============================= WARNING: suspicious RCU usage 4.15.0+ #10 Not tainted ----------------------------- ./include/linux/rcupdate.h:302 Illegal context switch in RCU read-side critical section! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by syz-executor7/7419: #0: (&ctx->mutex){+.+.}, at: [<00000000e8ae4038>] perf_event_ctx_lock_nested+0x21b/0x450 kernel/events/core.c:1253 #1: (bpf_event_mutex){+.+.}, at: [<00000000a303475c>] perf_event_query_prog_array+0x10e/0x280 kernel/trace/bpf_trace.c:876 #2: (rcu_read_lock){....}, at: [<0000000092c53407>] bpf_prog_array_copy_to_user+0x0/0x4d0 kernel/bpf/core.c:1568 stack backtrace: CPU: 0 PID: 7419 Comm: syz-executor7 Not tainted 4.15.0+ #10 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4592 rcu_preempt_sleep_check include/linux/rcupdate.h:301 [inline] ___might_sleep+0x385/0x470 kernel/sched/core.c:6079 __might_sleep+0x95/0x190 kernel/sched/core.c:6067 __might_fault+0xab/0x1d0 mm/memory.c:4532 _copy_to_user+0x2c/0xc0 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] bpf_prog_array_copy_to_user+0x217/0x4d0 kernel/bpf/core.c:1587 bpf_prog_array_copy_info+0x17b/0x1c0 kernel/bpf/core.c:1685 perf_event_query_prog_array+0x196/0x280 kernel/trace/bpf_trace.c:877 _perf_ioctl kernel/events/core.c:4737 [inline] perf_ioctl+0x3e1/0x1480 kernel/events/core.c:4757 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x453299 RSP: 002b:00007fb417b8bc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bf58 RCX: 0000000000453299 RDX: 0000000020106000 RSI: 00000000c008240a RDI: 0000000000000015 RBP: 00000000000005f1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f7f38 R13: 00000000ffffffff R14: 00007fb417b8c6d4 R15: 0000000000000004 BUG: sleeping function called from invalid context at lib/usercopy.c:25 in_atomic(): 1, irqs_disabled(): 0, pid: 7419, name: syz-executor7 3 locks held by syz-executor7/7419: #0: (&ctx->mutex){+.+.}, at: [<00000000e8ae4038>] perf_event_ctx_lock_nested+0x21b/0x450 kernel/events/core.c:1253 #1: (bpf_event_mutex){+.+.}, at: [<00000000a303475c>] perf_event_query_prog_array+0x10e/0x280 kernel/trace/bpf_trace.c:876 #2: (rcu_read_lock){....}, at: [<0000000092c53407>] bpf_prog_array_copy_to_user+0x0/0x4d0 kernel/bpf/core.c:1568 CPU: 0 PID: 7419 Comm: syz-executor7 Not tainted 4.15.0+ #10 can: request_module (can-proto-6) failed. Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 can: request_module (can-proto-6) failed. Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6114 __might_sleep+0x95/0x190 kernel/sched/core.c:6067 __might_fault+0xab/0x1d0 mm/memory.c:4532 _copy_to_user+0x2c/0xc0 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] bpf_prog_array_copy_to_user+0x217/0x4d0 kernel/bpf/core.c:1587 bpf_prog_array_copy_info+0x17b/0x1c0 kernel/bpf/core.c:1685 perf_event_query_prog_array+0x196/0x280 kernel/trace/bpf_trace.c:877 _perf_ioctl kernel/events/core.c:4737 [inline] perf_ioctl+0x3e1/0x1480 kernel/events/core.c:4757 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x453299 RSP: 002b:00007fb417b8bc58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000071bf58 RCX: 0000000000453299 RDX: 0000000020106000 RSI: 00000000c008240a RDI: 0000000000000015 RBP: 00000000000005f1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f7f38 R13: 00000000ffffffff R14: 00007fb417b8c6d4 R15: 0000000000000004 audit: type=1400 audit(1517569395.425:19): avc: denied { read } for pid=7615 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 rpcbind: RPC call returned error 22 rpcbind: RPC call returned error 22 can: request_module (can-proto-3) failed. can: request_module (can-proto-3) failed. IPVS: ftp: loaded support on port[0] = 21 tmpfs: No value for mount option '±Ä"G>lkÀ(4€JŽ¹L í/lñœÝâèàwᵨ™u<†>Òòy^³{šÿ' tmpfs: No value for mount option '±Ä"G>lkÀ(4€JŽ¹L í/lñœÝâèàwᵨ™u<†>Òòy^³{šÿ' audit: type=1400 audit(1517569399.272:20): avc: denied { map } for pid=7914 comm="syz-executor0" path="socket:[17453]" dev="sockfs" ino=17453 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_dgram_socket permissive=1 BUG: sleeping function called from invalid context at lib/usercopy.c:25 in_atomic(): 1, irqs_disabled(): 0, pid: 7957, name: syz-executor1 3 locks held by syz-executor1/7957: #0: (&ctx->mutex){+.+.}, at: [<00000000e8ae4038>] perf_event_ctx_lock_nested+0x21b/0x450 kernel/events/core.c:1253 #1: (bpf_event_mutex){+.+.}, at: [<00000000a303475c>] perf_event_query_prog_array+0x10e/0x280 kernel/trace/bpf_trace.c:876 #2: (rcu_read_lock){....}, at: [<0000000092c53407>] bpf_prog_array_copy_to_user+0x0/0x4d0 kernel/bpf/core.c:1568 CPU: 1 PID: 7957 Comm: syz-executor1 Tainted: G W 4.15.0+ #10 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6114 __might_sleep+0x95/0x190 kernel/sched/core.c:6067 __might_fault+0xab/0x1d0 mm/memory.c:4532 _copy_to_user+0x2c/0xc0 lib/usercopy.c:25 copy_to_user include/linux/uaccess.h:155 [inline] bpf_prog_array_copy_to_user+0x217/0x4d0 kernel/bpf/core.c:1587 bpf_prog_array_copy_info+0x17b/0x1c0 kernel/bpf/core.c:1685 perf_event_query_prog_array+0x196/0x280 kernel/trace/bpf_trace.c:877 _perf_ioctl kernel/events/core.c:4737 [inline] perf_ioctl+0x3e1/0x1480 kernel/events/core.c:4757 vfs_ioctl fs/ioctl.c:46 [inline] do_vfs_ioctl+0x1b1/0x1520 fs/ioctl.c:686 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:692 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x453299 RSP: 002b:00007fdaf5381c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fdaf5382700 RCX: 0000000000453299 RDX: 0000000020964fec RSI: 00000000c008240a RDI: 0000000000000014 RBP: 00007ffea13641a0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 00007ffea136411f R14: 00007fdaf53829c0 R15: 0000000000000004 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 cgroup: cgroup2: unknown option "" cgroup: cgroup2: unknown option "" audit: type=1400 audit(1517569403.295:21): avc: denied { create } for pid=8328 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 overlayfs: unrecognized mount option "ÂÃŒ÷ÝûfýáØ…’" or missing value 9pnet_virtio: no channels available for device ./file1 9pnet_virtio: no channels available for device ./file1 overlayfs: unrecognized mount option "ÂÃŒ÷ÝûfýáØ…’" or missing value cgroup: cgroup2: unknown option "?ççË—(Ðx¬ÌÏÅ­»á³”C¥ýC̲«" cgroup: cgroup2: unknown option "?ççË—(Ðx¬ÌÏÅ­»á³”C¥ýC̲«"