============================= WARNING: suspicious RCU usage 4.17.0-rc2+ #14 Not tainted ----------------------------- include/linux/rcupdate.h:304 Illegal context switch in RCU read-side critical section! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor5/7975: #0: (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509 #1: (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183 stack backtrace: CPU: 0 PID: 7975 Comm: syz-executor5 Not tainted 4.17.0-rc2+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592 rcu_preempt_sleep_check include/linux/rcupdate.h:303 [inline] ___might_sleep+0x26d/0x320 kernel/sched/core.c:6153 __might_sleep+0x95/0x190 kernel/sched/core.c:6141 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2b9/0x760 mm/slab.c:3727 kmalloc_array include/linux/slab.h:631 [inline] kcalloc include/linux/slab.h:642 [inline] numa_crng_init drivers/char/random.c:798 [inline] crng_reseed+0x427/0x920 drivers/char/random.c:923 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642 RIP: 0010:__preempt_count_sub arch/x86/include/asm/preempt.h:81 [inline] RIP: 0010:rcu_is_watching+0xf0/0x140 kernel/rcu/tree.c:1076 RSP: 0018:ffff88018bb57298 EFLAGS: 00000202 ORIG_RAX: ffffffffffffffd9 RAX: 0000000000015b87 RBX: ffffed003176ae54 RCX: 1ffff1003176ae58 RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8801dae23610 RBP: ffff88018bb57328 R08: ffffed003b5c46c3 R09: ffffed003b5c46c2 R10: ffffed003b5c46c2 R11: ffff8801dae23613 R12: 1ffff1003176ae58 R13: ffff8801dae23610 R14: ffff88018bb57300 R15: dffffc0000000000 rcu_read_lock_held+0x87/0xc0 kernel/rcu/update.c:329 list_lru_from_memcg_idx mm/list_lru.c:60 [inline] __list_lru_count_one mm/list_lru.c:173 [inline] list_lru_count_one+0x30d/0x440 mm/list_lru.c:183 list_lru_shrink_count include/linux/list_lru.h:118 [inline] super_cache_count+0x10f/0x280 fs/super.c:134 do_shrink_slab mm/vmscan.c:374 [inline] shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531 shrink_slab+0xa1/0xc0 mm/vmscan.c:506 shrink_node+0x4f2/0x1740 mm/vmscan.c:2561 shrink_zones mm/vmscan.c:2794 [inline] do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856 try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146 reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862 mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166 prepare_exit_to_usermode+0x32e/0x390 arch/x86/entry/common.c:196 retint_user+0x8/0x18 RIP: 0033:0x407715 RSP: 002b:0000000000a3e940 EFLAGS: 00010246 RAX: 000000002025c000 RBX: 0000000000000000 RCX: 0000000000000002 RDX: 8e9e4a5e3069763d RSI: 0000000000000000 RDI: 0000000002866848 RBP: 0000000000000001 R08: 0000000000000000 R09: 00000000007301a0 R10: 0000000000a3e940 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000002 R14: 000000000072bea0 R15: 000000000001792e BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 1, pid: 7975, name: syz-executor5 2 locks held by syz-executor5/7975: #0: (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509 #1: (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183 irq event stamp: 1598 hardirqs last enabled at (1597): [] count_shadow_nodes+0xc0/0x2e0 mm/workingset.c:372 hardirqs last disabled at (1598): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 softirqs last enabled at (1588): [] __do_softirq+0x778/0xaf5 kernel/softirq.c:311 softirqs last disabled at (1573): [] invoke_softirq kernel/softirq.c:365 [inline] softirqs last disabled at (1573): [] irq_exit+0x1d1/0x200 kernel/softirq.c:405 CPU: 0 PID: 7975 Comm: syz-executor5 Not tainted 4.17.0-rc2+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 ___might_sleep.cold.87+0x11f/0x13a kernel/sched/core.c:6188 __might_sleep+0x95/0x190 kernel/sched/core.c:6141 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2b9/0x760 mm/slab.c:3727 kmalloc_array include/linux/slab.h:631 [inline] kcalloc include/linux/slab.h:642 [inline] numa_crng_init drivers/char/random.c:798 [inline] crng_reseed+0x427/0x920 drivers/char/random.c:923 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642 RIP: 0010:__preempt_count_sub arch/x86/include/asm/preempt.h:81 [inline] RIP: 0010:rcu_is_watching+0xf0/0x140 kernel/rcu/tree.c:1076 RSP: 0018:ffff88018bb57298 EFLAGS: 00000202 ORIG_RAX: ffffffffffffffd9 RAX: 0000000000015b87 RBX: ffffed003176ae54 RCX: 1ffff1003176ae58 RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8801dae23610 RBP: ffff88018bb57328 R08: ffffed003b5c46c3 R09: ffffed003b5c46c2 R10: ffffed003b5c46c2 R11: ffff8801dae23613 R12: 1ffff1003176ae58 R13: ffff8801dae23610 R14: ffff88018bb57300 R15: dffffc0000000000 rcu_read_lock_held+0x87/0xc0 kernel/rcu/update.c:329 list_lru_from_memcg_idx mm/list_lru.c:60 [inline] __list_lru_count_one mm/list_lru.c:173 [inline] list_lru_count_one+0x30d/0x440 mm/list_lru.c:183 list_lru_shrink_count include/linux/list_lru.h:118 [inline] super_cache_count+0x10f/0x280 fs/super.c:134 do_shrink_slab mm/vmscan.c:374 [inline] shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531 shrink_slab+0xa1/0xc0 mm/vmscan.c:506 shrink_node+0x4f2/0x1740 mm/vmscan.c:2561 shrink_zones mm/vmscan.c:2794 [inline] do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856 try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146 reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862 mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166 prepare_exit_to_usermode+0x32e/0x390 arch/x86/entry/common.c:196 retint_user+0x8/0x18 RIP: 0033:0x407715 RSP: 002b:0000000000a3e940 EFLAGS: 00010246 RAX: 000000002025c000 RBX: 0000000000000000 RCX: 0000000000000002 RDX: 8e9e4a5e3069763d RSI: 0000000000000000 RDI: 0000000002866848 RBP: 0000000000000001 R08: 0000000000000000 R09: 00000000007301a0 R10: 0000000000a3e940 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000002 R14: 000000000072bea0 R15: 000000000001792e random: crng init done QAT: Invalid ioctl QAT: Invalid ioctl handle_userfault: 78 callbacks suppressed FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 7999 Comm: syz-executor3 Tainted: G W 4.17.0-rc2+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 handle_userfault.cold.32+0x44/0x5a fs/userfaultfd.c:430 do_anonymous_page mm/memory.c:3147 [inline] handle_pte_fault mm/memory.c:3961 [inline] __handle_mm_fault+0x38d8/0x4310 mm/memory.c:4087 handle_mm_fault+0x53a/0xc70 mm/memory.c:4124 __do_page_fault+0x60b/0xe40 arch/x86/mm/fault.c:1399 do_page_fault+0xee/0x8a7 arch/x86/mm/fault.c:1474 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1160 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff88018bf3fc38 EFLAGS: 00010202 RAX: ffffed00317e7fb3 RBX: 0000000000000020 RCX: 0000000000000004 RDX: 0000000000000000 RSI: 0000000020013000 RDI: ffff88018bf3fd78 RBP: ffff88018bf3fc70 R08: ffffed00317e7fb3 R09: ffffed00317e7faf R10: ffffed00317e7fb2 R11: ffff88018bf3fd97 R12: 0000000020013020 R13: 0000000020013000 R14: ffff88018bf3fd78 R15: 00007ffffffff000 copy_from_user include/linux/uaccess.h:147 [inline] do_fcntl+0xccf/0x14b0 fs/fcntl.c:368 __do_sys_fcntl fs/fcntl.c:463 [inline] __se_sys_fcntl fs/fcntl.c:448 [inline] __x64_sys_fcntl+0x177/0x1f0 fs/fcntl.c:448 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455389 RSP: 002b:00007f7166e10c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 RAX: ffffffffffffffda RBX: 00007f7166e116d4 RCX: 0000000000455389 RDX: 0000000020013000 RSI: 0000000000000006 RDI: 0000000000000015 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 000000000000008e R14: 00000000006f3df0 R15: 0000000000000000 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 7999 Comm: syz-executor3 Tainted: G W 4.17.0-rc2+ #14 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 handle_userfault.cold.32+0x44/0x5a fs/userfaultfd.c:430 do_anonymous_page mm/memory.c:3147 [inline] handle_pte_fault mm/memory.c:3961 [inline] __handle_mm_fault+0x38d8/0x4310 mm/memory.c:4087 handle_mm_fault+0x53a/0xc70 mm/memory.c:4124 __do_page_fault+0x60b/0xe40 arch/x86/mm/fault.c:1399 do_page_fault+0xee/0x8a7 arch/x86/mm/fault.c:1474 page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1160 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff88018bf3fc38 EFLAGS: 00010202 RAX: ffffed00317e7fb3 RBX: 0000000000000020 RCX: 0000000000000004 RDX: 0000000000000000 RSI: 0000000020013000 RDI: ffff88018bf3fd78 RBP: ffff88018bf3fc70 R08: ffffed00317e7fb3 R09: ffffed00317e7faf R10: ffffed00317e7fb2 R11: ffff88018bf3fd97 R12: 0000000020013020 R13: 0000000020013000 R14: ffff88018bf3fd78 R15: 00007ffffffff000 copy_from_user include/linux/uaccess.h:147 [inline] do_fcntl+0xccf/0x14b0 fs/fcntl.c:368 __do_sys_fcntl fs/fcntl.c:463 [inline] __se_sys_fcntl fs/fcntl.c:448 [inline] __x64_sys_fcntl+0x177/0x1f0 fs/fcntl.c:448 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455389 RSP: 002b:00007f7166e10c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 RAX: ffffffffffffffda RBX: 00007f7166e116d4 RCX: 0000000000455389 RDX: 0000000020013000 RSI: 0000000000000006 RDI: 0000000000000015 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 000000000000008e R14: 00000000006f3df0 R15: 0000000000000000 binder: 8105:8106 ERROR: BC_REGISTER_LOOPER called without request binder: 8105:8106 transaction failed 29189/-22, size 0-0 line 2848 binder: 8105:8106 ioctl 40046205 4 returned -22 binder_alloc: binder_alloc_mmap_handler: 8105 20000000-20002000 already mapped failed -16 binder: 8105:8106 ERROR: BC_REGISTER_LOOPER called without request binder: 8105:8110 transaction failed 29189/-22, size 0-0 line 2848 binder: 8105:8106 ioctl 40046205 4 returned -22 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29189 kernel msg: ebtables bug: please report to author: entries_size too small kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher IPVS: ftp: loaded support on port[0] = 21 kernel msg: ebtables bug: please report to author: Wrong len argument kernel msg: ebtables bug: please report to author: Wrong len argument TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters.