ip_tables: iptables: counters copy to user failed while replacing table IPVS: ftp: loaded support on port[0] = 21 ============================= WARNING: suspicious RCU usage 4.14.280-syzkaller #0 Not tainted ----------------------------- net/netfilter/nf_queue.c:244 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 2 locks held by syz-executor.2/9675: #0: (rcu_callback){....}, at: [] __rcu_reclaim kernel/rcu/rcu.h:185 [inline] #0: (rcu_callback){....}, at: [] rcu_do_batch kernel/rcu/tree.c:2699 [inline] #0: (rcu_callback){....}, at: [] invoke_rcu_callbacks kernel/rcu/tree.c:2962 [inline] #0: (rcu_callback){....}, at: [] __rcu_process_callbacks kernel/rcu/tree.c:2929 [inline] #0: (rcu_callback){....}, at: [] rcu_process_callbacks+0x84e/0x1180 kernel/rcu/tree.c:2946 #1: (&(&inst->lock)->rlock){+.-.}, at: [] spin_lock_bh include/linux/spinlock.h:322 [inline] #1: (&(&inst->lock)->rlock){+.-.}, at: [] nfqnl_flush+0x2f/0x2a0 net/netfilter/nfnetlink_queue.c:232 stack backtrace: CPU: 1 PID: 9675 Comm: syz-executor.2 Not tainted 4.14.280-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nf_reinject+0x56e/0x700 net/netfilter/nf_queue.c:244 nfqnl_flush+0x1ab/0x2a0 net/netfilter/nfnetlink_queue.c:237 instance_destroy_rcu+0x19/0x30 net/netfilter/nfnetlink_queue.c:171 __rcu_reclaim kernel/rcu/rcu.h:195 [inline] rcu_do_batch kernel/rcu/tree.c:2699 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2962 [inline] __rcu_process_callbacks kernel/rcu/tree.c:2929 [inline] rcu_process_callbacks+0x780/0x1180 kernel/rcu/tree.c:2946 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 invoke_softirq kernel/softirq.c:368 [inline] irq_exit+0x193/0x240 kernel/softirq.c:409 exiting_irq arch/x86/include/asm/apic.h:638 [inline] smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 RIP: 0010:__raw_callee_save___pv_queued_spin_unlock+0x0/0x12 RSP: 0018:ffff888070e3fb40 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff10 RAX: 1ffffffff11e1329 RBX: ffffc90000c6d2a8 RCX: 1ffff1100e1c6539 RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffffc90000c6d288 RBP: ffffc90000c6d288 R08: ffff8880ba530c00 R09: 0000000000000000 R10: ffff888070e3f998 R11: ffff888070e32140 R12: ffffc90000c6d290 R13: ffffc90000c6d298 R14: ffffc90000c6d2c0 R15: 0000000000000001 pv_queued_spin_unlock arch/x86/include/asm/paravirt.h:674 [inline] queued_spin_unlock arch/x86/include/asm/qspinlock.h:57 [inline] do_raw_spin_unlock+0x164/0x220 kernel/locking/spinlock_debug.c:135 __raw_spin_unlock include/linux/spinlock_api_smp.h:151 [inline] _raw_spin_unlock+0x1f/0x40 kernel/locking/spinlock.c:184 spin_unlock include/linux/spinlock.h:357 [inline] futex_wake+0x31e/0x3c0 kernel/futex.c:1723 do_futex+0x235/0x1570 kernel/futex.c:3910 SYSC_futex kernel/futex.c:3966 [inline] SyS_futex+0x1da/0x290 kernel/futex.c:3934 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f1a0dc600e9 RSP: 002b:00007f1a0c5d5218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: ffffffffffffffda RBX: 00007f1a0dd72f68 RCX: 00007f1a0dc600e9 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f1a0dd72f6c RBP: 00007f1a0dd72f60 R08: 00000014cd4aab32 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f1a0dd72f6c R13: 00007ffd44c355ff R14: 00007f1a0c5d5300 R15: 0000000000022000 netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. ip_tables: iptables: counters copy to user failed while replacing table netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. ip_tables: iptables: counters copy to user failed while replacing table netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. ip_tables: iptables: counters copy to user failed while replacing table netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. ip_tables: iptables: counters copy to user failed while replacing table netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. ip_tables: iptables: counters copy to user failed while replacing table netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. kvm: emulating exchange as write A link change request failed with some changes committed already. Interface ip6tnl0 may have been left with an inconsistent configuration, please check. IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready A link change request failed with some changes committed already. Interface bond_slave_0 may have been left with an inconsistent configuration, please check. IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. ********************************************************** IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready ** ** IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. **