=============================
WARNING: suspicious RCU usage
4.17.0-rc2+ #14 Not tainted
-----------------------------
include/linux/rcupdate.h:304 Illegal context switch in RCU read-side critical section!
other info that might help us debug this:
rcu_scheduler_active = 2, debug_locks = 1
2 locks held by syz-executor5/7975:
#0: (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509
#1: (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183
stack backtrace:
CPU: 0 PID: 7975 Comm: syz-executor5 Not tainted 4.17.0-rc2+ #14
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1b9/0x294 lib/dump_stack.c:113
lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592
rcu_preempt_sleep_check include/linux/rcupdate.h:303 [inline]
___might_sleep+0x26d/0x320 kernel/sched/core.c:6153
__might_sleep+0x95/0x190 kernel/sched/core.c:6141
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3378 [inline]
__do_kmalloc mm/slab.c:3716 [inline]
__kmalloc+0x2b9/0x760 mm/slab.c:3727
kmalloc_array include/linux/slab.h:631 [inline]
kcalloc include/linux/slab.h:642 [inline]
numa_crng_init drivers/char/random.c:798 [inline]
crng_reseed+0x427/0x920 drivers/char/random.c:923
credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708
add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254
handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191
handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206
handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791
generic_handle_irq_desc include/linux/irqdesc.h:159 [inline]
handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77
do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245
common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642
RIP: 0010:__preempt_count_sub arch/x86/include/asm/preempt.h:81 [inline]
RIP: 0010:rcu_is_watching+0xf0/0x140 kernel/rcu/tree.c:1076
RSP: 0018:ffff88018bb57298 EFLAGS: 00000202 ORIG_RAX: ffffffffffffffd9
RAX: 0000000000015b87 RBX: ffffed003176ae54 RCX: 1ffff1003176ae58
RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8801dae23610
RBP: ffff88018bb57328 R08: ffffed003b5c46c3 R09: ffffed003b5c46c2
R10: ffffed003b5c46c2 R11: ffff8801dae23613 R12: 1ffff1003176ae58
R13: ffff8801dae23610 R14: ffff88018bb57300 R15: dffffc0000000000
rcu_read_lock_held+0x87/0xc0 kernel/rcu/update.c:329
list_lru_from_memcg_idx mm/list_lru.c:60 [inline]
__list_lru_count_one mm/list_lru.c:173 [inline]
list_lru_count_one+0x30d/0x440 mm/list_lru.c:183
list_lru_shrink_count include/linux/list_lru.h:118 [inline]
super_cache_count+0x10f/0x280 fs/super.c:134
do_shrink_slab mm/vmscan.c:374 [inline]
shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531
shrink_slab+0xa1/0xc0 mm/vmscan.c:506
shrink_node+0x4f2/0x1740 mm/vmscan.c:2561
shrink_zones mm/vmscan.c:2794 [inline]
do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856
try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146
reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862
mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887
tracehook_notify_resume include/linux/tracehook.h:193 [inline]
exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166
prepare_exit_to_usermode+0x32e/0x390 arch/x86/entry/common.c:196
retint_user+0x8/0x18
RIP: 0033:0x407715
RSP: 002b:0000000000a3e940 EFLAGS: 00010246
RAX: 000000002025c000 RBX: 0000000000000000 RCX: 0000000000000002
RDX: 8e9e4a5e3069763d RSI: 0000000000000000 RDI: 0000000002866848
RBP: 0000000000000001 R08: 0000000000000000 R09: 00000000007301a0
R10: 0000000000a3e940 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000002 R14: 000000000072bea0 R15: 000000000001792e
BUG: sleeping function called from invalid context at mm/slab.h:421
in_atomic(): 1, irqs_disabled(): 1, pid: 7975, name: syz-executor5
2 locks held by syz-executor5/7975:
#0: (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509
#1: (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183
irq event stamp: 1598
hardirqs last enabled at (1597): [] count_shadow_nodes+0xc0/0x2e0 mm/workingset.c:372
hardirqs last disabled at (1598): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625
softirqs last enabled at (1588): [] __do_softirq+0x778/0xaf5 kernel/softirq.c:311
softirqs last disabled at (1573): [] invoke_softirq kernel/softirq.c:365 [inline]
softirqs last disabled at (1573): [] irq_exit+0x1d1/0x200 kernel/softirq.c:405
CPU: 0 PID: 7975 Comm: syz-executor5 Not tainted 4.17.0-rc2+ #14
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1b9/0x294 lib/dump_stack.c:113
___might_sleep.cold.87+0x11f/0x13a kernel/sched/core.c:6188
__might_sleep+0x95/0x190 kernel/sched/core.c:6141
slab_pre_alloc_hook mm/slab.h:421 [inline]
slab_alloc mm/slab.c:3378 [inline]
__do_kmalloc mm/slab.c:3716 [inline]
__kmalloc+0x2b9/0x760 mm/slab.c:3727
kmalloc_array include/linux/slab.h:631 [inline]
kcalloc include/linux/slab.h:642 [inline]
numa_crng_init drivers/char/random.c:798 [inline]
crng_reseed+0x427/0x920 drivers/char/random.c:923
credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708
add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254
handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191
handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206
handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791
generic_handle_irq_desc include/linux/irqdesc.h:159 [inline]
handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77
do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245
common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642
RIP: 0010:__preempt_count_sub arch/x86/include/asm/preempt.h:81 [inline]
RIP: 0010:rcu_is_watching+0xf0/0x140 kernel/rcu/tree.c:1076
RSP: 0018:ffff88018bb57298 EFLAGS: 00000202 ORIG_RAX: ffffffffffffffd9
RAX: 0000000000015b87 RBX: ffffed003176ae54 RCX: 1ffff1003176ae58
RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffff8801dae23610
RBP: ffff88018bb57328 R08: ffffed003b5c46c3 R09: ffffed003b5c46c2
R10: ffffed003b5c46c2 R11: ffff8801dae23613 R12: 1ffff1003176ae58
R13: ffff8801dae23610 R14: ffff88018bb57300 R15: dffffc0000000000
rcu_read_lock_held+0x87/0xc0 kernel/rcu/update.c:329
list_lru_from_memcg_idx mm/list_lru.c:60 [inline]
__list_lru_count_one mm/list_lru.c:173 [inline]
list_lru_count_one+0x30d/0x440 mm/list_lru.c:183
list_lru_shrink_count include/linux/list_lru.h:118 [inline]
super_cache_count+0x10f/0x280 fs/super.c:134
do_shrink_slab mm/vmscan.c:374 [inline]
shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531
shrink_slab+0xa1/0xc0 mm/vmscan.c:506
shrink_node+0x4f2/0x1740 mm/vmscan.c:2561
shrink_zones mm/vmscan.c:2794 [inline]
do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856
try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146
reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862
mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887
tracehook_notify_resume include/linux/tracehook.h:193 [inline]
exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166
prepare_exit_to_usermode+0x32e/0x390 arch/x86/entry/common.c:196
retint_user+0x8/0x18
RIP: 0033:0x407715
RSP: 002b:0000000000a3e940 EFLAGS: 00010246
RAX: 000000002025c000 RBX: 0000000000000000 RCX: 0000000000000002
RDX: 8e9e4a5e3069763d RSI: 0000000000000000 RDI: 0000000002866848
RBP: 0000000000000001 R08: 0000000000000000 R09: 00000000007301a0
R10: 0000000000a3e940 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000002 R14: 000000000072bea0 R15: 000000000001792e
random: crng init done
QAT: Invalid ioctl
QAT: Invalid ioctl
handle_userfault: 78 callbacks suppressed
FAULT_FLAG_ALLOW_RETRY missing 30
CPU: 1 PID: 7999 Comm: syz-executor3 Tainted: G W 4.17.0-rc2+ #14
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1b9/0x294 lib/dump_stack.c:113
handle_userfault.cold.32+0x44/0x5a fs/userfaultfd.c:430
do_anonymous_page mm/memory.c:3147 [inline]
handle_pte_fault mm/memory.c:3961 [inline]
__handle_mm_fault+0x38d8/0x4310 mm/memory.c:4087
handle_mm_fault+0x53a/0xc70 mm/memory.c:4124
__do_page_fault+0x60b/0xe40 arch/x86/mm/fault.c:1399
do_page_fault+0xee/0x8a7 arch/x86/mm/fault.c:1474
page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1160
RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65
RSP: 0018:ffff88018bf3fc38 EFLAGS: 00010202
RAX: ffffed00317e7fb3 RBX: 0000000000000020 RCX: 0000000000000004
RDX: 0000000000000000 RSI: 0000000020013000 RDI: ffff88018bf3fd78
RBP: ffff88018bf3fc70 R08: ffffed00317e7fb3 R09: ffffed00317e7faf
R10: ffffed00317e7fb2 R11: ffff88018bf3fd97 R12: 0000000020013020
R13: 0000000020013000 R14: ffff88018bf3fd78 R15: 00007ffffffff000
copy_from_user include/linux/uaccess.h:147 [inline]
do_fcntl+0xccf/0x14b0 fs/fcntl.c:368
__do_sys_fcntl fs/fcntl.c:463 [inline]
__se_sys_fcntl fs/fcntl.c:448 [inline]
__x64_sys_fcntl+0x177/0x1f0 fs/fcntl.c:448
do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455389
RSP: 002b:00007f7166e10c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000048
RAX: ffffffffffffffda RBX: 00007f7166e116d4 RCX: 0000000000455389
RDX: 0000000020013000 RSI: 0000000000000006 RDI: 0000000000000015
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 000000000000008e R14: 00000000006f3df0 R15: 0000000000000000
FAULT_FLAG_ALLOW_RETRY missing 30
CPU: 0 PID: 7999 Comm: syz-executor3 Tainted: G W 4.17.0-rc2+ #14
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:77 [inline]
dump_stack+0x1b9/0x294 lib/dump_stack.c:113
handle_userfault.cold.32+0x44/0x5a fs/userfaultfd.c:430
do_anonymous_page mm/memory.c:3147 [inline]
handle_pte_fault mm/memory.c:3961 [inline]
__handle_mm_fault+0x38d8/0x4310 mm/memory.c:4087
handle_mm_fault+0x53a/0xc70 mm/memory.c:4124
__do_page_fault+0x60b/0xe40 arch/x86/mm/fault.c:1399
do_page_fault+0xee/0x8a7 arch/x86/mm/fault.c:1474
page_fault+0x1e/0x30 arch/x86/entry/entry_64.S:1160
RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65
RSP: 0018:ffff88018bf3fc38 EFLAGS: 00010202
RAX: ffffed00317e7fb3 RBX: 0000000000000020 RCX: 0000000000000004
RDX: 0000000000000000 RSI: 0000000020013000 RDI: ffff88018bf3fd78
RBP: ffff88018bf3fc70 R08: ffffed00317e7fb3 R09: ffffed00317e7faf
R10: ffffed00317e7fb2 R11: ffff88018bf3fd97 R12: 0000000020013020
R13: 0000000020013000 R14: ffff88018bf3fd78 R15: 00007ffffffff000
copy_from_user include/linux/uaccess.h:147 [inline]
do_fcntl+0xccf/0x14b0 fs/fcntl.c:368
__do_sys_fcntl fs/fcntl.c:463 [inline]
__se_sys_fcntl fs/fcntl.c:448 [inline]
__x64_sys_fcntl+0x177/0x1f0 fs/fcntl.c:448
do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x455389
RSP: 002b:00007f7166e10c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000048
RAX: ffffffffffffffda RBX: 00007f7166e116d4 RCX: 0000000000455389
RDX: 0000000020013000 RSI: 0000000000000006 RDI: 0000000000000015
RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
R13: 000000000000008e R14: 00000000006f3df0 R15: 0000000000000000
binder: 8105:8106 ERROR: BC_REGISTER_LOOPER called without request
binder: 8105:8106 transaction failed 29189/-22, size 0-0 line 2848
binder: 8105:8106 ioctl 40046205 4 returned -22
binder_alloc: binder_alloc_mmap_handler: 8105 20000000-20002000 already mapped failed -16
binder: 8105:8106 ERROR: BC_REGISTER_LOOPER called without request
binder: 8105:8110 transaction failed 29189/-22, size 0-0 line 2848
binder: 8105:8106 ioctl 40046205 4 returned -22
binder: undelivered TRANSACTION_ERROR: 29189
binder: undelivered TRANSACTION_ERROR: 29189
kernel msg: ebtables bug: please report to author: entries_size too small
kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher
IPVS: ftp: loaded support on port[0] = 21
kernel msg: ebtables bug: please report to author: Wrong len argument
kernel msg: ebtables bug: please report to author: Wrong len argument
TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters.