INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 0 PID: 5374 Comm: syz-executor6 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 register_lock_class+0x55e/0x2c70 kernel/locking/lockdep.c:781 __lock_acquire+0x203/0x4770 kernel/locking/lockdep.c:3387 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:174 spin_lock_bh include/linux/spinlock.h:320 [inline] tcp_fastopen_reset_cipher+0x194/0x580 net/ipv4/tcp_fastopen.c:98 do_tcp_setsockopt.isra.37+0x24d/0x21b0 net/ipv4/tcp.c:2589 tcp_setsockopt+0xb0/0xd0 net/ipv4/tcp.c:2879 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2965 SYSC_setsockopt net/socket.c:1851 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1830 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007fbf0068abe8 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000021 RSI: 0000000000000006 RDI: 0000000000000013 RBP: 0000000000000086 R08: 0000000000000010 R09: 0000000000000000 R10: 0000000020f2b000 R11: 0000000000000212 R12: 00000000006efa08 R13: 00000000ffffffff R14: 00007fbf0068b6d4 R15: 0000000000000000 QAT: Invalid ioctl nla_parse: 13 callbacks suppressed netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'. rfkill: input handler disabled QAT: Invalid ioctl rfkill: input handler enabled device gre0 entered promiscuous mode QAT: Invalid ioctl device lo entered promiscuous mode QAT: Invalid ioctl device lo left promiscuous mode QAT: Invalid ioctl device lo entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl device lo left promiscuous mode netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. syz5: renamed from lo kvm [5699]: vcpu1, guest rIP: 0xfff0 Hyper-V uhandled wrmsr: 0x40000074 data 0x800ff kvm [5699]: vcpu1, guest rIP: 0xfff0 Hyper-V uhandled wrmsr: 0x40000074 data 0x800ff kauditd_printk_skb: 166 callbacks suppressed audit: type=1326 audit(1510168604.186:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168604.186:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168604.186:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=2 compat=0 ip=0x40cba1 code=0x7ffc0000 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5769 comm=syz-executor6 audit: type=1326 audit(1510168604.303:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168604.303:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168604.330:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=16 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168604.330:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168604.330:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168604.332:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=298 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168604.332:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5752 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 *** Guest State *** CR0: actual=0x0000000080000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000000 RIP = 0x0000000000003000 RFLAGS=0x00000000 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 CS: sel=0x0010, attr=0x0009b, limit=0x000fffff, base=0x0000000000000000 DS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 SS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 ES: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 FS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 GS: sel=0x0018, attr=0x00093, limit=0x000fffff, base=0x0000000000000000 GDTR: limit=0x000007ff, base=0x0000000000001000 LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 IDTR: limit=0x000001ff, base=0x0000000000003800 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000001 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811bc783 RSP = 0xffff8801d81cf4c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f97efcae700 GSBase=ffff8801db200000 TRBase=ffff8801db223280 GDTBase=ffffffffff577000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=00000001d967c000 CR4=00000000001426f0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff8508a1f0 EFER = 0x0000000000000d01 PAT = 0x0000000000000000 *** Control State *** PinBased=0000003f CPUBased=b699edfa SecondaryExec=0000004a EntryControls=0000d1ff ExitControls=0023efff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffe249167251 EPT pointer = 0x00000001d515e01e kvm: emulating exchange as write RDS: rds_bind could not find a transport for 172.20.0.170, load rds_tcp or rds_rdma? netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. dccp_invalid_packet: P.CsCov 5 exceeds packet length 552 xprt_adjust_timeout: rq_timeout = 0! netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. QAT: Invalid ioctl netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. QAT: Invalid ioctl xprt_adjust_timeout: rq_timeout = 0! dccp_invalid_packet: P.CsCov 5 exceeds packet length 552 netlink: 4 bytes leftover after parsing attributes in process `syz-executor6'. device gre0 entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl netlink: 11 bytes leftover after parsing attributes in process `syz-executor7'. device gre0 entered promiscuous mode QAT: Invalid ioctl sctp: [Deprecated]: syz-executor3 (pid 6276) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead QAT: Invalid ioctl sock: process `syz-executor2' is using obsolete setsockopt SO_BSDCOMPAT sctp: [Deprecated]: syz-executor3 (pid 6276) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead syz0: renamed from lo SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pig=6328 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=30 sclass=netlink_audit_socket pig=6328 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pig=6328 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=30 sclass=netlink_audit_socket pig=6342 comm=syz-executor5 syz3: renamed from lo nla_parse: 3 callbacks suppressed netlink: 2 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor7'. kvm [6470]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0x6f kvm [6470]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0x6f kvm [6470]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008d data 0x6f kvm [6470]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008c data 0x6f kvm [6470]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0xbcd9006f kvm [6470]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0xbcd9006f kvm [6470]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008d data 0xbcd9006f kvm [6470]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008c data 0xbcd9006f kvm [6470]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000020 data 0xf6bcd9006f SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=6478 comm=syz-executor6 *** Guest State *** CR0: actual=0x0000000080000031, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002051, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x000000000000fffa RIP = 0x0000000000006dc7 RFLAGS=0x00033000 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0xe332, attr=0x000f3, limit=0x0000ffff, base=0x00000000000e3320 DS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x0000ffff, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x00002088, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811bc783 RSP = 0xffff8801c8ac74c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f61064d1700 GSBase=ffff8801db300000 TRBase=ffff8801db323280 GDTBase=ffffffffff576000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=00000001d3caa000 CR4=00000000001426e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff8508a1f0 EFER = 0x0000000000000d01 PAT = 0x0000000000000000 *** Control State *** PinBased=0000003f CPUBased=b699edfa SecondaryExec=00000042 EntryControls=0000d1ff ExitControls=0023efff ExceptionBitmap=ffffbfff PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffe06015ee33 EPT pointer = 0x00000001c483b01e netlink: 5 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. device gre0 entered promiscuous mode netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. dccp_v4_rcv: dropped packet with invalid checksum dccp_v4_rcv: dropped packet with invalid checksum kauditd_printk_skb: 140 callbacks suppressed audit: type=1326 audit(1510168609.520:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6755 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x0 kvm [6769]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0 device gre0 entered promiscuous mode kvm [6769]: vcpu0, guest rIP: 0xfff0 ignored wrmsr: 0x11e data 0x0 audit: type=1326 audit(1510168609.540:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6755 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x0 tmpfs: Bad mount option q]g4G netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. tmpfs: Bad mount option q]g4G netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. audit: type=1326 audit(1510168609.824:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6822 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. audit: type=1326 audit(1510168609.824:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6822 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168609.826:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6822 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=72 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168609.826:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6822 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168609.826:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6822 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168609.826:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6822 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=101 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168609.826:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6822 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1510168609.826:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=6822 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 SELinux: failure in selinux_parse_skb(), unable to parse packet SELinux: failure in selinux_parse_skb(), unable to parse packet irq bypass consumer (token ffff8801c26abc00) registration fails: -16 Started in network mode Own node address <160.2196.1415>, network identity 4711 device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready SELinux: unrecognized netlink message: protocol=0 nlmsg_type=50798 sclass=netlink_route_socket pig=7179 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=50798 sclass=netlink_route_socket pig=7191 comm=syz-executor0 device gre0 entered promiscuous mode