BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:71 in_atomic(): 1, irqs_disabled(): 0, pid: 4403, name: syz-executor4 2 locks held by syz-executor4/4403: #0: (&vcpu->mutex){+.+.}, at: [] vcpu_load+0x1c/0x70 arch/x86/kvm/../../../virt/kvm/kvm_main.c:154 #1: (&kvm->srcu){....}, at: [] vcpu_enter_guest arch/x86/kvm/x86.c:7021 [inline] #1: (&kvm->srcu){....}, at: [] vcpu_run arch/x86/kvm/x86.c:7100 [inline] #1: (&kvm->srcu){....}, at: [] kvm_arch_vcpu_ioctl_run+0x1bdd/0x5a30 arch/x86/kvm/x86.c:7261 CPU: 2 PID: 4403 Comm: syz-executor4 Not tainted 4.13.0-next-20170913+ #3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6011 __might_sleep+0x95/0x190 kernel/sched/core.c:5964 __might_fault+0xab/0x1d0 mm/memory.c:4499 __copy_from_user include/linux/uaccess.h:71 [inline] paging32_walk_addr_generic+0x427/0x1d80 arch/x86/kvm/paging_tmpl.h:369 paging32_walk_addr arch/x86/kvm/paging_tmpl.h:475 [inline] paging32_gva_to_gpa+0xa5/0x230 arch/x86/kvm/paging_tmpl.h:913 kvm_read_guest_virt_helper+0xd8/0x140 arch/x86/kvm/x86.c:4436 kvm_read_guest_virt_system+0x3c/0x50 arch/x86/kvm/x86.c:4503 netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. segmented_read_std+0x10c/0x180 arch/x86/kvm/emulate.c:822 em_fxrstor+0x27b/0x410 arch/x86/kvm/emulate.c:4025 kvm [4409]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x8 x86_emulate_insn+0x55d/0x3cf0 arch/x86/kvm/emulate.c:5483 x86_emulate_instruction+0x411/0x1ca0 arch/x86/kvm/x86.c:5735 kvm_mmu_page_fault+0x1b0/0x2f0 arch/x86/kvm/mmu.c:4956 handle_ept_violation+0x194/0x540 arch/x86/kvm/vmx.c:6502 vmx_handle_exit+0x24b/0x1a60 arch/x86/kvm/vmx.c:8823 vcpu_enter_guest arch/x86/kvm/x86.c:7038 [inline] vcpu_run arch/x86/kvm/x86.c:7100 [inline] kvm_arch_vcpu_ioctl_run+0x1d36/0x5a30 arch/x86/kvm/x86.c:7261 kvm_vcpu_ioctl+0x64c/0x1010 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2550 TCP: tcp_parse_options: Illegal window scaling value 205 > 14 received vfs_ioctl fs/ioctl.c:45 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:685 SYSC_ioctl fs/ioctl.c:700 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x447299 RSP: 002b:00007f0e0bd5ec08 EFLAGS: 00000296 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000018 RCX: 0000000000447299 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000018 kvm [4409]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x8 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000296 R12: 00000000ffffffff R13: 0000000000005790 R14: 00000000006e8850 R15: 0000000000000018 TCP: tcp_parse_options: Illegal window scaling value 205 > 14 received sctp: [Deprecated]: syz-executor4 (pid 4455) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor4 (pid 4455) Use of int in maxseg socket option. Use struct sctp_assoc_value instead netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'. IPv6: Can't replace route, no match found netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'. IPv6: Can't replace route, no match found device gre0 entered promiscuous mode device gre0 entered promiscuous mode TCP: request_sock_TCPv6: Possible SYN flooding on port 20005. Sending cookies. Check SNMP counters. sctp: [Deprecated]: syz-executor1 (pid 4901) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor1 (pid 4900) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor1 (pid 4900) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor1 (pid 4901) Use of int in maxseg socket option. Use struct sctp_assoc_value instead QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4915 comm=syz-executor4 QAT: Invalid ioctl *** Guest State *** CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000f80 RIP = 0x0000000000000000 RFLAGS=0x00000002 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 GDTR: limit=0x000007ff, base=0x0000000000001000 LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 IDTR: limit=0x0000ffff, base=0x0000000000000000 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b8bff RSP = 0xffff88003def74c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007fae7fafd700 GSBase=ffff88003ed00000 TRBase=ffff88003ed23100 GDTBase=ffffffffff576000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=0000000069448000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d460c0 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b699edfe SecondaryExec=000000e2 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000004 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffd53938ef2a EPT pointer = 0x0000000039e3f01e Virtual processor ID = 0x0007 audit: type=1326 audit(1505348456.834:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=4947 comm="syz-executor7" exe="/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x0 device lo entered promiscuous mode device lo left promiscuous mode audit: type=1326 audit(1505348457.013:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=4947 comm="syz-executor7" exe="/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x0 device lo entered promiscuous mode device lo left promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5178 comm=syz-executor6 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=5172 comm=syz-executor6 QAT: Invalid ioctl QAT: Invalid ioctl audit: type=1326 audit(1505348458.932:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5303 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x0 audit: type=1326 audit(1505348459.025:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5303 comm="syz-executor2" exe="/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x0 PF_BRIDGE: RTM_NEWNEIGH with invalid address PF_BRIDGE: RTM_NEWNEIGH with invalid address netlink: 64 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 64 bytes leftover after parsing attributes in process `syz-executor7'. pit: kvm: requested 4190 ns i8254 timer period limited to 500000 ns QAT: Invalid ioctl QAT: Invalid ioctl netlink: 13 bytes leftover after parsing attributes in process `syz-executor0'. QAT: Invalid ioctl netlink: 13 bytes leftover after parsing attributes in process `syz-executor0'. QAT: Invalid ioctl kvm: MONITOR instruction emulated as NOP! *** Guest State *** CR0: actual=0x0000000000000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000020, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000000000000 RIP = 0x0000000000000000 RFLAGS=0x00041090 DR7 = 0x0000000000000400 Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 CS: sel=0x0043, attr=0x040fb, limit=0x000fffff, base=0x0000000000000000 *** Guest State *** CR0: actual=0x0000000000000024, shadow=0x0000000000000004, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000100000000 RIP = 0x000000000010f002 RFLAGS=0xfffffffffffffffe DR7 = 0x0000000000000400 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0x0000, attr=0x10000, limit=0x00017004, base=0x0000000000000004 DS: sel=0x0003, attr=0x10000, limit=0x00015000, base=0x0000000000004000 SS: sel=0x000d, attr=0x10000, limit=0x00003000, base=0x0000000000100000 ES: sel=0x000d, attr=0x030a1, limit=0x00005000, base=0x0000000000000002 FS: sel=0x000d, attr=0x10000, limit=0x00003000, base=0x0000000000006000 GS: sel=0x0000, attr=0x10000, limit=0x00007000, base=0x0000000000016000 GDTR: limit=0x0000f000, base=0x0000000000103006 LDTR: sel=0x0003, attr=0x10000, limit=0x00005000, base=0x0000000000010000 IDTR: limit=0x0000d000, base=0x0000000000001000 TR: sel=0x000f, attr=0x05099, limit=0x00103000, base=0x0000000000001000 EFER = 0x0000000000004000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b8bff RSP = 0xffff88003def74c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f5171fcd700 GSBase=ffff88006de00000 TRBase=ffff88006de23100 GDTBase=ffffffffff575000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=000000003dff0000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d460c0 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=000000e3 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000001 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffd281f8ce16 TPR Threshold = 0x00 *** Guest State *** CR0: actual=0x0000000000000024, shadow=0x0000000000000004, gh_mask=fffffffffffffff7 CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 CR3 = 0x00000000fffbc000 RSP = 0x0000000100000000 RIP = 0x000000000010f002 RFLAGS=0xfffffffffffffffe DR7 = 0x0000000000000400 EPT pointer = 0x000000006a6b201e Virtual processor ID = 0x0007 Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 CS: sel=0x0000, attr=0x10000, limit=0x00017004, base=0x0000000000000004 DS: sel=0x0003, attr=0x10000, limit=0x00015000, base=0x0000000000004000 SS: sel=0x000d, attr=0x10000, limit=0x00003000, base=0x0000000000100000 ES: sel=0x000d, attr=0x030a1, limit=0x00005000, base=0x0000000000000002 FS: sel=0x000d, attr=0x10000, limit=0x00003000, base=0x0000000000006000 GS: sel=0x0000, attr=0x10000, limit=0x00007000, base=0x0000000000016000 GDTR: limit=0x0000f000, base=0x0000000000103006 LDTR: sel=0x0003, attr=0x10000, limit=0x00005000, base=0x0000000000010000 IDTR: limit=0x0000d000, base=0x0000000000001000 TR: sel=0x000f, attr=0x05099, limit=0x00103000, base=0x0000000000001000 EFER = 0x0000000000004000 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b8bff RSP = 0xffff88003d3ef4c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f5171f68700 GSBase=ffff88003ed00000 TRBase=ffff88003ed23100 GDTBase=ffffffffff576000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=000000003dff0000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d460c0 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=000000e3 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=80000001 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffd271cbb866 TPR Threshold = 0x00 EPT pointer = 0x000000003972e01e Virtual processor ID = 0x004b DS: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 SS: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 ES: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 TCP: request_sock_TCP: Possible SYN flooding on port 20004. Sending cookies. Check SNMP counters. FS: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 GS: sel=0x004b, attr=0x040f3, limit=0x000fffff, base=0x0000000000000000 GDTR: limit=0x000007ff, base=0x0000000000001000 LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 IDTR: limit=0x000001ff, base=0x0000000000003800 TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 EFER = 0x0000000000000001 PAT = 0x0007040600070406 DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 BndCfgS = 0x0000000000000000 Interruptibility = 00000000 ActivityState = 00000000 *** Host State *** RIP = 0xffffffff811b8bff RSP = 0xffff88003a9d74c8 CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 FSBase=00007f5c6af71700 GSBase=ffff88003ed00000 TRBase=ffff88003ed23100 GDTBase=ffffffffff576000 IDTBase=ffffffffff57b000 CR0=0000000080050033 CR3=000000005c8e6000 CR4=00000000000026e0 Sysenter RSP=0000000000000000 CS:RIP=0010:ffffffff84d460c0 EFER = 0x0000000000000d01 PAT = 0x0007040600070406 *** Control State *** PinBased=0000003f CPUBased=b6a1edfa SecondaryExec=000000e3 EntryControls=0001d1ff ExitControls=00afefff ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000 VMExit: intr_info=00000000 errcode=00000000 ilen=00000002 reason=80000021 qualification=0000000000000000 IDTVectoring: info=00000000 errcode=00000000 TSC Offset = 0xffffffd27d35c894 TPR Threshold = 0x00 EPT pointer = 0x000000003943001e Virtual processor ID = 0x0046 SELinux: unrecognized netlink message: protocol=4 nlmsg_type=30 sclass=netlink_tcpdiag_socket pig=5666 comm=syz-executor2 PF_BRIDGE: RTM_SETLINK with unknown ifindex SELinux: unrecognized netlink message: protocol=4 nlmsg_type=30 sclass=netlink_tcpdiag_socket pig=5666 comm=syz-executor2 PF_BRIDGE: RTM_SETLINK with unknown ifindex netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. sctp: [Deprecated]: syz-executor7 (pid 5750) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 5760) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead audit: type=1326 audit(1505348461.050:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5773 comm="syz-executor6" exe="/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x50000 audit: type=1326 audit(1505348461.050:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5773 comm="syz-executor6" exe="/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x50000 audit: type=1326 audit(1505348461.055:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5773 comm="syz-executor6" exe="/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x50000 audit: type=1326 audit(1505348461.055:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5773 comm="syz-executor6" exe="/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x50000 audit: type=1326 audit(1505348461.055:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5773 comm="syz-executor6" exe="/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x50000 audit: type=1326 audit(1505348461.055:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5773 comm="syz-executor6" exe="/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0x50000 kvm: emulating exchange as write device syz5 entered promiscuous mode device syz5 left promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl ============================= WARNING: suspicious RCU usage 4.13.0-next-20170913+ #3 Tainted: G W ----------------------------- ./include/linux/kvm_host.h:481 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 no locks held by syz-executor7/5951. stack backtrace: CPU: 3 PID: 5951 Comm: syz-executor7 Tainted: G W 4.13.0-next-20170913+ #3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4673 kvm_get_bus include/linux/kvm_host.h:479 [inline] kvm_create_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:678 [inline] kvm_dev_ioctl_create_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:3152 [inline] kvm_dev_ioctl+0x877/0x1840 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3203 vfs_ioctl fs/ioctl.c:45 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:685 SYSC_ioctl fs/ioctl.c:700 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x447299 RSP: 002b:00007f5171fcec08 EFLAGS: 00000296 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 0000000000447299 RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000020 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f5171fcf9c0 R15: 00007f5171fcf700 ============================= WARNING: suspicious RCU usage 4.13.0-next-20170913+ #3 Tainted: G W ----------------------------- ./include/linux/kvm_host.h:575 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 no locks held by syz-executor7/5951. stack backtrace: CPU: 3 PID: 5951 Comm: syz-executor7 Tainted: G W 4.13.0-next-20170913+ #3 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4673 __kvm_memslots include/linux/kvm_host.h:573 [inline] kvm_create_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:680 [inline] kvm_dev_ioctl_create_vm arch/x86/kvm/../../../virt/kvm/kvm_main.c:3152 [inline] kvm_dev_ioctl+0xd21/0x1840 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3203 vfs_ioctl fs/ioctl.c:45 [inline] do_vfs_ioctl+0x1b1/0x1530 fs/ioctl.c:685 SYSC_ioctl fs/ioctl.c:700 [inline] SyS_ioctl+0x8f/0xc0 fs/ioctl.c:691 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x447299 RSP: 002b:00007f5171fcec08 EFLAGS: 00000296 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 0000000000000020 RCX: 0000000000447299 RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000020 RBP: 0000000000000082 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000296 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f5171fcf9c0 R15: 00007f5171fcf700 kauditd_printk_skb: 666 callbacks suppressed audit: type=1326 audit(1505348461.950:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=5925 comm="syz-executor1" exe="/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x447299 code=0xffff0000 netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. device gre0 entered promiscuous mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor0'. mmap: syz-executor4 (6067): VmData 15945728 exceed data ulimit 4. Update limits or use boot option ignore_rlimit_data. device gre0 entered promiscuous mode netlink: 11 bytes leftover after parsing attributes in process `syz-executor0'. QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl