================================ WARNING: inconsistent lock state 6.9.0-rc5-syzkaller-00355-g2c8159388952 #0 Not tainted -------------------------------- inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. syz-executor.2/11188 [HC0[0]:SC1[1]:HE0:SE0] takes: ffff8880b9438a80 (lock#11){+.?.}-{2:2}, at: local_lock_acquire include/linux/local_lock_internal.h:29 [inline] ffff8880b9438a80 (lock#11){+.?.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x7f/0x790 mm/mmap_lock.c:237 {SOFTIRQ-ON-W} state was registered at: lock_acquire kernel/locking/lockdep.c:5754 [inline] lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719 local_lock_acquire include/linux/local_lock_internal.h:29 [inline] __mmap_lock_do_trace_acquire_returned+0x97/0x790 mm/mmap_lock.c:237 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_lock include/linux/mmap_lock.h:147 [inline] acct_collect+0x7a6/0x8e0 kernel/acct.c:564 do_exit+0x1a32/0x2c10 kernel/exit.c:857 do_group_exit+0xd3/0x2a0 kernel/exit.c:1027 get_signal+0x2616/0x2710 kernel/signal.c:2911 arch_do_signal_or_restart+0x90/0x7e0 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x14a/0x2a0 kernel/entry/common.c:218 do_syscall_64+0xdc/0x260 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f irq event stamp: 3255 hardirqs last enabled at (3254): [] __do_softirq+0x1d6/0x922 kernel/softirq.c:538 hardirqs last disabled at (3255): [] __raw_spin_lock_irq include/linux/spinlock_api_smp.h:117 [inline] hardirqs last disabled at (3255): [] _raw_spin_lock_irq+0x45/0x50 kernel/locking/spinlock.c:170 softirqs last enabled at (3232): [] spin_unlock_bh include/linux/spinlock.h:396 [inline] softirqs last enabled at (3232): [] bpf_link_free_id kernel/bpf/syscall.c:3002 [inline] softirqs last enabled at (3232): [] bpf_link_free_id kernel/bpf/syscall.c:2995 [inline] softirqs last enabled at (3232): [] bpf_link_free+0x71/0x320 kernel/bpf/syscall.c:3048 softirqs last disabled at (3253): [] invoke_softirq kernel/softirq.c:428 [inline] softirqs last disabled at (3253): [] __irq_exit_rcu kernel/softirq.c:633 [inline] softirqs last disabled at (3253): [] irq_exit_rcu+0xb9/0x120 kernel/softirq.c:645 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(lock#11); lock(lock#11); *** DEADLOCK *** 8 locks held by syz-executor.2/11188: #0: ffffffff8d826ce8 (tracepoints_mutex){+.+.}-{3:3}, at: tracepoint_probe_unregister+0x9c/0xd30 kernel/tracepoint.c:548 #1: ffffffff8d6545b0 (cpu_hotplug_lock){++++}-{0:0}, at: static_key_disable+0x12/0x20 kernel/jump_label.c:242 #2: ffffffff8d8bc8e8 (jump_label_mutex){+.+.}-{3:3}, at: jump_label_lock kernel/jump_label.c:27 [inline] #2: ffffffff8d8bc8e8 (jump_label_mutex){+.+.}-{3:3}, at: static_key_disable_cpuslocked+0x10b/0x1c0 kernel/jump_label.c:233 #3: ffffc90000007cb0 (&(&hwstats->traffic_dw)->timer){..-.}-{0:0}, at: call_timer_fn+0x11a/0x610 kernel/time/timer.c:1790 #4: ffffffff8d7b0e20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline] #4: ffffffff8d7b0e20 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline] #4: ffffffff8d7b0e20 (rcu_read_lock){....}-{1:2}, at: __queue_work+0xf2/0x1020 kernel/workqueue.c:2324 #5: ffff8880b943d998 (&pool->lock){-.-.}-{2:2}, at: __queue_work+0x39e/0x1020 kernel/workqueue.c:2360 #6: ffffffff8d7b0e20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline] #6: ffffffff8d7b0e20 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline] #6: ffffffff8d7b0e20 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2380 [inline] #6: ffffffff8d7b0e20 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run3+0xf8/0x440 kernel/trace/bpf_trace.c:2421 #7: ffff88807cc00b20 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:165 [inline] #7: ffff88807cc00b20 (&mm->mmap_lock){++++}-{3:3}, at: stack_map_get_build_id_offset+0x1e8/0x7d0 kernel/bpf/stackmap.c:141 stack backtrace: CPU: 0 PID: 11188 Comm: syz-executor.2 Not tainted 6.9.0-rc5-syzkaller-00355-g2c8159388952 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114 print_usage_bug kernel/locking/lockdep.c:3971 [inline] valid_state kernel/locking/lockdep.c:4013 [inline] mark_lock_irq kernel/locking/lockdep.c:4216 [inline] mark_lock+0x923/0xc60 kernel/locking/lockdep.c:4678 mark_usage kernel/locking/lockdep.c:4567 [inline] __lock_acquire+0x13d4/0x3b30 kernel/locking/lockdep.c:5091 lock_acquire kernel/locking/lockdep.c:5754 [inline] lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719 local_lock_acquire include/linux/local_lock_internal.h:29 [inline] __mmap_lock_do_trace_acquire_returned+0x97/0x790 mm/mmap_lock.c:237 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:166 [inline] stack_map_get_build_id_offset+0x5df/0x7d0 kernel/bpf/stackmap.c:141 __bpf_get_stack+0x6bf/0x700 kernel/bpf/stackmap.c:449 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1985 [inline] bpf_get_stack_raw_tp+0x124/0x160 kernel/trace/bpf_trace.c:1975 ___bpf_prog_run+0x3e51/0xabd0 kernel/bpf/core.c:1997 __bpf_prog_run32+0xc1/0x100 kernel/bpf/core.c:2236 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline] __bpf_prog_run include/linux/filter.h:657 [inline] bpf_prog_run include/linux/filter.h:664 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline] bpf_trace_run3+0x167/0x440 kernel/trace/bpf_trace.c:2421 __bpf_trace_workqueue_queue_work+0x101/0x140 include/trace/events/workqueue.h:23 trace_workqueue_queue_work include/trace/events/workqueue.h:23 [inline] __queue_work+0x627/0x1020 kernel/workqueue.c:2382 call_timer_fn+0x1a0/0x610 kernel/time/timer.c:1793 expire_timers kernel/time/timer.c:1839 [inline] __run_timers+0x567/0xaf0 kernel/time/timer.c:2418 __run_timer_base kernel/time/timer.c:2429 [inline] __run_timer_base kernel/time/timer.c:2422 [inline] run_timer_base+0x111/0x190 kernel/time/timer.c:2438 run_timer_softirq+0x1a/0x40 kernel/time/timer.c:2448 __do_softirq+0x218/0x922 kernel/softirq.c:554 invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu kernel/softirq.c:633 [inline] irq_exit_rcu+0xb9/0x120 kernel/softirq.c:645 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline] sysvec_apic_timer_interrupt+0x95/0xb0 arch/x86/kernel/apic/apic.c:1043 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:lock_is_held_type+0x107/0x150 kernel/locking/lockdep.c:5830 Code: 00 00 b8 ff ff ff ff 65 0f c1 05 cc 0c 27 75 83 f8 01 75 2d 9c 58 f6 c4 02 75 43 48 f7 04 24 00 02 00 00 74 01 fb 48 83 c4 08 <44> 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 45 31 ed eb RSP: 0018:ffffc9000399fa70 EFLAGS: 00000292 RAX: 0000000000000046 RBX: ffff888057bac728 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffffff8b0cb100 RDI: ffffffff8b6f55a0 RBP: ffffffff8d7b0d60 R08: ffffffff813163a3 R09: 0000000000000000 R10: ffffc9000399fc68 R11: 0000000000000000 R12: ffff888057babc00 R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000003 lock_is_held include/linux/lockdep.h:231 [inline] __might_resched+0x4ca/0x5e0 kernel/sched/core.c:10159 __mutex_lock_common kernel/locking/mutex.c:585 [inline] __mutex_lock+0xe2/0x9c0 kernel/locking/mutex.c:752 arch_jump_label_transform_queue+0x73/0x120 arch/x86/kernel/jump_label.c:136 __jump_label_update+0x125/0x420 kernel/jump_label.c:475 jump_label_update+0x1d7/0x400 kernel/jump_label.c:829 static_key_disable_cpuslocked+0x154/0x1c0 kernel/jump_label.c:235 static_key_disable+0x1a/0x20 kernel/jump_label.c:243 tracepoint_remove_func kernel/tracepoint.c:417 [inline] tracepoint_probe_unregister+0x4a7/0xd30 kernel/tracepoint.c:551 bpf_raw_tp_link_release+0x55/0xa0 kernel/bpf/syscall.c:3511 bpf_link_free+0x12b/0x320 kernel/bpf/syscall.c:3052 bpf_link_put_direct kernel/bpf/syscall.c:3093 [inline] bpf_link_release+0x63/0x80 kernel/bpf/syscall.c:3100 __fput+0x270/0xb80 fs/file_table.c:422 __fput_sync+0x47/0x50 fs/file_table.c:507 __do_sys_close fs/open.c:1556 [inline] __se_sys_close fs/open.c:1541 [inline] __x64_sys_close+0x86/0x100 fs/open.c:1541 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x260 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fae0ca7cd9a Code: 48 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c 24 0c e8 03 7f 02 00 8b 7c 24 0c 89 c2 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 36 89 d7 89 44 24 0c e8 63 7f 02 00 8b 44 24 RSP: 002b:00007ffd24868b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fae0ca7cd9a RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007fae0cbad980 R08: 00007fae0ca00000 R09: 0000000000000001 R10: 0000000000000001 R11: 0000000000000293 R12: 000000000007bfbe R13: 000000000007bf8c R14: 00007ffd24868d30 R15: 00007fae0ca34cb0 ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: b8 ff ff ff ff mov $0xffffffff,%eax 7: 65 0f c1 05 cc 0c 27 xadd %eax,%gs:0x75270ccc(%rip) # 0x75270cdb e: 75 f: 83 f8 01 cmp $0x1,%eax 12: 75 2d jne 0x41 14: 9c pushf 15: 58 pop %rax 16: f6 c4 02 test $0x2,%ah 19: 75 43 jne 0x5e 1b: 48 f7 04 24 00 02 00 testq $0x200,(%rsp) 22: 00 23: 74 01 je 0x26 25: fb sti 26: 48 83 c4 08 add $0x8,%rsp * 2a: 44 89 e8 mov %r13d,%eax <-- trapping instruction 2d: 5b pop %rbx 2e: 5d pop %rbp 2f: 41 5c pop %r12 31: 41 5d pop %r13 33: 41 5e pop %r14 35: 41 5f pop %r15 37: c3 ret 38: cc int3 39: cc int3 3a: cc int3 3b: cc int3 3c: 45 31 ed xor %r13d,%r13d 3f: eb .byte 0xeb