======================================================
WARNING: possible circular locking dependency detected
5.15.164-syzkaller #0 Not tainted
------------------------------------------------------
syz-executor126/3563 is trying to acquire lock:
ffff888012a20a28 (&p->pi_lock){-.-.}-{2:2}, at: try_to_wake_up+0xae/0x1300 kernel/sched/core.c:4030

but task is already holding lock:
ffff8880b9b35bb8 (lock#8){+.+.}-{2:2}, at: local_lock_acquire+0xd/0x170 include/linux/local_lock_internal.h:28

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #2 (lock#8){+.+.}-{2:2}:
       lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
       local_lock_acquire+0x29/0x170 include/linux/local_lock_internal.h:29
       __mmap_lock_do_trace_acquire_returned+0x7c/0x340 mm/mmap_lock.c:237
       __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
       mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
       stack_map_get_build_id_offset+0x612/0x930 kernel/bpf/stackmap.c:185
       __bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:496
       ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1490 [inline]
       bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1480
       0xffffffffa0018df6
       bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
       __bpf_prog_run include/linux/filter.h:628 [inline]
       bpf_prog_run include/linux/filter.h:635 [inline]
       __bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
       bpf_trace_run2+0x19e/0x340 kernel/trace/bpf_trace.c:1917
       trace_tlb_flush+0xed/0x110 include/trace/events/tlb.h:38
       switch_mm_irqs_off+0x748/0xa30
       context_switch kernel/sched/core.c:5016 [inline]
       __schedule+0x1167/0x45b0 kernel/sched/core.c:6376
       schedule+0x11b/0x1f0 kernel/sched/core.c:6459
       schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6518
       __mutex_lock_common+0xe34/0x25a0 kernel/locking/mutex.c:669
       __mutex_lock kernel/locking/mutex.c:729 [inline]
       mutex_lock_nested+0x17/0x20 kernel/locking/mutex.c:743
       tracepoint_probe_register_prio_may_exist+0xb7/0x190 kernel/tracepoint.c:478
       bpf_raw_tracepoint_open+0x65a/0x750 kernel/bpf/syscall.c:3113
       __sys_bpf+0x468/0x670 kernel/bpf/syscall.c:4693
       __do_sys_bpf kernel/bpf/syscall.c:4755 [inline]
       __se_sys_bpf kernel/bpf/syscall.c:4753 [inline]
       __x64_sys_bpf+0x78/0x90 kernel/bpf/syscall.c:4753
       do_syscall_x64 arch/x86/entry/common.c:50 [inline]
       do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
       entry_SYSCALL_64_after_hwframe+0x66/0xd0

-> #1 (&rq->__lock){-.-.}-{2:2}:
       lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
       _raw_spin_lock_nested+0x2d/0x40 kernel/locking/spinlock.c:368
       raw_spin_rq_lock_nested+0x26/0x140 kernel/sched/core.c:475
       raw_spin_rq_lock kernel/sched/sched.h:1326 [inline]
       rq_lock kernel/sched/sched.h:1621 [inline]
       task_fork_fair+0x5d/0x350 kernel/sched/fair.c:11495
       sched_cgroup_fork+0x2d3/0x330 kernel/sched/core.c:4466
       copy_process+0x224a/0x3ef0 kernel/fork.c:2320
       kernel_clone+0x210/0x960 kernel/fork.c:2604
       kernel_thread+0x168/0x1e0 kernel/fork.c:2656
       rest_init+0x21/0x330 init/main.c:706
       start_kernel+0x48c/0x540 init/main.c:1140
       secondary_startup_64_no_verify+0xb1/0xbb

-> #0 (&p->pi_lock){-.-.}-{2:2}:
       check_prev_add kernel/locking/lockdep.c:3053 [inline]
       check_prevs_add kernel/locking/lockdep.c:3172 [inline]
       validate_chain+0x1649/0x5930 kernel/locking/lockdep.c:3788
       __lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5012
       lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
       __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
       _raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
       try_to_wake_up+0xae/0x1300 kernel/sched/core.c:4030
       rcu_read_unlock_special+0x3aa/0x520 kernel/rcu/tree_plugin.h:650
       __rcu_read_unlock+0x92/0x100 kernel/rcu/tree_plugin.h:422
       rcu_read_unlock include/linux/rcupdate.h:771 [inline]
       get_mem_cgroup_from_mm+0x179/0x260 mm/memcontrol.c:992
       get_mm_memcg_path+0x1b/0x550 mm/mmap_lock.c:202
       __mmap_lock_do_trace_acquire_returned+0x84/0x340 mm/mmap_lock.c:237
       __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
       mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
       do_user_addr_fault arch/x86/mm/fault.c:1298 [inline]
       handle_page_fault arch/x86/mm/fault.c:1445 [inline]
       exc_page_fault+0x564/0x700 arch/x86/mm/fault.c:1501
       asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:568
       __put_user_nocheck_8+0x3/0x21
       clear_rseq_cs kernel/rseq.c:220 [inline]
       rseq_ip_fixup kernel/rseq.c:254 [inline]
       __rseq_handle_notify_resume+0x605/0x1250 kernel/rseq.c:292
       rseq_handle_notify_resume include/linux/sched.h:2204 [inline]
       tracehook_notify_resume include/linux/tracehook.h:201 [inline]
       exit_to_user_mode_loop+0xdc/0x130 kernel/entry/common.c:181
       exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:214
       __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
       syscall_exit_to_user_mode+0x5d/0x240 kernel/entry/common.c:307
       do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:86
       entry_SYSCALL_64_after_hwframe+0x66/0xd0

other info that might help us debug this:

Chain exists of:
  &p->pi_lock --> &rq->__lock --> lock#8

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(lock#8);
                               lock(&rq->__lock);
                               lock(lock#8);
  lock(&p->pi_lock);

 *** DEADLOCK ***

3 locks held by syz-executor126/3563:
 #0: ffff888078540828 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:136 [inline]
 #0: ffff888078540828 (&mm->mmap_lock){++++}-{3:3}, at: do_user_addr_fault arch/x86/mm/fault.c:1298 [inline]
 #0: ffff888078540828 (&mm->mmap_lock){++++}-{3:3}, at: handle_page_fault arch/x86/mm/fault.c:1445 [inline]
 #0: ffff888078540828 (&mm->mmap_lock){++++}-{3:3}, at: exc_page_fault+0x181/0x700 arch/x86/mm/fault.c:1501
 #1: ffff8880b9b35bb8 (lock#8){+.+.}-{2:2}, at: local_lock_acquire+0xd/0x170 include/linux/local_lock_internal.h:28
 #2: ffffffff8c91fb20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30

stack backtrace:
CPU: 1 PID: 3563 Comm: syz-executor126 Not tainted 5.15.164-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106
 check_noncircular+0x2f8/0x3b0 kernel/locking/lockdep.c:2133
 check_prev_add kernel/locking/lockdep.c:3053 [inline]
 check_prevs_add kernel/locking/lockdep.c:3172 [inline]
 validate_chain+0x1649/0x5930 kernel/locking/lockdep.c:3788
 __lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5012
 lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
 try_to_wake_up+0xae/0x1300 kernel/sched/core.c:4030
 rcu_read_unlock_special+0x3aa/0x520 kernel/rcu/tree_plugin.h:650
 __rcu_read_unlock+0x92/0x100 kernel/rcu/tree_plugin.h:422
 rcu_read_unlock include/linux/rcupdate.h:771 [inline]
 get_mem_cgroup_from_mm+0x179/0x260 mm/memcontrol.c:992
 get_mm_memcg_path+0x1b/0x550 mm/mmap_lock.c:202
 __mmap_lock_do_trace_acquire_returned+0x84/0x340 mm/mmap_lock.c:237
 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
 mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
 do_user_addr_fault arch/x86/mm/fault.c:1298 [inline]
 handle_page_fault arch/x86/mm/fault.c:1445 [inline]
 exc_page_fault+0x564/0x700 arch/x86/mm/fault.c:1501
 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:568
RIP: 0010:__put_user_nocheck_8+0x3/0x21
Code: 00 00 48 39 d9 73 34 0f 01 cb 89 01 31 c9 0f 01 ca c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f 00 00 48 39 d9 73 14 0f 01 cb <48> 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 00 0f 01 ca b9 f2 ff ff ff
RSP: 0018:ffffc90002de7d78 EFLAGS: 00050297
RAX: 0000000000000000 RBX: 00007fffffffeff9 RCX: 0000555556224ca8
RDX: 0000000000000000 RSI: ffffffff8a8b3ca0 RDI: ffffffff8ad8f800
RBP: ffffc90002de7eb8 R08: dffffc0000000000 R09: fffffbfff1bd2986
R10: 0000000000000000 R11: dffffc0000000001 R12: ffffc90002de7e28
R13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff920005bcfc6
 clear_rseq_cs kernel/rseq.c:220 [inline]
 rseq_ip_fixup kernel/rseq.c:254 [inline]
 __rseq_handle_notify_resume+0x605/0x1250 kernel/rseq.c:292
 rseq_handle_notify_resume include/linux/sched.h:2204 [inline]
 tracehook_notify_resume include/linux/tracehook.h:201 [inline]
 exit_to_user_mode_loop+0xdc/0x130 kernel/entry/common.c:181
 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:214
 __syscall_exit_to_user_mode_work kernel/entry/common.c:296 [inline]
 syscall_exit_to_user_mode+0x5d/0x240 kernel/entry/common.c:307
 do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f9bf3d598c3
Code: 00 00 00 00 00 66 90 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d de 07 05 00 00 74 14 b8 e6 00 00 00 0f 05 <f7> d8 c3 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10
RSP: 002b:00007ffecb8170b8 EFLAGS: 00000202 ORIG_RAX: 00000000000000e6
RAX: 0000000000000000 RBX: 0000000000000df9 RCX: 00007f9bf3d598c3
RDX: 00007ffecb8170d0 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00000000000f4240 R08: 00007ffecb9dd0b0 R09: 0000000000000010
R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000cc59
R13: 00007ffecb81710c R14: 00007ffecb817120 R15: 00007ffecb817110
 </TASK>
----------------
Code disassembly (best guess):
   0:	00 00                	add    %al,(%rax)
   2:	48 39 d9             	cmp    %rbx,%rcx
   5:	73 34                	jae    0x3b
   7:	0f 01 cb             	stac
   a:	89 01                	mov    %eax,(%rcx)
   c:	31 c9                	xor    %ecx,%ecx
   e:	0f 01 ca             	clac
  11:	c3                   	ret
  12:	66 0f 1f 44 00 00    	nopw   0x0(%rax,%rax,1)
  18:	48 bb f9 ef ff ff ff 	movabs $0x7fffffffeff9,%rbx
  1f:	7f 00 00
  22:	48 39 d9             	cmp    %rbx,%rcx
  25:	73 14                	jae    0x3b
  27:	0f 01 cb             	stac
* 2a:	48 89 01             	mov    %rax,(%rcx) <-- trapping instruction
  2d:	31 c9                	xor    %ecx,%ecx
  2f:	0f 01 ca             	clac
  32:	c3                   	ret
  33:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
  38:	0f 01 ca             	clac
  3b:	b9 f2 ff ff ff       	mov    $0xfffffff2,%ecx