IPVS: set_ctl: invalid protocol: 0 172.20.20.187:20004 lblcr ============================= WARNING: suspicious RCU usage 4.17.0-rc1+ #12 Not tainted ----------------------------- net/ipv6/route.c:410 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 1 lock held by syz-executor5/15277: #0: 00000000f99f4b21 (sk_lock-AF_INET6){+.+.}, at: lock_sock include/net/sock.h:1469 [inline] #0: 00000000f99f4b21 (sk_lock-AF_INET6){+.+.}, at: sock_setsockopt+0x19c/0x1fe0 net/core/sock.c:717 stack backtrace: CPU: 1 PID: 15277 Comm: syz-executor5 Not tainted 4.17.0-rc1+ #12 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 lockdep_rcu_suspicious+0x14a/0x153 kernel/locking/lockdep.c:4592 rt6_check_expired+0x38b/0x3e0 net/ipv6/route.c:410 ip6_negative_advice+0x67/0xc0 net/ipv6/route.c:2204 dst_negative_advice include/net/sock.h:1786 [inline] sock_setsockopt+0x138f/0x1fe0 net/core/sock.c:1051 IPVS: set_ctl: invalid protocol: 0 172.20.20.187:20004 lblcr __sys_setsockopt+0x2df/0x390 net/socket.c:1899 __do_sys_setsockopt net/socket.c:1914 [inline] __se_sys_setsockopt net/socket.c:1911 [inline] __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1911 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x455389 RSP: 002b:00007f7904731c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f79047326d4 RCX: 0000000000455389 RDX: 0000000000000035 RSI: 0000000000000001 RDI: 0000000000000013 RBP: 000000000072bf58 R08: 0000000000000004 R09: 0000000000000000 R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000000005ff R14: 00000000006fc088 R15: 0000000000000001 rdma_op 00000000b1cd1ba7 conn xmit_rdma (null) netlink: 28 bytes leftover after parsing attributes in process `syz-executor6'. IPVS: length: 70 != 8 netlink: 28 bytes leftover after parsing attributes in process `syz-executor6'. IPVS: length: 70 != 8 kernel msg: ebtables bug: please report to author: NOPROTO & 802_3 not allowed