RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007fb451955ca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd13d43aaf R14: 00007fb4519569c0 R15: 000000000078bf0c ================================ WARNING: inconsistent lock state 4.14.190-syzkaller #0 Not tainted -------------------------------- inconsistent {IN-SOFTIRQ-W} -> {SOFTIRQ-ON-W} usage. syz-executor.1/16798 [HC0[0]:SC0[0]:HE1:SE1] takes: (slock-AF_BLUETOOTH-BTPROTO_SCO){+.?.}, at: [] spin_lock include/linux/spinlock.h:317 [inline] (slock-AF_BLUETOOTH-BTPROTO_SCO){+.?.}, at: [] sco_conn_del+0xb0/0x1e0 net/bluetooth/sco.c:175 {IN-SOFTIRQ-W} state was registered at: lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:152 spin_lock include/linux/spinlock.h:317 [inline] sco_sock_timeout+0x1a/0x150 net/bluetooth/sco.c:82 call_timer_fn+0x14a/0x650 kernel/time/timer.c:1279 expire_timers+0x232/0x4d0 kernel/time/timer.c:1318 __run_timers kernel/time/timer.c:1636 [inline] run_timer_softirq+0x1d5/0x5a0 kernel/time/timer.c:1649 __do_softirq+0x254/0xa1d kernel/softirq.c:288 invoke_softirq kernel/softirq.c:368 [inline] irq_exit+0x193/0x240 kernel/softirq.c:409 exiting_irq arch/x86/include/asm/apic.h:648 [inline] smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1102 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 irq event stamp: 18689 hardirqs last enabled at (18689): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:168 [inline] hardirqs last enabled at (18689): [] _raw_spin_unlock_irq+0x24/0x80 kernel/locking/spinlock.c:200 hardirqs last disabled at (18688): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:126 [inline] hardirqs last disabled at (18688): [] _raw_spin_lock_irq+0x35/0x80 kernel/locking/spinlock.c:168 softirqs last enabled at (6124): [] __do_softirq+0x6ab/0xa1d kernel/softirq.c:314 softirqs last disabled at (6085): [] invoke_softirq kernel/softirq.c:368 [inline] softirqs last disabled at (6085): [] irq_exit+0x193/0x240 kernel/softirq.c:409 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(slock-AF_BLUETOOTH-BTPROTO_SCO); lock(slock-AF_BLUETOOTH-BTPROTO_SCO); *** DEADLOCK *** 3 locks held by syz-executor.1/16798: #0: (&hdev->req_lock){+.+.}, at: [] hci_dev_do_close+0xfd/0xc50 net/bluetooth/hci_core.c:1576 #1: (&hdev->lock){+.+.}, at: [] hci_dev_do_close+0x210/0xc50 net/bluetooth/hci_core.c:1607 #2: (hci_cb_list_lock){+.+.}, at: [] hci_disconn_cfm include/net/bluetooth/hci_core.h:1223 [inline] #2: (hci_cb_list_lock){+.+.}, at: [] hci_conn_hash_flush+0xc7/0x220 net/bluetooth/hci_conn.c:1376 stack backtrace: CPU: 1 PID: 16798 Comm: syz-executor.1 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 print_usage_bug.cold+0x42e/0x570 kernel/locking/lockdep.c:2589 valid_state kernel/locking/lockdep.c:2602 [inline] mark_lock_irq kernel/locking/lockdep.c:2796 [inline] mark_lock+0xb4d/0x1050 kernel/locking/lockdep.c:3194 mark_irqflags kernel/locking/lockdep.c:3090 [inline] __lock_acquire+0xd5c/0x3f20 kernel/locking/lockdep.c:3448 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:152 spin_lock include/linux/spinlock.h:317 [inline] sco_conn_del+0xb0/0x1e0 net/bluetooth/sco.c:175 sco_disconn_cfm net/bluetooth/sco.c:1134 [inline] sco_disconn_cfm+0x50/0x60 net/bluetooth/sco.c:1127 hci_disconn_cfm include/net/bluetooth/hci_core.h:1226 [inline] hci_conn_hash_flush+0x114/0x220 net/bluetooth/hci_conn.c:1376 hci_dev_do_close+0x542/0xc50 net/bluetooth/hci_core.c:1620 hci_unregister_dev+0x170/0x7a0 net/bluetooth/hci_core.c:3191 vhci_release+0x70/0xe0 drivers/bluetooth/hci_vhci.c:354 __fput+0x25f/0x7a0 fs/file_table.c:210 task_work_run+0x11f/0x190 kernel/task_work.c:113 exit_task_work include/linux/task_work.h:22 [inline] do_exit+0xa08/0x27f0 kernel/exit.c:865 do_group_exit+0x100/0x2e0 kernel/exit.c:962 get_signal+0x38d/0x1ca0 kernel/signal.c:2423 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:814 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007f526ab36cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 000000000078bfa8 RCX: 000000000045cc79 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000078bfa8 RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bfac R13: 00007fff513495bf R14: 00007f526ab379c0 R15: 000000000078bfac FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 21529 Comm: syz-executor.3 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x25a/0x400 mm/slab.c:3659 kmalloc_node include/linux/slab.h:526 [inline] kzalloc_node include/linux/slab.h:672 [inline] __get_vm_area_node+0xed/0x340 mm/vmalloc.c:1407 __vmalloc_node_range mm/vmalloc.c:1762 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0xfe/0x1d0 mm/vmalloc.c:1824 do_replace+0x181/0x2c0 net/bridge/netfilter/ebtables.c:1107 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007f2b4fb2dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f2b4fb2dca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000004 R13: 00007fff24be207f R14: 00007f2b4fb2e9c0 R15: 000000000078bf0c syz-executor.3: vmalloc: allocation failure: 816 bytes, mode:0x15000c0(GFP_KERNEL_ACCOUNT), nodemask=(null) syz-executor.3 cpuset=/ mems_allowed=0-1 CPU: 1 PID: 21529 Comm: syz-executor.3 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1cc mm/page_alloc.c:3249 __vmalloc_node_range mm/vmalloc.c:1789 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0x170/0x1d0 mm/vmalloc.c:1824 do_replace+0x181/0x2c0 net/bridge/netfilter/ebtables.c:1107 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007f2b4fb2dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f2b4fb2dca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000004 R13: 00007fff24be207f R14: 00007f2b4fb2e9c0 R15: 000000000078bf0c batman_adv: batadv0: Interface deactivated: batadv_slave_0 batman_adv: batadv0: Removing interface: batadv_slave_0 batman_adv: batadv0: Interface deactivated: batadv_slave_1 batman_adv: batadv0: Removing interface: batadv_slave_1 device bridge_slave_1 left promiscuous mode bridge0: port 2(bridge_slave_1) entered disabled state device bridge_slave_0 left promiscuous mode bridge0: port 1(bridge_slave_0) entered disabled state device veth1_macvtap left promiscuous mode device veth0_macvtap left promiscuous mode device veth1_vlan left promiscuous mode device veth0_vlan left promiscuous mode device hsr_slave_1 left promiscuous mode device hsr_slave_0 left promiscuous mode team0 (unregistering): Port device team_slave_1 removed team0 (unregistering): Port device team_slave_0 removed bond0 (unregistering): Releasing backup interface bond_slave_1 bond0 (unregistering): Releasing backup interface bond_slave_0 bond0 (unregistering): Released all slaves IPVS: ftp: loaded support on port[0] = 21 chnl_net:caif_netlink_parms(): no params data found bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered disabled state device bridge_slave_0 entered promiscuous mode bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered disabled state device bridge_slave_1 entered promiscuous mode bond0: Enslaving bond_slave_0 as an active interface with an up link bond0: Enslaving bond_slave_1 as an active interface with an up link IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready team0: Port device team_slave_0 added IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready team0: Port device team_slave_1 added batman_adv: batadv0: Adding interface: batadv_slave_0 batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active batman_adv: batadv0: Adding interface: batadv_slave_1 batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready device hsr_slave_0 entered promiscuous mode device hsr_slave_1 entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered forwarding state bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered forwarding state IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready 8021q: adding VLAN 0 to HW filter on device bond0 IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready bridge0: port 1(bridge_slave_0) entered disabled state bridge0: port 2(bridge_slave_1) entered disabled state IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 8021q: adding VLAN 0 to HW filter on device team0 IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered forwarding state IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered forwarding state hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 8021q: adding VLAN 0 to HW filter on device batadv0 IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready device veth0_vlan entered promiscuous mode device veth1_vlan entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready device veth0_macvtap entered promiscuous mode device veth1_macvtap entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready batman_adv: batadv0: Interface activated: batadv_slave_0 IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready batman_adv: batadv0: Interface activated: batadv_slave_1 IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 21795 Comm: syz-executor.0 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x25a/0x400 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node+0x38/0x70 mm/slab.c:3689 kmalloc_node include/linux/slab.h:530 [inline] __vmalloc_area_node+0x510/0x680 mm/vmalloc.c:1691 __vmalloc_node_range mm/vmalloc.c:1767 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0x120/0x1d0 mm/vmalloc.c:1824 do_replace+0x135/0x2c0 net/bridge/netfilter/ebtables.c:1099 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007fb451955c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007fb451955ca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffd13d43aaf R14: 00007fb4519569c0 R15: 000000000078bf0c FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 21799 Comm: syz-executor.3 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x25a/0x400 mm/slab.c:3659 kmalloc_node include/linux/slab.h:526 [inline] alloc_vmap_area+0xf0/0x7c0 mm/vmalloc.c:420 __get_vm_area_node+0x126/0x340 mm/vmalloc.c:1414 __vmalloc_node_range mm/vmalloc.c:1762 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0xfe/0x1d0 mm/vmalloc.c:1824 do_replace+0x181/0x2c0 net/bridge/netfilter/ebtables.c:1107 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007f2b4fb2dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f2b4fb2dca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000005 R13: 00007fff24be207f R14: 00007f2b4fb2e9c0 R15: 000000000078bf0c syz-executor.3: vmalloc: allocation failure: 816 bytes, mode:0x15000c0(GFP_KERNEL_ACCOUNT), nodemask=(null) syz-executor.3 cpuset=/ mems_allowed=0-1 CPU: 1 PID: 21799 Comm: syz-executor.3 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1cc mm/page_alloc.c:3249 __vmalloc_node_range mm/vmalloc.c:1789 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0x170/0x1d0 mm/vmalloc.c:1824 do_replace+0x181/0x2c0 net/bridge/netfilter/ebtables.c:1107 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007f2b4fb2dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f2b4fb2dca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000005 R13: 00007fff24be207f R14: 00007f2b4fb2e9c0 R15: 000000000078bf0c warn_alloc_show_mem: 2 callbacks suppressed Mem-Info: active_anon:309758 inactive_anon:8688 isolated_anon:0 active_file:19265 inactive_file:79114 isolated_file:0 unevictable:0 dirty:136 writeback:0 unstable:0 slab_reclaimable:21228 slab_unreclaimable:136215 mapped:61143 shmem:11527 pagetables:23494 bounce:0 free:918335 free_pcp:453 free_cma:0 Node 0 active_anon:1164952kB inactive_anon:34728kB active_file:74284kB inactive_file:316304kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:244568kB dirty:496kB writeback:0kB shmem:46084kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 845824kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 1 active_anon:74080kB inactive_anon:24kB active_file:2776kB inactive_file:152kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:4kB dirty:48kB writeback:0kB shmem:24kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no Node 0 DMA free:11076kB min:220kB low:272kB high:324kB active_anon:1032kB inactive_anon:0kB active_file:36kB inactive_file:4kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:96kB pagetables:712kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 2557 2557 2557 2557 Node 0 DMA32 free:71632kB min:36272kB low:45340kB high:54408kB active_anon:1163920kB inactive_anon:34728kB active_file:74248kB inactive_file:316300kB unevictable:0kB writepending:496kB present:3129332kB managed:2621196kB mlocked:0kB kernel_stack:16800kB pagetables:35176kB bounce:0kB free_pcp:616kB local_pcp:344kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 Normal free:0kB min:4kB low:4kB high:4kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:332kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 1 Normal free:3590632kB min:53612kB low:67012kB high:80412kB active_anon:74080kB inactive_anon:24kB active_file:2776kB inactive_file:152kB unevictable:0kB writepending:48kB present:3932160kB managed:3870192kB mlocked:0kB kernel_stack:17792kB pagetables:58088kB bounce:0kB free_pcp:1188kB local_pcp:548kB free_cma:0kB lowmem_reserve[]: 0 0 0 0 0 Node 0 DMA: 33*4kB (UM) 34*8kB (UM) 9*16kB (UME) 15*32kB (UME) 7*64kB (UM) 3*128kB (UME) 2*256kB (UE) 3*512kB (UME) 1*1024kB (E) 3*2048kB (ME) 0*4096kB = 11076kB Node 0 DMA32: 130*4kB (UME) 877*8kB (UME) 325*16kB (UME) 144*32kB (UME) 54*64kB (UME) 8*128kB (UME) 42*256kB (UME) 18*512kB (UM) 3*1024kB (U) 13*2048kB (M) 0*4096kB = 71488kB Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB Node 1 Normal: 4982*4kB (UM) 2016*8kB (UM) 723*16kB (UM) 440*32kB (UME) 93*64kB (UM) 36*128kB (UM) 14*256kB (UME) 3*512kB (UME) 3*1024kB (ME) 0*2048kB 857*4096kB (M) = 3590728kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 54313 total pagecache pages 0 pages in swap cache Swap cache stats: add 0, delete 0, find 0/0 Free swap = 0kB Total swap = 0kB 1965979 pages RAM 0 pages HighMem/MovableOnly 339072 pages reserved 0 pages cma reserved FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 21817 Comm: syz-executor.0 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2892 [inline] prepare_alloc_pages mm/page_alloc.c:4125 [inline] __alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4173 alloc_pages_current+0x155/0x260 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:520 [inline] __vmalloc_area_node+0x40a/0x680 mm/vmalloc.c:1707 __vmalloc_node_range mm/vmalloc.c:1767 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0x120/0x1d0 mm/vmalloc.c:1824 do_replace+0x135/0x2c0 net/bridge/netfilter/ebtables.c:1099 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007fb451955c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007fb451955ca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000003 R13: 00007ffd13d43aaf R14: 00007fb4519569c0 R15: 000000000078bf0c syz-executor.0: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x15000c0(GFP_KERNEL_ACCOUNT), nodemask=(null) syz-executor.0 cpuset=/ mems_allowed=0-1 CPU: 1 PID: 21817 Comm: syz-executor.0 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1cc mm/page_alloc.c:3249 __vmalloc_area_node+0x48a/0x680 mm/vmalloc.c:1726 __vmalloc_node_range mm/vmalloc.c:1767 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0x120/0x1d0 mm/vmalloc.c:1824 do_replace+0x135/0x2c0 net/bridge/netfilter/ebtables.c:1099 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007fb451955c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007fb451955ca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000003 R13: 00007ffd13d43aaf R14: 00007fb4519569c0 R15: 000000000078bf0c FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 21819 Comm: syz-executor.3 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x25a/0x400 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node+0x38/0x70 mm/slab.c:3689 kmalloc_node include/linux/slab.h:530 [inline] __vmalloc_area_node+0x510/0x680 mm/vmalloc.c:1691 __vmalloc_node_range mm/vmalloc.c:1767 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0x120/0x1d0 mm/vmalloc.c:1824 do_replace+0x181/0x2c0 net/bridge/netfilter/ebtables.c:1107 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007f2b4fb2dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f2b4fb2dca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000006 R13: 00007fff24be207f R14: 00007f2b4fb2e9c0 R15: 000000000078bf0c FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 21849 Comm: syz-executor.3 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2892 [inline] prepare_alloc_pages mm/page_alloc.c:4125 [inline] __alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4173 alloc_pages_current+0x155/0x260 mm/mempolicy.c:2113 alloc_pages include/linux/gfp.h:520 [inline] __vmalloc_area_node+0x40a/0x680 mm/vmalloc.c:1707 __vmalloc_node_range mm/vmalloc.c:1767 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0x120/0x1d0 mm/vmalloc.c:1824 do_replace+0x181/0x2c0 net/bridge/netfilter/ebtables.c:1107 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007f2b4fb2dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f2b4fb2dca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000007 R13: 00007fff24be207f R14: 00007f2b4fb2e9c0 R15: 000000000078bf0c syz-executor.3: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x15000c0(GFP_KERNEL_ACCOUNT), nodemask=(null) syz-executor.3 cpuset=/ mems_allowed=0-1 CPU: 0 PID: 21849 Comm: syz-executor.3 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 warn_alloc.cold+0x96/0x1cc mm/page_alloc.c:3249 __vmalloc_area_node+0x48a/0x680 mm/vmalloc.c:1726 __vmalloc_node_range mm/vmalloc.c:1767 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0x120/0x1d0 mm/vmalloc.c:1824 do_replace+0x181/0x2c0 net/bridge/netfilter/ebtables.c:1107 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007f2b4fb2dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f2b4fb2dca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000007 R13: 00007fff24be207f R14: 00007f2b4fb2e9c0 R15: 000000000078bf0c FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 21848 Comm: syz-executor.0 Not tainted 4.14.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x25a/0x400 mm/slab.c:3659 kmalloc_node include/linux/slab.h:526 [inline] kzalloc_node include/linux/slab.h:672 [inline] __get_vm_area_node+0xed/0x340 mm/vmalloc.c:1407 __vmalloc_node_range mm/vmalloc.c:1762 [inline] __vmalloc_node mm/vmalloc.c:1818 [inline] __vmalloc+0xfe/0x1d0 mm/vmalloc.c:1824 do_replace+0x181/0x2c0 net/bridge/netfilter/ebtables.c:1107 do_ebt_set_ctl+0xcb/0xf0 net/bridge/netfilter/ebtables.c:1483 nf_sockopt net/netfilter/nf_sockopt.c:106 [inline] nf_setsockopt+0x5f/0xb0 net/netfilter/nf_sockopt.c:115 ip_setsockopt net/ipv4/ip_sockglue.c:1255 [inline] ip_setsockopt+0x94/0xb0 net/ipv4/ip_sockglue.c:1240 udp_setsockopt+0x45/0x80 net/ipv4/udp.c:2451 SYSC_setsockopt net/socket.c:1865 [inline] SyS_setsockopt+0x110/0x1e0 net/socket.c:1844 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45cc79 RSP: 002b:00007fb451955c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 000000000002ce80 RCX: 000000000045cc79 RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007fb451955ca0 R08: 00000000000003a8 R09: 0000000000000000 R10: 0000000020000400 R11: 0000000000000246 R12: 0000000000000004 R13: 00007ffd13d43aaf R14: 00007fb4519569c0 R15: 000000000078bf0c syz-executor.0: vmalloc: allocation failure: 816 bytes, mode:0x15000c0(GFP_KERNEL_ACCOUNT), nodemask=(null) syz-executor.0 cpuset=/ mems_allowed=0-1 CPU: 0 PID: 21848 Comm: syz-executor.0 Not tainted 4.14.190-syzkaller #0