Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp1418090imd; Sat, 27 Oct 2018 08:40:51 -0700 (PDT) X-Google-Smtp-Source: AJdET5fKc6UfBsisHIKWeKuHa/YK7cJ2QL3ZpRh2AMnhl8EMZl7Iee1RRw9ARUnweolUSQFQ8EMP X-Received: by 2002:a62:8787:: with SMTP id i129-v6mr8160696pfe.150.1540654850954; Sat, 27 Oct 2018 08:40:50 -0700 (PDT) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b124-v6si1509670pfg.90.2018.10.27.08.40.07; Sat, 27 Oct 2018 08:40:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@natalenko.name header.s=dkim-20170712 header.b=VEmHxnFB; arc=fail (signature failed); spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=natalenko.name Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728784AbeJ1ATX (ORCPT + 99 others); Sat, 27 Oct 2018 20:19:23 -0400 Received: from vulcan.natalenko.name ([104.207.131.136]:21154 "EHLO vulcan.natalenko.name" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728515AbeJ1ATX (ORCPT ); Sat, 27 Oct 2018 20:19:23 -0400 Received: from mail.natalenko.name (vulcan.natalenko.name [IPv6:fe80::5400:ff:fe0c:dfa0]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by vulcan.natalenko.name (Postfix) with ESMTPSA id 72EF644ACE8; Sat, 27 Oct 2018 17:37:58 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=natalenko.name; s=dkim-20170712; t=1540654678; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UQGZUDD2Qa1IFQ+jw7Rw7vaCO9LedMpdFJ+V0AnRi3Y=; b=VEmHxnFBGlzLK/R7/F7ipZoEHVbi4ANqZpKG0TC7VlNgAzrmnZmQR2c3awLAk+T7hlAxyj xDnvnD6jxv1uA5hDstbcvNqlDqjJLPeZaTh3AiZLmOo7cFaGADaCDGcNWZZ3lRvjwWsdbg Tsd/HkNTAeGndJ0VcePxcquLUMN2cI4= DMARC-Filter: OpenDMARC Filter v1.3.2 vulcan.natalenko.name 72EF644ACE8 Authentication-Results: vulcan.natalenko.name; dmarc=fail (p=none dis=none) header.from=natalenko.name MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Sat, 27 Oct 2018 17:37:58 +0200 From: Oleksandr Natalenko To: Heiner Kallweit Cc: Dave Taht , "David S. Miller" , =?UTF-8?Q?Toke_H=C3=B8iland-J=C3=B8rgensen?= , Jamal Hadi Salim , Cong Wang , =?UTF-8?Q?Ji=C5=99=C3=AD_P=C3=ADrko?= , Linux Kernel Network Developers , linux-kernel@vger.kernel.org Subject: Re: CAKE and r8169 cause panic on upload in v4.19 In-Reply-To: <1beabdd3-dbac-de8a-07b0-d0788b1dbc38@gmail.com> References: <61d09f0db41f269cc9ee13dd68a5c285@natalenko.name> <1beabdd3-dbac-de8a-07b0-d0788b1dbc38@gmail.com> Message-ID: <644dc057e822273fcbc538b2056908ce@natalenko.name> X-Sender: oleksandr@natalenko.name User-Agent: Roundcube Webmail/1.3.7 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=natalenko.name; s=arc-20170712; t=1540654678; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=UQGZUDD2Qa1IFQ+jw7Rw7vaCO9LedMpdFJ+V0AnRi3Y=; b=rXPXI+mAEHkIf/985WA/j3j1VMeBla+ugV82ldDFOz52i5d9OGWB4ialqbvxeBcQkAj8rB QHiG2M44IkVG9JgXWBlHSPNMzRFXqA/J7KkRrfrEIO08gMmwH+UTv6MQIzsE7pXgBHZklH QDuzu9yuUpqTAwQjje/DbnL7D3FO3To= ARC-Seal: i=1; s=arc-20170712; d=natalenko.name; t=1540654678; a=rsa-sha256; cv=none; b=o2cu3fHMjHuTK8eLoG90SGaLM0zX9nzeGrkEzIFReQNQBzZ5ta9aBM7Jsx9tRIHUAUJjklxXiXK3E+ZIixEHQnpte4I5ppwoyeqRTiX9mes0ms1L4/npyaVerz7M6I+fFmDjH5s45KqFYB4guvB3BfgLvCOwa2oudet6BYriqic= ARC-Authentication-Results: i=1; vulcan.natalenko.name; auth=pass smtp.auth=oleksandr@natalenko.name smtp.mailfrom=oleksandr@natalenko.name Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi. On 27.10.2018 15:43, Heiner Kallweit wrote: > In net-next there's the following patch which mentions in the > description that it "eliminates spurious list pointer poisoning": > 992cba7e276d ("net: Add and use skb_list_del_init().") > And spurious list pointer poisoning is what we see here (IMO). > > As an idea this patch and a8305bff6852 ("net: Add and use > skb_mark_not_on_list().") > from net-next could be applied on top of 4.19. Would be curious > whether it fixes the issue. Applied both, still panics. %r12/%r15 are still poisoned too. -- Oleksandr Natalenko (post-factum)