============================= WARNING: suspicious RCU usage 4.14.0-rc5+ #138 Not tainted ----------------------------- ./include/linux/inetdevice.h:230 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor7/31870: device gre0 entered promiscuous mode #0: (rcu_read_lock){....}, at: [] inet_rtm_getroute+0xaa0/0x2d70 net/ipv4/route.c:2738 stack backtrace: CPU: 0 PID: 31870 Comm: syz-executor7 Not tainted 4.14.0-rc5+ #138 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4665 __in_dev_get_rtnl include/linux/inetdevice.h:230 [inline] fib_dump_info+0x1136/0x13d0 net/ipv4/fib_semantics.c:1377 inet_rtm_getroute+0xf97/0x2d70 net/ipv4/route.c:2785 rtnetlink_rcv_msg+0x51c/0x1090 net/core/rtnetlink.c:4237 netlink_rcv_skb+0x216/0x440 net/netlink/af_netlink.c:2409 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4261 netlink_unicast_kernel net/netlink/af_netlink.c:1273 [inline] netlink_unicast+0x4e8/0x6f0 net/netlink/af_netlink.c:1299 netlink_sendmsg+0xa4a/0xe60 net/netlink/af_netlink.c:1862 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 sock_write_iter+0x31a/0x5d0 net/socket.c:912 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x684/0x970 fs/read_write.c:481 vfs_write+0x189/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452719 RSP: 002b:00007f67b0c3dbe8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452719 RDX: 0000000000000024 RSI: 0000000020226000 RDI: 0000000000000014 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f4040 R13: 00000000ffffffff R14: 00007f67b0c3e6d4 R15: 0000000000000000 kauditd_printk_skb: 282 callbacks suppressed audit: type=1326 audit(1508426114.343:2850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=31958 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 audit: type=1326 audit(1508426114.520:2851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=31958 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32037 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=49283 sclass=netlink_route_socket pig=32081 comm=syz-executor3 RDS: rds_bind could not find a transport for 172.20.7.170, load rds_tcp or rds_rdma? SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=32110 comm=syz-executor3 audit: type=1326 audit(1508426115.560:2852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32220 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508426115.560:2853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32220 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508426115.564:2854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32220 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=53 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508426115.564:2855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32220 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508426115.564:2856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32220 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508426115.565:2857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32220 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=85 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508426115.565:2858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32220 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 audit: type=1326 audit(1508426115.565:2859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=32220 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x7ffc0000 *** Guest State *** CR0: actual=0x0000000080000031, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002051, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x000000000000fffa RIP = 0x0000000000000000 RFLAGS=0x00033000 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 DS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x000f3, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x0000ffff, base=0x0000000000000000 LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x00002088, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811ba1f3 RSP = 0xffff8801c2b474c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f245eb9e700 GSBase=ffff8801db300000 TRBase=ffff8801db322cc0 GDTBase=ffffffffff576000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=00000001c15ba000 CR4=00000000001426e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d1ed30 EFER = 0x0000000000000d01 PAT = 0x0000000000000000 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=00000043 EntryControls=0000d1ff ExitControls=0023efff ExceptionBitmap=ffffbfff PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffff6631a3c47f TPR Threshold = 0x00 EPT pointer = 0x00000001c65ad01e