============================================ WARNING: possible recursive locking detected 6.6.0-rc6-syzkaller-g78124b0c1d10 #0 Not tainted -------------------------------------------- syz-executor.5/9354 is trying to acquire lock: ffff0000c94ea488 (&data->mtx){+.+.}-{3:3}, at: rfkill_send_events+0x1e0/0x3c8 net/rfkill/core.c:286 but task is already holding lock: ffff0000d13df488 (&data->mtx){+.+.}-{3:3}, at: rfkill_fop_open+0x13c/0x778 net/rfkill/core.c:1183 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&data->mtx); lock(&data->mtx); *** DEADLOCK *** May be due to missing lock nesting notation 3 locks held by syz-executor.5/9354: #0: ffff80008f7e57c8 (misc_mtx){+.+.}-{3:3}, at: misc_open+0x6c/0x368 drivers/char/misc.c:129 #1: ffff800090dc4bc8 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_open+0x12c/0x778 net/rfkill/core.c:1182 #2: ffff0000d13df488 (&data->mtx){+.+.}-{3:3}, at: rfkill_fop_open+0x13c/0x778 net/rfkill/core.c:1183 stack backtrace: CPU: 0 PID: 9354 Comm: syz-executor.5 Not tainted 6.6.0-rc6-syzkaller-g78124b0c1d10 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 Call trace: dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233 show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106 dump_stack+0x1c/0x28 lib/dump_stack.c:113 print_deadlock_bug+0x4e4/0x660 kernel/locking/lockdep.c:3012 check_deadlock kernel/locking/lockdep.c:3062 [inline] validate_chain kernel/locking/lockdep.c:3855 [inline] __lock_acquire+0x5fd0/0x75e8 kernel/locking/lockdep.c:5136 lock_acquire+0x23c/0x71c kernel/locking/lockdep.c:5753 __mutex_lock_common+0x190/0x21a0 kernel/locking/mutex.c:603 __mutex_lock kernel/locking/mutex.c:747 [inline] mutex_lock_nested+0x2c/0x38 kernel/locking/mutex.c:799 rfkill_send_events+0x1e0/0x3c8 net/rfkill/core.c:286 rfkill_event net/rfkill/core.c:301 [inline] rfkill_set_block+0x310/0x37c net/rfkill/core.c:369 rfkill_sync net/rfkill/core.c:379 [inline] rfkill_fop_open+0x284/0x778 net/rfkill/core.c:1193 misc_open+0x2f0/0x368 drivers/char/misc.c:165 chrdev_open+0x3e8/0x4fc fs/char_dev.c:414 do_dentry_open+0x6fc/0x118c fs/open.c:929 vfs_open+0x7c/0x90 fs/open.c:1063 do_open fs/namei.c:3639 [inline] path_openat+0x1f2c/0x27f8 fs/namei.c:3796 do_filp_open+0x1bc/0x3cc fs/namei.c:3823 do_sys_openat2+0x124/0x1b8 fs/open.c:1422 do_sys_open fs/open.c:1437 [inline] __do_sys_openat fs/open.c:1453 [inline] __se_sys_openat fs/open.c:1448 [inline] __arm64_sys_openat+0x1f0/0x240 fs/open.c:1448 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595