Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp2829967rwl; Thu, 13 Apr 2023 11:24:24 -0700 (PDT) X-Google-Smtp-Source: AKy350aR6ZJ3XV8h10vTzdNmtDKXv0GC+FA0wEhwgkLrq1fWqpGqPtUGFMGgDKnBCDSuZd0RnJtg X-Received: by 2002:a05:6a20:be08:b0:d3:76e0:89fd with SMTP id ge8-20020a056a20be0800b000d376e089fdmr2508012pzb.50.1681410264035; Thu, 13 Apr 2023 11:24:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681410264; cv=none; d=google.com; s=arc-20160816; b=J8QPg+LX9CtkTlMCcDVcTk89a2CDTLV5jEHiFfJGeVVGVXYX0KgoG4paaZXQ4YICLT xh9z6M1eCNflsxVodGmMXfrZipgbQMdTPztFAld2ADZSMU9AvhOGExFHOwglD0KmaVRc 1iMBwz7Wqpj+QPxxzihaW0CT6n9UaCy4xg8p/V8SdgNzTd+mHoaVhCsGRHLAhLHBaKk/ RRDuFdv2vDIyVJJuqG9Af8ScAHeaNoPWwdTq4B06IFRqapiQ+4AXCN9goi65z2UpO9CA gBSvD7gsPXHqi/3vwzVFk97hXO7KY6F7d8RA+BiTK7/mXq88XVcBBtEvUzlaxTsruivu M8XA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:feedback-id :dkim-signature; bh=Kh4f8LOv/N05we0ingeowtI9oIpu6/dYXCFm4olQziw=; b=kynPkCAcJdgZ4Ftq5UEkNdzkhPtHnwsd6oxngaHz0pkwnlYlZyVEv+30ciGouuZTdD W7YwKZmeSTAKS64QKXLTRSE+obNS6L3NWY0qpHgBWGA3IH6rOPr/FQ9YJiPQ3ADflr8W nEk6DI+PqfuqMMXe/tYFJtM6rf/LF4obhUgcw+ESK0COVUgaQRhIa2Mic4LOrUCCNPJr vR1eB3GkI7HdmT4PO5cJc1IO0RbLQdID2vuUl9IPKrK3IzCAOwc5mOjtjP1Bu7rY+slG bB5czmhXozKhi1QEHo3MGc2ctbUmkFW99tu75nT4TKRpAb3UVP+WLQrZfX+3CnGWKzED UUJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=GtkijS53; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i24-20020a63cd18000000b0050fae6024f8si2509313pgg.792.2023.04.13.11.24.09; Thu, 13 Apr 2023 11:24:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=GtkijS53; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229999AbjDMSTv (ORCPT + 99 others); Thu, 13 Apr 2023 14:19:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47286 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229933AbjDMSTt (ORCPT ); Thu, 13 Apr 2023 14:19:49 -0400 Received: from out1-smtp.messagingengine.com (out1-smtp.messagingengine.com [66.111.4.25]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1A3B4E6F; Thu, 13 Apr 2023 11:19:48 -0700 (PDT) Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 857315C00DF; Thu, 13 Apr 2023 14:19:47 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute4.internal (MEProxy); Thu, 13 Apr 2023 14:19:47 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-type:content-type:date:date :feedback-id:feedback-id:from:from:in-reply-to:in-reply-to :message-id:mime-version:references:reply-to:sender:subject :subject:to:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm3; t=1681409987; x=1681496387; bh=Kh4f8LOv/N05w e0ingeowtI9oIpu6/dYXCFm4olQziw=; b=GtkijS530SN0bfZi1gNOnrfH3GICi NQJ3rNhhFMefopocSkog5wqCHL9fOc4MIVdYAxi9Zb6SFBcZKRpqNSS1M3x9EI2m xe7iEXn80cY7TzfrpayDmRVc51E3wQdjasJ46kW9D0iYNOvxpJK7R8KXu8e83Nty +AsMNIg3locCcAOHZa6WE5Unkuq5c0THjPXpJpgw1qJYNo+iOddRaum0Xez7aBxp 11rKFyEnpS4c3JB8p5zMw1CNJs8DjX//mbEIrqrIJFMemYwbNR9z0lJq/gqqCqBn WZDqiA54yynqyEvn+MpDXZM5flNEUDiE4fPL0u+RwXEFhfURTxy6ajgzg== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvhedrvdekkedguddvhecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd enucfjughrpeffhffvvefukfhfgggtuggjsehttdertddttddvnecuhfhrohhmpefkugho ucfutghhihhmmhgvlhcuoehiughoshgthhesihguohhstghhrdhorhhgqeenucggtffrrg htthgvrhhnpeevieevgfeuleejgfeghefhuddviefhgeejhfehgeekgeevfefggefgudef hfelgfenucffohhmrghinhepihhpvhegrdhpihhnghenucevlhhushhtvghrufhiiigvpe dtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehiughoshgthhesihguohhstghhrdhorhhg X-ME-Proxy: Feedback-ID: i494840e7:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Thu, 13 Apr 2023 14:19:45 -0400 (EDT) Date: Thu, 13 Apr 2023 21:19:41 +0300 From: Ido Schimmel To: Mirsad Goran Todorovac Cc: netdev@vger.kernel.org, "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexei Starovoitov , Daniel Borkmann , Jesper Dangaard Brouer , John Fastabend , Nikolay Aleksandrov , Florent Fourcot , Hangbin Liu , Petr Machata , Jiri Pirko , Xin Long , linux-kernel@vger.kernel.org, bpf@vger.kernel.org, Jay Vosburgh , Andy Gospodarek Subject: Re: [BUG] [FIXED: TESTED] kmemleak in rtnetlink_rcv() triggered by selftests/drivers/net/team in build cdc9718d5e59 Message-ID: References: <78a8a03b-6070-3e6b-5042-f848dab16fb8@alu.unizg.hr> <67b3fa90-ad29-29f1-e6f3-fb674d255a1e@alu.unizg.hr> <7650b2eb-0aee-a2b0-2e64-c9bc63210f67@alu.unizg.hr> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7650b2eb-0aee-a2b0-2e64-c9bc63210f67@alu.unizg.hr> X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL, SPF_HELO_PASS,SPF_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 10, 2023 at 07:34:09PM +0200, Mirsad Goran Todorovac wrote: > I've ran "make kselftest" with vanilla torvalds tree 6.3-rc5 + your patch. > > It failed two lines after "enslaved device client - ns-A IP" which passed OK. > > Is this hang for 5 hours in selftests: net: fcnal-test.sh test, at the line > (please see to the end): It's not clear to me if the test failed for you or just got stuck. The output below is all "[ OK ]". I ran the test with my patch and got: Tests passed: 875 Tests failed: 5 I don't believe the failures are related to my patch given the test doesn't use bonding. See more below. > > # ########################################################################### > # IPv4 address binds > # ########################################################################### > # > # > # ################################################################# > # No VRF > # > # SYSCTL: net.ipv4.ping_group_range=0 2147483647 > # > # TEST: Raw socket bind to local address - ns-A IP [ OK ] > # TEST: Raw socket bind to local address after device bind - ns-A IP [ OK ] > # TEST: Raw socket bind to local address - ns-A loopback IP [ OK ] > # TEST: Raw socket bind to local address after device bind - ns-A loopback IP [ OK ] > # TEST: Raw socket bind to nonlocal address - nonlocal IP [ OK ] > # TEST: TCP socket bind to nonlocal address - nonlocal IP [ OK ] > # TEST: ICMP socket bind to nonlocal address - nonlocal IP [ OK ] > # TEST: ICMP socket bind to broadcast address - broadcast [ OK ] > # TEST: ICMP socket bind to multicast address - multicast [ OK ] > # TEST: TCP socket bind to local address - ns-A IP [ OK ] > # TEST: TCP socket bind to local address after device bind - ns-A IP [ OK ] > # > # ################################################################# > # With VRF > # > # SYSCTL: net.ipv4.ping_group_range=0 2147483647 > # > # TEST: Raw socket bind to local address - ns-A IP [ OK ] > # TEST: Raw socket bind to local address after device bind - ns-A IP [ OK ] > # TEST: Raw socket bind to local address after VRF bind - ns-A IP [ OK ] > # TEST: Raw socket bind to local address - VRF IP [ OK ] > # TEST: Raw socket bind to local address after device bind - VRF IP [ OK ] > # TEST: Raw socket bind to local address after VRF bind - VRF IP [ OK ] > # TEST: Raw socket bind to out of scope address after VRF bind - ns-A loopback IP [ OK ] > # TEST: Raw socket bind to nonlocal address after VRF bind - nonlocal IP [ OK ] > # TEST: TCP socket bind to nonlocal address after VRF bind - nonlocal IP [ OK ] > # TEST: ICMP socket bind to nonlocal address after VRF bind - nonlocal IP [ OK ] > # TEST: ICMP socket bind to broadcast address after VRF bind - broadcast [ OK ] > # TEST: ICMP socket bind to multicast address after VRF bind - multicast [ OK ] > # TEST: TCP socket bind to local address - ns-A IP [ OK ] > # TEST: TCP socket bind to local address after device bind - ns-A IP [ OK ] > # TEST: TCP socket bind to local address - VRF IP [ OK ] > # TEST: TCP socket bind to local address after device bind - VRF IP [ OK ] > # TEST: TCP socket bind to invalid local address for VRF - ns-A loopback IP [ OK ] > # TEST: TCP socket bind to invalid local address for device bind - ns-A loopback IP [ OK ] > # > # ########################################################################### > # Run time tests - ipv4 > # ########################################################################### > # > # TEST: Device delete with active traffic - ping in - ns-A IP [ OK ] > # TEST: Device delete with active traffic - ping in - VRF IP [ OK ] > # TEST: Device delete with active traffic - ping out - ns-B IP [ OK ] > # TEST: TCP active socket, global server - ns-A IP [ OK ] > # TEST: TCP active socket, global server - VRF IP [ OK ] > # TEST: TCP active socket, VRF server - ns-A IP [ OK ] > # TEST: TCP active socket, VRF server - VRF IP [ OK ] > # TEST: TCP active socket, enslaved device server - ns-A IP [ OK ] > # TEST: TCP active socket, VRF client - ns-A IP [ OK ] > # TEST: TCP active socket, enslaved device client - ns-A IP [ OK ] > # TEST: TCP active socket, global server, VRF client, local - ns-A IP [ OK ] > # TEST: TCP active socket, global server, VRF client, local - VRF IP [ OK ] > # TEST: TCP active socket, VRF server and client, local - ns-A IP [ OK ] > # TEST: TCP active socket, VRF server and client, local - VRF IP [ OK ] > # TEST: TCP active socket, global server, enslaved device client, local - ns-A IP [ OK ] > # TEST: TCP active socket, VRF server, enslaved device client, local - ns-A IP [ OK ] > # TEST: TCP active socket, enslaved device server and client, local - ns-A IP [ OK ] > # TEST: TCP passive socket, global server - ns-A IP [ OK ] > # TEST: TCP passive socket, global server - VRF IP [ OK ] > # TEST: TCP passive socket, VRF server - ns-A IP [ OK ] > # TEST: TCP passive socket, VRF server - VRF IP [ OK ] > # TEST: TCP passive socket, enslaved device server - ns-A IP [ OK ] > # TEST: TCP passive socket, VRF client - ns-A IP [ OK ] > # TEST: TCP passive socket, enslaved device client - ns-A IP [ OK ] > # TEST: TCP passive socket, global server, VRF client, local - ns-A IP [ OK ] > > Hope this helps. > > I also have a iwlwifi DEADLOCK and I don't know if these should be reported independently. > (I don't think it is related to the patch.) If the test got stuck, then it might be related to the deadlock in iwlwifi. Try running the test without iwlwifi and see if it helps. If not, I suggest starting a different thread about this issue. Will submit the bonding patch over the weekend. Thanks for testing