============================= WARNING: suspicious RCU usage 6.17.0-rc1-syzkaller-g8f5ae30d69d7 #0 Not tainted ----------------------------- kernel/events/callchain.c:163 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz.2.272/5560: #0: ffffffff883de000 (rcu_read_lock_trace){....}-{0:0}, at: rcu_read_lock_trace include/linux/rcupdate_trace.h:53 [inline] #0: ffffffff883de000 (rcu_read_lock_trace){....}-{0:0}, at: bpf_prog_test_run_syscall+0x2fe/0x778 net/bpf/test_run.c:1563 stack backtrace: CPU: 1 UID: 0 PID: 5560 Comm: syz.2.272 Not tainted 6.17.0-rc1-syzkaller-g8f5ae30d69d7 #0 PREEMPT Hardware name: riscv-virtio,qemu (DT) Call Trace: [] dump_backtrace+0x2e/0x3c arch/riscv/kernel/stacktrace.c:132 [] show_stack+0x30/0x3c arch/riscv/kernel/stacktrace.c:138 [] __dump_stack lib/dump_stack.c:94 [inline] [] dump_stack_lvl+0x12e/0x1a6 lib/dump_stack.c:120 [] dump_stack+0x1c/0x24 lib/dump_stack.c:129 [] lockdep_rcu_suspicious+0x196/0x268 kernel/locking/lockdep.c:6876 [] get_callchain_entry+0x2da/0x448 kernel/events/callchain.c:163 [] get_perf_callchain+0xc2/0x6be kernel/events/callchain.c:227 [] __bpf_get_stack+0x492/0xa24 kernel/bpf/stackmap.c:454 [] ____bpf_get_stack kernel/bpf/stackmap.c:499 [inline] [] bpf_get_stack+0x34/0x44 kernel/bpf/stackmap.c:496 [] ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1835 [inline] [] bpf_get_stack_raw_tp+0xde/0x112 kernel/trace/bpf_trace.c:1825 [] bpf_prog_d43750871481577d+0x48/0x5a [] bpf_dispatcher_nop_func include/linux/bpf.h:1332 [inline] [] __bpf_prog_run include/linux/filter.h:718 [inline] [] bpf_prog_run include/linux/filter.h:725 [inline] [] bpf_prog_run_pin_on_cpu include/linux/filter.h:742 [inline] [] bpf_prog_test_run_syscall+0x380/0x778 net/bpf/test_run.c:1564 [] bpf_prog_test_run kernel/bpf/syscall.c:4590 [inline] [] __sys_bpf+0x1d86/0x4334 kernel/bpf/syscall.c:6047 [] __do_sys_bpf kernel/bpf/syscall.c:6139 [inline] [] __se_sys_bpf kernel/bpf/syscall.c:6137 [inline] [] __riscv_sys_bpf+0x6c/0xc6 kernel/bpf/syscall.c:6137 [] syscall_handler+0x94/0x118 arch/riscv/include/asm/syscall.h:112 [] do_trap_ecall_u+0x396/0x530 arch/riscv/kernel/traps.c:343 [] handle_exception+0x146/0x152 arch/riscv/kernel/entry.S:197