[Bug 1162] New: oops in nft_rbtree_insert

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Wed Jul 12 12:54:49 CEST 2017


https://bugzilla.netfilter.org/show_bug.cgi?id=1162

            Bug ID: 1162
           Summary: oops in nft_rbtree_insert
           Product: nftables
           Version: unspecified
          Hardware: x86_64
                OS: Debian GNU/Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: kernel
          Assignee: pablo at netfilter.org
          Reporter: arturo at debian.org

Created attachment 503
  --> https://bugzilla.netfilter.org/attachment.cgi?id=503&action=edit
dmesg oops

Some oops happens in nft_rbtree_insert. Steps to reproduce:

% nft add table t

% cat file
flush set t s3
add element t s3 {10.0.0.0-255.255.255.255}

% nft add set t s3 {type ipv4_addr \; flags interval \; }

% nft flush set t s3 

% nft add element t s3 {10.0.0.0-255.255.255.255}

% nft flush set t s3

% nft add element t s3 {10.0.0.0-255.255.255.255}

% nft flush set t s3

% nft add element t s3 {10.0.0.0-255.255.255.255}

% nft -f file
[oops]


Code is:
kernel    04ba724 [PATCH] netfilter: nfnetlink: extended ACK reporting    
nft    5de112c [PATCH] include: Remove datatype_register()


[Wed Jul 12 12:47:45 2017] INFO: rcu_sched self-detected stall on CPU
[Wed Jul 12 12:47:45 2017]     0-...: (5249 ticks this GP)
idle=dca/140000000000001/0 softirq=2845/2845 fqs=2623 
[Wed Jul 12 12:47:45 2017]      (t=5251 jiffies g=1649 c=1648 q=99)
[Wed Jul 12 12:47:45 2017] NMI backtrace for cpu 0
[Wed Jul 12 12:47:45 2017] CPU: 0 PID: 1489 Comm: nft Not tainted 4.12.0-rc2+
#86
[Wed Jul 12 12:47:45 2017] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[Wed Jul 12 12:47:45 2017] Call Trace:
[Wed Jul 12 12:47:45 2017]  <IRQ>
[Wed Jul 12 12:47:45 2017]  ? dump_stack+0x5c/0x7a
[Wed Jul 12 12:47:45 2017]  ? nmi_cpu_backtrace+0x89/0x90
[Wed Jul 12 12:47:45 2017]  ? irq_force_complete_move+0x130/0x130
[Wed Jul 12 12:47:45 2017]  ? nmi_trigger_cpumask_backtrace+0xf4/0x120
[Wed Jul 12 12:47:45 2017]  ? rcu_dump_cpu_stacks+0x99/0xd0
[Wed Jul 12 12:47:45 2017]  ? rcu_check_callbacks+0x7a6/0x8f0
[Wed Jul 12 12:47:45 2017]  ? tick_sched_do_timer+0x40/0x40
[Wed Jul 12 12:47:45 2017]  ? update_process_times+0x28/0x50
[Wed Jul 12 12:47:45 2017]  ? tick_sched_handle.isra.15+0x20/0x50
[Wed Jul 12 12:47:45 2017]  ? tick_sched_timer+0x38/0x70
[Wed Jul 12 12:47:45 2017]  ? __hrtimer_run_queues+0xc6/0x1f0
[Wed Jul 12 12:47:45 2017]  ? hrtimer_interrupt+0xa6/0x1f0
[Wed Jul 12 12:47:45 2017]  ? smp_apic_timer_interrupt+0x34/0x50
[Wed Jul 12 12:47:45 2017]  ? apic_timer_interrupt+0x82/0x90
[Wed Jul 12 12:47:45 2017]  </IRQ>
[Wed Jul 12 12:47:45 2017]  ? memcmp+0xb/0x40
[Wed Jul 12 12:47:45 2017]  ? nft_rbtree_insert+0xa6/0x163 [nft_set_rbtree]
[Wed Jul 12 12:47:45 2017]  ? nft_add_set_elem+0x50c/0x910 [nf_tables]
[Wed Jul 12 12:47:45 2017]  ? nf_tables_fill_setelem.isra.42+0x13b/0x260
[nf_tables]
[Wed Jul 12 12:47:45 2017]  ? __kmalloc_reserve.isra.38+0x2e/0x80
[Wed Jul 12 12:47:45 2017]  ? __kmalloc+0xe1/0x570
[Wed Jul 12 12:47:45 2017]  ? __update_load_avg_se.isra.35+0x155/0x170
[Wed Jul 12 12:47:45 2017]  ? __update_load_avg_se.isra.35+0x155/0x170
[Wed Jul 12 12:47:45 2017]  ? nft_trans_alloc_gfp+0x1c/0x60 [nf_tables]
[Wed Jul 12 12:47:45 2017]  ? nf_tables_newsetelem+0xc9/0x190 [nf_tables]
[Wed Jul 12 12:47:45 2017]  ? nf_tables_newsetelem+0xc9/0x190 [nf_tables]
[Wed Jul 12 12:47:45 2017]  ? nfnetlink_rcv+0x497/0x700
[Wed Jul 12 12:47:45 2017]  ? nfnetlink_rcv+0x2c0/0x700
[Wed Jul 12 12:47:45 2017]  ? netlink_unicast+0x160/0x200
[Wed Jul 12 12:47:45 2017]  ? netlink_sendmsg+0x28f/0x380
[Wed Jul 12 12:47:45 2017]  ? sock_sendmsg+0x30/0x40
[Wed Jul 12 12:47:45 2017]  ? ___sys_sendmsg+0x2c5/0x2e0
[Wed Jul 12 12:47:45 2017]  ? filemap_map_pages+0x2fb/0x300
[Wed Jul 12 12:47:45 2017]  ? pagevec_lru_move_fn+0xc3/0xe0
[Wed Jul 12 12:47:45 2017]  ? security_capable+0x41/0x60
[Wed Jul 12 12:47:45 2017]  ? __sys_sendmsg+0x41/0x70
[Wed Jul 12 12:47:45 2017]  ? __sys_sendmsg+0x41/0x70
[Wed Jul 12 12:47:45 2017]  ? entry_SYSCALL_64_fastpath+0x1e/0xa9

Other related oops are attached to this bug report.

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20170712/64c3e1a1/attachment.html>


More information about the netfilter-buglog mailing list