BUG: using smp_processor_id() in preemptible [00000000] code: syz-executor.0/2955 caller is debug_smp_processor_id+0x17/0x20 lib/smp_processor_id.c:60 CPU: 0 PID: 2955 Comm: syz-executor.0 Tainted: G W 6.1.68-syzkaller-00072-g3f5807c586a6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x151/0x1b7 lib/dump_stack.c:106 dump_stack+0x15/0x1b lib/dump_stack.c:113 check_preemption_disabled+0x109/0x110 lib/smp_processor_id.c:49 debug_smp_processor_id+0x17/0x20 lib/smp_processor_id.c:60 rcu_dynticks_curr_cpu_in_eqs include/linux/context_tracking.h:122 [inline] rcu_is_watching+0x15/0xb0 kernel/rcu/tree.c:721 kernel_text_address+0x83/0xe0 kernel/extable.c:113 __kernel_text_address+0xd/0x40 kernel/extable.c:79 unwind_get_return_address+0x4d/0x90 arch/x86/kernel/unwind_frame.c:19 arch_stack_walk+0xf3/0x140 arch/x86/kernel/stacktrace.c:26 stack_trace_save+0x113/0x1c0 kernel/stacktrace.c:122 kasan_save_stack+0x3b/0x60 mm/kasan/common.c:45 __kasan_record_aux_stack+0xb4/0xc0 mm/kasan/generic.c:486 kasan_record_aux_stack_noalloc+0xb/0x10 mm/kasan/generic.c:496 __call_rcu_common kernel/rcu/tree.c:2774 [inline] call_rcu+0xee/0x1340 kernel/rcu/tree.c:2893 __bpf_prog_put_noref+0x291/0x2c0 kernel/bpf/syscall.c:2043 bpf_prog_put_deferred+0x2ee/0x3e0 kernel/bpf/syscall.c:2059 __bpf_prog_put kernel/bpf/syscall.c:2071 [inline] bpf_prog_put kernel/bpf/syscall.c:2078 [inline] bpf_link_free+0x349/0x3f0 kernel/bpf/syscall.c:2724 bpf_link_put kernel/bpf/syscall.c:2749 [inline] bpf_link_release+0x170/0x180 kernel/bpf/syscall.c:2758 __fput+0x3ab/0x870 fs/file_table.c:320 ____fput+0x15/0x20 fs/file_table.c:348 task_work_run+0x24d/0x2e0 kernel/task_work.c:179 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop+0x94/0xa0 kernel/entry/common.c:171 exit_to_user_mode_prepare+0x5a/0xa0 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x26/0x140 kernel/entry/common.c:297 do_syscall_64+0x49/0xb0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fc318a7cc9a Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 RSP: 002b:00007ffc86fdfe00 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000006 RCX: 00007fc318a7cc9a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 RBP: 00007fc318bad980 R08: 0000001b2f920000 R09: 0000000000000008 R10: 0000000081789203 R11: 0000000000000293 R12: 00000000000109cf R13: ffffffffffffffff R14: 00007fc318600000 R15: 000000000001068e