============================= WARNING: suspicious RCU usage 4.18.0-rc4+ #138 Not tainted ----------------------------- include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor3/10690: #0: 00000000339f45a9 (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1474 [inline] #0: 00000000339f45a9 (sk_lock-AF_INET6){+.+.}, at: do_ip_setsockopt.isra.12+0x355/0x3e50 net/ipv4/ip_sockglue.c:643 stack backtrace: CPU: 0 PID: 10690 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #138 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c9/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4562 ireq_opt_deref include/net/inet_sock.h:135 [inline] inet_csk_route_req+0x96b/0xdb0 net/ipv4/inet_connection_sock.c:538 dccp_v4_send_response+0xb4/0x6d0 net/dccp/ipv4.c:485 dccp_v4_conn_request+0xc6e/0x1380 net/dccp/ipv4.c:634 dccp_v6_conn_request+0xdb6/0x1660 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x6f7/0x1a30 net/dccp/input.c:612 dccp_v4_do_rcv+0x102/0x180 net/dccp/ipv4.c:683 dccp_v6_do_rcv+0x935/0xb60 net/dccp/ipv6.c:579 sk_backlog_rcv include/net/sock.h:914 [inline] __release_sock+0x12f/0x3a0 net/core/sock.c:2342 release_sock+0xad/0x2c0 net/core/sock.c:2851 do_ip_setsockopt.isra.12+0x5de/0x3e50 net/ipv4/ip_sockglue.c:1185 ip_setsockopt+0x4c/0x140 net/ipv4/ip_sockglue.c:1246 udp_setsockopt+0x62/0xa0 net/ipv4/udp.c:2502 ipv6_setsockopt+0x149/0x170 net/ipv6/ipv6_sockglue.c:917 dccp_setsockopt+0x96/0xf0 net/dccp/proto.c:574 sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:3040 __sys_setsockopt+0x1c5/0x3b0 net/socket.c:1911 __do_sys_setsockopt net/socket.c:1922 [inline] __se_sys_setsockopt net/socket.c:1919 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1919 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455e29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f2430509c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f243050a6d4 RCX: 0000000000455e29 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000016 RBP: 000000000072bea0 R08: 000000000000000c R09: 0000000000000000 R10: 0000000020013ff4 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000004c1b79 R14: 00000000004d2620 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.18.0-rc4+ #138 Not tainted ----------------------------- include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor3/10690: #0: 00000000339f45a9 (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1474 [inline] #0: 00000000339f45a9 (sk_lock-AF_INET6){+.+.}, at: do_ip_setsockopt.isra.12+0x355/0x3e50 net/ipv4/ip_sockglue.c:643 stack backtrace: CPU: 0 PID: 10690 Comm: syz-executor3 Not tainted 4.18.0-rc4+ #138 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c9/0x2b4 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4562 ireq_opt_deref include/net/inet_sock.h:135 [inline] dccp_v4_send_response+0x537/0x6d0 net/dccp/ipv4.c:496 dccp_v4_conn_request+0xc6e/0x1380 net/dccp/ipv4.c:634 dccp_v6_conn_request+0xdb6/0x1660 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x6f7/0x1a30 net/dccp/input.c:612 dccp_v4_do_rcv+0x102/0x180 net/dccp/ipv4.c:683 dccp_v6_do_rcv+0x935/0xb60 net/dccp/ipv6.c:579 sk_backlog_rcv include/net/sock.h:914 [inline] __release_sock+0x12f/0x3a0 net/core/sock.c:2342 release_sock+0xad/0x2c0 net/core/sock.c:2851 do_ip_setsockopt.isra.12+0x5de/0x3e50 net/ipv4/ip_sockglue.c:1185 ip_setsockopt+0x4c/0x140 net/ipv4/ip_sockglue.c:1246 udp_setsockopt+0x62/0xa0 net/ipv4/udp.c:2502 ipv6_setsockopt+0x149/0x170 net/ipv6/ipv6_sockglue.c:917 dccp_setsockopt+0x96/0xf0 net/dccp/proto.c:574 sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:3040 __sys_setsockopt+0x1c5/0x3b0 net/socket.c:1911 __do_sys_setsockopt net/socket.c:1922 [inline] __se_sys_setsockopt net/socket.c:1919 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1919 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455e29 Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f2430509c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f243050a6d4 RCX: 0000000000455e29 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000016 RBP: 000000000072bea0 R08: 000000000000000c R09: 0000000000000000 R10: 0000000020013ff4 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000004c1b79 R14: 00000000004d2620 R15: 0000000000000000 syz-executor5 uses obsolete (PF_INET,SOCK_PACKET) rtc_cmos 00:00: Alarms can be up to one day in the future 9pnet: Insufficient options for proto=fd 9pnet: Insufficient options for proto=fd netlink: 'syz-executor7': attribute type 5 has an invalid length. netlink: 'syz-executor7': attribute type 5 has an invalid length. kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher kernel msg: ebtables bug: please report to author: Wrong nr of counters kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher kernel msg: ebtables bug: please report to author: Wrong nr of counters Unknown ioctl 35100 Unknown ioctl 35100 9pnet: Insufficient options for proto=fd 9pnet: Insufficient options for proto=fd netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 'syz-executor6': attribute type 3 has an invalid length. netlink: 3 bytes leftover after parsing attributes in process `syz-executor6'. QAT: Invalid ioctl netlink: 'syz-executor6': attribute type 3 has an invalid length. netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. IPVS: ftp: loaded support on port[0] = 21 loop: Write error at byte offset 0, length 4096. print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0, logical block 0, lost async page write loop: Write error at byte offset 4096, length 4096. print_req_error: I/O error, dev loop0, sector 8 Buffer I/O error on dev loop0, logical block 1, lost async page write loop: Write error at byte offset 8192, length 4096. print_req_error: I/O error, dev loop0, sector 16 Buffer I/O error on dev loop0, logical block 2, lost async page write loop: Write error at byte offset 12288, length 4096. print_req_error: I/O error, dev loop0, sector 24 Buffer I/O error on dev loop0, logical block 3, lost async page write loop: Write error at byte offset 16384, length 4096. print_req_error: I/O error, dev loop0, sector 32 Buffer I/O error on dev loop0, logical block 4, lost async page write loop: Write error at byte offset 20480, length 4096. print_req_error: I/O error, dev loop0, sector 40 Buffer I/O error on dev loop0, logical block 5, lost async page write loop: Write error at byte offset 24576, length 4096. print_req_error: I/O error, dev loop0, sector 48 Buffer I/O error on dev loop0, logical block 6, lost async page write loop: Write error at byte offset 28672, length 4096. print_req_error: I/O error, dev loop0, sector 56 Buffer I/O error on dev loop0, logical block 7, lost async page write loop: Write error at byte offset 32768, length 4096. print_req_error: I/O error, dev loop0, sector 64 Buffer I/O error on dev loop0, logical block 8, lost async page write loop: Write error at byte offset 36864, length 4096. print_req_error: I/O error, dev loop0, sector 72 Buffer I/O error on dev loop0, logical block 9, lost async page write TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters.