Warning: Permanently added '10.128.10.27' (ECDSA) to the list of known hosts. executing program [ 48.627921][ T3592] [ 48.630276][ T3592] ===================================================== [ 48.637188][ T3592] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 48.644620][ T3592] 5.18.0-rc3-next-20220420-syzkaller #0 Not tainted [ 48.651182][ T3592] ----------------------------------------------------- [ 48.658086][ T3592] syz-executor101/3592 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 48.666130][ T3592] ffffffff8ba0a098 (tasklist_lock){.+.+}-{2:2}, at: send_sigio+0xab/0x380 [ 48.674653][ T3592] [ 48.674653][ T3592] and this task is already holding: [ 48.682000][ T3592] ffff88801a78f2b0 (&f->f_owner.lock){....}-{2:2}, at: send_sigio+0x24/0x380 [ 48.690761][ T3592] which would create a new lock dependency: [ 48.696640][ T3592] (&f->f_owner.lock){....}-{2:2} -> (tasklist_lock){.+.+}-{2:2} [ 48.704355][ T3592] [ 48.704355][ T3592] but this new dependency connects a HARDIRQ-irq-safe lock: [ 48.713791][ T3592] (&dev->event_lock#2){-...}-{2:2} [ 48.713812][ T3592] [ 48.713812][ T3592] ... which became HARDIRQ-irq-safe at: [ 48.726667][ T3592] lock_acquire+0x1ab/0x570 [ 48.731250][ T3592] _raw_spin_lock_irqsave+0x39/0x50 [ 48.736531][ T3592] input_event+0x7b/0xb0 [ 48.740846][ T3592] psmouse_report_standard_buttons+0x2c/0x80 [ 48.746894][ T3592] psmouse_process_byte+0x1e1/0x890 [ 48.752165][ T3592] psmouse_handle_byte+0x41/0x1b0 [ 48.757261][ T3592] psmouse_interrupt+0x304/0xf00 [ 48.762273][ T3592] serio_interrupt+0x88/0x150 [ 48.767028][ T3592] i8042_interrupt+0x27a/0x520 [ 48.771871][ T3592] __handle_irq_event_percpu+0x22b/0x880 [ 48.777571][ T3592] handle_irq_event+0xa7/0x1e0 [ 48.782420][ T3592] handle_edge_irq+0x25f/0xd00 [ 48.787254][ T3592] __common_interrupt+0x9d/0x210 [ 48.792259][ T3592] common_interrupt+0xa4/0xc0 [ 48.797015][ T3592] asm_common_interrupt+0x1e/0x40 [ 48.802129][ T3592] preempt_count_sub+0x1a/0x150 [ 48.807052][ T3592] unwind_next_frame+0xee1/0x1ce0 [ 48.812162][ T3592] arch_stack_walk+0x7d/0xe0 [ 48.816824][ T3592] stack_trace_save+0x8c/0xc0 [ 48.821570][ T3592] kasan_save_stack+0x1e/0x40 [ 48.826318][ T3592] kasan_set_track+0x21/0x30 [ 48.830981][ T3592] kasan_set_free_info+0x20/0x30 [ 48.835983][ T3592] ____kasan_slab_free+0x166/0x1a0 [ 48.841187][ T3592] slab_free_freelist_hook+0x8b/0x1c0 [ 48.846629][ T3592] kmem_cache_free+0xdd/0x5a0 [ 48.851383][ T3592] remove_vma+0x135/0x170 [ 48.855792][ T3592] exit_mmap+0x259/0x4a0 [ 48.860112][ T3592] __mmput+0xde/0x450 [ 48.864164][ T3592] mmput+0x56/0x60 [ 48.867960][ T3592] free_bprm+0x65/0x2e0 [ 48.872346][ T3592] kernel_execve+0x3a4/0x490 [ 48.877022][ T3592] call_usermodehelper_exec_async+0x2e3/0x580 [ 48.883175][ T3592] ret_from_fork+0x1f/0x30 [ 48.887848][ T3592] [ 48.887848][ T3592] to a HARDIRQ-irq-unsafe lock: [ 48.894946][ T3592] (tasklist_lock){.+.+}-{2:2} [ 48.894966][ T3592] [ 48.894966][ T3592] ... which became HARDIRQ-irq-unsafe at: [ 48.907552][ T3592] ... [ 48.907557][ T3592] lock_acquire+0x1ab/0x570 [ 48.914691][ T3592] _raw_read_lock+0x5b/0x70 [ 48.919267][ T3592] do_wait+0x284/0xce0 [ 48.923409][ T3592] kernel_wait+0x9c/0x150 [ 48.927811][ T3592] call_usermodehelper_exec_work+0xf5/0x180 [ 48.933776][ T3592] process_one_work+0x996/0x1610 [ 48.938780][ T3592] worker_thread+0x665/0x1080 [ 48.943524][ T3592] kthread+0x2e9/0x3a0 [ 48.947658][ T3592] ret_from_fork+0x1f/0x30 [ 48.952143][ T3592] [ 48.952143][ T3592] other info that might help us debug this: [ 48.952143][ T3592] [ 48.962351][ T3592] Chain exists of: [ 48.962351][ T3592] &dev->event_lock#2 --> &f->f_owner.lock --> tasklist_lock [ 48.962351][ T3592] [ 48.975533][ T3592] Possible interrupt unsafe locking scenario: [ 48.975533][ T3592] [ 48.983829][ T3592] CPU0 CPU1 [ 48.989181][ T3592] ---- ---- [ 48.994523][ T3592] lock(tasklist_lock); [ 48.998745][ T3592] local_irq_disable(); [ 49.005480][ T3592] lock(&dev->event_lock#2); [ 49.012671][ T3592] lock(&f->f_owner.lock); [ 49.019685][ T3592] [ 49.023138][ T3592] lock(&dev->event_lock#2); [ 49.027971][ T3592] [ 49.027971][ T3592] *** DEADLOCK *** [ 49.027971][ T3592] [ 49.036089][ T3592] 5 locks held by syz-executor101/3592: [ 49.041611][ T3592] #0: ffffffff8bd84f60 (rcu_read_lock){....}-{1:2}, at: sock_def_readable+0x0/0x4e0 [ 49.051194][ T3592] #1: ffffffff8bd84f60 (rcu_read_lock){....}-{1:2}, at: sock_def_readable+0x2aa/0x4e0 [ 49.060825][ T3592] #2: ffffffff8bd84f60 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x41/0x470 [ 49.069859][ T3592] #3: ffff888072078018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x136/0x470 [ 49.078989][ T3592] #4: ffff88801a78f2b0 (&f->f_owner.lock){....}-{2:2}, at: send_sigio+0x24/0x380 [ 49.088212][ T3592] [ 49.088212][ T3592] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 49.098595][ T3592] -> (&dev->event_lock#2){-...}-{2:2} { [ 49.104397][ T3592] IN-HARDIRQ-W at: [ 49.108615][ T3592] lock_acquire+0x1ab/0x570 [ 49.115294][ T3592] _raw_spin_lock_irqsave+0x39/0x50 [ 49.122647][ T3592] input_event+0x7b/0xb0 [ 49.129051][ T3592] psmouse_report_standard_buttons+0x2c/0x80 [ 49.137214][ T3592] psmouse_process_byte+0x1e1/0x890 [ 49.144568][ T3592] psmouse_handle_byte+0x41/0x1b0 [ 49.152266][ T3592] psmouse_interrupt+0x304/0xf00 [ 49.159399][ T3592] serio_interrupt+0x88/0x150 [ 49.166243][ T3592] i8042_interrupt+0x27a/0x520 [ 49.173158][ T3592] __handle_irq_event_percpu+0x22b/0x880 [ 49.180945][ T3592] handle_irq_event+0xa7/0x1e0 [ 49.187859][ T3592] handle_edge_irq+0x25f/0xd00 [ 49.194780][ T3592] __common_interrupt+0x9d/0x210 [ 49.201885][ T3592] common_interrupt+0xa4/0xc0 [ 49.208730][ T3592] asm_common_interrupt+0x1e/0x40 [ 49.215908][ T3592] preempt_count_sub+0x1a/0x150 [ 49.222913][ T3592] unwind_next_frame+0xee1/0x1ce0 [ 49.230111][ T3592] arch_stack_walk+0x7d/0xe0 [ 49.236860][ T3592] stack_trace_save+0x8c/0xc0 [ 49.243692][ T3592] kasan_save_stack+0x1e/0x40 [ 49.250527][ T3592] kasan_set_track+0x21/0x30 [ 49.257272][ T3592] kasan_set_free_info+0x20/0x30 [ 49.264364][ T3592] ____kasan_slab_free+0x166/0x1a0 [ 49.271655][ T3592] slab_free_freelist_hook+0x8b/0x1c0 [ 49.279185][ T3592] kmem_cache_free+0xdd/0x5a0 [ 49.286017][ T3592] remove_vma+0x135/0x170 [ 49.292504][ T3592] exit_mmap+0x259/0x4a0 [ 49.298906][ T3592] __mmput+0xde/0x450 [ 49.305040][ T3592] mmput+0x56/0x60 [ 49.310931][ T3592] free_bprm+0x65/0x2e0 [ 49.317259][ T3592] kernel_execve+0x3a4/0x490 [ 49.324143][ T3592] call_usermodehelper_exec_async+0x2e3/0x580 [ 49.332383][ T3592] ret_from_fork+0x1f/0x30 [ 49.338961][ T3592] INITIAL USE at: [ 49.343097][ T3592] lock_acquire+0x1ab/0x570 [ 49.349675][ T3592] _raw_spin_lock_irqsave+0x39/0x50 [ 49.356953][ T3592] input_inject_event+0xa6/0x320 [ 49.363966][ T3592] led_set_brightness_nosleep+0xe6/0x1a0 [ 49.371676][ T3592] led_set_brightness+0x134/0x170 [ 49.378764][ T3592] led_trigger_event+0xb0/0x200 [ 49.385684][ T3592] kbd_led_trigger_activate+0xc9/0x100 [ 49.393217][ T3592] led_trigger_set+0x5d7/0xaf0 [ 49.400050][ T3592] led_trigger_set_default+0x1a6/0x230 [ 49.407573][ T3592] led_classdev_register_ext+0x56f/0x770 [ 49.415277][ T3592] input_leds_connect+0x4bd/0x860 [ 49.422386][ T3592] input_attach_handler+0x180/0x1f0 [ 49.429654][ T3592] input_register_device.cold+0xf0/0x304 [ 49.437388][ T3592] atkbd_connect+0x749/0xa10 [ 49.444044][ T3592] serio_driver_probe+0x72/0xa0 [ 49.450958][ T3592] really_probe+0x23e/0xb20 [ 49.457532][ T3592] __driver_probe_device+0x338/0x4d0 [ 49.464904][ T3592] driver_probe_device+0x4c/0x1a0 [ 49.472083][ T3592] __driver_attach+0x22d/0x4e0 [ 49.478915][ T3592] bus_for_each_dev+0x147/0x1d0 [ 49.485833][ T3592] serio_handle_event+0x5f6/0xa30 [ 49.492923][ T3592] process_one_work+0x996/0x1610 [ 49.499942][ T3592] worker_thread+0x665/0x1080 [ 49.506700][ T3592] kthread+0x2e9/0x3a0 [ 49.512831][ T3592] ret_from_fork+0x1f/0x30 [ 49.519314][ T3592] } [ 49.522050][ T3592] ... key at: [] __key.7+0x0/0x40 [ 49.529414][ T3592] -> (&client->buffer_lock){....}-{2:2} { [ 49.535384][ T3592] INITIAL USE at: [ 49.539425][ T3592] lock_acquire+0x1ab/0x570 [ 49.545833][ T3592] _raw_spin_lock+0x2a/0x40 [ 49.552230][ T3592] evdev_pass_values.part.0+0xf6/0x970 [ 49.559586][ T3592] evdev_events+0x359/0x3e0 [ 49.565982][ T3592] input_to_handler+0x2a0/0x4c0 [ 49.572726][ T3592] input_pass_values.part.0+0x230/0x710 [ 49.580177][ T3592] input_handle_event+0x373/0x1440 [ 49.587189][ T3592] input_inject_event+0x1bd/0x320 [ 49.594109][ T3592] evdev_write+0x430/0x760 [ 49.600431][ T3592] vfs_write+0x269/0xac0 [ 49.606566][ T3592] ksys_write+0x1e8/0x250 [ 49.612790][ T3592] do_syscall_64+0x35/0xb0 [ 49.619101][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.626888][ T3592] } [ 49.629537][ T3592] ... key at: [] __key.3+0x0/0x40 [ 49.636815][ T3592] ... acquired at: [ 49.640775][ T3592] _raw_spin_lock+0x2a/0x40 [ 49.645435][ T3592] evdev_pass_values.part.0+0xf6/0x970 [ 49.651050][ T3592] evdev_events+0x359/0x3e0 [ 49.655706][ T3592] input_to_handler+0x2a0/0x4c0 [ 49.660712][ T3592] input_pass_values.part.0+0x230/0x710 [ 49.666417][ T3592] input_handle_event+0x373/0x1440 [ 49.671684][ T3592] input_inject_event+0x1bd/0x320 [ 49.676867][ T3592] evdev_write+0x430/0x760 [ 49.681438][ T3592] vfs_write+0x269/0xac0 [ 49.686357][ T3592] ksys_write+0x1e8/0x250 [ 49.690841][ T3592] do_syscall_64+0x35/0xb0 [ 49.695418][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.701466][ T3592] [ 49.703767][ T3592] -> (&new->fa_lock){....}-{2:2} { [ 49.708954][ T3592] INITIAL READ USE at: [ 49.713345][ T3592] lock_acquire+0x1ab/0x570 [ 49.720007][ T3592] _raw_read_lock_irqsave+0x70/0x90 [ 49.727359][ T3592] kill_fasync+0x136/0x470 [ 49.733930][ T3592] evdev_pass_values.part.0+0x64e/0x970 [ 49.741628][ T3592] evdev_events+0x359/0x3e0 [ 49.748280][ T3592] input_to_handler+0x2a0/0x4c0 [ 49.755284][ T3592] input_pass_values.part.0+0x230/0x710 [ 49.762987][ T3592] input_handle_event+0x373/0x1440 [ 49.770252][ T3592] input_inject_event+0x1bd/0x320 [ 49.777444][ T3592] evdev_write+0x430/0x760 [ 49.784013][ T3592] vfs_write+0x269/0xac0 [ 49.790431][ T3592] ksys_write+0x1e8/0x250 [ 49.796930][ T3592] do_syscall_64+0x35/0xb0 [ 49.803501][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.811814][ T3592] } [ 49.814392][ T3592] ... key at: [] __key.0+0x0/0x40 [ 49.821602][ T3592] ... acquired at: [ 49.825470][ T3592] _raw_read_lock_irqsave+0x70/0x90 [ 49.830831][ T3592] kill_fasync+0x136/0x470 [ 49.835411][ T3592] evdev_pass_values.part.0+0x64e/0x970 [ 49.841128][ T3592] evdev_events+0x359/0x3e0 [ 49.845827][ T3592] input_to_handler+0x2a0/0x4c0 [ 49.850841][ T3592] input_pass_values.part.0+0x230/0x710 [ 49.856549][ T3592] input_handle_event+0x373/0x1440 [ 49.861819][ T3592] input_inject_event+0x1bd/0x320 [ 49.867002][ T3592] evdev_write+0x430/0x760 [ 49.871573][ T3592] vfs_write+0x269/0xac0 [ 49.875974][ T3592] ksys_write+0x1e8/0x250 [ 49.880461][ T3592] do_syscall_64+0x35/0xb0 [ 49.885054][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.891118][ T3592] [ 49.893430][ T3592] -> (&f->f_owner.lock){....}-{2:2} { [ 49.898792][ T3592] INITIAL USE at: [ 49.902662][ T3592] lock_acquire+0x1ab/0x570 [ 49.908716][ T3592] _raw_write_lock_irq+0x32/0x50 [ 49.915202][ T3592] f_modown+0x2a/0x390 [ 49.920827][ T3592] f_setown+0xd7/0x230 [ 49.926451][ T3592] sock_ioctl+0x37e/0x640 [ 49.932382][ T3592] __x64_sys_ioctl+0x193/0x200 [ 49.938696][ T3592] do_syscall_64+0x35/0xb0 [ 49.944665][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 49.952123][ T3592] INITIAL READ USE at: [ 49.956439][ T3592] lock_acquire+0x1ab/0x570 [ 49.962930][ T3592] _raw_read_lock_irqsave+0x70/0x90 [ 49.970106][ T3592] send_sigio+0x24/0x380 [ 49.976333][ T3592] kill_fasync+0x1f8/0x470 [ 49.982751][ T3592] evdev_pass_values.part.0+0x64e/0x970 [ 49.990276][ T3592] evdev_events+0x359/0x3e0 [ 49.996757][ T3592] input_to_handler+0x2a0/0x4c0 [ 50.003590][ T3592] input_pass_values.part.0+0x230/0x710 [ 50.011120][ T3592] input_handle_event+0x373/0x1440 [ 50.018224][ T3592] input_inject_event+0x1bd/0x320 [ 50.025241][ T3592] evdev_write+0x430/0x760 [ 50.031653][ T3592] vfs_write+0x269/0xac0 [ 50.037917][ T3592] ksys_write+0x1e8/0x250 [ 50.044232][ T3592] do_syscall_64+0x35/0xb0 [ 50.050633][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 50.058510][ T3592] } [ 50.060990][ T3592] ... key at: [] __key.5+0x0/0x40 [ 50.068119][ T3592] ... acquired at: [ 50.071897][ T3592] _raw_read_lock_irqsave+0x70/0x90 [ 50.077250][ T3592] send_sigio+0x24/0x380 [ 50.081650][ T3592] kill_fasync+0x1f8/0x470 [ 50.086236][ T3592] evdev_pass_values.part.0+0x64e/0x970 [ 50.091995][ T3592] evdev_events+0x359/0x3e0 [ 50.096673][ T3592] input_to_handler+0x2a0/0x4c0 [ 50.101693][ T3592] input_pass_values.part.0+0x230/0x710 [ 50.107406][ T3592] input_handle_event+0x373/0x1440 [ 50.112693][ T3592] input_inject_event+0x1bd/0x320 [ 50.117945][ T3592] evdev_write+0x430/0x760 [ 50.122534][ T3592] vfs_write+0x269/0xac0 [ 50.126942][ T3592] ksys_write+0x1e8/0x250 [ 50.131432][ T3592] do_syscall_64+0x35/0xb0 [ 50.136012][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 50.142082][ T3592] [ 50.144395][ T3592] [ 50.144395][ T3592] the dependencies between the lock to be acquired [ 50.144402][ T3592] and HARDIRQ-irq-unsafe lock: [ 50.157876][ T3592] -> (tasklist_lock){.+.+}-{2:2} { [ 50.162977][ T3592] HARDIRQ-ON-R at: [ 50.166988][ T3592] lock_acquire+0x1ab/0x570 [ 50.173136][ T3592] _raw_read_lock+0x5b/0x70 [ 50.179272][ T3592] do_wait+0x284/0xce0 [ 50.184979][ T3592] kernel_wait+0x9c/0x150 [ 50.190951][ T3592] call_usermodehelper_exec_work+0xf5/0x180 [ 50.198475][ T3592] process_one_work+0x996/0x1610 [ 50.205060][ T3592] worker_thread+0x665/0x1080 [ 50.211380][ T3592] kthread+0x2e9/0x3a0 [ 50.217081][ T3592] ret_from_fork+0x1f/0x30 [ 50.223138][ T3592] SOFTIRQ-ON-R at: [ 50.227094][ T3592] lock_acquire+0x1ab/0x570 [ 50.233237][ T3592] _raw_read_lock+0x5b/0x70 [ 50.239374][ T3592] do_wait+0x284/0xce0 [ 50.245082][ T3592] kernel_wait+0x9c/0x150 [ 50.251054][ T3592] call_usermodehelper_exec_work+0xf5/0x180 [ 50.258592][ T3592] process_one_work+0x996/0x1610 [ 50.265170][ T3592] worker_thread+0x665/0x1080 [ 50.271481][ T3592] kthread+0x2e9/0x3a0 [ 50.277185][ T3592] ret_from_fork+0x1f/0x30 [ 50.283236][ T3592] INITIAL USE at: [ 50.287111][ T3592] lock_acquire+0x1ab/0x570 [ 50.293167][ T3592] _raw_write_lock_irq+0x32/0x50 [ 50.299654][ T3592] copy_process+0x4364/0x6fe0 [ 50.305877][ T3592] kernel_clone+0xe7/0xab0 [ 50.311836][ T3592] kernel_thread+0xb5/0xf0 [ 50.317799][ T3592] rest_init+0x23/0x3e0 [ 50.323513][ T3592] start_kernel+0x47f/0x4a0 [ 50.329559][ T3592] secondary_startup_64_no_verify+0xce/0xdb [ 50.336998][ T3592] INITIAL READ USE at: [ 50.341305][ T3592] lock_acquire+0x1ab/0x570 [ 50.347793][ T3592] _raw_read_lock+0x5b/0x70 [ 50.354275][ T3592] do_wait+0x284/0xce0 [ 50.360328][ T3592] kernel_wait+0x9c/0x150 [ 50.366641][ T3592] call_usermodehelper_exec_work+0xf5/0x180 [ 50.374510][ T3592] process_one_work+0x996/0x1610 [ 50.381426][ T3592] worker_thread+0x665/0x1080 [ 50.388082][ T3592] kthread+0x2e9/0x3a0 [ 50.394135][ T3592] ret_from_fork+0x1f/0x30 [ 50.400536][ T3592] } [ 50.403012][ T3592] ... key at: [] tasklist_lock+0x18/0x40 [ 50.410719][ T3592] ... acquired at: [ 50.414498][ T3592] lock_acquire+0x1ab/0x570 [ 50.419183][ T3592] _raw_read_lock+0x5b/0x70 [ 50.423846][ T3592] send_sigio+0xab/0x380 [ 50.428258][ T3592] kill_fasync+0x1f8/0x470 [ 50.432828][ T3592] sock_wake_async+0xd2/0x160 [ 50.437662][ T3592] sock_def_readable+0x349/0x4e0 [ 50.442756][ T3592] unix_dgram_sendmsg+0xf36/0x1a90 [ 50.448027][ T3592] sock_sendmsg+0xcf/0x120 [ 50.452602][ T3592] ____sys_sendmsg+0x32b/0x800 [ 50.457521][ T3592] ___sys_sendmsg+0xf3/0x170 [ 50.462270][ T3592] __sys_sendmmsg+0x195/0x470 [ 50.467107][ T3592] __x64_sys_sendmmsg+0x99/0x100 [ 50.472205][ T3592] do_syscall_64+0x35/0xb0 [ 50.476778][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 50.482827][ T3592] [ 50.485129][ T3592] [ 50.485129][ T3592] stack backtrace: [ 50.490993][ T3592] CPU: 1 PID: 3592 Comm: syz-executor101 Not tainted 5.18.0-rc3-next-20220420-syzkaller #0 [ 50.500946][ T3592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.510994][ T3592] Call Trace: [ 50.514254][ T3592] [ 50.517167][ T3592] dump_stack_lvl+0xcd/0x134 [ 50.521754][ T3592] check_irq_usage.cold+0x4c1/0x6b0 [ 50.526938][ T3592] ? print_shortest_lock_dependencies_backwards+0x80/0x80 [ 50.534039][ T3592] ? mark_lock.part.0+0xee/0x1910 [ 50.539056][ T3592] ? check_path.constprop.0+0x24/0x50 [ 50.544418][ T3592] ? lock_chain_count+0x20/0x20 [ 50.549254][ T3592] ? register_lock_class+0xbe/0x1130 [ 50.554528][ T3592] ? is_dynamic_key.part.0+0x130/0x130 [ 50.559970][ T3592] ? lock_chain_count+0x20/0x20 [ 50.564822][ T3592] ? register_lock_class+0xbe/0x1130 [ 50.570097][ T3592] __lock_acquire+0x2ad6/0x5660 [ 50.574939][ T3592] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 50.580908][ T3592] lock_acquire+0x1ab/0x570 [ 50.585400][ T3592] ? send_sigio+0xab/0x380 [ 50.589799][ T3592] ? lock_release+0x780/0x780 [ 50.594464][ T3592] ? lock_release+0x780/0x780 [ 50.599128][ T3592] ? lock_release+0x780/0x780 [ 50.603792][ T3592] _raw_read_lock+0x5b/0x70 [ 50.608295][ T3592] ? send_sigio+0xab/0x380 [ 50.612696][ T3592] send_sigio+0xab/0x380 [ 50.616922][ T3592] kill_fasync+0x1f8/0x470 [ 50.621321][ T3592] sock_wake_async+0xd2/0x160 [ 50.625986][ T3592] sock_def_readable+0x349/0x4e0 [ 50.630904][ T3592] unix_dgram_sendmsg+0xf36/0x1a90 [ 50.636007][ T3592] ? unix_stream_sendpage+0xcc0/0xcc0 [ 50.641365][ T3592] ? aa_af_perm+0x230/0x230 [ 50.645859][ T3592] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 50.652088][ T3592] ? unix_stream_sendpage+0xcc0/0xcc0 [ 50.657446][ T3592] sock_sendmsg+0xcf/0x120 [ 50.661849][ T3592] ____sys_sendmsg+0x32b/0x800 [ 50.666608][ T3592] ? kernel_sendmsg+0x50/0x50 [ 50.671264][ T3592] ? do_recvmmsg+0x6d0/0x6d0 [ 50.675842][ T3592] ___sys_sendmsg+0xf3/0x170 [ 50.680420][ T3592] ? sendmsg_copy_msghdr+0x160/0x160 [ 50.685690][ T3592] ? mark_lock.part.0+0xee/0x1910 [ 50.690701][ T3592] ? lock_chain_count+0x20/0x20 [ 50.695540][ T3592] ? lock_chain_count+0x20/0x20 [ 50.700381][ T3592] ? __lock_acquire+0x163e/0x5660 [ 50.705391][ T3592] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 50.711624][ T3592] ? __fget_light+0x20f/0x270 [ 50.716295][ T3592] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 50.723053][ T3592] __sys_sendmmsg+0x195/0x470 [ 50.727734][ T3592] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 50.732745][ T3592] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 50.741864][ T3592] ? __context_tracking_exit+0xb8/0xe0 [ 50.747302][ T3592] ? lock_downgrade+0x6e0/0x6e0 [ 50.752143][ T3592] ? lock_downgrade+0x6e0/0x6e0 [ 50.756984][ T3592] __x64_sys_sendmmsg+0x99/0x100 [ 50.761909][ T3592] ? syscall_enter_from_user_mode+0x21/0x70 [ 50.767868][ T3592] do_syscall_64+0x35/0xb0 [ 50.772270][ T3592] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 50.778155][ T3592] RIP: 0033:0x7efe0c421759 [ 50.782556][ T3592] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 50.802150][ T3592] RSP: 002b:00007fff2a0f9628 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 50.810553][ T3592] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe0c421759 [ 50.818594][ T3592] RDX: 0307017fdb7a66cb RSI: 0000000020002dc0 RDI: 0000000000000005 [ 50.826541][ T3592] RBP: 00007efe0c3e1070 R08: 0000000000000000 R09: 0000000000000000 [ 50.834503][ T3592] R10: 00000