================================ WARNING: inconsistent lock state syzkaller #0 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. syz-executor415/7973 [HC0[0]:SC1[1]:HE1:SE0] takes: ffff8880248c4960 (slock-AF_PHONET/1){+.?.}-{3:3}, at: __sk_receive_skb+0x1bf/0x9e0 net/core/sock.c:563 {SOFTIRQ-ON-W} state was registered at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 _raw_spin_lock_nested+0x32/0x50 kernel/locking/spinlock.c:382 __sk_receive_skb+0x1bf/0x9e0 net/core/sock.c:563 sk_backlog_rcv include/net/sock.h:1190 [inline] __release_sock+0x193/0x280 net/core/sock.c:3216 release_sock+0x16e/0x210 net/core/sock.c:3815 pep_sock_accept+0x41c/0x1080 net/phonet/pep.c:879 pn_socket_accept+0xc9/0x2e0 net/phonet/socket.c:303 do_accept+0x521/0x760 net/socket.c:2047 __sys_accept4_file net/socket.c:2081 [inline] __sys_accept4+0x139/0x230 net/socket.c:2103 __do_sys_accept4 net/socket.c:2110 [inline] __se_sys_accept4 net/socket.c:2107 [inline] __x64_sys_accept4+0x9a/0xb0 net/socket.c:2107 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x10a/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x76/0x7e irq event stamp: 790 hardirqs last enabled at (790): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:187 [inline] hardirqs last enabled at (790): [] _raw_spin_unlock_irq+0x23/0x50 kernel/locking/spinlock.c:206 hardirqs last disabled at (789): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:140 [inline] hardirqs last disabled at (789): [] _raw_spin_lock_irq+0x17/0x50 kernel/locking/spinlock.c:174 softirqs last enabled at (784): [] local_bh_enable include/linux/bottom_half.h:33 [inline] softirqs last enabled at (784): [] netif_rx+0x79/0x90 net/core/dev.c:5775 softirqs last disabled at (785): [] do_softirq+0x76/0xd0 kernel/softirq.c:523 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(slock-AF_PHONET/1); lock(slock-AF_PHONET/1); *** DEADLOCK *** 5 locks held by syz-executor415/7973: #0: ffff8880754fa040 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: inode_lock include/linux/fs.h:1029 [inline] #0: ffff8880754fa040 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: __sock_release net/socket.c:721 [inline] #0: ffff8880754fa040 (&sb->s_type->i_mutex_key#13){+.+.}-{4:4}, at: sock_close+0x9b/0x240 net/socket.c:1514 #1: ffff88805a8df0d8 (sk_lock-AF_PHONET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1713 [inline] #1: ffff88805a8df0d8 (sk_lock-AF_PHONET){+.+.}-{0:0}, at: pep_sock_close+0x86/0x630 net/phonet/pep.c:742 #2: ffffffff8e140b40 (rcu_read_lock){....}-{1:3}, at: local_lock_acquire include/linux/local_lock_internal.h:46 [inline] #2: ffffffff8e140b40 (rcu_read_lock){....}-{1:3}, at: process_backlog+0x245/0x1330 net/core/dev.c:6669 #3: ffff88805a8df6e0 (slock-AF_PHONET){+.-.}-{3:3}, at: spin_lock include/linux/spinlock.h:342 [inline] #3: ffff88805a8df6e0 (slock-AF_PHONET){+.-.}-{3:3}, at: __sk_receive_skb+0x1f1/0x9e0 net/core/sock.c:565 #4: ffff88805a8df758 (sk_lock-AF_PHONET){+.+.}-{0:0}, at: sk_receive_skb include/net/sock.h:2022 [inline] #4: ffff88805a8df758 (sk_lock-AF_PHONET){+.+.}-{0:0}, at: phonet_rcv+0x7cd/0xcb0 net/phonet/af_phonet.c:408 stack backtrace: CPU: 1 UID: 0 PID: 7973 Comm: syz-executor415 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_usage_bug+0x28d/0x2e0 kernel/locking/lockdep.c:4042 valid_state kernel/locking/lockdep.c:4056 [inline] mark_lock_irq+0x402/0x410 kernel/locking/lockdep.c:-1 mark_lock+0x123/0x1a0 kernel/locking/lockdep.c:4753 mark_usage kernel/locking/lockdep.c:-1 [inline] __lock_acquire+0x690/0x2d80 kernel/locking/lockdep.c:5191 lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 _raw_spin_lock_nested+0x32/0x50 kernel/locking/spinlock.c:382 __sk_receive_skb+0x1bf/0x9e0 net/core/sock.c:563 sk_backlog_rcv include/net/sock.h:1190 [inline] __sk_receive_skb+0x960/0x9e0 net/core/sock.c:572 sk_receive_skb include/net/sock.h:2022 [inline] phonet_rcv+0x7cd/0xcb0 net/phonet/af_phonet.c:408 __netif_receive_skb_one_core net/core/dev.c:6209 [inline] __netif_receive_skb+0x164/0x370 net/core/dev.c:6322 process_backlog+0x54c/0x1330 net/core/dev.c:6673 __napi_poll+0xae/0x320 net/core/dev.c:7737 napi_poll net/core/dev.c:7800 [inline] net_rx_action+0x622/0xce0 net/core/dev.c:7957 handle_softirqs+0x22a/0x830 kernel/softirq.c:622 do_softirq+0x76/0xd0 kernel/softirq.c:523 __local_bh_enable_ip+0xf6/0x130 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] netif_rx+0x83/0x90 net/core/dev.c:5775 pn_send+0x561/0x800 net/phonet/af_phonet.c:188 pn_skb_send+0x218/0x500 net/phonet/af_phonet.c:275 pep_sock_close+0x11c/0x630 net/phonet/pep.c:748 pn_socket_release+0x9b/0xc0 net/phonet/socket.c:34 __sock_release net/socket.c:722 [inline] sock_close+0xc3/0x240 net/socket.c:1514 __fput+0x44f/0xa60 fs/file_table.c:510 fput_close_sync+0x11f/0x240 fs/file_table.c:615 __do_sys_close fs/open.c:1507 [inline] __se_sys_close fs/open.c:1492 [inline] __x64_sys_close+0x7e/0x110 fs/open.c:1492 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x10a/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f56db34680e Code: 08 0f 85 65 e1 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 90 41 57 41 56 4d 89 c6 41 55 4d 89 cd 41 54 55 53 48 83 ec 08 RSP: 002b:00007ffe9457e6b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 RAX: ffffffffffffffda RBX: 00005555778d6400 RCX: 00007f56db34680e RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000071ce4 R13: 0000000000071d16 R14: 00007f56db3e0b5c R15: 00007f56db3e0b40