============================================ WARNING: possible recursive locking detected syzkaller #0 Not tainted -------------------------------------------- syz.2.230/5052 is trying to acquire lock: ffff888113412e18 (&qs->lock){-.-.}-{2:2}, at: queue_stack_map_push_elem+0x8b/0x1b0 kernel/bpf/queue_stack_maps.c:210 but task is already holding lock: ffff888113411218 (&qs->lock){-.-.}-{2:2}, at: queue_stack_map_push_elem+0x8b/0x1b0 kernel/bpf/queue_stack_maps.c:210 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&qs->lock); lock(&qs->lock); *** DEADLOCK *** May be due to missing lock nesting notation 4 locks held by syz.2.230/5052: #0: ffff8881230b2f48 (&tsk->futex_exit_mutex){+.+.}-{3:3}, at: futex_cleanup_begin kernel/futex/core.c:1076 [inline] #0: ffff8881230b2f48 (&tsk->futex_exit_mutex){+.+.}-{3:3}, at: futex_exit_release+0x1d/0xc0 kernel/futex/core.c:1128 #1: ffffffff83185d48 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:334 [inline] #1: ffffffff83185d48 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:786 [inline] #1: ffffffff83185d48 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2321 [inline] #1: ffffffff83185d48 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x54/0x1a0 kernel/trace/bpf_trace.c:2361 #2: ffff888113411218 (&qs->lock){-.-.}-{2:2}, at: queue_stack_map_push_elem+0x8b/0x1b0 kernel/bpf/queue_stack_maps.c:210 #3: ffffffff83185d48 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:334 [inline] #3: ffffffff83185d48 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:786 [inline] #3: ffffffff83185d48 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2321 [inline] #3: ffffffff83185d48 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x54/0x1a0 kernel/trace/bpf_trace.c:2361 stack backtrace: CPU: 1 PID: 5052 Comm: syz.2.230 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Call Trace: dump_stack_lvl+0x83/0xe0 lib/dump_stack.c:106 print_deadlock_bug+0x2ac/0x2f0 kernel/locking/lockdep.c:3012 check_deadlock kernel/locking/lockdep.c:3062 [inline] validate_chain kernel/locking/lockdep.c:3856 [inline] __lock_acquire+0x1146/0x22c0 kernel/locking/lockdep.c:5137 lock_acquire+0xe9/0x260 kernel/locking/lockdep.c:5754 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x60/0x90 kernel/locking/spinlock.c:162 queue_stack_map_push_elem+0x8b/0x1b0 kernel/bpf/queue_stack_maps.c:210 ___bpf_prog_run+0xe04/0x24e0 kernel/bpf/core.c:1971 __bpf_prog_run32+0xbb/0xe0 kernel/bpf/core.c:2212 bpf_dispatcher_nop_func include/linux/bpf.h:1223 [inline] __bpf_prog_run include/linux/filter.h:612 [inline] bpf_prog_run include/linux/filter.h:619 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2322 [inline] bpf_trace_run2+0xc7/0x1a0 kernel/trace/bpf_trace.c:2361 __traceiter_contention_end+0x28/0x40 include/trace/events/lock.h:122 trace_contention_end include/trace/events/lock.h:122 [inline] __pv_queued_spin_lock_slowpath+0x446/0x460 kernel/locking/qspinlock.c:560 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:586 [inline] queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline] queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] do_raw_spin_lock+0xcf/0xe0 kernel/locking/spinlock_debug.c:115 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:111 [inline] _raw_spin_lock_irqsave+0x6c/0x90 kernel/locking/spinlock.c:162 queue_stack_map_push_elem+0x8b/0x1b0 kernel/bpf/queue_stack_maps.c:210 ___bpf_prog_run+0xe04/0x24e0 kernel/bpf/core.c:1971 __bpf_prog_run32+0xbb/0xe0 kernel/bpf/core.c:2212 bpf_dispatcher_nop_func include/linux/bpf.h:1223 [inline] __bpf_prog_run include/linux/filter.h:612 [inline] bpf_prog_run include/linux/filter.h:619 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2322 [inline] bpf_trace_run2+0xc7/0x1a0 kernel/trace/bpf_trace.c:2361 __traceiter_contention_end+0x28/0x40 include/trace/events/lock.h:122 trace_contention_end include/trace/events/lock.h:122 [inline] __mutex_lock_common kernel/locking/mutex.c:612 [inline] __mutex_lock+0x886/0xa00 kernel/locking/mutex.c:747 futex_cleanup_begin kernel/futex/core.c:1076 [inline] futex_exit_release+0x1d/0xc0 kernel/futex/core.c:1128 exit_mm_release+0x12/0x20 kernel/fork.c:1657 exit_mm+0x33/0x150 kernel/exit.c:541 do_exit+0x239/0xa00 kernel/exit.c:870 do_group_exit+0x87/0xa0 kernel/exit.c:1024 get_signal+0x6f1/0x7a0 kernel/signal.c:2902 arch_do_signal_or_restart+0x89/0x2a0 arch/x86/kernel/signal.c:310 exit_to_user_mode_loop+0x70/0xf0 kernel/entry/common.c:174 exit_to_user_mode_prepare+0xea/0x150 kernel/entry/common.c:210 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x1a/0x50 kernel/entry/common.c:302 do_syscall_64+0x61/0xb0 arch/x86/entry/common.c:87 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7fb80939ebe9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fb80920f0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007fb8095c5fa8 RCX: 00007fb80939ebe9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fb8095c5fa8 RBP: 00007fb8095c5fa0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fb8095c6038 R14: 00007fff9445abd0 R15: 00007fff9445acb8