Received: by 10.223.176.5 with SMTP id f5csp491995wra; Tue, 30 Jan 2018 15:00:46 -0800 (PST) X-Google-Smtp-Source: AH8x227H9YE+MQ866i7aEtMCvtm9zwUDtkudS/pGJmj/wCzyI8wUsXu9iPGRLzxfeotG7mx5Vwh1 X-Received: by 2002:a17:902:6115:: with SMTP id t21-v6mr27435078plj.322.1517353246044; Tue, 30 Jan 2018 15:00:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517353246; cv=none; d=google.com; s=arc-20160816; b=aqoX6otGKuuzhRFQ65sIvlWBgoPSiuAgDa9a+RB2Z1fs9qS9Qa8na94rZH8y9o2VkT BGpcmcdmGcqsZTHiqML7QAh4q9vgA5S/vOnHGRVfSGn4YbQr+zrxzSLEYe7ulQEt4rIR 9ngGllrWJs+EhA0P2+lU3jmlerXzlVUGp9J8JJa0IIidp29X7/J1o88FjHV6gqykVLmv ZMma6KF5PGFRJ904H+Przui5PP3Ctz8lyUXcg8+E2e/ZsgXe0PvKWss0h/XD2hVzgu/2 yuR6PzPx8wkn++vLKl8vCf7bqkbCslgj8L1rNgP4DPcpdGyQEF9jo7owjLcq0ooIMSFI Nrvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=pvXEcCjb9KttEfDhRRvCNa+12sjke3a5zJpUHWECyxI=; b=ab/CrbIN0OqDp+g+dDk2LFiZHKoUPXK870EBK/7nDb970yqJqC166nwD4HqntkRGo7 1FO86o7g0ee7jHsEsftTqJh0DN947fOe6NByXm461mCLqGlM7uRf3S9tqPRXUMuUIRSg m3m2wFwQ/DR3prHuEm0OjW14FHoO0/Iq1IaAtrN9rUlbRopGZwTlisqF65aNTuNsiEg0 IG85oOAHE0zERAcUBs/xY0umOUVJxgvj+KublYtjtUJ04bmid5J9oYsYN1Awk5sDT1R5 gy+wlkpRm7Rjl4EYjBxFgvJ8ruNjG3w3NqB+92fUBnrIE50iJK2wc3cMemGbHvi7BTID lHBA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Uflq/8qW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l7-v6si3239412plk.510.2018.01.30.15.00.31; Tue, 30 Jan 2018 15:00:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=Uflq/8qW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753859AbeA3XAF (ORCPT + 99 others); Tue, 30 Jan 2018 18:00:05 -0500 Received: from mail-pg0-f66.google.com ([74.125.83.66]:45000 "EHLO mail-pg0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752212AbeA3XAE (ORCPT ); Tue, 30 Jan 2018 18:00:04 -0500 Received: by mail-pg0-f66.google.com with SMTP id m20so8455923pgc.11; Tue, 30 Jan 2018 15:00:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=pvXEcCjb9KttEfDhRRvCNa+12sjke3a5zJpUHWECyxI=; b=Uflq/8qWwEjqLsy2Z1Zb2HmRhfwaTipRpqlw5NXo+8oAD8cVpLDztAwvCEnwJ562Fl SvtjhGM50RJuz10UmKDAAjhHgHiKQduhaVfif0MdmPGc2tKGVnFViopQnfR0ltn9KXQ7 eygsv1P7eQHUOwX+kzVhYHCC8jXZqFY2qMKGNZwXwEykvI6wC5JZykWibw/U0uDgTRg1 Qt9S3Op11exDME7Q2leJ+nbY9izVSSN9zsydc9jrUJp56u10FnrM9n2iYcpAu6GHRhX3 EPwyLAIUrnIWBPJdoIEY5pXfaFy7NkK4C5K2X9Ov7UhQpZsQE1rYUmTZSB6+qnWMVe+y 3kgg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=pvXEcCjb9KttEfDhRRvCNa+12sjke3a5zJpUHWECyxI=; b=ICEaZ6cyxqnSn5Kod2pRKgnGaG3k9t9h9u4C/OYwe3Yip7GUYWSoZZStHklaquye4d TCImCSTE5KBQDh2IxNiBkP1BoKZPAoJmZRR+NhjSowllHrO8kXwVcTbbzQcABadYgZq0 6Cfa/V/1CrKbzDC8JMVYdn2jJc7Z5TNW+o5JJYkwM4lbeXZV2lH9xddnNn8kYL8Djl6f G//QvThFkGZfFhjijOLCVmIMdusCmKeFJSOwgg3tjZI/JFdZ45yiikOUQbIpUUAhFpya uNsda3oNISzN8reIauYd36/gF3I/M3E+Es4cWME/1AUyfoYdSSyH+Y0z3K6pnj++qysl ixOA== X-Gm-Message-State: AKwxyte8IIqlmbJcsmqjUD32g6qeK7QT+Noi9U1Log/efB9SkIwA6MAh PRbLaSpW7Xx2K1BU5KB+TDo= X-Received: by 2002:a17:902:2825:: with SMTP id e34-v6mr24263679plb.131.1517353203485; Tue, 30 Jan 2018 15:00:03 -0800 (PST) Received: from dsa-mb.local ([2601:282:800:fd80:510:58c1:c42e:d68b]) by smtp.googlemail.com with ESMTPSA id z2sm23860275pgz.22.2018.01.30.15.00.01 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 30 Jan 2018 15:00:02 -0800 (PST) Subject: Re: net: hang in unregister_netdevice: waiting for lo to become free To: Xin Long , Daniel Borkmann , Cong Wang Cc: Dmitry Vyukov , David Miller , Eric Dumazet , Willem de Bruijn , Jakub Kicinski , Rasmus Villemoes , netdev , LKML , Alexey Kuznetsov , Hideaki YOSHIFUJI , syzkaller , Dan Streetman , "Eric W. Biederman" References: <7fd7e3b3-77b1-0936-b169-d08b946bedc7@iogearbox.net> <991243e2-e7c2-f2b2-72b9-d37b0d569b3b@gmail.com> From: David Ahern Message-ID: Date: Tue, 30 Jan 2018 15:59:59 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 In-Reply-To: <991243e2-e7c2-f2b2-72b9-d37b0d569b3b@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/30/18 1:57 PM, David Ahern wrote: > On 1/30/18 1:08 PM, Daniel Borkmann wrote: >> On 01/30/2018 07:32 PM, Cong Wang wrote: >>> On Tue, Jan 30, 2018 at 4:09 AM, Dmitry Vyukov wrote: >>>> Hello, >>>> >>>> The following program creates a hang in unregister_netdevice. >>>> cleanup_net work hangs there forever periodically printing >>>> "unregister_netdevice: waiting for lo to become free. Usage count = 3" >>>> and creation of any new network namespaces hangs forever. >>> >>> Interestingly, this is not reproducible on net-next. >> >> The most recent change on netns refcnt was 4ee806d51176 ("net: tcp: close >> sock if net namespace is exiting") in net/net-next from 5 days ago, maybe >> fixed due to that? >> > > This appears to be the commit introducing the refcnt leak: > > $ git bisect bad > dbc2b5e9a09e9a6664679a667ff81cff6e5f2641 is the first bad commit > commit dbc2b5e9a09e9a6664679a667ff81cff6e5f2641 > Author: Xin Long > Date: Fri May 12 14:39:52 2017 +0800 > > sctp: fix src address selection if using secondary addresses for ipv6 > > > v4.14 is bad. Running bisect in the background while doing other things.... > Interesting. The commit that avoids the refcnt leak is commit 955ec4cb3b54c7c389a9f830be7d3ae2056b9212 Author: David Ahern Date: Wed Jan 24 19:45:29 2018 -0800 net/ipv6: Do not allow route add with a device that is down That commit does not intentionally address the problem so it is just masking the problematic code introduced by the commit above.