alloc_page+0x82/0xe0 [ 704.445046] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 704.449811] ? kmsan_set_origin_inline+0x6b/0x120 [ 704.454658] ? __msan_poison_alloca+0x15c/0x1d0 [ 704.459331] ? __should_failslab+0x278/0x2a0 [ 704.463752] ? should_fail+0x57/0xab0 [ 704.467559] ? __should_failslab+0x278/0x2a0 05:25:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) [ 704.471970] ? kmsan_set_origin_inline+0x6b/0x120 [ 704.476826] ? __msan_poison_alloca+0x15c/0x1d0 [ 704.481515] ? kmsan_set_origin+0x9e/0x160 [ 704.485769] alloc_pages_vma+0x1555/0x17f0 [ 704.490018] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 704.495160] handle_mm_fault+0x44ca/0x7ed0 [ 704.499488] ? kmsan_set_origin_inline+0x6b/0x120 [ 704.504346] __do_page_fault+0xec6/0x1a10 [ 704.508506] do_page_fault+0xb7/0x250 [ 704.512314] ? page_fault+0x8/0x30 [ 704.515855] page_fault+0x1e/0x30 [ 704.519314] RIP: 0033:0x4075d5 05:25:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) [ 704.522504] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 704.527865] RAX: 00000000200003c0 RBX: 0000000000000000 RCX: 00000000020000e0 [ 704.535137] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 704.542416] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730070 [ 704.549699] R10: 0000000000a3e940 R11: 0000000000000246 R12: 00000000000ac291 [ 704.556976] R13: 0000000000000002 R14: 000000000072bea0 R15: 0000000000000001 05:25:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) [ 704.766285] audit: type=1326 audit(1529731524.765:1387): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8661 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:24 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:25 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:25 executing program 5: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:25 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50013}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) [ 705.696605] audit: type=1326 audit(1529731525.695:1388): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8713 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 705.723739] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 705.734268] syz-executor6 cpuset=syz6 mems_allowed=0 [ 705.739394] CPU: 0 PID: 8722 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 705.746143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.755503] Call Trace: [ 705.758121] dump_stack+0x185/0x1d0 [ 705.761758] warn_alloc+0x430/0x690 [ 705.765400] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 705.770238] ? kernel_poison_pages+0x40/0x360 [ 705.774725] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 705.780168] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 705.785099] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 705.790112] ? kmsan_set_origin_inline+0x6b/0x120 [ 705.794946] kmsan_alloc_page+0x82/0xe0 [ 705.798908] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 705.803648] ? kmsan_set_origin_inline+0x6b/0x120 [ 705.808475] ? __msan_poison_alloca+0x15c/0x1d0 [ 705.813128] ? __should_failslab+0x278/0x2a0 [ 705.817524] ? should_fail+0x57/0xab0 [ 705.821310] ? __should_failslab+0x278/0x2a0 [ 705.825701] ? kmsan_set_origin_inline+0x6b/0x120 [ 705.830527] ? __msan_poison_alloca+0x15c/0x1d0 [ 705.835184] ? kmsan_set_origin+0x9e/0x160 [ 705.839409] alloc_pages_vma+0x1555/0x17f0 [ 705.843635] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 705.848733] handle_mm_fault+0x44ca/0x7ed0 [ 705.852950] ? kmsan_set_origin_inline+0x6b/0x120 [ 705.857792] __do_page_fault+0xec6/0x1a10 [ 705.861932] do_page_fault+0xb7/0x250 [ 705.865715] ? page_fault+0x8/0x30 [ 705.869239] page_fault+0x1e/0x30 [ 705.872673] RIP: 0033:0x4075fa [ 705.875844] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 705.881191] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 705.888443] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 705.895694] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 705.902947] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ac7db [ 705.910203] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 705.917464] warn_alloc_show_mem: 1 callbacks suppressed [ 705.917466] Mem-Info: [ 705.925227] active_anon:185142 inactive_anon:78 isolated_anon:0 [ 705.925227] active_file:2376 inactive_file:2134 isolated_file:0 [ 705.925227] unevictable:0 dirty:97 writeback:0 unstable:0 [ 705.925227] slab_reclaimable:3322 slab_unreclaimable:9464 [ 705.925227] mapped:69356 shmem:84 pagetables:1461 bounce:0 [ 705.925227] free:168047 free_pcp:526 free_cma:0 [ 705.958380] Node 0 active_anon:740568kB inactive_anon:312kB active_file:9504kB inactive_file:8536kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:277424kB dirty:388kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 301056kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 705.986304] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 706.012422] lowmem_reserve[]: 0 2817 7244 7244 [ 706.016996] Node 0 DMA32 free:472104kB min:26224kB low:32780kB high:39336kB active_anon:213288kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1376kB local_pcp:656kB free_cma:0kB [ 706.045886] lowmem_reserve[]: 0 0 4426 4426 [ 706.050198] Node 0 Normal free:184180kB min:41208kB low:51508kB high:61808kB active_anon:527280kB inactive_anon:312kB active_file:9380kB inactive_file:8536kB unevictable:0kB writepending:324kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3652kB bounce:0kB free_pcp:728kB local_pcp:116kB free_cma:0kB [ 706.079706] lowmem_reserve[]: 0 0 0 0 [ 706.083501] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 706.096725] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 0*2048kB 0*4096kB = 472104kB [ 706.114110] Node 0 Normal: 8023*4kB (UME) 4173*8kB (UME) 1505*16kB (UME) 1069*32kB (M) 718*64kB (UM) 65*128kB (M) 0*256kB 0*512kB 0*1024kB 3*2048kB (UM) 0*4096kB = 184180kB [ 706.129668] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 706.138221] 4594 total pagecache pages [ 706.142083] 0 pages in swap cache 05:25:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) [ 706.145528] Swap cache stats: add 0, delete 0, find 0/0 [ 706.150874] Free swap = 0kB [ 706.153870] Total swap = 0kB [ 706.156879] 1965969 pages RAM [ 706.159978] 0 pages HighMem/MovableOnly [ 706.163933] 106316 pages reserved 05:25:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) [ 706.356762] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 706.367298] syz-executor2 cpuset=syz2 mems_allowed=0 [ 706.372422] CPU: 0 PID: 8740 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 706.379197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.388561] Call Trace: [ 706.391160] dump_stack+0x185/0x1d0 [ 706.394795] warn_alloc+0x430/0x690 [ 706.398437] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 706.403280] ? kernel_poison_pages+0x40/0x360 [ 706.407780] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 706.413258] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 706.418288] ? kmsan_set_origin_inline+0x6b/0x120 [ 706.423146] kmsan_alloc_page+0x82/0xe0 [ 706.427144] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 706.431909] ? kmsan_set_origin_inline+0x6b/0x120 [ 706.436757] ? __msan_poison_alloca+0x15c/0x1d0 [ 706.441430] ? __should_failslab+0x278/0x2a0 [ 706.445845] ? should_fail+0x57/0xab0 [ 706.449654] ? __should_failslab+0x278/0x2a0 [ 706.454065] ? kmsan_set_origin_inline+0x6b/0x120 [ 706.458909] ? __msan_poison_alloca+0x15c/0x1d0 [ 706.463607] ? kmsan_set_origin+0x9e/0x160 [ 706.467858] alloc_pages_vma+0x1555/0x17f0 [ 706.472102] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 706.477219] handle_mm_fault+0x44ca/0x7ed0 [ 706.481457] ? kmsan_set_origin_inline+0x6b/0x120 [ 706.486312] __do_page_fault+0xec6/0x1a10 [ 706.490474] do_page_fault+0xb7/0x250 [ 706.494282] ? page_fault+0x8/0x30 [ 706.497823] page_fault+0x1e/0x30 [ 706.501272] RIP: 0033:0x4075fa 05:25:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50130}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) [ 706.504455] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 706.509814] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 706.517082] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 706.524359] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 706.531633] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aca54 [ 706.538911] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 05:25:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) [ 706.674871] audit: type=1326 audit(1529731526.673:1389): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8717 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 706.694649] audit: type=1326 audit(1529731526.673:1390): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8733 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) lstat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) 05:25:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) mq_open(&(0x7f0000000340)="6c6f62646576ac8ba0817f9522da666370757365747b7d25c400", 0x0, 0x0, &(0x7f0000000540)) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 05:25:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 05:25:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) 05:25:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) [ 706.918283] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 706.928829] syz-executor6 cpuset=syz6 mems_allowed=0 [ 706.933952] CPU: 1 PID: 8765 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 706.940706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.950064] Call Trace: [ 706.952658] dump_stack+0x185/0x1d0 [ 706.956289] warn_alloc+0x430/0x690 [ 706.959931] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 706.964778] ? kernel_poison_pages+0x40/0x360 [ 706.969284] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 706.974739] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 706.979677] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 706.984742] ? kmsan_set_origin_inline+0x6b/0x120 [ 706.989587] kmsan_alloc_page+0x82/0xe0 [ 706.993573] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 706.998315] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.003173] ? __msan_poison_alloca+0x15c/0x1d0 [ 707.007826] ? __should_failslab+0x278/0x2a0 [ 707.012220] ? should_fail+0x57/0xab0 [ 707.016003] ? __should_failslab+0x278/0x2a0 [ 707.020397] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.025225] ? __msan_poison_alloca+0x15c/0x1d0 [ 707.029878] ? kmsan_set_origin+0x9e/0x160 [ 707.034102] alloc_pages_vma+0x1555/0x17f0 [ 707.038326] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 707.043420] handle_mm_fault+0x44ca/0x7ed0 [ 707.047639] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.052475] __do_page_fault+0xec6/0x1a10 [ 707.056610] do_page_fault+0xb7/0x250 [ 707.060408] ? page_fault+0x8/0x30 [ 707.063931] page_fault+0x1e/0x30 [ 707.067380] RIP: 0033:0x4075fa [ 707.070552] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 707.075898] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 707.083154] RDX: 654da9de203392c5 RSI: 0000000000000000 RDI: 0000000001b05848 [ 707.090410] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 707.097663] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000acc85 [ 707.104920] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 707.112192] warn_alloc_show_mem: 1 callbacks suppressed [ 707.112195] Mem-Info: [ 707.119937] active_anon:185673 inactive_anon:78 isolated_anon:0 [ 707.119937] active_file:2131 inactive_file:2074 isolated_file:0 [ 707.119937] unevictable:0 dirty:97 writeback:0 unstable:0 [ 707.119937] slab_reclaimable:3322 slab_unreclaimable:9465 [ 707.119937] mapped:69064 shmem:84 pagetables:1484 bounce:0 [ 707.119937] free:167614 free_pcp:457 free_cma:0 [ 707.153101] Node 0 active_anon:742692kB inactive_anon:312kB active_file:8524kB inactive_file:8296kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:276256kB dirty:388kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 707.181102] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 707.207210] lowmem_reserve[]: 0 2817 7244 7244 [ 707.211780] Node 0 DMA32 free:478248kB min:26224kB low:32780kB high:39336kB active_anon:213288kB inactive_anon:0kB active_file:124kB inactive_file:0kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:2192kB bounce:0kB free_pcp:1376kB local_pcp:720kB free_cma:0kB [ 707.240665] lowmem_reserve[]: 0 0 4426 4426 [ 707.244979] Node 0 Normal free:176304kB min:41208kB low:51508kB high:61808kB active_anon:529628kB inactive_anon:312kB active_file:8332kB inactive_file:8528kB unevictable:0kB writepending:324kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8192kB pagetables:3744kB bounce:0kB free_pcp:452kB local_pcp:356kB free_cma:0kB [ 707.274495] lowmem_reserve[]: 0 0 0 0 [ 707.278282] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 707.291482] Node 0 DMA32: 18704*4kB (UME) 14267*8kB (UME) 5811*16kB (UME) 1771*32kB (UM) 642*64kB (UME) 258*128kB (UME) 100*256kB (UM) 40*512kB (UM) 13*1024kB (UME) 3*2048kB (UM) 0*4096kB = 478248kB [ 707.309301] Node 0 Normal: 8259*4kB (ME) 4154*8kB (ME) 1488*16kB (UME) 1053*32kB (UM) 692*64kB (UM) 60*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 175740kB [ 707.324418] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 707.332973] 4294 total pagecache pages [ 707.336843] 0 pages in swap cache [ 707.340272] Swap cache stats: add 0, delete 0, find 0/0 [ 707.345613] Free swap = 0kB [ 707.348609] Total swap = 0kB [ 707.351606] 1965969 pages RAM [ 707.354689] 0 pages HighMem/MovableOnly [ 707.358642] 106316 pages reserved 05:25:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000580)) 05:25:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 05:25:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)}, &(0x7f0000000a80)) 05:25:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) [ 707.476745] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 707.487271] syz-executor2 cpuset=syz2 mems_allowed=0 [ 707.492386] CPU: 1 PID: 8781 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 707.499136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.508489] Call Trace: [ 707.511080] dump_stack+0x185/0x1d0 [ 707.514709] warn_alloc+0x430/0x690 [ 707.518348] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 707.523194] ? kernel_poison_pages+0x40/0x360 [ 707.527698] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 707.533180] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 707.538132] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 707.543163] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.548023] kmsan_alloc_page+0x82/0xe0 [ 707.552012] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 707.556789] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.562557] ? __msan_poison_alloca+0x15c/0x1d0 [ 707.567237] ? __should_failslab+0x278/0x2a0 [ 707.571651] ? should_fail+0x57/0xab0 05:25:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) [ 707.575448] ? __should_failslab+0x278/0x2a0 [ 707.579862] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.584709] ? __msan_poison_alloca+0x15c/0x1d0 [ 707.589391] ? kmsan_set_origin+0x9e/0x160 [ 707.593640] alloc_pages_vma+0x1555/0x17f0 [ 707.597891] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 707.603012] handle_mm_fault+0x44ca/0x7ed0 [ 707.607268] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.612176] __do_page_fault+0xec6/0x1a10 [ 707.616380] do_page_fault+0xb7/0x250 [ 707.620232] ? page_fault+0x8/0x30 [ 707.623782] page_fault+0x1e/0x30 05:25:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2=0xe0000002, @in6=@loopback={0x0, 0x1}}}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}}, 0x0, @in6=@dev={0xfe, 0x80}}}, 0xe8) 05:25:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500d2}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) [ 707.627233] RIP: 0033:0x4075fa [ 707.630421] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 707.635802] RAX: 0000000020000080 RBX: 0000000000000000 RCX: 0000000000000001 [ 707.643078] RDX: 8cc328191c57f387 RSI: 0000000000000000 RDI: 0000000001e81848 [ 707.650357] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 707.657635] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000aceb4 [ 707.664912] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 707.708677] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 707.719207] syz-executor5 cpuset=syz5 mems_allowed=0 [ 707.724330] CPU: 0 PID: 8794 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 707.731084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.740472] Call Trace: [ 707.743080] dump_stack+0x185/0x1d0 [ 707.746717] warn_alloc+0x430/0x690 [ 707.750364] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 707.755214] ? kernel_poison_pages+0x40/0x360 [ 707.759724] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 707.765189] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 707.770150] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 707.775191] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.780055] kmsan_alloc_page+0x82/0xe0 [ 707.784037] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 707.788803] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.793655] ? __msan_poison_alloca+0x15c/0x1d0 [ 707.798337] ? __should_failslab+0x278/0x2a0 [ 707.802762] ? should_fail+0x57/0xab0 [ 707.806581] ? __should_failslab+0x278/0x2a0 [ 707.811004] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.815867] ? __msan_poison_alloca+0x15c/0x1d0 [ 707.820562] ? kmsan_set_origin+0x9e/0x160 [ 707.824821] alloc_pages_vma+0x1555/0x17f0 [ 707.829081] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 707.834206] handle_mm_fault+0x44ca/0x7ed0 [ 707.838452] ? kmsan_set_origin_inline+0x6b/0x120 [ 707.843319] __do_page_fault+0xec6/0x1a10 [ 707.847488] do_page_fault+0xb7/0x250 [ 707.851301] ? page_fault+0x8/0x30 [ 707.854855] page_fault+0x1e/0x30 [ 707.858314] RIP: 0033:0x4075fa [ 707.861503] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 707.866875] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 707.874151] RDX: 141a2d61ff37a385 RSI: 0000000000000000 RDI: 0000000002090848 [ 707.881423] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 707.888728] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000acf9a [ 707.896005] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 707.906068] audit: type=1326 audit(1529731527.904:1391): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8771 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 05:25:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) [ 707.949909] audit: type=1326 audit(1529731527.925:1392): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8780 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 707.969760] audit: type=1326 audit(1529731527.926:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8782 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 708.069138] ================================================================== [ 708.076571] BUG: KMSAN: uninit-value in __list_add_valid+0x1a2/0x450 [ 708.081149] audit: type=1326 audit(1529731527.992:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8766 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 708.083065] CPU: 1 PID: 4496 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 708.083072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.083076] Call Trace: [ 708.083081] [ 708.083098] dump_stack+0x185/0x1d0 [ 708.083113] kmsan_report+0x188/0x2a0 [ 708.083128] __msan_warning_32+0x70/0xc0 [ 708.083143] __list_add_valid+0x1a2/0x450 [ 708.083160] enqueue_task_fair+0xe12/0x4490 [ 708.083176] ? __msan_metadata_ptr_for_store_4+0x10/0x20 [ 708.083191] ? update_load_avg+0x2cc0/0x2cc0 [ 708.083222] try_to_wake_up+0x162f/0x2260 [ 708.102862] audit: type=1326 audit(1529731528.061:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8804 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 708.109474] wake_up_process+0x34/0x40 [ 708.109487] hrtimer_wakeup+0xac/0x100 [ 708.109499] __hrtimer_run_queues+0xc54/0x1630 [ 708.109512] ? hrtimer_init_sleeper+0xc0/0xc0 [ 708.109523] hrtimer_interrupt+0x451/0x13c0 [ 708.109536] ? __msan_poison_alloca+0x15c/0x1d0 [ 708.109549] ? trace_local_timer_entry+0x2f/0x1d0 [ 708.109559] ? hrtimer_init+0x5c0/0x5c0 [ 708.109568] local_apic_timer_interrupt+0x6b/0x250 [ 708.109580] smp_apic_timer_interrupt+0x5a/0x90 [ 708.109589] apic_timer_interrupt+0xf/0x20 [ 708.109592] [ 708.109603] RIP: 0010:_raw_spin_unlock_irqrestore+0x5a/0x80 [ 708.109607] RSP: 0018:ffff88007025fb80 EFLAGS: 00000296 ORIG_RAX: ffffffffffffff13 [ 708.109617] RAX: ffff880193a9a020 RBX: ffff880194a1a020 RCX: ffff880000000000 [ 708.109623] RDX: ffff880193aa6020 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 708.109628] RBP: ffff88007025fbb8 R08: 0000000001080020 R09: 0000000000000002 [ 708.109633] R10: 0000000000000000 R11: ffffffff81223ec0 R12: 0000000000000000 [ 708.109638] R13: ffff880193a9a020 R14: 0000000000000000 R15: 0000000000000296 [ 708.109647] ? do_wait+0xbd0/0xbd0 [ 708.109659] remove_wait_queue+0x1ed/0x2b0 [ 708.109669] do_wait+0xb26/0xbd0 [ 708.109680] kernel_wait4+0x337/0x4b0 [ 708.109688] ? __do_sys_exit_group+0x30/0x30 [ 708.109698] __x64_sys_wait4+0x17c/0x320 [ 708.109707] ? put_timespec64+0x159/0x200 [ 708.109718] ? __x64_sys_clock_gettime+0x30b/0x370 [ 708.109727] ? do_wait+0xbd0/0xbd0 [ 708.109735] do_syscall_64+0x15b/0x230 [ 708.109745] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 708.109751] RIP: 0033:0x40fd9a [ 708.109755] RSP: 002b:0000000000a3eab8 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 708.109763] RAX: ffffffffffffffda RBX: 00000000000acd9c RCX: 000000000040fd9a [ 708.109768] RDX: 0000000040000001 RSI: 0000000000a3ead4 RDI: ffffffffffffffff [ 708.109773] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000bb2940 [ 708.109777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 708.109782] R13: 0000000000000caf R14: 0000000000a3f160 R15: 00000000000ac960 [ 708.109788] [ 708.109791] Uninit was stored to memory at: [ 708.109802] kmsan_internal_chain_origin+0x12b/0x210 [ 708.109809] __msan_chain_origin+0x69/0xc0 [ 708.109817] pick_next_task_fair+0x249e/0x2530 [ 708.109824] pick_next_task+0x1ba/0x420 [ 708.109832] __schedule+0x20f/0x770 [ 708.109840] _cond_resched+0x5e/0xd0 [ 708.109848] unmap_page_range+0x35e0/0x3be0 [ 708.109855] unmap_single_vma+0x445/0x5e0 [ 708.109860] unmap_vmas+0x1f4/0x360 [ 708.109868] exit_mmap+0x4d7/0x980 [ 708.109876] __mmput+0x158/0x600 [ 708.109882] mmput+0xab/0xf0 [ 708.109890] exit_mm+0x6ed/0x7a0 [ 708.109897] do_exit+0xc12/0x3930 [ 708.109906] do_group_exit+0x1a0/0x360 [ 708.109912] __do_sys_exit_group+0x21/0x30 [ 708.109920] __se_sys_exit_group+0x14/0x20 [ 708.109928] __x64_sys_exit_group+0x4c/0x50 [ 708.109935] do_syscall_64+0x15b/0x230 [ 708.109942] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 708.109944] [ 708.109946] Uninit was stored to memory at: [ 708.109955] kmsan_internal_chain_origin+0x12b/0x210 [ 708.109961] __msan_chain_origin+0x69/0xc0 [ 708.109968] rb_insert_color_cached+0xddf/0x1370 [ 708.109976] enqueue_task_fair+0x181a/0x4490 [ 708.109983] try_to_wake_up+0x162f/0x2260 [ 708.109991] wake_up_process+0x34/0x40 [ 708.109998] hrtimer_wakeup+0xac/0x100 [ 708.110007] __hrtimer_run_queues+0xc54/0x1630 [ 708.110015] hrtimer_interrupt+0x451/0x13c0 [ 708.110023] local_apic_timer_interrupt+0x6b/0x250 [ 708.110032] smp_apic_timer_interrupt+0x5a/0x90 [ 708.110033] [ 708.110042] Local variable description: ----t.i.i@__se_sys_nanosleep [ 708.110044] Variable was created at: [ 708.110052] __se_sys_nanosleep+0x5f/0x6a0 [ 708.110060] __x64_sys_nanosleep+0x92/0xc0 [ 708.110063] ================================================================== [ 708.110065] Disabling lock debugging due to kernel taint [ 708.110070] Kernel panic - not syncing: panic_on_warn set ... [ 708.110070] [ 708.110079] CPU: 1 PID: 4496 Comm: syz-executor7 Tainted: G B 4.17.0+ #9 [ 708.110083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.110085] Call Trace: [ 708.110089] [ 708.110097] dump_stack+0x185/0x1d0 [ 708.110106] panic+0x3d0/0x990 [ 708.110120] kmsan_report+0x29e/0x2a0 [ 708.110130] __msan_warning_32+0x70/0xc0 [ 708.110139] __list_add_valid+0x1a2/0x450 [ 708.110150] enqueue_task_fair+0xe12/0x4490 [ 708.110161] ? __msan_metadata_ptr_for_store_4+0x10/0x20 [ 708.110174] ? update_load_avg+0x2cc0/0x2cc0 [ 708.110182] try_to_wake_up+0x162f/0x2260 [ 708.110196] wake_up_process+0x34/0x40 [ 708.110204] hrtimer_wakeup+0xac/0x100 [ 708.110215] __hrtimer_run_queues+0xc54/0x1630 [ 708.110228] ? hrtimer_init_sleeper+0xc0/0xc0 [ 708.110239] hrtimer_interrupt+0x451/0x13c0 [ 708.110250] ? __msan_poison_alloca+0x15c/0x1d0 [ 708.110261] ? trace_local_timer_entry+0x2f/0x1d0 [ 708.110270] ? hrtimer_init+0x5c0/0x5c0 [ 708.110279] local_apic_timer_interrupt+0x6b/0x250 [ 708.110289] smp_apic_timer_interrupt+0x5a/0x90 [ 708.110298] apic_timer_interrupt+0xf/0x20 [ 708.110301] [ 708.110309] RIP: 0010:_raw_spin_unlock_irqrestore+0x5a/0x80 [ 708.110314] RSP: 0018:ffff88007025fb80 EFLAGS: 00000296 ORIG_RAX: ffffffffffffff13 [ 708.110323] RAX: ffff880193a9a020 RBX: ffff880194a1a020 RCX: ffff880000000000 [ 708.110329] RDX: ffff880193aa6020 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 708.110334] RBP: ffff88007025fbb8 R08: 0000000001080020 R09: 0000000000000002 [ 708.110339] R10: 0000000000000000 R11: ffffffff81223ec0 R12: 0000000000000000 [ 708.110344] R13: ffff880193a9a020 R14: 0000000000000000 R15: 0000000000000296 [ 708.110351] ? do_wait+0xbd0/0xbd0 [ 708.110362] remove_wait_queue+0x1ed/0x2b0 [ 708.110372] do_wait+0xb26/0xbd0 [ 708.110383] kernel_wait4+0x337/0x4b0 [ 708.110391] ? __do_sys_exit_group+0x30/0x30 [ 708.110402] __x64_sys_wait4+0x17c/0x320 [ 708.110410] ? put_timespec64+0x159/0x200 [ 708.110421] ? __x64_sys_clock_gettime+0x30b/0x370 [ 708.110429] ? do_wait+0xbd0/0xbd0 [ 708.110436] do_syscall_64+0x15b/0x230 [ 708.110447] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 708.110452] RIP: 0033:0x40fd9a [ 708.110456] RSP: 002b:0000000000a3eab8 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 708.110464] RAX: ffffffffffffffda RBX: 00000000000acd9c RCX: 000000000040fd9a [ 708.110469] RDX: 0000000040000001 RSI: 0000000000a3ead4 RDI: ffffffffffffffff [ 708.110473] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000bb2940 [ 708.110478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 708.110482] R13: 0000000000000caf R14: 0000000000a3f160 R15: 00000000000ac960 [ 709.258280] Shutting down cpus with NMI [ 709.270289] Dumping ftrace buffer: [ 709.270293] (ftrace buffer empty) [ 709.270296] Kernel Offset: disabled [ 709.980745] Rebooting in 86400 seconds..