============================= WARNING: suspicious RCU usage 4.14.0-rc5+ #142 Not tainted ----------------------------- ./include/linux/inetdevice.h:230 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor2/726: device lo entered promiscuous mode #0: (rcu_read_lock){....}, at: [] inet_rtm_getroute+0xaa0/0x2d70 net/ipv4/route.c:2738 stack backtrace: CPU: 0 PID: 726 Comm: syz-executor2 Not tainted 4.14.0-rc5+ #142 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4665 __in_dev_get_rtnl include/linux/inetdevice.h:230 [inline] fib_dump_info+0x1136/0x13d0 net/ipv4/fib_semantics.c:1377 inet_rtm_getroute+0xf97/0x2d70 net/ipv4/route.c:2785 rtnetlink_rcv_msg+0x51c/0x1090 net/core/rtnetlink.c:4237 netlink_rcv_skb+0x216/0x440 net/netlink/af_netlink.c:2409 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4261 netlink_unicast_kernel net/netlink/af_netlink.c:1273 [inline] netlink_unicast+0x4e8/0x6f0 net/netlink/af_netlink.c:1299 netlink_sendmsg+0xa4a/0xe60 net/netlink/af_netlink.c:1862 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 sock_write_iter+0x31a/0x5d0 net/socket.c:912 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x684/0x970 fs/read_write.c:481 vfs_write+0x189/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452719 RSP: 002b:00007fa4650e2be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452719 RDX: 0000000000000024 RSI: 0000000020226000 RDI: 0000000000000014 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007fa4650e39c0 R15: 0000000000000000 QAT: Invalid ioctl QAT: Invalid ioctl netlink: 6 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 6 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor2'. kauditd_printk_skb: 5 callbacks suppressed audit: type=1326 audit(1508634467.869:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=896 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x0 netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. device lo left promiscuous mode netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. QAT: Invalid ioctl QAT: Invalid ioctl audit: type=1326 audit(1508634468.789:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1106 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 irq bypass consumer (token ffff8801d37c1080) registration fails: -16 audit: type=1326 audit(1508634468.892:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1067 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 audit: type=1326 audit(1508634469.270:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1067 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready device lo left promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready QAT: Invalid ioctl QAT: Invalid ioctl RDS: rds_bind could not find a transport for 224.0.0.1, load rds_tcp or rds_rdma? SELinux: unrecognized netlink message: protocol=0 nlmsg_type=49283 sclass=netlink_route_socket pig=1321 comm=syz-executor2 RDS: rds_bind could not find a transport for 224.0.0.1, load rds_tcp or rds_rdma? SELinux: unrecognized netlink message: protocol=0 nlmsg_type=49283 sclass=netlink_route_socket pig=1337 comm=syz-executor2 audit: type=1326 audit(1508634470.522:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1361 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x0 audit: type=1326 audit(1508634470.593:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1361 comm="syz-executor4" exe="/root/syz-executor4" sig=9 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0x0 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=3 sclass=netlink_tcpdiag_socket pig=1417 comm=syz-executor5 audit: type=1326 audit(1508634471.077:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1479 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 audit: type=1326 audit(1508634471.205:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1479 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 QAT: Invalid ioctl QAT: Invalid ioctl nla_parse: 4 callbacks suppressed netlink: 9 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=1565 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1565 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1565 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=1565 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1565 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=1565 comm=syz-executor3 device gre0 entered promiscuous mode sg_write: data in/out 3171656/144 bytes for SCSI command 0xff-- guessing data in; program syz-executor5 not setting count and/or reply_len properly sg_write: data in/out 3171656/144 bytes for SCSI command 0xff-- guessing data in; program syz-executor5 not setting count and/or reply_len properly netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. audit: type=1326 audit(1508634474.950:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1876 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 audit: type=1326 audit(1508634475.082:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=1876 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452719 code=0xffff0000 tmpfs: No value for mount option 'y' tmpfs: No value for mount option 'y' dccp_close: ABORT with 587 bytes unread sctp: [Deprecated]: syz-executor4 (pid 2080) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor4 (pid 2106) Use of int in maxseg socket option. Use struct sctp_assoc_value instead syz-executor4: vmalloc: allocation failure: 16587630936 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor4 cpuset=/ mems_allowed=0 CPU: 1 PID: 2115 Comm: syz-executor4 Not tainted 4.14.0-rc5+ #142 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 warn_alloc+0x1c2/0x2f0 mm/page_alloc.c:3254 __vmalloc_node_range+0x4f0/0x650 mm/vmalloc.c:1775 __vmalloc_node mm/vmalloc.c:1804 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1826 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:529 [inline] kvmalloc_array include/linux/mm.h:545 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1610 net/ipv4/netfilter/ip_tables.c:686 do_replace net/ipv4/netfilter/ip_tables.c:1130 [inline] do_ipt_set_ctl+0x345/0x5c0 net/ipv4/netfilter/ip_tables.c:1664 nf_sockopt net/netfilter/nf_sockopt.c:105 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:114 ip_setsockopt+0xa1/0xb0 net/ipv4/ip_sockglue.c:1255 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2799 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2965 SYSC_setsockopt net/socket.c:1852 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1831 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452719 RSP: 002b:00007f6ed4355be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452719 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000017 RBP: 0000000000000082 R08: 0000000000000056 R09: 0000000000000000 R10: 0000000020c2c000 R11: 0000000000000212 R12: 00000000006f76e8 R13: 00000000ffffffff R14: 00007f6ed43566d4 R15: 0000000000000000 warn_alloc_show_mem: 1 callbacks suppressed Mem-Info: active_anon:120202 inactive_anon:172 isolated_anon:0 active_file:4191 inactive_file:7168 isolated_file:0 unevictable:0 dirty:210 writeback:0 unstable:0 slab_reclaimable:8375 slab_unreclaimable:97643 mapped:22877 shmem:313 pagetables:809 bounce:0 free:1370991 free_pcp:583 free_cma:0 syz-executor4: vmalloc: allocation failure: 16587630936 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) syz-executor4 cpuset=/ mems_allowed=0 CPU: 0 PID: 2120 Comm: syz-executor4 Not tainted 4.14.0-rc5+ #142 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 warn_alloc+0x1c2/0x2f0 mm/page_alloc.c:3254 __vmalloc_node_range+0x4f0/0x650 mm/vmalloc.c:1775 __vmalloc_node mm/vmalloc.c:1804 [inline] __vmalloc_node_flags_caller+0x50/0x60 mm/vmalloc.c:1826 kvmalloc_node+0x82/0xd0 mm/util.c:406 kvmalloc include/linux/mm.h:529 [inline] kvmalloc_array include/linux/mm.h:545 [inline] xt_alloc_entry_offsets+0x21/0x30 net/netfilter/x_tables.c:774 translate_table+0x235/0x1610 net/ipv4/netfilter/ip_tables.c:686 do_replace net/ipv4/netfilter/ip_tables.c:1130 [inline] do_ipt_set_ctl+0x345/0x5c0 net/ipv4/netfilter/ip_tables.c:1664 nf_sockopt net/netfilter/nf_sockopt.c:105 [inline] nf_setsockopt+0x67/0xc0 net/netfilter/nf_sockopt.c:114 ip_setsockopt+0xa1/0xb0 net/ipv4/ip_sockglue.c:1255 tcp_setsockopt+0x82/0xd0 net/ipv4/tcp.c:2799 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2965 SYSC_setsockopt net/socket.c:1852 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1831 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452719 RSP: 002b:00007f6ed4313be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000758190 RCX: 0000000000452719 RDX: 0000000000000040 RSI: 0000000000000000 RDI: 000000000000001c RBP: 0000000000000082 R08: 0000000000000056 R09: 0000000000000000 R10: 0000000020c2c000 R11: 0000000000000212 R12: 00000000006f6800 R13: 00000000ffffffff R14: 00007f6ed43146d4 R15: 0000000000000002