Greeting, FYI, we noticed the following commit (built with gcc-9): commit: 6069da443bf65f513bb507bb21e2f87cfb1ad0b6 ("netfilter: nf_tables: unregister flowtable hooks on netns exit") https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master in testcase: kernel-selftests version: kernel-selftests-x86_64-4aeb6e60-1_20220324 with following parameters: group: netfilter ucode: 0xec test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel. test-url: https://www.kernel.org/doc/Documentation/kselftest.txt on test machine: 8 threads Intel(R) Core(TM) i7-6700 CPU @ 3.40GHz with 28G memory caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): If you fix the issue, kindly add following tag Reported-by: kernel test robot [ 187.708652][ T58] WARNING: CPU: 3 PID: 58 at net/netfilter/core.c:494 __nf_unregister_net_hook (net/netfilter/core.c:494 (discriminator 1)) [ 187.718718][ T58] Modules linked in: ip_vs authenc echainiv esp4 nft_flow_offload nf_flow_table_inet nf_flow_table ebtable_filter ebt_redirect ebt_ip ebtable_broute ebtables nft_ct nf_conntrack_netlink nft_redir nft_masq nft_nat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nft_objref nf_log_syslog nft_log nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nf_tables nfnetlink intel_rapl_msr intel_rapl_common btrfs blake2b_generic xor raid6_pq zstd_compress x86_pkg_temp_thermal intel_powerclamp coretemp libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel sd_mod t10_pi ghash_clmulni_intel sg ipmi_devintf rapl i915 ipmi_msghandler wmi_bmof mei_wdt intel_cstate intel_gtt ttm ahci libahci drm_kms_helper intel_uncore mei_me i2c_i801 syscopyarea libata i2c_smbus mei sysfillrect intel_pch_thermal sysimgblt wmi fb_sys_fops video intel_pmc_core acpi_pad ip_tables [ 187.796315][ T58] CPU: 3 PID: 58 Comm: kworker/u16:7 Not tainted 5.17.0-rc3-00153-g6069da443bf6 #1 [ 187.805556][ T58] Hardware name: Dell Inc. OptiPlex 7040/0Y7WYT, BIOS 1.2.8 01/26/2016 [ 187.813734][ T58] Workqueue: netns cleanup_net [ 187.818450][ T58] RIP: 0010:__nf_unregister_net_hook (net/netfilter/core.c:494 (discriminator 1)) [ 187.824717][ T58] Code: 10 84 d2 74 0c 4c 89 ef e8 23 78 7a fe 4c 8b 04 24 8b 73 1c 83 fe 05 0f 85 67 fe ff ff 41 bc 90 01 00 00 31 db e9 79 fe ff ff <0f> 0b 48 83 c4 18 48 c7 c7 60 78 e8 85 5b 5d 41 5c 41 5d 41 5e 41 All code ======== 0: 10 84 d2 74 0c 4c 89 adc %al,-0x76b3f38c(%rdx,%rdx,8) 7: ef out %eax,(%dx) 8: e8 23 78 7a fe callq 0xfffffffffe7a7830 d: 4c 8b 04 24 mov (%rsp),%r8 11: 8b 73 1c mov 0x1c(%rbx),%esi 14: 83 fe 05 cmp $0x5,%esi 17: 0f 85 67 fe ff ff jne 0xfffffffffffffe84 1d: 41 bc 90 01 00 00 mov $0x190,%r12d 23: 31 db xor %ebx,%ebx 25: e9 79 fe ff ff jmpq 0xfffffffffffffea3 2a:* 0f 0b ud2 <-- trapping instruction 2c: 48 83 c4 18 add $0x18,%rsp 30: 48 c7 c7 60 78 e8 85 mov $0xffffffff85e87860,%rdi 37: 5b pop %rbx 38: 5d pop %rbp 39: 41 5c pop %r12 3b: 41 5d pop %r13 3d: 41 5e pop %r14 3f: 41 rex.B Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 48 83 c4 18 add $0x18,%rsp 6: 48 c7 c7 60 78 e8 85 mov $0xffffffff85e87860,%rdi d: 5b pop %rbx e: 5d pop %rbp f: 41 5c pop %r12 11: 41 5d pop %r13 13: 41 5e pop %r14 15: 41 rex.B [ 187.844316][ T58] RSP: 0018:ffffc9000048f998 EFLAGS: 00010246 [ 187.850334][ T58] RAX: dffffc0000000000 RBX: ffff888107381d98 RCX: 0000000000000001 [ 187.858240][ T58] RDX: 1ffff110e5c3e078 RSI: ffffffff85e878c8 RDI: ffff888100d1c228 [ 187.866175][ T58] RBP: 0000000000000005 R08: 0000000000000000 R09: fffff52000091f19 [ 187.874095][ T58] R10: ffffc9000048f998 R11: fffff52000091f18 R12: ffff888107381d80 [ 187.882012][ T58] R13: ffff888107381db4 R14: ffff88815960b300 R15: ffff88872e1f03c0 [ 187.889919][ T58] FS: 0000000000000000(0000) GS:ffff888613f80000(0000) knlGS:0000000000000000 [ 187.898812][ T58] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 187.905351][ T58] CR2: 00007f6ed785dda4 CR3: 000000075742a004 CR4: 00000000003706e0 [ 187.913269][ T58] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 187.921203][ T58] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 187.929121][ T58] Call Trace: [ 187.932333][ T58] [ 187.935241][ T58] nf_tables_flowtable_event (net/netfilter/nf_tables_api.c:7206 net/netfilter/nf_tables_api.c:7877 net/netfilter/nf_tables_api.c:7901) nf_tables [ 187.941910][ T58] raw_notifier_call_chain (kernel/notifier.c:89 kernel/notifier.c:392) [ 187.947230][ T58] unregister_netdevice_many (net/core/dev.c:10417) [ 187.952898][ T58] ? dev_get_mac_address (net/core/dev.c:10362) [ 187.958115][ T58] ? unregister_netdevice_queue (include/linux/list.h:69 include/linux/list.h:102 include/linux/list.h:230 net/core/dev.c:10344) [ 187.963968][ T58] ? unregister_netdevice_many (net/core/dev.c:10340) [ 187.969908][ T58] default_device_exit_batch (net/core/dev.c:10946) [ 187.975486][ T58] ? unregister_netdev (net/core/dev.c:10915) [ 187.980341][ T58] ? default_device_exit (net/core/dev.c:10853) [ 187.985597][ T58] ? lock_is_held_type (kernel/locking/lockdep.c:5380 kernel/locking/lockdep.c:5682) [ 187.990556][ T58] ? prepare_to_wait_exclusive (kernel/sched/wait.c:476) [ 187.996322][ T58] ? __cond_resched (kernel/sched/core.c:8191) [ 188.000915][ T58] ? ops_exit_list+0xb3/0x180 [ 188.006135][ T58] cleanup_net (net/core/net_namespace.c:596 (discriminator 3)) [ 188.010495][ T58] ? unregister_pernet_device (net/core/net_namespace.c:550) [ 188.015977][ T58] ? rcu_read_lock_bh_held (kernel/rcu/update.c:120) [ 188.021192][ T58] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4232 kernel/locking/lockdep.c:4292 kernel/locking/lockdep.c:4244) [ 188.027114][ T58] process_one_work (arch/x86/include/asm/jump_label.h:27 include/linux/jump_label.h:212 include/trace/events/workqueue.h:108 kernel/workqueue.c:2312) [ 188.032006][ T58] ? rcu_read_unlock (include/linux/rcupdate.h:723 (discriminator 5)) [ 188.036695][ T58] ? pwq_dec_nr_in_flight (kernel/workqueue.c:2202) [ 188.042014][ T58] ? rwlock_bug+0xc0/0xc0 [ 188.046902][ T58] worker_thread (include/linux/list.h:292 kernel/workqueue.c:2455) [ 188.051340][ T58] ? process_one_work (kernel/workqueue.c:2397) [ 188.056464][ T58] kthread (kernel/kthread.c:377) [ 188.060436][ T58] ? kthread_complete_and_exit (kernel/kthread.c:332) [ 188.066011][ T58] ret_from_fork (arch/x86/entry/entry_64.S:301) [ 188.070383][ T58] [ 188.073331][ T58] irq event stamp: 985513 [ 188.077623][ T58] hardirqs last enabled at (985523): __up_console_sem (arch/x86/include/asm/irqflags.h:45 (discriminator 1) arch/x86/include/asm/irqflags.h:80 (discriminator 1) arch/x86/include/asm/irqflags.h:138 (discriminator 1) kernel/printk/printk.c:256 (discriminator 1)) [ 188.087098][ T58] hardirqs last disabled at (985532): __up_console_sem (kernel/printk/printk.c:254 (discriminator 1)) [ 188.096644][ T58] softirqs last enabled at (984570): __do_softirq (arch/x86/include/asm/preempt.h:27 kernel/softirq.c:402 kernel/softirq.c:587) [ 188.105946][ T58] softirqs last disabled at (984513): irq_exit_rcu (kernel/softirq.c:432 kernel/softirq.c:637 kernel/softirq.c:649) [ 188.115262][ T58] ---[ end trace 0000000000000000 ]--- [ 188.187604][ T63] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [ 188.224355][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready [ 188.231763][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth02: link becomes ready [ 188.239407][ T19] br0: port 2(veth02) entered blocking state [ 188.245321][ T19] br0: port 2(veth02) entered forwarding state [ 189.169570][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready [ 189.329194][ T6193] IPVS: [rr] scheduler registered. [ 190.697254][ T430] # Testing NAT mode... [ 190.697265][ T430] [ 190.856602][ T58] device veth02 left promiscuous mode [ 190.861910][ T58] br0: port 2(veth02) entered disabled state [ 190.877964][ T58] device veth01 left promiscuous mode [ 190.883315][ T58] br0: port 1(veth01) entered disabled state [ 190.938760][ T6223] br0: port 1(veth01) entered blocking state [ 190.944724][ T6223] br0: port 1(veth01) entered disabled state [ 190.951262][ T6223] device veth01 entered promiscuous mode [ 190.972492][ T6224] br0: port 2(veth02) entered blocking state [ 190.978362][ T6224] br0: port 2(veth02) entered disabled state [ 190.984902][ T6224] device veth02 entered promiscuous mode [ 191.005144][ T6225] br0: port 2(veth02) entered blocking state [ 191.011024][ T6225] br0: port 2(veth02) entered forwarding state [ 191.068646][ T60] br0: port 2(veth02) entered disabled state [ 191.074956][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth01: link becomes ready [ 191.082293][ T60] br0: port 1(veth01) entered blocking state [ 191.088192][ T60] br0: port 1(veth01) entered forwarding state [ 191.161526][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [ 191.198407][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth02: link becomes ready [ 191.205907][ T264] br0: port 2(veth02) entered blocking state [ 191.211809][ T264] br0: port 2(veth02) entered forwarding state [ 191.793820][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [ 192.334983][ T6250] br0: port 2(veth02) entered disabled state [ 192.342895][ T6250] device veth02 left promiscuous mode [ 192.348687][ T6250] br0: port 2(veth02) entered disabled state [ 193.629974][ T430] # Testing Tunnel mode... [ 193.629986][ T430] [ 193.805713][ T6274] br0: port 1(veth01) entered blocking state [ 193.811608][ T6274] br0: port 1(veth01) entered disabled state [ 193.817886][ T6274] device veth01 entered promiscuous mode [ 193.825629][ T58] device veth01 left promiscuous mode [ 193.830947][ T58] br0: port 1(veth01) entered disabled state [ 193.869056][ T6275] br0: port 2(veth02) entered blocking state [ 193.874952][ T6275] br0: port 2(veth02) entered disabled state [ 193.881243][ T6275] device veth02 entered promiscuous mode [ 193.945131][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): veth01: link becomes ready [ 193.952434][ T5833] br0: port 1(veth01) entered blocking state [ 193.958378][ T5833] br0: port 1(veth01) entered forwarding state [ 193.964720][ T5833] IPv6: ADDRCONF(NETDEV_CHANGE): br0: link becomes ready [ 194.042255][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth12: link becomes ready [ 194.079234][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth20: link becomes ready [ 194.086890][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth02: link becomes ready [ 194.094675][ T264] br0: port 2(veth02) entered blocking state [ 194.100559][ T264] br0: port 2(veth02) entered forwarding state [ 194.865769][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth10: link becomes ready [ 194.873120][ T264] IPv6: ADDRCONF(NETDEV_CHANGE): veth21: link becomes ready [ 196.654751][ T430] [ 196.693193][ T430] ok 7 selftests: netfilter: ipvs.sh [ 196.693206][ T430] [ 196.704226][ T430] # selftests: netfilter: nft_concat_range.sh [ 196.704236][ T430] [ 196.749487][ T430] # TEST: reported issues [ 196.749499][ T430] [ 196.765214][ T430] # Add two elements, flush, re-add Error: concatenated types not supported in interval sets [ 196.765226][ T430] [ 196.781952][ T430] # add table t { set s { type ipv4_addr . inet_service; flags interval; }; } [ 196.781961][ T430] [ 196.793400][ T430] # ^ To reproduce: git clone https://github.com/intel/lkp-tests.git cd lkp-tests sudo bin/lkp install job.yaml # job file is attached in this email bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run sudo bin/lkp run generated-yaml-file # if come across any failure that blocks the test, # please remove ~/.lkp and /lkp dir to run from a clean state. -- 0-DAY CI Kernel Test Service https://01.org/lkp