============================= WARNING: suspicious RCU usage 4.15.0-rc3+ #131 Not tainted ----------------------------- ./include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor4/32338: #0: (sk_lock-AF_INET6){+.+.}, at: [<000000009b06bcdc>] lock_sock include/net/sock.h:1461 [inline] #0: (sk_lock-AF_INET6){+.+.}, at: [<000000009b06bcdc>] do_ipv6_setsockopt.isra.9+0x238/0x39c0 net/ipv6/ipv6_sockglue.c:167 stack backtrace: CPU: 1 PID: 32338 Comm: syz-executor4 Not tainted 4.15.0-rc3+ #131 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4675 ireq_opt_deref include/net/inet_sock.h:135 [inline] inet_csk_route_req+0x82a/0xca0 net/ipv4/inet_connection_sock.c:544 dccp_v4_send_response+0xa7/0x640 net/dccp/ipv4.c:485 dccp_v4_conn_request+0x9f4/0x11b0 net/dccp/ipv4.c:633 dccp_v6_conn_request+0xd30/0x1350 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x574/0x1620 net/dccp/input.c:612 dccp_v4_do_rcv+0xeb/0x160 net/dccp/ipv4.c:682 dccp_v6_do_rcv+0x81a/0x9b0 net/dccp/ipv6.c:578 sk_backlog_rcv include/net/sock.h:907 [inline] __release_sock+0x124/0x360 net/core/sock.c:2264 release_sock+0xa4/0x2a0 net/core/sock.c:2779 do_ipv6_setsockopt.isra.9+0x4fb/0x39c0 net/ipv6/ipv6_sockglue.c:897 compat_ipv6_setsockopt+0xfc/0x1e0 net/ipv6/ipv6_sockglue.c:956 inet_csk_compat_setsockopt+0x95/0x120 net/ipv4/inet_connection_sock.c:1042 compat_dccp_setsockopt+0x40/0x70 net/dccp/proto.c:586 compat_sock_common_setsockopt+0xb2/0x140 net/core/sock.c:2979 C_SYSC_setsockopt net/compat.c:403 [inline] compat_SyS_setsockopt+0x17c/0x410 net/compat.c:386 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x51/0x60 arch/x86/entry/entry_64_compat.S:125 RIP: 0023:0xf7f5dc79 RSP: 002b:00000000f775908c EFLAGS: 00000296 ORIG_RAX: 000000000000016e RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 0000000000000029 RDX: 0000000000000020 RSI: 00000000209bdfe0 RDI: 0000000000000020 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.15.0-rc3+ #131 Not tainted ----------------------------- ./include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor4/32338: #0: (sk_lock-AF_INET6){+.+.}, at: [<000000009b06bcdc>] lock_sock include/net/sock.h:1461 [inline] #0: (sk_lock-AF_INET6){+.+.}, at: [<000000009b06bcdc>] do_ipv6_setsockopt.isra.9+0x238/0x39c0 net/ipv6/ipv6_sockglue.c:167 stack backtrace: CPU: 1 PID: 32338 Comm: syz-executor4 Not tainted 4.15.0-rc3+ #131 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4675 ireq_opt_deref include/net/inet_sock.h:135 [inline] dccp_v4_send_response+0x4b0/0x640 net/dccp/ipv4.c:496 dccp_v4_conn_request+0x9f4/0x11b0 net/dccp/ipv4.c:633 dccp_v6_conn_request+0xd30/0x1350 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x574/0x1620 net/dccp/input.c:612 dccp_v4_do_rcv+0xeb/0x160 net/dccp/ipv4.c:682 dccp_v6_do_rcv+0x81a/0x9b0 net/dccp/ipv6.c:578 sk_backlog_rcv include/net/sock.h:907 [inline] __release_sock+0x124/0x360 net/core/sock.c:2264 release_sock+0xa4/0x2a0 net/core/sock.c:2779 do_ipv6_setsockopt.isra.9+0x4fb/0x39c0 net/ipv6/ipv6_sockglue.c:897 compat_ipv6_setsockopt+0xfc/0x1e0 net/ipv6/ipv6_sockglue.c:956 inet_csk_compat_setsockopt+0x95/0x120 net/ipv4/inet_connection_sock.c:1042 compat_dccp_setsockopt+0x40/0x70 net/dccp/proto.c:586 compat_sock_common_setsockopt+0xb2/0x140 net/core/sock.c:2979 C_SYSC_setsockopt net/compat.c:403 [inline] compat_SyS_setsockopt+0x17c/0x410 net/compat.c:386 do_syscall_32_irqs_on arch/x86/entry/common.c:327 [inline] do_fast_syscall_32+0x3ee/0xf9d arch/x86/entry/common.c:389 entry_SYSENTER_compat+0x51/0x60 arch/x86/entry/entry_64_compat.S:125 RIP: 0023:0xf7f5dc79 RSP: 002b:00000000f775908c EFLAGS: 00000296 ORIG_RAX: 000000000000016e RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 0000000000000029 RDX: 0000000000000020 RSI: 00000000209bdfe0 RDI: 0000000000000020 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable audit: type=1400 audit(1513331676.432:4370): avc: denied { execute } for pid=32414 comm="syz-executor0" path="/proc/4041" dev="proc" ino=86083 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 binder: BINDER_SET_CONTEXT_MGR already set binder: 32401:32404 ioctl 40046207 0 returned -16 binder_alloc: 32401: binder_alloc_buf, no vma binder: 32401:32417 transaction failed 29189/-3, size 80-16 line 2890 binder: release 32401:32404 transaction 311 out, still active binder: send failed reply for transaction 311, target dead do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'. device gre0 entered promiscuous mode binder: 32653:32662 BC_CLEAR_DEATH_NOTIFICATION death notification not active binder: 32653:32662 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 32653:32687 IncRefs 0 refcount change on invalid ref 0 ret -22 kvm [308]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0xa kvm [308]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0xa SELinux: unrecognized netlink message: protocol=9 nlmsg_type=22 sclass=netlink_audit_socket pig=497 comm=syz-executor0 device gre0 entered promiscuous mode SELinux: unrecognized netlink message: protocol=9 nlmsg_type=22 sclass=netlink_audit_socket pig=497 comm=syz-executor0 netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. audit: type=1326 audit(1513331680.154:4371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=560 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf7f5dc79 code=0xffff0000 netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. audit: type=1326 audit(1513331680.318:4372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=560 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=40000003 syscall=240 compat=1 ip=0xf7f5dc79 code=0xffff0000 netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. audit: type=1326 audit(1513331681.547:4373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=828 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7fabc79 code=0x7ffc0000 audit: type=1326 audit(1513331681.554:4374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=828 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=40000003 syscall=54 compat=1 ip=0xf7fabc79 code=0x7ffc0000 audit: type=1326 audit(1513331681.554:4375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=828 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7fabc79 code=0x7ffc0000 audit: type=1326 audit(1513331681.554:4376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=828 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7fabc79 code=0x7ffc0000 audit: type=1326 audit(1513331681.558:4377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=828 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=40000003 syscall=322 compat=1 ip=0xf7fabc79 code=0x7ffc0000 audit: type=1326 audit(1513331681.558:4378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=828 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7fabc79 code=0x7ffc0000 audit: type=1326 audit(1513331681.561:4379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=828 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=40000003 syscall=41 compat=1 ip=0xf7fabc79 code=0x7ffc0000 audit: type=1326 audit(1513331681.561:4380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=828 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=40000003 syscall=240 compat=1 ip=0xf7fabc79 code=0x7ffc0000 netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. SELinux: unknown mount option device gre0 entered promiscuous mode sctp: [Deprecated]: syz-executor4 (pid 1206) Use of int in maxseg socket option. Use struct sctp_assoc_value instead netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. device gre0 entered promiscuous mode sctp: [Deprecated]: syz-executor4 (pid 1206) Use of int in maxseg socket option. Use struct sctp_assoc_value instead SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2048 sclass=netlink_tcpdiag_socket pig=1286 comm=syz-executor5 futex_wake_op: syz-executor3 tries to shift op by -1; fix this program SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2048 sclass=netlink_tcpdiag_socket pig=1301 comm=syz-executor5 futex_wake_op: syz-executor3 tries to shift op by -1; fix this program sctp: [Deprecated]: syz-executor1 (pid 1346) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor1 (pid 1363) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead netlink: 'syz-executor0': attribute type 3 has an invalid length. netlink: 'syz-executor0': attribute type 3 has an invalid length.