================================ WARNING: inconsistent lock state 6.10.0-rc2-syzkaller-00751-gdedf56d775c0 #0 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. syz-executor.4/7959 [HC0[0]:SC1[1]:HE0:SE0] takes: ffff8880b9438828 (lock#10){+.?.}-{2:2}, at: local_lock_acquire include/linux/local_lock_internal.h:29 [inline] ffff8880b9438828 (lock#10){+.?.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x8f/0x630 mm/mmap_lock.c:237 {SOFTIRQ-ON-W} state was registered at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754 local_lock_acquire include/linux/local_lock_internal.h:29 [inline] __mmap_lock_do_trace_acquire_returned+0xa8/0x630 mm/mmap_lock.c:237 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:164 [inline] get_mmap_lock_carefully mm/memory.c:5715 [inline] lock_mm_and_find_vma+0x213/0x2f0 mm/memory.c:5775 do_user_addr_fault arch/x86/mm/fault.c:1361 [inline] handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x1bf/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 rep_movs_alternative+0x33/0x70 arch/x86/lib/copy_user_64.S:57 copy_user_generic arch/x86/include/asm/uaccess_64.h:110 [inline] raw_copy_to_user arch/x86/include/asm/uaccess_64.h:131 [inline] copy_to_user_iter lib/iov_iter.c:25 [inline] iterate_ubuf include/linux/iov_iter.h:29 [inline] iterate_and_advance2 include/linux/iov_iter.h:245 [inline] iterate_and_advance include/linux/iov_iter.h:271 [inline] _copy_to_iter+0x26b/0x1960 lib/iov_iter.c:185 copy_page_to_iter+0xb1/0x160 lib/iov_iter.c:362 pipe_read+0x59c/0x13e0 fs/pipe.c:327 new_sync_read fs/read_write.c:395 [inline] vfs_read+0x9c4/0xbd0 fs/read_write.c:476 ksys_read+0x1a0/0x2c0 fs/read_write.c:619 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f irq event stamp: 1159 hardirqs last enabled at (1158): [] irqentry_exit+0x63/0x90 kernel/entry/common.c:357 hardirqs last disabled at (1159): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:117 [inline] hardirqs last disabled at (1159): [] _raw_spin_lock_irq+0xad/0x120 kernel/locking/spinlock.c:170 softirqs last enabled at (1150): [] local_bh_disable include/linux/bottom_half.h:20 [inline] softirqs last enabled at (1150): [] fpregs_lock arch/x86/include/asm/fpu/api.h:72 [inline] softirqs last enabled at (1150): [] fpu__clear_user_states+0x3c/0x270 arch/x86/kernel/fpu/core.c:745 softirqs last disabled at (1155): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last disabled at (1155): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last disabled at (1155): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(lock#10); lock(lock#10); *** DEADLOCK *** 2 locks held by syz-executor.4/7959: #0: ffffffff8e333fa0 (rcu_read_lock){....}-{1:2}, at: trace_call_bpf+0xbc/0x8a0 #1: ffff88801f591498 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:163 [inline] #1: ffff88801f591498 (&mm->mmap_lock){++++}-{3:3}, at: stack_map_get_build_id_offset+0x237/0x9d0 kernel/bpf/stackmap.c:141 stack backtrace: CPU: 0 PID: 7959 Comm: syz-executor.4 Not tainted 6.10.0-rc2-syzkaller-00751-gdedf56d775c0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 valid_state+0x13a/0x1c0 kernel/locking/lockdep.c:4013 mark_lock_irq+0xbb/0xc20 kernel/locking/lockdep.c:4216 mark_lock+0x223/0x350 kernel/locking/lockdep.c:4678 __lock_acquire+0xbcd/0x1fd0 kernel/locking/lockdep.c:5091 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754 local_lock_acquire include/linux/local_lock_internal.h:29 [inline] __mmap_lock_do_trace_acquire_returned+0xa8/0x630 mm/mmap_lock.c:237 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:164 [inline] stack_map_get_build_id_offset+0x9af/0x9d0 kernel/bpf/stackmap.c:141 __bpf_get_stack+0x4ad/0x5a0 kernel/bpf/stackmap.c:449 bpf_prog_e6cf5f9c69743609+0x42/0x46 bpf_dispatcher_nop_func include/linux/bpf.h:1243 [inline] __bpf_prog_run include/linux/filter.h:691 [inline] bpf_prog_run include/linux/filter.h:698 [inline] bpf_prog_run_array include/linux/bpf.h:2104 [inline] trace_call_bpf+0x369/0x8a0 kernel/trace/bpf_trace.c:147 perf_trace_run_bpf_submit+0x7c/0x1d0 kernel/events/core.c:10269 perf_trace_preemptirq_template+0x2d2/0x3f0 include/trace/events/preemptirq.h:14 trace_irq_disable+0xf1/0x120 include/trace/events/preemptirq.h:36 __raw_spin_lock_irq include/linux/spinlock_api_smp.h:117 [inline] _raw_spin_lock_irq+0xad/0x120 kernel/locking/spinlock.c:170 __run_timer_base+0x103/0x8e0 kernel/time/timer.c:2427 run_timer_base kernel/time/timer.c:2437 [inline] run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2447 handle_softirqs+0x2c4/0x970 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:should_resched arch/x86/include/asm/preempt.h:103 [inline] RIP: 0010:__local_bh_enable_ip+0x170/0x200 kernel/softirq.c:389 Code: 8b e8 54 99 2d 0a 65 66 8b 05 14 d8 a9 7e 66 85 c0 75 5d bf 01 00 00 00 e8 ad 9d 0b 00 e8 48 96 43 00 fb 65 8b 05 d8 d7 a9 7e <85> c0 75 05 e8 17 b9 a6 ff 48 c7 44 24 20 0e 36 e0 45 49 c7 04 1c RSP: 0018:ffffc900024efd00 EFLAGS: 00000286 RAX: 0000000080000000 RBX: 1ffff9200049dfa4 RCX: ffffffff947a7603 RDX: dffffc0000000000 RSI: ffffffff8bcabb80 RDI: ffffffff8c1ff740 RBP: ffffc900024efdb0 R08: ffffffff8fad686f R09: 1ffffffff1f5ad0d R10: dffffc0000000000 R11: fffffbfff1f5ad0e R12: dffffc0000000000 R13: 1ffff9200049dfa8 R14: ffffc900024efd40 R15: 0000000000000200 handle_signal arch/x86/kernel/signal.c:283 [inline] arch_do_signal_or_restart+0x4fb/0x860 arch/x86/kernel/signal.c:312 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f01ec0a4630 Code: 83 c0 16 83 e0 f7 74 12 50 48 8d 3d 5a 9b 04 00 e8 35 78 fa ff 0f 1f 44 00 00 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 <83> ff 21 74 0b c3 66 2e 0f 1f 84 00 00 00 00 00 55 53 48 89 f3 48 RSP: 002b:00007f01ece9bb38 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 00007f01ec1b3f80 RCX: 00007f01ec07cea9 RDX: 00007f01ece9bb40 RSI: 00007f01ece9bc70 RDI: 0000000000000021 RBP: 00007f01ec0ebff4 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f01ec1b3f80 R15: 00007ffd3e419f78 ---------------- Code disassembly (best guess): 0: 8b e8 mov %eax,%ebp 2: 54 push %rsp 3: 99 cltd 4: 2d 0a 65 66 8b sub $0x8b66650a,%eax 9: 05 14 d8 a9 7e add $0x7ea9d814,%eax e: 66 85 c0 test %ax,%ax 11: 75 5d jne 0x70 13: bf 01 00 00 00 mov $0x1,%edi 18: e8 ad 9d 0b 00 call 0xb9dca 1d: e8 48 96 43 00 call 0x43966a 22: fb sti 23: 65 8b 05 d8 d7 a9 7e mov %gs:0x7ea9d7d8(%rip),%eax # 0x7ea9d802 * 2a: 85 c0 test %eax,%eax <-- trapping instruction 2c: 75 05 jne 0x33 2e: e8 17 b9 a6 ff call 0xffa6b94a 33: 48 c7 44 24 20 0e 36 movq $0x45e0360e,0x20(%rsp) 3a: e0 45 3c: 49 rex.WB 3d: c7 .byte 0xc7 3e: 04 1c add $0x1c,%al