------------[ cut here ]------------ WARNING: CPU: 0 PID: 17345 at kernel/trace/bpf_trace.c:1797 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1870 [inline] WARNING: CPU: 0 PID: 17345 at kernel/trace/bpf_trace.c:1797 bpf_get_stack_raw_tp+0x1d3/0x220 kernel/trace/bpf_trace.c:1867 Modules linked in: CPU: 0 PID: 17345 Comm: syz.2.5158 Not tainted 6.1.107-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:get_bpf_raw_tp_regs kernel/trace/bpf_trace.c:1797 [inline] RIP: 0010:____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1870 [inline] RIP: 0010:bpf_get_stack_raw_tp+0x1d3/0x220 kernel/trace/bpf_trace.c:1867 Code: f1 45 31 c0 e8 5e b4 17 00 65 ff 0d d7 3d 6e 7e 4c 63 e8 4c 89 e8 48 83 c4 18 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 7d ac f5 ff <0f> 0b 65 ff 0d b4 3d 6e 7e 49 c7 c5 f0 ff ff ff eb d7 e8 66 ac f5 RSP: 0000:ffffc900032aead0 EFLAGS: 00010293 RAX: ffffffff819501f3 RBX: 0000000000000003 RCX: ffff888075718000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000fffffffc RBP: ffffc900032aeb10 R08: ffffffff819500b3 R09: fffffbfff223b645 R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc900032aeb28 R13: 0000000000000000 R14: 0000000000000900 R15: ffff8880b8e33db8 FS: 00005555741ad500(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b3141aff8 CR3: 00000000663c3000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: bpf_prog_ec3b2eefa702d8d3+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run4+0x253/0x470 kernel/trace/bpf_trace.c:2314 __traceiter_mmap_lock_acquire_returned+0x8c/0xe0 include/trace/events/mmap_lock.h:52 trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:52 [inline] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360 mm/mmap_lock.c:102 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] stack_map_get_build_id_offset+0x99e/0x9c0 kernel/bpf/stackmap.c:144 __bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:452 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1877 [inline] bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1867 bpf_prog_ec3b2eefa702d8d3+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run4+0x253/0x470 kernel/trace/bpf_trace.c:2314 __traceiter_mmap_lock_acquire_returned+0x8c/0xe0 include/trace/events/mmap_lock.h:52 trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:52 [inline] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360 mm/mmap_lock.c:102 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] stack_map_get_build_id_offset+0x99e/0x9c0 kernel/bpf/stackmap.c:144 __bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:452 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1877 [inline] bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1867 bpf_prog_ec3b2eefa702d8d3+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run4+0x253/0x470 kernel/trace/bpf_trace.c:2314 __traceiter_mmap_lock_acquire_returned+0x8c/0xe0 include/trace/events/mmap_lock.h:52 trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:52 [inline] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360 mm/mmap_lock.c:102 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] stack_map_get_build_id_offset+0x99e/0x9c0 kernel/bpf/stackmap.c:144 __bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:452 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1877 [inline] bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1867 bpf_prog_ec3b2eefa702d8d3+0x3a/0x3e bpf_dispatcher_nop_func include/linux/bpf.h:989 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2273 [inline] bpf_trace_run4+0x253/0x470 kernel/trace/bpf_trace.c:2314 __traceiter_mmap_lock_acquire_returned+0x8c/0xe0 include/trace/events/mmap_lock.h:52 trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:52 [inline] __mmap_lock_do_trace_acquire_returned+0x2c0/0x360 mm/mmap_lock.c:102 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:137 [inline] get_mmap_lock_carefully mm/memory.c:5303 [inline] lock_mm_and_find_vma+0x219/0x2e0 mm/memory.c:5365 do_user_addr_fault arch/x86/mm/fault.c:1312 [inline] handle_page_fault arch/x86/mm/fault.c:1431 [inline] exc_page_fault+0x169/0x620 arch/x86/mm/fault.c:1487 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7f330a259246 Code: 00 00 00 00 be 08 00 00 00 48 89 df 49 83 c6 01 e8 af ad fe ff 48 8b 53 38 48 8d 42 f8 48 89 43 38 8b 43 28 83 c0 08 89 43 28 <48> 89 6a f8 45 39 e6 0f 83 7d 00 00 00 48 8b 3c 24 49 8b 6d 30 4a RSP: 002b:00007ffd7cfc0740 EFLAGS: 00010202 RAX: 0000000000005008 RBX: 00007f330b045720 RCX: 0000000000000000 RDX: 0000001b3141b000 RSI: 0000000000000008 RDI: 00007f330b045720 RBP: ffffffff8a9fdddb R08: 00007f33099ff0a0 R09: 00007f330a502000 R10: 000000008132b3f3 R11: 0000000000000006 R12: 00000000000000f7 R13: 00007f330a516018 R14: 00000000000000e0 R15: ffffffffffffb000