============================= WARNING: suspicious RCU usage 4.17.0-rc1+ #12 Not tainted ----------------------------- include/linux/rcupdate.h:304 Illegal context switch in RCU read-side critical section! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor7/8259: #0: (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509 #1: (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183 stack backtrace: CPU: 0 PID: 8259 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #12 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592 rcu_preempt_sleep_check include/linux/rcupdate.h:303 [inline] ___might_sleep+0x26d/0x320 kernel/sched/core.c:6153 __might_sleep+0x95/0x190 kernel/sched/core.c:6141 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2b9/0x760 mm/slab.c:3727 kmalloc_array include/linux/slab.h:631 [inline] kcalloc include/linux/slab.h:642 [inline] numa_crng_init drivers/char/random.c:798 [inline] crng_reseed+0x427/0x920 drivers/char/random.c:923 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:783 [inline] RIP: 0010:lock_acquire+0x257/0x520 kernel/locking/lockdep.c:3923 RSP: 0018:ffff8801d8b8f200 EFLAGS: 00000286 ORIG_RAX: ffffffffffffffd9 RAX: dffffc0000000000 RBX: 1ffff1003b171e45 RCX: 0000000000000000 RDX: 1ffffffff11a312d RSI: ffff8801d88ba838 RDI: 0000000000000286 RBP: ffff8801d8b8f2f0 R08: 0000000000000008 R09: 0000000000000001 R10: ffff8801d88ba860 R11: ffff8801d88ba000 R12: ffff8801d88ba000 R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:246 [inline] rcu_read_lock include/linux/rcupdate.h:632 [inline] __list_lru_count_one mm/list_lru.c:172 [inline] list_lru_count_one+0xfe/0x440 mm/list_lru.c:183 list_lru_shrink_count include/linux/list_lru.h:118 [inline] super_cache_count+0x10f/0x280 fs/super.c:134 do_shrink_slab mm/vmscan.c:374 [inline] shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531 shrink_slab+0xa1/0xc0 mm/vmscan.c:506 shrink_node+0x4f2/0x1740 mm/vmscan.c:2561 shrink_zones mm/vmscan.c:2794 [inline] do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856 try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146 reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862 mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166 prepare_exit_to_usermode arch/x86/entry/common.c:196 [inline] syscall_return_slowpath+0x516/0x5c0 arch/x86/entry/common.c:265 ret_from_fork+0x15/0x50 arch/x86/entry/entry_64.S:405 RIP: 0033:0x457d19 RSP: 002b:00007fd239fc9db0 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: 0000000000000000 RBX: 00007fd239fca700 RCX: 0000000000457d19 RDX: 00007fd239fca9d0 RSI: 00007fd239fc9db0 RDI: 00000000003d0f00 RBP: 0000000000a3e8a0 R08: 00007fd239fca700 R09: 00007fd239fca700 R10: 00007fd239fca9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000a3e81f R14: 00007fd239fca9c0 R15: 0000000000000000 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 1, pid: 8259, name: syz-executor7 2 locks held by syz-executor7/8259: #0: (ptrval) (shrinker_rwsem){++++}, at: shrink_slab.part.39+0xe6/0xf90 mm/vmscan.c:509 #1: (ptrval) (rcu_read_lock){....}, at: list_lru_count_one+0xc4/0x440 mm/list_lru.c:183 irq event stamp: 50 hardirqs last enabled at (49): [] count_shadow_nodes+0xc0/0x2e0 mm/workingset.c:372 hardirqs last disabled at (50): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 softirqs last enabled at (30): [] __do_softirq+0x778/0xaf5 kernel/softirq.c:311 softirqs last disabled at (23): [] invoke_softirq kernel/softirq.c:365 [inline] softirqs last disabled at (23): [] irq_exit+0x1d1/0x200 kernel/softirq.c:405 CPU: 0 PID: 8259 Comm: syz-executor7 Not tainted 4.17.0-rc1+ #12 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 ___might_sleep.cold.87+0x11f/0x13a kernel/sched/core.c:6188 __might_sleep+0x95/0x190 kernel/sched/core.c:6141 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2b9/0x760 mm/slab.c:3727 kmalloc_array include/linux/slab.h:631 [inline] kcalloc include/linux/slab.h:642 [inline] numa_crng_init drivers/char/random.c:798 [inline] crng_reseed+0x427/0x920 drivers/char/random.c:923 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:783 [inline] RIP: 0010:lock_acquire+0x257/0x520 kernel/locking/lockdep.c:3923 RSP: 0018:ffff8801d8b8f200 EFLAGS: 00000286 ORIG_RAX: ffffffffffffffd9 RAX: dffffc0000000000 RBX: 1ffff1003b171e45 RCX: 0000000000000000 RDX: 1ffffffff11a312d RSI: ffff8801d88ba838 RDI: 0000000000000286 RBP: ffff8801d8b8f2f0 R08: 0000000000000008 R09: 0000000000000001 R10: ffff8801d88ba860 R11: ffff8801d88ba000 R12: ffff8801d88ba000 R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000 rcu_lock_acquire include/linux/rcupdate.h:246 [inline] rcu_read_lock include/linux/rcupdate.h:632 [inline] __list_lru_count_one mm/list_lru.c:172 [inline] list_lru_count_one+0xfe/0x440 mm/list_lru.c:183 list_lru_shrink_count include/linux/list_lru.h:118 [inline] super_cache_count+0x10f/0x280 fs/super.c:134 do_shrink_slab mm/vmscan.c:374 [inline] shrink_slab.part.39+0x330/0xf90 mm/vmscan.c:531 shrink_slab+0xa1/0xc0 mm/vmscan.c:506 shrink_node+0x4f2/0x1740 mm/vmscan.c:2561 shrink_zones mm/vmscan.c:2794 [inline] do_try_to_free_pages+0x3c9/0x1240 mm/vmscan.c:2856 try_to_free_mem_cgroup_pages+0x475/0xc50 mm/vmscan.c:3146 reclaim_high.constprop.67+0x12f/0x1d0 mm/memcontrol.c:1862 mem_cgroup_handle_over_high+0x8d/0x130 mm/memcontrol.c:1887 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x274/0x310 arch/x86/entry/common.c:166 prepare_exit_to_usermode arch/x86/entry/common.c:196 [inline] syscall_return_slowpath+0x516/0x5c0 arch/x86/entry/common.c:265 ret_from_fork+0x15/0x50 arch/x86/entry/entry_64.S:405 RIP: 0033:0x457d19 RSP: 002b:00007fd239fc9db0 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 RAX: 0000000000000000 RBX: 00007fd239fca700 RCX: 0000000000457d19 RDX: 00007fd239fca9d0 RSI: 00007fd239fc9db0 RDI: 00000000003d0f00 RBP: 0000000000a3e8a0 R08: 00007fd239fca700 R09: 00007fd239fca700 R10: 00007fd239fca9d0 R11: 0000000000000202 R12: 0000000000000000 R13: 0000000000a3e81f R14: 00007fd239fca9c0 R15: 0000000000000000 random: crng init done kernel msg: ebtables bug: please report to author: Hook order must be followed kernel msg: ebtables bug: please report to author: Hook order must be followed netlink: 'syz-executor4': attribute type 3 has an invalid length. netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 'syz-executor4': attribute type 3 has an invalid length. netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. IPVS: ftp: loaded support on port[0] = 21 ptrace attach of "/root/syz-executor0"[4546] was attempted by "/root/syz-executor0"[8527] ptrace attach of "/root/syz-executor0"[4546] was attempted by "/root/syz-executor0"[8527] binder: 8533:8543 got transaction to invalid handle binder: 8533:8543 transaction failed 29201/-22, size 0-0 line 2848 binder: 8533:8543 ioctl c0306201 20008000 returned -14 binder: BINDER_SET_CONTEXT_MGR already set binder: 8533:8543 got transaction to invalid handle binder: 8533:8543 transaction failed 29201/-22, size 0-0 line 2848 binder: 8533:8554 ioctl 40046207 0 returned -16 binder: 8533:8543 ioctl c0306201 20008000 returned -14 binder: undelivered TRANSACTION_ERROR: 29201 binder: undelivered TRANSACTION_ERROR: 29201 IPVS: length: 254 != 24 binder: 8670:8671 got transaction with invalid parent offset or type IPVS: length: 254 != 24 binder: 8670:8671 transaction failed 29201/-22, size 80-8 line 3148 QAT: failed to copy from user cfg_data. binder: BINDER_SET_CONTEXT_MGR already set binder: 8670:8683 ioctl 40046207 0 returned -16 binder_alloc: 8670: binder_alloc_buf, no vma binder: 8670:8683 transaction failed 29189/-3, size 80-8 line 2963 binder: undelivered TRANSACTION_ERROR: 29189 binder: undelivered TRANSACTION_ERROR: 29201 netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 'syz-executor3': attribute type 4 has an invalid length. netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 'syz-executor3': attribute type 4 has an invalid length.