WARNING: can't dereference registers at ffffffff86539f36 for ip apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. EXT4-fs (loop5): Unrecognized mount option "01777777777777777777777" or missing value netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 12545 Comm: syz-executor.3 Not tainted 4.14.196-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 kmemdup+0x23/0x50 mm/util.c:118 kmemdup include/linux/string.h:445 [inline] dccp_feat_clone_sp_val.part.0+0x4a/0xd0 net/dccp/feat.c:374 dccp_feat_clone_sp_val net/dccp/feat.c:373 [inline] __feat_register_sp+0x19d/0x490 net/dccp/feat.c:738 dccp_feat_init+0x5ce/0x6b0 net/dccp/feat.c:1490 dccp_init_sock+0x2f1/0x3c0 net/dccp/proto.c:205 dccp_v4_init_sock+0x1a/0x80 net/dccp/ipv4.c:924 inet_create net/ipv4/af_inet.c:376 [inline] inet_create+0x7a9/0xca0 net/ipv4/af_inet.c:244 __sock_create+0x303/0x620 net/socket.c:1275 sock_create net/socket.c:1315 [inline] SYSC_socket net/socket.c:1345 [inline] SyS_socket+0xd1/0x1b0 net/socket.c:1325 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d5b9 RSP: 002b:00007f4ed3b48c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 0000000000032940 RCX: 000000000045d5b9 RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000002 RBP: 00007f4ed3b48ca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b R13: 00007ffffae59def R14: 00007f4ed3b499c0 R15: 000000000118cf4c netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 12595 Comm: syz-executor.3 Not tainted 4.14.196-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] dccp_feat_entry_new+0x173/0x350 net/dccp/feat.c:467 dccp_feat_push_change net/dccp/feat.c:487 [inline] __feat_register_sp+0x1c9/0x490 net/dccp/feat.c:741 dccp_feat_init+0x5ce/0x6b0 net/dccp/feat.c:1490 dccp_init_sock+0x2f1/0x3c0 net/dccp/proto.c:205 dccp_v4_init_sock+0x1a/0x80 net/dccp/ipv4.c:924 inet_create net/ipv4/af_inet.c:376 [inline] inet_create+0x7a9/0xca0 net/ipv4/af_inet.c:244 __sock_create+0x303/0x620 net/socket.c:1275 sock_create net/socket.c:1315 [inline] SYSC_socket net/socket.c:1345 [inline] SyS_socket+0xd1/0x1b0 net/socket.c:1325 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d5b9 RSP: 002b:00007f4ed3b48c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 0000000000032940 RCX: 000000000045d5b9 RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000002 RBP: 00007f4ed3b48ca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c R13: 00007ffffae59def R14: 00007f4ed3b499c0 R15: 000000000118cf4c netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 12658 Comm: syz-executor.3 Not tainted 4.14.196-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc_track_caller+0x2bc/0x400 mm/slab.c:3735 kmemdup+0x23/0x50 mm/util.c:118 kmemdup include/linux/string.h:445 [inline] dccp_feat_clone_sp_val.part.0+0x4a/0xd0 net/dccp/feat.c:374 dccp_feat_clone_sp_val net/dccp/feat.c:373 [inline] __feat_register_sp+0x19d/0x490 net/dccp/feat.c:738 dccp_feat_init+0x600/0x6b0 net/dccp/feat.c:1494 dccp_init_sock+0x2f1/0x3c0 net/dccp/proto.c:205 dccp_v4_init_sock+0x1a/0x80 net/dccp/ipv4.c:924 inet_create net/ipv4/af_inet.c:376 [inline] inet_create+0x7a9/0xca0 net/ipv4/af_inet.c:244 __sock_create+0x303/0x620 net/socket.c:1275 sock_create net/socket.c:1315 [inline] SYSC_socket net/socket.c:1345 [inline] SyS_socket+0xd1/0x1b0 net/socket.c:1325 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d5b9 RSP: 002b:00007f4ed3b48c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 0000000000032940 RCX: 000000000045d5b9 RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000002 RBP: 00007f4ed3b48ca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d R13: 00007ffffae59def R14: 00007f4ed3b499c0 R15: 000000000118cf4c loop5: p1 < > p2 p3 < p5 p6 > p4 loop5: p2 size 1073741824 extends beyond EOD, truncated loop5: p5 size 1073741824 extends beyond EOD, truncated FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 print_req_error: I/O error, dev loop5, sector 1 loop_reread_partitions: partition scan of loop5 () failed (rc=-16) print_req_error: I/O error, dev loop5, sector 264064 print_req_error: I/O error, dev loop5, sector 1 Buffer I/O error on dev loop5p1, logical block 0, async page read print_req_error: I/O error, dev loop5, sector 1 Buffer I/O error on dev loop5p1, logical block 0, async page read print_req_error: I/O error, dev loop5, sector 0 print_req_error: I/O error, dev loop5, sector 1 Buffer I/O error on dev loop5p1, logical block 0, async page read print_req_error: I/O error, dev loop5, sector 1 Buffer I/O error on dev loop5p1, logical block 0, async page read print_req_error: I/O error, dev loop5, sector 0 Buffer I/O error on dev loop5p3, logical block 0, async page read loop_reread_partitions: partition scan of loop5 () failed (rc=-16) CPU: 1 PID: 12703 Comm: syz-executor.3 Not tainted 4.14.196-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x154 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] dccp_feat_entry_new+0x173/0x350 net/dccp/feat.c:467 dccp_feat_push_change net/dccp/feat.c:487 [inline] __feat_register_sp+0x1c9/0x490 net/dccp/feat.c:741 dccp_feat_init+0x600/0x6b0 net/dccp/feat.c:1494 dccp_init_sock+0x2f1/0x3c0 net/dccp/proto.c:205 dccp_v4_init_sock+0x1a/0x80 net/dccp/ipv4.c:924 inet_create net/ipv4/af_inet.c:376 [inline] inet_create+0x7a9/0xca0 net/ipv4/af_inet.c:244 __sock_create+0x303/0x620 net/socket.c:1275 sock_create net/socket.c:1315 [inline] SYSC_socket net/socket.c:1345 [inline] SyS_socket+0xd1/0x1b0 net/socket.c:1325 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d5b9 RSP: 002b:00007f4ed3b48c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 RAX: ffffffffffffffda RBX: 0000000000032940 RCX: 000000000045d5b9 RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000002 RBP: 00007f4ed3b48ca0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e R13: 00007ffffae59def R14: 00007f4ed3b499c0 R15: 000000000118cf4c 9pnet: p9_fd_create_tcp (12722): problem connecting socket to 127.0.0.1 bridge0: port 2(bridge_slave_1) entered disabled state bridge0: port 1(bridge_slave_0) entered disabled state device bridge_slave_0 left promiscuous mode bridge0: port 1(bridge_slave_0) entered disabled state device bridge_slave_1 left promiscuous mode bridge0: port 2(bridge_slave_1) entered disabled state bond0: Releasing backup interface bond_slave_0 bond0: Releasing backup interface bond_slave_1 team0: Port device team_slave_0 removed team0: Port device team_slave_1 removed batman_adv: batadv0: Interface deactivated: batadv_slave_0 batman_adv: batadv0: Removing interface: batadv_slave_0 batman_adv: batadv0: Interface deactivated: batadv_slave_1 batman_adv: batadv0: Removing interface: batadv_slave_1 9pnet: p9_fd_create_tcp (12724): problem connecting socket to 127.0.0.1 nla_parse: 10 callbacks suppressed netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. device hsr_slave_1 left promiscuous mode device hsr_slave_0 left promiscuous mode bond0 (unregistering): Released all slaves netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. IPVS: ftp: loaded support on port[0] = 21 chnl_net:caif_netlink_parms(): no params data found bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered disabled state device bridge_slave_0 entered promiscuous mode bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered disabled state device bridge_slave_1 entered promiscuous mode bond0: Enslaving bond_slave_0 as an active interface with an up link bond0: Enslaving bond_slave_1 as an active interface with an up link IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready team0: Port device team_slave_0 added IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready team0: Port device team_slave_1 added batman_adv: batadv0: Adding interface: batadv_slave_0 batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active batman_adv: batadv0: Adding interface: batadv_slave_1 batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready device hsr_slave_0 entered promiscuous mode device hsr_slave_1 entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready