------------[ cut here ]------------
======================================================
WARNING: possible circular locking dependency detected
5.15.168-syzkaller #0 Not tainted
------------------------------------------------------
syz.4.94/3895 is trying to acquire lock:
ffffffff8c7fc478 ((console_sem).lock){-.-.}-{2:2}, at: down_trylock+0x1c/0xa0 kernel/locking/semaphore.c:138
but task is already holding lock:
ffff8880b9028098 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x120/0x260 kernel/time/timer.c:946
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #3 (&base->lock){-.-.}-{2:2}:
lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
__raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
_raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
lock_timer_base+0x120/0x260 kernel/time/timer.c:946
__mod_timer+0x1d6/0xeb0 kernel/time/timer.c:1019
queue_delayed_work_on+0x156/0x250 kernel/workqueue.c:1715
psi_enqueue kernel/sched/stats.h:104 [inline]
enqueue_task+0x2fe/0x3a0 kernel/sched/core.c:1970
activate_task kernel/sched/core.c:2002 [inline]
wake_up_new_task+0x515/0xb60 kernel/sched/core.c:4519
kernel_clone+0x44e/0x960 kernel/fork.c:2625
kernel_thread+0x168/0x1e0 kernel/fork.c:2653
rest_init+0x21/0x330 init/main.c:706
start_kernel+0x48c/0x540 init/main.c:1140
secondary_startup_64_no_verify+0xb1/0xbb
-> #2 (&rq->__lock){-.-.}-{2:2}:
lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
_raw_spin_lock_nested+0x2d/0x40 kernel/locking/spinlock.c:368
raw_spin_rq_lock_nested+0x26/0x140 kernel/sched/core.c:475
raw_spin_rq_lock kernel/sched/sched.h:1326 [inline]
rq_lock kernel/sched/sched.h:1621 [inline]
task_fork_fair+0x5d/0x350 kernel/sched/fair.c:11484
sched_cgroup_fork+0x2d3/0x330 kernel/sched/core.c:4463
copy_process+0x224a/0x3ef0 kernel/fork.c:2317
kernel_clone+0x210/0x960 kernel/fork.c:2601
kernel_thread+0x168/0x1e0 kernel/fork.c:2653
rest_init+0x21/0x330 init/main.c:706
start_kernel+0x48c/0x540 init/main.c:1140
secondary_startup_64_no_verify+0xb1/0xbb
-> #1 (&p->pi_lock){-.-.}-{2:2}:
lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
__raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
_raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
try_to_wake_up+0xae/0x1300 kernel/sched/core.c:4027
up+0x6e/0x90 kernel/locking/semaphore.c:190
__up_console_sem+0x11a/0x1e0 kernel/printk/printk.c:256
console_unlock+0x1145/0x12b0 kernel/printk/printk.c:2760
vprintk_emit+0xbf/0x150 kernel/printk/printk.c:2274
_printk+0xd1/0x120 kernel/printk/printk.c:2299
addrconf_notify+0xa80/0xf30 net/ipv6/addrconf.c:3659
notifier_call_chain kernel/notifier.c:83 [inline]
raw_notifier_call_chain+0xd0/0x170 kernel/notifier.c:391
call_netdevice_notifiers_info net/core/dev.c:2018 [inline]
netdev_state_change+0x1a3/0x250 net/core/dev.c:1409
linkwatch_do_dev+0x10c/0x160 net/core/link_watch.c:167
__linkwatch_run_queue+0x4ca/0x7f0 net/core/link_watch.c:213
linkwatch_event+0x48/0x50 net/core/link_watch.c:252
process_one_work+0x8a1/0x10c0 kernel/workqueue.c:2310
worker_thread+0xaca/0x1280 kernel/workqueue.c:2457
kthread+0x3f6/0x4f0 kernel/kthread.c:334
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
-> #0 ((console_sem).lock){-.-.}-{2:2}:
check_prev_add kernel/locking/lockdep.c:3053 [inline]
check_prevs_add kernel/locking/lockdep.c:3172 [inline]
validate_chain+0x1649/0x5930 kernel/locking/lockdep.c:3788
__lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5012
lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
__raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
_raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
down_trylock+0x1c/0xa0 kernel/locking/semaphore.c:138
__down_trylock_console_sem+0x105/0x250 kernel/printk/printk.c:239
console_trylock kernel/printk/printk.c:2575 [inline]
console_trylock_spinning+0x8a/0x3f0 kernel/printk/printk.c:1867
vprintk_emit+0xa6/0x150 kernel/printk/printk.c:2273
_printk+0xd1/0x120 kernel/printk/printk.c:2299
report_bug+0x1e5/0x2e0 lib/bug.c:195
handle_bug+0x3d/0x70 arch/x86/kernel/traps.c:239
exc_invalid_op+0x16/0x40 arch/x86/kernel/traps.c:259
asm_exc_invalid_op+0x16/0x20 arch/x86/include/asm/idtentry.h:604
copy_from_user_nofault+0x15c/0x1c0
bpf_probe_read_user_common kernel/trace/bpf_trace.c:157 [inline]
____bpf_probe_read_user kernel/trace/bpf_trace.c:166 [inline]
bpf_probe_read_user+0x26/0x70 kernel/trace/bpf_trace.c:163
bpf_prog_02073d59a3c0f06f+0x3d/0xb68
bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
__bpf_prog_run include/linux/filter.h:628 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
bpf_trace_run3+0x1d1/0x380 kernel/trace/bpf_trace.c:1918
trace_timer_start include/trace/events/timer.h:52 [inline]
enqueue_timer+0x3ae/0x540 kernel/time/timer.c:586
internal_add_timer kernel/time/timer.c:611 [inline]
__mod_timer+0xa60/0xeb0 kernel/time/timer.c:1062
mrp_join_timer_arm net/802/mrp.c:596 [inline]
mrp_join_timer+0x14b/0x180 net/802/mrp.c:611
call_timer_fn+0x16d/0x560 kernel/time/timer.c:1451
expire_timers kernel/time/timer.c:1496 [inline]
__run_timers+0x67c/0x890 kernel/time/timer.c:1767
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1780
handle_softirqs+0x3a7/0x930 kernel/softirq.c:558
__do_softirq kernel/softirq.c:592 [inline]
invoke_softirq kernel/softirq.c:432 [inline]
__irq_exit_rcu+0x157/0x240 kernel/softirq.c:641
irq_exit_rcu+0x5/0x20 kernel/softirq.c:653
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1096 [inline]
sysvec_apic_timer_interrupt+0xa0/0xc0 arch/x86/kernel/apic/apic.c:1096
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676
__jump_label_update+0x0/0x3a0
static_key_disable_cpuslocked+0xca/0x1b0 kernel/jump_label.c:207
static_key_disable+0x16/0x20 kernel/jump_label.c:215
tracepoint_remove_func kernel/tracepoint.c:417 [inline]
tracepoint_probe_unregister+0x6e6/0x980 kernel/tracepoint.c:551
bpf_raw_tp_link_release+0x5f/0x80 kernel/bpf/syscall.c:2900
bpf_link_free kernel/bpf/syscall.c:2471 [inline]
bpf_link_put+0x234/0x2c0 kernel/bpf/syscall.c:2497
bpf_link_release+0x37/0x40 kernel/bpf/syscall.c:2505
__fput+0x3fe/0x8e0 fs/file_table.c:280
task_work_run+0x129/0x1a0 kernel/task_work.c:188
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop+0x106/0x130 kernel/entry/common.c:181
exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:214
__syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
syscall_exit_to_user_mode+0x5d/0x240 kernel/entry/common.c:307
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x66/0xd0
other info that might help us debug this:
Chain exists of:
(console_sem).lock --> &rq->__lock --> &base->lock
Possible unsafe locking scenario:
CPU0 CPU1
---- ----
lock(&base->lock);
lock(&rq->__lock);
lock(&base->lock);
lock((console_sem).lock);
*** DEADLOCK ***
7 locks held by syz.4.94/3895:
#0: ffffffff8c95f9c8 (tracepoints_mutex){+.+.}-{3:3}, at: tracepoint_probe_unregister+0x2e/0x980 kernel/tracepoint.c:548
#1: ffffffff8c7bd490 (cpu_hotplug_lock){++++}-{0:0}, at: static_key_disable+0xe/0x20 kernel/jump_label.c:214
#2: ffffffff8c9acde8 (jump_label_mutex){+.+.}-{3:3}, at: jump_label_lock kernel/jump_label.c:27 [inline]
#2: ffffffff8c9acde8 (jump_label_mutex){+.+.}-{3:3}, at: static_key_disable_cpuslocked+0x97/0x1b0 kernel/jump_label.c:205
#3: ffffc90000007be0 ((&app->join_timer)){+.-.}-{0:0}, at: lockdep_copy_map include/linux/lockdep.h:45 [inline]
#3: ffffc90000007be0 ((&app->join_timer)){+.-.}-{0:0}, at: call_timer_fn+0xbe/0x560 kernel/time/timer.c:1441
#4: ffff8880638b6cc8 (&app->lock){+.-.}-{2:2}, at: spin_lock include/linux/spinlock.h:363 [inline]
#4: ffff8880638b6cc8 (&app->lock){+.-.}-{2:2}, at: mrp_join_timer+0xc8/0x180 net/802/mrp.c:609
#5: ffff8880b9028098 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x120/0x260 kernel/time/timer.c:946
#6: ffffffff8c91fc20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 include/linux/rcupdate.h:311
stack backtrace:
CPU: 0 PID: 3895 Comm: syz.4.94 Not tainted 5.15.168-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106
check_noncircular+0x2f8/0x3b0 kernel/locking/lockdep.c:2133
check_prev_add kernel/locking/lockdep.c:3053 [inline]
check_prevs_add kernel/locking/lockdep.c:3172 [inline]
validate_chain+0x1649/0x5930 kernel/locking/lockdep.c:3788
__lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5012
lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
__raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
_raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
down_trylock+0x1c/0xa0 kernel/locking/semaphore.c:138
__down_trylock_console_sem+0x105/0x250 kernel/printk/printk.c:239
console_trylock kernel/printk/printk.c:2575 [inline]
console_trylock_spinning+0x8a/0x3f0 kernel/printk/printk.c:1867
vprintk_emit+0xa6/0x150 kernel/printk/printk.c:2273
_printk+0xd1/0x120 kernel/printk/printk.c:2299
report_bug+0x1e5/0x2e0 lib/bug.c:195
handle_bug+0x3d/0x70 arch/x86/kernel/traps.c:239
exc_invalid_op+0x16/0x40 arch/x86/kernel/traps.c:259
asm_exc_invalid_op+0x16/0x20 arch/x86/include/asm/idtentry.h:604
RIP: 0010:copy_from_user_nofault+0x15c/0x1c0 mm/maccess.c:226
Code: db 48 c7 c0 f2 ff ff ff 48 0f 44 c5 eb 0c e8 fb c7 d5 ff 48 c7 c0 f2 ff ff ff 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 e4 c7 d5 ff <0f> 0b e9 1e ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ef fe ff
RSP: 0018:ffffc90000007860 EFLAGS: 00010046
RAX: ffffffff81aaab4c RBX: 0000000000000000 RCX: ffff888021003b80
RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff81aaaa5d R09: fffffbfff20ec621
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: 0000000000000008 R14: 0000000000000000 R15: ffffc900000078c8
bpf_probe_read_user_common kernel/trace/bpf_trace.c:157 [inline]
____bpf_probe_read_user kernel/trace/bpf_trace.c:166 [inline]
bpf_probe_read_user+0x26/0x70 kernel/trace/bpf_trace.c:163
bpf_prog_02073d59a3c0f06f+0x3d/0xb68
bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
__bpf_prog_run include/linux/filter.h:628 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
bpf_trace_run3+0x1d1/0x380 kernel/trace/bpf_trace.c:1918
trace_timer_start include/trace/events/timer.h:52 [inline]
enqueue_timer+0x3ae/0x540 kernel/time/timer.c:586
internal_add_timer kernel/time/timer.c:611 [inline]
__mod_timer+0xa60/0xeb0 kernel/time/timer.c:1062
mrp_join_timer_arm net/802/mrp.c:596 [inline]
mrp_join_timer+0x14b/0x180 net/802/mrp.c:611
call_timer_fn+0x16d/0x560 kernel/time/timer.c:1451
expire_timers kernel/time/timer.c:1496 [inline]
__run_timers+0x67c/0x890 kernel/time/timer.c:1767
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1780
handle_softirqs+0x3a7/0x930 kernel/softirq.c:558
__do_softirq kernel/softirq.c:592 [inline]
invoke_softirq kernel/softirq.c:432 [inline]
__irq_exit_rcu+0x157/0x240 kernel/softirq.c:641
irq_exit_rcu+0x5/0x20 kernel/softirq.c:653
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1096 [inline]
sysvec_apic_timer_interrupt+0xa0/0xc0 arch/x86/kernel/apic/apic.c:1096
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676
RIP: 0010:__jump_label_update+0x0/0x3a0 kernel/jump_label.c:445
Code: 5d c3 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 76 fa ff ff 48 89 df e8 10 ff 22 00 e9 69 fa ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 <55> 41 57 41 56 41 55 41 54 53 48 83 ec 28 89 4c 24 14 48 89 d5 48
RSP: 0018:ffffc90003037cb0 EFLAGS: 00000292
RAX: ffffffff81a71999 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffffffff8c426960 RSI: ffffffff8c3c26b0 RDI: ffffffff8dd61458
RBP: 0000000000000001 R08: ffffffff81a7198e R09: fffffbfff1bac28c
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffff8dd61490
R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8dd61458
static_key_disable_cpuslocked+0xca/0x1b0 kernel/jump_label.c:207
static_key_disable+0x16/0x20 kernel/jump_label.c:215
tracepoint_remove_func kernel/tracepoint.c:417 [inline]
tracepoint_probe_unregister+0x6e6/0x980 kernel/tracepoint.c:551
bpf_raw_tp_link_release+0x5f/0x80 kernel/bpf/syscall.c:2900
bpf_link_free kernel/bpf/syscall.c:2471 [inline]
bpf_link_put+0x234/0x2c0 kernel/bpf/syscall.c:2497
bpf_link_release+0x37/0x40 kernel/bpf/syscall.c:2505
__fput+0x3fe/0x8e0 fs/file_table.c:280
task_work_run+0x129/0x1a0 kernel/task_work.c:188
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop+0x106/0x130 kernel/entry/common.c:181
exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:214
__syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
syscall_exit_to_user_mode+0x5d/0x240 kernel/entry/common.c:307
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f3e05b6cff9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffe98785688 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 000000000000dedb RCX: 00007f3e05b6cff9
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007f3e05d26a80 R08: 0000000000000001 R09: 00007ffe9878597f
R10: 00007f3e059ef000 R11: 0000000000000246 R12: 000000000000df32
R13: 00007ffe98785790 R14: 0000000000000032 R15: ffffffffffffffff
WARNING: CPU: 0 PID: 3895 at mm/maccess.c:226 copy_from_user_nofault+0x15c/0x1c0
Modules linked in:
CPU: 0 PID: 3895 Comm: syz.4.94 Not tainted 5.15.168-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:copy_from_user_nofault+0x15c/0x1c0 mm/maccess.c:226
Code: db 48 c7 c0 f2 ff ff ff 48 0f 44 c5 eb 0c e8 fb c7 d5 ff 48 c7 c0 f2 ff ff ff 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 e4 c7 d5 ff <0f> 0b e9 1e ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ef fe ff
RSP: 0018:ffffc90000007860 EFLAGS: 00010046
RAX: ffffffff81aaab4c RBX: 0000000000000000 RCX: ffff888021003b80
RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000
RBP: dffffc0000000000 R08: ffffffff81aaaa5d R09: fffffbfff20ec621
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000
R13: 0000000000000008 R14: 0000000000000000 R15: ffffc900000078c8
FS: 0000555578881500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c2b3c9f CR3: 00000000283fa000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
bpf_probe_read_user_common kernel/trace/bpf_trace.c:157 [inline]
____bpf_probe_read_user kernel/trace/bpf_trace.c:166 [inline]
bpf_probe_read_user+0x26/0x70 kernel/trace/bpf_trace.c:163
bpf_prog_02073d59a3c0f06f+0x3d/0xb68
bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
__bpf_prog_run include/linux/filter.h:628 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
bpf_trace_run3+0x1d1/0x380 kernel/trace/bpf_trace.c:1918
trace_timer_start include/trace/events/timer.h:52 [inline]
enqueue_timer+0x3ae/0x540 kernel/time/timer.c:586
internal_add_timer kernel/time/timer.c:611 [inline]
__mod_timer+0xa60/0xeb0 kernel/time/timer.c:1062
mrp_join_timer_arm net/802/mrp.c:596 [inline]
mrp_join_timer+0x14b/0x180 net/802/mrp.c:611
call_timer_fn+0x16d/0x560 kernel/time/timer.c:1451
expire_timers kernel/time/timer.c:1496 [inline]
__run_timers+0x67c/0x890 kernel/time/timer.c:1767
run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1780
handle_softirqs+0x3a7/0x930 kernel/softirq.c:558
__do_softirq kernel/softirq.c:592 [inline]
invoke_softirq kernel/softirq.c:432 [inline]
__irq_exit_rcu+0x157/0x240 kernel/softirq.c:641
irq_exit_rcu+0x5/0x20 kernel/softirq.c:653
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1096 [inline]
sysvec_apic_timer_interrupt+0xa0/0xc0 arch/x86/kernel/apic/apic.c:1096
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676
RIP: 0010:__jump_label_update+0x0/0x3a0 kernel/jump_label.c:445
Code: 5d c3 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 76 fa ff ff 48 89 df e8 10 ff 22 00 e9 69 fa ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 <55> 41 57 41 56 41 55 41 54 53 48 83 ec 28 89 4c 24 14 48 89 d5 48
RSP: 0018:ffffc90003037cb0 EFLAGS: 00000292
RAX: ffffffff81a71999 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffffffff8c426960 RSI: ffffffff8c3c26b0 RDI: ffffffff8dd61458
RBP: 0000000000000001 R08: ffffffff81a7198e R09: fffffbfff1bac28c
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffff8dd61490
R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff8dd61458
static_key_disable_cpuslocked+0xca/0x1b0 kernel/jump_label.c:207
static_key_disable+0x16/0x20 kernel/jump_label.c:215
tracepoint_remove_func kernel/tracepoint.c:417 [inline]
tracepoint_probe_unregister+0x6e6/0x980 kernel/tracepoint.c:551
bpf_raw_tp_link_release+0x5f/0x80 kernel/bpf/syscall.c:2900
bpf_link_free kernel/bpf/syscall.c:2471 [inline]
bpf_link_put+0x234/0x2c0 kernel/bpf/syscall.c:2497
bpf_link_release+0x37/0x40 kernel/bpf/syscall.c:2505
__fput+0x3fe/0x8e0 fs/file_table.c:280
task_work_run+0x129/0x1a0 kernel/task_work.c:188
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop+0x106/0x130 kernel/entry/common.c:181
exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:214
__syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
syscall_exit_to_user_mode+0x5d/0x240 kernel/entry/common.c:307
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f3e05b6cff9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffe98785688 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 000000000000dedb RCX: 00007f3e05b6cff9
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007f3e05d26a80 R08: 0000000000000001 R09: 00007ffe9878597f
R10: 00007f3e059ef000 R11: 0000000000000246 R12: 000000000000df32
R13: 00007ffe98785790 R14: 0000000000000032 R15: ffffffffffffffff
----------------
Code disassembly (best guess):
0: 5d pop %rbp
1: c3 ret
2: 89 d9 mov %ebx,%ecx
4: 80 e1 07 and $0x7,%cl
7: 80 c1 03 add $0x3,%cl
a: 38 c1 cmp %al,%cl
c: 0f 8c 76 fa ff ff jl 0xfffffa88
12: 48 89 df mov %rbx,%rdi
15: e8 10 ff 22 00 call 0x22ff2a
1a: e9 69 fa ff ff jmp 0xfffffa88
1f: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1)
26: 00 00 00
29: 90 nop
* 2a: 55 push %rbp <-- trapping instruction
2b: 41 57 push %r15
2d: 41 56 push %r14
2f: 41 55 push %r13
31: 41 54 push %r12
33: 53 push %rbx
34: 48 83 ec 28 sub $0x28,%rsp
38: 89 4c 24 14 mov %ecx,0x14(%rsp)
3c: 48 89 d5 mov %rdx,%rbp
3f: 48 rex.W