bisecting fixing commit since 106fa147d3daa58d2c1ae5f41a29d07036fe7d0a building syzkaller on 2c2b926cb74478a86014f40564517f7d424dc899 testing commit 106fa147d3daa58d2c1ae5f41a29d07036fe7d0a with gcc (GCC) 8.4.1 20210217 kernel signature: 26c9200a3ea4c6ef42f0263daac485bc39e5b89579f1501346350bc599b42387 all runs: crashed: WARNING in __vm_enough_memory testing current HEAD 3c8c23092588a23bf1856a64f58c37f477a413be testing commit 3c8c23092588a23bf1856a64f58c37f477a413be with gcc (GCC) 8.4.1 20210217 kernel signature: 95543e3c3df31710c1bd6567f77b958c81f9785fb3dbb58ea445f9de6eb346e9 all runs: crashed: WARNING in __vm_enough_memory revisions tested: 2, total time: 34m49.953318735s (build: 27m28.952812744s, test: 6m35.389888916s) the crash still happens on HEAD commit msg: Linux 4.19.190 crash: WARNING in __vm_enough_memory batman_adv: batadv0: Interface activated: batadv_slave_1 IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready ------------[ cut here ]------------ memory commitment underflow WARNING: CPU: 0 PID: 7176 at mm/util.c:670 __vm_enough_memory+0x3c3/0x4b0 mm/util.c:668 Modules linked in: CPU: 0 PID: 7176 Comm: modprobe Not tainted 4.19.190-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__vm_enough_memory+0x3c3/0x4b0 mm/util.c:668 Code: ea 02 48 29 d0 e9 3b ff ff ff 80 3d b6 e1 9c 07 00 0f 85 ec fc ff ff 48 c7 c7 e0 16 31 87 c6 05 a2 e1 9c 07 01 e8 25 1c 3f 05 <0f> 0b 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 0f b6 14 RSP: 0018:ffff8881d8cffa40 EFLAGS: 00010282 RAX: 0000000000000000 RBX: ffffffff8860e300 RCX: 1ffff1103b2a6dea RDX: 1ffffffff10a3f71 RSI: ffff8881d9536f30 RDI: 0000000000000286 RBP: ffff8881d8cffa78 R08: ffff8881d9536f50 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000020 R13: ffff8881cf0bcf80 R14: 0000000000000001 R15: fff8000000019d0c FS: 0000000000000000(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffd79fb1eb0 CR3: 00000001db270006 CR4: 00000000001606f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: security_vm_enough_memory_mm+0x72/0x90 security/security.c:334 acct_stack_growth mm/mmap.c:2284 [inline] expand_downwards+0x421/0xa30 mm/mmap.c:2426 expand_stack+0x9/0x10 mm/mmap.c:2501 setup_arg_pages+0x4ab/0x720 fs/exec.c:790 load_elf_binary+0xa84/0x5120 fs/binfmt_elf.c:887 search_binary_handler fs/exec.c:1668 [inline] search_binary_handler+0x12b/0x630 fs/exec.c:1646 exec_binprm fs/exec.c:1710 [inline] __do_execve_file.isra.12+0x1070/0x1d30 fs/exec.c:1832 do_execveat_common fs/exec.c:1879 [inline] do_execve+0x20/0x30 fs/exec.c:1896 call_usermodehelper_exec_async+0x49b/0x630 kernel/umh.c:116 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 irq event stamp: 286 hardirqs last enabled at (285): [] vprintk_emit+0x34f/0x540 kernel/printk/printk.c:1949 hardirqs last disabled at (286): [] trace_hardirqs_off_thunk+0x1a/0x1c softirqs last enabled at (278): [] __do_softirq+0x62d/0x919 kernel/softirq.c:318 softirqs last disabled at (189): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (189): [] irq_exit+0x17f/0x1c0 kernel/softirq.c:412 ---[ end trace 57c8c069eed6bbd9 ]---