[ 17.946041][ C2] hrtimer: interrupt took 7934309 ns [ 34.519026][ T327] ip (327) used greatest stack depth: 24800 bytes left [ 34.807307][ T332] ip (332) used greatest stack depth: 24672 bytes left [ 264.797057][ T4679] ip (4679) used greatest stack depth: 24096 bytes left [ 826.407686][ T7211] nft (7211) used greatest stack depth: 24032 bytes left [ 1312.155170][ C2] [ 1312.155427][ C2] ================================ [ 1312.155839][ C2] WARNING: inconsistent lock state [ 1312.156251][ C2] 6.15.0-virtme #1 Not tainted [ 1312.156670][ C2] -------------------------------- [ 1312.157076][ C2] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 1312.157582][ C2] nft_concat_rang/11708 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 1312.158097][ C2] ffffffffb19d8518 (&xa->xa_lock#8){+.?.}-{3:3}, at: xa_set_mark+0x73/0x120 [ 1312.158804][ C2] {SOFTIRQ-ON-W} state was registered at: [ 1312.159184][ C2] __lock_acquire+0x20b/0x7e0 [ 1312.159596][ C2] lock_acquire.part.0+0xb6/0x240 [ 1312.159995][ C2] _raw_spin_lock+0x33/0x40 [ 1312.160397][ C2] xa_store+0x1c/0x50 [ 1312.160734][ C2] ref_tracker_dir_debugfs+0x168/0x1b0 [ 1312.161143][ C2] init_net_debugfs+0x15/0x70 [ 1312.161566][ C2] do_one_initcall+0x8c/0x1e0 [ 1312.161999][ C2] do_initcalls+0x176/0x280 [ 1312.162411][ C2] kernel_init_freeable+0x22d/0x300 [ 1312.162828][ C2] kernel_init+0x20/0x200 [ 1312.163256][ C2] ret_from_fork+0x240/0x320 [ 1312.163660][ C2] ret_from_fork_asm+0x1a/0x30 [ 1312.164067][ C2] irq event stamp: 3380 [ 1312.164380][ C2] hardirqs last enabled at (3380): [] _raw_spin_unlock_irqrestore+0x5d/0x80 [ 1312.165197][ C2] hardirqs last disabled at (3379): [] _raw_spin_lock_irqsave+0x5b/0x60 [ 1312.165795][ C2] softirqs last enabled at (2722): [] handle_softirqs+0x358/0x620 [ 1312.166270][ C2] softirqs last disabled at (3283): [] __irq_exit_rcu+0xfa/0x160 [ 1312.166707][ C2] [ 1312.166707][ C2] other info that might help us debug this: [ 1312.167071][ C2] Possible unsafe locking scenario: [ 1312.167071][ C2] [ 1312.167431][ C2] CPU0 [ 1312.167605][ C2] ---- [ 1312.167785][ C2] lock(&xa->xa_lock#8); [ 1312.167975][ C2] [ 1312.168160][ C2] lock(&xa->xa_lock#8); [ 1312.168411][ C2] [ 1312.168411][ C2] *** DEADLOCK *** [ 1312.168411][ C2] [ 1312.168757][ C2] 5 locks held by nft_concat_rang/11708: [ 1312.169003][ C2] #0: ffff88801245ee88 (&sig->cred_guard_mutex){+.+.}-{4:4}, at: bprm_execve+0x4f/0x490 [ 1312.169465][ C2] #1: ffff88801245ef20 (&sig->exec_update_lock){++++}-{4:4}, at: exec_mmap+0x8c/0x840 [ 1312.169907][ C2] #2: ffff888009ad60a0 (&mm->mmap_lock){++++}-{4:4}, at: exit_mmap+0x190/0x800 [ 1312.170442][ C2] #3: ffffffffaef79c60 (rcu_read_lock){....}-{1:3}, at: unwind_next_frame+0x147/0x1e10 [ 1312.170871][ C2] #4: ffffc90000218d60 ((&icsk->icsk_retransmit_timer)){+.-.}-{0:0}, at: call_timer_fn+0xe7/0x220 [ 1312.171396][ C2] [ 1312.171396][ C2] stack backtrace: [ 1312.171701][ C2] CPU: 2 UID: 0 PID: 11708 Comm: nft_concat_rang Not tainted 6.15.0-virtme #1 PREEMPT(full) [ 1312.171706][ C2] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1312.171708][ C2] Call Trace: [ 1312.171710][ C2] [ 1312.171712][ C2] dump_stack_lvl+0x82/0xd0 [ 1312.171719][ C2] print_usage_bug.part.0+0x25f/0x360 [ 1312.171725][ C2] mark_lock_irq+0x343/0x400 [ 1312.171730][ C2] ? save_trace+0x52/0x170 [ 1312.171736][ C2] mark_lock+0x174/0x2f0 [ 1312.171739][ C2] mark_usage+0x46/0x150 [ 1312.171742][ C2] __lock_acquire+0x20b/0x7e0 [ 1312.171745][ C2] ? unwind_next_frame+0x4f8/0x1e10 [ 1312.171749][ C2] ? kasan_save_stack+0x24/0x50 [ 1312.171754][ C2] lock_acquire.part.0+0xb6/0x240 [ 1312.171758][ C2] ? xa_set_mark+0x73/0x120 [ 1312.171761][ C2] ? rcu_is_watching+0x12/0xc0 [ 1312.171766][ C2] ? lock_acquire+0x10c/0x170 [ 1312.171768][ C2] ? xa_set_mark+0x73/0x120 [ 1312.171772][ C2] _raw_spin_lock+0x33/0x40 [ 1312.171775][ C2] ? xa_set_mark+0x73/0x120 [ 1312.171778][ C2] xa_set_mark+0x73/0x120 [ 1312.171780][ C2] ? __pfx_xa_set_mark+0x10/0x10 [ 1312.171783][ C2] ? __lock_acquire+0x44d/0x7e0 [ 1312.171787][ C2] ? find_held_lock+0x2b/0x80 [ 1312.171792][ C2] ref_tracker_dir_exit+0xb2/0x740 [ 1312.171797][ C2] ? trace_kfree+0x2a/0xd0 [ 1312.171801][ C2] ? kfree+0x2d/0x320 [ 1312.171804][ C2] ? _raw_spin_unlock_irqrestore+0x5d/0x80 [ 1312.171807][ C2] ? __pfx_ref_tracker_dir_exit+0x10/0x10 [ 1312.171811][ C2] ? ref_tracker_free+0x35d/0x900 [ 1312.171814][ C2] ? __lock_acquire+0x44d/0x7e0 [ 1312.171817][ C2] ? __pfx_ref_tracker_free+0x10/0x10 [ 1312.171820][ C2] ? __sk_destruct+0x383/0x780 [ 1312.171825][ C2] ? call_timer_fn+0x13a/0x220 [ 1312.171828][ C2] ? __run_timers+0x543/0x810 [ 1312.171831][ C2] ? run_timer_base+0xb3/0x110 [ 1312.171835][ C2] __put_net+0x83/0x140 [ 1312.171841][ C2] ? arch_stack_walk+0x8b/0xf0 [ 1312.171846][ C2] ? __pfx___put_net+0x10/0x10 [ 1312.171850][ C2] ? bpf_sk_storage_free+0x9f/0x1c0 [ 1312.171856][ C2] __sk_destruct+0x58a/0x780 [ 1312.171859][ C2] ? __pfx_tcp_write_timer+0x10/0x10 [ 1312.171865][ C2] call_timer_fn+0x13a/0x220 [ 1312.171867][ C2] ? call_timer_fn+0xe7/0x220 [ 1312.171869][ C2] ? call_timer_fn+0xe7/0x220 [ 1312.171872][ C2] ? __pfx_call_timer_fn+0x10/0x10 [ 1312.171877][ C2] ? mark_held_locks+0x49/0x80 [ 1312.171881][ C2] __run_timers+0x543/0x810 [ 1312.171884][ C2] ? __pfx_tcp_write_timer+0x10/0x10 [ 1312.171889][ C2] ? __pfx___run_timers+0x10/0x10 [ 1312.171893][ C2] ? do_raw_spin_lock+0x130/0x270 [ 1312.171896][ C2] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 1312.171899][ C2] ? lock_acquire+0x10c/0x170 [ 1312.171902][ C2] ? run_timer_base+0xab/0x110 [ 1312.171906][ C2] run_timer_base+0xb3/0x110 [ 1312.171909][ C2] run_timer_softirq+0x1a/0x30 [ 1312.171911][ C2] handle_softirqs+0x21b/0x620 [ 1312.171918][ C2] __irq_exit_rcu+0xfa/0x160 [ 1312.171920][ C2] irq_exit_rcu+0xe/0x30 [ 1312.171923][ C2] sysvec_apic_timer_interrupt+0xa8/0xc0 [ 1312.171928][ C2] [ 1312.171929][ C2] [ 1312.171930][ C2] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1312.171934][ C2] RIP: 0010:lock_acquire.part.0+0xf2/0x240 [ 1312.171938][ C2] Code: ff ff ff 65 0f c1 05 8d 6c 3a 05 83 f8 01 0f 85 3e 01 00 00 9c 58 f6 c4 02 0f 85 29 01 00 00 48 85 db 74 01 fb 48 8b 44 24 30 <65> 48 2b 05 be 2b 3a 05 0f 85 3a 01 00 00 48 83 c4 38 5b 5d 41 5c [ 1312.171941][ C2] RSP: 0018:ffffc9000411f230 EFLAGS: 00000206 [ 1312.171945][ C2] RAX: 0a5fac97f128f700 RBX: 0000000000000200 RCX: 0000000000000001 [ 1312.171947][ C2] RDX: 0000000000000000 RSI: ffffffffaeaa43c6 RDI: ffffffffae25f220 [ 1312.171949][ C2] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 1312.171951][ C2] R10: 0000000000000000 R11: ffffffffaef79c60 R12: 0000000000000002 [ 1312.171952][ C2] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffffaef79c60 [ 1312.171959][ C2] ? rcu_is_watching+0x12/0xc0 [ 1312.171962][ C2] ? lock_acquire+0x10c/0x170 [ 1312.171965][ C2] ? unwind_next_frame+0x147/0x1e10 [ 1312.171968][ C2] unwind_next_frame+0x15b/0x1e10 [ 1312.171971][ C2] ? unwind_next_frame+0x147/0x1e10 [ 1312.171973][ C2] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1312.171978][ C2] ? __pfx_unwind_next_frame+0x10/0x10 [ 1312.171982][ C2] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1312.171984][ C2] ? kernel_text_address+0x17/0xe0 [ 1312.171988][ C2] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1312.171993][ C2] arch_stack_walk+0x8b/0xf0 [ 1312.171999][ C2] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1312.172003][ C2] stack_trace_save+0x93/0xd0 [ 1312.172006][ C2] ? __pfx_stack_trace_save+0x10/0x10 [ 1312.172009][ C2] ? rcu_read_lock_any_held+0x43/0xb0 [ 1312.172014][ C2] ? validate_chain+0x166/0x4d0 [ 1312.172016][ C2] ? rcu_read_lock_any_held+0x7e/0xb0 [ 1312.172019][ C2] ? stack_depot_save_flags+0x42e/0x7a0 [ 1312.172023][ C2] kasan_save_stack+0x24/0x50 [ 1312.172026][ C2] ? kasan_save_stack+0x24/0x50 [ 1312.172028][ C2] ? kasan_record_aux_stack+0x8c/0xa0 [ 1312.172032][ C2] ? __call_rcu_common.constprop.0+0xa1/0x610 [ 1312.172036][ C2] ? kmem_cache_free+0x221/0x330 [ 1312.172039][ C2] ? __put_anon_vma+0xf4/0x320 [ 1312.172044][ C2] ? unlink_anon_vmas+0x4ef/0x920 [ 1312.172047][ C2] ? free_pgtables+0x2cb/0xab0 [ 1312.172050][ C2] ? exit_mmap+0x30d/0x800 [ 1312.172053][ C2] ? mmput+0xb8/0x3f0 [ 1312.172056][ C2] ? exec_mmap+0x416/0x840 [ 1312.172059][ C2] ? begin_new_exec+0x3ae/0x15f0 [ 1312.172063][ C2] ? load_elf_binary+0x634/0x2960 [ 1312.172068][ C2] ? exec_binprm+0x255/0x6c0 [ 1312.172071][ C2] ? bprm_execve+0x1af/0x490 [ 1312.172074][ C2] ? do_execveat_common.isra.0+0x3f5/0x550 [ 1312.172077][ C2] ? __x64_sys_execve+0x8e/0xb0 [ 1312.172080][ C2] ? do_syscall_64+0xc1/0x380 [ 1312.172084][ C2] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1312.172088][ C2] ? __lock_acquire+0x44d/0x7e0 [ 1312.172093][ C2] ? find_held_lock+0x2b/0x80 [ 1312.172097][ C2] ? __virt_addr_valid+0x22e/0x450 [ 1312.172100][ C2] ? __lock_release+0x5d/0x170 [ 1312.172104][ C2] ? __virt_addr_valid+0x22e/0x450 [ 1312.172107][ C2] ? __virt_addr_valid+0x23d/0x450 [ 1312.172111][ C2] kasan_record_aux_stack+0x8c/0xa0 [ 1312.172115][ C2] ? __pfx_free_object_rcu+0x10/0x10 [ 1312.172120][ C2] __call_rcu_common.constprop.0+0xa1/0x610 [ 1312.172124][ C2] kmem_cache_free+0x221/0x330 [ 1312.172127][ C2] ? __put_anon_vma+0xf4/0x320 [ 1312.172132][ C2] __put_anon_vma+0xf4/0x320 [ 1312.172137][ C2] unlink_anon_vmas+0x4ef/0x920 [ 1312.172147][ C2] free_pgtables+0x2cb/0xab0 [ 1312.172155][ C2] ? __pfx_free_pgtables+0x10/0x10 [ 1312.172158][ C2] ? lock_acquire+0x10c/0x170 [ 1312.172162][ C2] ? exit_mmap+0x190/0x800 [ 1312.172166][ C2] ? down_write+0x152/0x210 [ 1312.172169][ C2] ? __pfx_down_write+0x10/0x10 [ 1312.172174][ C2] exit_mmap+0x30d/0x800 [ 1312.172178][ C2] ? __pfx_exit_mmap+0x10/0x10 [ 1312.172184][ C2] ? __mutex_unlock_slowpath+0x144/0x400 [ 1312.172195][ C2] mmput+0xb8/0x3f0 [ 1312.172199][ C2] exec_mmap+0x416/0x840 [ 1312.172203][ C2] ? rcu_is_watching+0x12/0xc0 [ 1312.172206][ C2] begin_new_exec+0x3ae/0x15f0 [ 1312.172212][ C2] load_elf_binary+0x634/0x2960 [ 1312.172217][ C2] ? __lock_acquire+0x44d/0x7e0 [ 1312.172223][ C2] ? find_held_lock+0x2b/0x80 [ 1312.172226][ C2] ? __pfx_load_elf_binary+0x10/0x10 [ 1312.172229][ C2] ? exec_binprm+0x237/0x6c0 [ 1312.172235][ C2] exec_binprm+0x255/0x6c0 [ 1312.172240][ C2] ? __pfx_exec_binprm+0x10/0x10 [ 1312.172243][ C2] ? bprm_execve+0x93/0x490 [ 1312.172248][ C2] bprm_execve+0x1af/0x490 [ 1312.172252][ C2] do_execveat_common.isra.0+0x3f5/0x550 [ 1312.172257][ C2] __x64_sys_execve+0x8e/0xb0 [ 1312.172261][ C2] do_syscall_64+0xc1/0x380 [ 1312.172265][ C2] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1312.172268][ C2] RIP: 0033:0x7f5c0dd3f40b [ 1312.172276][ C2] Code: Unable to access opcode bytes at 0x7f5c0dd3f3e1. [ 1312.172278][ C2] RSP: 002b:00007ffe96cfa7e8 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 1312.172281][ C2] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5c0dd3f40b [ 1312.172283][ C2] RDX: 0000564a97aca670 RSI: 0000564a97c19330 RDI: 0000564a97bff6a0 [ 1312.172284][ C2] RBP: 0000564a97bff6a0 R08: 0000564a97c12c10 R09: 0000000000000020 [ 1312.172286][ C2] R10: 00000000000001b6 R11: 0000000000000246 R12: 00000000ffffffff [ 1312.172287][ C2] R13: 0000564a97c19330 R14: 0000564a97aca670 R15: 0000564a97c0b1d0 [ 1312.172293][ C2]