device lo entered promiscuous mode INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 1 PID: 19893 Comm: syz-executor.5 Not tainted 4.14.193-syzkaller #0 Restarting kernel threads ... Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 register_lock_class+0x32b/0x1320 kernel/locking/lockdep.c:768 done. __lock_acquire+0x167/0x3f20 kernel/locking/lockdep.c:3378 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 flush_work+0xad/0x770 kernel/workqueue.c:2889 __cancel_work_timer+0x321/0x460 kernel/workqueue.c:2964 smc_close_active+0x768/0xb20 net/smc/smc_close.c:206 smc_release+0x3e1/0x5d0 net/smc/af_smc.c:131 __sock_release+0xcd/0x2b0 net/socket.c:602 sock_close+0x15/0x20 net/socket.c:1139 __fput+0x25f/0x7a0 fs/file_table.c:210 task_work_run+0x11f/0x190 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:191 [inline] exit_to_usermode_loop+0x1ad/0x200 arch/x86/entry/common.c:164 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x416981 RSP: 002b:00007fffcd02a6f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000416981 RDX: 0000001b32020000 RSI: 000000000000086e RDI: 0000000000000003 RBP: 0000000000000001 R08: 00000000216a486e R09: 00000000216a4872 R10: 00007fffcd02a7e0 R11: 0000000000000293 R12: 00000000011900c8 R13: 000000000005cfbc R14: ffffffffffffffff R15: 000000000118bf2c device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode Restarting kernel threads ... done. device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode kvm [19925]: vcpu0, guest rIP: 0xcc disabled perfctr wrmsr: 0xc2 data 0x0 device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo left promiscuous mode xt_HMARK: spi-set and port-set can't be combined xt_HMARK: spi-set and port-set can't be combined netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [U]  netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [U]  netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [U]  [U]  netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. audit: type=1800 audit(1597145647.837:187): pid=20576 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16855 res=0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20594 comm=syz-executor.0 batman_adv: batadv0: Interface deactivated: batadv_slave_0 batman_adv: batadv0: Interface deactivated: batadv_slave_1 audit: type=1800 audit(1597145648.237:188): pid=20591 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16855 res=0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20628 comm=syz-executor.0 audit: type=1800 audit(1597145648.327:189): pid=20634 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16866 res=0 audit: type=1800 audit(1597145648.367:190): pid=20638 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16868 res=0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20650 comm=syz-executor.0 audit: type=1800 audit(1597145648.437:191): pid=20648 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16737 res=0 audit: type=1800 audit(1597145648.457:192): pid=20640 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16875 res=0 syz-executor.2 (20634) used greatest stack depth: 23968 bytes left SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20668 comm=syz-executor.0 audit: type=1800 audit(1597145648.877:193): pid=20670 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16871 res=0 audit: type=1800 audit(1597145648.877:194): pid=20672 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16875 res=0 audit: type=1800 audit(1597145648.917:195): pid=20678 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16879 res=0 audit: type=1800 audit(1597145648.927:196): pid=20679 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16880 res=0