============================================ WARNING: possible recursive locking detected 6.9.0-rc1-syzkaller #0 Not tainted -------------------------------------------- syz-executor/4691 is trying to acquire lock: ffff88813bd2c320 (lock#9){+.+.}-{2:2}, at: local_lock_acquire include/linux/local_lock_internal.h:29 [inline] ffff88813bd2c320 (lock#9){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x3e/0x200 mm/mmap_lock.c:237 but task is already holding lock: ffff88813bd2c320 (lock#9){+.+.}-{2:2}, at: local_lock_acquire include/linux/local_lock_internal.h:29 [inline] ffff88813bd2c320 (lock#9){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x3e/0x200 mm/mmap_lock.c:237 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(lock#9); lock(lock#9); *** DEADLOCK *** May be due to missing lock nesting notation 5 locks held by syz-executor/4691: #0: ffff88810c8bf360 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:165 [inline] #0: ffff88810c8bf360 (&mm->mmap_lock){++++}-{3:3}, at: get_mmap_lock_carefully mm/memory.c:5631 [inline] #0: ffff88810c8bf360 (&mm->mmap_lock){++++}-{3:3}, at: lock_mm_and_find_vma+0x25/0x130 mm/memory.c:5691 #1: ffff88813bd2c320 (lock#9){+.+.}-{2:2}, at: local_lock_acquire include/linux/local_lock_internal.h:29 [inline] #1: ffff88813bd2c320 (lock#9){+.+.}-{2:2}, at: __mmap_lock_do_trace_acquire_returned+0x3e/0x200 mm/mmap_lock.c:237 #2: ffffffff83f8a910 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline] #2: ffffffff83f8a910 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline] #2: ffffffff83f8a910 (rcu_read_lock){....}-{1:2}, at: get_memcg_path_buf mm/mmap_lock.c:139 [inline] #2: ffffffff83f8a910 (rcu_read_lock){....}-{1:2}, at: get_mm_memcg_path+0x3d/0x2c0 mm/mmap_lock.c:209 #3: ffffffff83f8a910 (rcu_read_lock){....}-{1:2}, at: trace_call_bpf+0x4b/0x3d0 #4: ffff88810c8bf360 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:165 [inline] #4: ffff88810c8bf360 (&mm->mmap_lock){++++}-{3:3}, at: stack_map_get_build_id_offset+0xb5/0x360 kernel/bpf/stackmap.c:141 stack backtrace: CPU: 1 PID: 4691 Comm: syz-executor Not tainted 6.9.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xa3/0x100 lib/dump_stack.c:114 check_deadlock kernel/locking/lockdep.c:3062 [inline] validate_chain kernel/locking/lockdep.c:3856 [inline] __lock_acquire+0x10bf/0x2490 kernel/locking/lockdep.c:5137 lock_acquire+0xeb/0x270 kernel/locking/lockdep.c:5754 local_lock_acquire include/linux/local_lock_internal.h:29 [inline] __mmap_lock_do_trace_acquire_returned+0x56/0x200 mm/mmap_lock.c:237 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:166 [inline] stack_map_get_build_id_offset+0x252/0x360 kernel/bpf/stackmap.c:141 __bpf_get_stack+0x1d7/0x240 kernel/bpf/stackmap.c:449 ___bpf_prog_run+0x5f6/0x2280 kernel/bpf/core.c:1997 __bpf_prog_run32+0xbb/0xe0 kernel/bpf/core.c:2236 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline] __bpf_prog_run include/linux/filter.h:657 [inline] bpf_prog_run include/linux/filter.h:664 [inline] bpf_prog_run_array include/linux/bpf.h:2073 [inline] trace_call_bpf+0x164/0x3d0 kernel/trace/bpf_trace.c:147 perf_trace_run_bpf_submit+0x3b/0xa0 kernel/events/core.c:10161 perf_trace_mmap_lock_acquire_returned+0x141/0x170 include/trace/events/mmap_lock.h:52 trace_mmap_lock_acquire_returned include/trace/events/mmap_lock.h:52 [inline] __mmap_lock_do_trace_acquire_returned+0x1e1/0x200 mm/mmap_lock.c:237 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline] mmap_read_trylock include/linux/mmap_lock.h:166 [inline] get_mmap_lock_carefully mm/memory.c:5631 [inline] lock_mm_and_find_vma+0xea/0x130 mm/memory.c:5691 do_user_addr_fault arch/x86/mm/fault.c:1385 [inline] handle_page_fault arch/x86/mm/fault.c:1505 [inline] exc_page_fault+0x1a0/0x730 arch/x86/mm/fault.c:1563 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0033:0x7fc4fb3cc9f0 Code: Unable to access opcode bytes at 0x7fc4fb3cc9c6. RSP: 002b:00007fffc6e920a8 EFLAGS: 00010202 RAX: 00007fc4fb3cc9f0 RBX: 0000000000000000 RCX: 00007fc4fa5748a0 RDX: 0000001b32520000 RSI: 00007fffc6e920c0 RDI: 0000000000000001 RBP: 00007fffc6e92230 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 R13: 0000000000001388 R14: 00007fffc6e923b0 R15: 00007fffc6e923b0