IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff5f95f22e7b EPT pointer = 0x00000001c6e8301e ============================= WARNING: suspicious RCU usage 4.14.0-rc5+ #142 Not tainted ----------------------------- ./include/linux/inetdevice.h:230 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor3/27656: #0: (rcu_read_lock){....}, at: [] inet_rtm_getroute+0xaa0/0x2d70 net/ipv4/route.c:2738 stack backtrace: CPU: 0 PID: 27656 Comm: syz-executor3 Not tainted 4.14.0-rc5+ #142 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4665 __in_dev_get_rtnl include/linux/inetdevice.h:230 [inline] fib_dump_info+0x1136/0x13d0 net/ipv4/fib_semantics.c:1377 inet_rtm_getroute+0xf97/0x2d70 net/ipv4/route.c:2785 rtnetlink_rcv_msg+0x51c/0x1090 net/core/rtnetlink.c:4237 netlink_rcv_skb+0x216/0x440 net/netlink/af_netlink.c:2409 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4261 netlink_unicast_kernel net/netlink/af_netlink.c:1273 [inline] netlink_unicast+0x4e8/0x6f0 net/netlink/af_netlink.c:1299 netlink_sendmsg+0xa4a/0xe60 net/netlink/af_netlink.c:1862 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 sock_write_iter+0x31a/0x5d0 net/socket.c:912 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x684/0x970 fs/read_write.c:481 vfs_write+0x189/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452719 RSP: 002b:00007fef2fe02be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452719 RDX: 0000000000000024 RSI: 0000000020226000 RDI: 0000000000000014 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f65f0 R13: 00000000ffffffff R14: 00007fef2fe036d4 R15: 0000000000000000 QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl device gre0 entered promiscuous mode netlink: 2 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor1'. QAT: failed to copy from user. sctp: [Deprecated]: syz-executor0 (pid 27860) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead QAT: failed to copy from user. SELinux: unknown mount option netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. SELinux: unknown mount option netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. kvm_hv_get_msr: 1 callbacks suppressed kvm [27922]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008f 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=27996 comm=syz-executor6 kvm_hv_set_msr: 12 callbacks suppressed kvm [27988]: vcpu2, guest rIP: 0xfff0 Hyper-V uhandled wrmsr: 0x40000023 data 0x5 netlink: 12 bytes leftover after parsing attributes in process `syz-executor2'. kvm [27988]: vcpu2, guest rIP: 0xfff0 Hyper-V uhandled wrmsr: 0x40000023 data 0x5 audit: type=1326 audit(1508657062.044:7544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=28130 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 QAT: Invalid ioctl QAT: Invalid ioctl audit: type=1326 audit(1508657062.149:7545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=28130 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 QAT: Invalid ioctl QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pig=28178 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pig=28164 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pig=28164 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pig=28204 comm=syz-executor4 QAT: Invalid ioctl nla_parse: 2 callbacks suppressed netlink: 13 bytes leftover after parsing attributes in process `syz-executor4'. QAT: Invalid ioctl netlink: 13 bytes leftover after parsing attributes in process `syz-executor4'. Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable QAT: failed to copy from user cfg_data. QAT: failed to copy from user cfg_data. netlink: 10 bytes leftover after parsing attributes in process `syz-executor1'. dccp_invalid_packet: P.Data Offset(172) too large SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28394 comm=syz-executor1 dccp_invalid_packet: P.Data Offset(172) too large dccp_invalid_packet: P.Data Offset(4) too small dccp_invalid_packet: P.Data Offset(4) too small QAT: Invalid ioctl QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28795 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28795 comm=syz-executor0 netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28795 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28809 comm=syz-executor0 netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. ALSA: seq fatal error: cannot create timer (-19) dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. Bearer <> rejected, illegal name audit: type=1326 audit(1508657067.713:7546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508657067.735:7547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=63 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508657067.735:7548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508657067.737:7549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508657067.737:7550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508657067.738:7551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=93 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508657067.738:7552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508657067.738:7553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=123 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508657067.738:7554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508657067.738:7555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29028 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=16 compat=0 ip=0x452719 code=0x7ffc0000 netlink: 62 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 62 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 13 bytes leftover after parsing attributes in process `syz-executor4'.