================================ WARNING: inconsistent lock state 6.7.0-rc1-next-20231117-syzkaller #0 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. udevd/4514 [HC0[0]:SC1[1]:HE0:SE0] takes: ffff888029ad1bd8 (&sighand->siglock){+.?.}-{2:2}, at: __lock_task_sighand+0xc2/0x340 kernel/signal.c:1422 {SOFTIRQ-ON-W} state was registered at: lock_acquire kernel/locking/lockdep.c:5753 [inline] lock_acquire+0x1b1/0x530 kernel/locking/lockdep.c:5718 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] class_spinlock_constructor include/linux/spinlock.h:530 [inline] ptrace_set_stopped kernel/ptrace.c:391 [inline] ptrace_attach+0x401/0x650 kernel/ptrace.c:478 __do_sys_ptrace+0x204/0x230 kernel/ptrace.c:1290 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x62/0x6a irq event stamp: 13510101 hardirqs last enabled at (13510100): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (13510100): [] _raw_spin_unlock_irqrestore+0x4e/0x70 kernel/locking/spinlock.c:194 hardirqs last disabled at (13510101): [] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline] hardirqs last disabled at (13510101): [] _raw_spin_lock_irqsave+0x4e/0x50 kernel/locking/spinlock.c:162 softirqs last enabled at (13504954): [] softirq_handle_end kernel/softirq.c:399 [inline] softirqs last enabled at (13504954): [] __do_softirq+0x591/0x8d5 kernel/softirq.c:582 softirqs last disabled at (13510073): [] invoke_softirq kernel/softirq.c:427 [inline] softirqs last disabled at (13510073): [] __irq_exit_rcu kernel/softirq.c:632 [inline] softirqs last disabled at (13510073): [] irq_exit_rcu+0xb5/0x120 kernel/softirq.c:644 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&sighand->siglock); lock(&sighand->siglock); *** DEADLOCK *** 4 locks held by udevd/4514: #0: ffffffff8d8fd6d0 (tomoyo_ss){.+.+}-{0:0}, at: srcu_lock_acquire include/linux/srcu.h:116 [inline] #0: ffffffff8d8fd6d0 (tomoyo_ss){.+.+}-{0:0}, at: srcu_read_lock include/linux/srcu.h:215 [inline] #0: ffffffff8d8fd6d0 (tomoyo_ss){.+.+}-{0:0}, at: tomoyo_read_lock security/tomoyo/common.h:1108 [inline] #0: ffffffff8d8fd6d0 (tomoyo_ss){.+.+}-{0:0}, at: tomoyo_check_open_permission+0x164/0x3b0 security/tomoyo/file.c:767 #1: ffffffff8cfacf40 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline] #1: ffffffff8cfacf40 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2152 [inline] #1: ffffffff8cfacf40 (rcu_callback){....}-{0:0}, at: rcu_core+0x7cc/0x16b0 kernel/rcu/tree.c:2431 #2: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline] #2: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline] #2: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2310 [inline] #2: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run3+0xf8/0x430 kernel/trace/bpf_trace.c:2351 #3: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline] #3: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline] #3: ffffffff8cfad060 (rcu_read_lock){....}-{1:2}, at: __lock_task_sighand+0x3f/0x340 kernel/signal.c:1405 stack backtrace: CPU: 1 PID: 4514 Comm: udevd Not tainted 6.7.0-rc1-next-20231117-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106 print_usage_bug kernel/locking/lockdep.c:3970 [inline] valid_state kernel/locking/lockdep.c:4012 [inline] mark_lock_irq kernel/locking/lockdep.c:4215 [inline] mark_lock+0x91a/0xc50 kernel/locking/lockdep.c:4677 mark_usage kernel/locking/lockdep.c:4566 [inline] __lock_acquire+0x13c2/0x3b10 kernel/locking/lockdep.c:5090 lock_acquire kernel/locking/lockdep.c:5753 [inline] lock_acquire+0x1b1/0x530 kernel/locking/lockdep.c:5718 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x3a/0x50 kernel/locking/spinlock.c:162 __lock_task_sighand+0xc2/0x340 kernel/signal.c:1422 lock_task_sighand include/linux/sched/signal.h:748 [inline] do_send_sig_info kernel/signal.c:1309 [inline] group_send_sig_info+0x288/0x300 kernel/signal.c:1460 bpf_send_signal_common+0x2e4/0x3a0 kernel/trace/bpf_trace.c:877 ____bpf_send_signal kernel/trace/bpf_trace.c:882 [inline] bpf_send_signal+0x19/0x20 kernel/trace/bpf_trace.c:880 bpf_prog_8cc4ff36b5985b6a+0x1d/0x1f bpf_dispatcher_nop_func include/linux/bpf.h:1196 [inline] __bpf_prog_run include/linux/filter.h:651 [inline] bpf_prog_run include/linux/filter.h:658 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2311 [inline] bpf_trace_run3+0x164/0x430 kernel/trace/bpf_trace.c:2351 trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] kmem_cache_free+0x1b5/0x360 mm/slub.c:3805 rcu_do_batch kernel/rcu/tree.c:2158 [inline] rcu_core+0x828/0x16b0 kernel/rcu/tree.c:2431 __do_softirq+0x216/0x8d5 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu kernel/softirq.c:632 [inline] irq_exit_rcu+0xb5/0x120 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x95/0xb0 arch/x86/kernel/apic/apic.c:1076 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 RIP: 0010:unwind_next_frame+0x1a6e/0x2390 arch/x86/kernel/unwind_orc.c:648 Code: 03 0f b6 14 16 48 89 fe 83 e6 07 40 38 f1 40 0f 9e c6 84 c9 0f 95 c1 40 84 ce 0f 85 87 08 00 00 83 e0 07 38 c2 0f 9e c1 84 d2 <0f> 95 c0 84 c1 0f 85 72 08 00 00 4d 0f bf 64 24 02 ba 08 00 00 00 RSP: 0018:ffffc900033bedd8 EFLAGS: 00000246 RAX: 0000000000000001 RBX: ffffc900033bee58 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff8fd76408 RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000004 R10: 0000000000000001 R11: dffffc0000000000 R12: ffffffff8fd76406 R13: ffffc900033bfa28 R14: 0000000000000001 R15: 0000000000000001 arch_stack_walk+0xfa/0x170 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x95/0xd0 kernel/stacktrace.c:122 save_stack+0x15e/0x1f0 mm/page_owner.c:130 __set_page_owner+0x1f/0x60 mm/page_owner.c:196 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x2d0/0x350 mm/page_alloc.c:1533 prep_new_page mm/page_alloc.c:1540 [inline] get_page_from_freelist+0xa16/0x3690 mm/page_alloc.c:3344 __alloc_pages+0x22d/0x2400 mm/page_alloc.c:4600 alloc_pages_mpol+0x258/0x5f0 mm/mempolicy.c:2133 alloc_slab_page mm/slub.c:1879 [inline] allocate_slab mm/slub.c:2026 [inline] new_slab+0x283/0x3c0 mm/slub.c:2079 ___slab_alloc+0x4af/0x1710 mm/slub.c:3212 __slab_alloc.constprop.0+0x56/0xa0 mm/slub.c:3297 __slab_alloc_node mm/slub.c:3350 [inline] slab_alloc_node mm/slub.c:3442 [inline] __kmem_cache_alloc_node+0x131/0x310 mm/slub.c:3491 __do_kmalloc_node mm/slab_common.c:1006 [inline] __kmalloc+0x49/0x90 mm/slab_common.c:1020 kmalloc include/linux/slab.h:604 [inline] tomoyo_realpath_from_path+0xb9/0x710 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_check_open_permission+0x2a3/0x3b0 security/tomoyo/file.c:771 tomoyo_file_open security/tomoyo/tomoyo.c:333 [inline] tomoyo_file_open+0xa7/0xd0 security/tomoyo/tomoyo.c:328 security_file_open+0x6a/0xe0 security/security.c:2920 do_dentry_open+0x583/0x18c0 fs/open.c:935 do_open fs/namei.c:3624 [inline] path_openat+0x1e55/0x2c50 fs/namei.c:3781 do_filp_open+0x1dc/0x430 fs/namei.c:3811 do_sys_openat2+0x176/0x1e0 fs/open.c:1440 do_sys_open fs/open.c:1455 [inline] __do_sys_openat fs/open.c:1471 [inline] __se_sys_openat fs/open.c:1466 [inline] __x64_sys_openat+0x175/0x210 fs/open.c:1466 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x62/0x6a RIP: 0033:0x7efea05169a4 Code: 24 20 48 8d 44 24 30 48 89 44 24 28 64 8b 04 25 18 00 00 00 85 c0 75 2c 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 76 60 48 8b 15 55 a4 0d 00 f7 d8 64 89 02 48 83 RSP: 002b:00007fff6fa922b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007efea05169a4 RDX: 0000000000080000 RSI: 00007fff6fa923e8 RDI: 00000000ffffff9c RBP: 00007fff6fa923e8 R08: 0000000000000008 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000080000 R13: 00005615c4c24b42 R14: 0000000000000001 R15: 0000000000000000 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 0f b6 14 16 movzbl (%rsi,%rdx,1),%edx 4: 48 89 fe mov %rdi,%rsi 7: 83 e6 07 and $0x7,%esi a: 40 38 f1 cmp %sil,%cl d: 40 0f 9e c6 setle %sil 11: 84 c9 test %cl,%cl 13: 0f 95 c1 setne %cl 16: 40 84 ce test %cl,%sil 19: 0f 85 87 08 00 00 jne 0x8a6 1f: 83 e0 07 and $0x7,%eax 22: 38 c2 cmp %al,%dl 24: 0f 9e c1 setle %cl 27: 84 d2 test %dl,%dl * 29: 0f 95 c0 setne %al <-- trapping instruction 2c: 84 c1 test %al,%cl 2e: 0f 85 72 08 00 00 jne 0x8a6 34: 4d 0f bf 64 24 02 movswq 0x2(%r12),%r12 3a: ba 08 00 00 00 mov $0x8,%edx