============================= WARNING: suspicious RCU usage syzkaller #0 Not tainted ----------------------------- kernel/events/callchain.c:163 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz.4.1444/10845: #0: ffffffff887f51d8 (rcu_tasks_trace_srcu_struct){....}-{0:0}, at: bpf_prog_test_run_syscall+0x2c6/0xe74 net/bpf/test_run.c:1635 stack backtrace: CPU: 1 UID: 0 PID: 10845 Comm: syz.4.1444 Not tainted syzkaller #0 PREEMPT Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:149 [] show_stack+0x30/0x3c arch/riscv/kernel/stacktrace.c:155 [] __dump_stack lib/dump_stack.c:94 [inline] [] dump_stack_lvl+0x114/0x1ac lib/dump_stack.c:120 [] dump_stack+0x1c/0x28 lib/dump_stack.c:129 [] lockdep_rcu_suspicious+0x19e/0x268 kernel/locking/lockdep.c:6876 [] get_callchain_entry+0x370/0x3f8 kernel/events/callchain.c:163 [] get_perf_callchain+0x390/0x904 kernel/events/callchain.c:231 [] __bpf_get_stack+0x538/0xa88 kernel/bpf/stackmap.c:472 [] ____bpf_get_stack kernel/bpf/stackmap.c:517 [inline] [] bpf_get_stack+0x34/0x44 kernel/bpf/stackmap.c:514 [] ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1661 [inline] [] bpf_get_stack_raw_tp+0xc2/0x114 kernel/trace/bpf_trace.c:1651 [] bpf_prog_e8e6327ccf46c9a7+0x48/0x5a [] bpf_dispatcher_nop_func include/linux/bpf.h:1402 [inline] [] __bpf_prog_run include/linux/filter.h:723 [inline] [] bpf_prog_run include/linux/filter.h:730 [inline] [] bpf_prog_run_pin_on_cpu include/linux/filter.h:747 [inline] [] bpf_prog_test_run_syscall+0x4fe/0xe74 net/bpf/test_run.c:1640 [] bpf_prog_test_run kernel/bpf/syscall.c:4722 [inline] [] __sys_bpf+0x1292/0x54dc kernel/bpf/syscall.c:6246 [] __do_sys_bpf kernel/bpf/syscall.c:6341 [inline] [] __se_sys_bpf kernel/bpf/syscall.c:6339 [inline] [] __riscv_sys_bpf+0x70/0xd0 kernel/bpf/syscall.c:6339 [] syscall_handler+0x92/0x114 arch/riscv/include/asm/syscall.h:112 [] do_trap_ecall_u+0x402/0x680 arch/riscv/kernel/traps.c:342 [] handle_exception+0x15e/0x16a arch/riscv/kernel/entry.S:232