can: request_module (can-proto-5) failed. ================================ WARNING: inconsistent lock state 4.19.206-syzkaller #0 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. kworker/u4:1/23 [HC0[0]:SC1[1]:HE1:SE0] takes: 00000000263217f6 (slock-AF_BLUETOOTH-BTPROTO_SCO){+.?.}, at: spin_lock include/linux/spinlock.h:329 [inline] 00000000263217f6 (slock-AF_BLUETOOTH-BTPROTO_SCO){+.?.}, at: sco_sock_timeout+0x31/0x210 net/bluetooth/sco.c:82 {SOFTIRQ-ON-W} state was registered at: __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] sco_conn_del+0xe2/0x240 net/bluetooth/sco.c:175 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 sco_disconn_cfm+0x74/0xb0 net/bluetooth/sco.c:1133 hci_disconn_cfm include/net/bluetooth/hci_core.h:1263 [inline] hci_conn_hash_flush+0x127/0x260 net/bluetooth/hci_conn.c:1512 hci_dev_do_close+0x659/0xf10 net/bluetooth/hci_core.c:1673 CPU: 0 PID: 5122 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 hci_unregister_dev+0x14f/0x460 net/bluetooth/hci_core.c:3274 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 vhci_release+0x70/0xe0 drivers/bluetooth/hci_vhci.c:354 Call Trace: __fput+0x2ce/0x890 fs/file_table.c:278 __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 task_work_run+0x148/0x1c0 kernel/task_work.c:113 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 exit_task_work include/linux/task_work.h:22 [inline] do_exit+0xbf3/0x2be0 kernel/exit.c:870 do_group_exit+0x125/0x310 kernel/exit.c:967 get_signal+0x3f2/0x1f70 kernel/signal.c:2589 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:799 __should_failslab+0x115/0x180 mm/failslab.c:32 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 should_failslab+0x5/0x10 mm/slab_common.c:1590 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x277/0x370 mm/slab.c:3557 irq event stamp: 25976508 aio_get_req fs/aio.c:1027 [inline] __io_submit_one fs/aio.c:1818 [inline] io_submit_one+0x11e/0x20c0 fs/aio.c:1909 hardirqs last enabled at (25976508): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:168 [inline] hardirqs last enabled at (25976508): [] _raw_spin_unlock_irq+0x24/0x80 kernel/locking/spinlock.c:192 hardirqs last disabled at (25976507): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:126 [inline] hardirqs last disabled at (25976507): [] _raw_spin_lock_irq+0x35/0x80 kernel/locking/spinlock.c:160 softirqs last enabled at (25976488): [] spin_unlock_bh include/linux/spinlock.h:374 [inline] softirqs last enabled at (25976488): [] batadv_nc_purge_paths+0x22d/0x310 net/batman-adv/network-coding.c:482 softirqs last disabled at (25976501): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (25976501): [] irq_exit+0x215/0x260 kernel/softirq.c:412 __do_sys_io_submit fs/aio.c:1953 [inline] __se_sys_io_submit+0x11b/0x4a0 fs/aio.c:1924 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(slock-AF_BLUETOOTH-BTPROTO_SCO); do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe lock(slock-AF_BLUETOOTH-BTPROTO_SCO); RIP: 0033:0x4665f9 *** DEADLOCK *** Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 3 locks held by kworker/u4:1/23: RSP: 002b:00007fa4084ad188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 #0: 00000000f11466ae ((wq_completion)"%s""bat_events"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 #1: 0000000000bff97d ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 RDX: 00000000200000c0 RSI: 0000000000000001 RDI: 00007fa40845d000 #2: 0000000033e4f223 ((&sk->sk_timer)#2){+.-.}, at: lockdep_copy_map include/linux/lockdep.h:168 [inline] #2: 0000000033e4f223 ((&sk->sk_timer)#2){+.-.}, at: call_timer_fn+0xc9/0x700 kernel/time/timer.c:1328 RBP: 00007fa4084ad1d0 R08: 0000000000000000 R09: 0000000000000000 stack backtrace: R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007fff78fd3e0f R14: 00007fa4084ad300 R15: 0000000000022000 CPU: 1 PID: 23 Comm: kworker/u4:1 Not tainted 4.19.206-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_usage_bug.cold+0x42e/0x570 kernel/locking/lockdep.c:2545 valid_state kernel/locking/lockdep.c:2558 [inline] mark_lock_irq kernel/locking/lockdep.c:2752 [inline] mark_lock+0xc70/0x1160 kernel/locking/lockdep.c:3132 mark_irqflags kernel/locking/lockdep.c:3010 [inline] __lock_acquire+0xdc4/0x3ff0 kernel/locking/lockdep.c:3373 lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:144 spin_lock include/linux/spinlock.h:329 [inline] sco_sock_timeout+0x31/0x210 net/bluetooth/sco.c:82 call_timer_fn+0x177/0x700 kernel/time/timer.c:1338 expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:lock_release+0x440/0x8b0 kernel/locking/lockdep.c:3931 Code: 83 3d 5b 26 a6 08 00 0f 84 cc 01 00 00 48 8b 3c 24 57 9d 0f 1f 44 00 00 48 b8 00 00 00 00 00 fc ff df 49 c7 04 04 00 00 00 00 <48> 8b 44 24 70 65 48 2b 04 25 28 00 00 00 0f 85 67 03 00 00 48 83 RSP: 0018:ffff8880b5047c00 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: ffff8880b503c600 RCX: 1ffff11016a079db RDX: dffffc0000000000 RSI: 0000000000000003 RDI: 0000000000000286 RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000002 R10: 0000000000000000 R11: 0000000000000000 R12: 1ffff11016a08f83 R13: ef545f96172bec08 R14: ffff8880b503c600 R15: 0000000000000003 rcu_lock_release include/linux/rcupdate.h:247 [inline] rcu_read_unlock include/linux/rcupdate.h:681 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:423 [inline] batadv_nc_worker+0x66c/0xd50 net/batman-adv/network-coding.c:730 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5150 Comm: syz-executor.1 Not tainted 4.19.206-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 __should_failslab+0x115/0x180 mm/failslab.c:32 should_failslab+0x5/0x10 mm/slab_common.c:1590 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] kmem_cache_alloc+0x277/0x370 mm/slab.c:3557 prepare_creds+0x39/0x510 kernel/cred.c:255 aio_fsync fs/aio.c:1601 [inline] aio_fsync+0x18e/0x3a0 fs/aio.c:1591 __io_submit_one fs/aio.c:1867 [inline] io_submit_one+0xeab/0x20c0 fs/aio.c:1909 __do_sys_io_submit fs/aio.c:1953 [inline] __se_sys_io_submit+0x11b/0x4a0 fs/aio.c:1924 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4665f9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa4084ad188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 RDX: 00000000200000c0 RSI: 0000000000000001 RDI: 00007fa40845d000 RBP: 00007fa4084ad1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007fff78fd3e0f R14: 00007fa4084ad300 R15: 0000000000022000 device bridge2 entered promiscuous mode audit: type=1800 audit(1631136317.737:225): pid=5227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=14498 res=0 audit: type=1800 audit(1631136317.817:226): pid=5245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=14199 res=0 audit: type=1800 audit(1631136318.717:227): pid=5305 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=14150 res=0 device bridge6 entered promiscuous mode FAT-fs (loop0): Unrecognized mount option "fowner>00000000000000060929" or missing value audit: type=1800 audit(1631136321.647:228): pid=5529 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=14882 res=0 audit: type=1800 audit(1631136322.567:229): pid=5584 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=15393 res=0 audit: type=1800 audit(1631136322.657:230): pid=5602 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=14214 res=0 audit: type=1800 audit(1631136323.417:231): pid=5622 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=15329 res=0 hpfs: bad mount options. hpfs: bad mount options. IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 device bridge7 entered promiscuous mode audit: type=1800 audit(1631136325.447:232): pid=5796 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="sda1" ino=15880 res=0 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: ff c3 inc %ebx 2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) 9: 00 00 00 c: 0f 1f 40 00 nopl 0x0(%rax) 10: 48 89 f8 mov %rdi,%rax 13: 48 89 f7 mov %rsi,%rdi 16: 48 89 d6 mov %rdx,%rsi 19: 48 89 ca mov %rcx,%rdx 1c: 4d 89 c2 mov %r8,%r10 1f: 4d 89 c8 mov %r9,%r8 22: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 27: 0f 05 syscall * 29: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 2f: 73 01 jae 0x32 31: c3 retq 32: 48 c7 c1 bc ff ff ff mov $0xffffffffffffffbc,%rcx 39: f7 d8 neg %eax 3b: 64 89 01 mov %eax,%fs:(%rcx) 3e: 48 rex.W