Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp2473274imd; Sun, 28 Oct 2018 10:46:13 -0700 (PDT) X-Google-Smtp-Source: AJdET5fIOzc/QFKndXeEMXvpmuA3yYhCHpw7zqTUjsfAQPabz/X86HCR6/G9U6cyYxDqcU16h05n X-Received: by 2002:a63:e841:: with SMTP id a1-v6mr10782530pgk.4.1540748773339; Sun, 28 Oct 2018 10:46:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540748773; cv=none; d=google.com; s=arc-20160816; b=VCZLw1viovPSnfzwXW0n7qgpj5QuJ9YXBHLDCqxi+Tdam/vtTOLtctOnLGdy5J/6ex Sf/VPcF3t2lzFCBqMIZFFoffrVotBbjWAsuopSKrExBLyPiyZjY/15lUOcJReliVs2lP omTbg5X0AN2AqaNa6B2BRsGfnoRE6b2ZDQR9v79ZLyUJ5e87V1hAfb0f1unBLOh4vTY+ eSmIPxJnlQVLH428MGn38IuePKBj/wu4kjJmiLDyqBzGrUW0z/51mh0im7OFICaHdbRE 2UcnYxzLDkB/U79gT0ChHi6zVVaT0grok3nFEIiPctagxqm/TUUqH7x9JYdCdW5kYlhW 0pcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=7iqZMUPeYOz75JUZQ94/oa/caSgylaR9IOYuSRoFvUI=; b=NMU6VGWeONw6P8IZHS/cEEriWzo3Bia15gq9L5xDsjtH86b/vUhw8NFC0KRjbGl/P9 BElILjWHcwtoC/6zBsMdFKAOl2qpFQXj8eDuhIzVdCF6yVDhk8PB5sM13l0IOXMi+iOx HJmHes1e8gNSoyRQW9FWVkwh8iMJOFOqX9NfGivFrVZ8akc1+ttUJuHRvsVz5Mf2ejMG XeGr68CVc08OJOy/fVu1/Udx/B/jBZiSijUoiaaE8Rj9GHqIFl5pCLOq7+jrtSXEc2lw vQRHumYpoYKBX/vYkKaU5MT7roNML7CJryC965pyAyROqAGXhojkm2+aTngxsugtgTYv R/EA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e4-v6si17518750pls.214.2018.10.28.10.45.57; Sun, 28 Oct 2018 10:46:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726692AbeJ2Car (ORCPT + 99 others); Sun, 28 Oct 2018 22:30:47 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:47754 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725816AbeJ2Caq (ORCPT ); Sun, 28 Oct 2018 22:30:46 -0400 Received: from localhost (c-67-183-62-245.hsd1.wa.comcast.net [67.183.62.245]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 0E38112130A6E; Sun, 28 Oct 2018 10:45:27 -0700 (PDT) Date: Sun, 28 Oct 2018 10:45:24 -0700 (PDT) Message-Id: <20181028.104524.345213764443487772.davem@davemloft.net> To: oleksandr@natalenko.name Cc: dave.taht@gmail.com, hkallweit1@gmail.com, toke@toke.dk, jhs@mojatatu.com, xiyou.wangcong@gmail.com, jiri@resnulli.us, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: CAKE and r8169 cause panic on upload in v4.19 From: David Miller In-Reply-To: <3d749bf1ec48ee9f4172b23bde84ec4b@natalenko.name> References: <20181027.214426.537959459795607171.davem@davemloft.net> <3d749bf1ec48ee9f4172b23bde84ec4b@natalenko.name> X-Mailer: Mew version 6.7 on Emacs 26 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Sun, 28 Oct 2018 10:45:27 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oleksandr Natalenko Date: Sun, 28 Oct 2018 13:22:09 +0100 > Hi. > > On 28.10.2018 05:44, David Miller wrote: >> Does this fix it? >> diff --git a/net/core/dev.c b/net/core/dev.c >> index 022ad73d6253..77d43ae2a7bb 100644 >> --- a/net/core/dev.c >> +++ b/net/core/dev.c >> @@ -5457,7 +5457,7 @@ static void gro_flush_oldest(struct list_head >> *head) >> /* Do not adjust napi->gro_hash[].count, caller is adding a new >> * SKB to the chain. >> */ >> - list_del(&oldest->list); >> + skb_list_del_init(oldest); >> napi_gro_complete(oldest); >> } > > Yes, but I had to apply both a8305bff6852 and 992cba7e276d too to get > it compiled. With these 3 patches the panic is not triggered any more > while having GRO enabled. > > Thanks! Thanks for testing, I'll queue this up for -stable too: From ece23711dd956cd5053c9cb03e9fe0668f9c8894 Mon Sep 17 00:00:00 2001 From: "David S. Miller" Date: Sun, 28 Oct 2018 10:35:12 -0700 Subject: [PATCH] net: Properly unlink GRO packets on overflow. Just like with normal GRO processing, we have to initialize skb->next to NULL when we unlink overflow packets from the GRO hash lists. Fixes: d4546c2509b1 ("net: Convert GRO SKB handling to list_head.") Reported-by: Oleksandr Natalenko Tested-by: Oleksandr Natalenko Signed-off-by: David S. Miller --- net/core/dev.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/core/dev.c b/net/core/dev.c index 022ad73d6253..77d43ae2a7bb 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -5457,7 +5457,7 @@ static void gro_flush_oldest(struct list_head *head) /* Do not adjust napi->gro_hash[].count, caller is adding a new * SKB to the chain. */ - list_del(&oldest->list); + skb_list_del_init(oldest); napi_gro_complete(oldest); } -- 2.17.2