============================= WARNING: suspicious RCU usage 4.17.0-rc2+ #15 Not tainted ----------------------------- include/linux/rcupdate.h:304 Illegal context switch in RCU read-side critical section! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor4/12997: #0: (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509 #1: (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183 stack backtrace: CPU: 1 PID: 12997 Comm: syz-executor4 Not tainted 4.17.0-rc2+ #15 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592 rcu_preempt_sleep_check include/linux/rcupdate.h:303 [inline] ___might_sleep+0x26d/0x320 kernel/sched/core.c:6153 __might_sleep+0x95/0x190 kernel/sched/core.c:6141 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2b9/0x760 mm/slab.c:3727 kmalloc_array include/linux/slab.h:631 [inline] kcalloc include/linux/slab.h:642 [inline] numa_crng_init drivers/char/random.c:798 [inline] crng_reseed+0x427/0x920 drivers/char/random.c:923 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:783 [inline] RIP: 0010:lock_acquire+0x257/0x520 kernel/locking/lockdep.c:3923 RSP: 0000:ffff8801b3edf240 EFLAGS: 00000286 ORIG_RAX: ffffffffffffffd5 RAX: dffffc0000000000 RBX: 1ffff100367dbe4d RCX: 0000000000000000 RDX: 1ffffffff11a315d RSI: ffff880196decf38 RDI: 0000000000000286 RBP: ffff8801b3edf330 R08: 0000000000000008 R09: 0000000000000001 R10: ffff880196decf60 R11: ffff880196dec700 R12: ffff880196dec700 R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:246 [inline] rcu_read_lock include/linux/rcupdate.h:632 [inline] __list_lru_count_one mm/list_lru.c:172 [inline] list_lru_count_one+0xfe/0x440 mm/list_lru.c:183 list_lru_shrink_count include/linux/list_lru.h:118 [inline] super_cache_count+0x16b/0x280 fs/super.c:135 do_shrink_slab mm/vmscan.c:374 [inline] shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531 shrink_slab+0xa1/0xc0 mm/vmscan.c:506 shrink_node+0x4f2/0x1740 mm/vmscan.c:2561 shrink_zones mm/vmscan.c:2794 [inline] do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856 try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146 reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862 mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166 prepare_exit_to_usermode+0x32e/0x390 arch/x86/entry/common.c:196 retint_user+0x8/0x18 RIP: 0033:0x408dad RSP: 002b:0000000000a3e910 EFLAGS: 00010246 RAX: 000000007ecb6776 RBX: 0000000000000001 RCX: 000000000000001d RDX: 0000000000000000 RSI: 0000000000000776 RDI: 000000007ecb6776 RBP: 0000000000000001 R08: 000000007ecb677a R09: 0000000000000000 R10: 0000000000a3e940 R11: 0000000000000246 R12: 000000001a618aac R13: 0000000000000016 R14: 000000000072bea0 R15: 000000000002a979 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 1, pid: 12997, name: syz-executor4 2 locks held by syz-executor4/12997: #0: (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509 #1: (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183 irq event stamp: 1510 hardirqs last enabled at (1509): [] count_shadow_nodes+0xc0/0x2e0 mm/workingset.c:372 hardirqs last disabled at (1510): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 softirqs last enabled at (1502): [] __do_softirq+0x778/0xaf5 kernel/softirq.c:311 softirqs last disabled at (1483): [] invoke_softirq kernel/softirq.c:365 [inline] softirqs last disabled at (1483): [] irq_exit+0x1d1/0x200 kernel/softirq.c:405 CPU: 1 PID: 12997 Comm: syz-executor4 Not tainted 4.17.0-rc2+ #15 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 ___might_sleep.cold.87+0x11f/0x13a kernel/sched/core.c:6188 __might_sleep+0x95/0x190 kernel/sched/core.c:6141 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2b9/0x760 mm/slab.c:3727 kmalloc_array include/linux/slab.h:631 [inline] kcalloc include/linux/slab.h:642 [inline] numa_crng_init drivers/char/random.c:798 [inline] crng_reseed+0x427/0x920 drivers/char/random.c:923 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:783 [inline] RIP: 0010:lock_acquire+0x257/0x520 kernel/locking/lockdep.c:3923 RSP: 0000:ffff8801b3edf240 EFLAGS: 00000286 ORIG_RAX: ffffffffffffffd5 RAX: dffffc0000000000 RBX: 1ffff100367dbe4d RCX: 0000000000000000 RDX: 1ffffffff11a315d RSI: ffff880196decf38 RDI: 0000000000000286 RBP: ffff8801b3edf330 R08: 0000000000000008 R09: 0000000000000001 R10: ffff880196decf60 R11: ffff880196dec700 R12: ffff880196dec700 R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:246 [inline] rcu_read_lock include/linux/rcupdate.h:632 [inline] __list_lru_count_one mm/list_lru.c:172 [inline] list_lru_count_one+0xfe/0x440 mm/list_lru.c:183 list_lru_shrink_count include/linux/list_lru.h:118 [inline] super_cache_count+0x16b/0x280 fs/super.c:135 do_shrink_slab mm/vmscan.c:374 [inline] shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531 shrink_slab+0xa1/0xc0 mm/vmscan.c:506 shrink_node+0x4f2/0x1740 mm/vmscan.c:2561 shrink_zones mm/vmscan.c:2794 [inline] do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856 try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146 reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862 mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166 prepare_exit_to_usermode+0x32e/0x390 arch/x86/entry/common.c:196 retint_user+0x8/0x18 RIP: 0033:0x408dad RSP: 002b:0000000000a3e910 EFLAGS: 00010246 RAX: 000000007ecb6776 RBX: 0000000000000001 RCX: 000000000000001d RDX: 0000000000000000 RSI: 0000000000000776 RDI: 000000007ecb6776 RBP: 0000000000000001 R08: 000000007ecb677a R09: 0000000000000000 R10: 0000000000a3e940 R11: 0000000000000246 R12: 000000001a618aac R13: 0000000000000016 R14: 000000000072bea0 R15: 000000000002a979 random: crng init done binder: BINDER_SET_CONTEXT_MGR already set binder: 13156:13157 ioctl 40046207 0 returned -16 print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0, logical block 0, lost async page write print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0, logical block 0, lost async page write print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0, logical block 0, lost async page write dccp_xmit_packet: Payload too large (65423) for featneg. dccp_xmit_packet: Payload too large (65423) for featneg. dccp_xmit_packet: Payload too large (65423) for featneg. dccp_xmit_packet: Payload too large (65423) for featneg. dccp_xmit_packet: Payload too large (65423) for featneg. dccp_xmit_packet: Payload too large (65423) for featneg. dccp_xmit_packet: Payload too large (65423) for featneg.