===================================================== WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected 6.12.0-rc2-syzkaller-00058-g75b607fab38d #0 Not tainted ----------------------------------------------------- syz.4.3453/22377 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: ffff8880253d0ba0 (&f_owner->lock){....}-{2:2}, at: send_sigio+0x37/0x390 fs/fcntl.c:910 and this task is already holding: ffff88802577c360 (&new->fa_lock){....}-{2:2}, at: kill_fasync_rcu fs/fcntl.c:1127 [inline] ffff88802577c360 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x199/0x4f0 fs/fcntl.c:1151 which would create a new lock dependency: (&new->fa_lock){....}-{2:2} -> (&f_owner->lock){....}-{2:2} but this new dependency connects a SOFTIRQ-irq-safe lock: (&dev->event_lock#2){..-.}-{2:2} ... which became SOFTIRQ-irq-safe at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162 input_inject_event+0xc5/0x340 drivers/input/input.c:423 led_trigger_event+0x138/0x210 drivers/leds/led-triggers.c:407 kbd_propagate_led_state drivers/tty/vt/keyboard.c:1080 [inline] kbd_bh+0x1b5/0x290 drivers/tty/vt/keyboard.c:1269 tasklet_action_common+0x321/0x4d0 kernel/softirq.c:784 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_call_function_single arch/x86/kernel/smp.c:266 [inline] sysvec_call_function_single+0xa3/0xc0 arch/x86/kernel/smp.c:266 asm_sysvec_call_function_single+0x1a/0x20 arch/x86/include/asm/idtentry.h:709 __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:160 [inline] _raw_spin_unlock_irq+0x29/0x50 kernel/locking/spinlock.c:202 n_tty_ioctl_helper+0x2a1/0x360 tty_ioctl+0x998/0xdc0 drivers/tty/tty_io.c:2812 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f to a SOFTIRQ-irq-unsafe lock: (tasklist_lock){.+.+}-{2:2} ... which became SOFTIRQ-irq-unsafe at: ... lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 __do_wait+0x12d/0x850 kernel/exit.c:1648 do_wait+0x1e9/0x560 kernel/exit.c:1692 kernel_wait+0xe9/0x240 kernel/exit.c:1868 call_usermodehelper_exec_sync kernel/umh.c:137 [inline] call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 other info that might help us debug this: Chain exists of: &dev->event_lock#2 --> &new->fa_lock --> tasklist_lock Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(tasklist_lock); local_irq_disable(); lock(&dev->event_lock#2); lock(&new->fa_lock); lock(&dev->event_lock#2); *** DEADLOCK *** 4 locks held by syz.4.3453/22377: #0: ffff888063ad1d58 (sk_lock-AF_INET6){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1609 [inline] #0: ffff888063ad1d58 (sk_lock-AF_INET6){+.+.}-{0:0}, at: tcp_sendmsg+0x22/0x50 net/ipv4/tcp.c:1356 #1: ffffffff8e937de0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline] #1: ffffffff8e937de0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline] #1: ffffffff8e937de0 (rcu_read_lock){....}-{1:2}, at: sock_def_readable+0xd7/0x5b0 net/core/sock.c:3439 #2: ffffffff8e937de0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline] #2: ffffffff8e937de0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline] #2: ffffffff8e937de0 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x54/0x4f0 fs/fcntl.c:1150 #3: ffff88802577c360 (&new->fa_lock){....}-{2:2}, at: kill_fasync_rcu fs/fcntl.c:1127 [inline] #3: ffff88802577c360 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x199/0x4f0 fs/fcntl.c:1151 the dependencies between SOFTIRQ-irq-safe lock and the holding lock: -> (&dev->event_lock#2){..-.}-{2:2} { IN-SOFTIRQ-W at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162 input_inject_event+0xc5/0x340 drivers/input/input.c:423 led_trigger_event+0x138/0x210 drivers/leds/led-triggers.c:407 kbd_propagate_led_state drivers/tty/vt/keyboard.c:1080 [inline] kbd_bh+0x1b5/0x290 drivers/tty/vt/keyboard.c:1269 tasklet_action_common+0x321/0x4d0 kernel/softirq.c:784 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_call_function_single arch/x86/kernel/smp.c:266 [inline] sysvec_call_function_single+0xa3/0xc0 arch/x86/kernel/smp.c:266 asm_sysvec_call_function_single+0x1a/0x20 arch/x86/include/asm/idtentry.h:709 __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:160 [inline] _raw_spin_unlock_irq+0x29/0x50 kernel/locking/spinlock.c:202 n_tty_ioctl_helper+0x2a1/0x360 tty_ioctl+0x998/0xdc0 drivers/tty/tty_io.c:2812 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:907 [inline] __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f INITIAL USE at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162 input_inject_event+0xc5/0x340 drivers/input/input.c:423 kbd_led_trigger_activate+0xb8/0x100 drivers/tty/vt/keyboard.c:1036 led_trigger_set+0x582/0x9c0 drivers/leds/led-triggers.c:212 led_match_default_trigger drivers/leds/led-triggers.c:269 [inline] led_trigger_set_default+0x229/0x260 drivers/leds/led-triggers.c:287 led_classdev_register_ext+0x6e6/0x8a0 drivers/leds/led-class.c:555 led_classdev_register include/linux/leds.h:273 [inline] input_leds_connect+0x489/0x630 drivers/input/input-leds.c:145 input_attach_handler drivers/input/input.c:1027 [inline] input_register_device+0xd3b/0x1110 drivers/input/input.c:2470 atkbd_connect+0x752/0xa00 drivers/input/keyboard/atkbd.c:1340 serio_connect_driver drivers/input/serio/serio.c:44 [inline] serio_driver_probe+0x7f/0xa0 drivers/input/serio/serio.c:775 really_probe+0x2b8/0xad0 drivers/base/dd.c:658 __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:800 driver_probe_device+0x50/0x430 drivers/base/dd.c:830 __driver_attach+0x45f/0x710 drivers/base/dd.c:1216 bus_for_each_dev+0x239/0x2b0 drivers/base/bus.c:370 serio_attach_driver drivers/input/serio/serio.c:804 [inline] serio_handle_event+0x1c7/0x920 drivers/input/serio/serio.c:224 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 } ... key at: [] input_allocate_device.__key.5+0x0/0x20 -> (&client->buffer_lock){....}-{2:2} { INITIAL USE at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] evdev_pass_values+0xf2/0xad0 drivers/input/evdev.c:261 evdev_events+0x1c2/0x300 drivers/input/evdev.c:306 input_pass_values+0x286/0x860 drivers/input/input.c:126 input_event_dispose+0x30f/0x600 drivers/input/input.c:341 input_handle_event+0xa71/0xbe0 drivers/input/input.c:369 input_inject_event+0x22f/0x340 drivers/input/input.c:428 evdev_write+0x5fd/0x790 drivers/input/evdev.c:528 vfs_write+0x29c/0xc90 fs/read_write.c:681 ksys_write+0x183/0x2b0 fs/read_write.c:736 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f } ... key at: [] evdev_open.__key.24+0x0/0x20 ... acquired at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] evdev_pass_values+0xf2/0xad0 drivers/input/evdev.c:261 evdev_events+0x1c2/0x300 drivers/input/evdev.c:306 input_pass_values+0x286/0x860 drivers/input/input.c:126 input_event_dispose+0x30f/0x600 drivers/input/input.c:341 input_handle_event+0xa71/0xbe0 drivers/input/input.c:369 input_inject_event+0x22f/0x340 drivers/input/input.c:428 evdev_write+0x5fd/0x790 drivers/input/evdev.c:528 vfs_write+0x29c/0xc90 fs/read_write.c:681 ksys_write+0x183/0x2b0 fs/read_write.c:736 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> (&new->fa_lock){....}-{2:2} { INITIAL USE at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline] _raw_write_lock_irq+0xd3/0x120 kernel/locking/spinlock.c:326 fasync_remove_entry+0xff/0x1d0 fs/fcntl.c:1004 sock_fasync+0x87/0x100 net/socket.c:1451 __fput+0x71b/0x880 fs/file_table.c:428 task_work_run+0x24f/0x310 kernel/task_work.c:228 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x168/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f INITIAL READ USE at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline] _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236 kill_fasync_rcu fs/fcntl.c:1127 [inline] kill_fasync+0x199/0x4f0 fs/fcntl.c:1151 sock_wake_async+0x147/0x170 sk_wake_async_rcu include/net/sock.h:2450 [inline] af_alg_wmem_wakeup+0x3c1/0x440 crypto/af_alg.c:851 aead_recvmsg+0x1951/0x19f0 crypto/algif_aead.c:353 sock_recvmsg_nosec net/socket.c:1051 [inline] sock_recvmsg+0x22f/0x280 net/socket.c:1073 ____sys_recvmsg+0x1c6/0x480 net/socket.c:2821 ___sys_recvmsg net/socket.c:2863 [inline] __sys_recvmsg+0x2e6/0x3d0 net/socket.c:2893 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f } ... key at: [] fasync_insert_entry.__key+0x0/0x20 ... acquired at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline] _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236 kill_fasync_rcu fs/fcntl.c:1127 [inline] kill_fasync+0x199/0x4f0 fs/fcntl.c:1151 __pass_event drivers/input/evdev.c:240 [inline] evdev_pass_values+0x58a/0xad0 drivers/input/evdev.c:278 evdev_events+0x1c2/0x300 drivers/input/evdev.c:306 input_pass_values+0x286/0x860 drivers/input/input.c:126 input_event_dispose+0x30f/0x600 drivers/input/input.c:341 input_handle_event+0xa71/0xbe0 drivers/input/input.c:369 input_inject_event+0x22f/0x340 drivers/input/input.c:428 evdev_write+0x5fd/0x790 drivers/input/evdev.c:528 vfs_write+0x29c/0xc90 fs/read_write.c:681 ksys_write+0x183/0x2b0 fs/read_write.c:736 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f the dependencies between the lock to be acquired and SOFTIRQ-irq-unsafe lock: -> (tasklist_lock){.+.+}-{2:2} { HARDIRQ-ON-R at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 __do_wait+0x12d/0x850 kernel/exit.c:1648 do_wait+0x1e9/0x560 kernel/exit.c:1692 kernel_wait+0xe9/0x240 kernel/exit.c:1868 call_usermodehelper_exec_sync kernel/umh.c:137 [inline] call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 SOFTIRQ-ON-R at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 __do_wait+0x12d/0x850 kernel/exit.c:1648 do_wait+0x1e9/0x560 kernel/exit.c:1692 kernel_wait+0xe9/0x240 kernel/exit.c:1868 call_usermodehelper_exec_sync kernel/umh.c:137 [inline] call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 INITIAL USE at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline] _raw_write_lock_irq+0xd3/0x120 kernel/locking/spinlock.c:326 copy_process+0x2267/0x3d50 kernel/fork.c:2500 kernel_clone+0x223/0x880 kernel/fork.c:2784 user_mode_thread+0x132/0x1a0 kernel/fork.c:2862 rest_init+0x23/0x300 init/main.c:712 start_kernel+0x47f/0x500 init/main.c:1105 x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:507 x86_64_start_kernel+0x9f/0xa0 arch/x86/kernel/head64.c:488 common_startup_64+0x13e/0x147 INITIAL READ USE at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 __do_wait+0x12d/0x850 kernel/exit.c:1648 do_wait+0x1e9/0x560 kernel/exit.c:1692 kernel_wait+0xe9/0x240 kernel/exit.c:1868 call_usermodehelper_exec_sync kernel/umh.c:137 [inline] call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa63/0x1850 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 } ... key at: [] tasklist_lock+0x18/0x40 ... acquired at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 send_sigurg+0x144/0x430 fs/fcntl.c:970 sk_send_sigurg+0x6e/0x2f0 net/core/sock.c:3500 tcp_check_urg+0x207/0x740 net/ipv4/tcp_input.c:5838 tcp_urg+0x15c/0x450 net/ipv4/tcp_input.c:5879 tcp_rcv_established+0xfaf/0x2020 net/ipv4/tcp_input.c:6234 tcp_v6_do_rcv+0x5c8/0x13a0 net/ipv6/tcp_ipv6.c:1641 sk_backlog_rcv include/net/sock.h:1113 [inline] __release_sock+0x1c8/0x350 net/core/sock.c:3072 release_sock+0x61/0x1f0 net/core/sock.c:3626 tcp_sendmsg+0x3a/0x50 net/ipv4/tcp.c:1358 sock_sendmsg_nosec net/socket.c:729 [inline] __sock_sendmsg+0xef/0x270 net/socket.c:744 __sys_sendto+0x39b/0x4f0 net/socket.c:2209 __do_sys_sendto net/socket.c:2221 [inline] __se_sys_sendto net/socket.c:2217 [inline] __x64_sys_sendto+0xde/0x100 net/socket.c:2217 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> (&f_owner->lock){....}-{2:2} { INITIAL USE at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline] _raw_write_lock_irq+0xd3/0x120 kernel/locking/spinlock.c:326 __f_setown+0x6b/0x380 fs/fcntl.c:137 f_setown+0x243/0x310 fs/fcntl.c:184 do_fcntl+0x115/0x1a60 fs/fcntl.c:510 __do_sys_fcntl fs/fcntl.c:586 [inline] __se_sys_fcntl+0xd2/0x1e0 fs/fcntl.c:571 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f INITIAL READ USE at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock_irq include/linux/rwlock_api_smp.h:169 [inline] _raw_read_lock_irq+0xda/0x120 kernel/locking/spinlock.c:244 f_getown_ex fs/fcntl.c:271 [inline] do_fcntl+0x85f/0x1a60 fs/fcntl.c:513 __do_sys_fcntl fs/fcntl.c:586 [inline] __se_sys_fcntl+0xd2/0x1e0 fs/fcntl.c:571 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f } ... key at: [] file_f_owner_allocate.__key+0x0/0x20 ... acquired at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline] _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236 send_sigio+0x37/0x390 fs/fcntl.c:910 kill_fasync_rcu fs/fcntl.c:1136 [inline] kill_fasync+0x256/0x4f0 fs/fcntl.c:1151 sock_wake_async+0x147/0x170 sk_wake_async_rcu include/net/sock.h:2450 [inline] sock_def_readable+0x3df/0x5b0 net/core/sock.c:3444 tcp_urg+0x2fa/0x450 net/ipv4/tcp_input.c:5893 tcp_rcv_established+0xfaf/0x2020 net/ipv4/tcp_input.c:6234 tcp_v6_do_rcv+0x5c8/0x13a0 net/ipv6/tcp_ipv6.c:1641 sk_backlog_rcv include/net/sock.h:1113 [inline] __release_sock+0x1c8/0x350 net/core/sock.c:3072 release_sock+0x61/0x1f0 net/core/sock.c:3626 tcp_sendmsg+0x3a/0x50 net/ipv4/tcp.c:1358 sock_sendmsg_nosec net/socket.c:729 [inline] __sock_sendmsg+0xef/0x270 net/socket.c:744 __sys_sendto+0x39b/0x4f0 net/socket.c:2209 __do_sys_sendto net/socket.c:2221 [inline] __se_sys_sendto net/socket.c:2217 [inline] __x64_sys_sendto+0xde/0x100 net/socket.c:2217 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f stack backtrace: CPU: 0 UID: 0 PID: 22377 Comm: syz.4.3453 Not tainted 6.12.0-rc2-syzkaller-00058-g75b607fab38d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_bad_irq_dependency kernel/locking/lockdep.c:2647 [inline] check_irq_usage kernel/locking/lockdep.c:2888 [inline] check_prev_add kernel/locking/lockdep.c:3165 [inline] check_prevs_add kernel/locking/lockdep.c:3280 [inline] validate_chain+0x4ebd/0x5920 kernel/locking/lockdep.c:3904 __lock_acquire+0x1384/0x2050 kernel/locking/lockdep.c:5202 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline] _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236 send_sigio+0x37/0x390 fs/fcntl.c:910 kill_fasync_rcu fs/fcntl.c:1136 [inline] kill_fasync+0x256/0x4f0 fs/fcntl.c:1151 sock_wake_async+0x147/0x170 sk_wake_async_rcu include/net/sock.h:2450 [inline] sock_def_readable+0x3df/0x5b0 net/core/sock.c:3444 tcp_urg+0x2fa/0x450 net/ipv4/tcp_input.c:5893 tcp_rcv_established+0xfaf/0x2020 net/ipv4/tcp_input.c:6234 tcp_v6_do_rcv+0x5c8/0x13a0 net/ipv6/tcp_ipv6.c:1641 sk_backlog_rcv include/net/sock.h:1113 [inline] __release_sock+0x1c8/0x350 net/core/sock.c:3072 release_sock+0x61/0x1f0 net/core/sock.c:3626 tcp_sendmsg+0x3a/0x50 net/ipv4/tcp.c:1358 sock_sendmsg_nosec net/socket.c:729 [inline] __sock_sendmsg+0xef/0x270 net/socket.c:744 __sys_sendto+0x39b/0x4f0 net/socket.c:2209 __do_sys_sendto net/socket.c:2221 [inline] __se_sys_sendto net/socket.c:2217 [inline] __x64_sys_sendto+0xde/0x100 net/socket.c:2217 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f6daa37dff9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f6dab1c4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f6daa536058 RCX: 00007f6daa37dff9 RDX: 00000000000000b4 RSI: 0000000020000080 RDI: 0000000000000003 RBP: 00007f6daa3f0296 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f6daa536058 R15: 00007ffd8768d178