R10: 0000000000000000 R11: 0000000000000202 R12: 00000000200001c0 R13: 00007f7b8c4d2fdc R14: 00007f7b8c4d2fe0 R15: 0000000020020c00 EXT4-fs (loop2): Unrecognized mount option "" or missing value INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 1 PID: 10515 Comm: syz-executor.3 Not tainted 4.14.305-syzkaller #0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 register_lock_class+0x389/0x1180 kernel/locking/lockdep.c:768 __lock_acquire+0x167/0x3f20 kernel/locking/lockdep.c:3378 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 flush_work+0xad/0x770 kernel/workqueue.c:2890 __cancel_work_timer+0x321/0x460 kernel/workqueue.c:2965 smc_close_active+0x7e2/0xbb0 net/smc/smc_close.c:207 smc_release+0x3e1/0x5d0 net/smc/af_smc.c:131 __sock_release+0xcd/0x2b0 net/socket.c:602 sock_close+0x15/0x20 net/socket.c:1139 __fput+0x25f/0x7a0 fs/file_table.c:210 task_work_run+0x11f/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f6e4b56ffab RSP: 002b:00007ffe84379420 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000008 RCX: 00007f6e4b56ffab RDX: 0000000000000000 RSI: 0000001b2e926928 RDI: 0000000000000007 RBP: 00007f6e4b6df980 R08: 0000000000000000 R09: 0000000052900435 R10: 0000000000000000 R11: 0000000000000293 R12: 000000000003505a R13: 00007ffe84379520 R14: 00007f6e4b6de120 R15: 0000000000000032 CPU: 0 PID: 10549 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 shmem_alloc_inode+0x18/0x40 mm/shmem.c:3904 alloc_inode+0x5d/0x170 fs/inode.c:209 new_inode_pseudo fs/inode.c:898 [inline] new_inode+0x1d/0xf0 fs/inode.c:927 shmem_get_inode+0x8b/0x890 mm/shmem.c:2181 __shmem_file_setup.part.0+0x104/0x3c0 mm/shmem.c:4282 F2FS-fs (loop5): Mismatch start address, segment0(512) cp_blkaddr(605) F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (loop5): invalid crc value __shmem_file_setup mm/shmem.c:4264 [inline] shmem_file_setup mm/shmem.c:4331 [inline] SYSC_memfd_create mm/shmem.c:3784 [inline] SyS_memfd_create+0x1fc/0x3c0 mm/shmem.c:3724 F2FS-fs (loop5): Found nat_bits in checkpoint do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f7b8df610f9 RSP: 002b:00007f7b8c4d2f38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 00000000000105b1 RCX: 00007f7b8df610f9 RDX: 00007f7b8c4d2fdc RSI: 0000000000000000 RDI: 00007f7b8dfbbe81 RBP: 00000000000105b1 R08: 00007f7b8c4d2e20 R09: ffffffffffffffff R10: 0000000000000000 R11: 0000000000000202 R12: 00000000200001c0 R13: 00007f7b8c4d2fdc R14: 00007f7b8c4d2fe0 R15: 0000000020020c00 attempt to access beyond end of device loop5: rw=2049, want=81920, limit=63271 attempt to access beyond end of device loop5: rw=2049, want=81928, limit=63271 overlayfs: unrecognized mount option "measure" or missing value FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 10597 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] get_empty_filp+0x86/0x3f0 fs/file_table.c:123 alloc_file+0x23/0x440 fs/file_table.c:164 __shmem_file_setup.part.0+0x198/0x3c0 mm/shmem.c:4294 __shmem_file_setup mm/shmem.c:4264 [inline] shmem_file_setup mm/shmem.c:4331 [inline] SYSC_memfd_create mm/shmem.c:3784 [inline] SyS_memfd_create+0x1fc/0x3c0 mm/shmem.c:3724 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f7b8df610f9 RSP: 002b:00007f7b8c4d2f38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 00000000000105b1 RCX: 00007f7b8df610f9 RDX: 00007f7b8c4d2fdc RSI: 0000000000000000 RDI: 00007f7b8dfbbe81 EXT4-fs (loop2): Unrecognized mount option "" or missing value RBP: 00000000000105b1 R08: 00007f7b8c4d2e20 R09: ffffffffffffffff R10: 0000000000000000 R11: 0000000000000202 R12: 00000000200001c0 R13: 00007f7b8c4d2fdc R14: 00007f7b8c4d2fe0 R15: 0000000020020c00 print_req_error: I/O error, dev loop2, sector 0 Buffer I/O error on dev loop2, logical block 0, async page read print_req_error: I/O error, dev loop2, sector 4 Buffer I/O error on dev loop2, logical block 2, async page read print_req_error: I/O error, dev loop2, sector 6 overlayfs: unrecognized mount option "measure" or missing value Buffer I/O error on dev loop2, logical block 3, async page read FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 10641 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] aa_alloc_file_ctx security/apparmor/include/file.h:60 [inline] apparmor_file_alloc_security+0x129/0x800 security/apparmor/lsm.c:431 security_file_alloc+0x66/0xa0 security/security.c:874 get_empty_filp+0x16b/0x3f0 fs/file_table.c:129 alloc_file+0x23/0x440 fs/file_table.c:164 __shmem_file_setup.part.0+0x198/0x3c0 mm/shmem.c:4294 __shmem_file_setup mm/shmem.c:4264 [inline] shmem_file_setup mm/shmem.c:4331 [inline] SYSC_memfd_create mm/shmem.c:3784 [inline] SyS_memfd_create+0x1fc/0x3c0 mm/shmem.c:3724 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f7b8df610f9 RSP: 002b:00007f7b8c4d2f38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 00000000000105b1 RCX: 00007f7b8df610f9 RDX: 00007f7b8c4d2fdc RSI: 0000000000000000 RDI: 00007f7b8dfbbe81 RBP: 00000000000105b1 R08: 00007f7b8c4d2e20 R09: ffffffffffffffff R10: 0000000000000000 R11: 0000000000000202 R12: 00000000200001c0 R13: 00007f7b8c4d2fdc R14: 00007f7b8c4d2fe0 R15: 0000000020020c00 attempt to access beyond end of device loop5: rw=2049, want=81920, limit=63271 attempt to access beyond end of device loop5: rw=2049, want=81928, limit=63271 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 10666 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] aa_alloc_file_ctx security/apparmor/include/file.h:60 [inline] apparmor_file_alloc_security+0x129/0x800 security/apparmor/lsm.c:431 security_file_alloc+0x66/0xa0 security/security.c:874 get_empty_filp+0x16b/0x3f0 fs/file_table.c:129 alloc_file+0x23/0x440 fs/file_table.c:164 __shmem_file_setup.part.0+0x198/0x3c0 mm/shmem.c:4294 __shmem_file_setup mm/shmem.c:4264 [inline] shmem_file_setup mm/shmem.c:4331 [inline] SYSC_memfd_create mm/shmem.c:3784 [inline] SyS_memfd_create+0x1fc/0x3c0 mm/shmem.c:3724 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f7b8df610f9 RSP: 002b:00007f7b8c4d2f38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 00000000000105b1 RCX: 00007f7b8df610f9 RDX: 00007f7b8c4d2fdc RSI: 0000000000000000 RDI: 00007f7b8dfbbe81 RBP: 00000000000105b1 R08: 00007f7b8c4d2e20 R09: ffffffffffffffff R10: 0000000000000000 R11: 0000000000000202 R12: 00000000200001c0 R13: 00007f7b8c4d2fdc R14: 00007f7b8c4d2fe0 R15: 0000000020020c00 f2fs_msg: 6 callbacks suppressed F2FS-fs (loop5): Mismatch start address, segment0(512) cp_blkaddr(605) F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (loop5): invalid crc value F2FS-fs (loop5): Found nat_bits in checkpoint F2FS-fs (loop5): Mounted with checkpoint version = 753bd00b attempt to access beyond end of device loop5: rw=2049, want=81920, limit=63271 attempt to access beyond end of device loop5: rw=2049, want=81928, limit=63271 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 10721 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] mmap_region+0x7c1/0x1220 mm/mmap.c:1689 do_mmap+0x5b3/0xcb0 mm/mmap.c:1495 do_mmap_pgoff include/linux/mm.h:2187 [inline] vm_mmap_pgoff+0x14e/0x1a0 mm/util.c:366 SYSC_mmap_pgoff mm/mmap.c:1545 [inline] SyS_mmap_pgoff+0x3c5/0x510 mm/mmap.c:1503 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7f7b8df61142 RSP: 002b:00007f7b8c4d2f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 0000000000000022 RCX: 00007f7b8df61142 RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 R10: 0000000000000022 R11: 0000000000000246 R12: 00000000000105af R13: 00007f7b8c4d2fdc R14: 00007f7b8c4d2fe0 R15: 0000000020020c02 F2FS-fs (loop5): Mismatch start address, segment0(512) cp_blkaddr(605) F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock F2FS-fs (loop5): invalid crc value F2FS-fs (loop5): Found nat_bits in checkpoint F2FS-fs (loop5): Mounted with checkpoint version = 753bd00b attempt to access beyond end of device loop5: rw=2049, want=81920, limit=63271 attempt to access beyond end of device loop5: rw=2049, want=81928, limit=63271 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 10769 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 ptlock_alloc+0x1d/0x70 mm/memory.c:4871 ptlock_init include/linux/mm.h:1764 [inline] pgtable_page_ctor include/linux/mm.h:1798 [inline] pte_alloc_one+0x57/0x100 arch/x86/mm/pgtable.c:33 __pte_alloc+0x25/0x2c0 mm/memory.c:683 do_anonymous_page mm/memory.c:3224 [inline] handle_pte_fault mm/memory.c:4113 [inline] __handle_mm_fault+0x3259/0x4620 mm/memory.c:4239 handle_mm_fault+0x455/0x9c0 mm/memory.c:4276 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1126 RIP: 8c4d2700:0x1 RSP: 8c4d2660:0000000000000102 EFLAGS: 7f7b8c4d2670 Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 10819 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 ptlock_alloc+0x1d/0x70 mm/memory.c:4871 ptlock_init include/linux/mm.h:1764 [inline] pgtable_page_ctor include/linux/mm.h:1798 [inline] pte_alloc_one+0x57/0x100 arch/x86/mm/pgtable.c:33 __pte_alloc+0x25/0x2c0 mm/memory.c:683 do_anonymous_page mm/memory.c:3224 [inline] handle_pte_fault mm/memory.c:4113 [inline] __handle_mm_fault+0x3259/0x4620 mm/memory.c:4239 handle_mm_fault+0x455/0x9c0 mm/memory.c:4276 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1126 RIP: 8c4d2700:0x1 RSP: 8c4d2660:0000000000000102 EFLAGS: 7f7b8c4d2670 Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF unregister_netdevice: waiting for ip6gre0 to become free. Usage count = -1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 10870 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 anon_vma_alloc mm/rmap.c:82 [inline] __anon_vma_prepare+0x2ae/0x510 mm/rmap.c:191 anon_vma_prepare include/linux/rmap.h:157 [inline] wp_page_copy+0x11ce/0x25c0 mm/memory.c:2602 do_wp_page+0x245/0x1db0 mm/memory.c:2905 handle_pte_fault mm/memory.c:4131 [inline] __handle_mm_fault+0x234f/0x4620 mm/memory.c:4239 handle_mm_fault+0x455/0x9c0 mm/memory.c:4276 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1126 RIP: 8c4d2700:0x1 RSP: 8c4d2660:00000000000000f9 EFLAGS: 7f7b8c4d2670 Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF base_sock_release(ffff888053178600) sk=ffff88805031e540 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 1 base_sock_release(ffff888053183640) sk=ffff888050304500 CPU: 0 PID: 10920 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4165 [inline] __alloc_pages_nodemask+0x21e/0x2900 mm/page_alloc.c:4213 alloc_pages_vma+0xd2/0x6d0 mm/mempolicy.c:2071 alloc_zeroed_user_highpage_movable include/linux/highmem.h:184 [inline] wp_page_copy+0xfdf/0x25c0 mm/memory.c:2606 do_wp_page+0x245/0x1db0 mm/memory.c:2905 handle_pte_fault mm/memory.c:4131 [inline] __handle_mm_fault+0x234f/0x4620 mm/memory.c:4239 handle_mm_fault+0x455/0x9c0 mm/memory.c:4276 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1126 RIP: 8c4d2700:0x1 RSP: 8c4d2660:00000000000000f9 EFLAGS: 7f7b8c4d2670 Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 *** Guest State *** CPU: 1 PID: 10966 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4165 [inline] __alloc_pages_nodemask+0x21e/0x2900 mm/page_alloc.c:4213 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 alloc_pages_vma+0xd2/0x6d0 mm/mempolicy.c:2071 alloc_zeroed_user_highpage_movable include/linux/highmem.h:184 [inline] wp_page_copy+0xfdf/0x25c0 mm/memory.c:2606 do_wp_page+0x245/0x1db0 mm/memory.c:2905 handle_pte_fault mm/memory.c:4131 [inline] __handle_mm_fault+0x234f/0x4620 mm/memory.c:4239 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000000 RIP = 0x000000000000fff0 handle_mm_fault+0x455/0x9c0 mm/memory.c:4276 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1126 RFLAGS=0x00000002 DR7 = 0x0000000000000400 RIP: 8c4d2700:0xc01 RSP: 8c4d2660:0000000000000102 EFLAGS: 7f7b8c4d2670 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x0000ffff, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff8116183e RSP = 0xffff88804c00f9b8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f05e97ea700 GSBase=ffff8880ba400000 TRBase=fffffe0000003000 GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 CR0=0000000080050033 CR3=00000000b0003000 CR4=00000000003426f0 Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff87401780 EFER = 0x0000000000000d01 PAT = 0x0407050600070106 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=000000e3 EntryControls=0000d1ff ExitControls=002fefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff8b3fa0ea9c TPR Threshold = 0x00 EPT pointer = 0x0000000098ea901e Virtual processor ID = 0x0001 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 *** Guest State *** netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 CPU: 0 PID: 11021 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4165 [inline] __alloc_pages_nodemask+0x21e/0x2900 mm/page_alloc.c:4213 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000000 RIP = 0x000000000000fff0 alloc_pages_current+0x155/0x260 mm/mempolicy.c:2107 alloc_pages include/linux/gfp.h:520 [inline] pte_alloc_one+0x15/0x100 arch/x86/mm/pgtable.c:30 do_huge_pmd_anonymous_page+0x500/0x1700 mm/huge_memory.c:692 RFLAGS=0x00000002 DR7 = 0x0000000000000400 create_huge_pmd mm/memory.c:4007 [inline] __handle_mm_fault+0x2ac4/0x4620 mm/memory.c:4210 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 handle_mm_fault+0x455/0x9c0 mm/memory.c:4276 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1126 CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 RIP: 8c4d2700:0x1 RSP: 8c4d2660:0000000000000102 EFLAGS: 7f7b8c4d2670 Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x0000ffff, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff8116183e RSP = 0xffff88804c15f9b8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f05e97ea700 GSBase=ffff8880ba500000 TRBase=fffffe000003e000 GDTBase=fffffe000003c000 IDTBase=fffffe0000000000 CR0=0000000080050033 CR3=00000000a4af9000 CR4=00000000003426e0 Sysenter RSP=fffffe000003e000 CS:RIP=0010:ffffffff87401780 EFER = 0x0000000000000d01 PAT = 0x0407050600070106 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=000000e3 EntryControls=0000d1ff ExitControls=002fefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff8aa68eaefa TPR Threshold = 0x00 EPT pointer = 0x000000009a5c501e Virtual processor ID = 0x0001 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 *** Guest State *** CPU: 0 PID: 11065 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 ptlock_alloc+0x1d/0x70 mm/memory.c:4871 ptlock_init include/linux/mm.h:1764 [inline] pgtable_page_ctor include/linux/mm.h:1798 [inline] pte_alloc_one+0x57/0x100 arch/x86/mm/pgtable.c:33 do_huge_pmd_anonymous_page+0x500/0x1700 mm/huge_memory.c:692 create_huge_pmd mm/memory.c:4007 [inline] __handle_mm_fault+0x2ac4/0x4620 mm/memory.c:4210 handle_mm_fault+0x455/0x9c0 mm/memory.c:4276 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1126 RIP: 8c4d2700:0x1 RSP: 8c4d2660:0000000000000102 EFLAGS: 7f7b8c4d2670 RSP = 0x0000000000000000 RIP = 0x000000000000fff0 Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF RFLAGS=0x00000002 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x0000ffff, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 audit: type=1804 audit(1676455249.349:3): pid=11095 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir3675577814/syzkaller.2MRrQZ/64/file0/file0" dev="loop4" ino=8 res=1 *** Host State *** RIP = 0xffffffff8116183e RSP = 0xffff88804c10f9b8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 audit: type=1804 audit(1676455249.439:4): pid=11104 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir3675577814/syzkaller.2MRrQZ/65/file0/file0" dev="loop4" ino=10 res=1 FSBase=00007f05e97ea700 GSBase=ffff8880ba500000 TRBase=fffffe000003e000 GDTBase=fffffe000003c000 IDTBase=fffffe0000000000 CR0=0000000080050033 CR3=00000000ab7bc000 CR4=00000000003426e0 Sysenter RSP=fffffe000003e000 CS:RIP=0010:ffffffff87401780 EFER = 0x0000000000000d01 PAT = 0x0407050600070106 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=000000e3 EntryControls=0000d1ff ExitControls=002fefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff8a3b4a2892 TPR Threshold = 0x00 EPT pointer = 0x000000009a52f01e Virtual processor ID = 0x0001 audit: type=1804 audit(1676455249.900:5): pid=11133 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir3675577814/syzkaller.2MRrQZ/66/file0/file0" dev="loop4" ino=11 res=1 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 *** Guest State *** CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000000 RIP = 0x000000000000fff0 CPU: 1 PID: 11137 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 RFLAGS=0x00000002 DR7 = 0x0000000000000400 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4165 [inline] __alloc_pages_nodemask+0x21e/0x2900 mm/page_alloc.c:4213 CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 __alloc_pages include/linux/gfp.h:484 [inline] __alloc_pages_node include/linux/gfp.h:497 [inline] alloc_pages_vma+0x4b3/0x6d0 mm/mempolicy.c:2064 GDTR: limit=0x0000ffff, base=0x0000000000000000 do_huge_pmd_wp_page+0x7c6/0x4730 mm/huge_memory.c:1287 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 wp_huge_pmd mm/memory.c:4016 [inline] __handle_mm_fault+0x20b2/0x4620 mm/memory.c:4229 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 handle_mm_fault+0x455/0x9c0 mm/memory.c:4276 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442 Interruptibility = 00000000 ActivityState = 00000000 page_fault+0x45/0x50 arch/x86/entry/entry_64.S:1126 RIP: 8c4d2700:0x1 RSP: 8c4d2660:00000000000000f9 EFLAGS: 7f7b8c4d2670 *** Host State *** RIP = 0xffffffff8116183e RSP = 0xffff888093e0f9b8 audit: type=1804 audit(1676455250.370:6): pid=11151 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir3675577814/syzkaller.2MRrQZ/67/file0/file0" dev="loop4" ino=12 res=1 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f05e97ea700 GSBase=ffff8880ba400000 TRBase=fffffe0000003000 GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 CR0=0000000080050033 CR3=000000009b771000 CR4=00000000003426f0 Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff87401780 EFER = 0x0000000000000d01 PAT = 0x0407050600070106 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=000000e3 EntryControls=0000d1ff ExitControls=002fefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff89bcb000be TPR Threshold = 0x00 EPT pointer = 0x00000000a11cb01e Virtual processor ID = 0x0001 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 11195 Comm: syz-executor.1 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4165 [inline] __alloc_pages_nodemask+0x21e/0x2900 mm/page_alloc.c:4213 alloc_pages_current+0x155/0x260 mm/mempolicy.c:2107 alloc_pages include/linux/gfp.h:520 [inline] pte_alloc_one+0x15/0x100 arch/x86/mm/pgtable.c:30 do_huge_pmd_anonymous_page+0x500/0x1700 mm/huge_memory.c:692 create_huge_pmd mm/memory.c:4007 [inline] __handle_mm_fault+0x2ac4/0x4620 mm/memory.c:4210 handle_mm_fault+0x455/0x9c0 mm/memory.c:4276 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442