============================================
WARNING: possible recursive locking detected
5.15.164-syzkaller #0 Not tainted
--------------------------------------------
modprobe/3758 is trying to acquire lock:
ffff8880b9a35bb8 (lock#9){+.+.}-{2:2}, at: local_lock_acquire+0xd/0x170 include/linux/local_lock_internal.h:28
but task is already holding lock:
ffff8880b9a35bb8 (lock#9){+.+.}-{2:2}, at: local_lock_acquire+0xd/0x170 include/linux/local_lock_internal.h:28
other info that might help us debug this:
Possible unsafe locking scenario:
CPU0
----
lock(lock#9);
lock(lock#9);
*** DEADLOCK ***
May be due to missing lock nesting notation
4 locks held by modprobe/3758:
#0: ffff8880791a4728 (&mm->mmap_lock){++++}-{3:3}, at: mmap_write_lock_killable include/linux/mmap_lock.h:87 [inline]
#0: ffff8880791a4728 (&mm->mmap_lock){++++}-{3:3}, at: do_mprotect_pkey+0x1d1/0xa50 mm/mprotect.c:551
#1: ffff8880b9a35bb8 (lock#9){+.+.}-{2:2}, at: local_lock_acquire+0xd/0x170 include/linux/local_lock_internal.h:28
#2: ffffffff8c91fb20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 include/linux/rcupdate.h:311
#3: ffffffff8c91fb20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 include/linux/rcupdate.h:311
stack backtrace:
CPU: 0 PID: 3758 Comm: modprobe Not tainted 5.15.164-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106
print_deadlock_bug kernel/locking/lockdep.c:2946 [inline]
check_deadlock kernel/locking/lockdep.c:2989 [inline]
validate_chain+0x46d2/0x5930 kernel/locking/lockdep.c:3775
__lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5012
lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
local_lock_acquire+0x29/0x170 include/linux/local_lock_internal.h:29
__mmap_lock_do_trace_acquire_returned+0x7c/0x340 mm/mmap_lock.c:237
__mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
stack_map_get_build_id_offset+0x612/0x930 kernel/bpf/stackmap.c:185
__bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:496
____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1490 [inline]
bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1480
bpf_prog_ec3b2eefa702d8d3+0x3a/0x76c
bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
__bpf_prog_run include/linux/filter.h:621 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
bpf_trace_run4+0x2e0/0x390 kernel/trace/bpf_trace.c:1919
trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:44 [inline]
__mmap_lock_do_trace_acquire_returned+0x2d6/0x340 mm/mmap_lock.c:237
__mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
mmap_write_lock_killable include/linux/mmap_lock.h:88 [inline]
do_mprotect_pkey+0xa0c/0xa50 mm/mprotect.c:551
__do_sys_mprotect mm/mprotect.c:662 [inline]
__se_sys_mprotect mm/mprotect.c:659 [inline]
__x64_sys_mprotect+0x7c/0x90 mm/mprotect.c:659
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7feee01adbb7
Code: 00 00 00 b8 0b 00 00 00 0f 05 48 3d 01 f0 ff ff 73 01 c3 48 8d 0d b9 46 01 00 f7 d8 89 01 48 83 c8 ff c3 b8 0a 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 99 46 01 00 f7 d8 89 01 48 83
RSP: 002b:00007ffcfb021138 EFLAGS: 00000206 ORIG_RAX: 000000000000000a
RAX: ffffffffffffffda RBX: 00007feee0190ac0 RCX: 00007feee01adbb7
RDX: 0000000000000001 RSI: 0000000000001000 RDI: 00007feedff18000
RBP: 00007ffcfb021250 R08: 00007ffcfb0210c8 R09: 00007feee01905c0
R10: 00007feedff0cc08 R11: 0000000000000206 R12: 00007feee0190ac0
R13: 00007feee01b5eda R14: 00007feedff18f98 R15: 00007feedff18d98
------------[ cut here ]------------
WARNING: CPU: 0 PID: 3758 at kernel/trace/bpf_trace.c:1411 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1483 [inline]
WARNING: CPU: 0 PID: 3758 at kernel/trace/bpf_trace.c:1411 bpf_get_stack_raw_tp+0x1d3/0x220 kernel/trace/bpf_trace.c:1480
Modules linked in:
CPU: 0 PID: 3758 Comm: modprobe Not tainted 5.15.164-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
RIP: 0010:get_bpf_raw_tp_regs kernel/trace/bpf_trace.c:1411 [inline]
RIP: 0010:____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1483 [inline]
RIP: 0010:bpf_get_stack_raw_tp+0x1d3/0x220 kernel/trace/bpf_trace.c:1480
Code: f1 45 31 c0 e8 4e 96 14 00 65 ff 0d cf de 78 7e 4c 63 e8 4c 89 e8 48 83 c4 18 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 02 f6 ff <0f> 0b 65 ff 0d ac de 78 7e 49 c7 c5 f0 ff ff ff eb d7 e8 d6 02 f6
RSP: 0018:ffffc90002fb7190 EFLAGS: 00010293
RAX: ffffffff818a5e73 RBX: 0000000000000003 RCX: ffff888022e7d940
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000fffffffc
RBP: ffffc90002fb71d0 R08: ffffffff818a5d33 R09: ffffffff8f673008
R10: ffffffff8f673018 R11: ffffffff8f673010 R12: ffffc90002fb71e8
R13: 0000000000000000 R14: 0000000000000900 R15: ffff8880b9a33b30
FS: 00007feedfe8f380(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007feedfff9fe4 CR3: 000000006245b000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
bpf_prog_ec3b2eefa702d8d3+0x3a/0x76c
bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
__bpf_prog_run include/linux/filter.h:621 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
bpf_trace_run4+0x2e0/0x390 kernel/trace/bpf_trace.c:1919
trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:44 [inline]
__mmap_lock_do_trace_acquire_returned+0x2d6/0x340 mm/mmap_lock.c:237
__mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
stack_map_get_build_id_offset+0x612/0x930 kernel/bpf/stackmap.c:185
__bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:496
____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1490 [inline]
bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1480
bpf_prog_ec3b2eefa702d8d3+0x3a/0x76c
bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
__bpf_prog_run include/linux/filter.h:621 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
bpf_trace_run4+0x2e0/0x390 kernel/trace/bpf_trace.c:1919
trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:44 [inline]
__mmap_lock_do_trace_acquire_returned+0x2d6/0x340 mm/mmap_lock.c:237
__mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
stack_map_get_build_id_offset+0x612/0x930 kernel/bpf/stackmap.c:185
__bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:496
____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1490 [inline]
bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1480
bpf_prog_ec3b2eefa702d8d3+0x3a/0x76c
bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
__bpf_prog_run include/linux/filter.h:621 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
bpf_trace_run4+0x2e0/0x390 kernel/trace/bpf_trace.c:1919
trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:44 [inline]
__mmap_lock_do_trace_acquire_returned+0x2d6/0x340 mm/mmap_lock.c:237
__mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
stack_map_get_build_id_offset+0x612/0x930 kernel/bpf/stackmap.c:185
__bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:496
____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1490 [inline]
bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1480
bpf_prog_ec3b2eefa702d8d3+0x3a/0x76c
bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
__bpf_prog_run include/linux/filter.h:621 [inline]
bpf_prog_run include/linux/filter.h:635 [inline]
__bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
bpf_trace_run4+0x2e0/0x390 kernel/trace/bpf_trace.c:1919
trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:44 [inline]
__mmap_lock_do_trace_acquire_returned+0x2d6/0x340 mm/mmap_lock.c:237
__mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
mmap_write_lock_killable include/linux/mmap_lock.h:88 [inline]
do_mprotect_pkey+0xa0c/0xa50 mm/mprotect.c:551
__do_sys_mprotect mm/mprotect.c:662 [inline]
__se_sys_mprotect mm/mprotect.c:659 [inline]
__x64_sys_mprotect+0x7c/0x90 mm/mprotect.c:659
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7feee01adbb7
Code: 00 00 00 b8 0b 00 00 00 0f 05 48 3d 01 f0 ff ff 73 01 c3 48 8d 0d b9 46 01 00 f7 d8 89 01 48 83 c8 ff c3 b8 0a 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 99 46 01 00 f7 d8 89 01 48 83
RSP: 002b:00007ffcfb021138 EFLAGS: 00000206 ORIG_RAX: 000000000000000a
RAX: ffffffffffffffda RBX: 00007feee0190ac0 RCX: 00007feee01adbb7
RDX: 0000000000000001 RSI: 0000000000001000 RDI: 00007feedff18000
RBP: 00007ffcfb021250 R08: 00007ffcfb0210c8 R09: 00007feee01905c0
R10: 00007feedff0cc08 R11: 0000000000000206 R12: 00007feee0190ac0
R13: 00007feee01b5eda R14: 00007feedff18f98 R15: 00007feedff18d98