=============================
WARNING: suspicious RCU usage
5.13.0-rc3-syzkaller #0 Not tainted
-----------------------------
kernel/sched/core.c:8304 Illegal context switch in RCU-sched read-side critical section!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 0
no locks held by systemd-udevd/4849.
stack backtrace:
CPU: 1 PID: 4849 Comm: systemd-udevd Not tainted 5.13.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:79 [inline]
dump_stack+0x141/0x1d7 lib/dump_stack.c:120
___might_sleep+0x266/0x2c0 kernel/sched/core.c:8304
__fput+0xf9/0x920 fs/file_table.c:264
task_work_run+0xdd/0x1a0 kernel/task_work.c:164
tracehook_notify_resume include/linux/tracehook.h:189 [inline]
exit_to_user_mode_loop kernel/entry/common.c:174 [inline]
exit_to_user_mode_prepare+0x272/0x280 kernel/entry/common.c:208
__syscall_exit_to_user_mode_work kernel/entry/common.c:290 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:301
do_syscall_64+0x47/0xb0 arch/x86/entry/common.c:57
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f664dd4ba07
Code: 2e 00 f7 d8 bf ff ff ff ff 64 89 02 eb d0 0f 1f 44 00 00 48 85 ff 74 3b 53 8b 1f e8 3b bf f6 ff 48 63 fb b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 09 5b c3 0f 1f 80 00 00 00 00 48 8b 15 59 54
RSP: 002b:00007fffefe75b00 EFLAGS: 00000202
ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 000000000000000f RCX: 00007f664dd4ba07
RDX: 00007f664e031b58 RSI: 0000000000000000 RDI: 000000000000000f
RBP: 00007f664ef01710 R08: 000055c17cd49fe0 R09: 0000000000008040
R10: 00007f664e031b58 R11: 0000000000000202 R12: 0000000000000000
R13: 000055c17cd31c60 R14: 00000000000000ff R15: 000055c17cd31c60