program: perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x1000007, 0x90180, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x7}, 0x100000, 0xc8, 0xfff, 0x5, 0x200, 0x10000, 0x400, 0x0, 0x20}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000440)=[0x0], &(0x7f0000000480), 0x0, 0x89, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x0, 0x0, &(0x7f0000000540), 0x8, 0x24, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x7f}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) [ 75.337351][ T4669] Bluetooth: hci0: command tx timeout [ 75.406793][ T5322] [ 75.407970][ T5322] ============================= [ 75.410019][ T5322] WARNING: suspicious RCU usage [ 75.412187][ T5322] syzkaller #0 Not tainted [ 75.414296][ T5322] ----------------------------- [ 75.416392][ T5322] kernel/events/callchain.c:163 suspicious rcu_dereference_check() usage! [ 75.420048][ T5322] [ 75.420048][ T5322] other info that might help us debug this: [ 75.420048][ T5322] [ 75.424649][ T5322] [ 75.424649][ T5322] rcu_scheduler_active = 2, debug_locks = 1 [ 75.428085][ T5322] 1 lock held by syz.0.0/5322: [ 75.430171][ T5322] #0: ffffffff8df3d8c0 (rcu_read_lock_trace){....}-{0:0}, at: rcu_read_lock_trace+0x38/0x80 [ 75.434742][ T5322] [ 75.434742][ T5322] stack backtrace: [ 75.437260][ T5322] CPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) [ 75.437272][ T5322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 [ 75.437277][ T5322] Call Trace: [ 75.437281][ T5322] [ 75.437286][ T5322] dump_stack_lvl+0x189/0x250 [ 75.437306][ T5322] ? __pfx_dump_stack_lvl+0x10/0x10 [ 75.437320][ T5322] ? __pfx__printk+0x10/0x10 [ 75.437342][ T5322] lockdep_rcu_suspicious+0x140/0x1d0 [ 75.437356][ T5322] get_callchain_entry+0x2b6/0x3c0 [ 75.437373][ T5322] get_perf_callchain+0xb3/0x6f0 [ 75.437388][ T5322] ? __pfx___schedule+0x10/0x10 [ 75.437404][ T5322] ? __pfx_get_perf_callchain+0x10/0x10 [ 75.437428][ T5322] __bpf_get_stack+0x3fa/0xa60 [ 75.437445][ T5322] ? __pfx___bpf_get_stack+0x10/0x10 [ 75.437454][ T5322] ? _raw_spin_unlock_irqrestore+0xad/0x110 [ 75.437474][ T5322] bpf_get_stack+0x33/0x50 [ 75.437490][ T5322] ? bpf_prog_954a33db00d453db+0x43/0x4b [ 75.437501][ T5322] bpf_get_stack_raw_tp+0x1a9/0x220 [ 75.437520][ T5322] bpf_prog_954a33db00d453db+0x43/0x4b [ 75.437527][ T5322] bpf_prog_run_pin_on_cpu+0x143/0x470 [ 75.437547][ T5322] bpf_prog_test_run_syscall+0x312/0x4b0 [ 75.437564][ T5322] ? __pfx_bpf_prog_test_run_syscall+0x10/0x10 [ 75.437580][ T5322] ? __fget_files+0x2a/0x420 [ 75.437598][ T5322] ? __pfx_bpf_prog_test_run_syscall+0x10/0x10 [ 75.437615][ T5322] bpf_prog_test_run+0x2c7/0x340 [ 75.437624][ T5322] __sys_bpf+0x562/0x860 [ 75.437631][ T5322] ? __pfx___sys_bpf+0x10/0x10 [ 75.437636][ T5322] ? rcu_is_watching+0x15/0xb0 [ 75.437649][ T5322] ? rcu_is_watching+0x15/0xb0 [ 75.437659][ T5322] __x64_sys_bpf+0x7c/0x90 [ 75.437669][ T5322] do_syscall_64+0xfa/0xfa0 [ 75.437678][ T5322] ? lockdep_hardirqs_on+0x9c/0x150 [ 75.437689][ T5322] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.437699][ T5322] ? clear_bhb_loop+0x60/0xb0 [ 75.437711][ T5322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.437721][ T5322] RIP: 0033:0x7f12a298f7c9 [ 75.437732][ T5322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.437741][ T5322] RSP: 002b:00007f12a384d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 75.437752][ T5322] RAX: ffffffffffffffda RBX: 00007f12a2be5fa0 RCX: 00007f12a298f7c9 [ 75.437760][ T5322] RDX: 000000000000000c RSI: 00002000000004c0 RDI: 000000000000000a [ 75.437767][ T5322] RBP: 00007f12a2a13f91 R08: 0000000000000000 R09: 0000000000000000 [ 75.437774][ T5322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 75.437781][ T5322] R13: 00007f12a2be6038 R14: 00007f12a2be5fa0 R15: 00007ffca551c958 [ 75.437799][ T5322]