kernel msg: ebtables bug: please report to author: entries_size too small kernel msg: ebtables bug: please report to author: entries_size too small ============================= WARNING: suspicious RCU usage 4.16.0+ #1 Not tainted ----------------------------- ./include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor5/10110: #0: 00000000a81d9998 (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1469 [inline] #0: 00000000a81d9998 (sk_lock-AF_INET6){+.+.}, at: inet_csk_wait_for_connect net/ipv4/inet_connection_sock.c:409 [inline] #0: 00000000a81d9998 (sk_lock-AF_INET6){+.+.}, at: inet_csk_accept+0x534/0xe50 net/ipv4/inet_connection_sock.c:456 stack backtrace: CPU: 1 PID: 10110 Comm: syz-executor5 Not tainted 4.16.0+ #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592 ireq_opt_deref include/net/inet_sock.h:135 [inline] inet_csk_route_req+0x957/0xda0 net/ipv4/inet_connection_sock.c:543 dccp_v4_send_response+0xac/0x6c0 net/dccp/ipv4.c:485 dccp_v4_conn_request+0xc66/0x1360 net/dccp/ipv4.c:634 dccp_v6_conn_request+0xda3/0x1640 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x6de/0x1a0e net/dccp/input.c:612 dccp_v4_do_rcv+0x102/0x180 net/dccp/ipv4.c:683 dccp_v6_do_rcv+0x935/0xb60 net/dccp/ipv6.c:579 sk_backlog_rcv include/net/sock.h:909 [inline] __release_sock+0x12f/0x3a0 net/core/sock.c:2335 release_sock+0xa4/0x2b0 net/core/sock.c:2850 inet_csk_accept+0x717/0xe50 net/ipv4/inet_connection_sock.c:479 inet_accept+0x130/0x9e0 net/ipv4/af_inet.c:734 __sys_accept4+0x3b2/0x8a0 net/socket.c:1591 SYSC_accept net/socket.c:1632 [inline] SyS_accept+0x26/0x30 net/socket.c:1629 do_syscall_64+0x29e/0x9d0 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x455319 RSP: 002b:00007ff18b177c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002b RAX: ffffffffffffffda RBX: 00007ff18b1786d4 RCX: 0000000000455319 RDX: 0000000020001300 RSI: 00000000200012c0 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000004 R14: 00000000006f3100 R15: 0000000000000000 ============================= WARNING: suspicious RCU usage 4.16.0+ #1 Not tainted ----------------------------- ./include/net/inet_sock.h:136 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor5/10110: #0: 00000000a81d9998 (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1469 [inline] #0: 00000000a81d9998 (sk_lock-AF_INET6){+.+.}, at: inet_csk_wait_for_connect net/ipv4/inet_connection_sock.c:409 [inline] #0: 00000000a81d9998 (sk_lock-AF_INET6){+.+.}, at: inet_csk_accept+0x534/0xe50 net/ipv4/inet_connection_sock.c:456 stack backtrace: CPU: 1 PID: 10110 Comm: syz-executor5 Not tainted 4.16.0+ #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592 ireq_opt_deref include/net/inet_sock.h:135 [inline] dccp_v4_send_response+0x526/0x6c0 net/dccp/ipv4.c:496 dccp_v4_conn_request+0xc66/0x1360 net/dccp/ipv4.c:634 dccp_v6_conn_request+0xda3/0x1640 net/dccp/ipv6.c:317 dccp_rcv_state_process+0x6de/0x1a0e net/dccp/input.c:612 dccp_v4_do_rcv+0x102/0x180 net/dccp/ipv4.c:683 dccp_v6_do_rcv+0x935/0xb60 net/dccp/ipv6.c:579 sk_backlog_rcv include/net/sock.h:909 [inline] __release_sock+0x12f/0x3a0 net/core/sock.c:2335 release_sock+0xa4/0x2b0 net/core/sock.c:2850 inet_csk_accept+0x717/0xe50 net/ipv4/inet_connection_sock.c:479 inet_accept+0x130/0x9e0 net/ipv4/af_inet.c:734 __sys_accept4+0x3b2/0x8a0 net/socket.c:1591 SYSC_accept net/socket.c:1632 [inline] SyS_accept+0x26/0x30 net/socket.c:1629 do_syscall_64+0x29e/0x9d0 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x455319 RSP: 002b:00007ff18b177c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002b RAX: ffffffffffffffda RBX: 00007ff18b1786d4 RCX: 0000000000455319 RDX: 0000000020001300 RSI: 00000000200012c0 RDI: 0000000000000013 RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 0000000000000004 R14: 00000000006f3100 R15: 0000000000000000 kernel msg: ebtables bug: please report to author: counter_offset != totalcnt kernel msg: ebtables bug: please report to author: bad policy kernel msg: ebtables bug: please report to author: counter_offset != totalcnt kernel msg: ebtables bug: please report to author: bad policy bond0 (unregistering): Releasing backup interface bond_slave_0 bond0 (unregistering): Releasing backup interface bond_slave_1 bond0 (unregistering): Released all slaves sctp: [Deprecated]: syz-executor1 (pid 10466) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor1 (pid 10487) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead IPVS: Unknown mcast interface: vlan0 IPVS: Unknown mcast interface: vlan0 syz-executor1 (10500) used greatest stack depth: 12040 bytes left bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 bond0: lo ether type (772) is different from other slaves (1), can not enslave it bond0: enslaved VLAN challenged slave lo. Adding VLANs will be blocked as long as lo is part of bond bond0 bond0: lo ether type (772) is different from other slaves (1), can not enslave it kernel msg: ebtables bug: please report to author: bad policy kernel msg: ebtables bug: please report to author: bad policy IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0 IPVS: set_ctl: invalid protocol: 0 0.0.0.0:0