============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #96 Not tainted ----------------------------- include/linux/rcupdate.h:631 rcu_read_lock() used illegally while idle! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 00000000cfe8b8be (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #96 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_lock include/linux/rcupdate.h:630 [inline] trace_call_bpf+0x59e/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on+0x250/0x310 kernel/trace/trace_preemptirq.c:25 default_idle+0x8a/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #96 Not tainted ----------------------------- kernel/trace/bpf_trace.c:72 suspicious rcu_dereference_check() usage! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 00000000cfe8b8be (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #96 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 trace_call_bpf+0x556/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on+0x250/0x310 kernel/trace/trace_preemptirq.c:25 default_idle+0x8a/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #96 Not tainted ----------------------------- include/linux/rcupdate.h:680 rcu_read_unlock() used illegally while idle! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 00000000cfe8b8be (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #96 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_unlock include/linux/rcupdate.h:679 [inline] trace_call_bpf+0x50e/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on+0x250/0x310 kernel/trace/trace_preemptirq.c:25 default_idle+0x8a/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ¹á6›Íaï~IyMá‡ì: renamed from nr0 netlink: 'syz-executor5': attribute type 2 has an invalid length. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 'syz-executor5': attribute type 2 has an invalid length. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 7 bytes leftover after parsing attributes in process `syz-executor3'. protocol 86dd is buggy, dev gre0 protocol 86dd is buggy, dev gre0 protocol 86dd is buggy, dev gre0 protocol 86dd is buggy, dev gre0 protocol 86dd is buggy, dev gre0 protocol 86dd is buggy, dev gre0 protocol 86dd is buggy, dev gre0 protocol 86dd is buggy, dev gre0 protocol 86dd is buggy, dev gre0 protocol 86dd is buggy, dev gre0 netlink: 14 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. device nr0 entered promiscuous mode