WARNING: suspicious RCU usage 4.15.0-rc9+ #284 Not tainted ----------------------------- net/tipc/bearer.c:177 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor2/5327: #0: (cb_lock){++++}, at: [<0000000029db5c95>] genl_rcv+0x19/0x40 net/netlink/genetlink.c:634 #1: (genl_mutex){+.+.}, at: [<00000000f2b2dfcf>] genl_lock net/netlink/genetlink.c:33 [inline] #1: (genl_mutex){+.+.}, at: [<00000000f2b2dfcf>] genl_rcv_msg+0x115/0x140 net/netlink/genetlink.c:622 stack backtrace: CPU: 1 PID: 5327 Comm: syz-executor2 Not tainted 4.15.0-rc9+ #284 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4587 tipc_bearer_find+0x2b4/0x3b0 net/tipc/bearer.c:177 tipc_nl_compat_link_set+0x329/0x9f0 net/tipc/netlink_compat.c:729 __tipc_nl_compat_doit net/tipc/netlink_compat.c:288 [inline] tipc_nl_compat_doit+0x15b/0x670 net/tipc/netlink_compat.c:335 tipc_nl_compat_handle net/tipc/netlink_compat.c:1119 [inline] tipc_nl_compat_recv+0x1135/0x18f0 net/tipc/netlink_compat.c:1201 genl_family_rcv_msg+0x7b7/0xfb0 net/netlink/genetlink.c:599 genl_rcv_msg+0xb2/0x140 net/netlink/genetlink.c:624 netlink_rcv_skb+0x14b/0x380 net/netlink/af_netlink.c:2409 genl_rcv+0x28/0x40 net/netlink/genetlink.c:635 netlink_unicast_kernel net/netlink/af_netlink.c:1275 [inline] netlink_unicast+0x4ee/0x700 net/netlink/af_netlink.c:1301 netlink_sendmsg+0xa4a/0xe60 net/netlink/af_netlink.c:1864 sock_sendmsg_nosec net/socket.c:638 [inline] sock_sendmsg+0xca/0x110 net/socket.c:648 ___sys_sendmsg+0x767/0x8b0 net/socket.c:2028 __sys_sendmsg+0xe5/0x210 net/socket.c:2062 SYSC_sendmsg net/socket.c:2073 [inline] SyS_sendmsg+0x2d/0x50 net/socket.c:2069 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x453299 RSP: 002b:00007f5863d0ec58 EFLAGS: 00000212 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000453299 RDX: 0000000000000000 RSI: 0000000020003000 RDI: 0000000000000014 RBP: 00000000000005c4 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f7b00 R13: 00000000ffffffff R14: 00007f5863d0f6d4 R15: 0000000000000000 sock: sock_set_timeout: `syz-executor3' (pid 5419) tries to set negative timeout sock: sock_set_timeout: `syz-executor3' (pid 5432) tries to set negative timeout IPVS: length: 64738 != 8 IPVS: length: 64738 != 8 device eql entered promiscuous mode capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) xt_ipcomp: unknown flags FF xt_ipcomp: unknown flags FF kauditd_printk_skb: 76 callbacks suppressed audit: type=1400 audit(1517210350.811:104): avc: denied { map_create } for pid=5562 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 Cannot find add_set index 0 as target audit: type=1400 audit(1517210351.322:105): avc: denied { map_read map_write } for pid=5681 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 Cannot find add_set index 0 as target audit: type=1400 audit(1517210351.425:106): avc: denied { prog_load } for pid=5700 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 5702 Comm: syz-executor6 Not tainted 4.15.0-rc9+ #284 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3127 [inline] handle_pte_fault mm/memory.c:3941 [inline] __handle_mm_fault+0x32a3/0x3ce0 mm/memory.c:4067 handle_mm_fault+0x334/0x8d0 mm/memory.c:4104 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1426 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1501 page_fault+0x2c/0x60 arch/x86/entry/entry_64.S:1260 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff8801d89b7d10 EFLAGS: 00010202 RAX: ffffed003b136fc9 RBX: 0000000020011ff0 RCX: 0000000000000002 RDX: 0000000000000000 RSI: 0000000020011ff0 RDI: ffff8801d89b7e38 RBP: ffff8801d89b7d40 R08: ffffed003b136fc9 R09: ffffed003b136fc9 R10: 0000000000000002 R11: ffffed003b136fc8 R12: 0000000000000010 R13: ffff8801d89b7e38 R14: 00007ffffffff000 R15: 0000000020012000 copy_from_user include/linux/uaccess.h:147 [inline] move_addr_to_kernel.part.18+0x34/0x100 net/socket.c:194 move_addr_to_kernel net/socket.c:1627 [inline] SYSC_connect+0x382/0x4a0 net/socket.c:1612 SyS_connect+0x24/0x30 net/socket.c:1602 entry_SYSCALL_64_fastpath+0x29/0xa0 RIP: 0033:0x453299 RSP: 002b:00007f87f28acc58 EFLAGS: 00000212 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000453299 RDX: 0000000000000010 RSI: 0000000020011ff0 RDI: 0000000000000015 RBP: 0000000000000045 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006ef718 R13: 00000000ffffffff R14: 00007f87f28ad6d4 R15: 0000000000000000 audit: type=1400 audit(1517210351.425:107): avc: denied { map } for pid=5710 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1517210351.449:108): avc: denied { net_admin } for pid=3725 comm="syz-executor2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1517210351.457:109): avc: denied { create } for pid=5705 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517210351.458:110): avc: denied { write } for pid=5705 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1517210351.480:111): avc: denied { net_raw } for pid=5705 comm="syz-executor5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1517210351.494:112): avc: denied { dac_override } for pid=5709 comm="syz-executor7" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 sctp: failed to load transform for md5: -2 capability: warning: `syz-executor3' uses deprecated v2 capabilities in a way that may be insecure netlink: 395 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 395 bytes leftover after parsing attributes in process `syz-executor1'. binder: 6024 RLIMIT_NICE not set binder: BINDER_SET_CONTEXT_MGR already set binder: 6019:6040 ioctl 40046207 0 returned -16 binder: 6019:6024 unknown command 536907575 binder: 6019:6024 ioctl c0306201 20008fd0 returned -22 binder: 6019:6042 BC_CLEAR_DEATH_NOTIFICATION death notification not active binder: 6042 RLIMIT_NICE not set QAT: Invalid ioctl sit: non-ECT from 0.0.0.0 with TOS=0x3 sit: non-ECT from 0.0.0.0 with TOS=0x3 syz-executor4 (6184): /proc/6180/oom_adj is deprecated, please use /proc/6180/oom_score_adj instead. binder: 6364:6379 ERROR: BC_REGISTER_LOOPER called without request binder: 6365:6377 BC_CLEAR_DEATH_NOTIFICATION death notification cookie mismatch 0000000000000000 != 0000000000000003 binder: 6365:6377 ERROR: BC_REGISTER_LOOPER called after BC_ENTER_LOOPER binder: 6377 RLIMIT_NICE not set binder: 6365:6377 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 6365:6387 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 6365:6387 ERROR: BC_REGISTER_LOOPER called after BC_ENTER_LOOPER binder: 6365:6387 IncRefs 0 refcount change on invalid ref 0 ret -22 binder: 6387 RLIMIT_NICE not set binder: 6365:6387 ioctl c0306201 2019c000 returned -11 QAT: failed to copy from user cfg_data. IPVS: ftp: loaded support on port[0] = 21 kauditd_printk_skb: 62 callbacks suppressed audit: type=1400 audit(1517210356.713:175): avc: denied { map } for pid=6528 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready audit: type=1400 audit(1517210357.326:176): avc: denied { sys_chroot } for pid=6524 comm="syz-executor4" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 NFQUEUE: number of total queues is 0 audit: type=1400 audit(1517210357.671:177): avc: denied { map } for pid=6696 comm="syz-executor0" path="/dev/ashmem" dev="devtmpfs" ino=9138 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 NFQUEUE: number of total queues is 0 NFQUEUE: number of total queues is 0 syz-executor6 (6878) used greatest stack depth: 13664 bytes left