========================================================
WARNING: possible irq lock inversion dependency detected
6.16.0-syzkaller-11895-gcca7a0aae895-dirty #0 Not tainted
--------------------------------------------------------
swapper/1/0 just changed the state of lock:
ffff88811c555230 (&dev->event_lock#2){..-.}-{3:3}, at: input_event+0x76/0xe0
but this lock took another, SOFTIRQ-READ-unsafe lock in the past:
 (tasklist_lock){.+.+}-{3:3}


and interrupts could create inverse lock ordering between them.


other info that might help us debug this:
Chain exists of:
  &dev->event_lock#2 --> &client->buffer_lock --> tasklist_lock

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(tasklist_lock);
                               local_irq_disable();
                               lock(&dev->event_lock#2);
                               lock(&client->buffer_lock);
  <Interrupt>
    lock(&dev->event_lock#2);

 *** DEADLOCK ***

no locks held by swapper/1/0.

the shortest dependencies between 2nd lock and 1st lock:
    -> (tasklist_lock){.+.+}-{3:3} {
       HARDIRQ-ON-R at:
                            lock_acquire+0x120/0x360
                            _raw_read_lock+0x36/0x50
                            __do_wait+0xde/0x740
                            do_wait+0x1f8/0x520
                            kernel_wait+0xab/0x170
                            call_usermodehelper_exec_work+0xbe/0x230
                            process_scheduled_works+0xae1/0x17b0
                            worker_thread+0x8a0/0xda0
                            kthread+0x711/0x8a0
                            ret_from_fork+0x3fc/0x770
                            ret_from_fork_asm+0x1a/0x30
       SOFTIRQ-ON-R at:
                            lock_acquire+0x120/0x360
                            _raw_read_lock+0x36/0x50
                            __do_wait+0xde/0x740
                            do_wait+0x1f8/0x520
                            kernel_wait+0xab/0x170
                            call_usermodehelper_exec_work+0xbe/0x230
                            process_scheduled_works+0xae1/0x17b0
                            worker_thread+0x8a0/0xda0
                            kthread+0x711/0x8a0
                            ret_from_fork+0x3fc/0x770
                            ret_from_fork_asm+0x1a/0x30
       INITIAL USE at:
                           lock_acquire+0x120/0x360
                           _raw_write_lock_irq+0xa2/0xf0
                           copy_process+0x224f/0x3c00
                           kernel_clone+0x21e/0x840
                           user_mode_thread+0xdd/0x140
                           rest_init+0x23/0x300
                           start_kernel+0x3a9/0x410
                           x86_64_start_reservations+0x24/0x30
                           x86_64_start_kernel+0x143/0x1c0
                           common_startup_64+0x13e/0x147
       INITIAL READ USE at:
                                lock_acquire+0x120/0x360
                                _raw_read_lock+0x36/0x50
                                __do_wait+0xde/0x740
                                do_wait+0x1f8/0x520
                                kernel_wait+0xab/0x170
                                call_usermodehelper_exec_work+0xbe/0x230
                                process_scheduled_works+0xae1/0x17b0
                                worker_thread+0x8a0/0xda0
                                kthread+0x711/0x8a0
                                ret_from_fork+0x3fc/0x770
                                ret_from_fork_asm+0x1a/0x30
     }
     ... key      at: [<ffffffff8de0c058>] tasklist_lock+0x18/0x40
     ... acquired at:
   lock_acquire+0x120/0x360
   _raw_read_lock+0x36/0x50
   send_sigurg+0x12b/0x420
   sk_send_sigurg+0x6c/0x2e0
   queue_oob+0x420/0x4f0
   unix_stream_sendmsg+0xc3f/0xdf0
   __sock_sendmsg+0x21c/0x270
   ____sys_sendmsg+0x52d/0x830
   ___sys_sendmsg+0x21f/0x2a0
   __sys_sendmmsg+0x227/0x430
   __x64_sys_sendmmsg+0xa0/0xc0
   do_syscall_64+0xfa/0x3b0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

   -> (&f_owner->lock){....}-{3:3} {
      INITIAL USE at:
                         lock_acquire+0x120/0x360
                         _raw_write_lock_irq+0xa2/0xf0
                         __f_setown+0x67/0x370
                         do_fcntl+0x15ff/0x1910
                         __se_sys_fcntl+0xc8/0x150
                         do_syscall_64+0xfa/0x3b0
                         entry_SYSCALL_64_after_hwframe+0x77/0x7f
      INITIAL READ USE at:
                              lock_acquire+0x120/0x360
                              _raw_read_lock_irqsave+0xaf/0x100
                              send_sigurg+0x55/0x420
                              sk_send_sigurg+0x6c/0x2e0
                              tcp_check_urg+0x200/0x760
                              tcp_urg+0x164/0x3f0
                              tcp_rcv_established+0xf93/0x1eb0
                              tcp_v4_do_rcv+0xa23/0xce0
                              __release_sock+0x21c/0x350
                              release_sock+0x5f/0x1f0
                              tcp_sendmsg+0x39/0x50
                              __sock_sendmsg+0xe5/0x270
                              ____sys_sendmsg+0x505/0x830
                              ___sys_sendmsg+0x21f/0x2a0
                              __x64_sys_sendmsg+0x19b/0x260
                              do_syscall_64+0xfa/0x3b0
                              entry_SYSCALL_64_after_hwframe+0x77/0x7f
    }
    ... key      at: [<ffffffff99b22f60>] file_f_owner_allocate.__key+0x0/0x20
    ... acquired at:
   lock_acquire+0x120/0x360
   _raw_read_lock_irqsave+0xaf/0x100
   send_sigio+0x38/0x370
   kill_fasync+0x24d/0x4d0
   lease_break_callback+0x26/0x30
   __break_lease+0x6a5/0x1620
   do_dentry_open+0x8b7/0x13f0
   vfs_open+0x3b/0x340
   path_openat+0x2ee5/0x3830
   do_filp_open+0x1fa/0x410
   do_open_execat+0x135/0x560
   alloc_bprm+0x28/0x5c0
   do_execveat_common+0x1b3/0x6a0
   __x64_sys_execve+0x94/0xb0
   do_syscall_64+0xfa/0x3b0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  -> (&new->fa_lock){....}-{3:3} {
     INITIAL USE at:
                       lock_acquire+0x120/0x360
                       _raw_write_lock_irq+0xa2/0xf0
                       fasync_remove_entry+0xf1/0x1c0
                       sock_fasync+0x85/0xf0
                       __fput+0x8a2/0xa70
                       task_work_run+0x1d4/0x260
                       exit_to_user_mode_loop+0xec/0x110
                       do_syscall_64+0x2bd/0x3b0
                       entry_SYSCALL_64_after_hwframe+0x77/0x7f
     INITIAL READ USE at:
                            lock_acquire+0x120/0x360
                            _raw_read_lock_irqsave+0xaf/0x100
                            kill_fasync+0x199/0x4d0
                            sock_wake_async+0x137/0x160
                            sk_wake_async+0x184/0x280
                            unix_release_sock+0x768/0xd30
                            unix_release+0x92/0xd0
                            sock_close+0xc3/0x240
                            __fput+0x44c/0xa70
                            task_work_run+0x1d4/0x260
                            exit_to_user_mode_loop+0xec/0x110
                            do_syscall_64+0x2bd/0x3b0
                            entry_SYSCALL_64_after_hwframe+0x77/0x7f
   }
   ... key      at: [<ffffffff99b22f80>] fasync_insert_entry.__key+0x0/0x20
   ... acquired at:
   lock_acquire+0x120/0x360
   _raw_read_lock_irqsave+0xaf/0x100
   kill_fasync+0x199/0x4d0
   evdev_pass_values+0x627/0xbd0
   evdev_events+0x1e6/0x340
   input_pass_values+0x288/0x890
   input_event_dispose+0x330/0x6b0
   input_inject_event+0x1dd/0x340
   evdev_write+0x2fc/0x480
   vfs_write+0x27e/0xa90
   ksys_write+0x145/0x250
   do_syscall_64+0xfa/0x3b0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

 -> (&client->buffer_lock){....}-{3:3} {
    INITIAL USE at:
                     lock_acquire+0x120/0x360
                     _raw_spin_lock+0x2e/0x40
                     evdev_pass_values+0xb9/0xbd0
                     evdev_events+0x1e6/0x340
                     input_pass_values+0x288/0x890
                     input_event_dispose+0x330/0x6b0
                     input_inject_event+0x1dd/0x340
                     evdev_write+0x2fc/0x480
                     vfs_write+0x27e/0xa90
                     ksys_write+0x145/0x250
                     do_syscall_64+0xfa/0x3b0
                     entry_SYSCALL_64_after_hwframe+0x77/0x7f
  }
  ... key      at: [<ffffffff99e22300>] evdev_open.__key.25+0x0/0x20
  ... acquired at:
   lock_acquire+0x120/0x360
   _raw_spin_lock+0x2e/0x40
   evdev_pass_values+0xb9/0xbd0
   evdev_events+0x1e6/0x340
   input_pass_values+0x288/0x890
   input_event_dispose+0x330/0x6b0
   input_inject_event+0x1dd/0x340
   evdev_write+0x2fc/0x480
   vfs_write+0x27e/0xa90
   ksys_write+0x145/0x250
   do_syscall_64+0xfa/0x3b0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> (&dev->event_lock#2){..-.}-{3:3} {
   IN-SOFTIRQ-W at:
                    lock_acquire+0x120/0x360
                    _raw_spin_lock_irqsave+0xa7/0xf0
                    input_event+0x76/0xe0
                    hidinput_report_event+0xa1/0x100
                    hid_report_raw_event+0x148b/0x16d0
                    hid_input_report+0x43e/0x520
                    hid_irq_in+0x47e/0x6d0
                    __usb_hcd_giveback_urb+0x41a/0x690
                    dummy_timer+0x862/0x4550
                    __hrtimer_run_queues+0x52c/0xc60
                    hrtimer_run_softirq+0x187/0x2b0
                    handle_softirqs+0x286/0x870
                    __irq_exit_rcu+0xca/0x1f0
                    irq_exit_rcu+0x9/0x30
                    sysvec_apic_timer_interrupt+0xa6/0xc0
                    asm_sysvec_apic_timer_interrupt+0x1a/0x20
                    pv_native_safe_halt+0x13/0x20
                    default_idle+0x13/0x20
                    default_idle_call+0x74/0xb0
                    do_idle+0x1e8/0x510
                    cpu_startup_entry+0x44/0x60
                    start_secondary+0x101/0x110
                    common_startup_64+0x13e/0x147
   INITIAL USE at:
                   lock_acquire+0x120/0x360
                   _raw_spin_lock_irqsave+0xa7/0xf0
                   input_inject_event+0xa5/0x340
                   kbd_led_trigger_activate+0xbc/0x100
                   led_trigger_set+0x52d/0x950
                   led_trigger_set_default+0x260/0x2a0
                   led_classdev_register_ext+0x73d/0x930
                   input_leds_connect+0x517/0x790
                   input_register_device+0xd0e/0x1140
                   atkbd_connect+0x72e/0xa00
                   serio_driver_probe+0x82/0xd0
                   really_probe+0x26d/0x9e0
                   __driver_probe_device+0x18c/0x2f0
                   driver_probe_device+0x4f/0x430
                   __driver_attach+0x452/0x700
                   bus_for_each_dev+0x233/0x2b0
                   serio_handle_event+0x1f9/0x8d0
                   process_scheduled_works+0xae1/0x17b0
                   worker_thread+0x8a0/0xda0
                   kthread+0x711/0x8a0
                   ret_from_fork+0x3fc/0x770
                   ret_from_fork_asm+0x1a/0x30
 }
 ... key      at: [<ffffffff99e22060>] input_allocate_device.__key.5+0x0/0x20
 ... acquired at:
   mark_lock+0x11b/0x190
   __lock_acquire+0x680/0xd20
   lock_acquire+0x120/0x360
   _raw_spin_lock_irqsave+0xa7/0xf0
   input_event+0x76/0xe0
   hidinput_report_event+0xa1/0x100
   hid_report_raw_event+0x148b/0x16d0
   hid_input_report+0x43e/0x520
   hid_irq_in+0x47e/0x6d0
   __usb_hcd_giveback_urb+0x41a/0x690
   dummy_timer+0x862/0x4550
   __hrtimer_run_queues+0x52c/0xc60
   hrtimer_run_softirq+0x187/0x2b0
   handle_softirqs+0x286/0x870
   __irq_exit_rcu+0xca/0x1f0
   irq_exit_rcu+0x9/0x30
   sysvec_apic_timer_interrupt+0xa6/0xc0
   asm_sysvec_apic_timer_interrupt+0x1a/0x20
   pv_native_safe_halt+0x13/0x20
   default_idle+0x13/0x20
   default_idle_call+0x74/0xb0
   do_idle+0x1e8/0x510
   cpu_startup_entry+0x44/0x60
   start_secondary+0x101/0x110
   common_startup_64+0x13e/0x147


stack backtrace:
CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.16.0-syzkaller-11895-gcca7a0aae895-dirty #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 <IRQ>
 dump_stack_lvl+0x189/0x250
 print_irq_inversion_bug+0x1d2/0x1e0
 mark_lock_irq+0x35f/0x390
 mark_lock+0x11b/0x190
 __lock_acquire+0x680/0xd20
 lock_acquire+0x120/0x360
 _raw_spin_lock_irqsave+0xa7/0xf0
 input_event+0x76/0xe0
 hidinput_report_event+0xa1/0x100
 hid_report_raw_event+0x148b/0x16d0
 hid_input_report+0x43e/0x520
 hid_irq_in+0x47e/0x6d0
 __usb_hcd_giveback_urb+0x41a/0x690
 dummy_timer+0x862/0x4550
 __hrtimer_run_queues+0x52c/0xc60
 hrtimer_run_softirq+0x187/0x2b0
 handle_softirqs+0x286/0x870
 __irq_exit_rcu+0xca/0x1f0
 irq_exit_rcu+0x9/0x30
 sysvec_apic_timer_interrupt+0xa6/0xc0
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:pv_native_safe_halt+0x13/0x20
Code: 13 e8 02 00 cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d 53 97 0f 00 f3 0f 1e fa fb f4 <c3> cc cc cc cc cc cc cc cc cc cc cc cc 90 90 90 90 90 90 90 90 90
RSP: 0018:ffffc90000177de0 EFLAGS: 00000282
RAX: 424bc78a52a0c500 RBX: ffffffff81968308 RCX: 424bc78a52a0c500
RDX: 0000000000000001 RSI: ffffffff8d9b4408 RDI: ffffffff8be32600
RBP: ffffc90000177f20 R08: ffff888136632f9b R09: 1ffff11026cc65f3
R10: dffffc0000000000 R11: ffffed1026cc65f4 R12: ffffffff8fa34230
R13: 0000000000000001 R14: 0000000000000001 R15: 1ffff1102001f000
 default_idle+0x13/0x20
 default_idle_call+0x74/0xb0
 do_idle+0x1e8/0x510
 cpu_startup_entry+0x44/0x60
 start_secondary+0x101/0x110
 common_startup_64+0x13e/0x147
 </TASK>
