Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp1679792rwb; Wed, 26 Jul 2023 17:05:34 -0700 (PDT) X-Google-Smtp-Source: APBJJlEtNP1RiIiOJKBMKAyL/fsppOxMzHHnjljWsXS8ONHwQeWoGcIehS7K3COapdFbJDBos+JT X-Received: by 2002:a05:6a21:9991:b0:126:9081:2156 with SMTP id ve17-20020a056a21999100b0012690812156mr3886452pzb.4.1690416333719; Wed, 26 Jul 2023 17:05:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690416333; cv=none; d=google.com; s=arc-20160816; b=LhGp71srwGcj+tQNzw+V7KmeyS30brJa7unvoXQDJHwP+Xa7NaOrhR2FGHhb0wPtJW +Mpp8HAqF4mWkgiJsuw2Auk+FHiTJP24nqIw5rgpUFK33t+0MQV0o+I08Jv1HjdYwsCc +gfVRlP4cjkEW2fG0MC0NH6MiHlR1ZXOvyT4IQj7J9F666X3EglHcWrPSjVc7AZ1OqBC A2yPrf0bwgsDkFLeqvfivlyW4YqTwixG8Pzssc7mS9PPKaDUVhYjlnpbATIvSZXmWdsH eDHLr8LX5yFADvCS20GTyBtfEep9h+Hlt9cULFUh1jszXXp6URfZkafAh0cGIwxj+2Cw eG5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:mime-version:date :dkim-signature:message-id; bh=Ag5ykdsFX9AwSYVql7wNkpXHMYBpUjCvWu9v3wp5JbY=; fh=oRB/Ll6CfaGojsLzptmZBHlV2E5wzE6rKnFk7Sxczek=; b=eemTvaVQj6yXrwdFBYxfzecb5jbvw8XKZqGvdZS+9jY481fln2JJEO1by2bmbfaC4r rmGMrZrHcosiRe0WCq7OGGUOHWuxmkHOkaIAh13zj8Cs440Rd28EyZD/1wuShAczEm5s VjQgD5IHltvA7ngT51MCxR4FtVhDSsTve+7s8jrpE5QDl6905IhXvaxqV2pxOhaGawEF SGQpFQpw7hf5xsS5tK8aRNO7nraNhR5CFV6unIjXvaLyzZlzSHs9s/gnuSF499la7oLf VqSKHidZUGNWJzG8VWBq1agYanFwDfyGe6Z95MT3EDakRQ3DkbY9Z+gYLLfp6kN99aT4 UzeQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=LRUggixE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j2-20020a056a00174200b0065024e5049bsi250938pfc.334.2023.07.26.17.05.15; Wed, 26 Jul 2023 17:05:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=LRUggixE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231157AbjGZXd5 (ORCPT + 99 others); Wed, 26 Jul 2023 19:33:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51276 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229687AbjGZXdz (ORCPT ); Wed, 26 Jul 2023 19:33:55 -0400 Received: from out-34.mta0.migadu.com (out-34.mta0.migadu.com [IPv6:2001:41d0:1004:224b::22]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 602132733 for ; Wed, 26 Jul 2023 16:33:49 -0700 (PDT) Message-ID: <1f91fe12-f9ff-06c8-4a5b-52dc21e6df05@linux.dev> DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1690414427; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Ag5ykdsFX9AwSYVql7wNkpXHMYBpUjCvWu9v3wp5JbY=; b=LRUggixEdn36elXOsCQvVZq8wUo0UpPRxXVkwZM7QFQaT8mR1UrZteCuwUf1PB44weS+7K aNeCRkyUwCNBp8oN/X9Xh7zD8PIkwhd1s/cUneoZTlcV4uD2+CC7B1InBV4MEIygRy7Sth PblYzXyrZvFa1ZwGFF61ghfhSfDquJs= Date: Wed, 26 Jul 2023 16:33:40 -0700 MIME-Version: 1.0 Subject: Re: [syzbot] [bpf?] WARNING: ODEBUG bug in tcx_uninstall Content-Language: en-US X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Martin KaFai Lau To: Leon Romanovsky Cc: Jakub Kicinski , Daniel Borkmann , syzbot , andrii@kernel.org, ast@kernel.org, bpf@vger.kernel.org, haoluo@google.com, john.fastabend@gmail.com, jolsa@kernel.org, kpsingh@kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, sdf@google.com, song@kernel.org, syzkaller-bugs@googlegroups.com, yhs@fb.com, Gal Pressman References: <000000000000ee69e80600ec7cc7@google.com> <91396dc0-23e4-6c81-f8d8-f6427eaa52b0@iogearbox.net> <20230726071254.GA1380402@unreal> <20230726082312.1600053e@kernel.org> <20230726170133.GX11388@unreal> <896cbaf8-c23d-e51a-6f5e-1e6d0383aed0@linux.dev> In-Reply-To: <896cbaf8-c23d-e51a-6f5e-1e6d0383aed0@linux.dev> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/26/23 11:16 AM, Martin KaFai Lau wrote: > On 7/26/23 10:01 AM, Leon Romanovsky wrote: >> On Wed, Jul 26, 2023 at 08:23:12AM -0700, Jakub Kicinski wrote: >>> On Wed, 26 Jul 2023 10:12:54 +0300 Leon Romanovsky wrote: >>>>> Thanks, I'll take a look this evening. >>>> >>>> Did anybody post a fix for that? >>>> >>>> We are experiencing the following kernel panic in netdev commit >>>> b57e0d48b300 (net-next/main) Merge branch '100GbE' of >>>> git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/next-queue >>> >>> Not that I know, looks like this is with Daniel's previous fix already >>> present, and syzbot is hitting it, too :( >> >> My naive workaround which restored our regression runs is: >> >> diff --git a/kernel/bpf/tcx.c b/kernel/bpf/tcx.c >> index 69a272712b29..10c9ab830702 100644 >> --- a/kernel/bpf/tcx.c >> +++ b/kernel/bpf/tcx.c >> @@ -111,6 +111,7 @@ void tcx_uninstall(struct net_device *dev, bool ingress) >>                          bpf_prog_put(tuple.prog); >>                  tcx_skeys_dec(ingress); >>          } >> -       WARN_ON_ONCE(tcx_entry(entry)->miniq_active); >> +       tcx_miniq_set_active(entry, false); > > Thanks for the report. I will look into it. I don't see how that may be triggered for now after Daniel's recent fix in commit dc644b540a2d ("tcx: Fix splat in ingress_destroy upon tcx_entry_free"). Do you have a small reproducible case? Thanks. > >>          tcx_entry_free(entry); >>   } >> > >