============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #96 Not tainted ----------------------------- include/linux/rcupdate.h:631 rcu_read_lock() used illegally while idle! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/0/0: #0: 0000000062f97aeb (rcu_read_lock){....}, at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.19.0-rc2+ #96 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_lock include/linux/rcupdate.h:630 [inline] trace_call_bpf+0x59e/0x660 kernel/trace/bpf_trace.c:72 ============================= WARNING: suspicious RCU usage 4.19.0-rc2+ #96 Not tainted ----------------------------- kernel/trace/bpf_trace.c:72 suspicious rcu_dereference_check() usage! perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! 1 lock held by swapper/1/0: #0: 0000000062f97aeb ( rcu_read_lock perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 ){....} , at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on+0x250/0x310 kernel/trace/trace_preemptirq.c:25 default_idle+0x8a/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 rest_init+0xe2/0xe5 init/main.c:442 start_kernel+0x8f4/0x92f init/main.c:739 x86_64_start_reservations+0x29/0x2b arch/x86/kernel/head64.c:452 x86_64_start_kernel+0x76/0x79 arch/x86/kernel/head64.c:433 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc2+ #96 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ============================= Call Trace: WARNING: suspicious RCU usage __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 4.19.0-rc2+ #96 Not tainted ----------------------------- include/linux/rcupdate.h:680 rcu_read_unlock() used illegally while idle! other info that might help us debug this: lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 trace_call_bpf+0x556/0x660 kernel/trace/bpf_trace.c:72 RCU used illegally from extended quiescent state! 1 lock held by swapper/0/0: #0: 0000000062f97aeb ( rcu_read_lock ){....} perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 , at: trace_call_bpf+0x14b/0x660 kernel/trace/bpf_trace.c:46 stack backtrace: perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on+0x250/0x310 kernel/trace/trace_preemptirq.c:25 default_idle+0x8a/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 start_secondary+0x523/0x750 arch/x86/kernel/smpboot.c:271 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.19.0-rc2+ #96 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4537 rcu_read_unlock include/linux/rcupdate.h:679 [inline] trace_call_bpf+0x50e/0x660 kernel/trace/bpf_trace.c:72 perf_trace_run_bpf_submit+0x162/0x330 kernel/events/core.c:8264 perf_trace_preemptirq_template+0x407/0x690 include/trace/events/preemptirq.h:14 trace_irq_enable_rcuidle include/trace/events/preemptirq.h:40 [inline] trace_hardirqs_on+0x250/0x310 kernel/trace/trace_preemptirq.c:25 default_idle+0x8a/0x480 arch/x86/kernel/process.c:498 arch_cpu_idle+0x10/0x20 arch/x86/kernel/process.c:489 default_idle_call+0x6d/0x90 kernel/sched/idle.c:93 cpuidle_idle_call kernel/sched/idle.c:153 [inline] do_idle+0x3db/0x5b0 kernel/sched/idle.c:262 cpu_startup_entry+0x10c/0x120 kernel/sched/idle.c:368 rest_init+0xe2/0xe5 init/main.c:442 start_kernel+0x8f4/0x92f init/main.c:739 x86_64_start_reservations+0x29/0x2b arch/x86/kernel/head64.c:452 x86_64_start_kernel+0x76/0x79 arch/x86/kernel/head64.c:433 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:242 netlink: 3290 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3290 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3290 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor1'. device nr0 entered promiscuous mode netlink: 2 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 10 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 10 bytes leftover after parsing attributes in process `syz-executor2'. device nr0 entered promiscuous mode protocol 2194 is buggy, dev gre0 protocol 2194 is buggy, dev gre0 protocol 2194 is buggy, dev gre0 protocol 2194 is buggy, dev gre0 protocol 2cea is buggy, dev gre0 protocol 2194 is buggy, dev gre0 protocol 2cea is buggy, dev gre0 protocol 2194 is buggy, dev gre0 protocol 2cea is buggy, dev gre0 protocol 2194 is buggy, dev gre0