ip_tables: iptables: counters copy to user failed while replacing table ============================= WARNING: suspicious RCU usage 4.14.280-syzkaller #0 Not tainted ----------------------------- net/netfilter/nf_queue.c:244 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by syz-executor.5/9538: #0: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x2b9/0xad0 arch/x86/mm/fault.c:1371 #1: (rcu_callback){....}, at: [] __rcu_reclaim kernel/rcu/rcu.h:185 [inline] #1: (rcu_callback){....}, at: [] rcu_do_batch kernel/rcu/tree.c:2699 [inline] #1: (rcu_callback){....}, at: [] invoke_rcu_callbacks kernel/rcu/tree.c:2962 [inline] #1: (rcu_callback){....}, at: [] __rcu_process_callbacks kernel/rcu/tree.c:2929 [inline] #1: (rcu_callback){....}, at: [] rcu_process_callbacks+0x84e/0x1180 kernel/rcu/tree.c:2946 #2: (&(&inst->lock)->rlock){+.-.}, at: [] spin_lock_bh include/linux/spinlock.h:322 [inline] #2: (&(&inst->lock)->rlock){+.-.}, at: [] nfqnl_flush+0x2f/0x2a0 net/netfilter/nfnetlink_queue.c:232 stack backtrace: CPU: 1 PID: 9538 Comm: syz-executor.5 Not tainted 4.14.280-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nf_reinject+0x56e/0x700 net/netfilter/nf_queue.c:244 nfqnl_flush+0x1ab/0x2a0 net/netfilter/nfnetlink_queue.c:237 instance_destroy_rcu+0x19/0x30 net/netfilter/nfnetlink_queue.c:171 __rcu_reclaim kernel/rcu/rcu.h:195 [inline] rcu_do_batch kernel/rcu/tree.c:2699 [inline] invoke_rcu_callbacks kernel/rcu/tree.c:2962 [inline] __rcu_process_callbacks kernel/rcu/tree.c:2929 [inline] rcu_process_callbacks+0x780/0x1180 kernel/rcu/tree.c:2946 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 invoke_softirq kernel/softirq.c:368 [inline] irq_exit+0x193/0x240 kernel/softirq.c:409 exiting_irq arch/x86/include/asm/apic.h:638 [inline] smp_apic_timer_interrupt+0x141/0x5e0 arch/x86/kernel/apic/apic.c:1106 apic_timer_interrupt+0x93/0xa0 arch/x86/entry/entry_64.S:793 RIP: 0010:clear_page_erms+0x9/0x10 arch/x86/lib/clear_page_64.S:51 RSP: 0018:ffff88805825fa48 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 RAX: 0000000000000000 RBX: ffff888000000000 RCX: 0000000000000000 RDX: 1ffff1100b04a67f RSI: 00000000ffffffff RDI: ffff88805886c000 RBP: 000000000000006b R08: 0000000000037b28 R09: 0000000000000008 R10: ffffffffffffffe8 R11: 0000000000000000 R12: ffff8880582521c0 R13: ffffea0001620000 R14: 0000000000000000 R15: dffffc0000000000 clear_page arch/x86/include/asm/page_64.h:45 [inline] clear_user_page arch/x86/include/asm/page.h:28 [inline] clear_user_highpage include/linux/highmem.h:137 [inline] clear_huge_page+0x114/0x7b0 mm/memory.c:4743 __do_huge_pmd_anonymous_page mm/huge_memory.c:574 [inline] do_huge_pmd_anonymous_page+0x93b/0x1700 mm/huge_memory.c:731 create_huge_pmd mm/memory.c:3997 [inline] __handle_mm_fault+0x2ac4/0x4620 mm/memory.c:4200 handle_mm_fault+0x455/0x9c0 mm/memory.c:4266 __do_page_fault+0x549/0xad0 arch/x86/mm/fault.c:1442 page_fault+0x25/0x50 arch/x86/entry/entry_64.S:1123 RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 arch/x86/lib/copy_user_64.S:67 RSP: 0018:ffff88805825fe40 EFLAGS: 00050202 RAX: ffffed100b04bfd4 RBX: 0000000000000008 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffff88805825fe98 RDI: 0000000020000000 RBP: ffff88805825fe98 R08: 0000000400000003 R09: ffffed100b04bfd3 R10: ffff88805825fe9f R11: ffff8880582521c0 R12: 0000000020000000 R13: 00007ffffffff000 R14: 0000000020000008 R15: 0000000000000000 copy_user_generic arch/x86/include/asm/uaccess_64.h:37 [inline] raw_copy_to_user arch/x86/include/asm/uaccess_64.h:112 [inline] _copy_to_user+0xaa/0xd0 lib/usercopy.c:28 copy_to_user include/linux/uaccess.h:155 [inline] SYSC_pipe2 fs/pipe.c:881 [inline] SyS_pipe2+0xe7/0x160 fs/pipe.c:873 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f55661130e9 RSP: 002b:00007f5564a88168 EFLAGS: 00000246 ORIG_RAX: 0000000000000016 RAX: ffffffffffffffda RBX: 00007f5566225f60 RCX: 00007f55661130e9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 RBP: 00007f556616d08d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fff45d6c38f R14: 00007f5564a88300 R15: 0000000000022000 ip_tables: iptables: counters copy to user failed while replacing table mmap: syz-executor.1 (9602) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. audit: type=1800 audit(1653355271.505:2): pid=9688 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=13903 res=0 device lo entered promiscuous mode FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) input: syz0 as /devices/virtual/input/input5 input: syz0 as /devices/virtual/input/input6 input: syz0 as /devices/virtual/input/input7 input: syz0 as /devices/virtual/input/input8 L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. device lo entered promiscuous mode kvm: emulating exchange as write IPVS: ftp: loaded support on port[0] = 21 device bridge1 entered promiscuous mode UBIFS error (pid: 9971): cannot open "ubi0_", error -22 nla_parse: 5 callbacks suppressed netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. audit: type=1800 audit(1653355278.715:3): pid=10166 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 bridge0: port 2(bridge_slave_1) entered disabled state bridge0: port 1(bridge_slave_0) entered disabled state device bridge_slave_1 left promiscuous mode bridge0: port 2(bridge_slave_1) entered disabled state device bridge_slave_0 left promiscuous mode bridge0: port 1(bridge_slave_0) entered disabled state audit: type=1800 audit(1653355279.035:4): pid=10179 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=32768 res=0