===================================================== WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected 6.1.147-syzkaller #0 Not tainted ----------------------------------------------------- syz.6.1835/11445 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: ffffffff8c80a058 (tasklist_lock){.+.+}-{2:2}, at: send_sigurg+0xec/0x3c0 fs/fcntl.c:825 and this task is already holding: ffff88807d5b37b0 (&f->f_owner.lock){...-}-{2:2}, at: send_sigurg+0x25/0x3c0 fs/fcntl.c:809 which would create a new lock dependency: (&f->f_owner.lock){...-}-{2:2} -> (tasklist_lock){.+.+}-{2:2} but this new dependency connects a HARDIRQ-irq-safe lock: (&dev->event_lock#2){-...}-{2:2} ... which became HARDIRQ-irq-safe at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xa4/0xf0 kernel/locking/spinlock.c:162 input_event+0x76/0xb0 drivers/input/input.c:430 input_report_key include/linux/input.h:425 [inline] psmouse_report_standard_buttons drivers/input/mouse/psmouse-base.c:121 [inline] psmouse_report_standard_packet+0x4f/0x200 drivers/input/mouse/psmouse-base.c:139 psmouse_process_byte+0x42b/0x620 drivers/input/mouse/psmouse-base.c:230 psmouse_handle_byte+0x43/0x490 drivers/input/mouse/psmouse-base.c:272 psmouse_interrupt+0x699/0x1130 drivers/input/mouse/psmouse-base.c:424 serio_interrupt+0x87/0x130 drivers/input/serio/serio.c:998 i8042_interrupt+0x36b/0x720 drivers/input/serio/i8042.c:610 __handle_irq_event_percpu+0x298/0xa30 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x87/0x1e0 kernel/irq/handle.c:210 handle_edge_irq+0x243/0xb20 kernel/irq/chip.c:819 generic_handle_irq_desc include/linux/irqdesc.h:158 [inline] handle_irq arch/x86/kernel/irq.c:233 [inline] __common_interrupt+0xd7/0x1e0 arch/x86/kernel/irq.c:252 common_interrupt+0xb0/0xd0 arch/x86/kernel/irq.c:242 asm_common_interrupt+0x22/0x40 arch/x86/include/asm/idtentry.h:682 native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline] default_idle+0xb/0x10 arch/x86/kernel/process.c:741 default_idle_call+0x84/0xc0 kernel/sched/idle.c:109 cpuidle_idle_call kernel/sched/idle.c:191 [inline] do_idle+0x1fc/0x570 kernel/sched/idle.c:303 cpu_startup_entry+0x3f/0x60 kernel/sched/idle.c:401 start_secondary+0xe4/0xf0 arch/x86/kernel/smpboot.c:281 secondary_startup_64_no_verify+0xcf/0xdb to a HARDIRQ-irq-unsafe lock: (tasklist_lock){.+.+}-{2:2} ... which became HARDIRQ-irq-unsafe at: ... lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x32/0x40 kernel/locking/spinlock.c:228 do_wait+0x2b6/0xb60 kernel/exit.c:1605 kernel_wait+0xa8/0x160 kernel/exit.c:1795 call_usermodehelper_exec_sync kernel/umh.c:140 [inline] call_usermodehelper_exec_work+0xb5/0x220 kernel/umh.c:167 process_one_work+0x898/0x1160 kernel/workqueue.c:2292 worker_thread+0xaa2/0x1250 kernel/workqueue.c:2439 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 other info that might help us debug this: Chain exists of: &dev->event_lock#2 --> &f->f_owner.lock --> tasklist_lock Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(tasklist_lock); local_irq_disable(); lock(&dev->event_lock#2); lock(&f->f_owner.lock); lock(&dev->event_lock#2); *** DEADLOCK *** 2 locks held by syz.6.1835/11445: #0: ffff888074b39678 (&u->lock){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline] #0: ffff888074b39678 (&u->lock){+.+.}-{2:2}, at: queue_oob+0x1c7/0x4d0 net/unix/af_unix.c:2134 #1: ffff88807d5b37b0 (&f->f_owner.lock){...-}-{2:2}, at: send_sigurg+0x25/0x3c0 fs/fcntl.c:809 the dependencies between HARDIRQ-irq-safe lock and the holding lock: -> (&dev->event_lock#2){-...}-{2:2} { IN-HARDIRQ-W at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xa4/0xf0 kernel/locking/spinlock.c:162 input_event+0x76/0xb0 drivers/input/input.c:430 input_report_key include/linux/input.h:425 [inline] psmouse_report_standard_buttons drivers/input/mouse/psmouse-base.c:121 [inline] psmouse_report_standard_packet+0x4f/0x200 drivers/input/mouse/psmouse-base.c:139 psmouse_process_byte+0x42b/0x620 drivers/input/mouse/psmouse-base.c:230 psmouse_handle_byte+0x43/0x490 drivers/input/mouse/psmouse-base.c:272 psmouse_interrupt+0x699/0x1130 drivers/input/mouse/psmouse-base.c:424 serio_interrupt+0x87/0x130 drivers/input/serio/serio.c:998 i8042_interrupt+0x36b/0x720 drivers/input/serio/i8042.c:610 __handle_irq_event_percpu+0x298/0xa30 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x87/0x1e0 kernel/irq/handle.c:210 handle_edge_irq+0x243/0xb20 kernel/irq/chip.c:819 generic_handle_irq_desc include/linux/irqdesc.h:158 [inline] handle_irq arch/x86/kernel/irq.c:233 [inline] __common_interrupt+0xd7/0x1e0 arch/x86/kernel/irq.c:252 common_interrupt+0xb0/0xd0 arch/x86/kernel/irq.c:242 asm_common_interrupt+0x22/0x40 arch/x86/include/asm/idtentry.h:682 native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline] default_idle+0xb/0x10 arch/x86/kernel/process.c:741 default_idle_call+0x84/0xc0 kernel/sched/idle.c:109 cpuidle_idle_call kernel/sched/idle.c:191 [inline] do_idle+0x1fc/0x570 kernel/sched/idle.c:303 cpu_startup_entry+0x3f/0x60 kernel/sched/idle.c:401 start_secondary+0xe4/0xf0 arch/x86/kernel/smpboot.c:281 secondary_startup_64_no_verify+0xcf/0xdb INITIAL USE at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xa4/0xf0 kernel/locking/spinlock.c:162 input_inject_event+0xa7/0x310 drivers/input/input.c:456 led_trigger_event+0x12f/0x210 drivers/leds/led-triggers.c:392 kbd_led_trigger_activate+0xb9/0x100 drivers/tty/vt/keyboard.c:1036 led_trigger_set+0x504/0x900 drivers/leds/led-triggers.c:211 led_trigger_set_default+0x19c/0x1e0 drivers/leds/led-triggers.c:275 led_classdev_register_ext+0x5d3/0x7a0 drivers/leds/led-class.c:426 led_classdev_register include/linux/leds.h:196 [inline] input_leds_connect+0x4e7/0x6b0 drivers/input/input-leds.c:139 input_attach_handler drivers/input/input.c:1060 [inline] input_register_device+0xdfd/0x1310 drivers/input/input.c:2470 atkbd_connect+0x6e9/0x980 drivers/input/keyboard/atkbd.c:1322 serio_connect_driver drivers/input/serio/serio.c:44 [inline] serio_driver_probe+0x76/0x90 drivers/input/serio/serio.c:775 call_driver_probe drivers/base/dd.c:-1 [inline] really_probe+0x2aa/0xc70 drivers/base/dd.c:639 __driver_probe_device+0x18c/0x330 drivers/base/dd.c:785 driver_probe_device+0x4f/0x420 drivers/base/dd.c:815 __driver_attach+0x44a/0x6e0 drivers/base/dd.c:1201 bus_for_each_dev+0x175/0x1e0 drivers/base/bus.c:303 serio_attach_driver drivers/input/serio/serio.c:804 [inline] serio_handle_event+0x29c/0x840 drivers/input/serio/serio.c:224 process_one_work+0x898/0x1160 kernel/workqueue.c:2292 worker_thread+0xaa2/0x1250 kernel/workqueue.c:2439 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 } ... key at: [] input_allocate_device.__key.5+0x0/0x20 -> (&client->buffer_lock){....}-{2:2} { INITIAL USE at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:119 [inline] _raw_spin_lock_irq+0x9f/0xe0 kernel/locking/spinlock.c:170 spin_lock_irq include/linux/spinlock.h:376 [inline] evdev_fetch_next_event drivers/input/evdev.c:545 [inline] evdev_read+0x369/0xb40 drivers/input/evdev.c:586 vfs_read+0x2c0/0x920 fs/read_write.c:468 ksys_read+0x143/0x240 fs/read_write.c:613 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 } ... key at: [] evdev_open.__key.29+0x0/0x20 ... acquired at: __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] evdev_pass_values+0xcb/0xab0 drivers/input/evdev.c:261 evdev_events+0x1d4/0x320 drivers/input/evdev.c:306 input_to_handler drivers/input/input.c:127 [inline] input_pass_values+0x907/0x1300 drivers/input/input.c:159 input_event_dispose+0x346/0x6c0 drivers/input/input.c:374 input_inject_event+0x1f5/0x310 drivers/input/input.c:461 evdev_write+0x326/0x470 drivers/input/evdev.c:530 vfs_write+0x2c4/0x960 fs/read_write.c:582 ksys_write+0x143/0x240 fs/read_write.c:637 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 -> (&new->fa_lock){....}-{2:2} { INITIAL USE at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline] _raw_write_lock_irq+0x9f/0xe0 kernel/locking/spinlock.c:326 fasync_remove_entry+0xf0/0x1c0 fs/fcntl.c:865 snd_disconnect_release+0x1ea/0x2a0 sound/core/init.c:437 __fput+0x22c/0x920 fs/file_table.c:320 task_work_run+0x1ca/0x250 kernel/task_work.c:203 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0xe6/0x110 kernel/entry/common.c:177 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:292 [inline] syscall_exit_to_user_mode+0x16/0x40 kernel/entry/common.c:303 do_syscall_64+0x58/0xa0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 INITIAL READ USE at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline] _raw_read_lock_irqsave+0xac/0xf0 kernel/locking/spinlock.c:236 kill_fasync_rcu fs/fcntl.c:988 [inline] kill_fasync+0x18e/0x4b0 fs/fcntl.c:1009 snd_fasync_work_fn+0x15e/0x200 sound/core/misc.c:181 process_one_work+0x898/0x1160 kernel/workqueue.c:2292 worker_thread+0xaa2/0x1250 kernel/workqueue.c:2439 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 } ... key at: [] fasync_insert_entry.__key+0x0/0x20 ... acquired at: __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline] _raw_read_lock_irqsave+0xac/0xf0 kernel/locking/spinlock.c:236 kill_fasync_rcu fs/fcntl.c:988 [inline] kill_fasync+0x18e/0x4b0 fs/fcntl.c:1009 __pass_event drivers/input/evdev.c:240 [inline] evdev_pass_values+0x54b/0xab0 drivers/input/evdev.c:278 evdev_events+0x1d4/0x320 drivers/input/evdev.c:306 input_to_handler drivers/input/input.c:127 [inline] input_pass_values+0x907/0x1300 drivers/input/input.c:159 input_event_dispose+0x346/0x6c0 drivers/input/input.c:374 input_inject_event+0x1f5/0x310 drivers/input/input.c:461 evdev_write+0x326/0x470 drivers/input/evdev.c:530 vfs_write+0x2c4/0x960 fs/read_write.c:582 ksys_write+0x143/0x240 fs/read_write.c:637 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 -> (&f->f_owner.lock){...-}-{2:2} { IN-SOFTIRQ-R at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline] _raw_read_lock_irqsave+0xac/0xf0 kernel/locking/spinlock.c:236 send_sigurg+0x25/0x3c0 fs/fcntl.c:809 sk_send_sigurg+0x6b/0xc0 net/core/sock.c:3366 tcp_check_urg+0x200/0x750 net/ipv4/tcp_input.c:5715 tcp_urg+0x15d/0x3e0 net/ipv4/tcp_input.c:5756 tcp_rcv_established+0xde4/0x1d30 net/ipv4/tcp_input.c:6109 tcp_v4_do_rcv+0x48d/0xb00 net/ipv4/tcp_ipv4.c:1683 tcp_v4_rcv+0x2789/0x2e30 net/ipv4/tcp_ipv4.c:2114 ip_protocol_deliver_rcu+0x3ad/0x780 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x2c7/0x510 net/ipv4/ip_input.c:233 NF_HOOK+0x2ff/0x390 include/linux/netfilter.h:302 NF_HOOK+0x2ff/0x390 include/linux/netfilter.h:302 __netif_receive_skb_one_core net/core/dev.c:5569 [inline] __netif_receive_skb+0xcc/0x290 net/core/dev.c:5683 process_backlog+0x37c/0x6e0 net/core/dev.c:6011 __napi_poll+0xc0/0x460 net/core/dev.c:6578 napi_poll net/core/dev.c:6645 [inline] net_rx_action+0x5b1/0xad0 net/core/dev.c:6759 handle_softirqs+0x2a1/0x920 kernel/softirq.c:596 run_ksoftirqd+0x98/0xf0 kernel/softirq.c:963 smpboot_thread_fn+0x64a/0xa40 kernel/smpboot.c:164 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 INITIAL USE at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline] _raw_write_lock_irq+0x9f/0xe0 kernel/locking/spinlock.c:326 __f_setown+0x37/0x330 fs/fcntl.c:91 fcntl_dirnotify+0x6de/0x8f0 fs/notify/dnotify/dnotify.c:369 do_fcntl+0x587/0x11c0 fs/fcntl.c:398 __do_sys_fcntl fs/fcntl.c:446 [inline] __se_sys_fcntl+0xc9/0x190 fs/fcntl.c:431 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 INITIAL READ USE at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline] _raw_read_lock_irqsave+0xac/0xf0 kernel/locking/spinlock.c:236 send_sigio+0x2f/0x360 fs/fcntl.c:770 dnotify_handle_event+0x14f/0x420 fs/notify/dnotify/dnotify.c:115 fsnotify_handle_inode_event fs/notify/fsnotify.c:275 [inline] fsnotify_handle_event fs/notify/fsnotify.c:304 [inline] send_to_group fs/notify/fsnotify.c:378 [inline] fsnotify+0x165a/0x1cc0 fs/notify/fsnotify.c:584 __fsnotify_parent+0x5ae/0x6e0 fs/notify/fsnotify.c:241 fsnotify_parent include/linux/fsnotify.h:77 [inline] fsnotify_file include/linux/fsnotify.h:105 [inline] fsnotify_access include/linux/fsnotify.h:315 [inline] iterate_dir+0x40d/0x560 fs/readdir.c:69 ovl_dir_read+0xfc/0x560 fs/overlayfs/readdir.c:309 ovl_check_d_type_supported+0x95/0x100 fs/overlayfs/readdir.c:1059 ovl_make_workdir fs/overlayfs/super.c:1406 [inline] ovl_get_workdir+0x50e/0x1540 fs/overlayfs/super.c:1539 ovl_fill_super+0x1925/0x2ae0 fs/overlayfs/super.c:2095 mount_nodev+0x52/0xe0 fs/super.c:1489 legacy_get_tree+0xe6/0x180 fs/fs_context.c:632 vfs_get_tree+0x88/0x270 fs/super.c:1573 do_new_mount+0x24a/0xa40 fs/namespace.c:3063 do_mount fs/namespace.c:3406 [inline] __do_sys_mount fs/namespace.c:3614 [inline] __se_sys_mount+0x2d6/0x3c0 fs/namespace.c:3591 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 } ... key at: [] __alloc_file.__key+0x0/0x10 ... acquired at: __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline] _raw_read_lock_irqsave+0xac/0xf0 kernel/locking/spinlock.c:236 send_sigio+0x2f/0x360 fs/fcntl.c:770 kill_fasync_rcu fs/fcntl.c:995 [inline] kill_fasync+0x224/0x4b0 fs/fcntl.c:1009 snd_fasync_work_fn+0x15e/0x200 sound/core/misc.c:181 process_one_work+0x898/0x1160 kernel/workqueue.c:2292 worker_thread+0xaa2/0x1250 kernel/workqueue.c:2439 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 the dependencies between the lock to be acquired and HARDIRQ-irq-unsafe lock: -> (tasklist_lock){.+.+}-{2:2} { HARDIRQ-ON-R at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x32/0x40 kernel/locking/spinlock.c:228 do_wait+0x2b6/0xb60 kernel/exit.c:1605 kernel_wait+0xa8/0x160 kernel/exit.c:1795 call_usermodehelper_exec_sync kernel/umh.c:140 [inline] call_usermodehelper_exec_work+0xb5/0x220 kernel/umh.c:167 process_one_work+0x898/0x1160 kernel/workqueue.c:2292 worker_thread+0xaa2/0x1250 kernel/workqueue.c:2439 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 SOFTIRQ-ON-R at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x32/0x40 kernel/locking/spinlock.c:228 do_wait+0x2b6/0xb60 kernel/exit.c:1605 kernel_wait+0xa8/0x160 kernel/exit.c:1795 call_usermodehelper_exec_sync kernel/umh.c:140 [inline] call_usermodehelper_exec_work+0xb5/0x220 kernel/umh.c:167 process_one_work+0x898/0x1160 kernel/workqueue.c:2292 worker_thread+0xaa2/0x1250 kernel/workqueue.c:2439 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 INITIAL USE at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline] _raw_write_lock_irq+0x9f/0xe0 kernel/locking/spinlock.c:326 copy_process+0x2531/0x4020 kernel/fork.c:2476 kernel_clone+0x225/0x8b0 kernel/fork.c:2757 user_mode_thread+0xda/0x130 kernel/fork.c:2833 rest_init+0x23/0x300 init/main.c:698 start_kernel+0x0/0x539 init/main.c:893 start_kernel+0x490/0x539 init/main.c:1140 secondary_startup_64_no_verify+0xcf/0xdb INITIAL READ USE at: lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x32/0x40 kernel/locking/spinlock.c:228 do_wait+0x2b6/0xb60 kernel/exit.c:1605 kernel_wait+0xa8/0x160 kernel/exit.c:1795 call_usermodehelper_exec_sync kernel/umh.c:140 [inline] call_usermodehelper_exec_work+0xb5/0x220 kernel/umh.c:167 process_one_work+0x898/0x1160 kernel/workqueue.c:2292 worker_thread+0xaa2/0x1250 kernel/workqueue.c:2439 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 } ... key at: [] tasklist_lock+0x18/0x40 ... acquired at: __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x32/0x40 kernel/locking/spinlock.c:228 send_sigurg+0xec/0x3c0 fs/fcntl.c:825 sk_send_sigurg+0x6b/0xc0 net/core/sock.c:3366 queue_oob+0x3d3/0x4d0 net/unix/af_unix.c:2151 unix_stream_sendmsg+0x8c2/0xa60 net/unix/af_unix.c:2252 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg net/socket.c:730 [inline] ____sys_sendmsg+0x59b/0x970 net/socket.c:2519 ___sys_sendmsg+0x21c/0x290 net/socket.c:2573 __sys_sendmmsg+0x272/0x490 net/socket.c:2659 __do_sys_sendmmsg net/socket.c:2688 [inline] __se_sys_sendmmsg net/socket.c:2685 [inline] __x64_sys_sendmmsg+0x9c/0xb0 net/socket.c:2685 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 stack backtrace: CPU: 1 PID: 11445 Comm: syz.6.1835 Not tainted 6.1.147-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Call Trace: dump_stack_lvl+0x168/0x22e lib/dump_stack.c:106 print_bad_irq_dependency kernel/locking/lockdep.c:2604 [inline] check_irq_usage kernel/locking/lockdep.c:2843 [inline] check_prev_add kernel/locking/lockdep.c:3094 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain kernel/locking/lockdep.c:3825 [inline] __lock_acquire+0x660b/0x7c50 kernel/locking/lockdep.c:5049 lock_acquire+0x1b4/0x490 kernel/locking/lockdep.c:5662 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x32/0x40 kernel/locking/spinlock.c:228 send_sigurg+0xec/0x3c0 fs/fcntl.c:825 sk_send_sigurg+0x6b/0xc0 net/core/sock.c:3366 queue_oob+0x3d3/0x4d0 net/unix/af_unix.c:2151 unix_stream_sendmsg+0x8c2/0xa60 net/unix/af_unix.c:2252 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg net/socket.c:730 [inline] ____sys_sendmsg+0x59b/0x970 net/socket.c:2519 ___sys_sendmsg+0x21c/0x290 net/socket.c:2573 __sys_sendmmsg+0x272/0x490 net/socket.c:2659 __do_sys_sendmmsg net/socket.c:2688 [inline] __se_sys_sendmmsg net/socket.c:2685 [inline] __x64_sys_sendmmsg+0x9c/0xb0 net/socket.c:2685 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7fe2c118ebe9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fe2c2079038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007fe2c13b5fa0 RCX: 00007fe2c118ebe9 RDX: 0000000000000001 RSI: 0000200000006c40 RDI: 0000000000000003 RBP: 00007fe2c1211e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000040015 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fe2c13b6038 R14: 00007fe2c13b5fa0 R15: 00007ffd9b3a84c8