[ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 70.999230][ T30] audit: type=1400 audit(1625047279.270:8): avc: denied { execmem } for pid=6055 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 73.753754][ T6048] can: request_module (can-proto-0) failed. [ 73.837089][ T6048] can: request_module (can-proto-0) failed. [ 73.854839][ T6048] can: request_module (can-proto-0) failed. [ 73.955000][ T30] audit: type=1400 audit(1625047282.220:9): avc: denied { create } for pid=6045 comm="syz-fuzzer" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 Warning: Permanently added '10.128.0.213' (ECDSA) to the list of known hosts. 2021/06/30 10:01:29 parsed 1 programs 2021/06/30 10:01:29 executed programs: 0 [ 81.726037][ T30] audit: type=1400 audit(1625047289.990:10): avc: denied { execmem } for pid=6147 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 83.612850][ T6150] chnl_net:caif_netlink_parms(): no params data found [ 83.970294][ T6158] chnl_net:caif_netlink_parms(): no params data found [ 84.007597][ T6159] chnl_net:caif_netlink_parms(): no params data found [ 84.049144][ T6150] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.064860][ T6150] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.077528][ T6150] device bridge_slave_0 entered promiscuous mode [ 84.104429][ T6153] chnl_net:caif_netlink_parms(): no params data found [ 84.125246][ T6150] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.134203][ T6150] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.145342][ T6150] device bridge_slave_1 entered promiscuous mode [ 84.219895][ T6150] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.317590][ T6150] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.393259][ T6158] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.400341][ T6158] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.410253][ T6158] device bridge_slave_0 entered promiscuous mode [ 84.420787][ T6156] chnl_net:caif_netlink_parms(): no params data found [ 84.443580][ T6150] team0: Port device team_slave_0 added [ 84.456779][ T6150] team0: Port device team_slave_1 added [ 84.465656][ T6158] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.472940][ T6158] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.481685][ T6158] device bridge_slave_1 entered promiscuous mode [ 84.495501][ T6159] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.503899][ T6159] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.513431][ T6159] device bridge_slave_0 entered promiscuous mode [ 84.570688][ T6159] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.578737][ T6159] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.587881][ T6159] device bridge_slave_1 entered promiscuous mode [ 84.604203][ T6153] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.612182][ T6153] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.620681][ T6153] device bridge_slave_0 entered promiscuous mode [ 84.662816][ T6150] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 84.670060][ T6150] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.698263][ T6150] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 84.711002][ T6153] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.719852][ T6153] bridge0: port 2(bridge_slave_1) entered disabled state [ 84.729396][ T6153] device bridge_slave_1 entered promiscuous mode [ 84.741679][ T6158] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.763622][ T6150] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 84.770694][ T6150] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.797855][ T6150] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 84.818644][ T6158] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.834939][ T6159] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.873217][ T6159] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.905552][ T6153] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.955261][ T6150] device hsr_slave_0 entered promiscuous mode [ 84.963329][ T11] Bluetooth: hci1: command 0x0409 tx timeout [ 85.002225][ T6150] device hsr_slave_1 entered promiscuous mode [ 85.042334][ T29] Bluetooth: hci0: command 0x0409 tx timeout [ 85.042762][ T11] Bluetooth: hci5: command 0x0409 tx timeout [ 85.054553][ T11] Bluetooth: hci2: command 0x0409 tx timeout [ 85.091009][ T6158] team0: Port device team_slave_0 added [ 85.099214][ T6153] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.123680][ T29] Bluetooth: hci3: command 0x0409 tx timeout [ 85.134431][ T6159] team0: Port device team_slave_0 added [ 85.142231][ T6158] team0: Port device team_slave_1 added [ 85.154382][ T6156] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.162447][ T6156] bridge0: port 1(bridge_slave_0) entered disabled state [ 85.170280][ T6156] device bridge_slave_0 entered promiscuous mode [ 85.186139][ T6159] team0: Port device team_slave_1 added [ 85.209048][ T6153] team0: Port device team_slave_0 added [ 85.215274][ T6156] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.223600][ T6156] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.233923][ T6156] device bridge_slave_1 entered promiscuous mode [ 85.255493][ T6153] team0: Port device team_slave_1 added [ 85.282504][ T6158] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 85.289613][ T6158] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.316290][ T6158] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.345410][ T6159] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 85.352604][ T6159] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.380101][ T6159] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.393187][ T6158] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.400313][ T6158] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.428049][ T6158] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.456741][ T6156] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.466883][ T6159] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.474877][ T6159] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.502207][ T6159] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.517856][ T6153] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 85.526234][ T6153] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.553872][ T6153] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 85.576772][ T6156] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.607212][ T6153] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 85.614909][ T6153] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 85.642232][ T6153] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 85.687140][ T6156] team0: Port device team_slave_0 added [ 85.754672][ T6158] device hsr_slave_0 entered promiscuous mode [ 85.822162][ T6158] device hsr_slave_1 entered promiscuous mode [ 85.862076][ T6158] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 85.870213][ T6158] Cannot create hsr debugfs directory [ 85.914571][ T6159] device hsr_slave_0 entered promiscuous mode [ 85.962184][ T6159] device hsr_slave_1 entered promiscuous mode [ 86.021929][ T6159] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 86.029544][ T6159] Cannot create hsr debugfs directory [ 86.046722][ T6156] team0: Port device team_slave_1 added [ 86.174855][ T6153] device hsr_slave_0 entered promiscuous mode [ 86.204270][ T6153] device hsr_slave_1 entered promiscuous mode [ 86.252057][ T6153] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 86.259639][ T6153] Cannot create hsr debugfs directory [ 86.318219][ T6156] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 86.326583][ T6156] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.356618][ T6156] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 86.402538][ T6156] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 86.409869][ T6156] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 86.439070][ T6156] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 86.546939][ T6156] device hsr_slave_0 entered promiscuous mode [ 86.602771][ T6156] device hsr_slave_1 entered promiscuous mode [ 86.652090][ T6156] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 86.659669][ T6156] Cannot create hsr debugfs directory [ 86.877773][ T6150] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 86.939411][ T6150] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 86.995061][ T6150] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 87.036469][ T6150] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 87.043490][ T3558] Bluetooth: hci1: command 0x041b tx timeout [ 87.122045][ T3558] Bluetooth: hci2: command 0x041b tx timeout [ 87.122095][ T3558] Bluetooth: hci5: command 0x041b tx timeout [ 87.122126][ T3558] Bluetooth: hci0: command 0x041b tx timeout [ 87.137059][ T6158] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 87.202022][ T3558] Bluetooth: hci3: command 0x041b tx timeout [ 87.214657][ T6158] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 87.267528][ T6158] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 87.324264][ T6158] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.445245][ T6153] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 87.501292][ T6153] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 87.544186][ T6153] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 87.634717][ T6153] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 87.739054][ T6159] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 87.787332][ T6158] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.806248][ T6159] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 87.880740][ T6159] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 87.935685][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.945546][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.960527][ T6150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.971199][ T6158] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.987544][ T6159] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 88.052290][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.061241][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.071250][ T7235] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.078902][ T7235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.089996][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.098771][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.108566][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.117867][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.126802][ T7235] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.134031][ T7235] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.141897][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.153174][ T6156] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 88.186891][ T6150] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.198382][ T7240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.207080][ T7240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.216207][ T7240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.224940][ T7240] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.232170][ T7240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.241169][ T7240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.250860][ T6156] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 88.308232][ T6156] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 88.355376][ T6156] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 88.450183][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.463337][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.477428][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.486043][ T7246] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.493205][ T7246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.504365][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.513564][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.524589][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.536280][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.591495][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.600946][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.613402][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.622452][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.630975][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.641462][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 88.650731][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.689746][ T6158] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 88.700310][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.709794][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.720080][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.729468][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.739591][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.751497][ T6153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.797690][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.809050][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.818709][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 88.828082][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.851617][ T6150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 88.871695][ T7240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.879996][ T7240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.915117][ T6153] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.928811][ T6158] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.941608][ T7240] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 88.950947][ T7240] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 88.964793][ T6156] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.003593][ T6150] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.016626][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.026391][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.036030][ T7210] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.043222][ T7210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.050940][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.059981][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.068610][ T7210] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.075901][ T7210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.084002][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 89.091454][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 89.099163][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.114670][ T6159] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.121957][ T7240] Bluetooth: hci1: command 0x040f tx timeout [ 89.124605][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.160524][ T6156] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.169749][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.184941][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 89.196471][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 89.208215][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.212112][ T7240] Bluetooth: hci0: command 0x040f tx timeout [ 89.222351][ T7240] Bluetooth: hci5: command 0x040f tx timeout [ 89.227650][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.228465][ T7240] Bluetooth: hci2: command 0x040f tx timeout [ 89.282146][ T7249] Bluetooth: hci3: command 0x040f tx timeout [ 89.292620][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 89.300866][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.310045][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.318990][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.327310][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.336329][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.345413][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.354700][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.364853][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.372019][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.380114][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 89.389285][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 89.398313][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.407574][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.416416][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 89.425152][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 89.436089][ T6159] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.445890][ T6158] device veth0_vlan entered promiscuous mode [ 89.462835][ T6150] device veth0_vlan entered promiscuous mode [ 89.470268][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.478671][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.487334][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.495779][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.504365][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 89.512641][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 89.520634][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.529584][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.538484][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.547299][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.555931][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.565203][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.573900][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.580962][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.593059][ T6153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.616974][ T6158] device veth1_vlan entered promiscuous mode [ 89.627151][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.636753][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.648038][ T7248] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.655182][ T7248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.663509][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.672730][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.682977][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 89.694188][ T6150] device veth1_vlan entered promiscuous mode [ 89.729691][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.738892][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.748729][ T7246] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.755972][ T7246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.764668][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.773960][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.822148][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 89.830073][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.840492][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 89.849880][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.859046][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.868143][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 89.876187][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 89.911938][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 89.921505][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 89.930908][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 89.940635][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.949451][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 89.958544][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 89.967449][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.976514][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.985315][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.995087][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.003893][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 90.012801][ T7246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 90.023043][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.031854][ T6158] device veth0_macvtap entered promiscuous mode [ 90.043243][ T6156] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.059758][ T6159] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 90.071121][ T6159] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 90.088981][ T6150] device veth0_macvtap entered promiscuous mode [ 90.105709][ T6158] device veth1_macvtap entered promiscuous mode [ 90.113893][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 90.123831][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 90.132362][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 90.140420][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 90.149502][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.158505][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.167101][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.179160][ T6153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.189035][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.221286][ T6150] device veth1_macvtap entered promiscuous mode [ 90.248661][ T6156] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.282169][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 90.290250][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.298993][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.307297][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.315305][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.348452][ T6158] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 90.361924][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.371042][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.386289][ T6159] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.398434][ T6150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 90.410043][ T6150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.425810][ T6150] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 90.436524][ T6158] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 90.464128][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 90.473445][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 90.482962][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 90.492935][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 90.501651][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.511238][ T7210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.524099][ T6150] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 90.535052][ T6150] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 90.548457][ T6150] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 90.569915][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 90.581290][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 90.594122][ T6158] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.604667][ T6158] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.619260][ T6158] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.635972][ T6158] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.664689][ T6150] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.673908][ T6150] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.685704][ T6150] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.699934][ T6150] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.739665][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.751205][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.761046][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.769937][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 90.802389][ T6153] device veth0_vlan entered promiscuous mode [ 90.817941][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 90.826215][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 90.834608][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 90.843709][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 90.897479][ T6153] device veth1_vlan entered promiscuous mode [ 90.943347][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 90.951570][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 90.977104][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.000797][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 91.018427][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 91.036875][ T6159] device veth0_vlan entered promiscuous mode [ 91.055844][ T6156] device veth0_vlan entered promiscuous mode [ 91.065196][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 91.078104][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.095630][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.112730][ T7259] FAULT_INJECTION: forcing a failure. [ 91.112730][ T7259] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 91.131170][ T7257] FAULT_INJECTION: forcing a failure. [ 91.131170][ T7257] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 91.145555][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 91.163260][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 91.170621][ T7259] CPU: 0 PID: 7259 Comm: syz-executor.1 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 91.180664][ T7259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.190731][ T7259] Call Trace: [ 91.194022][ T7259] dump_stack_lvl+0x11c/0x14e [ 91.198733][ T7259] should_fail.cold+0x5/0x1f [ 91.203359][ T7259] _copy_to_user+0x2c/0x150 [ 91.207890][ T7259] simple_read_from_buffer+0xcc/0x160 [ 91.213561][ T7259] proc_fail_nth_read+0x187/0x220 [ 91.218615][ T7259] ? proc_fault_inject_read+0x220/0x220 [ 91.224185][ T7259] ? security_file_permission+0x248/0x560 [ 91.229942][ T7259] ? proc_fault_inject_read+0x220/0x220 [ 91.235515][ T7259] vfs_read+0x1b5/0x570 [ 91.239704][ T7259] ksys_read+0x12d/0x250 [ 91.243982][ T7259] ? vfs_write+0xa90/0xa90 [ 91.248424][ T7259] ? check_preemption_disabled+0x50/0x150 [ 91.254170][ T7259] ? syscall_enter_from_user_mode+0x1d/0x60 [ 91.260279][ T7259] do_syscall_64+0x35/0xb0 [ 91.264717][ T7259] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.270752][ T7259] RIP: 0033:0x41816c [ 91.274759][ T7259] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 91.294827][ T7259] RSP: 002b:00007f638d9ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 91.303445][ T7259] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 91.311437][ T7259] RDX: 000000000000000f RSI: 00007f638d9ac1e0 RDI: 0000000000000006 [ 91.319689][ T7259] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 91.327678][ T7259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.335802][ T7259] R13: 00007ffc4f2eb70f R14: 00007f638d9ac300 R15: 0000000000022000 [ 91.343883][ T7257] CPU: 1 PID: 7257 Comm: syz-executor.2 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 91.353739][ T7257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.363849][ T7257] Call Trace: [ 91.367159][ T7257] dump_stack_lvl+0x11c/0x14e [ 91.371866][ T7257] should_fail.cold+0x5/0x1f [ 91.376488][ T7257] _copy_to_user+0x2c/0x150 [ 91.378386][ T6159] device veth1_vlan entered promiscuous mode [ 91.381019][ T7257] simple_read_from_buffer+0xcc/0x160 [ 91.392363][ T7257] proc_fail_nth_read+0x187/0x220 [ 91.397501][ T7257] ? proc_fault_inject_read+0x220/0x220 [ 91.403121][ T7257] ? security_file_permission+0x248/0x560 [ 91.408963][ T7257] ? proc_fault_inject_read+0x220/0x220 [ 91.414628][ T7257] vfs_read+0x1b5/0x570 [ 91.418824][ T7257] ksys_read+0x12d/0x250 [ 91.423096][ T7257] ? vfs_write+0xa90/0xa90 [ 91.427545][ T7257] ? check_preemption_disabled+0x50/0x150 [ 91.433666][ T7257] ? syscall_enter_from_user_mode+0x1d/0x60 [ 91.439607][ T7257] do_syscall_64+0x35/0xb0 [ 91.444062][ T7257] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.449988][ T7257] RIP: 0033:0x41816c [ 91.453896][ T7257] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 91.461273][ T6159] device veth0_macvtap entered promiscuous mode [ 91.474044][ T7257] RSP: 002b:00007fd1ddf86170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 91.474070][ T7257] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 91.474086][ T7257] RDX: 000000000000000f RSI: 00007fd1ddf861e0 RDI: 0000000000000006 [ 91.474101][ T7257] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 2021/06/30 10:01:39 executed programs: 6 [ 91.474115][ T7257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.474128][ T7257] R13: 00007ffdc464cc2f R14: 00007fd1ddf86300 R15: 0000000000022000 [ 91.478878][ T7246] Bluetooth: hci1: command 0x0419 tx timeout [ 91.543098][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 91.551614][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 91.555478][ T7246] Bluetooth: hci2: command 0x0419 tx timeout [ 91.567835][ T7246] Bluetooth: hci5: command 0x0419 tx timeout [ 91.574908][ T7246] Bluetooth: hci0: command 0x0419 tx timeout [ 91.581053][ T7246] Bluetooth: hci3: command 0x0419 tx timeout [ 91.604357][ T7267] FAULT_INJECTION: forcing a failure. [ 91.604357][ T7267] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.618132][ T7267] CPU: 1 PID: 7267 Comm: syz-executor.1 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 91.619838][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 91.627720][ T7267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.627740][ T7267] Call Trace: [ 91.627753][ T7267] dump_stack_lvl+0x11c/0x14e [ 91.627788][ T7267] should_fail.cold+0x5/0x1f [ 91.627814][ T7267] _copy_to_user+0x2c/0x150 [ 91.627843][ T7267] simple_read_from_buffer+0xcc/0x160 [ 91.627876][ T7267] proc_fail_nth_read+0x187/0x220 [ 91.627902][ T7267] ? proc_fault_inject_read+0x220/0x220 [ 91.627923][ T7267] ? security_file_permission+0x248/0x560 [ 91.627957][ T7267] ? proc_fault_inject_read+0x220/0x220 [ 91.627984][ T7267] vfs_read+0x1b5/0x570 [ 91.628016][ T7267] ksys_read+0x12d/0x250 [ 91.628046][ T7267] ? vfs_write+0xa90/0xa90 [ 91.628076][ T7267] ? check_preemption_disabled+0x50/0x150 [ 91.628105][ T7267] ? syscall_enter_from_user_mode+0x1d/0x60 [ 91.715391][ T7267] do_syscall_64+0x35/0xb0 [ 91.719836][ T7267] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 91.725741][ T7267] RIP: 0033:0x41816c [ 91.729643][ T7267] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 91.749536][ T7267] RSP: 002b:00007f638d9ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 91.757966][ T7267] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 91.765953][ T7267] RDX: 000000000000000f RSI: 00007f638d9ac1e0 RDI: 0000000000000006 [ 91.774206][ T7267] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 91.782270][ T7267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.790323][ T7267] R13: 00007ffc4f2eb70f R14: 00007f638d9ac300 R15: 0000000000022000 [ 91.812682][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.835837][ T6156] device veth1_vlan entered promiscuous mode [ 91.870109][ T6153] device veth0_macvtap entered promiscuous mode [ 91.889661][ T6159] device veth1_macvtap entered promiscuous mode [ 91.901063][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 91.918897][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 91.931700][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 91.974952][ T6153] device veth1_macvtap entered promiscuous mode [ 92.010864][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 92.022679][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 92.036014][ T7266] FAULT_INJECTION: forcing a failure. [ 92.036014][ T7266] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.084468][ T7266] CPU: 1 PID: 7266 Comm: syz-executor.2 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 92.084604][ T6159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.094054][ T7266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.094069][ T7266] Call Trace: [ 92.094078][ T7266] dump_stack_lvl+0x11c/0x14e [ 92.094112][ T7266] should_fail.cold+0x5/0x1f [ 92.094139][ T7266] _copy_to_user+0x2c/0x150 [ 92.094167][ T7266] simple_read_from_buffer+0xcc/0x160 [ 92.094204][ T7266] proc_fail_nth_read+0x187/0x220 [ 92.094233][ T7266] ? proc_fault_inject_read+0x220/0x220 [ 92.094257][ T7266] ? security_file_permission+0x248/0x560 [ 92.094295][ T7266] ? proc_fault_inject_read+0x220/0x220 [ 92.094322][ T7266] vfs_read+0x1b5/0x570 [ 92.094358][ T7266] ksys_read+0x12d/0x250 [ 92.094386][ T7266] ? vfs_write+0xa90/0xa90 [ 92.094415][ T7266] ? check_preemption_disabled+0x50/0x150 [ 92.094443][ T7266] ? syscall_enter_from_user_mode+0x1d/0x60 [ 92.126807][ T6159] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.128088][ T7266] do_syscall_64+0x35/0xb0 [ 92.128120][ T7266] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 92.149031][ T6159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.154464][ T7266] RIP: 0033:0x41816c [ 92.154488][ T7266] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 92.154510][ T7266] RSP: 002b:00007fd1ddf86170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.154533][ T7266] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 92.154549][ T7266] RDX: 000000000000000f RSI: 00007fd1ddf861e0 RDI: 0000000000000006 [ 92.154563][ T7266] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 92.154577][ T7266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.170261][ T6159] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.173037][ T7266] R13: 00007ffdc464cc2f R14: 00007fd1ddf86300 R15: 0000000000022000 [ 92.304925][ T7275] FAULT_INJECTION: forcing a failure. [ 92.304925][ T7275] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.307527][ T6159] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 92.333764][ T7275] CPU: 0 PID: 7275 Comm: syz-executor.2 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 92.336257][ T6153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.343353][ T7275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.343368][ T7275] Call Trace: [ 92.343377][ T7275] dump_stack_lvl+0x11c/0x14e [ 92.343413][ T7275] should_fail.cold+0x5/0x1f [ 92.376429][ T7275] _copy_to_user+0x2c/0x150 [ 92.380938][ T7275] simple_read_from_buffer+0xcc/0x160 [ 92.386329][ T7275] proc_fail_nth_read+0x187/0x220 [ 92.391368][ T7275] ? proc_fault_inject_read+0x220/0x220 [ 92.396907][ T7275] ? security_file_permission+0x248/0x560 [ 92.402647][ T7275] ? proc_fault_inject_read+0x220/0x220 [ 92.408186][ T7275] vfs_read+0x1b5/0x570 [ 92.412971][ T7275] ksys_read+0x12d/0x250 [ 92.417213][ T7275] ? vfs_write+0xa90/0xa90 [ 92.421641][ T7275] ? check_preemption_disabled+0x50/0x150 [ 92.427370][ T7275] ? syscall_enter_from_user_mode+0x1d/0x60 [ 92.433282][ T7275] do_syscall_64+0x35/0xb0 [ 92.437736][ T7275] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 92.444167][ T7275] RIP: 0033:0x41816c [ 92.448067][ T7275] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 92.467781][ T7275] RSP: 002b:00007fd1ddf86170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.476188][ T7275] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 92.484154][ T7275] RDX: 000000000000000f RSI: 00007fd1ddf861e0 RDI: 0000000000000006 [ 92.493960][ T7275] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 92.501927][ T7275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.510327][ T7275] R13: 00007ffdc464cc2f R14: 00007fd1ddf86300 R15: 0000000000022000 [ 92.535998][ T6153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.548461][ T6153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.561285][ T6153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.572750][ T6153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 92.584650][ T6153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 92.597551][ T6153] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 92.618364][ T7274] FAULT_INJECTION: forcing a failure. [ 92.618364][ T7274] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.641330][ T6156] device veth0_macvtap entered promiscuous mode [ 92.671167][ T7279] FAULT_INJECTION: forcing a failure. [ 92.671167][ T7279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.686202][ T7279] CPU: 1 PID: 7279 Comm: syz-executor.2 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 92.686611][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.695781][ T7279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.695797][ T7279] Call Trace: [ 92.695808][ T7279] dump_stack_lvl+0x11c/0x14e [ 92.695842][ T7279] should_fail.cold+0x5/0x1f [ 92.695874][ T7279] _copy_to_user+0x2c/0x150 [ 92.695900][ T7279] simple_read_from_buffer+0xcc/0x160 [ 92.695938][ T7279] proc_fail_nth_read+0x187/0x220 [ 92.695967][ T7279] ? proc_fault_inject_read+0x220/0x220 [ 92.695991][ T7279] ? security_file_permission+0x248/0x560 [ 92.737906][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.742273][ T7279] ? proc_fault_inject_read+0x220/0x220 [ 92.742307][ T7279] vfs_read+0x1b5/0x570 [ 92.742341][ T7279] ksys_read+0x12d/0x250 [ 92.742367][ T7279] ? vfs_write+0xa90/0xa90 [ 92.742395][ T7279] ? check_preemption_disabled+0x50/0x150 [ 92.742424][ T7279] ? syscall_enter_from_user_mode+0x1d/0x60 [ 92.742459][ T7279] do_syscall_64+0x35/0xb0 [ 92.742484][ T7279] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 92.742514][ T7279] RIP: 0033:0x41816c [ 92.769229][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 92.771583][ T7279] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 92.771611][ T7279] RSP: 002b:00007fd1ddf86170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.771637][ T7279] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 92.793538][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 92.796749][ T7279] RDX: 000000000000000f RSI: 00007fd1ddf861e0 RDI: 0000000000000006 [ 92.828950][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 92.834543][ T7279] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 92.834564][ T7279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.834578][ T7279] R13: 00007ffdc464cc2f R14: 00007fd1ddf86300 R15: 0000000000022000 [ 92.903468][ T7281] FAULT_INJECTION: forcing a failure. [ 92.903468][ T7281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.912427][ T7274] CPU: 0 PID: 7274 Comm: syz-executor.1 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 92.926149][ T7274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.936292][ T7274] Call Trace: [ 92.939572][ T7274] dump_stack_lvl+0x11c/0x14e [ 92.944254][ T7274] should_fail.cold+0x5/0x1f [ 92.949008][ T7274] _copy_to_user+0x2c/0x150 [ 92.953524][ T7274] simple_read_from_buffer+0xcc/0x160 [ 92.959175][ T7274] proc_fail_nth_read+0x187/0x220 [ 92.964201][ T7274] ? proc_fault_inject_read+0x220/0x220 [ 92.969742][ T7274] ? security_file_permission+0x248/0x560 [ 92.975470][ T7274] ? proc_fault_inject_read+0x220/0x220 [ 92.981023][ T7274] vfs_read+0x1b5/0x570 [ 92.985192][ T7274] ksys_read+0x12d/0x250 [ 92.989435][ T7274] ? vfs_write+0xa90/0xa90 [ 92.993851][ T7274] ? check_preemption_disabled+0x50/0x150 [ 92.999594][ T7274] ? syscall_enter_from_user_mode+0x1d/0x60 [ 93.005779][ T7274] do_syscall_64+0x35/0xb0 [ 93.010287][ T7274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.016189][ T7274] RIP: 0033:0x41816c [ 93.020091][ T7274] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 93.039958][ T7274] RSP: 002b:00007f638d9ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 93.048386][ T7274] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 93.056358][ T7274] RDX: 000000000000000f RSI: 00007f638d9ac1e0 RDI: 0000000000000006 [ 93.064326][ T7274] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 93.072295][ T7274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.080347][ T7274] R13: 00007ffc4f2eb70f R14: 00007f638d9ac300 R15: 0000000000022000 [ 93.088377][ T7281] CPU: 1 PID: 7281 Comm: syz-executor.2 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 93.098560][ T7281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.108891][ T7281] Call Trace: [ 93.112181][ T7281] dump_stack_lvl+0x11c/0x14e [ 93.116916][ T7281] should_fail.cold+0x5/0x1f [ 93.121524][ T7281] _copy_to_user+0x2c/0x150 [ 93.126139][ T7281] simple_read_from_buffer+0xcc/0x160 [ 93.131629][ T7281] proc_fail_nth_read+0x187/0x220 [ 93.136673][ T7281] ? proc_fault_inject_read+0x220/0x220 [ 93.142318][ T7281] ? security_file_permission+0x248/0x560 [ 93.148066][ T7281] ? proc_fault_inject_read+0x220/0x220 [ 93.153628][ T7281] vfs_read+0x1b5/0x570 [ 93.157890][ T7281] ksys_read+0x12d/0x250 [ 93.162146][ T7281] ? vfs_write+0xa90/0xa90 [ 93.166584][ T7281] ? check_preemption_disabled+0x50/0x150 [ 93.172320][ T7281] ? syscall_enter_from_user_mode+0x1d/0x60 [ 93.178243][ T7281] do_syscall_64+0x35/0xb0 [ 93.182890][ T7281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.188805][ T7281] RIP: 0033:0x41816c [ 93.192719][ T7281] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 93.198590][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 93.212510][ T7281] RSP: 002b:00007fd1ddf86170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 93.212537][ T7281] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 93.212551][ T7281] RDX: 000000000000000f RSI: 00007fd1ddf861e0 RDI: 0000000000000006 [ 93.212564][ T7281] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 93.212577][ T7281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.212590][ T7281] R13: 00007ffdc464cc2f R14: 00007fd1ddf86300 R15: 0000000000022000 [ 93.315050][ T6159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.344830][ T7286] FAULT_INJECTION: forcing a failure. [ 93.344830][ T7286] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.354710][ T6159] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.376884][ T6159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.383595][ T7286] CPU: 1 PID: 7286 Comm: syz-executor.1 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 93.390059][ T6159] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.397003][ T7286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.397018][ T7286] Call Trace: [ 93.397028][ T7286] dump_stack_lvl+0x11c/0x14e [ 93.397063][ T7286] should_fail.cold+0x5/0x1f [ 93.397091][ T7286] _copy_to_user+0x2c/0x150 [ 93.397117][ T7286] simple_read_from_buffer+0xcc/0x160 [ 93.397152][ T7286] proc_fail_nth_read+0x187/0x220 [ 93.397187][ T7286] ? proc_fault_inject_read+0x220/0x220 [ 93.397211][ T7286] ? security_file_permission+0x248/0x560 [ 93.397245][ T7286] ? proc_fault_inject_read+0x220/0x220 [ 93.397268][ T7286] vfs_read+0x1b5/0x570 [ 93.419984][ T6159] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 93.420393][ T7286] ksys_read+0x12d/0x250 [ 93.477259][ T7286] ? vfs_write+0xa90/0xa90 [ 93.481702][ T7286] ? check_preemption_disabled+0x50/0x150 [ 93.487442][ T7286] ? syscall_enter_from_user_mode+0x1d/0x60 [ 93.493369][ T7286] do_syscall_64+0x35/0xb0 [ 93.497811][ T7286] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.503729][ T7286] RIP: 0033:0x41816c [ 93.507632][ T7286] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 93.523557][ T6160] BUG: sleeping function called from invalid context at net/core/sock.c:3100 [ 93.527449][ T7286] RSP: 002b:00007f638d9ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 93.527478][ T7286] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 93.536906][ T6160] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 6160, name: syz-executor.5 [ 93.545193][ T7286] RDX: 000000000000000f RSI: 00007f638d9ac1e0 RDI: 0000000000000006 [ 93.545210][ T7286] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 93.545222][ T7286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.545235][ T7286] R13: 00007ffc4f2eb70f R14: 00007f638d9ac300 R15: 0000000000022000 [ 93.590260][ T6156] device veth1_macvtap entered promiscuous mode [ 93.595155][ T6160] 1 lock held by syz-executor.5/6160: [ 93.606978][ T6160] #0: ffffffff8c368a40 (hci_sk_list.lock){++++}-{2:2}, at: hci_sock_dev_event+0x39a/0x5a0 [ 93.617169][ T6160] Preemption disabled at: [ 93.617180][ T6160] [<0000000000000000>] 0x0 [ 93.622828][ T6153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.626148][ T6160] CPU: 0 PID: 6160 Comm: syz-executor.5 Not tainted 5.13.0-next-20210630-syzkaller #0 [ 93.645516][ T6153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.646010][ T6160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.646027][ T6160] Call Trace: [ 93.646039][ T6160] dump_stack_lvl+0x11c/0x14e [ 93.657980][ T6153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.665892][ T6160] ___might_sleep.cold+0x222/0x268 [ 93.665928][ T6160] lock_sock_nested+0x25/0x120 [ 93.665960][ T6160] hci_sock_dev_event+0x413/0x5a0 [ 93.665985][ T6160] ? hci_send_monitor_ctrl_event+0x5c0/0x5c0 [ 93.671865][ T6153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.673935][ T6160] hci_unregister_dev+0x2e1/0xff0 [ 93.685800][ T6153] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 93.689493][ T6160] ? fsnotify+0x1020/0x1020 [ 93.689525][ T6160] ? hci_bdaddr_list_clear+0x200/0x200 [ 93.695974][ T6153] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 93.699725][ T6160] ? check_preemption_disabled+0x50/0x150 [ 93.699764][ T6160] ? fcntl_setlk+0xef0/0xef0 [ 93.709203][ T6153] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 93.715641][ T6160] ? lock_is_held_type+0xfa/0x130 [ 93.715679][ T6160] vhci_release+0x70/0xe0 [ 93.715707][ T6160] __fput+0x288/0x920 [ 93.715729][ T6160] ? vhci_close_dev+0x50/0x50 [ 93.728307][ T6153] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.731148][ T6160] task_work_run+0xdd/0x1a0 [ 93.731183][ T6160] do_exit+0xc7a/0x2b50 [ 93.743718][ T6153] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.750990][ T6160] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 93.751023][ T6160] ? vfs_write+0x18e/0xa90 [ 93.764596][ T6153] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.768519][ T6160] ? mm_update_next_owner+0x7a0/0x7a0 [ 93.768563][ T6160] do_group_exit+0x125/0x310 [ 93.781010][ T6153] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.781945][ T6160] __x64_sys_exit_group+0x3a/0x50 [ 93.781976][ T6160] do_syscall_64+0x35/0xb0 [ 93.782000][ T6160] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 93.866577][ T6160] RIP: 0033:0x465159 [ 93.870570][ T6160] Code: Unable to access opcode bytes at RIP 0x46512f. [ 93.877667][ T6160] RSP: 002b:00007fff9826f878 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 93.886072][ T6160] RAX: ffffffffffffffda RBX: 00007fff9826fa38 RCX: 0000000000465159 [ 93.894034][ T6160] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043 [ 93.901994][ T6160] RBP: 00000000004ae5a0 R08: 000000000000000c R09: 0000000000000000 [ 93.909962][ T6160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 93.918012][ T6160] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000400520 [ 93.927733][ T6160] [ 93.930074][ T6160] ====================================================== [ 93.937526][ T6160] WARNING: possible circular locking dependency detected [ 93.944546][ T6160] 5.13.0-next-20210630-syzkaller #0 Tainted: G W [ 93.952175][ T6160] ------------------------------------------------------ [ 93.959453][ T6160] syz-executor.5/6160 is trying to acquire lock: [ 93.965783][ T6160] ffff888103c4b120 (sk_lock-AF_BLUETOOTH-BTPROTO_HCI){+.+.}-{0:0}, at: hci_sock_dev_event+0x413/0x5a0 [ 93.976851][ T6160] [ 93.976851][ T6160] but task is already holding lock: [ 93.984301][ T6160] ffffffff8c368a40 (hci_sk_list.lock){++++}-{2:2}, at: hci_sock_dev_event+0x39a/0x5a0 [ 93.993986][ T6160] [ 93.993986][ T6160] which lock already depends on the new lock. [ 93.993986][ T6160] [ 94.004391][ T6160] [ 94.004391][ T6160] the existing dependency chain (in reverse order) is: [ 94.013499][ T6160] [ 94.013499][ T6160] -> #1 (hci_sk_list.lock){++++}-{2:2}: [ 94.021246][ T6160] _raw_write_lock+0x2a/0x40 [ 94.026381][ T6160] bt_sock_unlink+0x1d/0x1c0 [ 94.031513][ T6160] hci_sock_release+0xbe/0x410 [ 94.036897][ T6160] __sock_release+0xcd/0x280 [ 94.042207][ T6160] sock_close+0x18/0x20 [ 94.046881][ T6160] __fput+0x288/0x920 [ 94.051367][ T6160] task_work_run+0xdd/0x1a0 [ 94.056382][ T6160] exit_to_user_mode_prepare+0x278/0x280 [ 94.062576][ T6160] syscall_exit_to_user_mode+0x40/0x70 [ 94.068540][ T6160] do_syscall_64+0x42/0xb0 [ 94.073458][ T6160] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 94.080029][ T6160] [ 94.080029][ T6160] -> #0 (sk_lock-AF_BLUETOOTH-BTPROTO_HCI){+.+.}-{0:0}: [ 94.089431][ T6160] __lock_acquire+0x2a11/0x5450 [ 94.095219][ T6160] lock_acquire+0x212/0x5d0 [ 94.100224][ T6160] lock_sock_nested+0xca/0x120 [ 94.105506][ T6160] hci_sock_dev_event+0x413/0x5a0 [ 94.111901][ T6160] hci_unregister_dev+0x2e1/0xff0 [ 94.117444][ T6160] vhci_release+0x70/0xe0 [ 94.122292][ T6160] __fput+0x288/0x920 [ 94.126799][ T6160] task_work_run+0xdd/0x1a0 [ 94.131807][ T6160] do_exit+0xc7a/0x2b50 [ 94.136466][ T6160] do_group_exit+0x125/0x310 [ 94.141566][ T6160] __x64_sys_exit_group+0x3a/0x50 [ 94.147360][ T6160] do_syscall_64+0x35/0xb0 [ 94.152369][ T6160] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 94.158780][ T6160] [ 94.158780][ T6160] other info that might help us debug this: [ 94.158780][ T6160] [ 94.168984][ T6160] Possible unsafe locking scenario: [ 94.168984][ T6160] [ 94.176409][ T6160] CPU0 CPU1 [ 94.181754][ T6160] ---- ---- [ 94.187183][ T6160] lock(hci_sk_list.lock); [ 94.191765][ T6160] lock(sk_lock-AF_BLUETOOTH-BTPROTO_HCI); [ 94.200325][ T6160] lock(hci_sk_list.lock); [ 94.207429][ T6160] lock(sk_lock-AF_BLUETOOTH-BTPROTO_HCI); [ 94.213310][ T6160] [ 94.213310][ T6160] *** DEADLOCK *** [ 94.213310][ T6160] [ 94.221427][ T6160] 1 lock held by syz-executor.5/6160: [ 94.226780][ T6160] #0: ffffffff8c368a40 (hci_sk_list.lock){++++}-{2:2}, at: hci_sock_dev_event+0x39a/0x5a0 [ 94.236779][ T6160] [ 94.236779][ T6160] stack backtrace: [ 94.242745][ T6160] CPU: 0 PID: 6160 Comm: syz-executor.5 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 94.254012][ T6160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.264498][ T6160] Call Trace: [ 94.267762][ T6160] dump_stack_lvl+0x11c/0x14e [ 94.272828][ T6160] check_noncircular+0x25f/0x2e0 [ 94.277866][ T6160] ? look_up_lock_class+0x82/0xf0 [ 94.282891][ T6160] ? print_circular_bug+0x1e0/0x1e0 [ 94.288083][ T6160] ? lockdep_lock+0xbf/0x250 [ 94.292691][ T6160] ? arch_local_irq_save+0x90/0x90 [ 94.297915][ T6160] __lock_acquire+0x2a11/0x5450 [ 94.302829][ T6160] ? lockdep_hardirqs_on_prepare+0x460/0x460 [ 94.308890][ T6160] lock_acquire+0x212/0x5d0 [ 94.313381][ T6160] ? hci_sock_dev_event+0x413/0x5a0 [ 94.318581][ T6160] ? lock_release+0x7f0/0x7f0 [ 94.323238][ T6160] ? lock_downgrade+0x7b0/0x7b0 [ 94.328174][ T6160] ? do_raw_spin_lock+0x120/0x2b0 [ 94.333180][ T6160] ? rwlock_bug.part.0+0x90/0x90 [ 94.338106][ T6160] ? arch_local_irq_enable+0x41/0x49 [ 94.343378][ T6160] lock_sock_nested+0xca/0x120 [ 94.348254][ T6160] ? hci_sock_dev_event+0x413/0x5a0 [ 94.353435][ T6160] hci_sock_dev_event+0x413/0x5a0 [ 94.358441][ T6160] ? hci_send_monitor_ctrl_event+0x5c0/0x5c0 [ 94.364403][ T6160] hci_unregister_dev+0x2e1/0xff0 [ 94.369414][ T6160] ? fsnotify+0x1020/0x1020 [ 94.373914][ T6160] ? hci_bdaddr_list_clear+0x200/0x200 [ 94.379359][ T6160] ? check_preemption_disabled+0x50/0x150 [ 94.385074][ T6160] ? fcntl_setlk+0xef0/0xef0 [ 94.389660][ T6160] ? lock_is_held_type+0xfa/0x130 [ 94.394753][ T6160] vhci_release+0x70/0xe0 [ 94.399066][ T6160] __fput+0x288/0x920 [ 94.403030][ T6160] ? vhci_close_dev+0x50/0x50 [ 94.407690][ T6160] task_work_run+0xdd/0x1a0 [ 94.412183][ T6160] do_exit+0xc7a/0x2b50 [ 94.416426][ T6160] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 94.422665][ T6160] ? vfs_write+0x18e/0xa90 [ 94.427069][ T6160] ? mm_update_next_owner+0x7a0/0x7a0 [ 94.432432][ T6160] do_group_exit+0x125/0x310 [ 94.437096][ T6160] __x64_sys_exit_group+0x3a/0x50 [ 94.442224][ T6160] do_syscall_64+0x35/0xb0 [ 94.446635][ T6160] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 94.452530][ T6160] RIP: 0033:0x465159 [ 94.456402][ T6160] Code: Unable to access opcode bytes at RIP 0x46512f. [ 94.463222][ T6160] RSP: 002b:00007fff9826f878 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 94.471616][ T6160] RAX: ffffffffffffffda RBX: 00007fff9826fa38 RCX: 0000000000465159 [ 94.479597][ T6160] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043 [ 94.487570][ T6160] RBP: 00000000004ae5a0 R08: 000000000000000c R09: 0000000000000000 [ 94.495530][ T6160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 94.503535][ T6160] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000400520 [ 94.517754][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 94.526014][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.534700][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.544131][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.553139][ T7223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2021/06/30 10:01:42 result: hanged=false err=executor 5: failed to write control pipe: write |1: broken pipe wrong response packet (errno 16) loop exited with status 67 [ 94.567064][ T6159] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.579460][ T6159] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.597651][ T6159] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.640191][ T6159] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.703791][ T6156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.717101][ T6156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.729920][ T6156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.745581][ T6156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.757264][ T6156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.769007][ T7296] FAULT_INJECTION: forcing a failure. [ 94.769007][ T7296] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 94.784907][ T7296] CPU: 0 PID: 7296 Comm: syz-executor.0 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 94.795886][ T7296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.805211][ T6156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.805960][ T7296] Call Trace: [ 94.805970][ T7296] dump_stack_lvl+0x11c/0x14e [ 94.815892][ T6156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 94.819037][ T7296] should_fail.cold+0x5/0x1f [ 94.823855][ T6156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 94.834214][ T7296] _copy_to_user+0x2c/0x150 [ 94.834246][ T7296] simple_read_from_buffer+0xcc/0x160 [ 94.834274][ T7296] proc_fail_nth_read+0x187/0x220 [ 94.834298][ T7296] ? proc_fault_inject_read+0x220/0x220 [ 94.840227][ T6156] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 94.848640][ T7296] ? security_file_permission+0x248/0x560 [ 94.848676][ T7296] ? proc_fault_inject_read+0x220/0x220 [ 94.848699][ T7296] vfs_read+0x1b5/0x570 [ 94.848726][ T7296] ksys_read+0x12d/0x250 [ 94.848752][ T7296] ? vfs_write+0xa90/0xa90 [ 94.848778][ T7296] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 94.848803][ T7296] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 94.848827][ T7296] ? syscall_enter_from_user_mode+0x1d/0x60 [ 94.918891][ T7296] do_syscall_64+0x35/0xb0 [ 94.923403][ T7296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 94.929290][ T7296] RIP: 0033:0x41816c [ 94.933181][ T7296] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 94.952822][ T7296] RSP: 002b:00007fb6398fe170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 94.961249][ T7296] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 94.969296][ T7296] RDX: 000000000000000f RSI: 00007fb6398fe1e0 RDI: 0000000000000006 [ 94.977259][ T7296] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 94.985222][ T7296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.993264][ T7296] R13: 00007ffdb1b4b6ef R14: 00007fb6398fe300 R15: 0000000000022000 [ 95.014050][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.033019][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 95.044253][ T6156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 95.058684][ T6156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.069728][ T6156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 95.082848][ T6156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.094588][ T6156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 95.106897][ T6156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.119439][ T6156] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 95.130301][ T6156] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 95.141476][ T6156] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 95.151511][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.160568][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 95.175679][ T6156] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.184647][ T6156] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.195485][ T6156] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.204724][ T6156] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.280021][ T7303] FAULT_INJECTION: forcing a failure. [ 95.280021][ T7303] name failslab, interval 1, probability 0, space 0, times 1 [ 95.295192][ T7303] CPU: 1 PID: 7303 Comm: syz-executor.3 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 95.306154][ T7303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.316552][ T7303] Call Trace: [ 95.319997][ T7303] dump_stack_lvl+0x11c/0x14e [ 95.324672][ T7303] should_fail.cold+0x5/0x1f [ 95.330746][ T7303] should_failslab+0x5/0x10 [ 95.335255][ T7303] __kmalloc+0x7b/0x3d0 [ 95.339405][ T7303] ? allocate_probes+0x45/0x90 [ 95.344160][ T7303] ? rcu_read_lock_sched_held+0xd/0xb0 [ 95.349734][ T7303] ? lock_release+0x563/0x7f0 [ 95.354401][ T7303] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 95.360288][ T7303] allocate_probes+0x45/0x90 [ 95.364870][ T7303] tracepoint_probe_unregister+0x18f/0x9a0 [ 95.370673][ T7303] bpf_raw_tp_link_release+0x51/0xa0 [ 95.375960][ T7303] bpf_link_free+0xe6/0x1b0 [ 95.380541][ T7303] bpf_link_put+0x161/0x1b0 [ 95.385032][ T7303] bpf_link_release+0x33/0x40 [ 95.389699][ T7303] __fput+0x288/0x920 [ 95.393667][ T7303] ? bpf_link_put+0x1b0/0x1b0 [ 95.398334][ T7303] task_work_run+0xdd/0x1a0 [ 95.402825][ T7303] exit_to_user_mode_prepare+0x278/0x280 [ 95.408574][ T7303] syscall_exit_to_user_mode+0x40/0x70 [ 95.414111][ T7303] do_syscall_64+0x42/0xb0 [ 95.418608][ T7303] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 95.424591][ T7303] RIP: 0033:0x465159 [ 95.428493][ T7303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 95.448284][ T7303] RSP: 002b:00007f269fe84188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 95.457041][ T7303] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 95.465002][ T7303] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 95.472966][ T7303] RBP: 00007f269fe841d0 R08: 0000000000000000 R09: 0000000000000000 [ 95.481017][ T7303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.488988][ T7303] R13: 00007ffef12fbd9f R14: 00007f269fe84300 R15: 0000000000022000 [ 95.524047][ T7304] FAULT_INJECTION: forcing a failure. [ 95.524047][ T7304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.542965][ T7304] CPU: 1 PID: 7304 Comm: syz-executor.4 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 95.553933][ T7304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.563984][ T7304] Call Trace: [ 95.567261][ T7304] dump_stack_lvl+0x11c/0x14e [ 95.571936][ T7304] should_fail.cold+0x5/0x1f [ 95.576519][ T7304] _copy_to_user+0x2c/0x150 [ 95.581013][ T7304] simple_read_from_buffer+0xcc/0x160 [ 95.586471][ T7304] proc_fail_nth_read+0x187/0x220 [ 95.591495][ T7304] ? proc_fault_inject_read+0x220/0x220 [ 95.597123][ T7304] ? security_file_permission+0x248/0x560 [ 95.602934][ T7304] ? proc_fault_inject_read+0x220/0x220 [ 95.608474][ T7304] vfs_read+0x1b5/0x570 [ 95.613414][ T7304] ksys_read+0x12d/0x250 [ 95.617737][ T7304] ? vfs_write+0xa90/0xa90 [ 95.622321][ T7304] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 95.628039][ T7304] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 95.634372][ T7304] ? syscall_enter_from_user_mode+0x1d/0x60 [ 95.640269][ T7304] do_syscall_64+0x35/0xb0 [ 95.644764][ T7304] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 95.650750][ T7304] RIP: 0033:0x41816c [ 95.654636][ T7304] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 95.674328][ T7304] RSP: 002b:00007fe585ff9170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 95.682754][ T7304] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 95.690739][ T7304] RDX: 000000000000000f RSI: 00007fe585ff91e0 RDI: 0000000000000006 [ 95.698711][ T7304] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 95.706686][ T7304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.714649][ T7304] R13: 00007fff00dff7df R14: 00007fe585ff9300 R15: 0000000000022000 [ 95.746414][ T7307] FAULT_INJECTION: forcing a failure. [ 95.746414][ T7307] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.814125][ T7307] CPU: 0 PID: 7307 Comm: syz-executor.3 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 95.825193][ T7307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.835262][ T7307] Call Trace: [ 95.838577][ T7307] dump_stack_lvl+0x11c/0x14e [ 95.843368][ T7307] should_fail.cold+0x5/0x1f [ 95.847996][ T7307] _copy_to_user+0x2c/0x150 [ 95.852524][ T7307] simple_read_from_buffer+0xcc/0x160 [ 95.857902][ T7307] proc_fail_nth_read+0x187/0x220 [ 95.862921][ T7307] ? proc_fault_inject_read+0x220/0x220 [ 95.868467][ T7307] ? security_file_permission+0x248/0x560 [ 95.874190][ T7307] ? proc_fault_inject_read+0x220/0x220 [ 95.879742][ T7307] vfs_read+0x1b5/0x570 [ 95.883902][ T7307] ksys_read+0x12d/0x250 [ 95.888232][ T7307] ? vfs_write+0xa90/0xa90 [ 95.892650][ T7307] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 95.898385][ T7307] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 95.904616][ T7307] ? syscall_enter_from_user_mode+0x1d/0x60 [ 95.910538][ T7307] do_syscall_64+0x35/0xb0 [ 95.915073][ T7307] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 95.920968][ T7307] RIP: 0033:0x41816c [ 95.924850][ T7307] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 95.944708][ T7307] RSP: 002b:00007f269fe84170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 95.953115][ T7307] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 95.961089][ T7307] RDX: 000000000000000f RSI: 00007f269fe841e0 RDI: 0000000000000006 [ 95.969067][ T7307] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 95.977041][ T7307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.985000][ T7307] R13: 00007ffef12fbd9f R14: 00007f269fe84300 R15: 0000000000022000 [ 96.090951][ T7316] FAULT_INJECTION: forcing a failure. [ 96.090951][ T7316] name failslab, interval 1, probability 0, space 0, times 0 [ 96.109428][ T7316] CPU: 1 PID: 7316 Comm: syz-executor.4 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 96.120402][ T7316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.130465][ T7316] Call Trace: [ 96.133740][ T7316] dump_stack_lvl+0x11c/0x14e [ 96.138427][ T7316] should_fail.cold+0x5/0x1f [ 96.143103][ T7316] should_failslab+0x5/0x10 [ 96.147597][ T7316] __kmalloc+0x7b/0x3d0 [ 96.151840][ T7316] ? allocate_probes+0x45/0x90 [ 96.156608][ T7316] ? rcu_read_lock_sched_held+0xd/0xb0 [ 96.162068][ T7316] ? lock_release+0x563/0x7f0 [ 96.166734][ T7316] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 96.172532][ T7316] allocate_probes+0x45/0x90 [ 96.177493][ T7316] tracepoint_probe_unregister+0x18f/0x9a0 [ 96.183305][ T7316] bpf_raw_tp_link_release+0x51/0xa0 [ 96.188581][ T7316] bpf_link_free+0xe6/0x1b0 [ 96.193082][ T7316] bpf_link_put+0x161/0x1b0 [ 96.197585][ T7316] bpf_link_release+0x33/0x40 [ 96.202252][ T7316] __fput+0x288/0x920 [ 96.206672][ T7316] ? bpf_link_put+0x1b0/0x1b0 [ 96.211346][ T7316] task_work_run+0xdd/0x1a0 [ 96.215840][ T7316] exit_to_user_mode_prepare+0x278/0x280 [ 96.221467][ T7316] syscall_exit_to_user_mode+0x40/0x70 [ 96.227006][ T7316] do_syscall_64+0x42/0xb0 [ 96.231412][ T7316] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 96.237309][ T7316] RIP: 0033:0x465159 [ 96.241213][ T7316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 96.260921][ T7316] RSP: 002b:00007fe585ff9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 96.269515][ T7316] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 96.277474][ T7316] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 96.285429][ T7316] RBP: 00007fe585ff91d0 R08: 0000000000000000 R09: 0000000000000000 [ 96.293424][ T7316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.301386][ T7316] R13: 00007fff00dff7df R14: 00007fe585ff9300 R15: 0000000000022000 [ 96.314929][ T7317] FAULT_INJECTION: forcing a failure. [ 96.314929][ T7317] name failslab, interval 1, probability 0, space 0, times 0 [ 96.351199][ T7317] CPU: 1 PID: 7317 Comm: syz-executor.0 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 96.362702][ T7317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.372773][ T7317] Call Trace: [ 96.376060][ T7317] dump_stack_lvl+0x11c/0x14e [ 96.380756][ T7317] should_fail.cold+0x5/0x1f [ 96.385369][ T7317] should_failslab+0x5/0x10 [ 96.389894][ T7317] __kmalloc+0x7b/0x3d0 [ 96.394060][ T7317] ? allocate_probes+0x45/0x90 [ 96.398926][ T7317] ? rcu_read_lock_sched_held+0xd/0xb0 [ 96.404405][ T7317] ? lock_release+0x563/0x7f0 [ 96.409271][ T7317] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 96.415095][ T7317] allocate_probes+0x45/0x90 [ 96.419705][ T7317] tracepoint_probe_unregister+0x18f/0x9a0 [ 96.425543][ T7317] bpf_raw_tp_link_release+0x51/0xa0 [ 96.430938][ T7317] bpf_link_free+0xe6/0x1b0 [ 96.435558][ T7317] bpf_link_put+0x161/0x1b0 [ 96.440690][ T7317] bpf_link_release+0x33/0x40 [ 96.445393][ T7317] __fput+0x288/0x920 [ 96.449391][ T7317] ? bpf_link_put+0x1b0/0x1b0 [ 96.454111][ T7317] task_work_run+0xdd/0x1a0 [ 96.458605][ T7317] exit_to_user_mode_prepare+0x278/0x280 [ 96.464231][ T7317] syscall_exit_to_user_mode+0x40/0x70 [ 96.469681][ T7317] do_syscall_64+0x42/0xb0 [ 96.474086][ T7317] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 96.479974][ T7317] RIP: 0033:0x465159 [ 96.483854][ T7317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 96.503465][ T7317] RSP: 002b:00007fb6398fe188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 96.511953][ T7317] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 96.519919][ T7317] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 96.527880][ T7317] RBP: 00007fb6398fe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 96.535837][ T7317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.543806][ T7317] R13: 00007ffdb1b4b6ef R14: 00007fb6398fe300 R15: 0000000000022000 2021/06/30 10:01:44 executed programs: 21 [ 96.556932][ T7322] FAULT_INJECTION: forcing a failure. [ 96.556932][ T7322] name failslab, interval 1, probability 0, space 0, times 0 [ 96.571492][ T7322] CPU: 1 PID: 7322 Comm: syz-executor.3 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 96.582904][ T7322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.592976][ T7322] Call Trace: [ 96.596266][ T7322] dump_stack_lvl+0x11c/0x14e [ 96.600974][ T7322] should_fail.cold+0x5/0x1f [ 96.605765][ T7322] should_failslab+0x5/0x10 [ 96.610380][ T7322] __kmalloc+0x7b/0x3d0 [ 96.614590][ T7322] ? allocate_probes+0x45/0x90 [ 96.619414][ T7322] ? rcu_read_lock_sched_held+0xd/0xb0 [ 96.625085][ T7322] ? lock_release+0x563/0x7f0 [ 96.629779][ T7322] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 96.635892][ T7322] allocate_probes+0x45/0x90 [ 96.640544][ T7322] tracepoint_probe_unregister+0x18f/0x9a0 [ 96.646388][ T7322] bpf_raw_tp_link_release+0x51/0xa0 [ 96.651703][ T7322] bpf_link_free+0xe6/0x1b0 [ 96.656228][ T7322] bpf_link_put+0x161/0x1b0 [ 96.660793][ T7322] bpf_link_release+0x33/0x40 [ 96.665498][ T7322] __fput+0x288/0x920 [ 96.669608][ T7322] ? bpf_link_put+0x1b0/0x1b0 [ 96.674485][ T7322] task_work_run+0xdd/0x1a0 [ 96.679185][ T7322] exit_to_user_mode_prepare+0x278/0x280 [ 96.684851][ T7322] syscall_exit_to_user_mode+0x40/0x70 [ 96.690683][ T7322] do_syscall_64+0x42/0xb0 [ 96.695122][ T7322] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 96.701054][ T7322] RIP: 0033:0x465159 [ 96.704966][ T7322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 96.724934][ T7322] RSP: 002b:00007f269fe84188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 96.733521][ T7322] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 96.741486][ T7322] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 96.749628][ T7322] RBP: 00007f269fe841d0 R08: 0000000000000000 R09: 0000000000000000 [ 96.757589][ T7322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.765559][ T7322] R13: 00007ffef12fbd9f R14: 00007f269fe84300 R15: 0000000000022000 [ 96.780502][ T7315] FAULT_INJECTION: forcing a failure. [ 96.780502][ T7315] name failslab, interval 1, probability 0, space 0, times 0 [ 96.795475][ T7315] CPU: 0 PID: 7315 Comm: syz-executor.2 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 96.806432][ T7315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.816565][ T7315] Call Trace: [ 96.819851][ T7315] dump_stack_lvl+0x11c/0x14e [ 96.824520][ T7315] should_fail.cold+0x5/0x1f [ 96.829098][ T7315] should_failslab+0x5/0x10 [ 96.833688][ T7315] __kmalloc+0x7b/0x3d0 [ 96.838098][ T7315] ? allocate_probes+0x45/0x90 [ 96.842850][ T7315] ? rcu_read_lock_sched_held+0xd/0xb0 [ 96.848296][ T7315] ? lock_release+0x563/0x7f0 [ 96.852961][ T7315] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 96.858764][ T7315] allocate_probes+0x45/0x90 [ 96.863355][ T7315] tracepoint_probe_unregister+0x18f/0x9a0 [ 96.869179][ T7315] bpf_raw_tp_link_release+0x51/0xa0 [ 96.874468][ T7315] bpf_link_free+0xe6/0x1b0 [ 96.879155][ T7315] bpf_link_put+0x161/0x1b0 [ 96.883854][ T7315] bpf_link_release+0x33/0x40 [ 96.888702][ T7315] __fput+0x288/0x920 [ 96.892715][ T7315] ? bpf_link_put+0x1b0/0x1b0 [ 96.897582][ T7315] task_work_run+0xdd/0x1a0 [ 96.902199][ T7315] exit_to_user_mode_prepare+0x278/0x280 [ 96.907836][ T7315] syscall_exit_to_user_mode+0x40/0x70 [ 96.913283][ T7315] do_syscall_64+0x42/0xb0 [ 96.917868][ T7315] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 96.923748][ T7315] RIP: 0033:0x465159 [ 96.927637][ T7315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 96.947403][ T7315] RSP: 002b:00007fd1ddf86188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 96.955808][ T7315] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 96.963763][ T7315] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 96.971717][ T7315] RBP: 00007fd1ddf861d0 R08: 0000000000000000 R09: 0000000000000000 [ 96.979778][ T7315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.987730][ T7315] R13: 00007ffdc464cc2f R14: 00007fd1ddf86300 R15: 0000000000022000 [ 97.014656][ T7314] FAULT_INJECTION: forcing a failure. [ 97.014656][ T7314] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 97.028112][ T7314] CPU: 1 PID: 7314 Comm: syz-executor.1 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 97.039158][ T7314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.049225][ T7314] Call Trace: [ 97.052512][ T7314] dump_stack_lvl+0x11c/0x14e [ 97.057300][ T7314] should_fail.cold+0x5/0x1f [ 97.062165][ T7314] ? kfree+0x111/0x2f0 [ 97.066347][ T7314] prepare_alloc_pages+0x17b/0x580 [ 97.071731][ T7314] ? do_syscall_64+0x35/0xb0 [ 97.076334][ T7314] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.082438][ T7314] __alloc_pages+0x12f/0x510 [ 97.087046][ T7314] ? lock_release+0x563/0x7f0 [ 97.091747][ T7314] ? __alloc_pages_slowpath.constprop.0+0x21f0/0x21f0 [ 97.098528][ T7314] ? lock_downgrade+0x7b0/0x7b0 [ 97.103402][ T7314] ? rcu_read_lock_sched_held+0xd/0xb0 [ 97.108886][ T7314] ? lock_release+0x563/0x7f0 [ 97.113580][ T7314] ? unlock_page_memcg+0x14d/0x2d0 [ 97.118709][ T7314] alloc_pages+0x18c/0x2a0 [ 97.123317][ T7314] ? PageHuge+0x121/0x170 [ 97.127656][ T7314] __get_free_pages+0x8/0x40 [ 97.132264][ T7314] __tlb_remove_page_size+0x253/0x420 [ 97.137659][ T7314] unmap_page_range+0xea3/0x26d0 [ 97.142621][ T7314] ? vm_normal_page_pmd+0x420/0x420 [ 97.147852][ T7314] ? lock_release+0x563/0x7f0 [ 97.152555][ T7314] ? lock_downgrade+0x7b0/0x7b0 [ 97.157442][ T7314] ? uprobe_munmap+0x1c/0x560 [ 97.162124][ T7314] unmap_single_vma+0x198/0x310 [ 97.167054][ T7314] unmap_vmas+0x16d/0x2f0 [ 97.171409][ T7314] ? zap_vma_ptes+0x100/0x100 [ 97.176087][ T7314] ? lock_acquire+0x4a1/0x5d0 [ 97.180764][ T7314] exit_mmap+0x1d0/0x620 [ 97.185019][ T7314] ? do_raw_spin_unlock+0x171/0x230 [ 97.190229][ T7314] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 97.196402][ T7314] ? rcu_read_lock_sched_held+0xd/0xb0 [ 97.201854][ T7314] ? kmem_cache_free.part.0+0x169/0x210 [ 97.207388][ T7314] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 97.213617][ T7314] __mmput+0x122/0x470 [ 97.217675][ T7314] mmput+0x58/0x60 [ 97.221827][ T7314] do_exit+0xb8e/0x2b50 [ 97.225971][ T7314] ? lock_acquire+0x4a1/0x5d0 [ 97.230635][ T7314] ? rcu_read_lock_sched_held+0xd/0xb0 [ 97.236085][ T7314] ? lock_release+0x563/0x7f0 [ 97.240746][ T7314] ? rwlock_bug.part.0+0x90/0x90 [ 97.245669][ T7314] ? mm_update_next_owner+0x7a0/0x7a0 [ 97.251025][ T7314] ? lock_downgrade+0x7b0/0x7b0 [ 97.255861][ T7314] ? do_raw_spin_lock+0x120/0x2b0 [ 97.260877][ T7314] ? rwlock_bug.part.0+0x90/0x90 [ 97.265802][ T7314] do_group_exit+0x125/0x310 [ 97.270382][ T7314] get_signal+0x47f/0x21f0 [ 97.274794][ T7314] ? _raw_spin_unlock_irqrestore+0x40/0x90 [ 97.280771][ T7314] ? trace_hardirqs_on+0x5b/0x1c0 [ 97.285790][ T7314] arch_do_signal_or_restart+0x2a9/0x1d10 [ 97.291501][ T7314] ? debug_object_destroy+0x210/0x210 [ 97.296864][ T7314] ? check_preemption_disabled+0x50/0x150 [ 97.302575][ T7314] ? get_sigframe_size+0x10/0x10 [ 97.307499][ T7314] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 97.313730][ T7314] ? percpu_counter_add_batch+0xbd/0x180 [ 97.319352][ T7314] ? blkcg_maybe_throttle_current+0x5ea/0xe70 [ 97.325408][ T7314] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 97.331646][ T7314] ? call_rcu+0x34d/0x810 [ 97.335972][ T7314] ? trace_hardirqs_on+0x5b/0x1c0 [ 97.340983][ T7314] ? __blkcg_punt_bio_submit+0x1d0/0x1d0 [ 97.346605][ T7314] ? mem_cgroup_get_oom_group+0x450/0x450 [ 97.352317][ T7314] ? ___might_sleep+0x203/0x2e0 [ 97.357164][ T7314] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 97.363388][ T7314] ? task_work_run+0x14e/0x1a0 [ 97.368141][ T7314] exit_to_user_mode_prepare+0x20e/0x280 [ 97.373765][ T7314] syscall_exit_to_user_mode+0x40/0x70 [ 97.379233][ T7314] do_syscall_64+0x42/0xb0 [ 97.383726][ T7314] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.389614][ T7314] RIP: 0033:0x465159 [ 97.393578][ T7314] Code: Unable to access opcode bytes at RIP 0x46512f. [ 97.400495][ T7314] RSP: 002b:00007f638d9ac188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 97.409165][ T7314] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 97.417295][ T7314] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 97.425260][ T7314] RBP: 00007f638d9ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 97.433305][ T7314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.441346][ T7314] R13: 00007ffc4f2eb70f R14: 00007f638d9ac300 R15: 0000000000022000 [ 97.497890][ T7336] FAULT_INJECTION: forcing a failure. [ 97.497890][ T7336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 97.512922][ T7335] FAULT_INJECTION: forcing a failure. [ 97.512922][ T7335] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 97.537494][ T7335] CPU: 0 PID: 7335 Comm: syz-executor.4 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 97.548479][ T7335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.558526][ T7335] Call Trace: [ 97.561793][ T7335] dump_stack_lvl+0x11c/0x14e [ 97.566467][ T7335] should_fail.cold+0x5/0x1f [ 97.571145][ T7335] _copy_to_user+0x2c/0x150 [ 97.575730][ T7335] simple_read_from_buffer+0xcc/0x160 [ 97.581107][ T7335] proc_fail_nth_read+0x187/0x220 [ 97.586231][ T7335] ? proc_fault_inject_read+0x220/0x220 [ 97.591762][ T7335] ? security_file_permission+0x248/0x560 [ 97.597471][ T7335] ? proc_fault_inject_read+0x220/0x220 [ 97.603107][ T7335] vfs_read+0x1b5/0x570 [ 97.607357][ T7335] ksys_read+0x12d/0x250 [ 97.611699][ T7335] ? vfs_write+0xa90/0xa90 [ 97.616242][ T7335] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 97.621974][ T7335] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 97.628047][ T7335] ? syscall_enter_from_user_mode+0x1d/0x60 [ 97.633947][ T7335] do_syscall_64+0x35/0xb0 [ 97.638473][ T7335] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.644587][ T7335] RIP: 0033:0x41816c [ 97.648504][ T7335] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 97.668321][ T7335] RSP: 002b:00007fe585fd8170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 97.677260][ T7335] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041816c [ 97.685751][ T7335] RDX: 000000000000000f RSI: 00007fe585fd81e0 RDI: 0000000000000006 [ 97.693723][ T7335] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 97.701695][ T7335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.710026][ T7335] R13: 00007fff00dff7df R14: 00007fe585fd8300 R15: 0000000000022000 [ 97.778059][ T7336] CPU: 0 PID: 7336 Comm: syz-executor.0 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 97.789034][ T7336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.799102][ T7336] Call Trace: [ 97.802650][ T7336] dump_stack_lvl+0x11c/0x14e [ 97.807799][ T7336] should_fail.cold+0x5/0x1f [ 97.812428][ T7336] _copy_to_user+0x2c/0x150 [ 97.816965][ T7336] simple_read_from_buffer+0xcc/0x160 [ 97.822471][ T7336] proc_fail_nth_read+0x187/0x220 [ 97.827503][ T7336] ? proc_fault_inject_read+0x220/0x220 [ 97.833144][ T7336] ? security_file_permission+0x248/0x560 [ 97.838859][ T7336] ? proc_fault_inject_read+0x220/0x220 [ 97.844496][ T7336] vfs_read+0x1b5/0x570 [ 97.848651][ T7336] ksys_read+0x12d/0x250 [ 97.852910][ T7336] ? vfs_write+0xa90/0xa90 [ 97.857333][ T7336] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 97.863305][ T7336] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 97.869471][ T7336] ? syscall_enter_from_user_mode+0x1d/0x60 [ 97.875356][ T7336] do_syscall_64+0x35/0xb0 [ 97.879765][ T7336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 97.885739][ T7336] RIP: 0033:0x41816c [ 97.890088][ T7336] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 97.909683][ T7336] RSP: 002b:00007fb6398dd170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 97.918082][ T7336] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041816c [ 97.926131][ T7336] RDX: 000000000000000f RSI: 00007fb6398dd1e0 RDI: 0000000000000006 [ 97.934622][ T7336] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 97.942587][ T7336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.950541][ T7336] R13: 00007ffdb1b4b6ef R14: 00007fb6398dd300 R15: 0000000000022000 [ 98.050914][ T7354] FAULT_INJECTION: forcing a failure. [ 98.050914][ T7354] name failslab, interval 1, probability 0, space 0, times 0 [ 98.065228][ T7354] CPU: 1 PID: 7354 Comm: syz-executor.4 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 98.076625][ T7354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.086687][ T7354] Call Trace: [ 98.090318][ T7354] dump_stack_lvl+0x11c/0x14e [ 98.095093][ T7354] should_fail.cold+0x5/0x1f [ 98.099675][ T7354] should_failslab+0x5/0x10 [ 98.104172][ T7354] __kmalloc+0x7b/0x3d0 [ 98.108935][ T7354] ? allocate_probes+0x45/0x90 [ 98.113796][ T7354] ? rcu_read_lock_sched_held+0xd/0xb0 [ 98.119247][ T7354] ? lock_release+0x563/0x7f0 [ 98.123928][ T7354] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 98.129740][ T7354] allocate_probes+0x45/0x90 [ 98.134321][ T7354] tracepoint_probe_unregister+0x18f/0x9a0 [ 98.140124][ T7354] bpf_raw_tp_link_release+0x51/0xa0 [ 98.145399][ T7354] bpf_link_free+0xe6/0x1b0 [ 98.149893][ T7354] bpf_link_put+0x161/0x1b0 [ 98.154399][ T7354] bpf_link_release+0x33/0x40 [ 98.159071][ T7354] __fput+0x288/0x920 [ 98.163047][ T7354] ? bpf_link_put+0x1b0/0x1b0 [ 98.167733][ T7354] task_work_run+0xdd/0x1a0 [ 98.172320][ T7354] exit_to_user_mode_prepare+0x278/0x280 [ 98.177947][ T7354] syscall_exit_to_user_mode+0x40/0x70 [ 98.183401][ T7354] do_syscall_64+0x42/0xb0 [ 98.187912][ T7354] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 98.193809][ T7354] RIP: 0033:0x465159 [ 98.197690][ T7354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 98.217643][ T7354] RSP: 002b:00007fe585ff9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 98.226040][ T7354] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 98.234010][ T7354] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 98.242065][ T7354] RBP: 00007fe585ff91d0 R08: 0000000000000000 R09: 0000000000000000 [ 98.250020][ T7354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.258068][ T7354] R13: 00007fff00dff7df R14: 00007fe585ff9300 R15: 0000000000022000 [ 98.268233][ T7353] FAULT_INJECTION: forcing a failure. [ 98.268233][ T7353] name failslab, interval 1, probability 0, space 0, times 0 [ 98.280896][ T7320] chnl_net:caif_netlink_parms(): no params data found [ 98.291128][ T7353] CPU: 0 PID: 7353 Comm: syz-executor.1 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 98.302084][ T7353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.312139][ T7353] Call Trace: [ 98.315423][ T7353] dump_stack_lvl+0x11c/0x14e [ 98.320119][ T7353] should_fail.cold+0x5/0x1f [ 98.324730][ T7353] should_failslab+0x5/0x10 [ 98.329334][ T7353] __kmalloc+0x7b/0x3d0 [ 98.333764][ T7353] ? allocate_probes+0x45/0x90 [ 98.338542][ T7353] ? rcu_read_lock_sched_held+0xd/0xb0 [ 98.344020][ T7353] ? lock_release+0x563/0x7f0 [ 98.348712][ T7353] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 98.354542][ T7353] allocate_probes+0x45/0x90 [ 98.359245][ T7353] tracepoint_probe_unregister+0x18f/0x9a0 [ 98.365175][ T7353] bpf_raw_tp_link_release+0x51/0xa0 [ 98.370477][ T7353] bpf_link_free+0xe6/0x1b0 [ 98.375000][ T7353] bpf_link_put+0x161/0x1b0 [ 98.379519][ T7353] bpf_link_release+0x33/0x40 [ 98.384210][ T7353] __fput+0x288/0x920 [ 98.388197][ T7353] ? bpf_link_put+0x1b0/0x1b0 [ 98.392894][ T7353] task_work_run+0xdd/0x1a0 [ 98.397414][ T7353] exit_to_user_mode_prepare+0x278/0x280 [ 98.403075][ T7353] syscall_exit_to_user_mode+0x40/0x70 [ 98.408557][ T7353] do_syscall_64+0x42/0xb0 [ 98.412995][ T7353] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 98.418998][ T7353] RIP: 0033:0x465159 [ 98.422905][ T7353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 98.443145][ T7353] RSP: 002b:00007f638d9ac188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 98.451576][ T7353] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 98.459683][ T7353] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 98.467795][ T7353] RBP: 00007f638d9ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 98.475793][ T7353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.483864][ T7353] R13: 00007ffc4f2eb70f R14: 00007f638d9ac300 R15: 0000000000022000 [ 98.548782][ T7350] FAULT_INJECTION: forcing a failure. [ 98.548782][ T7350] name failslab, interval 1, probability 0, space 0, times 0 [ 98.549564][ T7320] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.575688][ T7320] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.581176][ T7350] CPU: 0 PID: 7350 Comm: syz-executor.2 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 98.593019][ T7320] device bridge_slave_0 entered promiscuous mode [ 98.593875][ T7350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.593890][ T7350] Call Trace: [ 98.593897][ T7350] dump_stack_lvl+0x11c/0x14e [ 98.605183][ T7320] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.610356][ T7350] should_fail.cold+0x5/0x1f [ 98.610388][ T7350] should_failslab+0x5/0x10 [ 98.617845][ T7320] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.618319][ T7350] __kmalloc+0x7b/0x3d0 [ 98.618348][ T7350] ? allocate_probes+0x45/0x90 [ 98.650646][ T7350] ? rcu_read_lock_sched_held+0xd/0xb0 [ 98.656109][ T7350] ? lock_release+0x563/0x7f0 [ 98.660783][ T7350] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 98.666582][ T7350] allocate_probes+0x45/0x90 [ 98.671183][ T7350] tracepoint_probe_unregister+0x18f/0x9a0 [ 98.677162][ T7350] bpf_raw_tp_link_release+0x51/0xa0 [ 98.682637][ T7350] bpf_link_free+0xe6/0x1b0 [ 98.687409][ T7350] bpf_link_put+0x161/0x1b0 [ 98.691923][ T7350] bpf_link_release+0x33/0x40 [ 98.696770][ T7350] __fput+0x288/0x920 [ 98.700755][ T7350] ? bpf_link_put+0x1b0/0x1b0 [ 98.705491][ T7350] task_work_run+0xdd/0x1a0 [ 98.709992][ T7350] exit_to_user_mode_prepare+0x278/0x280 [ 98.715719][ T7350] syscall_exit_to_user_mode+0x40/0x70 [ 98.721170][ T7350] do_syscall_64+0x42/0xb0 [ 98.725661][ T7350] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 98.731552][ T7350] RIP: 0033:0x465159 [ 98.735618][ T7350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 98.755428][ T7350] RSP: 002b:00007fd1ddf86188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 98.764287][ T7350] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 98.772264][ T7350] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 98.780405][ T7350] RBP: 00007fd1ddf861d0 R08: 0000000000000000 R09: 0000000000000000 [ 98.788483][ T7350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.796551][ T7350] R13: 00007ffdc464cc2f R14: 00007fd1ddf86300 R15: 0000000000022000 [ 98.817612][ T7344] FAULT_INJECTION: forcing a failure. [ 98.817612][ T7344] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 98.831122][ T7344] CPU: 1 PID: 7344 Comm: syz-executor.3 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 98.845410][ T7344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.855459][ T7344] Call Trace: [ 98.858726][ T7344] dump_stack_lvl+0x11c/0x14e [ 98.863403][ T7344] should_fail.cold+0x5/0x1f [ 98.867995][ T7344] ? kfree+0x111/0x2f0 [ 98.872057][ T7344] prepare_alloc_pages+0x17b/0x580 [ 98.877345][ T7344] ? do_syscall_64+0x35/0xb0 [ 98.882451][ T7344] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 98.888624][ T7344] __alloc_pages+0x12f/0x510 [ 98.893206][ T7344] ? lock_release+0x563/0x7f0 [ 98.897960][ T7344] ? __alloc_pages_slowpath.constprop.0+0x21f0/0x21f0 [ 98.904915][ T7344] ? lock_downgrade+0x7b0/0x7b0 [ 98.909778][ T7344] ? rcu_read_lock_sched_held+0xd/0xb0 [ 98.915862][ T7344] ? lock_release+0x563/0x7f0 [ 98.920724][ T7344] ? unlock_page_memcg+0x14d/0x2d0 [ 98.925839][ T7344] alloc_pages+0x18c/0x2a0 [ 98.930256][ T7344] ? PageHuge+0x121/0x170 [ 98.934692][ T7344] __get_free_pages+0x8/0x40 [ 98.939274][ T7344] __tlb_remove_page_size+0x253/0x420 [ 98.944637][ T7344] unmap_page_range+0xea3/0x26d0 [ 98.949583][ T7344] ? vm_normal_page_pmd+0x420/0x420 [ 98.954892][ T7344] ? lock_release+0x563/0x7f0 [ 98.959557][ T7344] ? lock_downgrade+0x7b0/0x7b0 [ 98.964569][ T7344] ? uprobe_munmap+0x1c/0x560 [ 98.969249][ T7344] unmap_single_vma+0x198/0x310 [ 98.974412][ T7344] unmap_vmas+0x16d/0x2f0 [ 98.978835][ T7344] ? zap_vma_ptes+0x100/0x100 [ 98.983520][ T7344] ? lock_acquire+0x4a1/0x5d0 [ 98.988197][ T7344] exit_mmap+0x1d0/0x620 [ 98.992644][ T7344] ? do_raw_spin_unlock+0x171/0x230 [ 98.997836][ T7344] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 99.003825][ T7344] ? rcu_read_lock_sched_held+0xd/0xb0 [ 99.009295][ T7344] ? kmem_cache_free.part.0+0x169/0x210 [ 99.014847][ T7344] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 99.021098][ T7344] __mmput+0x122/0x470 [ 99.025187][ T7344] mmput+0x58/0x60 [ 99.028897][ T7344] do_exit+0xb8e/0x2b50 [ 99.033043][ T7344] ? lock_acquire+0x4a1/0x5d0 [ 99.037709][ T7344] ? rcu_read_lock_sched_held+0xd/0xb0 [ 99.043162][ T7344] ? lock_release+0x563/0x7f0 [ 99.047878][ T7344] ? rwlock_bug.part.0+0x90/0x90 [ 99.052978][ T7344] ? mm_update_next_owner+0x7a0/0x7a0 [ 99.058351][ T7344] ? lock_downgrade+0x7b0/0x7b0 [ 99.063275][ T7344] ? do_raw_spin_lock+0x120/0x2b0 [ 99.068289][ T7344] ? rwlock_bug.part.0+0x90/0x90 [ 99.073365][ T7344] do_group_exit+0x125/0x310 [ 99.077948][ T7344] get_signal+0x47f/0x21f0 [ 99.082490][ T7344] ? _raw_spin_unlock_irqrestore+0x40/0x90 [ 99.088312][ T7344] ? trace_hardirqs_on+0x5b/0x1c0 [ 99.093353][ T7344] arch_do_signal_or_restart+0x2a9/0x1d10 [ 99.099084][ T7344] ? debug_object_destroy+0x210/0x210 [ 99.104446][ T7344] ? check_preemption_disabled+0x50/0x150 [ 99.110162][ T7344] ? get_sigframe_size+0x10/0x10 [ 99.115106][ T7344] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 99.121353][ T7344] ? percpu_counter_add_batch+0xbd/0x180 [ 99.126979][ T7344] ? blkcg_maybe_throttle_current+0x5ea/0xe70 [ 99.133038][ T7344] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 99.139460][ T7344] ? call_rcu+0x34d/0x810 [ 99.143796][ T7344] ? trace_hardirqs_on+0x5b/0x1c0 [ 99.148820][ T7344] ? __blkcg_punt_bio_submit+0x1d0/0x1d0 [ 99.154448][ T7344] ? mem_cgroup_get_oom_group+0x450/0x450 [ 99.160156][ T7344] ? ___might_sleep+0x203/0x2e0 [ 99.165004][ T7344] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 99.171237][ T7344] ? task_work_run+0x14e/0x1a0 [ 99.176000][ T7344] exit_to_user_mode_prepare+0x20e/0x280 [ 99.181812][ T7344] syscall_exit_to_user_mode+0x40/0x70 [ 99.187271][ T7344] do_syscall_64+0x42/0xb0 [ 99.191944][ T7344] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 99.197828][ T7344] RIP: 0033:0x465159 [ 99.201725][ T7344] Code: Unable to access opcode bytes at RIP 0x46512f. [ 99.209764][ T7344] RSP: 002b:00007f269fe84188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 99.218361][ T7344] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 99.226406][ T7344] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 99.234361][ T7344] RBP: 00007f269fe841d0 R08: 0000000000000000 R09: 0000000000000000 [ 99.242321][ T7344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.250562][ T7344] R13: 00007ffef12fbd9f R14: 00007f269fe84300 R15: 0000000000022000 [ 99.277994][ T7494] FAULT_INJECTION: forcing a failure. [ 99.277994][ T7494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.295707][ T7320] device bridge_slave_1 entered promiscuous mode [ 99.302726][ T7494] CPU: 0 PID: 7494 Comm: syz-executor.4 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 99.313678][ T7494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.323750][ T7494] Call Trace: [ 99.327017][ T7494] dump_stack_lvl+0x11c/0x14e [ 99.331705][ T7494] should_fail.cold+0x5/0x1f [ 99.336287][ T7494] _copy_to_user+0x2c/0x150 [ 99.340791][ T7494] simple_read_from_buffer+0xcc/0x160 [ 99.346157][ T7494] proc_fail_nth_read+0x187/0x220 [ 99.351284][ T7494] ? proc_fault_inject_read+0x220/0x220 [ 99.356818][ T7494] ? security_file_permission+0x248/0x560 [ 99.362547][ T7494] ? proc_fault_inject_read+0x220/0x220 [ 99.368095][ T7494] vfs_read+0x1b5/0x570 [ 99.372242][ T7494] ksys_read+0x12d/0x250 [ 99.376499][ T7494] ? vfs_write+0xa90/0xa90 [ 99.380904][ T7494] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 99.386609][ T7494] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 99.392754][ T7494] ? syscall_enter_from_user_mode+0x1d/0x60 [ 99.398814][ T7494] do_syscall_64+0x35/0xb0 [ 99.403216][ T7494] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 99.409200][ T7494] RIP: 0033:0x41816c [ 99.413093][ T7494] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 99.432783][ T7494] RSP: 002b:00007fe585fd8170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 99.441269][ T7494] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041816c [ 99.449224][ T7494] RDX: 000000000000000f RSI: 00007fe585fd81e0 RDI: 0000000000000006 [ 99.457181][ T7494] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 99.465138][ T7494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.473110][ T7494] R13: 00007fff00dff7df R14: 00007fe585fd8300 R15: 0000000000022000 [ 99.487800][ T7493] FAULT_INJECTION: forcing a failure. [ 99.487800][ T7493] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.505256][ T7320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.517500][ T7320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.522217][ T11] Bluetooth: hci4: command 0x0409 tx timeout [ 99.540397][ T7493] CPU: 0 PID: 7493 Comm: syz-executor.0 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 99.546218][ T7320] team0: Port device team_slave_0 added [ 99.551445][ T7493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.551461][ T7493] Call Trace: [ 99.551469][ T7493] dump_stack_lvl+0x11c/0x14e [ 99.559164][ T7320] team0: Port device team_slave_1 added [ 99.567273][ T7493] should_fail.cold+0x5/0x1f [ 99.567304][ T7493] _copy_to_user+0x2c/0x150 [ 99.567328][ T7493] simple_read_from_buffer+0xcc/0x160 [ 99.586063][ T7320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 99.590203][ T7493] proc_fail_nth_read+0x187/0x220 [ 99.590235][ T7493] ? proc_fault_inject_read+0x220/0x220 [ 99.596029][ T7320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.602942][ T7493] ? security_file_permission+0x248/0x560 [ 99.602976][ T7493] ? proc_fault_inject_read+0x220/0x220 [ 99.602999][ T7493] vfs_read+0x1b5/0x570 [ 99.608218][ T7320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 99.613611][ T7493] ksys_read+0x12d/0x250 [ 99.613639][ T7493] ? vfs_write+0xa90/0xa90 [ 99.613665][ T7493] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 99.641674][ T7320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 99.645416][ T7493] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 99.645448][ T7493] ? syscall_enter_from_user_mode+0x1d/0x60 [ 99.645476][ T7493] do_syscall_64+0x35/0xb0 [ 99.645497][ T7493] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 99.651257][ T7320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.655179][ T7493] RIP: 0033:0x41816c [ 99.655199][ T7493] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 99.655220][ T7493] RSP: 002b:00007fb6398dd170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 99.665869][ T7320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 99.669917][ T7493] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041816c [ 99.669938][ T7493] RDX: 000000000000000f RSI: 00007fb6398dd1e0 RDI: 0000000000000006 [ 99.669953][ T7493] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 99.802456][ T7493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.810529][ T7493] R13: 00007ffdb1b4b6ef R14: 00007fb6398dd300 R15: 0000000000022000 [ 99.821383][ T7495] FAULT_INJECTION: forcing a failure. [ 99.821383][ T7495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.857905][ T7320] device hsr_slave_0 entered promiscuous mode [ 99.865248][ T7495] CPU: 1 PID: 7495 Comm: syz-executor.1 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 99.876725][ T7495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.886790][ T7495] Call Trace: [ 99.890159][ T7495] dump_stack_lvl+0x11c/0x14e [ 99.894944][ T7495] should_fail.cold+0x5/0x1f [ 99.899645][ T7495] _copy_to_user+0x2c/0x150 [ 99.904259][ T7495] simple_read_from_buffer+0xcc/0x160 [ 99.909762][ T7495] proc_fail_nth_read+0x187/0x220 [ 99.915003][ T7495] ? proc_fault_inject_read+0x220/0x220 [ 99.920689][ T7495] ? security_file_permission+0x248/0x560 [ 99.926433][ T7495] ? proc_fault_inject_read+0x220/0x220 [ 99.932001][ T7495] vfs_read+0x1b5/0x570 [ 99.936277][ T7495] ksys_read+0x12d/0x250 [ 99.940729][ T7495] ? vfs_write+0xa90/0xa90 [ 99.945173][ T7495] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 99.951169][ T7495] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 99.957256][ T7495] ? syscall_enter_from_user_mode+0x1d/0x60 [ 99.963282][ T7495] do_syscall_64+0x35/0xb0 [ 99.967807][ T7495] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 99.973815][ T7495] RIP: 0033:0x41816c [ 99.977719][ T7495] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 99.997533][ T7495] RSP: 002b:00007f638d98b170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 100.005966][ T7495] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041816c [ 100.014550][ T7495] RDX: 000000000000000f RSI: 00007f638d98b1e0 RDI: 0000000000000006 [ 100.022533][ T7495] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 100.030499][ T7495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.038548][ T7495] R13: 00007ffc4f2eb70f R14: 00007f638d98b300 R15: 0000000000022000 [ 100.086262][ T7320] device hsr_slave_1 entered promiscuous mode [ 100.112789][ T7320] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 100.127480][ T7320] Cannot create hsr debugfs directory [ 100.259918][ T7320] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 100.302978][ T7320] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 100.345088][ T7320] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 100.394259][ T7320] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 100.448327][ T7320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.461253][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 100.471487][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 100.479873][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 100.491203][ T7320] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.501287][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.510406][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 100.519168][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.526269][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 100.536385][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 100.545578][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.555304][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 100.565701][ T3558] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.572788][ T3558] bridge0: port 2(bridge_slave_1) entered forwarding state [ 100.584460][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 100.603593][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 100.612858][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 100.621484][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.630830][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 100.639969][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.648939][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 100.657451][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 100.666101][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 100.677721][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 100.687536][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 100.698224][ T7320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 100.715661][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 100.723912][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 100.737754][ T7320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 100.782310][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.791014][ T2473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.810392][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.819033][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.829958][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.838001][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.846411][ T7320] device veth0_vlan entered promiscuous mode [ 100.858704][ T7320] device veth1_vlan entered promiscuous mode [ 100.878175][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 100.887774][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 100.895984][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.904866][ T11] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.915506][ T7320] device veth0_macvtap entered promiscuous mode [ 100.929257][ T7320] device veth1_macvtap entered promiscuous mode [ 100.943730][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 100.955761][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.965918][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 100.977517][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 100.987552][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 100.999266][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.009320][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 101.019950][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.029883][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 101.040418][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.052711][ T7320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 101.065827][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 101.074041][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 101.082359][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 101.091042][ T7235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 101.102280][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 101.113486][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.123705][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 101.134355][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.144257][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 101.155374][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.165674][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 101.177713][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.188306][ T7320] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 101.200956][ T7320] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.214409][ T7320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 101.223197][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 101.232263][ T3558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 101.244101][ T7320] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.255266][ T7320] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.264489][ T7320] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.275758][ T7320] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.324220][ T7589] FAULT_INJECTION: forcing a failure. [ 101.324220][ T7589] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.339907][ T7589] CPU: 0 PID: 7589 Comm: syz-executor.5 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 101.351047][ T7589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.361200][ T7589] Call Trace: [ 101.364495][ T7589] dump_stack_lvl+0x11c/0x14e [ 101.369204][ T7589] should_fail.cold+0x5/0x1f [ 101.373827][ T7589] _copy_to_user+0x2c/0x150 [ 101.378360][ T7589] simple_read_from_buffer+0xcc/0x160 [ 101.383844][ T7589] proc_fail_nth_read+0x187/0x220 [ 101.389157][ T7589] ? proc_fault_inject_read+0x220/0x220 [ 101.394720][ T7589] ? security_file_permission+0x248/0x560 [ 101.400835][ T7589] ? proc_fault_inject_read+0x220/0x220 [ 101.406400][ T7589] vfs_read+0x1b5/0x570 [ 101.410620][ T7589] ksys_read+0x12d/0x250 [ 101.414958][ T7589] ? vfs_write+0xa90/0xa90 [ 101.419503][ T7589] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 101.425299][ T7589] ? fpregs_assert_state_consistent+0xbc/0xe0 [ 101.431440][ T7589] ? syscall_enter_from_user_mode+0x1d/0x60 [ 101.437405][ T7589] do_syscall_64+0x35/0xb0 [ 101.441807][ T7589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.447695][ T7589] RIP: 0033:0x41816c [ 101.451616][ T7589] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 101.471907][ T7589] RSP: 002b:00007f4aa69bd170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 101.480306][ T7589] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 101.488278][ T7589] RDX: 000000000000000f RSI: 00007f4aa69bd1e0 RDI: 0000000000000006 [ 101.496260][ T7589] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 101.504214][ T7589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.512286][ T7589] R13: 00007ffcc71a9a1f R14: 00007f4aa69bd300 R15: 0000000000022000 [ 101.561016][ T7599] FAULT_INJECTION: forcing a failure. [ 101.561016][ T7599] name failslab, interval 1, probability 0, space 0, times 0 [ 101.575990][ T7599] CPU: 0 PID: 7599 Comm: syz-executor.0 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 101.587413][ T7599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.597657][ T7599] Call Trace: [ 101.600931][ T7599] dump_stack_lvl+0x11c/0x14e [ 101.605697][ T7599] should_fail.cold+0x5/0x1f [ 101.610366][ T7599] should_failslab+0x5/0x10 [ 101.614870][ T7599] __kmalloc+0x7b/0x3d0 [ 101.619016][ T7599] ? allocate_probes+0x45/0x90 [ 101.623858][ T7599] ? rcu_read_lock_sched_held+0xd/0xb0 [ 101.629398][ T7599] ? lock_release+0x563/0x7f0 [ 101.634077][ T7599] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 101.639991][ T7599] allocate_probes+0x45/0x90 [ 101.644586][ T7599] tracepoint_probe_unregister+0x18f/0x9a0 [ 101.650390][ T7599] bpf_raw_tp_link_release+0x51/0xa0 [ 101.655668][ T7599] bpf_link_free+0xe6/0x1b0 [ 101.660166][ T7599] bpf_link_put+0x161/0x1b0 [ 101.664659][ T7599] bpf_link_release+0x33/0x40 [ 101.669327][ T7599] __fput+0x288/0x920 [ 101.673395][ T7599] ? bpf_link_put+0x1b0/0x1b0 [ 101.678183][ T7599] task_work_run+0xdd/0x1a0 [ 101.682691][ T7599] exit_to_user_mode_prepare+0x278/0x280 [ 101.688319][ T7599] syscall_exit_to_user_mode+0x40/0x70 [ 101.693787][ T7599] do_syscall_64+0x42/0xb0 [ 101.698224][ T7599] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.704122][ T7599] RIP: 0033:0x465159 [ 101.708011][ T7599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.727613][ T7599] RSP: 002b:00007fb6398fe188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 101.736024][ T7599] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 101.744267][ T7599] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 101.752314][ T7599] RBP: 00007fb6398fe1d0 R08: 0000000000000000 R09: 0000000000000000 2021/06/30 10:01:50 executed programs: 35 [ 101.760374][ T7599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.768345][ T7599] R13: 00007ffdb1b4b6ef R14: 00007fb6398fe300 R15: 0000000000022000 [ 101.780186][ T7602] FAULT_INJECTION: forcing a failure. [ 101.780186][ T7602] name failslab, interval 1, probability 0, space 0, times 0 [ 101.801360][ T7602] CPU: 1 PID: 7602 Comm: syz-executor.3 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 101.812336][ T7602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.822483][ T7602] Call Trace: [ 101.825753][ T7602] dump_stack_lvl+0x11c/0x14e [ 101.830430][ T7602] should_fail.cold+0x5/0x1f [ 101.835019][ T7602] should_failslab+0x5/0x10 [ 101.840394][ T7602] __kmalloc+0x7b/0x3d0 [ 101.846836][ T7602] ? allocate_probes+0x45/0x90 [ 101.851619][ T7602] ? rcu_read_lock_sched_held+0xd/0xb0 [ 101.857108][ T7602] ? lock_release+0x563/0x7f0 [ 101.861777][ T7602] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 101.867578][ T7602] allocate_probes+0x45/0x90 [ 101.872182][ T7602] tracepoint_probe_unregister+0x18f/0x9a0 [ 101.877987][ T7602] bpf_raw_tp_link_release+0x51/0xa0 [ 101.883275][ T7602] bpf_link_free+0xe6/0x1b0 [ 101.887826][ T7602] bpf_link_put+0x161/0x1b0 [ 101.892317][ T7602] bpf_link_release+0x33/0x40 [ 101.896991][ T7602] __fput+0x288/0x920 [ 101.901053][ T7602] ? bpf_link_put+0x1b0/0x1b0 [ 101.905720][ T7602] task_work_run+0xdd/0x1a0 [ 101.910226][ T7602] exit_to_user_mode_prepare+0x278/0x280 [ 101.915852][ T7602] syscall_exit_to_user_mode+0x40/0x70 [ 101.921303][ T7602] do_syscall_64+0x42/0xb0 [ 101.925707][ T7602] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 101.931601][ T7602] RIP: 0033:0x465159 [ 101.935486][ T7602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 101.955437][ T7602] RSP: 002b:00007f269fe84188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 101.963971][ T7602] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 101.971926][ T7602] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 101.979880][ T7602] RBP: 00007f269fe841d0 R08: 0000000000000000 R09: 0000000000000000 [ 101.987836][ T7602] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.995895][ T7602] R13: 00007ffef12fbd9f R14: 00007f269fe84300 R15: 0000000000022000 [ 102.004850][ T2473] Bluetooth: hci4: command 0x041b tx timeout [ 102.025295][ T7600] FAULT_INJECTION: forcing a failure. [ 102.025295][ T7600] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.039380][ T7600] CPU: 0 PID: 7600 Comm: syz-executor.1 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 102.050597][ T7600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.060731][ T7600] Call Trace: [ 102.063999][ T7600] dump_stack_lvl+0x11c/0x14e [ 102.068934][ T7600] should_fail.cold+0x5/0x1f [ 102.073515][ T7600] _copy_to_user+0x2c/0x150 [ 102.078018][ T7600] simple_read_from_buffer+0xcc/0x160 [ 102.083384][ T7600] proc_fail_nth_read+0x187/0x220 [ 102.088397][ T7600] ? proc_fault_inject_read+0x220/0x220 [ 102.093937][ T7600] ? security_file_permission+0x248/0x560 [ 102.099646][ T7600] ? proc_fault_inject_read+0x220/0x220 [ 102.105189][ T7600] vfs_read+0x1b5/0x570 [ 102.109346][ T7600] ksys_read+0x12d/0x250 [ 102.113597][ T7600] ? vfs_write+0xa90/0xa90 [ 102.118111][ T7600] ? check_preemption_disabled+0x50/0x150 [ 102.123821][ T7600] ? syscall_enter_from_user_mode+0x1d/0x60 [ 102.129797][ T7600] do_syscall_64+0x35/0xb0 [ 102.134203][ T7600] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.140350][ T7600] RIP: 0033:0x41816c [ 102.144241][ T7600] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 102.163932][ T7600] RSP: 002b:00007f638d9ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 102.172328][ T7600] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041816c [ 102.180372][ T7600] RDX: 000000000000000f RSI: 00007f638d9ac1e0 RDI: 0000000000000006 [ 102.188424][ T7600] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 102.196379][ T7600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.204340][ T7600] R13: 00007ffc4f2eb70f R14: 00007f638d9ac300 R15: 0000000000022000 [ 102.242860][ T7603] FAULT_INJECTION: forcing a failure. [ 102.242860][ T7603] name failslab, interval 1, probability 0, space 0, times 0 [ 102.269776][ T7603] CPU: 1 PID: 7603 Comm: syz-executor.4 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 102.280918][ T7603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.291004][ T7603] Call Trace: [ 102.294308][ T7603] dump_stack_lvl+0x11c/0x14e [ 102.299138][ T7603] should_fail.cold+0x5/0x1f [ 102.303749][ T7603] should_failslab+0x5/0x10 [ 102.308363][ T7603] __kmalloc+0x7b/0x3d0 [ 102.312713][ T7603] ? allocate_probes+0x45/0x90 [ 102.317503][ T7603] ? rcu_read_lock_sched_held+0xd/0xb0 [ 102.323142][ T7603] ? lock_release+0x563/0x7f0 [ 102.327836][ T7603] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 102.333674][ T7603] allocate_probes+0x45/0x90 [ 102.338287][ T7603] tracepoint_probe_unregister+0x18f/0x9a0 [ 102.344172][ T7603] bpf_raw_tp_link_release+0x51/0xa0 [ 102.349488][ T7603] bpf_link_free+0xe6/0x1b0 [ 102.354102][ T7603] bpf_link_put+0x161/0x1b0 [ 102.358838][ T7603] bpf_link_release+0x33/0x40 [ 102.363800][ T7603] __fput+0x288/0x920 [ 102.368055][ T7603] ? bpf_link_put+0x1b0/0x1b0 [ 102.372758][ T7603] task_work_run+0xdd/0x1a0 [ 102.377281][ T7603] exit_to_user_mode_prepare+0x278/0x280 [ 102.382942][ T7603] syscall_exit_to_user_mode+0x40/0x70 [ 102.388512][ T7603] do_syscall_64+0x42/0xb0 [ 102.392956][ T7603] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.398864][ T7603] RIP: 0033:0x465159 [ 102.402772][ T7603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.422498][ T7603] RSP: 002b:00007fe585ff9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 102.430931][ T7603] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 102.438919][ T7603] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 102.447020][ T7603] RBP: 00007fe585ff91d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.455003][ T7603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.463254][ T7603] R13: 00007fff00dff7df R14: 00007fe585ff9300 R15: 0000000000022000 [ 102.475642][ T7605] FAULT_INJECTION: forcing a failure. [ 102.475642][ T7605] name failslab, interval 1, probability 0, space 0, times 0 [ 102.526466][ T7605] CPU: 1 PID: 7605 Comm: syz-executor.0 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 102.537609][ T7605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.547674][ T7605] Call Trace: [ 102.550965][ T7605] dump_stack_lvl+0x11c/0x14e [ 102.555754][ T7605] should_fail.cold+0x5/0x1f [ 102.560451][ T7605] should_failslab+0x5/0x10 [ 102.564972][ T7605] __kmalloc+0x7b/0x3d0 [ 102.569321][ T7605] ? allocate_probes+0x45/0x90 [ 102.574100][ T7605] ? rcu_read_lock_sched_held+0xd/0xb0 [ 102.579579][ T7605] ? lock_release+0x563/0x7f0 [ 102.584320][ T7605] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 102.590149][ T7605] allocate_probes+0x45/0x90 [ 102.594758][ T7605] tracepoint_probe_unregister+0x18f/0x9a0 [ 102.600885][ T7605] bpf_raw_tp_link_release+0x51/0xa0 [ 102.606190][ T7605] bpf_link_free+0xe6/0x1b0 [ 102.610717][ T7605] bpf_link_put+0x161/0x1b0 [ 102.615240][ T7605] bpf_link_release+0x33/0x40 [ 102.619934][ T7605] __fput+0x288/0x920 [ 102.623935][ T7605] ? bpf_link_put+0x1b0/0x1b0 [ 102.628631][ T7605] task_work_run+0xdd/0x1a0 [ 102.633154][ T7605] exit_to_user_mode_prepare+0x278/0x280 [ 102.638809][ T7605] syscall_exit_to_user_mode+0x40/0x70 [ 102.644288][ T7605] do_syscall_64+0x42/0xb0 [ 102.648732][ T7605] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.654649][ T7605] RIP: 0033:0x465159 [ 102.658651][ T7605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.678369][ T7605] RSP: 002b:00007fb6398fe188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 102.687231][ T7605] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 102.695308][ T7605] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 102.703297][ T7605] RBP: 00007fb6398fe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.713073][ T7605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.721403][ T7605] R13: 00007ffdb1b4b6ef R14: 00007fb6398fe300 R15: 0000000000022000 [ 102.771879][ T7598] FAULT_INJECTION: forcing a failure. [ 102.771879][ T7598] name failslab, interval 1, probability 0, space 0, times 0 [ 102.805233][ T7598] CPU: 0 PID: 7598 Comm: syz-executor.2 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 102.816210][ T7598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.826279][ T7598] Call Trace: [ 102.829656][ T7598] dump_stack_lvl+0x11c/0x14e [ 102.834356][ T7598] should_fail.cold+0x5/0x1f [ 102.838966][ T7598] should_failslab+0x5/0x10 [ 102.843499][ T7598] __kmalloc+0x7b/0x3d0 [ 102.847676][ T7598] ? allocate_probes+0x45/0x90 [ 102.852632][ T7598] ? rcu_read_lock_sched_held+0xd/0xb0 [ 102.858112][ T7598] ? lock_release+0x563/0x7f0 [ 102.862857][ T7598] ? __bpf_trace_ext4__mballoc+0x180/0x180 [ 102.868684][ T7598] allocate_probes+0x45/0x90 [ 102.873308][ T7598] tracepoint_probe_unregister+0x18f/0x9a0 [ 102.879143][ T7598] bpf_raw_tp_link_release+0x51/0xa0 [ 102.884453][ T7598] bpf_link_free+0xe6/0x1b0 [ 102.888973][ T7598] bpf_link_put+0x161/0x1b0 [ 102.893863][ T7598] bpf_link_release+0x33/0x40 [ 102.898574][ T7598] __fput+0x288/0x920 [ 102.902555][ T7598] ? bpf_link_put+0x1b0/0x1b0 [ 102.907242][ T7598] task_work_run+0xdd/0x1a0 [ 102.911741][ T7598] exit_to_user_mode_prepare+0x278/0x280 [ 102.918073][ T7598] syscall_exit_to_user_mode+0x40/0x70 [ 102.923615][ T7598] do_syscall_64+0x42/0xb0 [ 102.928062][ T7598] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 102.933964][ T7598] RIP: 0033:0x465159 [ 102.937856][ T7598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 102.957538][ T7598] RSP: 002b:00007fd1ddf86188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 102.966024][ T7598] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 102.973983][ T7598] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 102.981938][ T7598] RBP: 00007fd1ddf861d0 R08: 0000000000000000 R09: 0000000000000000 [ 102.989891][ T7598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.997943][ T7598] R13: 00007ffdc464cc2f R14: 00007fd1ddf86300 R15: 0000000000022000 [ 103.009217][ T7626] FAULT_INJECTION: forcing a failure. [ 103.009217][ T7626] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.022532][ T7601] FAULT_INJECTION: forcing a failure. [ 103.022532][ T7601] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 103.022564][ T7601] CPU: 0 PID: 7601 Comm: syz-executor.5 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 103.022590][ T7601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.022603][ T7601] Call Trace: [ 103.022610][ T7601] dump_stack_lvl+0x11c/0x14e [ 103.022639][ T7601] should_fail.cold+0x5/0x1f [ 103.069771][ T7601] prepare_alloc_pages+0x17b/0x580 [ 103.074876][ T7601] __alloc_pages+0x12f/0x510 [ 103.079464][ T7601] ? lock_release+0x563/0x7f0 [ 103.084137][ T7601] ? __alloc_pages_slowpath.constprop.0+0x21f0/0x21f0 [ 103.090889][ T7601] ? lock_downgrade+0x7b0/0x7b0 [ 103.095989][ T7601] ? rcu_read_lock_sched_held+0xd/0xb0 [ 103.101460][ T7601] ? lock_release+0x563/0x7f0 [ 103.106128][ T7601] ? unlock_page_memcg+0x14d/0x2d0 [ 103.111428][ T7601] alloc_pages+0x18c/0x2a0 [ 103.115834][ T7601] ? PageHuge+0x121/0x170 [ 103.120152][ T7601] __get_free_pages+0x8/0x40 [ 103.124732][ T7601] __tlb_remove_page_size+0x253/0x420 [ 103.130192][ T7601] unmap_page_range+0xea3/0x26d0 [ 103.135136][ T7601] ? vm_normal_page_pmd+0x420/0x420 [ 103.140335][ T7601] ? lock_release+0x563/0x7f0 [ 103.145014][ T7601] ? lock_downgrade+0x7b0/0x7b0 [ 103.149891][ T7601] ? uprobe_munmap+0x1c/0x560 [ 103.154579][ T7601] unmap_single_vma+0x198/0x310 [ 103.159438][ T7601] unmap_vmas+0x16d/0x2f0 [ 103.163757][ T7601] ? zap_vma_ptes+0x100/0x100 [ 103.168518][ T7601] ? lock_acquire+0x4a1/0x5d0 [ 103.173193][ T7601] exit_mmap+0x1d0/0x620 [ 103.177821][ T7601] ? do_raw_spin_unlock+0x171/0x230 [ 103.183012][ T7601] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 103.189260][ T7601] ? rcu_read_lock_sched_held+0xd/0xb0 [ 103.194714][ T7601] ? kmem_cache_free.part.0+0x169/0x210 [ 103.200529][ T7601] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 103.206763][ T7601] __mmput+0x122/0x470 [ 103.211092][ T7601] mmput+0x58/0x60 [ 103.214814][ T7601] do_exit+0xb8e/0x2b50 [ 103.219058][ T7601] ? lock_acquire+0x4a1/0x5d0 [ 103.223821][ T7601] ? rcu_read_lock_sched_held+0xd/0xb0 [ 103.229274][ T7601] ? lock_release+0x563/0x7f0 [ 103.233947][ T7601] ? rwlock_bug.part.0+0x90/0x90 [ 103.238885][ T7601] ? mm_update_next_owner+0x7a0/0x7a0 [ 103.244337][ T7601] ? lock_downgrade+0x7b0/0x7b0 [ 103.249184][ T7601] ? do_raw_spin_lock+0x120/0x2b0 [ 103.254199][ T7601] ? rwlock_bug.part.0+0x90/0x90 [ 103.259126][ T7601] do_group_exit+0x125/0x310 [ 103.263718][ T7601] get_signal+0x47f/0x21f0 [ 103.268126][ T7601] ? _raw_spin_unlock_irqrestore+0x40/0x90 [ 103.273931][ T7601] ? trace_hardirqs_on+0x5b/0x1c0 [ 103.278947][ T7601] arch_do_signal_or_restart+0x2a9/0x1d10 [ 103.284656][ T7601] ? debug_object_destroy+0x210/0x210 [ 103.290134][ T7601] ? check_preemption_disabled+0x50/0x150 [ 103.295844][ T7601] ? get_sigframe_size+0x10/0x10 [ 103.300772][ T7601] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 103.306999][ T7601] ? percpu_counter_add_batch+0xbd/0x180 [ 103.312645][ T7601] ? blkcg_maybe_throttle_current+0x5ea/0xe70 [ 103.318718][ T7601] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 103.324948][ T7601] ? call_rcu+0x34d/0x810 [ 103.329266][ T7601] ? trace_hardirqs_on+0x5b/0x1c0 [ 103.334276][ T7601] ? __blkcg_punt_bio_submit+0x1d0/0x1d0 [ 103.340100][ T7601] ? mem_cgroup_get_oom_group+0x450/0x450 [ 103.345829][ T7601] ? ___might_sleep+0x203/0x2e0 [ 103.350673][ T7601] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 103.356904][ T7601] ? task_work_run+0x14e/0x1a0 [ 103.361752][ T7601] exit_to_user_mode_prepare+0x20e/0x280 [ 103.367382][ T7601] syscall_exit_to_user_mode+0x40/0x70 [ 103.372831][ T7601] do_syscall_64+0x42/0xb0 [ 103.377233][ T7601] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 103.383119][ T7601] RIP: 0033:0x465159 [ 103.387008][ T7601] Code: Unable to access opcode bytes at RIP 0x46512f. [ 103.393922][ T7601] RSP: 002b:00007f4aa69bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 103.402507][ T7601] RAX: 0000000000000004 RBX: 000000000055cf20 RCX: 0000000000465159 [ 103.410463][ T7601] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 103.418417][ T7601] RBP: 00007f4aa69bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 103.426374][ T7601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.434329][ T7601] R13: 00007ffcc71a9a1f R14: 00007f4aa69bd300 R15: 0000000000022000 [ 103.450468][ T7628] FAULT_INJECTION: forcing a failure. [ 103.450468][ T7628] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.484004][ T7627] FAULT_INJECTION: forcing a failure. [ 103.484004][ T7627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.497408][ T7626] CPU: 0 PID: 7626 Comm: syz-executor.3 Tainted: G W 5.13.0-next-20210630-syzkaller #0 [ 103.500347][ T7629] FAULT_INJECTION: forcing a failure. [ 103.500347][ T7629] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.508354][ T7626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011