device nr0 entered promiscuous mode ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #96 Not tainted ----------------------------- include/linux/rcupdate.h:631 rcu_read_lock() used illegally while idle! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 000000009016b91a (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #96 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_lock include/linux/rcupdate.h:630 [inline] trace_call_bpf+0x59e/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on+0x250/0x310 kernel/trace/trace_preemptirq.c:25 default_idle+0x8a/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #96 Not tainted ----------------------------- kernel/trace/bpf_trace.c:72 suspicious rcu_dereference_check() usage! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 000000009016b91a (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #96 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 trace_call_bpf+0x556/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on+0x250/0x310 kernel/trace/trace_preemptirq.c:25 default_idle+0x8a/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #96 Not tainted ----------------------------- include/linux/rcupdate.h:680 rcu_read_unlock() used illegally while idle! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 000000009016b91a (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #96 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_unlock include/linux/rcupdate.h:679 [inline] trace_call_bpf+0x50e/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on+0x250/0x310 kernel/trace/trace_preemptirq.c:25 default_idle+0x8a/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ¹á6›Íaï~IyMá‡ì: renamed from nr0 device nr0 entered promiscuous mode EXT4-fs (sda1): re-mounted. Opts: (null) EXT4-fs (sda1): re-mounted. Opts: (null) device nr0 entered promiscuous mode syz-executor5 (7582) used greatest stack depth: 14040 bytes left ********************************************************** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging ** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ********************************************************** EXT4-fs (sda1): re-mounted. Opts: EXT4-fs (sda1): re-mounted. Opts: device lo entered promiscuous mode EXT4-fs (sda1): Unrecognized mount option "R" or missing value EXT4-fs (sda1): Unrecognized mount option "R" or missing value nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. cgroup: cgroup2: unknown option "mode=00000000000000000000046" cgroup: cgroup2: unknown option "mode=00000000000000000000046"