netlink: 73 bytes leftover after parsing attributes in process `syz-executor0'. INFO: trying to register non-static key. netlink: 15 bytes leftover after parsing attributes in process `syz-executor0'. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 1 PID: 9023 Comm: syz-executor3 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 register_lock_class+0x55e/0x2c70 kernel/locking/lockdep.c:781 __lock_acquire+0x203/0x4770 kernel/locking/lockdep.c:3387 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:174 spin_lock_bh include/linux/spinlock.h:320 [inline] tcp_fastopen_reset_cipher+0x194/0x580 net/ipv4/tcp_fastopen.c:98 do_tcp_setsockopt.isra.37+0x24d/0x21b0 net/ipv4/tcp.c:2589 tcp_setsockopt+0xb0/0xd0 net/ipv4/tcp.c:2879 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2965 SYSC_setsockopt net/socket.c:1851 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1830 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007fd5da867be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000021 RSI: 0000000000000006 RDI: 0000000000000013 RBP: 0000000000000086 R08: 0000000000000010 R09: 0000000000000000 R10: 0000000020f2b000 R11: 0000000000000212 R12: 00000000006f4460 R13: 00000000ffffffff R14: 00007fd5da8686d4 R15: 0000000000000000 8021q: VLANs not supported on lo device gre0 entered promiscuous mode 8021q: VLANs not supported on lo device lo entered promiscuous mode device gre0 entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl kvm: pic: non byte write kvm: pic: non byte write device gre0 entered promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9324 comm=syz-executor6 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9324 comm=syz-executor6 handle_userfault: 85 callbacks suppressed FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 9352 Comm: syz-executor1 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3121 [inline] handle_pte_fault mm/memory.c:3934 [inline] __handle_mm_fault+0x2d46/0x39c0 mm/memory.c:4060 handle_mm_fault+0x334/0x8d0 mm/memory.c:4097 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1449 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1524 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1067 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff8801c4e77bc8 EFLAGS: 00010202 RAX: ffffed00389cefa4 RBX: 0000000020013fc0 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000020013fc0 RDI: ffff8801c4e77d18 RBP: ffff8801c4e77bf8 R08: ffffed00389cefa4 R09: ffffed00389cefa4 R10: 0000000000000001 R11: ffffed00389cefa3 R12: 0000000000000008 R13: ffff8801c4e77d18 R14: 00007ffffffff000 R15: 0000000020013fc8 copy_from_user include/linux/uaccess.h:147 [inline] get_fd_set fs/select.c:367 [inline] core_sys_select+0x427/0x960 fs/select.c:647 SYSC_select fs/select.c:695 [inline] SyS_select+0x194/0x230 fs/select.c:677 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f89e6d4dbe8 EFLAGS: 00000212 ORIG_RAX: 0000000000000017 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000020001fc0 RSI: 0000000020003fc0 RDI: 0000000000000040 RBP: 00000000000003de R08: 0000000020003000 R09: 0000000000000000 R10: 0000000020013fc0 R11: 0000000000000212 R12: 00000000006f3d70 R13: 00000000ffffffff R14: 00007f89e6d4e6d4 R15: 0000000000000000 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 9360 Comm: syz-executor1 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3121 [inline] handle_pte_fault mm/memory.c:3934 [inline] __handle_mm_fault+0x2d46/0x39c0 mm/memory.c:4060 handle_mm_fault+0x334/0x8d0 mm/memory.c:4097 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1449 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1524 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1067 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff8801c3967bc8 EFLAGS: 00010202 RAX: ffffed003872cfa2 RBX: 0000000020013fc0 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000020013fc0 RDI: ffff8801c3967d08 RBP: ffff8801c3967bf8 R08: ffffed003872cfa2 R09: ffffed003872cfa2 R10: 0000000000000001 R11: ffffed003872cfa1 R12: 0000000000000008 R13: ffff8801c3967d08 R14: 00007ffffffff000 R15: 0000000020013fc8 copy_from_user include/linux/uaccess.h:147 [inline] get_fd_set fs/select.c:367 [inline] core_sys_select+0x397/0x960 fs/select.c:646 SYSC_select fs/select.c:695 [inline] SyS_select+0x194/0x230 fs/select.c:677 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f89e6d2cbe8 EFLAGS: 00000212 ORIG_RAX: 0000000000000017 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452869 RDX: 0000000020002000 RSI: 0000000020013fc0 RDI: 0000000000000040 RBP: 0000000000a6f880 R08: 0000000020004ff0 R09: 0000000000000000 R10: 0000000020004fc0 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007f89e6d2d9c0 R15: 000000000000000b sctp: [Deprecated]: syz-executor7 (pid 9394) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 9394) Use of int in maxseg socket option. Use struct sctp_assoc_value instead CPU: 0 PID: 9364 Comm: syz-executor1 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3121 [inline] handle_pte_fault mm/memory.c:3934 [inline] __handle_mm_fault+0x2d46/0x39c0 mm/memory.c:4060 handle_mm_fault+0x334/0x8d0 mm/memory.c:4097 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1449 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1524 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1067 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff8801d8557e70 EFLAGS: 00010202 RAX: ffffed003b0aafdd RBX: 0000000020011ff8 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000020011ff8 RDI: ffff8801d8557ee0 RBP: ffff8801d8557ea0 R08: ffffed003b0aafdd R09: ffffed003b0aafdd R10: 0000000000000001 R11: ffffed003b0aafdc R12: 0000000000000008 R13: ffff8801d8557ee0 R14: 00007ffffffff000 R15: 0000000020012000 copy_from_user include/linux/uaccess.h:147 [inline] SYSC_signalfd4 fs/signalfd.c:264 [inline] SyS_signalfd4 fs/signalfd.c:250 [inline] SYSC_signalfd fs/signalfd.c:307 [inline] SyS_signalfd+0x99/0x450 fs/signalfd.c:304 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f89e6d0bbe8 EFLAGS: 00000212 ORIG_RAX: 000000000000011a RAX: ffffffffffffffda RBX: 0000000000758190 RCX: 0000000000452869 RDX: 0000000000000008 RSI: 0000000020011ff8 RDI: 0000000000000013 RBP: 0000000000a6f880 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007f89e6d0c9c0 R15: 000000000000000c device gre0 entered promiscuous mode device gre0 entered promiscuous mode nla_parse: 2 callbacks suppressed netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. RDS: rds_bind could not find a transport for 172.20.6.187, load rds_tcp or rds_rdma? RDS: rds_bind could not find a transport for 172.20.6.187, load rds_tcp or rds_rdma? print_req_error: I/O error, dev loop0, sector 0 device gre0 entered promiscuous mode print_req_error: I/O error, dev loop0, sector 0 netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. audit: type=1326 audit(1510098966.921:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=9781 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 audit: type=1326 audit(1510098967.023:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=9781 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 netlink: 16 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 14 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 14 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor6'. TCP: request_sock_TCP: Possible SYN flooding on port 20024. Sending cookies. Check SNMP counters. netlink: 5 bytes leftover after parsing attributes in process `syz-executor6'. rfkill: input handler disabled rfkill: input handler enabled QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl RDS: rds_bind could not find a transport for 172.20.3.170, load rds_tcp or rds_rdma? audit: type=1326 audit(1510098969.109:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10305 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 RDS: rds_bind could not find a transport for 172.20.3.170, load rds_tcp or rds_rdma? QAT: Invalid ioctl device gre0 entered promiscuous mode audit: type=1326 audit(1510098969.858:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10534 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510098969.864:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10534 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510098969.880:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10534 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=64 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510098969.880:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10534 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510098969.880:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10534 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510098969.902:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10534 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=220 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510098969.902:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10534 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510098969.902:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10534 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510098969.905:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10534 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=26 compat=0 ip=0x452869 code=0x7ffc0000 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pig=10651 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pig=10669 comm=syz-executor3 QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl device lo left promiscuous mode Subscription rejected, illegal request device lo entered promiscuous mode device lo left promiscuous mode Subscription rejected, illegal request nla_parse: 8 callbacks suppressed netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 13 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 13 bytes leftover after parsing attributes in process `syz-executor6'.