Received: by 10.223.176.5 with SMTP id f5csp450341wra; Tue, 30 Jan 2018 14:14:10 -0800 (PST) X-Google-Smtp-Source: AH8x225C1Tij6i2KoPks2OPDGjmLq3mFK32FXSPMWblUFgyJt/s/J5V5wljyYpApP+jCZUMArq/t X-Received: by 2002:a17:902:9003:: with SMTP id a3-v6mr26653682plp.338.1517350450145; Tue, 30 Jan 2018 14:14:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517350450; cv=none; d=google.com; s=arc-20160816; b=LWsAYhw3Zp/7vLT4QZ6TpRQRpUPV7kinTvD9nHyxokiN1zs3zRZB5LeqJ6Vz7z9Wmd kC1lbU6uBcrOrBY/2gn+E8GTqIxyMYEOYFQOw72nOIO2D8qkXsXh4jLsIhUE+1jTSauO 0G8cBLSChMBlD8l6a9NhrLz673tKl87TgvxVGsqGHimv+wuLob/gpdi0Bqeo5/S0cqNz nJfwuINxjQyKr5NcGQet88DBJrDcFxrSD5NLRXZgkMHaBfUjRg8JmAuxxOsOHluCLEtW qCoP2o7yXAuqugZx/keHGULm6iH5dVXdAE2xP/MbH9XCYVIR0OhVdmmvgMTbswQd1BEj Hytg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=Y9DxHKUGkAgSCZnPmnKIfGZFBtMxkqGnSYGLHw55xEA=; b=PGmSuyQiTxxYm1ievySSHHfqwS6LOKp5pJvjwGZrUDCKLvRy21z2R4yJcPvssq7L+r D9tUnqe+VeS7ipjbcplrWiVEi5ASnHF1ohkWBDStBdZUsJsRz2ZYWM6Hrl/cwTySGlzP aekb0g/yZC4cV1O37V55mxCL4AZRNB/40SacB6kJT/NPqGIRPQsGlOsUHl9XKAObJcHm PIasho0E8I3c416qrjTqHvmy5+2vCOOC3ntZVOJ+bx96UZTVBeTlU/d6TOjqZ+4/2kq8 LUyA4NCuRBcueaTUT/LGkEl62UxXqGP0oewJusLNVNV3Whm3lUHEQU2rG2GcZZWxiZzP 2hZg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=CfHMiQ72; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d186si8983968pgc.583.2018.01.30.14.13.55; Tue, 30 Jan 2018 14:14:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=CfHMiQ72; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753569AbeA3U5l (ORCPT + 99 others); Tue, 30 Jan 2018 15:57:41 -0500 Received: from mail-pg0-f66.google.com ([74.125.83.66]:42498 "EHLO mail-pg0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752711AbeA3U5k (ORCPT ); Tue, 30 Jan 2018 15:57:40 -0500 Received: by mail-pg0-f66.google.com with SMTP id j16so6826312pgn.9; Tue, 30 Jan 2018 12:57:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=Y9DxHKUGkAgSCZnPmnKIfGZFBtMxkqGnSYGLHw55xEA=; b=CfHMiQ72tikjCphEPApyGwTrCcSyu4fynnnW5g0uIxYPZNQ7/GPi7twAEj+AdHctrk scETTd/oe1ehaBTVj0O7K/njejXsCrmhTSqR7i9CtPW3gUanRf1+dKPurawn6VG2Zy5u 95nMc4X5tGeL313y3z/kL7ua5tVVKWilVGdTMeG9luKYMnaEssMtDYyR0TdVJjCCJ3By /G0PPvBjDF61mc96qzu0+b8lKkC+Ws1w4BYFcs4pN5gvY8kKudf4hZihwDdq1DnubiKX 8FbHMuzngcjltR2AkJfxQ1PgIvCIMqiR8vNTnaydMslWCIYmnwCXuFB9x0aS4i8uUGDy o+Cw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=Y9DxHKUGkAgSCZnPmnKIfGZFBtMxkqGnSYGLHw55xEA=; b=LrSYf4cseA16GAmTHEybRZL2XdZvew5xrl+iOmgELqtn04MNEt3O2PUWYPRV7FS78M PJ5cI9wC5kxLQ7zJoMxq1401dDRFzrCGrsdsXvK8A1GY6MUEPakc558OVkHydnhW8ddY 9oapT7ldveKo24AV218I7/xZSdlKeP3HlO3QQLbs4soFclGfuLfFQ5oHJo8GZAVrCb0h a52gv0HxZyVJXCnCHnsSa8lesquvFLSbgEvNYYdRfZJGDVjFOcptc8JCyLeHOuU/8h// sC7/7qIsLGZRtS/d1JBK+zUDjBAXavj4fMJ1zyt4CfjcK71s/0bpmb7P3X+3xsm+Gogl tgEA== X-Gm-Message-State: AKwxyte13LeS423MtN4LmBW6kLPy8aMi71wS2ZVMs5TnWO1jkT4b4TQT rJvBlwCIIUJXe+q1TPU+UjM= X-Received: by 10.99.37.193 with SMTP id l184mr15078975pgl.30.1517345859383; Tue, 30 Jan 2018 12:57:39 -0800 (PST) Received: from dsa-mb.local ([2601:282:800:fd80:510:58c1:c42e:d68b]) by smtp.googlemail.com with ESMTPSA id z9sm22320391pgc.5.2018.01.30.12.57.36 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 30 Jan 2018 12:57:38 -0800 (PST) Subject: Re: net: hang in unregister_netdevice: waiting for lo to become free To: Daniel Borkmann , Cong Wang Cc: Dmitry Vyukov , David Miller , Eric Dumazet , Willem de Bruijn , Jakub Kicinski , Rasmus Villemoes , netdev , LKML , Alexey Kuznetsov , Hideaki YOSHIFUJI , syzkaller , Dan Streetman , "Eric W. Biederman" References: <7fd7e3b3-77b1-0936-b169-d08b946bedc7@iogearbox.net> From: David Ahern Message-ID: <991243e2-e7c2-f2b2-72b9-d37b0d569b3b@gmail.com> Date: Tue, 30 Jan 2018 13:57:35 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: <7fd7e3b3-77b1-0936-b169-d08b946bedc7@iogearbox.net> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/30/18 1:08 PM, Daniel Borkmann wrote: > On 01/30/2018 07:32 PM, Cong Wang wrote: >> On Tue, Jan 30, 2018 at 4:09 AM, Dmitry Vyukov wrote: >>> Hello, >>> >>> The following program creates a hang in unregister_netdevice. >>> cleanup_net work hangs there forever periodically printing >>> "unregister_netdevice: waiting for lo to become free. Usage count = 3" >>> and creation of any new network namespaces hangs forever. >> >> Interestingly, this is not reproducible on net-next. > > The most recent change on netns refcnt was 4ee806d51176 ("net: tcp: close > sock if net namespace is exiting") in net/net-next from 5 days ago, maybe > fixed due to that? > This appears to be the commit introducing the refcnt leak: $ git bisect bad dbc2b5e9a09e9a6664679a667ff81cff6e5f2641 is the first bad commit commit dbc2b5e9a09e9a6664679a667ff81cff6e5f2641 Author: Xin Long Date: Fri May 12 14:39:52 2017 +0800 sctp: fix src address selection if using secondary addresses for ipv6 v4.14 is bad. Running bisect in the background while doing other things....