================================ WARNING: inconsistent lock state syzkaller #0 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. syz.4.900/9565 [HC0[0]:SC1[1]:HE1:SE0] takes: ffff88805877eca8 (&p->tcfa_lock){+.?.}-{3:3}, at: spin_lock include/linux/spinlock.h:351 [inline] ffff88805877eca8 (&p->tcfa_lock){+.?.}-{3:3}, at: est_fetch_counters net/core/gen_estimator.c:67 [inline] ffff88805877eca8 (&p->tcfa_lock){+.?.}-{3:3}, at: est_timer+0xd4/0x9f0 net/core/gen_estimator.c:83 {SOFTIRQ-ON-W} state was registered at: lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] tcf_csum_init+0x45c/0x7e0 net/sched/act_csum.c:104 tcf_action_init_1+0x463/0x6d0 net/sched/act_api.c:1431 tcf_action_init+0x2cf/0xab0 net/sched/act_api.c:1506 tcf_action_add net/sched/act_api.c:2100 [inline] tc_ctl_action+0x430/0xbd0 net/sched/act_api.c:2157 rtnetlink_rcv_msg+0x77c/0xb70 net/core/rtnetlink.c:6955 netlink_rcv_skb+0x205/0x470 net/netlink/af_netlink.c:2552 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline] netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1346 netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1896 sock_sendmsg_nosec net/socket.c:714 [inline] __sock_sendmsg+0x219/0x270 net/socket.c:729 ____sys_sendmsg+0x505/0x830 net/socket.c:2614 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668 __sys_sendmsg net/socket.c:2700 [inline] __do_sys_sendmsg net/socket.c:2705 [inline] __se_sys_sendmsg net/socket.c:2703 [inline] __x64_sys_sendmsg+0x19b/0x260 net/socket.c:2703 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f irq event stamp: 652 hardirqs last enabled at (652): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] hardirqs last enabled at (652): [] _raw_spin_unlock_irq+0x23/0x50 kernel/locking/spinlock.c:202 hardirqs last disabled at (651): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:117 [inline] hardirqs last disabled at (651): [] _raw_spin_lock_irq+0x7d/0xf0 kernel/locking/spinlock.c:170 softirqs last enabled at (412): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last enabled at (412): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last enabled at (412): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 softirqs last disabled at (611): [] __do_softirq kernel/softirq.c:613 [inline] softirqs last disabled at (611): [] invoke_softirq kernel/softirq.c:453 [inline] softirqs last disabled at (611): [] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&p->tcfa_lock); lock(&p->tcfa_lock); *** DEADLOCK *** 2 locks held by syz.4.900/9565: #0: ffff888031af4d20 (&mm->mmap_lock){++++}-{4:4}, at: mmap_write_lock include/linux/mmap_lock.h:397 [inline] #0: ffff888031af4d20 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0x28e/0xb50 mm/mmap.c:1288 #1: ffffc90000007be0 ((&est->timer)){+.-.}-{0:0}, at: call_timer_fn+0xbe/0x5f0 kernel/time/timer.c:1744 stack backtrace: CPU: 0 UID: 0 PID: 9565 Comm: syz.4.900 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Call Trace: dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_usage_bug+0x297/0x2e0 kernel/locking/lockdep.c:4042 valid_state+0xc3/0xf0 kernel/locking/lockdep.c:4056 mark_lock_irq+0x36/0x390 kernel/locking/lockdep.c:4267 mark_lock+0x11b/0x190 kernel/locking/lockdep.c:4753 mark_usage kernel/locking/lockdep.c:-1 [inline] __lock_acquire+0x680/0xd20 kernel/locking/lockdep.c:5191 lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:351 [inline] est_fetch_counters net/core/gen_estimator.c:67 [inline] est_timer+0xd4/0x9f0 net/core/gen_estimator.c:83 call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747 expire_timers kernel/time/timer.c:1798 [inline] __run_timers kernel/time/timer.c:2372 [inline] __run_timer_base+0x61a/0x860 kernel/time/timer.c:2384 run_timer_base kernel/time/timer.c:2393 [inline] run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0xa8/0x110 kernel/locking/spinlock.c:194 Code: 74 05 e8 6b 77 4a f6 48 c7 44 24 20 00 00 00 00 9c 8f 44 24 20 f6 44 24 21 02 75 4f f7 c3 00 02 00 00 74 01 fb bf 01 00 00 00 53 1f 13 f6 65 8b 05 0c c2 23 07 85 c0 74 40 48 c7 04 24 0e 36 RSP: 0018:ffffc9000486f460 EFLAGS: 00000206 RAX: a478f90cb35a1000 RBX: 0000000000000a02 RCX: a478f90cb35a1000 RDX: 0000000000000006 RSI: ffffffff8d9b94f8 RDI: 0000000000000001 RBP: ffffc9000486f4e0 R08: ffffffff8fa38b37 R09: 1ffffffff1f47166 R10: dffffc0000000000 R11: fffffbfff1f47167 R12: dffffc0000000000 R13: ffff8880287ef840 R14: ffffffff99d62bf0 R15: 1ffff9200090de8c __debug_check_no_obj_freed lib/debugobjects.c:1108 [inline] debug_check_no_obj_freed+0x451/0x470 lib/debugobjects.c:1129 slab_free_hook mm/slub.c:2348 [inline] slab_free mm/slub.c:4680 [inline] kmem_cache_free+0x113/0x400 mm/slub.c:4782 anon_vma_free mm/rmap.c:137 [inline] __put_anon_vma+0x12b/0x2d0 mm/rmap.c:2764 put_anon_vma include/linux/rmap.h:117 [inline] unlink_anon_vmas+0x503/0x670 mm/rmap.c:444 free_pgtables+0x72b/0x9c0 mm/memory.c:413 exit_mmap+0x444/0xb50 mm/mmap.c:1291 __mmput+0x118/0x420 kernel/fork.c:1130 exit_mm+0x1da/0x2c0 kernel/exit.c:582 do_exit+0x648/0x2300 kernel/exit.c:949 do_group_exit+0x21c/0x2d0 kernel/exit.c:1102 get_signal+0x1286/0x1340 kernel/signal.c:3034 arch_do_signal_or_restart+0x9a/0x750 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop+0x75/0x110 kernel/entry/common.c:40 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline] do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f581d58ebe9 Code: Unable to access opcode bytes at 0x7f581d58ebbf. RSP: 002b:00007f581e3c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: 000000000000000a RBX: 00007f581d7c5fa0 RCX: 00007f581d58ebe9 RDX: 0000000000000000 RSI: 0000200000000240 RDI: ffffffffffffff9c RBP: 00007f581d611e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f581d7c6038 R14: 00007f581d7c5fa0 R15: 00007fffb4364808 ---------------- Code disassembly (best guess): 0: 74 05 je 0x7 2: e8 6b 77 4a f6 call 0xf64a7772 7: 48 c7 44 24 20 00 00 movq $0x0,0x20(%rsp) e: 00 00 10: 9c pushf 11: 8f 44 24 20 pop 0x20(%rsp) 15: f6 44 24 21 02 testb $0x2,0x21(%rsp) 1a: 75 4f jne 0x6b 1c: f7 c3 00 02 00 00 test $0x200,%ebx 22: 74 01 je 0x25 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 53 1f 13 f6 call 0xf6131f82 <-- trapping instruction 2f: 65 8b 05 0c c2 23 07 mov %gs:0x723c20c(%rip),%eax # 0x723c242 36: 85 c0 test %eax,%eax 38: 74 40 je 0x7a 3a: 48 rex.W 3b: c7 .byte 0xc7 3c: 04 24 add $0x24,%al 3e: 0e (bad) 3f: 36 ss