WARNING: can't dereference registers at 000000000000093a for ip entry_SYSCALL_64_after_hwframe+0x46/0xbb VFS: Found a V7 FS (block size = 512) on device loop2 print_req_error: I/O error, dev loop1, sector 0 audit: type=1804 audit(1639131300.658:2): pid=9609 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir136284962/syzkaller.IE8xWF/4/cgroup.controllers" dev="sda1" ino=13912 res=1 Restarting kernel threads ... done. EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) EXT4-fs (loop3): orphan cleanup on readonly fs L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. EXT4-fs error (device loop3): ext4_orphan_get:1265: comm syz-executor.3: bad orphan inode 33554432 EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue syz-executor.4 (9652) used greatest stack depth: 24416 bytes left EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) EXT4-fs (loop3): orphan cleanup on readonly fs EXT4-fs error (device loop3): ext4_orphan_get:1265: comm syz-executor.3: bad orphan inode 33554432 EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue audit: type=1804 audit(1639131303.758:3): pid=9867 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir707068068/syzkaller.f9A4KR/8/cgroup.controllers" dev="sda1" ino=13901 res=1 audit: type=1804 audit(1639131304.448:4): pid=9878 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir707068068/syzkaller.f9A4KR/8/cgroup.controllers" dev="sda1" ino=13901 res=1 input: syz0 as /devices/virtual/input/input5 input: syz0 as /devices/virtual/input/input6 input: syz0 as /devices/virtual/input/input7 9pnet: p9_errstr2errno: server reported unknown error audit: type=1804 audit(1639131306.759:5): pid=10268 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir707068068/syzkaller.f9A4KR/16/bus" dev="sda1" ino=13994 res=1 EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue audit: type=1804 audit(1639131306.999:6): pid=10308 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir707068068/syzkaller.f9A4KR/16/bus" dev="sda1" ino=13994 res=1 EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue audit: type=1804 audit(1639131307.119:7): pid=10320 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir707068068/syzkaller.f9A4KR/17/bus" dev="sda1" ino=14011 res=1 EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue audit: type=1804 audit(1639131307.379:8): pid=10358 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir707068068/syzkaller.f9A4KR/18/bus" dev="sda1" ino=14011 res=1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 1 PID: 10377 Comm: syz-executor.3 Not tainted 4.14.257-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] kernfs_fop_write+0x2fe/0x440 fs/kernfs/file.c:293 __vfs_write+0xe4/0x630 fs/read_write.c:480 vfs_write+0x17f/0x4d0 fs/read_write.c:544 SYSC_write fs/read_write.c:590 [inline] SyS_write+0xf2/0x210 fs/read_write.c:582 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f5b79077b49 RSP: 002b:00007f5b77bed188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007f5b7918af60 RCX: 00007f5b79077b49 RDX: 0000000000000012 RSI: 0000000020000180 RDI: 0000000000000003 RBP: 00007f5b77bed1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffff4dbd68f R14: 00007f5b77bed300 R15: 0000000000022000 audit: type=1804 audit(1639131307.719:9): pid=10383 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir707068068/syzkaller.f9A4KR/19/bus" dev="sda1" ino=14013 res=1 netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'.