============================= WARNING: suspicious RCU usage 4.14.0-rc6+ #146 Not tainted ----------------------------- ./include/linux/inetdevice.h:230 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor4/27087: #0: (rcu_read_lock){....}, at: [] inet_rtm_getroute+0xaa0/0x2d70 net/ipv4/route.c:2738 stack backtrace: CPU: 1 PID: 27087 Comm: syz-executor4 Not tainted 4.14.0-rc6+ #146 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4665 __in_dev_get_rtnl include/linux/inetdevice.h:230 [inline] fib_dump_info+0x1136/0x13d0 net/ipv4/fib_semantics.c:1377 inet_rtm_getroute+0xf97/0x2d70 net/ipv4/route.c:2785 rtnetlink_rcv_msg+0x51c/0x1090 net/core/rtnetlink.c:4240 netlink_rcv_skb+0x216/0x440 net/netlink/af_netlink.c:2409 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4264 netlink_unicast_kernel net/netlink/af_netlink.c:1273 [inline] netlink_unicast+0x4e8/0x6f0 net/netlink/af_netlink.c:1299 netlink_sendmsg+0xa4a/0xe60 net/netlink/af_netlink.c:1862 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 sock_write_iter+0x31a/0x5d0 net/socket.c:912 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x684/0x970 fs/read_write.c:481 vfs_write+0x189/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007fb63d780be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000024 RSI: 0000000020226000 RDI: 0000000000000016 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f3cf8 R13: 00000000ffffffff R14: 00007fb63d7816d4 R15: 0000000000000000 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 27139 Comm: syz-executor1 Not tainted 4.14.0-rc6+ #146 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 handle_userfault+0x11ec/0x23a0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3095 [inline] handle_pte_fault mm/memory.c:3908 [inline] __handle_mm_fault+0x2d46/0x39c0 mm/memory.c:4034 handle_mm_fault+0x334/0x8d0 mm/memory.c:4071 __do_page_fault+0x5bd/0xd60 arch/x86/mm/fault.c:1444 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1520 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1066 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff8801cc097e38 EFLAGS: 00010206 RAX: ffffed0039812fd7 RBX: 0000000020002000 RCX: 0000000000000003 RDX: 0000000000000000 RSI: 0000000020002000 RDI: ffff8801cc097ea0 RBP: ffff8801cc097e68 R08: ffffed0039812fd7 R09: ffffed0039812fd7 R10: 0000000000000003 R11: ffffed0039812fd6 R12: 0000000000000018 R13: ffff8801cc097ea0 R14: 00007ffffffff000 R15: 0000000020002018 copy_from_user include/linux/uaccess.h:146 [inline] SYSC_sigaltstack kernel/signal.c:3249 [inline] SyS_sigaltstack+0xa1/0x270 kernel/signal.c:3245 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f6f220c6be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000083 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000000 RSI: 0000000020009ff8 RDI: 0000000020002000 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007f6f220c79c0 R15: 0000000000000000 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 1 PID: 27139 Comm: syz-executor1 Not tainted 4.14.0-rc6+ #146 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 handle_userfault+0x11ec/0x23a0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3095 [inline] handle_pte_fault mm/memory.c:3908 [inline] __handle_mm_fault+0x2d46/0x39c0 mm/memory.c:4034 handle_mm_fault+0x334/0x8d0 mm/memory.c:4071 __do_page_fault+0x5bd/0xd60 arch/x86/mm/fault.c:1444 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1520 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1066 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff8801cc097e38 EFLAGS: 00010206 RAX: ffffed0039812fd7 RBX: 0000000020002000 RCX: 0000000000000003 RDX: 0000000000000000 RSI: 0000000020002000 RDI: ffff8801cc097ea0 RBP: ffff8801cc097e68 R08: ffffed0039812fd7 R09: ffffed0039812fd7 R10: 0000000000000003 R11: ffffed0039812fd6 R12: 0000000000000018 R13: ffff8801cc097ea0 R14: 00007ffffffff000 R15: 0000000020002018 copy_from_user include/linux/uaccess.h:146 [inline] SYSC_sigaltstack kernel/signal.c:3249 [inline] SyS_sigaltstack+0xa1/0x270 kernel/signal.c:3245 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f6f220c6be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000083 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000000 RSI: 0000000020009ff8 RDI: 0000000020002000 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007f6f220c79c0 R15: 0000000000000000 netlink: 5 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor3'. QAT: Invalid ioctl QAT: Invalid ioctl device syz1 left promiscuous mode syz3: Invalid MTU 0 requested, hw min 68 syz3: Invalid MTU 0 requested, hw min 68 audit: type=1326 audit(1508879420.007:3211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=27349 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1025 sclass=netlink_route_socket pig=27355 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1025 sclass=netlink_route_socket pig=27355 comm=syz-executor5 audit: type=1326 audit(1508879420.172:3212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=27349 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. sctp: [Deprecated]: syz-executor5 (pid 27388) Use of int in max_burst socket option. Use struct sctp_assoc_value instead audit: type=1326 audit(1508879420.839:3213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=27471 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 audit: type=1326 audit(1508879420.982:3214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=27471 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor1'. kvm_hv_set_msr: 1 callbacks suppressed kvm [27473]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0xe0000011 kvm [27473]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0xe0000011 kvm [27473]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008d data 0xe0000011 kvm [27473]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008c data 0xe0000011 QAT: Invalid ioctl device lo entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl