================================
WARNING: inconsistent lock state
6.10.0-syzkaller-04559-g7d30b8aa4fc3 #0 Not tainted
--------------------------------
inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage.
syz-executor/5232 [HC1[1]:SC0[0]:HE0:SE1] takes:
ffff8880b9238798 (lock#10){?.+.}-{2:2}, at: local_lock_acquire include/linux/local_lock_internal.h:29 [inline]
ffff8880b9238798 (lock#10){?.+.}-{2:2}, at: __mmap_lock_do_trace_released+0x83/0x620 mm/mmap_lock.c:243
{HARDIRQ-ON-W} state was registered at:
  lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5753
  local_lock_acquire include/linux/local_lock_internal.h:29 [inline]
  __mmap_lock_do_trace_released+0x9c/0x620 mm/mmap_lock.c:243
  __mmap_lock_trace_released include/linux/mmap_lock.h:42 [inline]
  mmap_read_unlock include/linux/mmap_lock.h:170 [inline]
  exit_mmap+0xaf7/0xc80 mm/mmap.c:3342
  __mmput+0x115/0x390 kernel/fork.c:1343
  exit_mm+0x220/0x310 kernel/exit.c:566
  do_exit+0x9b2/0x27f0 kernel/exit.c:864
  do_group_exit+0x207/0x2c0 kernel/exit.c:1026
  get_signal+0x16a1/0x1740 kernel/signal.c:2917
  arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:310
  exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
  exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
  __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
  syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218
  do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89
  entry_SYSCALL_64_after_hwframe+0x77/0x7f
irq event stamp: 291216
hardirqs last  enabled at (291215): [<ffffffff814297cf>] flush_tlb_mm_range+0x3df/0x5c0 arch/x86/mm/tlb.c:1032
hardirqs last disabled at (291216): [<ffffffff8bb0940e>] sysvec_irq_work+0xe/0xc0 arch/x86/kernel/irq_work.c:17
softirqs last  enabled at (291142): [<ffffffff813646eb>] local_bh_disable include/linux/bottom_half.h:20 [inline]
softirqs last  enabled at (291142): [<ffffffff813646eb>] fpregs_lock arch/x86/include/asm/fpu/api.h:72 [inline]
softirqs last  enabled at (291142): [<ffffffff813646eb>] fpu_clone+0x25b/0xad0 arch/x86/kernel/fpu/core.c:630
softirqs last disabled at (291140): [<ffffffff813646eb>] local_bh_disable include/linux/bottom_half.h:20 [inline]
softirqs last disabled at (291140): [<ffffffff813646eb>] fpregs_lock arch/x86/include/asm/fpu/api.h:72 [inline]
softirqs last disabled at (291140): [<ffffffff813646eb>] fpu_clone+0x25b/0xad0 arch/x86/kernel/fpu/core.c:630

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(lock#10);
  <Interrupt>
    lock(lock#10);

 *** DEADLOCK ***

3 locks held by syz-executor/5232:
 #0: ffff888029eb4b68 (&vma->vm_lock->lock){++++}-{3:3}, at: vma_start_read include/linux/mm.h:683 [inline]
 #0: ffff888029eb4b68 (&vma->vm_lock->lock){++++}-{3:3}, at: lock_vma_under_rcu+0x2f9/0x6e0 mm/memory.c:5845
 #1: ffffffff8e735fe0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:327 [inline]
 #1: ffffffff8e735fe0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:839 [inline]
 #1: ffffffff8e735fe0 (rcu_read_lock){....}-{1:2}, at: __pte_offset_map+0x82/0x380 mm/pgtable-generic.c:287
 #2: ffff88806a31eb58 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 #2: ffff88806a31eb58 (ptlock_ptr(ptdesc)#2){+.+.}-{2:2}, at: __pte_offset_map_lock+0x1ba/0x300 mm/pgtable-generic.c:375

stack backtrace:
CPU: 0 PID: 5232 Comm: syz-executor Not tainted 6.10.0-syzkaller-04559-g7d30b8aa4fc3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 valid_state+0x13a/0x1c0 kernel/locking/lockdep.c:4012
 mark_lock_irq+0xbb/0xc20 kernel/locking/lockdep.c:4215
 mark_lock+0x223/0x350 kernel/locking/lockdep.c:4677
 mark_usage kernel/locking/lockdep.c:4563 [inline]
 __lock_acquire+0xb8e/0x1fd0 kernel/locking/lockdep.c:5090
 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5753
 local_lock_acquire include/linux/local_lock_internal.h:29 [inline]
 __mmap_lock_do_trace_released+0x9c/0x620 mm/mmap_lock.c:243
 __mmap_lock_trace_released include/linux/mmap_lock.h:42 [inline]
 mmap_read_unlock_non_owner include/linux/mmap_lock.h:176 [inline]
 do_mmap_read_unlock+0x5d/0x60 kernel/bpf/task_iter.c:1046
 irq_work_single+0xe2/0x240 kernel/irq_work.c:221
 irq_work_run_list kernel/irq_work.c:252 [inline]
 irq_work_run+0x18b/0x350 kernel/irq_work.c:261
 __sysvec_irq_work+0xb8/0x430 arch/x86/kernel/irq_work.c:22
 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline]
 sysvec_irq_work+0x9e/0xc0 arch/x86/kernel/irq_work.c:17
 </IRQ>
 <TASK>
 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738
RIP: 0010:flush_tlb_mm_range+0x3e7/0x5c0 arch/x86/mm/tlb.c:1036
Code: 4f 31 ba 00 8b 44 24 60 fa a9 00 02 00 00 74 05 e8 ce 2b 5b 00 4c 89 f7 e8 d6 f4 ff ff e8 01 2a 5b 00 fb 65 ff 0d 31 ee bf 7e <bf> 01 00 00 00 e8 af 2d 23 00 65 8b 05 a0 3d c1 7e 85 c0 0f 84 a2
RSP: 0000:ffffc90003837600 EFLAGS: 00000246
RAX: 5ee3e8125df62300 RBX: 1ffff92000706ecc RCX: ffffffff817302da
RDX: dffffc0000000000 RSI: ffffffff8beac920 RDI: ffffffff8c4047a0
RBP: ffffc900038376d0 R08: ffffffff934f05c7 R09: 1ffffffff269e0b8
R10: dffffc0000000000 R11: fffffbfff269e0b9 R12: 0000000000000000
R13: ffff888054519240 R14: ffff8880b923d740 R15: ffffc90003837660
 flush_tlb_page arch/x86/include/asm/tlbflush.h:254 [inline]
 ptep_clear_flush+0x11a/0x170 mm/pgtable-generic.c:101
 wp_page_copy mm/memory.c:3351 [inline]
 do_wp_page+0x1bf0/0x52f0 mm/memory.c:3677
 handle_pte_fault+0x117e/0x7090 mm/memory.c:5397
 __handle_mm_fault mm/memory.c:5524 [inline]
 handle_mm_fault+0x10df/0x1ba0 mm/memory.c:5689
 do_user_addr_fault arch/x86/mm/fault.c:1338 [inline]
 handle_page_fault arch/x86/mm/fault.c:1481 [inline]
 exc_page_fault+0x459/0x8c0 arch/x86/mm/fault.c:1539
 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623
RIP: 0033:0x7fd1b7335c38
Code: 55 48 8d 2d 8a 00 1a 00 53 48 89 eb 66 0f 1f 44 00 00 44 89 e0 87 03 83 f8 01 7f 26 48 8b 9b 70 08 00 00 48 39 eb 75 ea 31 c0 <87> 05 de 6b d0 00 83 f8 01 7f 25 5b 5d 41 5c c3 0f 1f 84 00 00 00
RSP: 002b:00007ffd8dae5950 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00007fd1b74d5ca0 RCX: 00007fd1b736db93
RDX: 000000000000006c RSI: 0000000000000000 RDI: 0000000001200011
RBP: 00007fd1b74d5ca0 R08: 0000000000000000 R09: 0000000000000000
R10: 00005555729af7d0 R11: 0000000000000246 R12: 0000000000000000
R13: ffffffffffffffa8 R14: 0000000000000006 R15: 00007ffd8dae5af0
 </TASK>
----------------
Code disassembly (best guess), 3 bytes skipped:
   0:	00 8b 44 24 60 fa    	add    %cl,-0x59fdbbc(%rbx)
   6:	a9 00 02 00 00       	test   $0x200,%eax
   b:	74 05                	je     0x12
   d:	e8 ce 2b 5b 00       	call   0x5b2be0
  12:	4c 89 f7             	mov    %r14,%rdi
  15:	e8 d6 f4 ff ff       	call   0xfffff4f0
  1a:	e8 01 2a 5b 00       	call   0x5b2a20
  1f:	fb                   	sti
  20:	65 ff 0d 31 ee bf 7e 	decl   %gs:0x7ebfee31(%rip)        # 0x7ebfee58
* 27:	bf 01 00 00 00       	mov    $0x1,%edi <-- trapping instruction
  2c:	e8 af 2d 23 00       	call   0x232de0
  31:	65 8b 05 a0 3d c1 7e 	mov    %gs:0x7ec13da0(%rip),%eax        # 0x7ec13dd8
  38:	85 c0                	test   %eax,%eax
  3a:	0f                   	.byte 0xf
  3b:	84                   	.byte 0x84
  3c:	a2                   	.byte 0xa2