================================ WARNING: inconsistent lock state 6.7.0-rc1-next-20231117-syzkaller #0 Not tainted -------------------------------- inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage. syz-executor.2/13528 [HC1[1]:SC0[0]:HE0:SE1] takes: ffff8880356f1bd8 (&sighand->siglock){?.+.}-{2:2}, at: __lock_task_sighand+0xc2/0x340 kernel/signal.c:1422 {HARDIRQ-ON-W} state was registered at: lock_acquire kernel/locking/lockdep.c:5753 [inline] lock_acquire+0x1b1/0x530 kernel/locking/lockdep.c:5718 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] class_spinlock_constructor include/linux/spinlock.h:530 [inline] ptrace_set_stopped kernel/ptrace.c:391 [inline] ptrace_attach+0x401/0x650 kernel/ptrace.c:478 __do_sys_ptrace+0x204/0x230 kernel/ptrace.c:1290 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x62/0x6a irq event stamp: 2098 hardirqs last enabled at (2097): [] percpu_counter_add_batch+0x112/0x1f0 lib/percpu_counter.c:102 hardirqs last disabled at (2098): [] sysvec_apic_timer_interrupt+0xe/0xb0 arch/x86/kernel/apic/apic.c:1076 softirqs last enabled at (1904): [] softirq_handle_end kernel/softirq.c:399 [inline] softirqs last enabled at (1904): [] __do_softirq+0x591/0x8d5 kernel/softirq.c:582 softirqs last disabled at (1851): [] invoke_softirq kernel/softirq.c:427 [inline] softirqs last disabled at (1851): [] __irq_exit_rcu kernel/softirq.c:632 [inline] softirqs last disabled at (1851): [] irq_exit_rcu+0xb5/0x120 kernel/softirq.c:644 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&sighand->siglock); lock(&sighand->siglock); *** DEADLOCK *** 6 locks held by syz-executor.2/13528: #0: ffff88807e11a7a0 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_lock include/linux/mmap_lock.h:146 [inline] #0: ffff88807e11a7a0 (&mm->mmap_lock){++++}-{3:3}, at: exit_mmap+0x107/0xb60 mm/mmap.c:3258 #1: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline] #1: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline] #1: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: __pte_offset_map+0x42/0x540 mm/pgtable-generic.c:285 #2: ffff888079832f78 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline] #2: ffff888079832f78 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: __pte_offset_map_lock+0xf1/0x2f0 mm/pgtable-generic.c:373 #3: ffff88807b0ca038 (&new_timer->it_lock){-...}-{2:2}, at: posix_timer_fn+0x2d/0x3d0 kernel/time/posix-timers.c:318 #4: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline] #4: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline] #4: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: send_sigqueue+0x10c/0x840 kernel/signal.c:1978 #5: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline] #5: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline] #5: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: __lock_task_sighand+0x3f/0x340 kernel/signal.c:1405 stack backtrace: CPU: 0 PID: 13528 Comm: syz-executor.2 Not tainted 6.7.0-rc1-next-20231117-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106 print_usage_bug kernel/locking/lockdep.c:3970 [inline] valid_state kernel/locking/lockdep.c:4012 [inline] mark_lock_irq kernel/locking/lockdep.c:4215 [inline] mark_lock+0x91a/0xc50 kernel/locking/lockdep.c:4677 mark_usage kernel/locking/lockdep.c:4563 [inline] __lock_acquire+0x1347/0x3b10 kernel/locking/lockdep.c:5090 lock_acquire kernel/locking/lockdep.c:5753 [inline] lock_acquire+0x1b1/0x530 kernel/locking/lockdep.c:5718 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x3a/0x50 kernel/locking/spinlock.c:162 __lock_task_sighand+0xc2/0x340 kernel/signal.c:1422 lock_task_sighand include/linux/sched/signal.h:748 [inline] send_sigqueue+0x1d4/0x840 kernel/signal.c:1996 posix_timer_event kernel/time/posix-timers.c:298 [inline] posix_timer_fn+0x181/0x3d0 kernel/time/posix-timers.c:324 __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x20c/0xc20 kernel/time/hrtimer.c:1752 hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1814 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1065 [inline] __sysvec_apic_timer_interrupt+0x10c/0x410 arch/x86/kernel/apic/apic.c:1082 sysvec_apic_timer_interrupt+0x90/0xb0 arch/x86/kernel/apic/apic.c:1076 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:check_kcov_mode kernel/kcov.c:175 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x2d/0x60 kernel/kcov.c:207 Code: fa 65 48 8b 15 a4 ad 7b 7e 65 8b 05 a5 ad 7b 7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74 35 8b 82 fc 15 00 00 85 c0 74 2b <8b> 82 d8 15 00 00 83 f8 02 75 20 48 8b 8a e0 15 00 00 8b 92 dc 15 RSP: 0018:ffffc90015fe78f0 EFLAGS: 00000246 RAX: 0000000080000001 RBX: ffffea0000d84b00 RCX: ffffffff81c980f8 RDX: ffff88801d468000 RSI: ffffffff81c9780f RDI: 0000000000000005 RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000002 R11: 0000000000000003 R12: 0000000000000000 R13: ffff888027cc5698 R14: dffffc0000000000 R15: 0000000000000000 __tlb_remove_page include/asm-generic/tlb.h:471 [inline] zap_pte_range mm/memory.c:1473 [inline] zap_pmd_range mm/memory.c:1587 [inline] zap_pud_range mm/memory.c:1616 [inline] zap_p4d_range mm/memory.c:1637 [inline] unmap_page_range+0x12ff/0x2b60 mm/memory.c:1658 unmap_single_vma+0x194/0x2b0 mm/memory.c:1704 unmap_vmas+0x22f/0x490 mm/memory.c:1748 exit_mmap+0x1c1/0xb60 mm/mmap.c:3274 __mmput+0x12a/0x4d0 kernel/fork.c:1367 mmput+0x62/0x70 kernel/fork.c:1389 exit_mm kernel/exit.c:567 [inline] do_exit+0x9a1/0x2ad0 kernel/exit.c:858 do_group_exit+0xd3/0x2a0 kernel/exit.c:1021 __do_sys_exit_group kernel/exit.c:1032 [inline] __se_sys_exit_group kernel/exit.c:1030 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1030 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x62/0x6a RIP: 0033:0x7fe46607cae9 Code: Unable to access opcode bytes at 0x7fe46607cabf. RSP: 002b:00007fff51bcdf18 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 000000000000001e RCX: 00007fe46607cae9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: 00000000000002ca R09: 0000000000000000 R10: 0000001b32220000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000001 ---------------- Code disassembly (best guess): 0: fa cli 1: 65 48 8b 15 a4 ad 7b mov %gs:0x7e7bada4(%rip),%rdx # 0x7e7badad 8: 7e 9: 65 8b 05 a5 ad 7b 7e mov %gs:0x7e7bada5(%rip),%eax # 0x7e7badb5 10: a9 00 01 ff 00 test $0xff0100,%eax 15: 48 8b 34 24 mov (%rsp),%rsi 19: 74 0f je 0x2a 1b: f6 c4 01 test $0x1,%ah 1e: 74 35 je 0x55 20: 8b 82 fc 15 00 00 mov 0x15fc(%rdx),%eax 26: 85 c0 test %eax,%eax 28: 74 2b je 0x55 * 2a: 8b 82 d8 15 00 00 mov 0x15d8(%rdx),%eax <-- trapping instruction 30: 83 f8 02 cmp $0x2,%eax 33: 75 20 jne 0x55 35: 48 8b 8a e0 15 00 00 mov 0x15e0(%rdx),%rcx 3c: 8b .byte 0x8b 3d: 92 xchg %eax,%edx 3e: dc .byte 0xdc 3f: 15 .byte 0x15