================================ WARNING: inconsistent lock state 6.10.0-rc1-syzkaller-g7d0b3953f6d8 #0 Not tainted -------------------------------- inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage. modprobe/7105 [HC1[1]:SC0[0]:HE0:SE1] takes: ffff8880b9538828 (lock#10){?.+.}-{2:2}, at: local_lock_acquire include/linux/local_lock_internal.h:29 [inline] ffff8880b9538828 (lock#10){?.+.}-{2:2}, at: __mmap_lock_do_trace_released+0x83/0x620 mm/mmap_lock.c:243 {HARDIRQ-ON-W} state was registered at: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754 local_lock_acquire include/linux/local_lock_internal.h:29 [inline] __mmap_lock_do_trace_start_locking+0x9c/0x620 mm/mmap_lock.c:230 __mmap_lock_trace_start_locking include/linux/mmap_lock.h:29 [inline] mmap_read_trylock include/linux/mmap_lock.h:162 [inline] get_mmap_lock_carefully mm/memory.c:5715 [inline] lock_mm_and_find_vma+0x1f1/0x2f0 mm/memory.c:5775 do_user_addr_fault arch/x86/mm/fault.c:1361 [inline] handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x1bf/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 rep_movs_alternative+0x4a/0x70 arch/x86/lib/copy_user_64.S:65 copy_user_generic arch/x86/include/asm/uaccess_64.h:110 [inline] raw_copy_from_user arch/x86/include/asm/uaccess_64.h:125 [inline] copy_from_user_iter lib/iov_iter.c:55 [inline] iterate_iovec include/linux/iov_iter.h:51 [inline] iterate_and_advance2 include/linux/iov_iter.h:247 [inline] iterate_and_advance include/linux/iov_iter.h:271 [inline] __copy_from_iter lib/iov_iter.c:249 [inline] _copy_from_iter+0x4c0/0x1960 lib/iov_iter.c:260 copy_page_from_iter+0x7a/0x100 lib/iov_iter.c:422 skb_copy_datagram_from_iter+0x2d8/0x6c0 net/core/datagram.c:573 unix_stream_sendmsg+0x62a/0xf80 net/unix/af_unix.c:2282 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2585 ___sys_sendmsg net/socket.c:2639 [inline] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2668 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f irq event stamp: 772 hardirqs last enabled at (771): [] flush_tlb_mm_range+0x3df/0x5c0 arch/x86/mm/tlb.c:1032 hardirqs last disabled at (772): [] sysvec_irq_work+0xe/0xc0 arch/x86/kernel/irq_work.c:17 softirqs last enabled at (548): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last enabled at (548): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last enabled at (548): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 softirqs last disabled at (459): [] __do_softirq kernel/softirq.c:588 [inline] softirqs last disabled at (459): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last disabled at (459): [] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(lock#10); lock(lock#10); *** DEADLOCK *** 3 locks held by modprobe/7105: #0: ffff888062665730 (&vma->vm_lock->lock){++++}-{3:3}, at: vma_start_read include/linux/mm.h:678 [inline] #0: ffff888062665730 (&vma->vm_lock->lock){++++}-{3:3}, at: lock_vma_under_rcu+0x2f9/0x6e0 mm/memory.c:5844 #1: ffffffff8e333f60 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline] #1: ffffffff8e333f60 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline] #1: ffffffff8e333f60 (rcu_read_lock){....}-{1:2}, at: __pte_offset_map+0x82/0x380 mm/pgtable-generic.c:287 #2: ffff88807af12c18 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline] #2: ffff88807af12c18 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: __pte_offset_map_lock+0x1ba/0x300 mm/pgtable-generic.c:375 stack backtrace: CPU: 1 PID: 7105 Comm: modprobe Not tainted 6.10.0-rc1-syzkaller-g7d0b3953f6d8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 valid_state+0x13a/0x1c0 kernel/locking/lockdep.c:4013 mark_lock_irq+0xbb/0xc20 kernel/locking/lockdep.c:4216 mark_lock+0x223/0x350 kernel/locking/lockdep.c:4678 mark_usage kernel/locking/lockdep.c:4564 [inline] __lock_acquire+0xb8e/0x1fd0 kernel/locking/lockdep.c:5091 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754 local_lock_acquire include/linux/local_lock_internal.h:29 [inline] __mmap_lock_do_trace_released+0x9c/0x620 mm/mmap_lock.c:243 __mmap_lock_trace_released include/linux/mmap_lock.h:42 [inline] mmap_read_unlock_non_owner include/linux/mmap_lock.h:176 [inline] do_mmap_read_unlock+0x5d/0x60 kernel/bpf/task_iter.c:1049 irq_work_single+0xe2/0x240 kernel/irq_work.c:221 irq_work_run_list kernel/irq_work.c:252 [inline] irq_work_run+0x18b/0x350 kernel/irq_work.c:261 __sysvec_irq_work+0xb8/0x430 arch/x86/kernel/irq_work.c:22 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0x9e/0xc0 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 RIP: 0010:flush_tlb_mm_range+0x3e7/0x5c0 arch/x86/mm/tlb.c:1036 Code: 2f 76 b9 00 8b 44 24 60 fa a9 00 02 00 00 74 05 e8 3e 22 5b 00 4c 89 f7 e8 d6 f4 ff ff e8 71 20 5b 00 fb 65 ff 0d 11 23 c0 7e 01 00 00 00 e8 cf 27 23 00 65 8b 05 00 72 c1 7e 85 c0 0f 84 a2 RSP: 0000:ffffc9000c5df600 EFLAGS: 00000246 RAX: da1dcd0f95316400 RBX: 1ffff920018bbecc RCX: ffffffff8172c78a RDX: dffffc0000000000 RSI: ffffffff8bcaba80 RDI: ffffffff8c1ff240 RBP: ffffc9000c5df6d0 R08: ffffffff92fa8587 R09: 1ffffffff25f50b0 R10: dffffc0000000000 R11: fffffbfff25f50b1 R12: 0000000000000001 R13: ffff88807d82c1c0 R14: ffff8880b953d6c0 R15: ffffc9000c5df660 flush_tlb_page arch/x86/include/asm/tlbflush.h:254 [inline] ptep_clear_flush+0x11a/0x170 mm/pgtable-generic.c:101 wp_page_copy mm/memory.c:3357 [inline] do_wp_page+0x1c19/0x5310 mm/memory.c:3683 handle_pte_fault+0x119a/0x7130 mm/memory.c:5396 __handle_mm_fault mm/memory.c:5523 [inline] handle_mm_fault+0x10df/0x1ba0 mm/memory.c:5688 do_user_addr_fault arch/x86/mm/fault.c:1338 [inline] handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x459/0x8c0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0033:0x7fc3ec2e121d Code: 29 c1 48 89 c8 48 89 14 c6 48 83 c2 10 eb 9c 49 8b 07 48 85 c0 74 7b 41 f6 87 1e 03 00 00 20 75 71 49 8b 57 60 48 85 d2 74 04 <48> 01 42 08 49 8b 57 58 48 85 d2 74 04 48 01 42 08 49 8b 57 68 48 RSP: 002b:00007ffe9314d4c0 EFLAGS: 00010202 RAX: 000055bacfc29000 RBX: 0000000000000032 RCX: 0000000000000029 RDX: 000055bacfc2ce20 RSI: 00007fc3ec2f82e0 RDI: 000000006fffffff RBP: 00007ffe9314d760 R08: 000000006ffffdff R09: 000000006ffffeff R10: 000000006fffff41 R11: 000000006ffffe35 R12: 0000000070000022 R13: 00000000effffef5 R14: 0000000000000000 R15: 00007fc3ec2f82a0 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 76 b9 jbe 0xffffffbb 2: 00 8b 44 24 60 fa add %cl,-0x59fdbbc(%rbx) 8: a9 00 02 00 00 test $0x200,%eax d: 74 05 je 0x14 f: e8 3e 22 5b 00 call 0x5b2252 14: 4c 89 f7 mov %r14,%rdi 17: e8 d6 f4 ff ff call 0xfffff4f2 1c: e8 71 20 5b 00 call 0x5b2092 21: fb sti 22: 65 ff 0d 11 23 c0 7e decl %gs:0x7ec02311(%rip) # 0x7ec0233a * 29: bf 01 00 00 00 mov $0x1,%edi <-- trapping instruction 2e: e8 cf 27 23 00 call 0x232802 33: 65 8b 05 00 72 c1 7e mov %gs:0x7ec17200(%rip),%eax # 0x7ec1723a 3a: 85 c0 test %eax,%eax 3c: 0f .byte 0xf 3d: 84 .byte 0x84 3e: a2 .byte 0xa2