RBP: 00000000004bbc86 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007ffec787fe0f R14: 00007ff2bfed6300 R15: 0000000000022000 WARNING: can't dereference registers at ffff8880a1740528 for ip common_interrupt+0x93/0x93 arch/x86/entry/entry_64.S:576 Unknown ioctl 1075323139 Unknown ioctl 1075323139 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 26454 Comm: syz-executor.0 Not tainted 4.14.222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 __d_alloc+0x2a/0xa20 fs/dcache.c:1623 d_alloc+0x46/0x240 fs/dcache.c:1710 d_alloc_parallel+0xd6/0x16b0 fs/dcache.c:2492 lookup_slow+0x175/0x400 fs/namei.c:1679 walk_component+0x6a1/0xbc0 fs/namei.c:1825 link_path_walk+0x823/0x10a0 fs/namei.c:2154 path_openat+0x15e/0x2970 fs/namei.c:3568 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4194e4 RSP: 002b:00007ff2bfeb50b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 00000000004194e4 RDX: 0000000000000000 RSI: 00000000004bbc86 RDI: 00000000ffffff9c RBP: 00000000004bbc86 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007ffec787fe0f R14: 00007ff2bfeb5300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. CPU: 0 PID: 26495 Comm: syz-executor.0 Not tainted 4.14.222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 proc_alloc_inode+0x18/0x1a0 fs/proc/inode.c:62 alloc_inode+0x5d/0x170 fs/inode.c:210 new_inode_pseudo fs/inode.c:899 [inline] new_inode+0x1d/0xf0 fs/inode.c:928 proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1762 proc_pident_instantiate+0x78/0x280 fs/proc/base.c:2448 proc_pident_lookup+0x181/0x200 fs/proc/base.c:2497 lookup_slow+0x20a/0x400 fs/namei.c:1696 walk_component+0x6a1/0xbc0 fs/namei.c:1825 link_path_walk+0x823/0x10a0 fs/namei.c:2154 path_openat+0x15e/0x2970 fs/namei.c:3568 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4194e4 RSP: 002b:00007ff2bfed60b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004194e4 RDX: 0000000000000000 RSI: 00000000004bbc86 RDI: 00000000ffffff9c RBP: 00000000004bbc86 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007ffec787fe0f R14: 00007ff2bfed6300 R15: 0000000000022000 audit: type=1804 audit(1614355685.418:94): pid=26514 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir495036113/syzkaller.CBaTl1/1190/file0" dev="sda1" ino=16097 res=1 audit: type=1804 audit(1614355685.478:95): pid=26521 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir495036113/syzkaller.CBaTl1/1190/file0" dev="sda1" ino=16097 res=1 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 26547 Comm: syz-executor.0 Not tainted 4.14.222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 __d_alloc+0x2a/0xa20 fs/dcache.c:1623 d_alloc+0x46/0x240 fs/dcache.c:1710 d_alloc_parallel+0xd6/0x16b0 fs/dcache.c:2492 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. lookup_open+0x462/0x1750 fs/namei.c:3154 do_last fs/namei.c:3334 [inline] path_openat+0x14bb/0x2970 fs/namei.c:3569 audit: type=1804 audit(1614355685.828:96): pid=26555 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir495036113/syzkaller.CBaTl1/1192/bus" dev="sda1" ino=15826 res=1 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4194e4 RSP: 002b:00007ff2bfed60b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 audit: type=1804 audit(1614355685.898:97): pid=26557 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir495036113/syzkaller.CBaTl1/1192/bus" dev="sda1" ino=15826 res=1 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004194e4 RDX: 0000000000000000 RSI: 00000000004bbc86 RDI: 00000000ffffff9c RBP: 00000000004bbc86 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007ffec787fe0f R14: 00007ff2bfed6300 R15: 0000000000022000 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 26601 Comm: syz-executor.0 Not tainted 4.14.222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 proc_alloc_inode+0x18/0x1a0 fs/proc/inode.c:62 alloc_inode+0x5d/0x170 fs/inode.c:210 new_inode_pseudo fs/inode.c:899 [inline] new_inode+0x1d/0xf0 fs/inode.c:928 proc_pid_make_inode+0x22/0x230 fs/proc/base.c:1762 proc_ns_instantiate+0x47/0x100 fs/proc/namespaces.c:97 proc_ns_dir_lookup+0x1a2/0x250 fs/proc/namespaces.c:170 lookup_open+0x5c4/0x1750 fs/namei.c:3220 do_last fs/namei.c:3334 [inline] path_openat+0x14bb/0x2970 fs/namei.c:3569 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4194e4 RSP: 002b:00007ff2bfed60b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004194e4 RDX: 0000000000000000 RSI: 00000000004bbc86 RDI: 00000000ffffff9c RBP: 00000000004bbc86 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007ffec787fe0f R14: 00007ff2bfed6300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 26643 Comm: syz-executor.0 Not tainted 4.14.222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 alloc_inode+0xa0/0x170 fs/inode.c:212 new_inode_pseudo+0x14/0xe0 fs/inode.c:899 __ns_get_path+0xf8/0x6f0 fs/nsfs.c:76 ns_get_path+0x55/0xa0 fs/nsfs.c:117 proc_ns_get_link+0x12e/0x160 fs/proc/namespaces.c:55 get_link fs/namei.c:1099 [inline] trailing_symlink+0x59c/0x750 fs/namei.c:2283 path_openat+0x795/0x2970 fs/namei.c:3571 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4194e4 RSP: 002b:00007ff2bfed60b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004194e4 RDX: 0000000000000000 RSI: 00000000004bbc86 RDI: 00000000ffffff9c RBP: 00000000004bbc86 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007ffec787fe0f R14: 00007ff2bfed6300 R15: 0000000000022000 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 26691 Comm: syz-executor.0 Not tainted 4.14.222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 __d_alloc+0x2a/0xa20 fs/dcache.c:1623 __ns_get_path+0x2df/0x6f0 fs/nsfs.c:88 ns_get_path+0x55/0xa0 fs/nsfs.c:117 proc_ns_get_link+0x12e/0x160 fs/proc/namespaces.c:55 get_link fs/namei.c:1099 [inline] trailing_symlink+0x59c/0x750 fs/namei.c:2283 path_openat+0x795/0x2970 fs/namei.c:3571 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4194e4 RSP: 002b:00007ff2bfed60b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004194e4 RDX: 0000000000000000 RSI: 00000000004bbc86 RDI: 00000000ffffff9c RBP: 00000000004bbc86 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 R13: 00007ffec787fe0f R14: 00007ff2bfed6300 R15: 0000000000022000 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. print_req_error: I/O error, dev loop4, sector 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 26748 Comm: syz-executor.0 Not tainted 4.14.222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 create_nsproxy kernel/nsproxy.c:53 [inline] create_new_namespaces+0x30/0x720 kernel/nsproxy.c:71 SYSC_setns kernel/nsproxy.c:254 [inline] SyS_setns+0x184/0x2b0 kernel/nsproxy.c:237 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4674d7 RSP: 002b:00007ff2bfed6128 EFLAGS: 00000246 ORIG_RAX: 0000000000000134 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004674d7 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000000ef RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffec787fe0f R14: 00007ff2bfed6300 R15: 0000000000022000 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 26782 Comm: syz-executor.0 Not tainted 4.14.222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 sock_alloc_inode+0x19/0x250 net/socket.c:251 alloc_inode+0x5d/0x170 fs/inode.c:210 new_inode_pseudo+0x14/0xe0 fs/inode.c:899 sock_alloc+0x3c/0x270 net/socket.c:569 __sock_create+0x8a/0x620 net/socket.c:1239 sock_create net/socket.c:1315 [inline] SYSC_socket net/socket.c:1345 [inline] SyS_socket+0xd1/0x1b0 net/socket.c:1325 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465ef9 RSP: 002b:00007ff2bfed6128 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000009 RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffec787fe0f R14: 00007ff2bfed6300 R15: 0000000000022000 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 socket: no more sockets orangefs_mount: mount request failed with -4 orangefs_mount: mount request failed with -4 print_req_error: I/O error, dev loop2, sector 0 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 nla_parse: 1 callbacks suppressed netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. CPU: 0 PID: 26828 Comm: syz-executor.0 Not tainted 4.14.222-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x6d/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] sk_prot_alloc+0x1ba/0x290 net/core/sock.c:1467 sk_alloc+0x36/0xcd0 net/core/sock.c:1521 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. x25_alloc_socket+0x29/0x370 net/x25/af_x25.c:519 x25_create+0x84/0x520 net/x25/af_x25.c:554 __sock_create+0x303/0x620 net/socket.c:1275 sock_create net/socket.c:1315 [inline] SYSC_socket net/socket.c:1345 [inline] SyS_socket+0xd1/0x1b0 net/socket.c:1325 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465ef9 RSP: 002b:00007ff2bfed6128 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000009 RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffec787fe0f R14: 00007ff2bfed6300 R15: 0000000000022000 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 audit: type=1804 audit(1614355690.408:98): pid=26850 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir985432839/syzkaller.qT6h52/1106/file0/file0" dev="sda1" ino=16241 res=1 squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 print_req_error: I/O error, dev loop4, sector 0 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'.