can: request_module (can-proto-6) failed. can: request_module (can-proto-6) failed. team0: Port device team_slave_1 removed netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. ====================================================== WARNING: possible circular locking dependency detected 4.19.195-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.4/16287 is trying to acquire lock: 00000000c9d8d6b8 (pernet_ops_rwsem){++++}, at: unregister_netdevice_notifier+0x7b/0x330 net/core/dev.c:1708 but task is already holding lock: 00000000f59e782c (&sb->s_type->i_mutex_key#13){+.+.}, at: inode_lock include/linux/fs.h:748 [inline] 00000000f59e782c (&sb->s_type->i_mutex_key#13){+.+.}, at: __sock_release+0x86/0x2a0 net/socket.c:578 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 (&sb->s_type->i_mutex_key#13){+.+.}: inode_lock include/linux/fs.h:748 [inline] __sock_release+0x86/0x2a0 net/socket.c:578 sock_close+0x15/0x20 net/socket.c:1140 __fput+0x2ce/0x890 fs/file_table.c:278 delayed_fput+0x56/0x70 fs/file_table.c:304 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 -> #2 ((delayed_fput_work).work){+.+.}: worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 -> #1 ((wq_completion)"events"){+.+.}: flush_scheduled_work include/linux/workqueue.h:599 [inline] tipc_exit_net+0x38/0x60 net/tipc/core.c:100 ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 -> #0 (pernet_ops_rwsem){++++}: down_write+0x34/0x90 kernel/locking/rwsem.c:70 unregister_netdevice_notifier+0x7b/0x330 net/core/dev.c:1708 raw_release+0x58/0x820 net/can/raw.c:358 __sock_release+0xcd/0x2a0 net/socket.c:579 sock_close+0x15/0x20 net/socket.c:1140 __fput+0x2ce/0x890 fs/file_table.c:278 task_work_run+0x148/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Chain exists of: pernet_ops_rwsem --> (delayed_fput_work).work --> &sb->s_type->i_mutex_key#13 Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&sb->s_type->i_mutex_key#13); lock((delayed_fput_work).work); lock(&sb->s_type->i_mutex_key#13); lock(pernet_ops_rwsem); *** DEADLOCK *** 1 lock held by syz-executor.4/16287: #0: 00000000f59e782c (&sb->s_type->i_mutex_key#13){+.+.}, at: inode_lock include/linux/fs.h:748 [inline] #0: 00000000f59e782c (&sb->s_type->i_mutex_key#13){+.+.}, at: __sock_release+0x86/0x2a0 net/socket.c:578 stack backtrace: CPU: 1 PID: 16287 Comm: syz-executor.4 Not tainted 4.19.195-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 print_circular_bug.constprop.0.cold+0x2d7/0x41e kernel/locking/lockdep.c:1222 check_prev_add kernel/locking/lockdep.c:1866 [inline] check_prevs_add kernel/locking/lockdep.c:1979 [inline] validate_chain kernel/locking/lockdep.c:2420 [inline] __lock_acquire+0x30c9/0x3ff0 kernel/locking/lockdep.c:3416 lock_acquire+0x170/0x3c0 kernel/locking/lockdep.c:3908 down_write+0x34/0x90 kernel/locking/rwsem.c:70 unregister_netdevice_notifier+0x7b/0x330 net/core/dev.c:1708 raw_release+0x58/0x820 net/can/raw.c:358 __sock_release+0xcd/0x2a0 net/socket.c:579 sock_close+0x15/0x20 net/socket.c:1140 __fput+0x2ce/0x890 fs/file_table.c:278 task_work_run+0x148/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4193eb Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 RSP: 002b:00007ffed3c21d40 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00000000004193eb RDX: 0000000000000000 RSI: ffffffff8167a83a RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2f423e78 R10: 00000000000001ec R11: 0000000000000293 R12: 000000000056cb00 R13: 000000000056cb00 R14: 000000000056bf80 R15: 000000000004122e IPVS: ftp: loaded support on port[0] = 21 netlink: 504 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 504 bytes leftover after parsing attributes in process `syz-executor.5'. Started in network mode Own node identity 8, cluster identity 4711 32-bit node address hash set to 8 IPVS: ftp: loaded support on port[0] = 21 Left network mode IPVS: ftp: loaded support on port[0] = 21 Started in network mode Own node identity 8, cluster identity 4711 32-bit node address hash set to 8 IPVS: ftp: loaded support on port[0] = 21 Left network mode Started in network mode Own node identity 8, cluster identity 4711 32-bit node address hash set to 8 Left network mode IPVS: ftp: loaded support on port[0] = 21 hfsplus: unable to find HFS+ superblock hfsplus: unable to find HFS+ superblock Started in network mode Own node identity 8, cluster identity 4711 32-bit node address hash set to 8 hfsplus: unable to find HFS+ superblock hfsplus: unable to find HFS+ superblock Left network mode hfsplus: unable to find HFS+ superblock netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. isofs_fill_super: bread failed, dev=loop5, iso_blknum=16, block=32 UDF-fs: warning (device loop0): udf_load_vrs: No VRS found netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. UDF-fs: Scanning with blocksize 512 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found isofs_fill_super: bread failed, dev=loop5, iso_blknum=16, block=32 UDF-fs: Scanning with blocksize 1024 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. UDF-fs: Scanning with blocksize 4096 failed isofs_fill_super: bread failed, dev=loop5, iso_blknum=16, block=32 UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 512 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed isofs_fill_super: bread failed, dev=loop5, iso_blknum=16, block=32 UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 512 failed audit: type=1326 audit(1625003734.073:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16769 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0xffff0000 UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 1024 failed isofs_fill_super: bread failed, dev=loop5, iso_blknum=16, block=32 UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed audit: type=1326 audit(1625003734.413:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16814 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0xffff0000 UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 512 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 512 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 1024 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 2048 failed UDF-fs: warning (device loop0): udf_load_vrs: No VRS found UDF-fs: Scanning with blocksize 4096 failed audit: type=1326 audit(1625003735.284:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16873 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0xffff0000 audit: type=1804 audit(1625003735.284:46): pid=16879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir585465980/syzkaller.ZfBWVB/275/bus" dev="sda1" ino=14715 res=1 audit: type=1804 audit(1625003735.284:47): pid=16879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir585465980/syzkaller.ZfBWVB/275/bus" dev="sda1" ino=14715 res=1 audit: type=1804 audit(1625003735.994:48): pid=16879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir585465980/syzkaller.ZfBWVB/275/bus" dev="sda1" ino=14715 res=1 audit: type=1804 audit(1625003736.014:49): pid=16879 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir585465980/syzkaller.ZfBWVB/275/bus" dev="sda1" ino=14715 res=1 audit: type=1804 audit(1625003736.174:50): pid=16923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir585465980/syzkaller.ZfBWVB/276/bus" dev="sda1" ino=14728 res=1 audit: type=1804 audit(1625003736.174:51): pid=16923 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir585465980/syzkaller.ZfBWVB/276/bus" dev="sda1" ino=14728 res=1 audit: type=1326 audit(1625003736.204:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16920 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0xffff0000