ALSA: mixer_oss: invalid OSS volume '' ALSA: mixer_oss: invalid OSS volume '' INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 1 PID: 15717 Comm: syz-executor.5 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 register_lock_class+0x32b/0x1320 kernel/locking/lockdep.c:768 __lock_acquire+0x167/0x3f20 kernel/locking/lockdep.c:3378 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x8c/0xc0 kernel/locking/spinlock.c:160 skb_dequeue+0x1c/0x180 net/core/skbuff.c:2827 skb_queue_purge+0x21/0x30 net/core/skbuff.c:2865 l2cap_chan_del+0x56d/0x950 net/bluetooth/l2cap_core.c:637 l2cap_chan_close+0x103/0x870 net/bluetooth/l2cap_core.c:757 l2cap_sock_shutdown+0x2e7/0xc20 net/bluetooth/l2cap_sock.c:1160 l2cap_sock_release+0x77/0x280 net/bluetooth/l2cap_sock.c:1203 __sock_release+0xcd/0x2b0 net/socket.c:602 sock_close+0x15/0x20 net/socket.c:1139 __fput+0x25f/0x7a0 fs/file_table.c:210 task_work_run+0x11f/0x190 kernel/task_work.c:113 get_signal+0x18a3/0x1ca0 kernel/signal.c:2234 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:814 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007fc5b07d6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: fffffffffffffffc RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 000000000000000e RSI: 0000000020000040 RDI: 0000000000000004 RBP: 00000000004b069f R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffe28c46eff R14: 00007fc5b07d6300 R15: 0000000000022000 ALSA: mixer_oss: invalid OSS volume '' VFS: could not find a valid V7 on loop1. VFS: could not find a valid V7 on loop1. VFS: could not find a valid V7 on loop1. VFS: could not find a valid V7 on loop3. VFS: could not find a valid V7 on loop1. VFS: could not find a valid V7 on loop4. ptrace attach of "/root/syz-executor.0"[15860] was attempted by "/root/syz-executor.0"[15862] VFS: could not find a valid V7 on loop3. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. (syz-executor.1,15911,1):ocfs2_parse_options:1498 ERROR: Invalid heartbeat mount options (syz-executor.5,15914,0):ocfs2_parse_options:1498 ERROR: Invalid heartbeat mount options (syz-executor.5,15914,0):ocfs2_fill_super:1217 ERROR: status = -22 ptrace attach of "/root/syz-executor.0"[15928] was attempted by "/root/syz-executor.0"[15930] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. (syz-executor.1,15911,1):ocfs2_fill_super:1217 ERROR: status = -22 print_req_error: I/O error, dev loop4, sector 0 REISERFS warning (device loop3): sh-2011 read_super_block: can't find a reiserfs filesystem on (dev loop3, block 16, size 4096) UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 (syz-executor.5,15914,0):ocfs2_parse_options:1498 ERROR: Invalid heartbeat mount options TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. (syz-executor.1,15911,1):ocfs2_parse_options:1498 ERROR: Invalid heartbeat mount options UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 (syz-executor.5,15914,0):ocfs2_fill_super:1217 ERROR: status = -22 (syz-executor.1,15911,1):ocfs2_fill_super:1217 ERROR: status = -22 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. REISERFS warning (device loop3): sh-2011 read_super_block: can't find a reiserfs filesystem on (dev loop3, block 16, size 4096) UDF-fs: warning (device loop4): udf_load_vrs: No anchor found REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 UDF-fs: Scanning with blocksize 512 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. UDF-fs: Scanning with blocksize 1024 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop4): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. (syz-executor.1,15979,0):ocfs2_parse_options:1498 ERROR: Invalid heartbeat mount options ptrace attach of "/root/syz-executor.0"[15988] was attempted by "/root/syz-executor.0"[15989] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 REISERFS warning (device loop3): sh-2011 read_super_block: can't find a reiserfs filesystem on (dev loop3, block 16, size 4096) (syz-executor.1,15979,0):ocfs2_fill_super:1217 ERROR: status = -22 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 UDF-fs: Scanning with blocksize 512 failed (syz-executor.5,15999,0):ocfs2_parse_options:1498 ERROR: Invalid heartbeat mount options (syz-executor.5,15999,0):ocfs2_fill_super:1217 ERROR: status = -22 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop4): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed audit: type=1800 audit(1611955709.495:41): pid=16015 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=16406 res=0 REISERFS warning (device loop3): sh-2011 read_super_block: can't find a reiserfs filesystem on (dev loop3, block 16, size 4096) (syz-executor.1,16026,1):ocfs2_parse_options:1498 ERROR: Invalid heartbeat mount options audit: type=1800 audit(1611955709.495:42): pid=16015 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.5" name="file0" dev="sda1" ino=16406 res=0 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 (syz-executor.1,16026,1):ocfs2_fill_super:1217 ERROR: status = -22 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 512 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop4): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 (syz-executor.1,16075,1):ocfs2_parse_options:1498 ERROR: Invalid heartbeat mount options (syz-executor.1,16075,1):ocfs2_fill_super:1217 ERROR: status = -22 REISERFS warning (device loop3): sh-2011 read_super_block: can't find a reiserfs filesystem on (dev loop3, block 16, size 4096) REISERFS warning (device loop3): sh-2021 reiserfs_fill_super: can not find reiserfs on loop3 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 512 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop4): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 512 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 UDF-fs: warning (device loop4): udf_load_vrs: No anchor found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop4): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 1 PID: 16408 Comm: syz-executor.5 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] tcp_sendmsg_fastopen net/ipv4/tcp.c:1153 [inline] tcp_sendmsg_locked+0x24e4/0x2ef0 net/ipv4/tcp.c:1216 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007fc5b07d6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007fc5b07d61d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffe28c46eff R14: 00007fc5b07d6300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16446 Comm: syz-executor.5 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550 inet_bind_bucket_create net/ipv4/inet_hashtables.c:69 [inline] __inet_hash_connect+0x61b/0xbf0 net/ipv4/inet_hashtables.c:608 tcp_v6_connect+0x1246/0x1ad0 net/ipv6/tcp_ipv6.c:283 __inet_stream_connect+0x6ad/0xb90 net/ipv4/af_inet.c:618 tcp_sendmsg_fastopen net/ipv4/tcp.c:1170 [inline] tcp_sendmsg_locked+0x1fac/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007fc5b07d6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007fc5b07d61d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffe28c46eff R14: 00007fc5b07d6300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16486 Comm: syz-executor.5 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x263/0x410 mm/slab.c:3640 __alloc_skb+0x5c/0x510 net/core/skbuff.c:193 alloc_skb_fclone include/linux/skbuff.h:1022 [inline] sk_stream_alloc_skb+0xb1/0x760 net/ipv4/tcp.c:855 tcp_connect+0x1123/0x3f00 net/ipv4/tcp_output.c:3522 tcp_v6_connect+0x13cc/0x1ad0 net/ipv6/tcp_ipv6.c:305 __inet_stream_connect+0x6ad/0xb90 net/ipv4/af_inet.c:618 tcp_sendmsg_fastopen net/ipv4/tcp.c:1170 [inline] tcp_sendmsg_locked+0x1fac/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007fc5b07d6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007fc5b07d61d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffe28c46eff R14: 00007fc5b07d6300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 16529 Comm: syz-executor.3 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] tcp_sendmsg_fastopen net/ipv4/tcp.c:1153 [inline] tcp_sendmsg_locked+0x24e4/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007f4202e2e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007f4202e2e1d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd332a99bf R14: 00007f4202e2e300 R15: 0000000000022000 CPU: 1 PID: 16530 Comm: syz-executor.5 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x25a/0x400 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3696 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0x96/0x510 net/core/skbuff.c:205 alloc_skb_fclone include/linux/skbuff.h:1022 [inline] sk_stream_alloc_skb+0xb1/0x760 net/ipv4/tcp.c:855 tcp_connect+0x1123/0x3f00 net/ipv4/tcp_output.c:3522 tcp_v6_connect+0x13cc/0x1ad0 net/ipv6/tcp_ipv6.c:305 __inet_stream_connect+0x6ad/0xb90 net/ipv4/af_inet.c:618 tcp_sendmsg_fastopen net/ipv4/tcp.c:1170 [inline] tcp_sendmsg_locked+0x1fac/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007fc5b07d6188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007fc5b07d61d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffe28c46eff R14: 00007fc5b07d6300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16563 Comm: syz-executor.3 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550 inet_bind_bucket_create net/ipv4/inet_hashtables.c:69 [inline] __inet_hash_connect+0x61b/0xbf0 net/ipv4/inet_hashtables.c:608 tcp_v6_connect+0x1246/0x1ad0 net/ipv6/tcp_ipv6.c:283 __inet_stream_connect+0x6ad/0xb90 net/ipv4/af_inet.c:618 tcp_sendmsg_fastopen net/ipv4/tcp.c:1170 [inline] tcp_sendmsg_locked+0x1fac/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007f4202e2e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007f4202e2e1d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd332a99bf R14: 00007f4202e2e300 R15: 0000000000022000 base_sock_release(ffff88808d398140) sk=ffff8880910e2d40 base_sock_release(ffff88808d3ef980) sk=ffff8880595bb180 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 16587 Comm: syz-executor.3 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x263/0x410 mm/slab.c:3640 __alloc_skb+0x5c/0x510 net/core/skbuff.c:193 alloc_skb_fclone include/linux/skbuff.h:1022 [inline] sk_stream_alloc_skb+0xb1/0x760 net/ipv4/tcp.c:855 tcp_connect+0x1123/0x3f00 net/ipv4/tcp_output.c:3522 tcp_v6_connect+0x13cc/0x1ad0 net/ipv6/tcp_ipv6.c:305 __inet_stream_connect+0x6ad/0xb90 net/ipv4/af_inet.c:618 tcp_sendmsg_fastopen net/ipv4/tcp.c:1170 [inline] tcp_sendmsg_locked+0x1fac/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007f4202e2e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007f4202e2e1d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd332a99bf R14: 00007f4202e2e300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 16616 Comm: syz-executor.1 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 getname fs/namei.c:209 [inline] user_path_mountpoint_at+0x23/0x40 fs/namei.c:2775 SYSC_umount fs/namespace.c:1730 [inline] SyS_umount+0x125/0xeb0 fs/namespace.c:1714 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007f58b4945188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f58b49451d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffcd393c00f R14: 00007f58b4945300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 16638 Comm: syz-executor.1 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4131 [inline] __alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4179 ptrace attach of "/root/syz-executor.0"[16643] was attempted by "/root/syz-executor.0"[16645] __alloc_pages include/linux/gfp.h:484 [inline] __alloc_pages_node include/linux/gfp.h:497 [inline] kmem_getpages mm/slab.c:1419 [inline] cache_grow_begin+0x91/0x630 mm/slab.c:2676 cache_alloc_refill+0x273/0x350 mm/slab.c:3043 ____cache_alloc mm/slab.c:3125 [inline] __do_cache_alloc mm/slab.c:3347 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc+0x333/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 getname fs/namei.c:209 [inline] user_path_mountpoint_at+0x23/0x40 fs/namei.c:2775 SYSC_umount fs/namespace.c:1730 [inline] SyS_umount+0x125/0xeb0 fs/namespace.c:1714 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007f58b4945188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 RBP: 00007f58b49451d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffcd393c00f R14: 00007f58b4945300 R15: 0000000000022000 CPU: 0 PID: 16632 Comm: syz-executor.3 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node_trace+0x25a/0x400 mm/slab.c:3659 __do_kmalloc_node mm/slab.c:3681 [inline] __kmalloc_node_track_caller+0x38/0x70 mm/slab.c:3696 __kmalloc_reserve net/core/skbuff.c:137 [inline] __alloc_skb+0x96/0x510 net/core/skbuff.c:205 alloc_skb_fclone include/linux/skbuff.h:1022 [inline] sk_stream_alloc_skb+0xb1/0x760 net/ipv4/tcp.c:855 tcp_connect+0x1123/0x3f00 net/ipv4/tcp_output.c:3522 tcp_v6_connect+0x13cc/0x1ad0 net/ipv6/tcp_ipv6.c:305 __inet_stream_connect+0x6ad/0xb90 net/ipv4/af_inet.c:618 tcp_sendmsg_fastopen net/ipv4/tcp.c:1170 [inline] tcp_sendmsg_locked+0x1fac/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007f4202e2e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007f4202e2e1d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd332a99bf R14: 00007f4202e2e300 R15: 0000000000022000 ptrace attach of "/root/syz-executor.0"[16689] was attempted by "/root/syz-executor.0"[16690] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16720 Comm: syz-executor.2 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] tcp_sendmsg_fastopen net/ipv4/tcp.c:1153 [inline] tcp_sendmsg_locked+0x24e4/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007fe1d077e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007fe1d077e1d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007fff33f740af R14: 00007fe1d077e300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 16749 Comm: syz-executor.2 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x40/0x3c0 mm/slab.c:3550 inet_bind_bucket_create net/ipv4/inet_hashtables.c:69 [inline] __inet_hash_connect+0x61b/0xbf0 net/ipv4/inet_hashtables.c:608 tcp_v6_connect+0x1246/0x1ad0 net/ipv6/tcp_ipv6.c:283 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. __inet_stream_connect+0x6ad/0xb90 net/ipv4/af_inet.c:618 tcp_sendmsg_fastopen net/ipv4/tcp.c:1170 [inline] tcp_sendmsg_locked+0x1fac/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465b09 RSP: 002b:00007fe1d077e188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465b09 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007fe1d077e1d0 R08: 0000000020000280 R09: 000000000000001c R10: 0000000020000004 R11: 0000000000000246 R12: 0000000000000001 R13: 00007fff33f740af R14: 00007fe1d077e300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 ptrace attach of "/root/syz-executor.0"[16775] was attempted by "/root/syz-executor.0"[16778] CPU: 1 PID: 16773 Comm: syz-executor.2 Not tainted 4.14.217-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc_node mm/slab.c:3297 [inline] kmem_cache_alloc_node+0x263/0x410 mm/slab.c:3640 __alloc_skb+0x5c/0x510 net/core/skbuff.c:193 alloc_skb_fclone include/linux/skbuff.h:1022 [inline] sk_stream_alloc_skb+0xb1/0x760 net/ipv4/tcp.c:855 tcp_connect+0x1123/0x3f00 net/ipv4/tcp_output.c:3522 tcp_v6_connect+0x13cc/0x1ad0 net/ipv6/tcp_ipv6.c:305 __inet_stream_connect+0x6ad/0xb90 net/ipv4/af_inet.c:618 tcp_sendmsg_fastopen net/ipv4/tcp.c:1170 [inline] tcp_sendmsg_locked+0x1fac/0x2ef0 net/ipv4/tcp.c:1216 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 inet_sendmsg+0x11a/0x4e0 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xb5/0x100 net/socket.c:656 SYSC_sendto net/socket.c:1763 [inline] SyS_sendto+0x1c7/0x2c0 net/socket.c:1731 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb