============================= WARNING: suspicious RCU usage 6.16.0-rc1-syzkaller-gfda589c28604 #0 Not tainted ----------------------------- kernel/events/callchain.c:163 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz.0.519/6111: #0: ffffffff883dcae0 (rcu_read_lock_trace){....}-{0:0}, at: rcu_read_lock_trace include/linux/rcupdate_trace.h:53 [inline] #0: ffffffff883dcae0 (rcu_read_lock_trace){....}-{0:0}, at: bpf_prog_test_run_syscall+0x2fe/0x778 net/bpf/test_run.c:1563 stack backtrace: CPU: 1 UID: 0 PID: 6111 Comm: syz.0.519 Not tainted 6.16.0-rc1-syzkaller-gfda589c28604 #0 PREEMPT Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:132 [] show_stack+0x30/0x3c arch/riscv/kernel/stacktrace.c:138 [] __dump_stack lib/dump_stack.c:94 [inline] [] dump_stack_lvl+0x12e/0x1a6 lib/dump_stack.c:120 [] dump_stack+0x1c/0x24 lib/dump_stack.c:129 [] lockdep_rcu_suspicious+0x196/0x268 kernel/locking/lockdep.c:6871 [] get_callchain_entry+0x2da/0x448 kernel/events/callchain.c:163 [] get_perf_callchain+0xc2/0x6c0 kernel/events/callchain.c:227 [] __bpf_get_stack+0x492/0xa24 kernel/bpf/stackmap.c:454 [] ____bpf_get_stack kernel/bpf/stackmap.c:499 [inline] [] bpf_get_stack+0x34/0x44 kernel/bpf/stackmap.c:496 [] ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1836 [inline] [] bpf_get_stack_raw_tp+0xde/0x112 kernel/trace/bpf_trace.c:1826 [] bpf_prog_2ae546726a474a42+0x42/0x54 [] bpf_dispatcher_nop_func include/linux/bpf.h:1322 [inline] [] __bpf_prog_run include/linux/filter.h:709 [inline] [] bpf_prog_run include/linux/filter.h:725 [inline] [] bpf_prog_run_pin_on_cpu include/linux/filter.h:742 [inline] [] bpf_prog_test_run_syscall+0x592/0x778 net/bpf/test_run.c:1564 [] bpf_prog_test_run kernel/bpf/syscall.c:4429 [inline] [] __sys_bpf+0xd4e/0x417c kernel/bpf/syscall.c:5854 [] __do_sys_bpf kernel/bpf/syscall.c:5943 [inline] [] __se_sys_bpf kernel/bpf/syscall.c:5941 [inline] [] __riscv_sys_bpf+0x6c/0xc6 kernel/bpf/syscall.c:5941 [] syscall_handler+0x94/0x118 arch/riscv/include/asm/syscall.h:112 [] do_trap_ecall_u+0x396/0x530 arch/riscv/kernel/traps.c:341 [] handle_exception+0x146/0x152 arch/riscv/kernel/entry.S:197