============================= WARNING: suspicious RCU usage syzkaller #0 Not tainted ----------------------------- kernel/events/callchain.c:163 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz.0.0/5321: #0: ffffffff8e7604d8 (rcu_tasks_trace_srcu_struct){....}-{0:0}, at: rcu_try_lock_acquire include/linux/rcupdate.h:317 [inline] #0: ffffffff8e7604d8 (rcu_tasks_trace_srcu_struct){....}-{0:0}, at: rcu_read_lock_trace+0x25/0x110 include/linux/rcupdate_trace.h:100 stack backtrace: CPU: 0 UID: 0 PID: 5321 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 lockdep_rcu_suspicious+0x13f/0x1d0 kernel/locking/lockdep.c:6876 get_callchain_entry+0x2b6/0x3c0 kernel/events/callchain.c:163 get_perf_callchain+0xd5/0x880 kernel/events/callchain.c:231 __bpf_get_stack+0x445/0xab0 kernel/bpf/stackmap.c:472 ____bpf_get_stack kernel/bpf/stackmap.c:517 [inline] bpf_get_stack+0x33/0x50 kernel/bpf/stackmap.c:514 ____bpf_get_stack_raw_tp kernel/trace/bpf_trace.c:1661 [inline] bpf_get_stack_raw_tp+0x1a9/0x220 kernel/trace/bpf_trace.c:1651 bpf_prog_42db8cfdf50901c9+0x46/0x4e bpf_dispatcher_nop_func include/linux/bpf.h:1402 [inline] __bpf_prog_run include/linux/filter.h:712 [inline] bpf_prog_run include/linux/filter.h:730 [inline] bpf_prog_run_pin_on_cpu+0x3b4/0x470 include/linux/filter.h:747 bpf_prog_test_run_syscall+0x318/0x4c0 net/bpf/test_run.c:1640 bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4722 __sys_bpf+0x643/0x950 kernel/bpf/syscall.c:6246