QAT: Invalid ioctl rpcbind: RPC call returned error 22 ============================= WARNING: suspicious RCU usage 4.14.0-rc7-next-20171102+ #37 Not tainted ----------------------------- ./include/linux/inetdevice.h:232 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor6/14895: #0: (rcu_read_lock){....}, at: [] inet_rtm_getroute+0xaa7/0x2da0 net/ipv4/route.c:2738 stack backtrace: CPU: 1 PID: 14895 Comm: syz-executor6 Not tainted 4.14.0-rc7-next-20171102+ #37 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4675 __in_dev_get_rtnl include/linux/inetdevice.h:232 [inline] fib_dump_info+0x1136/0x13d0 net/ipv4/fib_semantics.c:1368 inet_rtm_getroute+0xf9e/0x2da0 net/ipv4/route.c:2785 rtnetlink_rcv_msg+0x51c/0x1020 net/core/rtnetlink.c:4332 netlink_rcv_skb+0x216/0x440 net/netlink/af_netlink.c:2401 rtnetlink_rcv+0x1c/0x20 net/core/rtnetlink.c:4356 netlink_unicast_kernel net/netlink/af_netlink.c:1273 [inline] netlink_unicast+0x4e8/0x6f0 net/netlink/af_netlink.c:1299 netlink_sendmsg+0xa4a/0xe70 net/netlink/af_netlink.c:1862 sock_sendmsg_nosec net/socket.c:632 [inline] sock_sendmsg+0xca/0x110 net/socket.c:642 sock_write_iter+0x320/0x5e0 net/socket.c:911 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:481 vfs_write+0x18f/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007fa3c9da6be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000025 RSI: 00000000209f2000 RDI: 0000000000000015 RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007fa3c9da79c0 R15: 0000000000000000 kauditd_printk_skb: 68 callbacks suppressed audit: type=1326 audit(1509642725.542:2311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=14983 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9296 sclass=netlink_route_socket pig=15003 comm=syz-executor7 audit: type=1326 audit(1509642725.716:2312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=14983 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0xffff0000 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9296 sclass=netlink_route_socket pig=15023 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=28 sclass=netlink_tcpdiag_socket pig=15042 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=28 sclass=netlink_tcpdiag_socket pig=15057 comm=syz-executor2 sg_write: data in/out 589788/28 bytes for SCSI command 0x0-- guessing data in; program syz-executor3 not setting count and/or reply_len properly sg_write: data in/out 327415624/94 bytes for SCSI command 0xd7-- guessing data in; program syz-executor3 not setting count and/or reply_len properly sg_write: data in/out 589788/28 bytes for SCSI command 0x0-- guessing data in; program syz-executor3 not setting count and/or reply_len properly netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. SELinux: failure in selinux_parse_skb(), unable to parse packet SELinux: failure in selinux_parse_skb(), unable to parse packet netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=46737 sclass=netlink_route_socket pig=15290 comm=syz-executor2 netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=46737 sclass=netlink_route_socket pig=15317 comm=syz-executor2 netlink: 12 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. device syz0 entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): syz0: link is not ready sctp: [Deprecated]: syz-executor0 (pid 15614) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor0 (pid 15627) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device gre0 entered promiscuous mode devpts: called with bogus options QAT: Invalid ioctl devpts: called with bogus options device gre0 entered promiscuous mode kvm [15763]: vcpu2, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x8 audit: type=1326 audit(1509642729.954:2313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15795 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642729.955:2314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15795 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=54 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642729.955:2315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15795 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642729.956:2316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15795 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=64 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642729.956:2317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15795 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642729.956:2318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15795 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=66 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642729.958:2319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15795 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642729.959:2320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15795 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=298 compat=0 ip=0x452869 code=0x7ffc0000 kvm [15763]: vcpu2, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x8 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26 sclass=netlink_tcpdiag_socket pig=15875 comm=syz-executor3 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26 sclass=netlink_tcpdiag_socket pig=15875 comm=syz-executor3 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 1 PID: 15903 Comm: syz-executor6 Not tainted 4.14.0-rc7-next-20171102+ #37 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:31 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3293 [inline] kmem_cache_alloc_node+0x56/0x760 mm/slab.c:3636 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:982 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1145 [inline] netlink_sendmsg+0xa86/0xe70 net/netlink/af_netlink.c:1837 sock_sendmsg_nosec net/socket.c:632 [inline] sock_sendmsg+0xca/0x110 net/socket.c:642 sock_write_iter+0x320/0x5e0 net/socket.c:911 call_write_iter include/linux/fs.h:1770 [inline] new_sync_write fs/read_write.c:468 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:481 vfs_write+0x18f/0x510 fs/read_write.c:543 SYSC_write fs/read_write.c:588 [inline] SyS_write+0xef/0x220 fs/read_write.c:580 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007fa3c9da6be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000024 RSI: 00000000209f2000 RDI: 0000000000000013 RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f7880 R13: 0000000000000014 R14: 0000000000758080 R15: ffffffffffffffff SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15955 comm=syz-executor6 device gre0 entered promiscuous mode device eql entered promiscuous mode nla_parse: 7 callbacks suppressed netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26 sclass=netlink_tcpdiag_socket pig=16048 comm=syz-executor6 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=26 sclass=netlink_tcpdiag_socket pig=16054 comm=syz-executor6 netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. SELinux: unrecognized netlink message: protocol=6 nlmsg_type=255 sclass=netlink_xfrm_socket pig=16174 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=34205 sclass=netlink_route_socket pig=16183 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=6 nlmsg_type=255 sclass=netlink_xfrm_socket pig=16185 comm=syz-executor7 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8427 sclass=netlink_route_socket pig=16201 comm=syz-executor6 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=34205 sclass=netlink_route_socket pig=16183 comm=syz-executor5 kauditd_printk_skb: 22 callbacks suppressed audit: type=1326 audit(1509642732.457:2343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642732.457:2344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642732.460:2345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=292 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642732.460:2346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642732.465:2347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=42 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642732.465:2348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642732.466:2349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642732.466:2350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642732.466:2351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 audit: type=1326 audit(1509642732.466:2352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16213 comm="syz-executor1" exe="/root/syz-executor1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452869 code=0x7ffc0000 netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. sg_write: data in/out 327650/154 bytes for SCSI command 0x52-- guessing data in; program syz-executor4 not setting count and/or reply_len properly netlink: 16 bytes leftover after parsing attributes in process `syz-executor0'. sg_write: data in/out 327650/154 bytes for SCSI command 0x52-- guessing data in; program syz-executor4 not setting count and/or reply_len properly SELinux: unrecognized netlink message: protocol=0 nlmsg_type=507 sclass=netlink_route_socket pig=16304 comm=syz-executor6 netlink: 37 bytes leftover after parsing attributes in process `syz-executor2'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5648 sclass=netlink_route_socket pig=16438 comm=syz-executor6 netlink: 37 bytes leftover after parsing attributes in process `syz-executor2'. ICMPv6: NA: bb:bb:bb:bb:bb:05 advertised our address fe80::5aa on syz5! RDS: rds_bind could not find a transport for 172.20.4.170, load rds_tcp or rds_rdma? ICMPv6: NA: bb:bb:bb:bb:bb:05 advertised our address fe80::5aa on syz5! RDS: rds_bind could not find a transport for 172.20.4.170, load rds_tcp or rds_rdma? QAT: Invalid ioctl QAT: Invalid ioctl netlink: 25 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 25 bytes leftover after parsing attributes in process `syz-executor3'. QAT: Invalid ioctl QAT: Invalid ioctl