R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007fd7c7a7bbc8 R14: 00000000004b75fb R15: 0000000000000000 INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 1 PID: 5241 Comm: syz-executor4 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 register_lock_class+0x164/0x5d0 kernel/locking/lockdep.c:752 __lock_acquire+0xb4/0x1430 kernel/locking/lockdep.c:3314 lock_acquire+0xbf/0x220 kernel/locking/lockdep.c:3914 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:168 spin_lock_bh include/linux/spinlock.h:315 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:349 [inline] skb_array_consume_bh include/linux/skb_array.h:136 [inline] pfifo_fast_reset+0x9a/0x1b0 net/sched/sch_generic.c:662 qdisc_destroy+0x94/0x210 net/sched/sch_generic.c:896 qdisc_create_dflt+0xa6/0xb0 net/sched/sch_generic.c:840 mq_init+0x105/0x150 net/sched/sch_mq.c:61 qdisc_create_dflt+0x60/0xb0 net/sched/sch_generic.c:837 attach_default_qdiscs net/sched/sch_generic.c:972 [inline] dev_activate+0x363/0x3b0 net/sched/sch_generic.c:1011 __dev_open+0x119/0x180 net/core/dev.c:1389 __dev_change_flags+0x218/0x270 net/core/dev.c:6836 dev_change_flags+0x30/0x70 net/core/dev.c:6905 dev_ifsioc+0x3c2/0x520 net/core/dev_ioctl.c:257 dev_ioctl+0x15d/0x7a0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x59/0x60 net/socket.c:971 sock_ioctl+0x211/0x320 net/socket.c:1061 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0xaf/0x840 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007fd7c7a7bc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fd7c7a7baa0 RCX: 0000000000452a39 RDX: 000000002062ffe0 RSI: 0000000000008914 RDI: 0000000000000013 RBP: 00007fd7c7a7ba90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007fd7c7a7bbc8 R14: 00000000004b75fb R15: 0000000000000000 IPv6: ADDRCONF(NETDEV_UP): gre0: link is not ready sctp: [Deprecated]: syz-executor2 (pid 5256) Use of int in max_burst socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor2 (pid 5256) Use of int in max_burst socket option. Use struct sctp_assoc_value instead device gre0 entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 5327 Comm: syz-executor6 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc_node mm/slab.c:3293 [inline] kmem_cache_alloc_node_trace+0x5a/0x720 mm/slab.c:3655 __do_kmalloc_node mm/slab.c:3675 [inline] __kmalloc_node+0x2c/0x40 mm/slab.c:3683 kmalloc_node include/linux/slab.h:558 [inline] kzalloc_node include/linux/slab.h:716 [inline] qdisc_alloc+0x52/0x300 net/sched/sch_generic.c:764 qdisc_create_dflt+0x35/0xb0 net/sched/sch_generic.c:830 attach_default_qdiscs net/sched/sch_generic.c:972 [inline] dev_activate+0x363/0x3b0 net/sched/sch_generic.c:1011 __dev_open+0x119/0x180 net/core/dev.c:1389 __dev_change_flags+0x218/0x270 net/core/dev.c:6836 dev_change_flags+0x30/0x70 net/core/dev.c:6905 dev_ifsioc+0x3c2/0x520 net/core/dev_ioctl.c:257 dev_ioctl+0x15d/0x7a0 net/core/dev_ioctl.c:566 sock_do_ioctl+0x59/0x60 net/socket.c:971 sock_ioctl+0x211/0x320 net/socket.c:1061 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0xaf/0x840 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007fdacf564c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fdacf564aa0 RCX: 0000000000452a39 RDX: 000000002062ffe0 RSI: 0000000000008914 RDI: 0000000000000013 RBP: 00007fdacf564a90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007fdacf564bc8 R14: 00000000004b75fb R15: 0000000000000000 IPv6: ADDRCONF(NETDEV_UP): gre0: link is not ready FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5331 Comm: syz-executor3 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x720 mm/slab.c:3546 dst_alloc+0x6b/0xb0 net/core/dst.c:104 __ip6_dst_alloc+0x35/0x70 net/ipv6/route.c:361 ip6_rt_pcpu_alloc net/ipv6/route.c:1095 [inline] rt6_make_pcpu_route net/ipv6/route.c:1123 [inline] ip6_pol_route+0x77e/0x15b0 net/ipv6/route.c:1752 ip6_pol_route_output+0x2f/0x40 net/ipv6/route.c:1860 fib6_rule_lookup+0x2f/0xb0 net/ipv6/ip6_fib.c:309 ip6_route_output_flags+0xd2/0x120 net/ipv6/route.c:1888 ip6_route_output include/net/ip6_route.h:81 [inline] ip6_dst_lookup_tail+0x20d/0x330 net/ipv6/ip6_output.c:953 ip6_dst_lookup_flow+0x3b/0xa0 net/ipv6/ip6_output.c:1076 ip6_sk_dst_lookup_flow+0x162/0x170 net/ipv6/ip6_output.c:1107 udpv6_sendmsg+0xc87/0x1200 net/ipv6/udp.c:1292 inet_sendmsg+0x54/0x250 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:636 [inline] sock_sendmsg+0x51/0x70 net/socket.c:646 SYSC_sendto+0x17f/0x1d0 net/socket.c:1727 SyS_sendto+0x40/0x50 net/socket.c:1695 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007fbd250b3c58 EFLAGS: 00000212 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007fbd250b3aa0 RCX: 0000000000452a39 RDX: 0000000000000000 RSI: 0000000020f09ffe RDI: 0000000000000014 RBP: 00007fbd250b3a90 R08: 0000000020f05fe4 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007fbd250b3bc8 R14: 00000000004b75fb R15: 0000000000000000 device gre0 entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl kauditd_printk_skb: 2 callbacks suppressed audit: type=1400 audit(1513156760.099:59): avc: denied { setgid } for pid=5700 comm="syz-executor1" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1513156760.327:60): avc: denied { getrlimit } for pid=5823 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=process permissive=1 audit: type=1400 audit(1513156760.380:61): avc: denied { map } for pid=5828 comm="syz-executor5" path="socket:[19264]" dev="sockfs" ino=19264 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6354 Comm: syz-executor7 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x720 mm/slab.c:3546 kmem_cache_zalloc include/linux/slab.h:695 [inline] alloc_mm_slot mm/khugepaged.c:369 [inline] __khugepaged_enter+0x3b/0x180 mm/khugepaged.c:405 khugepaged_enter include/linux/khugepaged.h:54 [inline] do_huge_pmd_anonymous_page+0x629/0x850 mm/huge_memory.c:680 create_huge_pmd mm/memory.c:3838 [inline] __handle_mm_fault+0xc37/0x1930 mm/memory.c:4042 handle_mm_fault+0x215/0x450 mm/memory.c:4108 faultin_page mm/gup.c:502 [inline] __get_user_pages+0x1ff/0x980 mm/gup.c:699 __get_user_pages_locked mm/gup.c:870 [inline] get_user_pages_unlocked+0x16f/0x250 mm/gup.c:990 get_user_pages_fast+0xe6/0x190 mm/gup.c:1819 iov_iter_get_pages+0xf0/0x430 lib/iov_iter.c:1068 bio_iov_iter_get_pages+0x56/0x160 block/bio.c:888 __blkdev_direct_IO_simple+0x15a/0x410 fs/block_dev.c:220 blkdev_direct_IO+0x474/0x4d0 fs/block_dev.c:428 generic_file_read_iter+0xe9/0xdb0 mm/filemap.c:2343 blkdev_read_iter+0x55/0x80 fs/block_dev.c:1913 call_read_iter include/linux/fs.h:1770 [inline] new_sync_read fs/read_write.c:401 [inline] __vfs_read+0x158/0x1d0 fs/read_write.c:413 vfs_read+0xce/0x1c0 fs/read_write.c:447 SYSC_read fs/read_write.c:573 [inline] SyS_read+0x57/0xd0 fs/read_write.c:566 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007f686ced7c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00007f686ced7aa0 RCX: 0000000000452a39 RDX: 0000000000000200 RSI: 0000000020a00800 RDI: 0000000000000013 RBP: 00007f686ced7a90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007f686ced7bc8 R14: 00000000004b75fb R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6367 Comm: syz-executor2 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x720 mm/slab.c:3546 dst_alloc+0x6b/0xb0 net/core/dst.c:104 __ip6_dst_alloc+0x35/0x70 net/ipv6/route.c:361 ip6_rt_pcpu_alloc net/ipv6/route.c:1095 [inline] rt6_make_pcpu_route net/ipv6/route.c:1123 [inline] ip6_pol_route+0x77e/0x15b0 net/ipv6/route.c:1752 ip6_pol_route_output+0x2f/0x40 net/ipv6/route.c:1860 fib6_rule_lookup+0x2f/0xb0 net/ipv6/ip6_fib.c:309 ip6_route_output_flags+0xd2/0x120 net/ipv6/route.c:1888 ip6_route_output include/net/ip6_route.h:81 [inline] ip6_dst_lookup_tail+0x20d/0x330 net/ipv6/ip6_output.c:953 ip6_dst_lookup_flow+0x3b/0xa0 net/ipv6/ip6_output.c:1076 ip6_sk_dst_lookup_flow+0x162/0x170 net/ipv6/ip6_output.c:1107 udpv6_sendmsg+0xc87/0x1200 net/ipv6/udp.c:1292 inet_sendmsg+0x54/0x250 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:636 [inline] sock_sendmsg+0x51/0x70 net/socket.c:646 SYSC_sendto+0x17f/0x1d0 net/socket.c:1727 SyS_sendto+0x40/0x50 net/socket.c:1695 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007f22a556bc58 EFLAGS: 00000212 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f22a556baa0 RCX: 0000000000452a39 RDX: 0000000000000000 RSI: 0000000020f09ffe RDI: 0000000000000013 RBP: 00007f22a556ba90 R08: 0000000020f05fe4 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007f22a556bbc8 R14: 00000000004b75fb R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6413 Comm: syz-executor2 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc_node mm/slab.c:3293 [inline] kmem_cache_alloc_node+0x56/0x730 mm/slab.c:3636 __alloc_skb+0x61/0x220 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:983 [inline] alloc_skb_with_frags+0x7d/0x250 net/core/skbuff.c:5142 sock_alloc_send_pskb+0x247/0x270 net/core/sock.c:2078 sock_alloc_send_skb+0x32/0x40 net/core/sock.c:2095 __ip6_append_data.isra.42+0x992/0xd70 net/ipv6/ip6_output.c:1390 ip6_make_skb+0x136/0x200 net/ipv6/ip6_output.c:1736 udpv6_sendmsg+0xf14/0x1200 net/ipv6/udp.c:1310 inet_sendmsg+0x54/0x250 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:636 [inline] sock_sendmsg+0x51/0x70 net/socket.c:646 SYSC_sendto+0x17f/0x1d0 net/socket.c:1727 SyS_sendto+0x40/0x50 net/socket.c:1695 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007f22a556bc58 EFLAGS: 00000212 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f22a556baa0 RCX: 0000000000452a39 RDX: 0000000000000000 RSI: 0000000020f09ffe RDI: 0000000000000013 RBP: 00007f22a556ba90 R08: 0000000020f05fe4 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007f22a556bbc8 R14: 00000000004b75fb R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6798 Comm: syz-executor5 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x720 mm/slab.c:3546 mpol_new+0x90/0x110 mm/mempolicy.c:276 do_mbind+0xcd/0x5d0 mm/mempolicy.c:1190 SYSC_mbind mm/mempolicy.c:1357 [inline] SyS_mbind+0xb1/0xc0 mm/mempolicy.c:1339 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007fa8708d0c58 EFLAGS: 00000212 ORIG_RAX: 00000000000000ed RAX: ffffffffffffffda RBX: 00007fa8708d0aa0 RCX: 0000000000452a39 RDX: 0000000000000001 RSI: 0000000000004000 RDI: 0000000020004000 RBP: 00007fa8708d0a90 R08: 0000000000000080 R09: 0000000000000002 R10: 0000000020006000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007fa8708d0bc8 R14: 00000000004b75fb R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6827 Comm: syz-executor1 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x720 mm/slab.c:3546 ptlock_alloc+0x24/0x50 mm/memory.c:4696 ptlock_init include/linux/mm.h:1796 [inline] pgtable_page_ctor include/linux/mm.h:1830 [inline] pte_alloc_one+0x2c/0x80 arch/x86/mm/pgtable.c:32 do_fault_around mm/memory.c:3570 [inline] do_read_fault mm/memory.c:3611 [inline] do_fault mm/memory.c:3716 [inline] handle_pte_fault mm/memory.c:3947 [inline] __handle_mm_fault+0x1857/0x1930 mm/memory.c:4071 handle_mm_fault+0x215/0x450 mm/memory.c:4108 __do_page_fault+0x337/0x6b0 arch/x86/mm/fault.c:1429 do_page_fault+0x52/0x330 arch/x86/mm/fault.c:1504 page_fault+0x2c/0x60 arch/x86/entry/entry_64.S:1243 RIP: 0010:__get_user_8+0x1b/0x25 arch/x86/lib/getuser.S:85 RSP: 0018:ffffc90006dd7ea8 EFLAGS: 00010287 RAX: 000000002000600f RBX: 0000000020006008 RCX: ffffffff81393ea8 RDX: ffff8801e30ac100 RSI: ffffc90003ea9000 RDI: 0000000000000286 RBP: ffffc90006dd7ef0 R08: 0000000000000000 R09: ffffffff81393e52 R10: ffffc90006dd7e10 R11: 0000000000000000 R12: 0000000000000001 R13: ffffc90006dd7f18 R14: 0000000020006000 R15: 0000000000000080 SYSC_mbind mm/mempolicy.c:1354 [inline] SyS_mbind+0x6d/0xc0 mm/mempolicy.c:1339 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007f58659e1c58 EFLAGS: 00000212 ORIG_RAX: 00000000000000ed RAX: ffffffffffffffda RBX: 00007f58659e1aa0 RCX: 0000000000452a39 RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020004000 RBP: 00007f58659e1a90 R08: 0000000000000080 R09: 0000000000000002 R10: 0000000020006000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007f58659e1bc8 R14: 00000000004b75fb R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6844 Comm: syz-executor1 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x720 mm/slab.c:3546 radix_tree_node_alloc.constprop.19+0xcc/0x130 lib/radix-tree.c:397 __radix_tree_create+0x208/0x2a0 lib/radix-tree.c:838 __radix_tree_insert+0x4d/0x320 lib/radix-tree.c:993 radix_tree_insert include/linux/radix-tree.h:296 [inline] shmem_add_to_page_cache+0x163/0x230 mm/shmem.c:606 shmem_getpage_gfp+0xb49/0x1360 mm/shmem.c:1804 shmem_fault+0x85/0x220 mm/shmem.c:2000 __do_fault+0x23/0xa4 mm/memory.c:3206 do_read_fault mm/memory.c:3616 [inline] do_fault mm/memory.c:3716 [inline] handle_pte_fault mm/memory.c:3947 [inline] __handle_mm_fault+0x10b5/0x1930 mm/memory.c:4071 handle_mm_fault+0x215/0x450 mm/memory.c:4108 __do_page_fault+0x337/0x6b0 arch/x86/mm/fault.c:1429 do_page_fault+0x52/0x330 arch/x86/mm/fault.c:1504 page_fault+0x2c/0x60 arch/x86/entry/entry_64.S:1243 RIP: 0010:__get_user_8+0x1b/0x25 arch/x86/lib/getuser.S:85 RSP: 0018:ffffc90006e17ea8 EFLAGS: 00010287 RAX: 000000002000600f RBX: 0000000020006008 RCX: ffffffff81393ea8 RDX: ffff8801e4f18180 RSI: ffffc90003ea9000 RDI: 0000000000000286 RBP: ffffc90006e17ef0 R08: 0000000000000000 R09: ffffffff81393e52 R10: ffffc90006e17e10 R11: 0000000000000000 R12: 0000000000000001 R13: ffffc90006e17f18 R14: 0000000020006000 R15: 0000000000000080 SYSC_mbind mm/mempolicy.c:1354 [inline] SyS_mbind+0x6d/0xc0 mm/mempolicy.c:1339 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007f58659e1c58 EFLAGS: 00000212 ORIG_RAX: 00000000000000ed RAX: ffffffffffffffda RBX: 00007f58659e1aa0 RCX: 0000000000452a39 RDX: 0000000000000000 RSI: 0000000000004000 RDI: 0000000020004000 RBP: 00007f58659e1a90 R08: 0000000000000080 R09: 0000000000000002 R10: 0000000020006000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007f58659e1bc8 R14: 00000000004b75fb R15: 0000000000000000 nla_parse: 12 callbacks suppressed netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. sctp: [Deprecated]: syz-executor7 (pid 7513) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 7513) Use of int in maxseg socket option. Use struct sctp_assoc_value instead audit: type=1326 audit(1513156765.188:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7765 comm="syz-executor7" exe="/root/syz-executor7" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x0 audit: type=1326 audit(1513156765.318:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7765 comm="syz-executor7" exe="/root/syz-executor7" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x0 QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl device lo entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl IPv6: ADDRCONF(NETDEV_UP): gre0: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8776 Comm: syz-executor5 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x720 mm/slab.c:3546 kmem_cache_zalloc include/linux/slab.h:695 [inline] alloc_mm_slot mm/khugepaged.c:369 [inline] __khugepaged_enter+0x3b/0x180 mm/khugepaged.c:405 khugepaged_enter include/linux/khugepaged.h:54 [inline] do_huge_pmd_anonymous_page+0x629/0x850 mm/huge_memory.c:680 create_huge_pmd mm/memory.c:3838 [inline] __handle_mm_fault+0xc37/0x1930 mm/memory.c:4042 handle_mm_fault+0x215/0x450 mm/memory.c:4108 faultin_page mm/gup.c:502 [inline] __get_user_pages+0x1ff/0x980 mm/gup.c:699 __get_user_pages_locked mm/gup.c:870 [inline] get_user_pages_unlocked+0x16f/0x250 mm/gup.c:990 get_user_pages_fast+0xe6/0x190 mm/gup.c:1819 iov_iter_get_pages+0xf0/0x430 lib/iov_iter.c:1068 bio_iov_iter_get_pages+0x56/0x160 block/bio.c:888 __blkdev_direct_IO_simple+0x15a/0x410 fs/block_dev.c:220 blkdev_direct_IO+0x474/0x4d0 fs/block_dev.c:428 generic_file_read_iter+0xe9/0xdb0 mm/filemap.c:2343 blkdev_read_iter+0x55/0x80 fs/block_dev.c:1913 call_read_iter include/linux/fs.h:1770 [inline] new_sync_read fs/read_write.c:401 [inline] __vfs_read+0x158/0x1d0 fs/read_write.c:413 vfs_read+0xce/0x1c0 fs/read_write.c:447 SYSC_read fs/read_write.c:573 [inline] SyS_read+0x57/0xd0 fs/read_write.c:566 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007fa8708d0c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452a39 RDX: 0000000000000200 RSI: 0000000020a00800 RDI: 0000000000000013 RBP: 000000000000041d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f4358 R13: 0000000000000014 R14: 0000000000758080 R15: ffffffffffffffff kvm: vcpu 0: requested 68374 ns lapic timer period limited to 500000 ns kvm: vcpu 0: requested 68374 ns lapic timer period limited to 500000 ns FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8893 Comm: syz-executor7 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc_node mm/slab.c:3293 [inline] kmem_cache_alloc_node+0x56/0x730 mm/slab.c:3636 create_task_io_context+0x35/0x170 block/blk-ioc.c:271 create_io_context block/blk.h:291 [inline] generic_make_request_checks+0xa80/0xd40 block/blk-core.c:2199 generic_make_request+0x30/0x500 block/blk-core.c:2257 submit_bio+0x9a/0x180 block/blk-core.c:2411 __blkdev_direct_IO_simple+0x1cd/0x410 fs/block_dev.c:234 blkdev_direct_IO+0x474/0x4d0 fs/block_dev.c:428 generic_file_read_iter+0xe9/0xdb0 mm/filemap.c:2343 blkdev_read_iter+0x55/0x80 fs/block_dev.c:1913 call_read_iter include/linux/fs.h:1770 [inline] new_sync_read fs/read_write.c:401 [inline] __vfs_read+0x158/0x1d0 fs/read_write.c:413 vfs_read+0xce/0x1c0 fs/read_write.c:447 SYSC_read fs/read_write.c:573 [inline] SyS_read+0x57/0xd0 fs/read_write.c:566 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007f686ced7c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452a39 RDX: 0000000000000200 RSI: 0000000020f06000 RDI: 0000000000000013 RBP: 000000000000041d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f4358 R13: 0000000000000014 R14: 0000000000758080 R15: ffffffffffffffff FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 9008 Comm: syz-executor0 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 audit: type=1326 audit(1513156767.917:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9020 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x0 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc_node mm/slab.c:3293 [inline] kmem_cache_alloc_node+0x56/0x730 mm/slab.c:3636 netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. __alloc_skb+0x61/0x220 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:983 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1180 [inline] netlink_sendmsg+0x37e/0x470 net/netlink/af_netlink.c:1872 sock_sendmsg_nosec net/socket.c:636 [inline] sock_sendmsg+0x51/0x70 net/socket.c:646 sock_write_iter+0xa4/0x100 net/socket.c:915 call_write_iter include/linux/fs.h:1776 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x15b/0x1e0 fs/read_write.c:482 vfs_write+0xf0/0x230 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0x57/0xd0 fs/read_write.c:581 audit: type=1326 audit(1513156767.917:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9020 comm="syz-executor5" exe="/root/syz-executor5" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452a39 code=0x0 netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007fa429895c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007fa429895aa0 RCX: 0000000000452a39 RDX: 000000000000001f RSI: 000000002007a000 RDI: 0000000000000015 RBP: 00007fa429895a90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007fa429895bc8 R14: 00000000004b75fb R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. CPU: 1 PID: 9050 Comm: syz-executor0 Not tainted 4.15.0-rc3-next-20171213+ #66 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xe9/0x14b lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x1e5/0x220 lib/fault-inject.c:149 should_failslab+0x73/0x90 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc_node mm/slab.c:3293 [inline] kmem_cache_alloc_node_trace+0x5a/0x720 mm/slab.c:3655 __do_kmalloc_node mm/slab.c:3675 [inline] __kmalloc_node_track_caller+0x2c/0x40 mm/slab.c:3690 __kmalloc_reserve.isra.41+0x41/0xb0 net/core/skbuff.c:137 __alloc_skb+0x92/0x220 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:983 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1180 [inline] netlink_sendmsg+0x37e/0x470 net/netlink/af_netlink.c:1872 sock_sendmsg_nosec net/socket.c:636 [inline] sock_sendmsg+0x51/0x70 net/socket.c:646 sock_write_iter+0xa4/0x100 net/socket.c:915 call_write_iter include/linux/fs.h:1776 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x15b/0x1e0 fs/read_write.c:482 vfs_write+0xf0/0x230 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0x57/0xd0 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452a39 RSP: 002b:00007fa429895c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007fa429895aa0 RCX: 0000000000452a39 RDX: 000000000000001f RSI: 000000002007a000 RDI: 0000000000000015 RBP: 00007fa429895a90 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b75fb R13: 00007fa429895bc8 R14: 00000000004b75fb R15: 0000000000000000 netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'.