VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop4. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. WARNING: can't dereference registers at 000000004e2275d1 for ip common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:670 netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. BTRFS info (device loop4): disabling disk space caching BTRFS info (device loop4): force zlib compression, level 3 BTRFS info (device loop4): turning on flush-on-commit BTRFS info (device loop4): has skinny extents BTRFS error (device loop4): open_ctree failed BTRFS info (device loop4): disabling disk space caching BTRFS info (device loop4): force zlib compression, level 3 BTRFS info (device loop4): turning on flush-on-commit BTRFS info (device loop4): has skinny extents BTRFS info (device loop4): disabling disk space caching BTRFS info (device loop4): force zlib compression, level 3 BTRFS info (device loop4): turning on flush-on-commit BTRFS info (device loop4): has skinny extents MTD: Attempt to mount non-MTD device "/dev/loop4" romfs: Mounting image 'rom 5f663c08' through the block layer MTD: Attempt to mount non-MTD device "/dev/loop4" romfs: Mounting image 'rom 5f663c08' through the block layer MTD: Attempt to mount non-MTD device "/dev/loop4" romfs: Mounting image 'rom 5f663c08' through the block layer nla_parse: 69 callbacks suppressed netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. device erspan1 entered promiscuous mode netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. device erspan1 entered promiscuous mode device erspan1 entered promiscuous mode ntfs: (device loop4): parse_options(): Unrecognized mount option . ntfs: (device loop4): parse_options(): Unrecognized mount option . ntfs: (device loop4): parse_options(): Unrecognized mount option . EXT4-fs error (device loop4): ext4_orphan_get:1256: comm syz-executor.4: bad orphan inode 17 ext4_test_bit(bit=16, block=18) = 1 is_bad_inode(inode)=0 NEXT_ORPHAN(inode)=159886971 max_ino=32 i_nlink=59882 EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13127 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 __should_failslab+0x115/0x180 mm/failslab.c:32 should_failslab+0x5/0x10 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x277/0x370 mm/slab.c:3557 sock_alloc_inode+0x19/0x250 net/socket.c:244 alloc_inode+0x5d/0x180 fs/inode.c:211 new_inode_pseudo+0x14/0xe0 fs/inode.c:911 sock_alloc+0x3c/0x260 net/socket.c:567 __sock_create+0xba/0x740 net/socket.c:1329 sock_create net/socket.c:1416 [inline] __sys_socket+0xef/0x200 net/socket.c:1458 __do_sys_socket net/socket.c:1467 [inline] __se_sys_socket net/socket.c:1465 [inline] __x64_sys_socket+0x6f/0xb0 net/socket.c:1465 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f3bd35856c7 Code: f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f3bd1ef80d8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007f3bd3696f60 RCX: 00007f3bd35856c7 RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 RBP: 00007f3bd1ef91d0 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000200000c0 R11: 0000000000000286 R12: 00000000ffffffff R13: 00007ffc4d43aaaf R14: 00007f3bd1ef9300 R15: 0000000000022000 socket: no more sockets FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13179 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 __should_failslab+0x115/0x180 mm/failslab.c:32 should_failslab+0x5/0x10 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x284/0x380 mm/slab.c:3623 kmalloc include/linux/slab.h:515 [inline] sock_alloc_inode+0x5f/0x250 net/socket.c:247 alloc_inode+0x5d/0x180 fs/inode.c:211 new_inode_pseudo+0x14/0xe0 fs/inode.c:911 sock_alloc+0x3c/0x260 net/socket.c:567 __sock_create+0xba/0x740 net/socket.c:1329 sock_create net/socket.c:1416 [inline] __sys_socket+0xef/0x200 net/socket.c:1458 __do_sys_socket net/socket.c:1467 [inline] __se_sys_socket net/socket.c:1465 [inline] __x64_sys_socket+0x6f/0xb0 net/socket.c:1465 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f3bd35856c7 Code: f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f3bd1ed70d8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007f3bd3697030 RCX: 00007f3bd35856c7 RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 RBP: 00007f3bd1ed81d0 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000200000c0 R11: 0000000000000286 R12: 00000000ffffffff R13: 00007ffc4d43aaaf R14: 00007f3bd1ed8300 R15: 0000000000022000 socket: no more sockets EXT4-fs error (device loop4): ext4_orphan_get:1256: comm syz-executor.4: bad orphan inode 17 ext4_test_bit(bit=16, block=18) = 1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 is_bad_inode(inode)=0 NEXT_ORPHAN(inode)=159886971 max_ino=32 CPU: 0 PID: 13236 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 __should_failslab+0x115/0x180 mm/failslab.c:32 should_failslab+0x5/0x10 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2ab/0x3c0 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] sk_prot_alloc+0x1e2/0x2d0 net/core/sock.c:1483 sk_alloc+0x36/0xec0 net/core/sock.c:1537 __netlink_create+0x63/0x270 net/netlink/af_netlink.c:648 netlink_create+0x3ad/0x5e0 net/netlink/af_netlink.c:711 __sock_create+0x3d8/0x740 net/socket.c:1365 sock_create net/socket.c:1416 [inline] __sys_socket+0xef/0x200 net/socket.c:1458 __do_sys_socket net/socket.c:1467 [inline] __se_sys_socket net/socket.c:1465 [inline] __x64_sys_socket+0x6f/0xb0 net/socket.c:1465 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f3bd35856c7 Code: f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f3bd1ed70d8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 00007f3bd3697030 RCX: 00007f3bd35856c7 RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 RBP: 00007f3bd1ed81d0 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000200000c0 R11: 0000000000000286 R12: 00000000ffffffff R13: 00007ffc4d43aaaf R14: 00007f3bd1ed8300 R15: 0000000000022000 i_nlink=59882 EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 13283 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 __should_failslab+0x115/0x180 mm/failslab.c:32 should_failslab+0x5/0x10 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc_trace+0x284/0x380 mm/slab.c:3623 kmalloc include/linux/slab.h:515 [inline] kzalloc include/linux/slab.h:709 [inline] apparmor_sk_alloc_security+0x5c/0xe0 security/apparmor/lsm.c:769 security_sk_alloc+0x50/0xb0 security/security.c:1469 sk_prot_alloc+0x200/0x2d0 net/core/sock.c:1486 sk_alloc+0x36/0xec0 net/core/sock.c:1537 __netlink_create+0x63/0x270 net/netlink/af_netlink.c:648 netlink_create+0x3ad/0x5e0 net/netlink/af_netlink.c:711 __sock_create+0x3d8/0x740 net/socket.c:1365 sock_create net/socket.c:1416 [inline] __sys_socket+0xef/0x200 net/socket.c:1458 __do_sys_socket net/socket.c:1467 [inline] __se_sys_socket net/socket.c:1465 [inline] __x64_sys_socket+0x6f/0xb0 net/socket.c:1465