============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #99 Not tainted ----------------------------- include/linux/rcupdate.h:631 rcu_read_lock() used illegally while idle! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 000000009558b91c (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #99 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_lock include/linux/rcupdate.h:630 [inline] trace_call_bpf+0x59e/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on_caller+0x249/0x300 kernel/trace/trace_preemptirq.c:51 trace_hardirqs_on_thunk+0x1a/0x1c retint_kernel+0x2d/0x2d RIP: 0010:native_safe_halt+0x6/0x10 arch/x86/include/asm/irqflags.h:57 Code: e9 2c ff ff ff 48 89 c7 48 89 45 d8 e8 23 f5 01 fa 48 8b 45 d8 e9 ca fe ff ff 48 89 df e8 12 f5 01 fa eb 82 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 90 90 90 90 90 RSP: 0018:ffff8801d9b2fbf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: 1ffff1003b365f82 RCX: 0000000000000000 RDX: 1ffffffff12e4538 RSI: 0000000000000001 RDI: ffffffff897229c0 RBP: ffff8801d9b2fbf0 R08: ffff8801d9b1a3c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d9b2fcb0 R13: ffffffff8a517d60 R14: 0000000000000000 R15: 0000000000000001 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline] default_idle+0xbf/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #99 Not tainted ----------------------------- kernel/trace/bpf_trace.c:72 suspicious rcu_dereference_check() usage! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 000000009558b91c (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #99 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 trace_call_bpf+0x556/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on_caller+0x249/0x300 kernel/trace/trace_preemptirq.c:51 trace_hardirqs_on_thunk+0x1a/0x1c retint_kernel+0x2d/0x2d RIP: 0010:native_safe_halt+0x6/0x10 arch/x86/include/asm/irqflags.h:57 Code: e9 2c ff ff ff 48 89 c7 48 89 45 d8 e8 23 f5 01 fa 48 8b 45 d8 e9 ca fe ff ff 48 89 df e8 12 f5 01 fa eb 82 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 90 90 90 90 90 RSP: 0018:ffff8801d9b2fbf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: 1ffff1003b365f82 RCX: 0000000000000000 RDX: 1ffffffff12e4538 RSI: 0000000000000001 RDI: ffffffff897229c0 RBP: ffff8801d9b2fbf0 R08: ffff8801d9b1a3c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d9b2fcb0 R13: ffffffff8a517d60 R14: 0000000000000000 R15: 0000000000000001 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline] default_idle+0xbf/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #99 Not tainted ----------------------------- include/linux/rcupdate.h:680 rcu_read_unlock() used illegally while idle! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 000000009558b91c (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #99 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_unlock include/linux/rcupdate.h:679 [inline] trace_call_bpf+0x50e/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on_caller+0x249/0x300 kernel/trace/trace_preemptirq.c:51 trace_hardirqs_on_thunk+0x1a/0x1c retint_kernel+0x2d/0x2d RIP: 0010:native_safe_halt+0x6/0x10 arch/x86/include/asm/irqflags.h:57 Code: e9 2c ff ff ff 48 89 c7 48 89 45 d8 e8 23 f5 01 fa 48 8b 45 d8 e9 ca fe ff ff 48 89 df e8 12 f5 01 fa eb 82 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 90 90 90 90 90 RSP: 0018:ffff8801d9b2fbf0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: 1ffff1003b365f82 RCX: 0000000000000000 RDX: 1ffffffff12e4538 RSI: 0000000000000001 RDI: ffffffff897229c0 RBP: ffff8801d9b2fbf0 R08: ffff8801d9b1a3c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d9b2fcb0 R13: ffffffff8a517d60 R14: 0000000000000000 R15: 0000000000000001 arch_safe_halt arch/x86/include/asm/paravirt.h:94 [inline] default_idle+0xbf/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 tmpfs: No value for mount option 'ÿ' tmpfs: No value for mount option 'ÿ' tmpfs: No value for mount option 'ÿ' tmpfs: No value for mount option 'ÿ'