Received: by 10.223.176.5 with SMTP id f5csp2089844wra; Wed, 31 Jan 2018 16:50:25 -0800 (PST) X-Google-Smtp-Source: AH8x227V2OI7Prga97AxpXtnrbFzb2u/yz+pRlIx9AtriwMY8ukum0D5QHrxTASLVgqlIalJw5fK X-Received: by 10.99.185.78 with SMTP id v14mr20902868pgo.112.1517446225307; Wed, 31 Jan 2018 16:50:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517446225; cv=none; d=google.com; s=arc-20160816; b=p0l+F/y9LoYCpBHJCM3lHpWcdGwGILrQnsTTIYvp4kfvAVLSZa0BiRmzfFNLIHlLXu dWAY2fZB7Dpb0KKmBxrPJuM6v5P5M2YgQPqXSib3FrwTLIhrKlkoNo0pPAus7lCcD89q BIlnqj956/3w+TfZUa4i5XJDl4yZ5mMdH8zJGO0Evpen/BSsrvruWar4TrKrHKwh+6di Mz3waDJXExCiHHHH6+RHPvYg0Fpv1lmQx8eBeh9PhwYHTSHSPmS9q/JdbbKD6JTNBye8 dOTt0LlcSYhCwGHtLA5CVnn2pQbn0nKY6UEr/aeF/R0d/NFaqa/eZh0xyiR/kwvCu3Kl ss5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=iZHZjmLp2lqJk+PfPv7i54vebE2KKPIa4eSGdz52fBY=; b=iGf+zRvjIre6UORRg3zZvhk1Hp9Vw3xfTX/RdCNP2xJOhUCTiBYVv/FLpEoY7KmN0j 1g8uUv0aHRkrtPm0RAQlUnprs1FppwYDdSkybxPWNjlwYey5JoGxck8HhjO5SkNTe1/W tyuGBGYz4eyWf8qSDsBQ8AAy5Jj5OayCSZx8VmmLpHmjENZqBCVW8qbNQMmEgqS/bduC KHQXHOH6xDmGNAV+x0NGQxkMb9hZmB/sRIwRDrJhZygYXJEj+WF88ND+wqzPzplMB+Tf 7BmHYw25gd/18N8OC9RfEVXDCIk0r6WyQtrmDbMjGb/kYUtzzRuQh4fub4I8dY+nYwzT KIGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=NwUlIO3S; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k12si2379409pgo.806.2018.01.31.16.49.58; Wed, 31 Jan 2018 16:50:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=NwUlIO3S; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932152AbeBAAtQ (ORCPT + 99 others); Wed, 31 Jan 2018 19:49:16 -0500 Received: from mail-qt0-f194.google.com ([209.85.216.194]:39730 "EHLO mail-qt0-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754068AbeBAAtN (ORCPT ); Wed, 31 Jan 2018 19:49:13 -0500 Received: by mail-qt0-f194.google.com with SMTP id f4so24330621qtj.6; Wed, 31 Jan 2018 16:49:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=iZHZjmLp2lqJk+PfPv7i54vebE2KKPIa4eSGdz52fBY=; b=NwUlIO3SM+7dLtQJuS3JR5L3uR+u0tqWRcbm8wYZ/74VirEVGejbZSPQg+fbF/OBfg wqGgLkC5pSUMRpav6VvNS+EgUkpJD5edi9s+YaymN8DxSaN1TfnWF5KsbMJWLPCCbIGu tsHRIbOyU375sWXacrDYmT82Lj7TSv80jzWamAvj4JhpRKKZKHQoiKk0eMNBlpi+gLDN 0zVaEZC5P6FiEJHQYvquc3khELeNwP/eYmSAWq+vqtsREn4/ji/1bznDrLLRUkUiXVmK 6T+Oq+es+3Ecztt9/GGamaAkPGb2tVQomTdBkPAtz3WO4zH9pk4+7PrDmk5fZpny9XQF 8hUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=iZHZjmLp2lqJk+PfPv7i54vebE2KKPIa4eSGdz52fBY=; b=n3ie6AZLfJrBwnq9hdZtzqUW3fEhHMH22L8PBz3aw2pnmO7pEl+/FoFgnPCce+IP1D 37vHWdomo1TShosF0CN1LS4pGFlZURyFgiIruRGVZ/+G2eM4Gc7yNyDf+JLEBv86p+Lm SelOFyqKZleNzaCo7XgqiWrJhp1PZfYr8rNz70omEq3KY7b244mXeXv7YZIFokGR91ol m4tfZIXUFevCO5bvAlJa0dqir8Ebk0Ht6PATmjPS8racEj69G6ZIV0jaeZmsKOI7I7Xj xygk/Zuy8alkTwPPSiooin19mQeUHX3IA2lR5ZBB8/VP6EtuiW59rK816Ihd/C7mzHaL KDwg== X-Gm-Message-State: AKwxytdFFXfYwxyh4pZEL0VVnTK2hjO2bqfZd4z44nh33YlIpC/u8TRf AZeCykuJV88thZwRaW4VvJjJsCx8DAzia4InrIc= X-Received: by 10.200.2.71 with SMTP id o7mr50420591qtg.36.1517446153158; Wed, 31 Jan 2018 16:49:13 -0800 (PST) MIME-Version: 1.0 Received: by 10.140.36.203 with HTTP; Wed, 31 Jan 2018 16:49:12 -0800 (PST) In-Reply-To: References: <7fd7e3b3-77b1-0936-b169-d08b946bedc7@iogearbox.net> <991243e2-e7c2-f2b2-72b9-d37b0d569b3b@gmail.com> From: Xin Long Date: Thu, 1 Feb 2018 01:49:12 +0100 Message-ID: Subject: Re: net: hang in unregister_netdevice: waiting for lo to become free To: David Ahern Cc: Daniel Borkmann , Cong Wang , Dmitry Vyukov , David Miller , Eric Dumazet , Willem de Bruijn , Jakub Kicinski , Rasmus Villemoes , netdev , LKML , Alexey Kuznetsov , Hideaki YOSHIFUJI , syzkaller , Dan Streetman , "Eric W. Biederman" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jan 30, 2018 at 11:59 PM, David Ahern wrote: > On 1/30/18 1:57 PM, David Ahern wrote: >> On 1/30/18 1:08 PM, Daniel Borkmann wrote: >>> On 01/30/2018 07:32 PM, Cong Wang wrote: >>>> On Tue, Jan 30, 2018 at 4:09 AM, Dmitry Vyukov wrote: >>>>> Hello, >>>>> >>>>> The following program creates a hang in unregister_netdevice. >>>>> cleanup_net work hangs there forever periodically printing >>>>> "unregister_netdevice: waiting for lo to become free. Usage count = 3" >>>>> and creation of any new network namespaces hangs forever. >>>> >>>> Interestingly, this is not reproducible on net-next. >>> >>> The most recent change on netns refcnt was 4ee806d51176 ("net: tcp: close >>> sock if net namespace is exiting") in net/net-next from 5 days ago, maybe >>> fixed due to that? >>> >> >> This appears to be the commit introducing the refcnt leak: >> >> $ git bisect bad >> dbc2b5e9a09e9a6664679a667ff81cff6e5f2641 is the first bad commit >> commit dbc2b5e9a09e9a6664679a667ff81cff6e5f2641 >> Author: Xin Long >> Date: Fri May 12 14:39:52 2017 +0800 >> >> sctp: fix src address selection if using secondary addresses for ipv6 >> >> >> v4.14 is bad. Running bisect in the background while doing other things.... >> > > Interesting. The commit that avoids the refcnt leak is > > commit 955ec4cb3b54c7c389a9f830be7d3ae2056b9212 > Author: David Ahern > Date: Wed Jan 24 19:45:29 2018 -0800 > > net/ipv6: Do not allow route add with a device that is down > > That commit does not intentionally address the problem so it is just > masking the problematic code introduced by the commit above. Thanks, David A. I'm still on a trip. will look into this asap.