------------[ cut here ]------------ WARNING: CPU: 1 PID: 3651 at kernel/trace/bpf_trace.c:1797 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1870 [inline] WARNING: CPU: 1 PID: 3651 at kernel/trace/bpf_trace.c:1797 bpf_get_stack_raw_tp+0x1d3/0x220 kernel/trace/bpf_trace.c:1867 Modules linked in: CPU: 1 PID: 3651 Comm: syz-executor287 Not tainted 6.1.114-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:get_bpf_raw_tp_regs kernel/trace/bpf_trace.c:1797 [inline] RIP: 0010:____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1870 [inline] RIP: 0010:bpf_get_stack_raw_tp+0x1d3/0x220 kernel/trace/bpf_trace.c:1867 Code: f1 45 31 c0 e8 4e b8 17 00 65 ff 0d 27 5b 6e 7e 4c 63 e8 4c 89 e8 48 83 c4 18 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 bd ae f5 ff <0f> 0b 65 ff 0d 04 5b 6e 7e 49 c7 c5 f0 ff ff ff eb d7 e8 a6 ae f5 RSP: 0000:ffffc90003b9ead0 EFLAGS: 00010293 RAX: ffffffff8194e4a3 RBX: 0000000000000003 RCX: ffff88807b61bb80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000fffffffc RBP: ffffc90003b9eb10 R08: ffffffff8194e363 R09: fffffbfff224604d R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90003b9eb28 R13: 0000000000000000 R14: 0000000000000902 R15: ffff8880b8f33db8 FS: 000055557d619380(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffcb60f1ff8 CR3: 000000007d63c000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_prog_e6cf5f9c69743609+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run4+0x253/0x470 kernel/trace/bpf_trace.c:2314 __traceiter_mmap_lock_acquire_returned+0x8c/0xe0 include/trace/events/mmap_lock.h:52 trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:52 [inline] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360 mm/mmap_lock.c:102 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] stack_map_get_build_id_offset+0x99e/0x9c0 kernel/bpf/stackmap.c:144 __bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:452 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1877 [inline] bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1867 bpf_prog_e6cf5f9c69743609+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run4+0x253/0x470 kernel/trace/bpf_trace.c:2314 __traceiter_mmap_lock_acquire_returned+0x8c/0xe0 include/trace/events/mmap_lock.h:52 trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:52 [inline] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360 mm/mmap_lock.c:102 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] stack_map_get_build_id_offset+0x99e/0x9c0 kernel/bpf/stackmap.c:144 __bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:452 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1877 [inline] bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1867 bpf_prog_e6cf5f9c69743609+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run4+0x253/0x470 kernel/trace/bpf_trace.c:2314 __traceiter_mmap_lock_acquire_returned+0x8c/0xe0 include/trace/events/mmap_lock.h:52 trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:52 [inline] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360 mm/mmap_lock.c:102 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] stack_map_get_build_id_offset+0x99e/0x9c0 kernel/bpf/stackmap.c:144 __bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:452 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1877 [inline] bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1867 bpf_prog_e6cf5f9c69743609+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run4+0x253/0x470 kernel/trace/bpf_trace.c:2314 __traceiter_mmap_lock_acquire_returned+0x8c/0xe0 include/trace/events/mmap_lock.h:52 trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:52 [inline] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360 mm/mmap_lock.c:102 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] get_mmap_lock_carefully mm/memory.c:5320 [inline] lock_mm_and_find_vma+0x219/0x2e0 mm/memory.c:5382 do_user_addr_fault arch/x86/mm/fault.c:1312 [inline] handle_page_fault arch/x86/mm/fault.c:1431 [inline] exc_page_fault+0x169/0x620 arch/x86/mm/fault.c:1487 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:608 RIP: 0033:0x7f8e53fad64c Code: 00 eb ce 66 66 2e 0f 1f 84 00 00 00 00 00 48 8d 0d e1 0a 0a 00 e9 04 ff ff ff 0f 1f 40 00 41 57 41 56 41 55 41 54 55 48 89 f5 <53> 89 fb 48 83 ec 18 48 83 3d 7d 09 0a 00 00 89 54 24 0c 74 08 84 RSP: 002b:00007ffcb60f2000 EFLAGS: 00010206 RAX: 00000000ffffffff RBX: 000000000000001e RCX: 0000000000000001 RDX: 0000000000000001 RSI: 00007f8e5404e118 RDI: 0000000000000000 RBP: 00007f8e5404e118 R08: 0000000000000000 R09: 000000007d61a610 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000