======================================================
WARNING: possible circular locking dependency detected
5.15.164-syzkaller #0 Not tainted
------------------------------------------------------
syz.0.902/7543 is trying to acquire lock:
ffff88813fe227e8 (&p->pi_lock){-.-.}-{2:2}, at: try_to_wake_up+0xae/0x1300 kernel/sched/core.c:4030

but task is already holding lock:
ffff8880b9a35bb8 (lock#10){+.+.}-{2:2}, at: local_lock_acquire+0xd/0x170 include/linux/local_lock_internal.h:28

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #2 (lock#10){+.+.}-{2:2}:
       lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
       local_lock_acquire+0x29/0x170 include/linux/local_lock_internal.h:29
       __mmap_lock_do_trace_acquire_returned+0x7c/0x340 mm/mmap_lock.c:237
       __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
       mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
       stack_map_get_build_id_offset+0x612/0x930 kernel/bpf/stackmap.c:185
       __bpf_get_stack+0x495/0x570 kernel/bpf/stackmap.c:496
       ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1490 [inline]
       bpf_get_stack_raw_tp+0x1b2/0x220 kernel/trace/bpf_trace.c:1480
       0xffffffffa001a8d2
       bpf_dispatcher_nop_func include/linux/bpf.h:790 [inline]
       __bpf_prog_run include/linux/filter.h:628 [inline]
       bpf_prog_run include/linux/filter.h:635 [inline]
       __bpf_trace_run kernel/trace/bpf_trace.c:1880 [inline]
       bpf_trace_run2+0x19e/0x340 kernel/trace/bpf_trace.c:1917
       trace_tlb_flush+0xed/0x110 include/trace/events/tlb.h:38
       switch_mm_irqs_off+0x748/0xa30
       context_switch kernel/sched/core.c:5016 [inline]
       __schedule+0x1167/0x45b0 kernel/sched/core.c:6376
       preempt_schedule_common+0x83/0xd0 kernel/sched/core.c:6552
       preempt_schedule+0xd9/0xe0 kernel/sched/core.c:6577
       preempt_schedule_thunk+0x16/0x18 arch/x86/entry/thunk_64.S:34
       on_each_cpu_cond_mask+0x71/0x80 kernel/smp.c:1136
       on_each_cpu include/linux/smp.h:71 [inline]
       text_poke_sync arch/x86/kernel/alternative.c:1207 [inline]
       text_poke_bp_batch+0x2b4/0x930 arch/x86/kernel/alternative.c:1407
       text_poke_flush arch/x86/kernel/alternative.c:1598 [inline]
       text_poke_finish+0x16/0x30 arch/x86/kernel/alternative.c:1605
       arch_jump_label_transform_apply+0x13/0x20 arch/x86/kernel/jump_label.c:146
       static_key_enable_cpuslocked+0x12e/0x250 kernel/jump_label.c:177
       static_key_enable+0x16/0x20 kernel/jump_label.c:190
       tracepoint_add_func+0x947/0x9d0 kernel/tracepoint.c:361
       tracepoint_probe_register_prio_may_exist+0x11e/0x190 kernel/tracepoint.c:482
       bpf_raw_tracepoint_open+0x65a/0x750 kernel/bpf/syscall.c:3113
       __sys_bpf+0x468/0x670 kernel/bpf/syscall.c:4693
       __do_sys_bpf kernel/bpf/syscall.c:4755 [inline]
       __se_sys_bpf kernel/bpf/syscall.c:4753 [inline]
       __x64_sys_bpf+0x78/0x90 kernel/bpf/syscall.c:4753
       do_syscall_x64 arch/x86/entry/common.c:50 [inline]
       do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
       entry_SYSCALL_64_after_hwframe+0x66/0xd0

-> #1 (&rq->__lock){-.-.}-{2:2}:
       lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
       _raw_spin_lock_nested+0x2d/0x40 kernel/locking/spinlock.c:368
       raw_spin_rq_lock_nested+0x26/0x140 kernel/sched/core.c:475
       raw_spin_rq_lock kernel/sched/sched.h:1326 [inline]
       rq_lock kernel/sched/sched.h:1621 [inline]
       task_fork_fair+0x5d/0x350 kernel/sched/fair.c:11495
       sched_cgroup_fork+0x2d3/0x330 kernel/sched/core.c:4466
       copy_process+0x224a/0x3ef0 kernel/fork.c:2320
       kernel_clone+0x210/0x960 kernel/fork.c:2604
       kernel_thread+0x168/0x1e0 kernel/fork.c:2656
       rest_init+0x21/0x330 init/main.c:706
       start_kernel+0x48c/0x540 init/main.c:1140
       secondary_startup_64_no_verify+0xb1/0xbb

-> #0 (&p->pi_lock){-.-.}-{2:2}:
       check_prev_add kernel/locking/lockdep.c:3053 [inline]
       check_prevs_add kernel/locking/lockdep.c:3172 [inline]
       validate_chain+0x1649/0x5930 kernel/locking/lockdep.c:3788
       __lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5012
       lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
       __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
       _raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
       try_to_wake_up+0xae/0x1300 kernel/sched/core.c:4030
       rcu_read_unlock_special+0x3aa/0x520 kernel/rcu/tree_plugin.h:650
       __rcu_read_unlock+0x92/0x100 kernel/rcu/tree_plugin.h:422
       rcu_read_unlock include/linux/rcupdate.h:771 [inline]
       put_memcg_path_buf+0xde/0x100 mm/mmap_lock.c:153
       __mmap_lock_do_trace_acquire_returned+0x12f/0x340 mm/mmap_lock.c:237
       __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
       mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
       do_user_addr_fault arch/x86/mm/fault.c:1298 [inline]
       handle_page_fault arch/x86/mm/fault.c:1445 [inline]
       exc_page_fault+0x564/0x700 arch/x86/mm/fault.c:1501
       asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:568
       copy_user_enhanced_fast_string+0xe/0x40 arch/x86/lib/copy_user_64.S:205
       copy_user_generic arch/x86/include/asm/uaccess_64.h:37 [inline]
       raw_copy_to_user arch/x86/include/asm/uaccess_64.h:58 [inline]
       copyout lib/iov_iter.c:157 [inline]
       copy_page_to_iter_iovec lib/iov_iter.c:228 [inline]
       __copy_page_to_iter lib/iov_iter.c:861 [inline]
       copy_page_to_iter+0x49a/0x10d0 lib/iov_iter.c:889
       process_vm_rw_pages mm/process_vm_access.c:45 [inline]
       process_vm_rw_single_vec mm/process_vm_access.c:117 [inline]
       process_vm_rw_core mm/process_vm_access.c:215 [inline]
       process_vm_rw+0x886/0xcc0 mm/process_vm_access.c:283
       __do_sys_process_vm_readv mm/process_vm_access.c:295 [inline]
       __se_sys_process_vm_readv mm/process_vm_access.c:291 [inline]
       __x64_sys_process_vm_readv+0xdc/0xf0 mm/process_vm_access.c:291
       do_syscall_x64 arch/x86/entry/common.c:50 [inline]
       do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
       entry_SYSCALL_64_after_hwframe+0x66/0xd0

other info that might help us debug this:

Chain exists of:
  &p->pi_lock --> &rq->__lock --> lock#10

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(lock#10);
                               lock(&rq->__lock);
                               lock(lock#10);
  lock(&p->pi_lock);

 *** DEADLOCK ***

3 locks held by syz.0.902/7543:
 #0: ffff88801f649d28 (&mm->mmap_lock){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:136 [inline]
 #0: ffff88801f649d28 (&mm->mmap_lock){++++}-{3:3}, at: do_user_addr_fault arch/x86/mm/fault.c:1298 [inline]
 #0: ffff88801f649d28 (&mm->mmap_lock){++++}-{3:3}, at: handle_page_fault arch/x86/mm/fault.c:1445 [inline]
 #0: ffff88801f649d28 (&mm->mmap_lock){++++}-{3:3}, at: exc_page_fault+0x181/0x700 arch/x86/mm/fault.c:1501
 #1: ffff8880b9a35bb8 (lock#10){+.+.}-{2:2}, at: local_lock_acquire+0xd/0x170 include/linux/local_lock_internal.h:28
 #2: ffffffff8c91fb20 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x5/0x30 include/linux/rcupdate.h:311

stack backtrace:
CPU: 0 PID: 7543 Comm: syz.0.902 Not tainted 5.15.164-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106
 check_noncircular+0x2f8/0x3b0 kernel/locking/lockdep.c:2133
 check_prev_add kernel/locking/lockdep.c:3053 [inline]
 check_prevs_add kernel/locking/lockdep.c:3172 [inline]
 validate_chain+0x1649/0x5930 kernel/locking/lockdep.c:3788
 __lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5012
 lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5623
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0xd1/0x120 kernel/locking/spinlock.c:162
 try_to_wake_up+0xae/0x1300 kernel/sched/core.c:4030
 rcu_read_unlock_special+0x3aa/0x520 kernel/rcu/tree_plugin.h:650
 __rcu_read_unlock+0x92/0x100 kernel/rcu/tree_plugin.h:422
 rcu_read_unlock include/linux/rcupdate.h:771 [inline]
 put_memcg_path_buf+0xde/0x100 mm/mmap_lock.c:153
 __mmap_lock_do_trace_acquire_returned+0x12f/0x340 mm/mmap_lock.c:237
 __mmap_lock_trace_acquire_returned include/linux/mmap_lock.h:36 [inline]
 mmap_read_trylock include/linux/mmap_lock.h:137 [inline]
 do_user_addr_fault arch/x86/mm/fault.c:1298 [inline]
 handle_page_fault arch/x86/mm/fault.c:1445 [inline]
 exc_page_fault+0x564/0x700 arch/x86/mm/fault.c:1501
 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:568
RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 arch/x86/lib/copy_user_64.S:206
Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 <f3> a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8
RSP: 0018:ffffc900035d7a70 EFLAGS: 00050206
RAX: ffffffff84073801 RBX: 0000000020400e80 RCX: 0000000000000e80
RDX: 0000000000001000 RSI: ffff88800f55a180 RDI: 0000000020400000
RBP: ffffc900035d7cd0 R08: dffffc0000000000 R09: ffffed1001eab600
R10: 0000000000000000 R11: dffffc0000000001 R12: 00000000203ffe80
R13: 0000000000001000 R14: ffff88800f55a000 R15: 00007ffffffff000
 copy_user_generic arch/x86/include/asm/uaccess_64.h:37 [inline]
 raw_copy_to_user arch/x86/include/asm/uaccess_64.h:58 [inline]
 copyout lib/iov_iter.c:157 [inline]
 copy_page_to_iter_iovec lib/iov_iter.c:228 [inline]
 __copy_page_to_iter lib/iov_iter.c:861 [inline]
 copy_page_to_iter+0x49a/0x10d0 lib/iov_iter.c:889
 process_vm_rw_pages mm/process_vm_access.c:45 [inline]
 process_vm_rw_single_vec mm/process_vm_access.c:117 [inline]
 process_vm_rw_core mm/process_vm_access.c:215 [inline]
 process_vm_rw+0x886/0xcc0 mm/process_vm_access.c:283
 __do_sys_process_vm_readv mm/process_vm_access.c:295 [inline]
 __se_sys_process_vm_readv mm/process_vm_access.c:291 [inline]
 __x64_sys_process_vm_readv+0xdc/0xf0 mm/process_vm_access.c:291
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f90e42dd3b9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f90e275c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000136
RAX: ffffffffffffffda RBX: 00007f90e446bf80 RCX: 00007f90e42dd3b9
RDX: 0000000000000002 RSI: 0000000020008400 RDI: 000000000000003f
RBP: 00007f90e434a8e6 R08: 0000000000000286 R09: 0000000000000000
R10: 0000000020008640 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007f90e446bf80 R15: 00007fff9c9fb598
 </TASK>
----------------
Code disassembly (best guess):
   0:	89 d1                	mov    %edx,%ecx
   2:	c1 e9 03             	shr    $0x3,%ecx
   5:	83 e2 07             	and    $0x7,%edx
   8:	f3 48 a5             	rep movsq %ds:(%rsi),%es:(%rdi)
   b:	89 d1                	mov    %edx,%ecx
   d:	f3 a4                	rep movsb %ds:(%rsi),%es:(%rdi)
   f:	31 c0                	xor    %eax,%eax
  11:	0f 01 ca             	clac
  14:	c3                   	ret
  15:	0f 1f 80 00 00 00 00 	nopl   0x0(%rax)
  1c:	0f 01 cb             	stac
  1f:	83 fa 40             	cmp    $0x40,%edx
  22:	0f 82 70 ff ff ff    	jb     0xffffff98
  28:	89 d1                	mov    %edx,%ecx
* 2a:	f3 a4                	rep movsb %ds:(%rsi),%es:(%rdi) <-- trapping instruction
  2c:	31 c0                	xor    %eax,%eax
  2e:	0f 01 ca             	clac
  31:	c3                   	ret
  32:	66 2e 0f 1f 84 00 00 	cs nopw 0x0(%rax,%rax,1)
  39:	00 00 00
  3c:	89 d1                	mov    %edx,%ecx
  3e:	83                   	.byte 0x83
  3f:	f8                   	clc