============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #99 Not tainted ----------------------------- include/linux/rcupdate.h:631 rcu_read_lock() used illegally while idle! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 00000000af0a42da (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #99 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_lock include/linux/rcupdate.h:630 [inline] trace_call_bpf+0x59e/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on_caller+0x249/0x300 kernel/trace/trace_preemptirq.c:51 trace_hardirqs_on_thunk+0x1a/0x1c retint_kernel+0x2d/0x2d RIP: 0010:native_safe_halt+0x6/0x10 arch/x86/include/asm/irqflags.h:57 Code: e9 2c ff ff ff 48 89 c7 48 89 45 d8 e8 23 f5 01 fa 48 8b 45 d8 e9 ca fe ff ff 48 89 df e8 12 f5 01 fa eb 82 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 90 90 90 90 90 RSP: 0018:ffff8801d9b2fbf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff02 RAX: dffffc0000000000 RBX: 1ffff1003b365f82 RCX: 0000000000000000 RDX: 1ffffffff12e4538 RSI: 0000000000000001 RDI: ffffffff897229c0 RBP: ffff8801d9b2fbf0 R08: ffff8801d9b1a3c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d9b2fcb0 R13: ffffffff8a517d60 R14: 0000000000000000 R15: 0000000000000001 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline] default_idle+0xbf/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #99 Not tainted ----------------------------- kernel/trace/bpf_trace.c:72 suspicious rcu_dereference_check() usage! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 00000000af0a42da (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #99 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 trace_call_bpf+0x556/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on_caller+0x249/0x300 kernel/trace/trace_preemptirq.c:51 trace_hardirqs_on_thunk+0x1a/0x1c retint_kernel+0x2d/0x2d RIP: 0010:native_safe_halt+0x6/0x10 arch/x86/include/asm/irqflags.h:57 Code: e9 2c ff ff ff 48 89 c7 48 89 45 d8 e8 23 f5 01 fa 48 8b 45 d8 e9 ca fe ff ff 48 89 df e8 12 f5 01 fa eb 82 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 90 90 90 90 90 RSP: 0018:ffff8801d9b2fbf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff02 RAX: dffffc0000000000 RBX: 1ffff1003b365f82 RCX: 0000000000000000 RDX: 1ffffffff12e4538 RSI: 0000000000000001 RDI: ffffffff897229c0 RBP: ffff8801d9b2fbf0 R08: ffff8801d9b1a3c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d9b2fcb0 R13: ffffffff8a517d60 R14: 0000000000000000 R15: 0000000000000001 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline] default_idle+0xbf/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #99 Not tainted ----------------------------- include/linux/rcupdate.h:680 rcu_read_unlock() used illegally while idle! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 00000000af0a42da (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #99 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_unlock include/linux/rcupdate.h:679 [inline] trace_call_bpf+0x50e/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on_caller+0x249/0x300 kernel/trace/trace_preemptirq.c:51 trace_hardirqs_on_thunk+0x1a/0x1c retint_kernel+0x2d/0x2d RIP: 0010:native_safe_halt+0x6/0x10 arch/x86/include/asm/irqflags.h:57 Code: e9 2c ff ff ff 48 89 c7 48 89 45 d8 e8 23 f5 01 fa 48 8b 45 d8 e9 ca fe ff ff 48 89 df e8 12 f5 01 fa eb 82 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 90 90 90 90 90 RSP: 0018:ffff8801d9b2fbf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff02 RAX: dffffc0000000000 RBX: 1ffff1003b365f82 RCX: 0000000000000000 RDX: 1ffffffff12e4538 RSI: 0000000000000001 RDI: ffffffff897229c0 RBP: ffff8801d9b2fbf0 R08: ffff8801d9b1a3c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d9b2fcb0 R13: ffffffff8a517d60 R14: 0000000000000000 R15: 0000000000000001 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline] default_idle+0xbf/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 sctp: [Deprecated]: syz-executor4 (pid 13579) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor4 (pid 13586) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. netlink: 3290 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3290 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3290 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3290 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3290 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3290 bytes leftover after parsing attributes in process `syz-executor4'. EXT4-fs (sda1): re-mounted. Opts: EXT4-fs (sda1): re-mounted. Opts: protocol 0004 is buggy, dev gre0 can: notifier: receive list not found for dev tap0 protocol 0004 is buggy, dev gre0 protocol 0004 is buggy, dev gre0 protocol 0004 is buggy, dev gre0 protocol 0004 is buggy, dev gre0 protocol 0004 is buggy, dev gre0 netlink: 3286 bytes leftover after parsing attributes in process `syz-executor4'. protocol 0004 is buggy, dev gre0 device lo entered promiscuous mode