[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20220413093431.GB15258@xsang-OptiPlex-9020>
Date: Wed, 13 Apr 2022 17:34:31 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Pablo Neira Ayuso <pablo@...filter.org>
Cc: LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
lkp@...el.com
Subject: [netfilter] 6069da443b:
WARNING:at_net/netfilter/core.c:#__nf_unregister_net_hook
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 6069da443bf65f513bb507bb21e2f87cfb1ad0b6 ("netfilter: nf_tables: unregister flowtable hooks on netns exit")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
in testcase: kernel-selftests
version: kernel-selftests-x86_64-4aeb6e60-1_20220324
with following parameters:
group: netfilter
ucode: 0xec
test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel.
test-url: https://www.kernel.org/doc/Documentation/kselftest.txt
on test machine: 8 threads Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz with 28G memory
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>
[ 187.708652][ T58] WARNING: CPU: 3 PID: 58 at net/netfilter/core.c:494 __nf_unregister_net_hook (net/netfilter/core.c:494 (discriminator 1))
[ 187.718718][ T58] Modules linked in: ip_vs authenc echainiv esp4 nft_flow_offload nf_flow_table_inet nf_flow_table ebtable_filter ebt_redirect ebt_ip ebtable_broute ebtables nft_ct nf_conntrack_netlink nft_redir nft_masq nft_nat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nft_objref nf_log_syslog nft_log nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nf_tables nfnetlink intel_rapl_msr intel_rapl_common btrfs blake2b_generic xor raid6_pq zstd_compress x86_pkg_temp_thermal intel_powerclamp coretemp libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel sd_mod t10_pi ghash_clmulni_intel sg ipmi_devintf rapl i915 ipmi_msghandler wmi_bmof mei_wdt intel_cstate intel_gtt ttm ahci libahci drm_kms_helper intel_uncore mei_me i2c_i801 syscopyarea libata i2c_smbus mei sysfillrect intel_pch_thermal sysimgblt wmi fb_sys_fops video intel_pmc_core acpi_pad ip_tables
[ 187.796315][ T58] CPU: 3 PID: 58 Comm: kworker/u16:7 Not tainted 5.17.0-rc3-00153-g6069da443bf6 #1
[ 187.805556][ T58] Hardware name: Dell Inc. OptiPlex 7040/0Y7WYT, BIOS 1.2.8 01/26/2016
[ 187.813734][ T58] Workqueue: netns cleanup_net
[ 187.818450][ T58] RIP: 0010:__nf_unregister_net_hook (net/netfilter/core.c:494 (discriminator 1))
[ 187.824717][ T58] Code: 10 84 d2 74 0c 4c 89 ef e8 23 78 7a fe 4c 8b 04 24 8b 73 1c 83 fe 05 0f 85 67 fe ff ff 41 bc 90 01 00 00 31 db e9 79 fe ff ff <0f> 0b 48 83 c4 18 48 c7 c7 60 78 e8 85 5b 5d 41 5c 41 5d 41 5e 41
All code
========
0: 10 84 d2 74 0c 4c 89 adc %al,-0x76b3f38c(%rdx,%rdx,8)
7: ef out %eax,(%dx)
8: e8 23 78 7a fe callq 0xfffffffffe7a7830
d: 4c 8b 04 24 mov (%rsp),%r8
11: 8b 73 1c mov 0x1c(%rbx),%esi
14: 83 fe 05 cmp $0x5,%esi
17: 0f 85 67 fe ff ff jne 0xfffffffffffffe84
1d: 41 bc 90 01 00 00 mov $0x190,%r12d
23: 31 db xor %ebx,%ebx
25: e9 79 fe ff ff jmpq 0xfffffffffffffea3
2a:* 0f 0b ud2 <-- trapping instruction
2c: 48 83 c4 18 add $0x18,%rsp
30: 48 c7 c7 60 78 e8 85 mov $0xffffffff85e87860,%rdi
37: 5b pop %rbx
38: 5d pop %rbp
39: 41 5c pop %r12
3b: 41 5d pop %r13
3d: 41 5e pop %r14
3f: 41 rex.B
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 48 83 c4 18 add $0x18,%rsp
6: 48 c7 c7 60 78 e8 85 mov $0xffffffff85e87860,%rdi
d: 5b pop %rbx
e: 5d pop %rbp
f: 41 5c pop %r12
11: 41 5d pop %r13
13: 41 5e pop %r14
15: 41 rex.B
[ 187.844316][ T58] RSP: 0018:ffffc9000048f998 EFLAGS: 00010246
[ 187.850334][ T58] RAX: dffffc0000000000 RBX: ffff888107381d98 RCX: 0000000000000001
[ 187.858240][ T58] RDX: 1ffff110e5c3e078 RSI: ffffffff85e878c8 RDI: ffff888100d1c228
[ 187.866175][ T58] RBP: 0000000000000005 R08: 0000000000000000 R09: fffff52000091f19
[ 187.874095][ T58] R10: ffffc9000048f998 R11: fffff52000091f18 R12: ffff888107381d80
[ 187.882012][ T58] R13: ffff888107381db4 R14: ffff88815960b300 R15: ffff88872e1f03c0
[ 187.889919][ T58] FS: 0000000000000000(0000) GS:ffff888613f80000(0000) knlGS:0000000000000000
[ 187.898812][ T58] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 187.905351][ T58] CR2: 00007f6ed785dda4 CR3: 000000075742a004 CR4: 00000000003706e0
[ 187.913269][ T58] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 187.921203][ T58] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 187.929121][ T58] Call Trace:
[ 187.932333][ T58] <TASK>
[ 187.935241][ T58] nf_tables_flowtable_event (net/netfilter/nf_tables_api.c:7206 net/netfilter/nf_tables_api.c:7877 net/netfilter/nf_tables_api.c:7901) nf_tables
[ 187.941910][ T58] raw_notifier_call_chain (kernel/notifier.c:89 kernel/notifier.c:392)
[ 187.947230][ T58] unregister_netdevice_many (net/core/dev.c:10417)
[ 187.952898][ T58] ? dev_get_mac_address (net/core/dev.c:10362)
[ 187.958115][ T58] ? unregister_netdevice_queue (include/linux/list.h:69 include/linux/list.h:102 include/linux/list.h:230 net/core/dev.c:10344)
[ 187.963968][ T58] ? unregister_netdevice_many (net/core/dev.c:10340)
[ 187.969908][ T58] default_device_exit_batch (net/core/dev.c:10946)
[ 187.975486][ T58] ? unregister_netdev (net/core/dev.c:10915)
[ 187.980341][ T58] ? default_device_exit (net/core/dev.c:10853)
[ 187.985597][ T58] ? lock_is_held_type (kernel/locking/lockdep.c:5380 kernel/locking/lockdep.c:5682)
[ 187.990556][ T58] ? prepare_to_wait_exclusive (kernel/sched/wait.c:476)
[ 187.996322][ T58] ? __cond_resched (kernel/sched/core.c:8191)
[ 188.000915][ T58] ? ops_exit_list+0xb3/0x180
[ 188.006135][ T58] cleanup_net (net/core/net_namespace.c:596 (discriminator 3))
[ 188.010495][ T58] ? unregister_pernet_device (net/core/net_namespace.c:550)
[ 188.015977][ T58] ? rcu_read_lock_bh_held (kernel/rcu/update.c:120)
[ 188.021192][ T58] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4232 kernel/locking/lockdep.c:4292 kernel/locking/lockdep.c:4244)
[ 188.027114][ T58] process_one_work (arch/x86/include/asm/jump_label.h:27 include/linux/jump_label.h:212 include/trace/events/workqueue.h:108 kernel/workqueue.c:2312)
[ 188.032006][ T58] ? rcu_read_unlock (include/linux/rcupdate.h:723 (discriminator 5))
[ 188.036695][ T58] ? pwq_dec_nr_in_flight (kernel/workqueue.c:2202)
[ 188.042014][ T58] ? rwlock_bug+0xc0/0xc0
[ 188.046902][ T58] worker_thread (include/linux/list.h:292 kernel/workqueue.c:2455)
[ 188.051340][ T58] ? process_one_work (kernel/workqueue.c:2397)
[ 188.056464][ T58] kthread (kernel/kthread.c:377)
[ 188.060436][ T58] ? kthread_complete_and_exit (kernel/kthread.c:332)
[ 188.066011][ T58] ret_from_fork (arch/x86/entry/entry_64.S:301)
[ 188.070383][ T58] </TASK>
[ 188.073331][ T58] irq event stamp: 985513
[ 188.077623][ T58] hardirqs last enabled at (985523): __up_console_sem (arch/x86/include/asm/irqflags.h:45 (discriminator 1) arch/x86/include/asm/irqflags.h:80 (discriminator 1) arch/x86/include/asm/irqflags.h:138 (discriminator 1) kernel/printk/printk.c:256 (discriminator 1))
[ 188.087098][ T58] hardirqs last disabled at (985532): __up_console_sem (kernel/printk/printk.c:254 (discriminator 1))
[ 188.096644][ T58] softirqs last enabled at (984570): __do_softirq (arch/x86/include/asm/preempt.h:27 kernel/softirq.c:402 kernel/softirq.c:587)
[ 188.105946][ T58] softirqs last disabled at (984513): irq_exit_rcu (kernel/softirq.c:432 kernel/softirq.c:637 kernel/softirq.c:649)
[ 188.115262][ T58] ---[ end trace 0000000000000000 ]---
[ 188.187604][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready
[ 188.224355][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready
[ 188.231763][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth02: link becomes ready
[ 188.239407][ T19] br0: port 2(veth02) entered blocking state
[ 188.245321][ T19] br0: port 2(veth02) entered forwarding state
[ 189.169570][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready
[ 189.329194][ T6193] IPVS: [rr] scheduler registered.
[ 190.697254][ T430] # Testing NAT mode...
[ 190.697265][ T430]
[ 190.856602][ T58] device veth02 left promiscuous mode
[ 190.861910][ T58] br0: port 2(veth02) entered disabled state
[ 190.877964][ T58] device veth01 left promiscuous mode
[ 190.883315][ T58] br0: port 1(veth01) entered disabled state
[ 190.938760][ T6223] br0: port 1(veth01) entered blocking state
[ 190.944724][ T6223] br0: port 1(veth01) entered disabled state
[ 190.951262][ T6223] device veth01 entered promiscuous mode
[ 190.972492][ T6224] br0: port 2(veth02) entered blocking state
[ 190.978362][ T6224] br0: port 2(veth02) entered disabled state
[ 190.984902][ T6224] device veth02 entered promiscuous mode
[ 191.005144][ T6225] br0: port 2(veth02) entered blocking state
[ 191.011024][ T6225] br0: port 2(veth02) entered forwarding state
[ 191.068646][ T60] br0: port 2(veth02) entered disabled state
[ 191.074956][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth01: link becomes ready
[ 191.082293][ T60] br0: port 1(veth01) entered blocking state
[ 191.088192][ T60] br0: port 1(veth01) entered forwarding state
[ 191.161526][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready
[ 191.198407][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth02: link becomes ready
[ 191.205907][ T264] br0: port 2(veth02) entered blocking state
[ 191.211809][ T264] br0: port 2(veth02) entered forwarding state
[ 191.793820][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready
[ 192.334983][ T6250] br0: port 2(veth02) entered disabled state
[ 192.342895][ T6250] device veth02 left promiscuous mode
[ 192.348687][ T6250] br0: port 2(veth02) entered disabled state
[ 193.629974][ T430] # Testing Tunnel mode...
[ 193.629986][ T430]
[ 193.805713][ T6274] br0: port 1(veth01) entered blocking state
[ 193.811608][ T6274] br0: port 1(veth01) entered disabled state
[ 193.817886][ T6274] device veth01 entered promiscuous mode
[ 193.825629][ T58] device veth01 left promiscuous mode
[ 193.830947][ T58] br0: port 1(veth01) entered disabled state
[ 193.869056][ T6275] br0: port 2(veth02) entered blocking state
[ 193.874952][ T6275] br0: port 2(veth02) entered disabled state
[ 193.881243][ T6275] device veth02 entered promiscuous mode
[ 193.945131][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth01: link becomes ready
[ 193.952434][ T5833] br0: port 1(veth01) entered blocking state
[ 193.958378][ T5833] br0: port 1(veth01) entered forwarding state
[ 193.964720][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): br0: link becomes ready
[ 194.042255][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready
[ 194.079234][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready
[ 194.086890][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth02: link becomes ready
[ 194.094675][ T264] br0: port 2(veth02) entered blocking state
[ 194.100559][ T264] br0: port 2(veth02) entered forwarding state
[ 194.865769][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready
[ 194.873120][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready
[ 196.654751][ T430]
[ 196.693193][ T430] ok 7 selftests: netfilter: ipvs.sh
[ 196.693206][ T430]
[ 196.704226][ T430] # selftests: netfilter: nft_concat_range.sh
[ 196.704236][ T430]
[ 196.749487][ T430] # TEST: reported issues
[ 196.749499][ T430]
[ 196.765214][ T430] # Add two elements, flush, re-add Error: concatenated types not supported in interval sets
[ 196.765226][ T430]
[ 196.781952][ T430] # add table t { set s { type ipv4_addr . inet_service; flags interval; }; }
[ 196.781961][ T430]
[ 196.793400][ T430] # ^
To reproduce:
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
sudo bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
sudo bin/lkp run generated-yaml-file
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
--
0-DAY CI Kernel Test Service
https://01.org/lkp
View attachment "config-5.17.0-rc3-00153-g6069da443bf6" of type "text/plain" (166026 bytes)
View attachment "job-script" of type "text/plain" (6081 bytes)
Download attachment "dmesg.xz" of type "application/x-xz" (32364 bytes)
View attachment "kernel-selftests" of type "text/plain" (22448 bytes)
View attachment "job.yaml" of type "text/plain" (5129 bytes)
View attachment "reproduce" of type "text/plain" (158 bytes)
Powered by blists - more mailing lists