============================= WARNING: suspicious RCU usage 4.16.0-rc6+ #361 Not tainted ----------------------------- ./include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor5/6728: #0: (sk_lock-AF_INET6){+.+.}, at: [<00000000494df69e>] lock_sock include/net/sock.h:1463 [inline] #0: (sk_lock-AF_INET6){+.+.}, at: [<00000000494df69e>] sock_setsockopt+0x16b/0x1b10 net/core/sock.c:717 stack backtrace: CPU: 0 PID: 6728 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #361 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4592 ireq_opt_deref include/net/inet_sock.h:135 [inline] inet_csk_route_req+0x824/0xca0 net/ipv4/inet_connection_sock.c:543 dccp_v4_send_response+0xa7/0x650 net/dccp/ipv4.c:485 dccp_v4_conn_request+0x9ee/0x11b0 net/dccp/ipv4.c:633 dccp_v6_conn_request+0xd30/0x1410 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x574/0x1620 net/dccp/input.c:612 dccp_v4_do_rcv+0xf1/0x160 net/dccp/ipv4.c:682 dccp_v6_do_rcv+0x86a/0xa70 net/dccp/ipv6.c:578 sk_backlog_rcv include/net/sock.h:908 [inline] __release_sock+0x124/0x360 net/core/sock.c:2271 release_sock+0xa4/0x2a0 net/core/sock.c:2786 sock_setsockopt+0x528/0x1b10 net/core/sock.c:1068 SYSC_setsockopt net/socket.c:1845 [inline] SyS_setsockopt+0x2ff/0x360 net/socket.c:1828 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x453e69 RSP: 002b:00007f4f65c7dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f4f65c7e6d4 RCX: 0000000000453e69 RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000014 RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 R10: 0000000020000080 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000000004f4 R14: 00000000006f7780 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.16.0-rc6+ #361 Not tainted ----------------------------- ./include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor5/6728: #0: (sk_lock-AF_INET6){+.+.}, at: [<00000000494df69e>] lock_sock include/net/sock.h:1463 [inline] #0: (sk_lock-AF_INET6){+.+.}, at: [<00000000494df69e>] sock_setsockopt+0x16b/0x1b10 net/core/sock.c:717 stack backtrace: CPU: 0 PID: 6728 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #361 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4592 ireq_opt_deref include/net/inet_sock.h:135 [inline] dccp_v4_send_response+0x4b6/0x650 net/dccp/ipv4.c:496 dccp_v4_conn_request+0x9ee/0x11b0 net/dccp/ipv4.c:633 dccp_v6_conn_request+0xd30/0x1410 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x574/0x1620 net/dccp/input.c:612 dccp_v4_do_rcv+0xf1/0x160 net/dccp/ipv4.c:682 dccp_v6_do_rcv+0x86a/0xa70 net/dccp/ipv6.c:578 sk_backlog_rcv include/net/sock.h:908 [inline] __release_sock+0x124/0x360 net/core/sock.c:2271 release_sock+0xa4/0x2a0 net/core/sock.c:2786 sock_setsockopt+0x528/0x1b10 net/core/sock.c:1068 SYSC_setsockopt net/socket.c:1845 [inline] SyS_setsockopt+0x2ff/0x360 net/socket.c:1828 do_syscall_64+0x281/0x940 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x453e69 RSP: 002b:00007f4f65c7dc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f4f65c7e6d4 RCX: 0000000000453e69 RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000014 RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 R10: 0000000020000080 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000000004f4 R14: 00000000006f7780 R15: 0000000000000000 kauditd_printk_skb: 23 callbacks suppressed audit: type=1400 audit(1521638726.162:45): avc: denied { ioctl } for pid=6833 comm="syz-executor0" path="socket:[18792]" dev="sockfs" ino=18792 ioctlcmd=0x55d1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 QAT: Device 2 not found QAT: Invalid ioctl QAT: Device 2 not found audit: type=1400 audit(1521638726.768:46): avc: denied { map } for pid=6868 comm="syz-executor0" path="/dev/dsp1" dev="devtmpfs" ino=9404 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 audit: type=1400 audit(1521638727.184:47): avc: denied { prog_load } for pid=6971 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 audit: type=1400 audit(1521638727.191:48): avc: denied { net_admin } for pid=4234 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1521638727.210:49): avc: denied { net_raw } for pid=6983 comm="syz-executor4" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1521638727.213:50): avc: denied { dac_override } for pid=6983 comm="syz-executor4" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1521638727.245:51): avc: denied { ipc_owner } for pid=6981 comm="syz-executor7" capability=15 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1521638727.338:52): avc: denied { create } for pid=6999 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 audit: type=1400 audit(1521638727.339:53): avc: denied { net_admin } for pid=4234 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1521638727.364:54): avc: denied { net_raw } for pid=7019 comm="syz-executor1" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2560 sclass=netlink_route_socket pig=7072 comm=syz-executor4 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2560 sclass=netlink_route_socket pig=7072 comm=syz-executor4 syz-executor1 (7105) used greatest stack depth: 13400 bytes left 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 QAT: Invalid ioctl QAT: Invalid ioctl binder: 7569:7573 unknown command -1107235979 binder: 7569:7573 ioctl c0306201 20012000 returned -22 binder: 7569:7592 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 7592 RLIMIT_NICE not set binder: 7569:7603 unknown command -1107235979 binder: 7569:7603 ioctl c0306201 20012000 returned -22 binder: 7569:7603 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 ALSA: seq fatal error: cannot create timer (-22) sg_write: data in/out 978466129/12 bytes for SCSI command 0x0-- guessing data in; program syz-executor2 not setting count and/or reply_len properly sg_write: data in/out 978466129/12 bytes for SCSI command 0x0-- guessing data in; program syz-executor2 not setting count and/or reply_len properly dccp_xmit_packet: Payload too large (65423) for featneg. dccp_close: ABORT with 65423 bytes unread device bridge0 entered promiscuous mode device bridge0 left promiscuous mode mmap: syz-executor0 (7880): VmData 18587648 exceed data ulimit 3. Update limits or use boot option ignore_rlimit_data. device bridge0 entered promiscuous mode kauditd_printk_skb: 75 callbacks suppressed audit: type=1400 audit(1521638731.168:130): avc: denied { ipc_owner } for pid=7911 comm="syz-executor0" capability=15 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 device bridge0 left promiscuous mode audit: type=1400 audit(1521638731.221:131): avc: denied { ipc_lock } for pid=7917 comm="syz-executor1" capability=14 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1521638731.285:132): avc: denied { ipc_owner } for pid=7930 comm="syz-executor3" capability=15 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1521638731.286:133): avc: denied { net_admin } for pid=7930 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1521638731.375:134): avc: denied { prog_load } for pid=7956 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 audit: type=1400 audit(1521638731.759:135): avc: denied { dac_read_search } for pid=4232 comm="syz-executor0" capability=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 audit: type=1400 audit(1521638731.794:136): avc: denied { map } for pid=7979 comm="syz-executor7" path="/dev/ashmem" dev="devtmpfs" ino=9357 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 binder: 7970:7972 Acquire 1 refcount change on invalid ref 0 ret -22 binder: 7970:7972 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 7970:7972 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 7972 RLIMIT_NICE not set binder: 7970:7984 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 audit: type=1400 audit(1521638731.830:137): avc: denied { dac_override } for pid=7967 comm="syz-executor6" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 binder: 7970:7984 BC_DEAD_BINDER_DONE 0000000000000003 not found audit: type=1400 audit(1521638731.836:138): avc: denied { create } for pid=7969 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 binder: 7970:7984 Acquire 1 refcount change on invalid ref 0 ret -22 audit: type=1400 audit(1521638731.962:139): avc: denied { set_context_mgr } for pid=7970 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 binder: 7970:7995 unknown command 536907575 binder: 7970:7997 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 binder: 7997 RLIMIT_NICE not set binder: 7970:8000 BC_DEAD_BINDER_DONE 0000000000000003 not found binder: 7970:7995 ioctl c0306201 20008fd0 returned -22 netlink: 40 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 40 bytes leftover after parsing attributes in process `syz-executor1'. QAT: Invalid ioctl bond0 (unregistering): Released all slaves IPVS: ftp: loaded support on port[0] = 21 IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready 8021q: adding VLAN 0 to HW filter on device bond0 IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready