=============================
WARNING: suspicious RCU usage
4.17.0-rc1+ #12 Not tainted
-----------------------------
include/linux/rcupdate.h:304 Illegal context switch in RCU read-side critical section!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
2 locks held by syz-executor7/8259:
 #0:         (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509
 #1:         (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183

stack backtrace:
CPU: 0 PID: 8259 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #12
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592
 rcu_preempt_sleep_check include/linux/rcupdate.h:303 [inline]
 ___might_sleep+0x26d/0x320 kernel/sched/core.c:6153
 __might_sleep+0x95/0x190 kernel/sched/core.c:6141
 slab_pre_alloc_hook mm/slab.h:421 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 __do_kmalloc mm/slab.c:3716 [inline]
 __kmalloc+0x2b9/0x760 mm/slab.c:3727
 kmalloc_array include/linux/slab.h:631 [inline]
 kcalloc include/linux/slab.h:642 [inline]
 numa_crng_init drivers/char/random.c:798 [inline]
 crng_reseed+0x427/0x920 drivers/char/random.c:923
 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708
 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254
 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191
 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206
 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791
 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline]
 handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77
 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245
 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642
 </IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:783 [inline]
RIP: 0010:lock_acquire+0x257/0x520 kernel/locking/lockdep.c:3923
RSP: 0018:ffff8801d8b8f200 EFLAGS: 00000286 ORIG_RAX: ffffffffffffffd9
RAX: dffffc0000000000 RBX: 1ffff1003b171e45 RCX: 0000000000000000
RDX: 1ffffffff11a312d RSI: ffff8801d88ba838 RDI: 0000000000000286
RBP: ffff8801d8b8f2f0 R08: 0000000000000008 R09: 0000000000000001
R10: ffff8801d88ba860 R11: ffff8801d88ba000 R12: ffff8801d88ba000
R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000
 rcu_lock_acquire include/linux/rcupdate.h:246 [inline]
 rcu_read_lock include/linux/rcupdate.h:632 [inline]
 __list_lru_count_one mm/list_lru.c:172 [inline]
 list_lru_count_one+0xfe/0x440 mm/list_lru.c:183
 list_lru_shrink_count include/linux/list_lru.h:118 [inline]
 super_cache_count+0x10f/0x280 fs/super.c:134
 do_shrink_slab mm/vmscan.c:374 [inline]
 shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531
 shrink_slab+0xa1/0xc0 mm/vmscan.c:506
 shrink_node+0x4f2/0x1740 mm/vmscan.c:2561
 shrink_zones mm/vmscan.c:2794 [inline]
 do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856
 try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146
 reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862
 mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887
 tracehook_notify_resume include/linux/tracehook.h:193 [inline]
 exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166
 prepare_exit_to_usermode arch/x86/entry/common.c:196 [inline]
 syscall_return_slowpath+0x516/0x5c0 arch/x86/entry/common.c:265
 ret_from_fork+0x15/0x50 arch/x86/entry/entry_64.S:405
RIP: 0033:0x457d19
RSP: 002b:00007fd239fc9db0 EFLAGS: 00000202 ORIG_RAX: 0000000000000038
RAX: 0000000000000000 RBX: 00007fd239fca700 RCX: 0000000000457d19
RDX: 00007fd239fca9d0 RSI: 00007fd239fc9db0 RDI: 00000000003d0f00
RBP: 0000000000a3e8a0 R08: 00007fd239fca700 R09: 00007fd239fca700
R10: 00007fd239fca9d0 R11: 0000000000000202 R12: 0000000000000000
R13: 0000000000a3e81f R14: 00007fd239fca9c0 R15: 0000000000000000
BUG: sleeping function called from invalid context at mm/slab.h:421
in_atomic(): 1, irqs_disabled(): 1, pid: 8259, name: syz-executor7
2 locks held by syz-executor7/8259:
 #0:         (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509
 #1:         (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183
irq event stamp: 50
hardirqs last  enabled at (49): [<ffffffff81a55e50>] count_shadow_nodes+0xc0/0x2e0 mm/workingset.c:372
hardirqs last disabled at (50): [<ffffffff87800905>] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625
softirqs last  enabled at (30): [<ffffffff87a00778>] __do_softirq+0x778/0xaf5 kernel/softirq.c:311
softirqs last disabled at (23): [<ffffffff81475041>] invoke_softirq kernel/softirq.c:365 [inline]
softirqs last disabled at (23): [<ffffffff81475041>] irq_exit+0x1d1/0x200 kernel/softirq.c:405
CPU: 0 PID: 8259 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #12
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 <IRQ>
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1b9/0x294 lib/dump_stack.c:113
 ___might_sleep.cold.87+0x11f/0x13a kernel/sched/core.c:6188
 __might_sleep+0x95/0x190 kernel/sched/core.c:6141
 slab_pre_alloc_hook mm/slab.h:421 [inline]
 slab_alloc mm/slab.c:3378 [inline]
 __do_kmalloc mm/slab.c:3716 [inline]
 __kmalloc+0x2b9/0x760 mm/slab.c:3727
 kmalloc_array include/linux/slab.h:631 [inline]
 kcalloc include/linux/slab.h:642 [inline]
 numa_crng_init drivers/char/random.c:798 [inline]
 crng_reseed+0x427/0x920 drivers/char/random.c:923
 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708
 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254
 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191
 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206
 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791
 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline]
 handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77
 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245
 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642
 </IRQ>
RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:783 [inline]
RIP: 0010:lock_acquire+0x257/0x520 kernel/locking/lockdep.c:3923
RSP: 0018:ffff8801d8b8f200 EFLAGS: 00000286 ORIG_RAX: ffffffffffffffd9
RAX: dffffc0000000000 RBX: 1ffff1003b171e45 RCX: 0000000000000000
RDX: 1ffffffff11a312d RSI: ffff8801d88ba838 RDI: 0000000000000286
RBP: ffff8801d8b8f2f0 R08: 0000000000000008 R09: 0000000000000001
R10: ffff8801d88ba860 R11: ffff8801d88ba000 R12: ffff8801d88ba000
R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000
 rcu_lock_acquire include/linux/rcupdate.h:246 [inline]
 rcu_read_lock include/linux/rcupdate.h:632 [inline]
 __list_lru_count_one mm/list_lru.c:172 [inline]
 list_lru_count_one+0xfe/0x440 mm/list_lru.c:183
 list_lru_shrink_count include/linux/list_lru.h:118 [inline]
 super_cache_count+0x10f/0x280 fs/super.c:134
 do_shrink_slab mm/vmscan.c:374 [inline]
 shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531
 shrink_slab+0xa1/0xc0 mm/vmscan.c:506
 shrink_node+0x4f2/0x1740 mm/vmscan.c:2561
 shrink_zones mm/vmscan.c:2794 [inline]
 do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856
 try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146
 reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862
 mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887
 tracehook_notify_resume include/linux/tracehook.h:193 [inline]
 exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166
 prepare_exit_to_usermode arch/x86/entry/common.c:196 [inline]
 syscall_return_slowpath+0x516/0x5c0 arch/x86/entry/common.c:265
 ret_from_fork+0x15/0x50 arch/x86/entry/entry_64.S:405
RIP: 0033:0x457d19
RSP: 002b:00007fd239fc9db0 EFLAGS: 00000202 ORIG_RAX: 0000000000000038
RAX: 0000000000000000 RBX: 00007fd239fca700 RCX: 0000000000457d19
RDX: 00007fd239fca9d0 RSI: 00007fd239fc9db0 RDI: 00000000003d0f00
RBP: 0000000000a3e8a0 R08: 00007fd239fca700 R09: 00007fd239fca700
R10: 00007fd239fca9d0 R11: 0000000000000202 R12: 0000000000000000
R13: 0000000000a3e81f R14: 00007fd239fca9c0 R15: 0000000000000000
random: crng init done
kernel msg: ebtables bug: please report to author: Hook order must be followed
kernel msg: ebtables bug: please report to author: Hook order must be followed
netlink: 'syz-executor4': attribute type 3 has an invalid length.
netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'.
netlink: 'syz-executor4': attribute type 3 has an invalid length.
netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'.
IPVS: ftp: loaded support on port[0] = 21
ptrace attach of "/root/syz-executor0"[4546] was attempted by "/root/syz-executor0"[8527]
ptrace attach of "/root/syz-executor0"[4546] was attempted by "/root/syz-executor0"[8527]
binder: 8533:8543 got transaction to invalid handle
binder: 8533:8543 transaction failed 29201/-22, size 0-0 line 2848
binder: 8533:8543 ioctl c0306201 20008000 returned -14
binder: BINDER_SET_CONTEXT_MGR already set
binder: 8533:8543 got transaction to invalid handle
binder: 8533:8543 transaction failed 29201/-22, size 0-0 line 2848
binder: 8533:8554 ioctl 40046207 0 returned -16
binder: 8533:8543 ioctl c0306201 20008000 returned -14
binder: undelivered TRANSACTION_ERROR: 29201
binder: undelivered TRANSACTION_ERROR: 29201
IPVS: length: 254 != 24
binder: 8670:8671 got transaction with invalid parent offset or type
IPVS: length: 254 != 24
binder: 8670:8671 transaction failed 29201/-22, size 80-8 line 3148
QAT: failed to copy from user cfg_data.
binder: BINDER_SET_CONTEXT_MGR already set
binder: 8670:8683 ioctl 40046207 0 returned -16
binder_alloc: 8670: binder_alloc_buf, no vma
binder: 8670:8683 transaction failed 29189/-3, size 80-8 line 2963
binder: undelivered TRANSACTION_ERROR: 29189
binder: undelivered TRANSACTION_ERROR: 29201
netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
netlink: 'syz-executor3': attribute type 4 has an invalid length.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'.
netlink: 'syz-executor3': attribute type 4 has an invalid length.