netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. WARNING: can't dereference registers at 000000008a430eef for ip apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. F2FS-fs (loop1): invalid crc value FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 10340 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 __should_failslab+0x115/0x180 mm/failslab.c:32 should_failslab+0x5/0x10 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2ab/0x3c0 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] map_update_elem kernel/bpf/syscall.c:806 [inline] __do_sys_bpf kernel/bpf/syscall.c:2414 [inline] __se_sys_bpf+0x20cc/0x3a20 kernel/bpf/syscall.c:2384 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fe5a33b9639 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe5a192c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fe5a34d9f80 RCX: 00007fe5a33b9639 RDX: 0000000000000020 RSI: 00000000200003c0 RDI: 0000000000000002 RBP: 00007fe5a192c1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd285e361f R14: 00007fe5a192c300 R15: 0000000000022000 F2FS-fs (loop1): Found nat_bits in checkpoint F2FS-fs (loop1): Mounted with checkpoint version = 3651456e FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 10373 Comm: syz-executor.5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 __should_failslab+0x115/0x180 mm/failslab.c:32 should_failslab+0x5/0x10 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node_trace+0x57/0x3b0 mm/slab.c:3666 kmalloc_node include/linux/slab.h:553 [inline] dev_map_update_elem+0x245/0x450 kernel/bpf/devmap.c:460 map_update_elem kernel/bpf/syscall.c:851 [inline] __do_sys_bpf kernel/bpf/syscall.c:2414 [inline] __se_sys_bpf+0x239b/0x3a20 kernel/bpf/syscall.c:2384 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fe5a33b9639 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe5a192c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fe5a34d9f80 RCX: 00007fe5a33b9639 RDX: 0000000000000020 RSI: 00000000200003c0 RDI: 0000000000000002 RBP: 00007fe5a192c1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd285e361f R14: 00007fe5a192c300 R15: 0000000000022000 FAT-fs (loop1): Unrecognized mount option "ķA" or missing value ISOFS: unable to read i-node block netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. XFS (loop1): Invalid superblock magic number netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.