============================= WARNING: suspicious RCU usage 4.14.0-rc6+ #146 Not tainted ----------------------------- ./include/linux/inetdevice.h:230 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor7/32193: #0: (rcu_read_lock){....}, at: [] inet_rtm_getroute+0xaa0/0x2d70 net/ipv4/route.c:2738 stack backtrace: CPU: 0 PID: 32193 Comm: syz-executor7 Not tainted 4.14.0-rc6+ #146 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4665 __in_dev_get_rtnl include/linux/inetdevice.h:230 [inline] fib_dump_info+0x1136/0x13d0 net/ipv4/fib_semantics.c:1377 inet_rtm_getroute+0xf97/0x2d70 net/ipv4/route.c:2785 rtnetlink_rcv_msg+0x51c/0x1090 net/core/rtnetlink.c:4240 netlink_rcv_skb+0x216/0x440 net/netlink/af_netlink.c:2409 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4264 netlink_unicast_kernel net/netlink/af_netlink.c:1273 [inline] netlink_unicast+0x4e8/0x6f0 net/netlink/af_netlink.c:1299 netlink_sendmsg+0xa4a/0xe60 net/netlink/af_netlink.c:1862 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 sock_write_iter+0x31a/0x5d0 net/socket.c:912 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x684/0x970 fs/read_write.c:481 vfs_write+0x189/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f8802976be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000024 RSI: 0000000020226000 RDI: 0000000000000016 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007f88029779c0 R15: 0000000000000000 pit: kvm: requested 838 ns i8254 timer period limited to 500000 ns pit: kvm: requested 838 ns i8254 timer period limited to 500000 ns Started in network mode Own node address <188.2415.3204>, network identity 4711 device gre0 entered promiscuous mode rpcbind: RPC call returned error 22 rpcbind: RPC call returned error 22 netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'. device gre0 entered promiscuous mode do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32471 comm=syz-executor6 kauditd_printk_skb: 210 callbacks suppressed audit: type=1326 audit(1508893578.518:11926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32477 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 audit: type=1326 audit(1508893578.647:11927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32477 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 netlink: 2 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. sctp: [Deprecated]: syz-executor5 (pid 32578) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor5 (pid 32579) Use of int in maxseg socket option. Use struct sctp_assoc_value instead netlink: 2 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor4'. sctp: [Deprecated]: syz-executor2 (pid 32638) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor2 (pid 32638) Use of int in maxseg socket option. Use struct sctp_assoc_value instead device gre0 entered promiscuous mode QAT: Invalid ioctl IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=6 nlmsg_type=8 sclass=netlink_xfrm_socket pig=32752 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=8 sclass=netlink_xfrm_socket pig=300 comm=syz-executor3 9pnet_virtio: no channels available for device ./file0 IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE IPv6: NLM_F_CREATE should be set when creating new route IPv6: NLM_F_CREATE should be set when creating new route 9pnet_virtio: no channels available for device ./file0 IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE rpcbind: RPC call returned error 22 RDS: rds_bind could not find a transport for 172.20.5.170, load rds_tcp or rds_rdma? SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=411 comm=syz-executor1 rpcbind: RPC call returned error 22 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pig=411 comm=syz-executor1 kvm_hv_set_msr: 12 callbacks suppressed kvm [475]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0x6f kvm [475]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0x6f kvm [475]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008d data 0x6f kvm [475]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008c data 0x6f kvm [475]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0xbcd9006f kvm [475]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0xbcd9006f kvm [475]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008d data 0xbcd9006f *** Guest State *** kvm [552]: vcpu0, guest rIP: 0x29 disabled perfctr wrmsr: 0xc1 data 0xffffffff audit: type=1326 audit(1508893581.999:11928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=552 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 CR0: actual=0x0000000080000031, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002051, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x000000000000fffa RIP = 0x0000000000000000 QAT: Invalid ioctl RFLAGS=0x00033000 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 DS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 kvm [552]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0xffffffff audit: type=1326 audit(1508893582.166:11929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=552 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 SS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x0000ffff, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x00002088, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811ba1f3 RSP = 0xffff8801cdf574c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007fd3bc72b700 GSBase=ffff8801db300000 TRBase=ffff8801db222cc0 GDTBase=ffffffffff577000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=00000001c4cd3000 CR4=00000000001426e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d20830 EFER = 0x0000000000000d01 PAT = 0x0000000000000000 *** Control State *** PinBased=0000003f CPUBased=b699edfa SecondaryExec=00000042 EntryControls=0000d1ff ExitControls=0023efff ExceptionBitmap=ffffbfff PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xfffffecbccee3c1f EPT pointer = 0x00000001d2e6801e audit: type=1326 audit(1508893582.602:11930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=619 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1508893582.602:11931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=619 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=41 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1508893582.602:11932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=619 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1508893582.603:11933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=619 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=55 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1508893582.603:11934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=619 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1508893582.603:11935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=619 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=298 compat=0 ip=0x452869 code=0x7ffc0000 IPv6: Can't replace route, no match found SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65535 sclass=netlink_xfrm_socket pig=608 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=6 sclass=netlink_xfrm_socket pig=608 comm=syz-executor2 nla_parse: 12 callbacks suppressed netlink: 5 bytes leftover after parsing attributes in process `syz-executor2'. IPv6: Can't replace route, no match found SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65535 sclass=netlink_xfrm_socket pig=608 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=6 sclass=netlink_xfrm_socket pig=608 comm=syz-executor2 8021q: VLANs not supported on syz1 8021q: VLANs not supported on syz1 RDS: rds_bind could not find a transport for 172.20.5.187, load rds_tcp or rds_rdma? kauditd_printk_skb: 73 callbacks suppressed audit: type=1326 audit(1508893583.580:12009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=797 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 RDS: rds_bind could not find a transport for 172.20.5.187, load rds_tcp or rds_rdma? SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=832 comm=syz-executor1 netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. audit: type=1326 audit(1508893584.017:12010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=906 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 audit: type=1326 audit(1508893584.095:12011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=906 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl netlink: 14 bytes leftover after parsing attributes in process `syz-executor2'. QAT: Invalid ioctl audit: type=1326 audit(1508893584.448:12012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=960 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 netlink: 14 bytes leftover after parsing attributes in process `syz-executor2'. audit: type=1326 audit(1508893584.702:12013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=960 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 audit: type=1326 audit(1508893584.729:12014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1010 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 device  entered promiscuous mode audit: type=1326 audit(1508893584.751:12015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1010 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 device  left promiscuous mode Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable audit: type=1326 audit(1508893585.418:12016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1131 comm="syz-executor7" exe="/root/syz-executor7" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x0 audit: type=1326 audit(1508893585.540:12017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1131 comm="syz-executor7" exe="/root/syz-executor7" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x0 netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. tc_dump_action: action bad kind netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. tc_dump_action: action bad kind device gre0 entered promiscuous mode skbuff: bad partial csum: csum=0/65535 len=994 netlink: 13 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 13 bytes leftover after parsing attributes in process `syz-executor1'. device gre0 entered promiscuous mode audit: type=1326 audit(1508893586.134:12018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1283 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'.