============================================ WARNING: possible recursive locking detected 6.9.0-syzkaller-08570-g95348e463eab #0 Not tainted -------------------------------------------- dhcpcd-run-hook/8789 is trying to acquire lock: ffff888062a611d8 (&qs->lock){..-.}-{2:2}, at: __stack_map_get+0x14b/0x4b0 kernel/bpf/queue_stack_maps.c:140 but task is already holding lock: ffff888062a611d8 (&qs->lock){..-.}-{2:2}, at: queue_stack_map_push_elem+0x1b2/0x660 kernel/bpf/queue_stack_maps.c:210 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&qs->lock); lock(&qs->lock); *** DEADLOCK *** May be due to missing lock nesting notation 6 locks held by dhcpcd-run-hook/8789: #0: ffff88802760d648 (&sig->cred_guard_mutex){+.+.}-{3:3}, at: prepare_bprm_creds fs/exec.c:1502 [inline] #0: ffff88802760d648 (&sig->cred_guard_mutex){+.+.}-{3:3}, at: bprm_execve+0xd1/0x17c0 fs/exec.c:1860 #1: ffff88802760d6e0 (&sig->exec_update_lock){++++}-{3:3}, at: exec_mmap+0xe5/0x730 fs/exec.c:1007 #2: ffff88802be4b120 (&mm->mmap_lock){++++}-{3:3}, at: mmap_write_lock include/linux/mmap_lock.h:108 [inline] #2: ffff88802be4b120 (&mm->mmap_lock){++++}-{3:3}, at: exit_mmap+0x314/0xd60 mm/mmap.c:3277 #3: ffffffff8e333d20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline] #3: ffffffff8e333d20 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline] #3: ffffffff8e333d20 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2402 [inline] #3: ffffffff8e333d20 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run3+0x24c/0x5a0 kernel/trace/bpf_trace.c:2445 #4: ffff888062a611d8 (&qs->lock){..-.}-{2:2}, at: queue_stack_map_push_elem+0x1b2/0x660 kernel/bpf/queue_stack_maps.c:210 #5: ffffffff8e333d20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline] #5: ffffffff8e333d20 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline] #5: ffffffff8e333d20 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2402 [inline] #5: ffffffff8e333d20 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x1fc/0x540 kernel/trace/bpf_trace.c:2444 stack backtrace: CPU: 0 PID: 8789 Comm: dhcpcd-run-hook Not tainted 6.9.0-syzkaller-08570-g95348e463eab #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 check_deadlock kernel/locking/lockdep.c:3062 [inline] validate_chain+0x15c1/0x58e0 kernel/locking/lockdep.c:3856 __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162 __stack_map_get+0x14b/0x4b0 kernel/bpf/queue_stack_maps.c:140 bpf_prog_94b194d4ebfffdd5+0x45/0x49 bpf_dispatcher_nop_func include/linux/bpf.h:1243 [inline] __bpf_prog_run include/linux/filter.h:691 [inline] bpf_prog_run include/linux/filter.h:698 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2403 [inline] bpf_trace_run2+0x2ec/0x540 kernel/trace/bpf_trace.c:2444 trace_contention_end+0x114/0x140 include/trace/events/lock.h:122 __pv_queued_spin_lock_slowpath+0xb81/0xdc0 kernel/locking/qspinlock.c:557 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:584 [inline] queued_spin_lock_slowpath+0x42/0x50 arch/x86/include/asm/qspinlock.h:51 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] do_raw_spin_lock+0x272/0x370 kernel/locking/spinlock_debug.c:116 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:111 [inline] _raw_spin_lock_irqsave+0xe1/0x120 kernel/locking/spinlock.c:162 queue_stack_map_push_elem+0x1b2/0x660 kernel/bpf/queue_stack_maps.c:210 bpf_prog_216c997a1f42e404+0x3f/0x43 bpf_dispatcher_nop_func include/linux/bpf.h:1243 [inline] __bpf_prog_run include/linux/filter.h:691 [inline] bpf_prog_run include/linux/filter.h:698 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2403 [inline] bpf_trace_run3+0x33a/0x5a0 kernel/trace/bpf_trace.c:2445 trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] kmem_cache_free+0x267/0x2d0 mm/slub.c:4416 anon_vma_chain_free mm/rmap.c:147 [inline] unlink_anon_vmas+0x5a0/0x5f0 mm/rmap.c:448 free_pgtables+0x553/0x7c0 mm/memory.c:402 exit_mmap+0x4b3/0xd60 mm/mmap.c:3280 __mmput+0x115/0x3c0 kernel/fork.c:1346 exec_mmap+0x69d/0x730 fs/exec.c:1052 begin_new_exec+0x125f/0x1f50 fs/exec.c:1318 load_elf_binary+0x96a/0x2660 fs/binfmt_elf.c:996 search_binary_handler fs/exec.c:1786 [inline] exec_binprm fs/exec.c:1828 [inline] bprm_execve+0xaf8/0x17c0 fs/exec.c:1880 do_execveat_common+0x553/0x700 fs/exec.c:1987 do_execve fs/exec.c:2061 [inline] __do_sys_execve fs/exec.c:2137 [inline] __se_sys_execve fs/exec.c:2132 [inline] __x64_sys_execve+0x92/0xb0 fs/exec.c:2132 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1c7afbfef7 Code: Unable to access opcode bytes at 0x7f1c7afbfecd. RSP: 002b:00007ffc85eb5328 EFLAGS: 00000246 ORIG_RAX: 000000000000003b RAX: ffffffffffffffda RBX: 0000563c142deec0 RCX: 00007f1c7afbfef7 RDX: 0000563c142def08 RSI: 0000563c142deec0 RDI: 0000563c142def98 RBP: 0000563c142def98 R08: 0000563c142def9d R09: 00007ffc85ebaeb4 R10: 00007f1c7b1be088 R11: 0000000000000246 R12: 0000563c142def08 R13: 00007f1c7b16d904 R14: 0000563c142def08 R15: 0000000000000000