[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.254' (ECDSA) to the list of known hosts. syzkaller login: [ 63.843008][ T8464] IPVS: ftp: loaded support on port[0] = 21 [ 63.951020][ T8464] chnl_net:caif_netlink_parms(): no params data found [ 64.039802][ T8464] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.049069][ T8464] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.058142][ T8464] device bridge_slave_0 entered promiscuous mode [ 64.069579][ T8464] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.077212][ T8464] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.084884][ T8464] device bridge_slave_1 entered promiscuous mode [ 64.106004][ T8464] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.118211][ T8464] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.140670][ T8464] team0: Port device team_slave_0 added [ 64.150233][ T8464] team0: Port device team_slave_1 added [ 64.168544][ T8464] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.176562][ T8464] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.204149][ T8464] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.218541][ T8464] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.225943][ T8464] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.252014][ T8464] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.279322][ T8464] device hsr_slave_0 entered promiscuous mode [ 64.287725][ T8464] device hsr_slave_1 entered promiscuous mode [ 64.385625][ T8464] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 64.397341][ T8464] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 64.409138][ T8464] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 64.419359][ T8464] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 64.447018][ T8464] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.454361][ T8464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.462550][ T8464] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.469851][ T8464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.514725][ T8464] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.529827][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.541906][ T3138] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.550779][ T3138] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.559564][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 64.573295][ T8464] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.584219][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.593370][ T3138] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.600511][ T3138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.617675][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.627610][ T3138] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.636948][ T3138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.656167][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.666686][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.677258][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.693494][ T8464] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 64.705984][ T8464] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.718683][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.727937][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.737166][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.755327][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 64.763188][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 64.779191][ T8464] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.799407][ T3000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.819790][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.828402][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 64.837654][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 64.849562][ T8464] device veth0_vlan entered promiscuous mode [ 64.861949][ T8464] device veth1_vlan entered promiscuous mode [ 64.885003][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 64.894010][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 64.903994][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 64.918038][ T8464] device veth0_macvtap entered promiscuous mode [ 64.927111][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 64.938449][ T8464] device veth1_macvtap entered promiscuous mode [ 64.957295][ T8464] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 64.965109][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 64.974431][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 64.988113][ T8464] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 64.996848][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.007434][ T3138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 65.020073][ T8464] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.030043][ T8464] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 executing program [ 65.039037][ T8464] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.050853][ T8464] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.095138][ T8464] [ 65.097790][ T8464] ===================================================== [ 65.104800][ T8464] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 65.112254][ T8464] 5.10.0-rc7-syzkaller #0 Not tainted [ 65.117615][ T8464] ----------------------------------------------------- [ 65.124540][ T8464] syz-executor039/8464 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 65.132724][ T8464] ffff88801814a138 (&f->f_owner.lock){.+.+}-{2:2}, at: send_sigio+0x24/0x350 [ 65.141951][ T8464] [ 65.141951][ T8464] and this task is already holding: [ 65.149410][ T8464] ffff8880127ee018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x14b/0x460 [ 65.158085][ T8464] which would create a new lock dependency: [ 65.163987][ T8464] (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){.+.+}-{2:2} [ 65.171715][ T8464] [ 65.171715][ T8464] but this new dependency connects a HARDIRQ-irq-safe lock: [ 65.181153][ T8464] (&dev->event_lock){-.-.}-{2:2} [ 65.181168][ T8464] [ 65.181168][ T8464] ... which became HARDIRQ-irq-safe at: [ 65.194548][ T8464] lock_acquire+0x29d/0x740 [ 65.199147][ T8464] _raw_spin_lock_irqsave+0x39/0x50 [ 65.204434][ T8464] input_event+0x7b/0xb0 [ 65.208755][ T8464] psmouse_report_standard_buttons+0x2c/0x80 [ 65.214804][ T8464] psmouse_process_byte+0x1e1/0x890 [ 65.220211][ T8464] psmouse_handle_byte+0x41/0x1b0 [ 65.225493][ T8464] psmouse_interrupt+0x304/0xf00 [ 65.230500][ T8464] serio_interrupt+0x88/0x150 [ 65.235241][ T8464] i8042_interrupt+0x27a/0x520 [ 65.240194][ T8464] __handle_irq_event_percpu+0x303/0x8f0 [ 65.245922][ T8464] handle_irq_event+0x102/0x290 [ 65.250840][ T8464] handle_edge_irq+0x25f/0xd00 [ 65.255671][ T8464] asm_call_irq_on_stack+0xf/0x20 [ 65.261324][ T8464] common_interrupt+0x120/0x200 [ 65.266258][ T8464] asm_common_interrupt+0x1e/0x40 [ 65.271361][ T8464] call_rcu+0x2e7/0x700 [ 65.275589][ T8464] __put_cred+0x1ca/0x250 [ 65.280517][ T8464] file_free_rcu+0xa2/0xd0 [ 65.284997][ T8464] rcu_core+0x5df/0xe80 [ 65.289331][ T8464] __do_softirq+0x2a0/0x9f6 [ 65.293999][ T8464] run_ksoftirqd+0x2d/0x50 [ 65.298484][ T8464] smpboot_thread_fn+0x655/0x9e0 [ 65.303498][ T8464] kthread+0x3b1/0x4a0 [ 65.307632][ T8464] ret_from_fork+0x1f/0x30 [ 65.312107][ T8464] [ 65.312107][ T8464] to a HARDIRQ-irq-unsafe lock: [ 65.319112][ T8464] (&f->f_owner.lock){.+.+}-{2:2} [ 65.319126][ T8464] [ 65.319126][ T8464] ... which became HARDIRQ-irq-unsafe at: [ 65.332198][ T8464] ... [ 65.332213][ T8464] lock_acquire+0x29d/0x740 [ 65.339372][ T8464] _raw_read_lock+0x5b/0x70 [ 65.343993][ T8464] send_sigurg+0x1e/0xab0 [ 65.348404][ T8464] sk_send_sigurg+0x76/0x300 [ 65.353076][ T8464] tcp_check_urg.isra.0+0x1f4/0x710 [ 65.358363][ T8464] tcp_rcv_established+0x106c/0x1eb0 [ 65.363727][ T8464] tcp_v4_do_rcv+0x5d1/0x870 [ 65.368394][ T8464] __release_sock+0x134/0x3a0 [ 65.373256][ T8464] release_sock+0x54/0x1b0 [ 65.377750][ T8464] tcp_sendmsg+0x36/0x40 [ 65.382064][ T8464] inet_sendmsg+0x99/0xe0 [ 65.386459][ T8464] sock_sendmsg+0xcf/0x120 [ 65.390953][ T8464] __sys_sendto+0x21c/0x320 [ 65.395546][ T8464] __x64_sys_sendto+0xdd/0x1b0 [ 65.400839][ T8464] do_syscall_64+0x2d/0x70 [ 65.405367][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 65.411450][ T8464] [ 65.411450][ T8464] other info that might help us debug this: [ 65.411450][ T8464] [ 65.421665][ T8464] Chain exists of: [ 65.421665][ T8464] &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock [ 65.421665][ T8464] [ 65.435459][ T8464] Possible interrupt unsafe locking scenario: [ 65.435459][ T8464] [ 65.443785][ T8464] CPU0 CPU1 [ 65.449753][ T8464] ---- ---- [ 65.455146][ T8464] lock(&f->f_owner.lock); [ 65.459668][ T8464] local_irq_disable(); [ 65.466409][ T8464] lock(&dev->event_lock); [ 65.473412][ T8464] lock(&new->fa_lock); [ 65.480156][ T8464] [ 65.483590][ T8464] lock(&dev->event_lock); [ 65.488352][ T8464] [ 65.488352][ T8464] *** DEADLOCK *** [ 65.488352][ T8464] [ 65.496563][ T8464] 8 locks held by syz-executor039/8464: [ 65.502165][ T8464] #0: ffff88801cd8e110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1d3/0x760 [ 65.511289][ T8464] #1: ffff888018096230 (&dev->event_lock){-.-.}-{2:2}, at: input_inject_event+0xa6/0x310 [ 65.521286][ T8464] #2: ffffffff8b3378e0 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0x92/0x310 [ 65.530977][ T8464] #3: ffffffff8b3378e0 (rcu_read_lock){....}-{1:2}, at: input_pass_values.part.0+0x0/0x700 [ 65.541055][ T8464] #4: ffffffff8b3378e0 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x59/0x3f0 [ 65.550167][ T8464] #5: ffff888021d05028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values.part.0+0xf6/0x970 [ 65.560952][ T8464] #6: ffffffff8b3378e0 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x3d/0x460 [ 65.570202][ T8464] #7: ffff8880127ee018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x14b/0x460 [ 65.579442][ T8464] [ 65.579442][ T8464] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 65.589859][ T8464] -> (&dev->event_lock){-.-.}-{2:2} { [ 65.595409][ T8464] IN-HARDIRQ-W at: [ 65.599562][ T8464] lock_acquire+0x29d/0x740 [ 65.606043][ T8464] _raw_spin_lock_irqsave+0x39/0x50 [ 65.613316][ T8464] input_event+0x7b/0xb0 [ 65.619544][ T8464] psmouse_report_standard_buttons+0x2c/0x80 [ 65.628251][ T8464] psmouse_process_byte+0x1e1/0x890 [ 65.636833][ T8464] psmouse_handle_byte+0x41/0x1b0 [ 65.645188][ T8464] psmouse_interrupt+0x304/0xf00 [ 65.653046][ T8464] serio_interrupt+0x88/0x150 [ 65.660148][ T8464] i8042_interrupt+0x27a/0x520 [ 65.667573][ T8464] __handle_irq_event_percpu+0x303/0x8f0 [ 65.675368][ T8464] handle_irq_event+0x102/0x290 [ 65.682324][ T8464] handle_edge_irq+0x25f/0xd00 [ 65.689182][ T8464] asm_call_irq_on_stack+0xf/0x20 [ 65.696192][ T8464] common_interrupt+0x120/0x200 [ 65.703119][ T8464] asm_common_interrupt+0x1e/0x40 [ 65.710155][ T8464] call_rcu+0x2e7/0x700 [ 65.716321][ T8464] __put_cred+0x1ca/0x250 [ 65.722648][ T8464] file_free_rcu+0xa2/0xd0 [ 65.729229][ T8464] rcu_core+0x5df/0xe80 [ 65.735374][ T8464] __do_softirq+0x2a0/0x9f6 [ 65.742077][ T8464] run_ksoftirqd+0x2d/0x50 [ 65.749660][ T8464] smpboot_thread_fn+0x655/0x9e0 [ 65.756633][ T8464] kthread+0x3b1/0x4a0 [ 65.762953][ T8464] ret_from_fork+0x1f/0x30 [ 65.769448][ T8464] IN-SOFTIRQ-W at: [ 65.773586][ T8464] lock_acquire+0x29d/0x740 [ 65.780078][ T8464] _raw_spin_lock_irqsave+0x39/0x50 [ 65.787261][ T8464] input_event+0x7b/0xb0 [ 65.793535][ T8464] psmouse_report_standard_buttons+0x2c/0x80 [ 65.801513][ T8464] psmouse_process_byte+0x1e1/0x890 [ 65.808705][ T8464] psmouse_handle_byte+0x41/0x1b0 [ 65.815712][ T8464] psmouse_interrupt+0x304/0xf00 [ 65.822628][ T8464] serio_interrupt+0x88/0x150 [ 65.829309][ T8464] i8042_interrupt+0x27a/0x520 [ 65.836058][ T8464] __handle_irq_event_percpu+0x303/0x8f0 [ 65.843688][ T8464] handle_irq_event+0x102/0x290 [ 65.850516][ T8464] handle_edge_irq+0x25f/0xd00 [ 65.857261][ T8464] asm_call_irq_on_stack+0xf/0x20 [ 65.864270][ T8464] common_interrupt+0x120/0x200 [ 65.871124][ T8464] asm_common_interrupt+0x1e/0x40 [ 65.878398][ T8464] call_rcu+0x2e7/0x700 [ 65.884669][ T8464] __put_cred+0x1ca/0x250 [ 65.890980][ T8464] file_free_rcu+0xa2/0xd0 [ 65.897376][ T8464] rcu_core+0x5df/0xe80 [ 65.903529][ T8464] __do_softirq+0x2a0/0x9f6 [ 65.910154][ T8464] run_ksoftirqd+0x2d/0x50 [ 65.916559][ T8464] smpboot_thread_fn+0x655/0x9e0 [ 65.923720][ T8464] kthread+0x3b1/0x4a0 [ 65.929789][ T8464] ret_from_fork+0x1f/0x30 [ 65.936423][ T8464] INITIAL USE at: [ 65.940482][ T8464] lock_acquire+0x29d/0x740 [ 65.946879][ T8464] _raw_spin_lock_irqsave+0x39/0x50 [ 65.953965][ T8464] input_inject_event+0xa6/0x310 [ 65.960803][ T8464] led_set_brightness_nosleep+0xe6/0x1a0 [ 65.968335][ T8464] led_set_brightness+0x134/0x170 [ 65.975446][ T8464] led_trigger_event+0x70/0xd0 [ 65.982103][ T8464] kbd_led_trigger_activate+0xfa/0x130 [ 65.989474][ T8464] led_trigger_set+0x61e/0xbd0 [ 65.996163][ T8464] led_trigger_set_default+0x1a6/0x230 [ 66.003647][ T8464] led_classdev_register_ext+0x5b1/0x7c0 [ 66.011192][ T8464] input_leds_connect+0x3fb/0x740 [ 66.018133][ T8464] input_attach_handler+0x180/0x1f0 [ 66.025229][ T8464] input_register_device.cold+0xf0/0x307 [ 66.032756][ T8464] atkbd_connect+0x736/0xa00 [ 66.039429][ T8464] serio_driver_probe+0x72/0xa0 [ 66.046197][ T8464] really_probe+0x291/0xde0 [ 66.052616][ T8464] driver_probe_device+0x26b/0x3d0 [ 66.059760][ T8464] device_driver_attach+0x228/0x290 [ 66.066863][ T8464] __driver_attach+0x15b/0x2f0 [ 66.073536][ T8464] bus_for_each_dev+0x147/0x1d0 [ 66.080460][ T8464] serio_handle_event+0x5f6/0xa30 [ 66.087644][ T8464] process_one_work+0x933/0x15a0 [ 66.094488][ T8464] worker_thread+0x64c/0x1120 [ 66.101167][ T8464] kthread+0x3b1/0x4a0 [ 66.107164][ T8464] ret_from_fork+0x1f/0x30 [ 66.113631][ T8464] } [ 66.116320][ T8464] ... key at: [] __key.8+0x0/0x40 [ 66.123587][ T8464] ... acquired at: [ 66.127551][ T8464] _raw_spin_lock+0x2a/0x40 [ 66.132208][ T8464] evdev_pass_values.part.0+0xf6/0x970 [ 66.137825][ T8464] evdev_events+0x28b/0x3f0 [ 66.142631][ T8464] input_to_handler+0x2a0/0x4c0 [ 66.147784][ T8464] input_pass_values.part.0+0x284/0x700 [ 66.153571][ T8464] input_handle_event+0x324/0x1400 [ 66.158992][ T8464] input_inject_event+0x2f5/0x310 [ 66.164171][ T8464] evdev_write+0x430/0x760 [ 66.168741][ T8464] vfs_write+0x28e/0xa30 [ 66.173153][ T8464] ksys_write+0x1ee/0x250 [ 66.177739][ T8464] do_syscall_64+0x2d/0x70 [ 66.182325][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.188395][ T8464] [ 66.190702][ T8464] -> (&client->buffer_lock){....}-{2:2} { [ 66.196708][ T8464] INITIAL USE at: [ 66.202327][ T8464] lock_acquire+0x29d/0x740 [ 66.208569][ T8464] _raw_spin_lock+0x2a/0x40 [ 66.214823][ T8464] evdev_pass_values.part.0+0xf6/0x970 [ 66.222000][ T8464] evdev_events+0x28b/0x3f0 [ 66.228243][ T8464] input_to_handler+0x2a0/0x4c0 [ 66.234948][ T8464] input_pass_values.part.0+0x284/0x700 [ 66.242295][ T8464] input_handle_event+0x324/0x1400 [ 66.249483][ T8464] input_inject_event+0x2f5/0x310 [ 66.256221][ T8464] evdev_write+0x430/0x760 [ 66.262350][ T8464] vfs_write+0x28e/0xa30 [ 66.268304][ T8464] ksys_write+0x1ee/0x250 [ 66.274356][ T8464] do_syscall_64+0x2d/0x70 [ 66.280487][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.288134][ T8464] } [ 66.290885][ T8464] ... key at: [] __key.4+0x0/0x40 [ 66.298361][ T8464] ... acquired at: [ 66.303470][ T8464] _raw_read_lock+0x5b/0x70 [ 66.308146][ T8464] kill_fasync+0x14b/0x460 [ 66.312715][ T8464] evdev_pass_values.part.0+0x64e/0x970 [ 66.318425][ T8464] evdev_events+0x28b/0x3f0 [ 66.323081][ T8464] input_to_handler+0x2a0/0x4c0 [ 66.328090][ T8464] input_pass_values.part.0+0x284/0x700 [ 66.334522][ T8464] input_handle_event+0x324/0x1400 [ 66.339788][ T8464] input_inject_event+0x2f5/0x310 [ 66.345000][ T8464] evdev_write+0x430/0x760 [ 66.349591][ T8464] vfs_write+0x28e/0xa30 [ 66.353989][ T8464] ksys_write+0x1ee/0x250 [ 66.358485][ T8464] do_syscall_64+0x2d/0x70 [ 66.363151][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.369284][ T8464] [ 66.371585][ T8464] -> (&new->fa_lock){....}-{2:2} { [ 66.376693][ T8464] INITIAL READ USE at: [ 66.381104][ T8464] lock_acquire+0x29d/0x740 [ 66.387603][ T8464] _raw_read_lock+0x5b/0x70 [ 66.394168][ T8464] kill_fasync+0x14b/0x460 [ 66.400647][ T8464] evdev_pass_values.part.0+0x64e/0x970 [ 66.408178][ T8464] evdev_events+0x28b/0x3f0 [ 66.414767][ T8464] input_to_handler+0x2a0/0x4c0 [ 66.421960][ T8464] input_pass_values.part.0+0x284/0x700 [ 66.429667][ T8464] input_handle_event+0x324/0x1400 [ 66.436755][ T8464] input_inject_event+0x2f5/0x310 [ 66.443766][ T8464] evdev_write+0x430/0x760 [ 66.450254][ T8464] vfs_write+0x28e/0xa30 [ 66.456477][ T8464] ksys_write+0x1ee/0x250 [ 66.462884][ T8464] do_syscall_64+0x2d/0x70 [ 66.469481][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.477350][ T8464] } [ 66.480360][ T8464] ... key at: [] __key.0+0x0/0x40 [ 66.487457][ T8464] ... acquired at: [ 66.491247][ T8464] lock_acquire+0x29d/0x740 [ 66.495934][ T8464] _raw_read_lock+0x5b/0x70 [ 66.500611][ T8464] send_sigio+0x24/0x350 [ 66.505008][ T8464] kill_fasync+0x205/0x460 [ 66.510134][ T8464] evdev_pass_values.part.0+0x64e/0x970 [ 66.515859][ T8464] evdev_events+0x28b/0x3f0 [ 66.520615][ T8464] input_to_handler+0x2a0/0x4c0 [ 66.526137][ T8464] input_pass_values.part.0+0x284/0x700 [ 66.531861][ T8464] input_handle_event+0x324/0x1400 [ 66.537212][ T8464] input_inject_event+0x2f5/0x310 [ 66.542394][ T8464] evdev_write+0x430/0x760 [ 66.546973][ T8464] vfs_write+0x28e/0xa30 [ 66.551404][ T8464] ksys_write+0x1ee/0x250 [ 66.556509][ T8464] do_syscall_64+0x2d/0x70 [ 66.561090][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.567329][ T8464] [ 66.569666][ T8464] [ 66.569666][ T8464] the dependencies between the lock to be acquired [ 66.569670][ T8464] and HARDIRQ-irq-unsafe lock: [ 66.583316][ T8464] -> (&f->f_owner.lock){.+.+}-{2:2} { [ 66.588782][ T8464] HARDIRQ-ON-R at: [ 66.592763][ T8464] lock_acquire+0x29d/0x740 [ 66.598901][ T8464] _raw_read_lock+0x5b/0x70 [ 66.605119][ T8464] send_sigurg+0x1e/0xab0 [ 66.611093][ T8464] sk_send_sigurg+0x76/0x300 [ 66.617592][ T8464] tcp_check_urg.isra.0+0x1f4/0x710 [ 66.624418][ T8464] tcp_rcv_established+0x106c/0x1eb0 [ 66.631548][ T8464] tcp_v4_do_rcv+0x5d1/0x870 [ 66.639031][ T8464] __release_sock+0x134/0x3a0 [ 66.645990][ T8464] release_sock+0x54/0x1b0 [ 66.652215][ T8464] tcp_sendmsg+0x36/0x40 [ 66.658221][ T8464] inet_sendmsg+0x99/0xe0 [ 66.664200][ T8464] sock_sendmsg+0xcf/0x120 [ 66.670470][ T8464] __sys_sendto+0x21c/0x320 [ 66.677649][ T8464] __x64_sys_sendto+0xdd/0x1b0 [ 66.684143][ T8464] do_syscall_64+0x2d/0x70 [ 66.690200][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.697899][ T8464] SOFTIRQ-ON-R at: [ 66.701897][ T8464] lock_acquire+0x29d/0x740 [ 66.708177][ T8464] _raw_read_lock+0x5b/0x70 [ 66.714593][ T8464] send_sigurg+0x1e/0xab0 [ 66.720638][ T8464] sk_send_sigurg+0x76/0x300 [ 66.726891][ T8464] tcp_check_urg.isra.0+0x1f4/0x710 [ 66.733719][ T8464] tcp_rcv_established+0x106c/0x1eb0 [ 66.740638][ T8464] tcp_v4_do_rcv+0x5d1/0x870 [ 66.746894][ T8464] __release_sock+0x134/0x3a0 [ 66.753225][ T8464] release_sock+0x54/0x1b0 [ 66.759303][ T8464] tcp_sendmsg+0x36/0x40 [ 66.765224][ T8464] inet_sendmsg+0x99/0xe0 [ 66.771211][ T8464] sock_sendmsg+0xcf/0x120 [ 66.777280][ T8464] __sys_sendto+0x21c/0x320 [ 66.783515][ T8464] __x64_sys_sendto+0xdd/0x1b0 [ 66.790001][ T8464] do_syscall_64+0x2d/0x70 [ 66.796178][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.803716][ T8464] INITIAL READ USE at: [ 66.808032][ T8464] lock_acquire+0x29d/0x740 [ 66.814523][ T8464] _raw_read_lock+0x5b/0x70 [ 66.821029][ T8464] send_sigurg+0x1e/0xab0 [ 66.827347][ T8464] sk_send_sigurg+0x76/0x300 [ 66.833930][ T8464] tcp_check_urg.isra.0+0x1f4/0x710 [ 66.841108][ T8464] tcp_rcv_established+0x106c/0x1eb0 [ 66.848368][ T8464] tcp_v4_do_rcv+0x5d1/0x870 [ 66.855038][ T8464] __release_sock+0x134/0x3a0 [ 66.861707][ T8464] release_sock+0x54/0x1b0 [ 66.868215][ T8464] tcp_sendmsg+0x36/0x40 [ 66.874468][ T8464] inet_sendmsg+0x99/0xe0 [ 66.880792][ T8464] sock_sendmsg+0xcf/0x120 [ 66.887195][ T8464] __sys_sendto+0x21c/0x320 [ 66.893681][ T8464] __x64_sys_sendto+0xdd/0x1b0 [ 66.900447][ T8464] do_syscall_64+0x2d/0x70 [ 66.906846][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 66.914706][ T8464] } [ 66.917219][ T8464] ... key at: [] __key.5+0x0/0x40 [ 66.924588][ T8464] ... acquired at: [ 66.928392][ T8464] lock_acquire+0x29d/0x740 [ 66.933058][ T8464] _raw_read_lock+0x5b/0x70 [ 66.937729][ T8464] send_sigio+0x24/0x350 [ 66.942136][ T8464] kill_fasync+0x205/0x460 [ 66.946707][ T8464] evdev_pass_values.part.0+0x64e/0x970 [ 66.952408][ T8464] evdev_events+0x28b/0x3f0 [ 66.957080][ T8464] input_to_handler+0x2a0/0x4c0 [ 66.962461][ T8464] input_pass_values.part.0+0x284/0x700 [ 66.968181][ T8464] input_handle_event+0x324/0x1400 [ 66.973441][ T8464] input_inject_event+0x2f5/0x310 [ 66.978614][ T8464] evdev_write+0x430/0x760 [ 66.983321][ T8464] vfs_write+0x28e/0xa30 [ 66.987737][ T8464] ksys_write+0x1ee/0x250 [ 66.992247][ T8464] do_syscall_64+0x2d/0x70 [ 66.996846][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.002884][ T8464] [ 67.005190][ T8464] [ 67.005190][ T8464] stack backtrace: [ 67.011068][ T8464] CPU: 0 PID: 8464 Comm: syz-executor039 Not tainted 5.10.0-rc7-syzkaller #0 [ 67.019810][ T8464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.029986][ T8464] Call Trace: [ 67.033258][ T8464] dump_stack+0x107/0x163 [ 67.037569][ T8464] check_irq_usage.cold+0x4f5/0x6c8 [ 67.042927][ T8464] ? print_shortest_lock_dependencies+0x80/0x80 [ 67.049168][ T8464] ? __kernel_text_address+0x9/0x30 [ 67.054359][ T8464] ? unwind_get_return_address+0x51/0x90 [ 67.060199][ T8464] ? check_path.constprop.0+0x22/0x40 [ 67.065608][ T8464] ? stack_trace_save+0x8c/0xc0 [ 67.070479][ T8464] ? lockdep_lock+0xc6/0x200 [ 67.075066][ T8464] ? call_rcu_zapped+0xb0/0xb0 [ 67.079820][ T8464] __lock_acquire+0x2af6/0x5500 [ 67.084655][ T8464] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 67.090632][ T8464] lock_acquire+0x29d/0x740 [ 67.095126][ T8464] ? send_sigio+0x24/0x350 [ 67.099541][ T8464] ? lock_release+0x710/0x710 [ 67.104226][ T8464] ? lock_release+0x710/0x710 [ 67.108902][ T8464] ? lock_release+0x710/0x710 [ 67.113573][ T8464] ? lock_release+0x710/0x710 [ 67.118243][ T8464] _raw_read_lock+0x5b/0x70 [ 67.122738][ T8464] ? send_sigio+0x24/0x350 [ 67.127221][ T8464] send_sigio+0x24/0x350 [ 67.132049][ T8464] kill_fasync+0x205/0x460 [ 67.136474][ T8464] evdev_pass_values.part.0+0x64e/0x970 [ 67.142129][ T8464] ? evdev_release+0x410/0x410 [ 67.147058][ T8464] ? ktime_mono_to_any+0xb8/0x1a0 [ 67.152071][ T8464] evdev_events+0x28b/0x3f0 [ 67.156659][ T8464] ? evdev_pass_values.part.0+0x970/0x970 [ 67.162368][ T8464] input_to_handler+0x2a0/0x4c0 [ 67.167204][ T8464] input_pass_values.part.0+0x284/0x700 [ 67.172901][ T8464] ? rwlock_bug.part.0+0x90/0x90 [ 67.177820][ T8464] input_handle_event+0x324/0x1400 [ 67.183062][ T8464] input_inject_event+0x2f5/0x310 [ 67.188081][ T8464] evdev_write+0x430/0x760 [ 67.192484][ T8464] ? evdev_read+0xe40/0xe40 [ 67.197187][ T8464] ? security_file_permission+0x248/0x560 [ 67.203131][ T8464] ? evdev_read+0xe40/0xe40 [ 67.207743][ T8464] vfs_write+0x28e/0xa30 [ 67.212088][ T8464] ksys_write+0x1ee/0x250 [ 67.216506][ T8464] ? __ia32_sys_read+0xb0/0xb0 [ 67.221272][ T8464] ? syscall_enter_from_user_mode+0x1d/0x50 [ 67.227149][ T8464] do_syscall_64+0x2d/0x70 [ 67.231560][ T8464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.237432][ T8464] RIP: 0033:0x4478e9 [ 67.241328][ T8464] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb cf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 67.261035][ T8464] RSP: 002b:00007ffe0e18edb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 67.269689][ T8464] RAX: ffffffffffffffda RBX: 00000000004ab481 RCX: 00000000004478e9 [ 67.277661][ T8464] RDX: 0000000000000030 RSI: 0000000020000200 RDI: 0000000000000005 [ 67.285721][ T8464] RBP: 00007ffe0e18edd0 R08: 00000000bb1414ac R09: 00000000bb1414ac [ 67.293673][ T8464] R10: 000000000000000f R11: 0000000000000246 R12: 00007ffe0e18ee00 [ 67.301996][ T8464] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000