lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20220413093431.GB15258@xsang-OptiPlex-9020>
Date:   Wed, 13 Apr 2022 17:34:31 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Pablo Neira Ayuso <pablo@...filter.org>
Cc:     LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        lkp@...el.com
Subject: [netfilter]  6069da443b:
 WARNING:at_net/netfilter/core.c:#__nf_unregister_net_hook



Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 6069da443bf65f513bb507bb21e2f87cfb1ad0b6 ("netfilter: nf_tables: unregister flowtable hooks on netns exit")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

in testcase: kernel-selftests
version: kernel-selftests-x86_64-4aeb6e60-1_20220324
with following parameters:

	group: netfilter
	ucode: 0xec

test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel.
test-url: https://www.kernel.org/doc/Documentation/kselftest.txt


on test machine: 8 threads Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz with 28G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[ 187.708652][ T58] WARNING: CPU: 3 PID: 58 at net/netfilter/core.c:494 __nf_unregister_net_hook (net/netfilter/core.c:494 (discriminator 1)) 
[  187.718718][   T58] Modules linked in: ip_vs authenc echainiv esp4 nft_flow_offload nf_flow_table_inet nf_flow_table ebtable_filter ebt_redirect ebt_ip ebtable_broute ebtables nft_ct nf_conntrack_netlink nft_redir nft_masq nft_nat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nft_objref nf_log_syslog nft_log nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nf_tables nfnetlink intel_rapl_msr intel_rapl_common btrfs blake2b_generic xor raid6_pq zstd_compress x86_pkg_temp_thermal intel_powerclamp coretemp libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel sd_mod t10_pi ghash_clmulni_intel sg ipmi_devintf rapl i915 ipmi_msghandler wmi_bmof mei_wdt intel_cstate intel_gtt ttm ahci libahci drm_kms_helper intel_uncore mei_me i2c_i801 syscopyarea libata i2c_smbus mei sysfillrect intel_pch_thermal sysimgblt wmi fb_sys_fops video intel_pmc_core acpi_pad ip_tables
[  187.796315][   T58] CPU: 3 PID: 58 Comm: kworker/u16:7 Not tainted 5.17.0-rc3-00153-g6069da443bf6 #1
[  187.805556][   T58] Hardware name: Dell Inc. OptiPlex 7040/0Y7WYT, BIOS 1.2.8 01/26/2016
[  187.813734][   T58] Workqueue: netns cleanup_net
[ 187.818450][ T58] RIP: 0010:__nf_unregister_net_hook (net/netfilter/core.c:494 (discriminator 1)) 
[ 187.824717][ T58] Code: 10 84 d2 74 0c 4c 89 ef e8 23 78 7a fe 4c 8b 04 24 8b 73 1c 83 fe 05 0f 85 67 fe ff ff 41 bc 90 01 00 00 31 db e9 79 fe ff ff <0f> 0b 48 83 c4 18 48 c7 c7 60 78 e8 85 5b 5d 41 5c 41 5d 41 5e 41
All code
========
   0:	10 84 d2 74 0c 4c 89 	adc    %al,-0x76b3f38c(%rdx,%rdx,8)
   7:	ef                   	out    %eax,(%dx)
   8:	e8 23 78 7a fe       	callq  0xfffffffffe7a7830
   d:	4c 8b 04 24          	mov    (%rsp),%r8
  11:	8b 73 1c             	mov    0x1c(%rbx),%esi
  14:	83 fe 05             	cmp    $0x5,%esi
  17:	0f 85 67 fe ff ff    	jne    0xfffffffffffffe84
  1d:	41 bc 90 01 00 00    	mov    $0x190,%r12d
  23:	31 db                	xor    %ebx,%ebx
  25:	e9 79 fe ff ff       	jmpq   0xfffffffffffffea3
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	48 83 c4 18          	add    $0x18,%rsp
  30:	48 c7 c7 60 78 e8 85 	mov    $0xffffffff85e87860,%rdi
  37:	5b                   	pop    %rbx
  38:	5d                   	pop    %rbp
  39:	41 5c                	pop    %r12
  3b:	41 5d                	pop    %r13
  3d:	41 5e                	pop    %r14
  3f:	41                   	rex.B

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	48 83 c4 18          	add    $0x18,%rsp
   6:	48 c7 c7 60 78 e8 85 	mov    $0xffffffff85e87860,%rdi
   d:	5b                   	pop    %rbx
   e:	5d                   	pop    %rbp
   f:	41 5c                	pop    %r12
  11:	41 5d                	pop    %r13
  13:	41 5e                	pop    %r14
  15:	41                   	rex.B
[  187.844316][   T58] RSP: 0018:ffffc9000048f998 EFLAGS: 00010246
[  187.850334][   T58] RAX: dffffc0000000000 RBX: ffff888107381d98 RCX: 0000000000000001
[  187.858240][   T58] RDX: 1ffff110e5c3e078 RSI: ffffffff85e878c8 RDI: ffff888100d1c228
[  187.866175][   T58] RBP: 0000000000000005 R08: 0000000000000000 R09: fffff52000091f19
[  187.874095][   T58] R10: ffffc9000048f998 R11: fffff52000091f18 R12: ffff888107381d80
[  187.882012][   T58] R13: ffff888107381db4 R14: ffff88815960b300 R15: ffff88872e1f03c0
[  187.889919][   T58] FS:  0000000000000000(0000) GS:ffff888613f80000(0000) knlGS:0000000000000000
[  187.898812][   T58] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  187.905351][   T58] CR2: 00007f6ed785dda4 CR3: 000000075742a004 CR4: 00000000003706e0
[  187.913269][   T58] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  187.921203][   T58] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  187.929121][   T58] Call Trace:
[  187.932333][   T58]  <TASK>
[ 187.935241][ T58] nf_tables_flowtable_event (net/netfilter/nf_tables_api.c:7206 net/netfilter/nf_tables_api.c:7877 net/netfilter/nf_tables_api.c:7901) nf_tables
[ 187.941910][ T58] raw_notifier_call_chain (kernel/notifier.c:89 kernel/notifier.c:392) 
[ 187.947230][ T58] unregister_netdevice_many (net/core/dev.c:10417) 
[ 187.952898][ T58] ? dev_get_mac_address (net/core/dev.c:10362) 
[ 187.958115][ T58] ? unregister_netdevice_queue (include/linux/list.h:69 include/linux/list.h:102 include/linux/list.h:230 net/core/dev.c:10344) 
[ 187.963968][ T58] ? unregister_netdevice_many (net/core/dev.c:10340) 
[ 187.969908][ T58] default_device_exit_batch (net/core/dev.c:10946) 
[ 187.975486][ T58] ? unregister_netdev (net/core/dev.c:10915) 
[ 187.980341][ T58] ? default_device_exit (net/core/dev.c:10853) 
[ 187.985597][ T58] ? lock_is_held_type (kernel/locking/lockdep.c:5380 kernel/locking/lockdep.c:5682) 
[ 187.990556][ T58] ? prepare_to_wait_exclusive (kernel/sched/wait.c:476) 
[ 187.996322][ T58] ? __cond_resched (kernel/sched/core.c:8191) 
[ 188.000915][ T58] ? ops_exit_list+0xb3/0x180 
[ 188.006135][ T58] cleanup_net (net/core/net_namespace.c:596 (discriminator 3)) 
[ 188.010495][ T58] ? unregister_pernet_device (net/core/net_namespace.c:550) 
[ 188.015977][ T58] ? rcu_read_lock_bh_held (kernel/rcu/update.c:120) 
[ 188.021192][ T58] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4232 kernel/locking/lockdep.c:4292 kernel/locking/lockdep.c:4244) 
[ 188.027114][ T58] process_one_work (arch/x86/include/asm/jump_label.h:27 include/linux/jump_label.h:212 include/trace/events/workqueue.h:108 kernel/workqueue.c:2312) 
[ 188.032006][ T58] ? rcu_read_unlock (include/linux/rcupdate.h:723 (discriminator 5)) 
[ 188.036695][ T58] ? pwq_dec_nr_in_flight (kernel/workqueue.c:2202) 
[ 188.042014][ T58] ? rwlock_bug+0xc0/0xc0 
[ 188.046902][ T58] worker_thread (include/linux/list.h:292 kernel/workqueue.c:2455) 
[ 188.051340][ T58] ? process_one_work (kernel/workqueue.c:2397) 
[ 188.056464][ T58] kthread (kernel/kthread.c:377) 
[ 188.060436][ T58] ? kthread_complete_and_exit (kernel/kthread.c:332) 
[ 188.066011][ T58] ret_from_fork (arch/x86/entry/entry_64.S:301) 
[  188.070383][   T58]  </TASK>
[  188.073331][   T58] irq event stamp: 985513
[ 188.077623][ T58] hardirqs last enabled at (985523): __up_console_sem (arch/x86/include/asm/irqflags.h:45 (discriminator 1) arch/x86/include/asm/irqflags.h:80 (discriminator 1) arch/x86/include/asm/irqflags.h:138 (discriminator 1) kernel/printk/printk.c:256 (discriminator 1)) 
[ 188.087098][ T58] hardirqs last disabled at (985532): __up_console_sem (kernel/printk/printk.c:254 (discriminator 1)) 
[ 188.096644][ T58] softirqs last enabled at (984570): __do_softirq (arch/x86/include/asm/preempt.h:27 kernel/softirq.c:402 kernel/softirq.c:587) 
[ 188.105946][ T58] softirqs last disabled at (984513): irq_exit_rcu (kernel/softirq.c:432 kernel/softirq.c:637 kernel/softirq.c:649) 
[  188.115262][   T58] ---[ end trace 0000000000000000 ]---
[  188.187604][   T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready
[  188.224355][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready
[  188.231763][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth02: link becomes ready
[  188.239407][   T19] br0: port 2(veth02) entered blocking state
[  188.245321][   T19] br0: port 2(veth02) entered forwarding state
[  189.169570][   T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready
[  189.329194][ T6193] IPVS: [rr] scheduler registered.
[  190.697254][  T430] # Testing NAT mode...
[  190.697265][  T430]
[  190.856602][   T58] device veth02 left promiscuous mode
[  190.861910][   T58] br0: port 2(veth02) entered disabled state
[  190.877964][   T58] device veth01 left promiscuous mode
[  190.883315][   T58] br0: port 1(veth01) entered disabled state
[  190.938760][ T6223] br0: port 1(veth01) entered blocking state
[  190.944724][ T6223] br0: port 1(veth01) entered disabled state
[  190.951262][ T6223] device veth01 entered promiscuous mode
[  190.972492][ T6224] br0: port 2(veth02) entered blocking state
[  190.978362][ T6224] br0: port 2(veth02) entered disabled state
[  190.984902][ T6224] device veth02 entered promiscuous mode
[  191.005144][ T6225] br0: port 2(veth02) entered blocking state
[  191.011024][ T6225] br0: port 2(veth02) entered forwarding state
[  191.068646][   T60] br0: port 2(veth02) entered disabled state
[  191.074956][   T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth01: link becomes ready
[  191.082293][   T60] br0: port 1(veth01) entered blocking state
[  191.088192][   T60] br0: port 1(veth01) entered forwarding state
[  191.161526][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready
[  191.198407][  T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth02: link becomes ready
[  191.205907][  T264] br0: port 2(veth02) entered blocking state
[  191.211809][  T264] br0: port 2(veth02) entered forwarding state
[  191.793820][  T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready
[  192.334983][ T6250] br0: port 2(veth02) entered disabled state
[  192.342895][ T6250] device veth02 left promiscuous mode
[  192.348687][ T6250] br0: port 2(veth02) entered disabled state
[  193.629974][  T430] # Testing Tunnel mode...
[  193.629986][  T430]
[  193.805713][ T6274] br0: port 1(veth01) entered blocking state
[  193.811608][ T6274] br0: port 1(veth01) entered disabled state
[  193.817886][ T6274] device veth01 entered promiscuous mode
[  193.825629][   T58] device veth01 left promiscuous mode
[  193.830947][   T58] br0: port 1(veth01) entered disabled state
[  193.869056][ T6275] br0: port 2(veth02) entered blocking state
[  193.874952][ T6275] br0: port 2(veth02) entered disabled state
[  193.881243][ T6275] device veth02 entered promiscuous mode
[  193.945131][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth01: link becomes ready
[  193.952434][ T5833] br0: port 1(veth01) entered blocking state
[  193.958378][ T5833] br0: port 1(veth01) entered forwarding state
[  193.964720][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): br0: link becomes ready
[  194.042255][  T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready
[  194.079234][  T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready
[  194.086890][  T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth02: link becomes ready
[  194.094675][  T264] br0: port 2(veth02) entered blocking state
[  194.100559][  T264] br0: port 2(veth02) entered forwarding state
[  194.865769][  T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready
[  194.873120][  T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready
[  196.654751][  T430]
[  196.693193][  T430] ok 7 selftests: netfilter: ipvs.sh
[  196.693206][  T430]
[  196.704226][  T430] # selftests: netfilter: nft_concat_range.sh
[  196.704236][  T430]
[  196.749487][  T430] # TEST: reported issues
[  196.749499][  T430]
[  196.765214][  T430] #   Add two elements, flush, re-add                               Error: concatenated types not supported in interval sets
[  196.765226][  T430]
[  196.781952][  T430] # add table t { set s { type ipv4_addr . inet_service; flags interval; }; }
[  196.781961][  T430]
[  196.793400][  T430] #                   ^


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        sudo bin/lkp install job.yaml           # job file is attached in this email
        bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
        sudo bin/lkp run generated-yaml-file

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://01.org/lkp



View attachment "config-5.17.0-rc3-00153-g6069da443bf6" of type "text/plain" (166026 bytes)

View attachment "job-script" of type "text/plain" (6081 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (32364 bytes)

View attachment "kernel-selftests" of type "text/plain" (22448 bytes)

View attachment "job.yaml" of type "text/plain" (5129 bytes)

View attachment "reproduce" of type "text/plain" (158 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ