Re: localed stuck in recent 3.18 git in copy_net_ns?

2014-10-22 Thread Cong Wang
(Adding Paul and Eric in Cc) I am not aware of any change in net/core/dev.c related here, so I guess it's a bug in rcu_barrier(). Thanks. On Wed, Oct 22, 2014 at 10:12 AM, Josh Boyer wrote: > > Someone else is seeing this when they try and modprobe ppp_generic: > > [ 240.599195] INFO: task kwo

Re: [PATCH] bridge: include in6.h in if_bridge.h for struct in6_addr

2014-11-04 Thread Cong Wang
t; > and the following glibc commit: > 6c82a2f8d7c8e21e39237225c819f182ae438db3 Coordinate IPv6 definitions for > Linux and glibc > > so actually include the header now. > > Reported-by: Colin Guthrie > Reported-by: Christiaan Welvaart > Reported-by: Thomas Backlund > Cc: Florian Fainelli &

Re: [PATCH] netdev: Fix sleeping inside wait event

2014-10-29 Thread Cong Wang
(Adding netdev@...) On Wed, Oct 29, 2014 at 9:16 AM, Peter Zijlstra wrote: > > Dave, this relies on bits currently in tip/sched/core, if you're ok I'll > merge it through that tree. > > --- > Subject: netdev: Fix sleeping inside wait event > From: Peter Zijlstra > Date: Wed Oct 29 17:04:56 CET 2

Re: [PATCH net-next] net: core: Quiet W=1 warnings for unused vars and static functions

2014-10-06 Thread Cong Wang
On Mon, Oct 6, 2014 at 2:51 PM, Joe Perches wrote: > John, can you please verify that these gen_stats accesses > are unnecessary? I believe the compiler can elide them in > any case, but I'm not sure what you intended here. > > net/core/dev.c | 4 ++-- > net/core/gen_stats.c | 4 > ne

Re: Please backport commit 3812c8c8f39 to stable

2014-10-02 Thread Cong Wang
Hello again, I realized it is a series of patch actually: 3812c8c8f3953921ef18544110dafc3505c1ac62 mm: memcg: do not trap chargers with full callstack on OOM fb2a6fc56be66c169f8b80e07ed999ba453a2db2 mm: memcg: rework and document OOM waiting and wakeup 519e52473ebe9db5cdef44670d5a97f1fd53d721 mm:

Re: Please backport commit 3812c8c8f39 to stable

2014-10-03 Thread Cong Wang
On Fri, Oct 3, 2014 at 8:13 AM, Michal Hocko wrote: > > That commit fixes an OOM deadlock. Not a soft lockup. Do you have the > OOM killer report from the log? This would tell us that the killed task > was indeed sleeping on the lock which is hold by the charger which > triggered the OOM. I am lit

Re: Please backport commit 3812c8c8f39 to stable

2014-10-03 Thread Cong Wang
On Fri, Oct 3, 2014 at 8:37 AM, Michal Hocko wrote: > On Thu 02-10-14 14:04:08, Cong Wang wrote: >> Hello again, >> >> I realized it is a series of patch actually: >> >> 3812c8c8f3953921ef18544110dafc3505c1ac62 mm: memcg: do not trap >&

Re: Please backport commit 3812c8c8f39 to stable

2014-10-03 Thread Cong Wang
On Fri, Oct 3, 2014 at 11:16 AM, Cong Wang wrote: > > Why not? OOM killer tries to kill a process sleeping on a mutex it already > holds, why not a deadlock? Given the fact that both are lots of inode mutex > hung because of OOM, I am 90% sure they are the same. > I backported t

Re: veths often slow to come up

2015-08-04 Thread Cong Wang
(Cc'ing netdev for network issues) On Tue, Aug 4, 2015 at 6:42 AM, Shaun Crampton wrote: > Please CC me on any responses, thanks. > > Setting both ends of a veth to be oper UP completes very quickly but I > find that pings only start flowing over the veth after about a second. > This seems to cor

Re: [PATCH] ipv6:Fix concurrent access issue in the function inet6_rtm_deladdr

2015-08-04 Thread Cong Wang
On Tue, Aug 4, 2015 at 7:39 PM, Nicholas Krause wrote: > From: Nicholas Krause > > This fixes the issue with conncurrent access when calling the function > inte6_addr_del due to this function using non locked wrapper versions > of certain functions by locking the routing mutex before and after th

Re: [PATCH v2 net-next 2/2] RDS-TCP: Support multiple RDS-TCP listen endpoints, one per netns.

2015-08-04 Thread Cong Wang
On Mon, Aug 3, 2015 at 10:29 PM, Sowmini Varadhan wrote: > +static struct pernet_operations rds_tcp_net_ops = { > + .init = rds_tcp_init_net, > + .exit = rds_tcp_exit_net, > + .id = &rds_tcp_netid, > + .size = sizeof(struct rds_tcp_net), > +}; > + > +static void rds_tcp_kil

Re: [PATCH] sched: let __sched_period() use rq cfs's nr_running

2015-07-07 Thread Cong Wang
On Mon, Jul 6, 2015 at 9:40 PM, wrote: > From: Byungchul Park > > __sched_period() returns a period which a rq can have. the period has to be > stretched by the number of task *the rq has*, when nr_running > nr_latency. > otherwise, task slice can be very smaller than sysctl_sched_min_granularit

Re: [PATCH v2] sched: introduce sched_switch_post trace event

2015-07-08 Thread Cong Wang
On Mon, Jul 6, 2015 at 5:15 PM, Steven Rostedt wrote: > On Mon, 6 Jul 2015 12:15:45 -0700 > Cong Wang wrote: > >> Currently we only have one sched_switch trace event >> for task switching, which is generated very early during >> task switch. When we try to monitor p

Re: [PATCH v2] sched: introduce sched_switch_post trace event

2015-07-08 Thread Cong Wang
On Mon, Jul 6, 2015 at 11:45 PM, Peter Zijlstra wrote: > On Mon, Jul 06, 2015 at 12:15:45PM -0700, Cong Wang wrote: >> Currently we only have one sched_switch trace event >> for task switching, which is generated very early during >> task switch. When we try to monit

BUG kmalloc-64 (Not tainted): Poison overwritten

2015-08-25 Thread Cong Wang
Hi, Michael I just got the following kernel bug while working on Dave's net tree in a KVM guest. It looks like a bug in virtio. Let me know if you need more information. [ 69.816089] BUG kmalloc-64 (Not tainted): Poison overwritten [ 69.816089] -

Re: BUG kmalloc-64 (Not tainted): Poison overwritten

2015-08-25 Thread Cong Wang
On Tue, Aug 25, 2015 at 2:11 PM, Cong Wang wrote: > Hi, Michael > > I just got the following kernel bug while working on Dave's net tree > in a KVM guest. It looks like a bug in virtio. > Hmm, the stack trace is misleading, it could be caused by my own networking code even th

Re: recent updates to networking (26b552e0a85ba7e74d384a9624d83118d38071f7) cause softlocks

2015-08-15 Thread Cong Wang
(CC'ing netdev) On Sat, Aug 15, 2015 at 7:20 PM, Jon Christopherson wrote: > Hello All, > > the recent commit (26b552e0a85ba7e74d384a9624d83118d38071f7) causes > softlocks on my system using the e1000e driver. Kernel builds before this > commit do not experience the behavior. I have opened a bug

Re: linux-4.6/net/kcm/kcmsock.c:1508: bad if test ?

2016-05-17 Thread Cong Wang
On Mon, May 16, 2016 at 11:40 AM, David Binderman wrote: > Hello there, > > linux-4.6/net/kcm/kcmsock.c:1508]: (style) Checking if unsigned > variable 'copied' is less than zero. > > Source code is > > if (copied < 0) { > > but > >size_t copied; > > Suggest code rework. Thanks for the rep

Re: linux-4.6/net/kcm/kcmsock.c:1508: bad if test ?

2016-05-17 Thread Cong Wang
On Tue, May 17, 2016 at 9:44 AM, David Miller wrote: > From: Cong Wang > Date: Tue, 17 May 2016 09:04:21 -0700 > >> On Mon, May 16, 2016 at 11:40 AM, David Binderman >> wrote: >>> Hello there, >>> >>> linux-4.6/net/kcm/kcmsock.c:1508]: (style) Ch

Re: net: heap-out-of-bounds in sock_setsockopt

2015-12-16 Thread Cong Wang
On Wed, Dec 16, 2015 at 11:34 AM, Dmitry Vyukov wrote: > BUG: KASAN: slab-out-of-bounds in sock_setsockopt+0x1284/0x13d0 at > addr 88006563ec10 > Read of size 4 by task syzkaller_execu/4755 > = > BUG RAWv6 (Not tainted

Re: [PATCH] net: Fix potential NULL pointer dereference in __skb_try_recv_datagram

2015-12-30 Thread Cong Wang
On Wed, Dec 30, 2015 at 6:30 AM, Jacob Siverskog wrote: > On Wed, Dec 30, 2015 at 2:26 PM, Eric Dumazet wrote: >> How often can you trigger this bug ? > > Ok. I don't have a good repro to trigger it unfortunately, I've seen it just a > few times when bringing up/down network interfaces. Does the

Re: net/nfc: GPF in llcp_sock_getname

2016-01-01 Thread Cong Wang
On Fri, Jan 1, 2016 at 5:58 AM, Dmitry Vyukov wrote: > > kasan: GPF could be caused by NULL-ptr deref or user memory > accessgeneral protection fault: [#51] SMP KASAN > Modules linked in: > CPU: 2 PID: 4207 Comm: a.out Not tainted 4.4.0-rc7+ #184 > Hardware name: QEMU Standard PC (i440FX + PI

Re: net/nfc: GPF in llcp_sock_getname

2016-01-01 Thread Cong Wang
On Fri, Jan 1, 2016 at 12:58 PM, Cong Wang wrote: > > It looks like we forget to initialize ->service_name_len > and ->servicce_name before bind(). Never mind, __GFP_ZERO is passed in sk_alloc()... -- To unsubscribe from this list: send the line "unsubscribe linux-kern

Re: net/nfc: GPF in llcp_sock_getname

2016-01-01 Thread Cong Wang
On Fri, Jan 1, 2016 at 5:58 AM, Dmitry Vyukov wrote: > GPF seems to be caused by a data race on socket state. Seems you are right, I think the following patch should work: diff --git a/net/nfc/llcp_sock.c b/net/nfc/llcp_sock.c index ecf0a01..5a91997 100644 --- a/net/nfc/llcp_sock.c +++ b/net/nfc

Re: [PATCH] rtnl: RTM_GETNETCONF: fix wrong return value

2016-02-17 Thread Cong Wang
On Tue, Feb 16, 2016 at 6:43 PM, Anton Protopopov wrote: > An error response from a RTM_GETNETCONF request can return the positive > error value EINVAL in the struct nlmsgerr that can mislead userspace. > > Signed-off-by: Anton Protopopov LGTM, Acked-by: Cong Wang

Re: [PATCH] IPIP tunnel performance improvement

2016-02-26 Thread Cong Wang
On Fri, Feb 26, 2016 at 8:40 PM, zhao ya wrote: > From: Zhao Ya > Date: Sat, 27 Feb 2016 10:06:44 +0800 > Subject: [PATCH] IPIP tunnel performance improvement > > bypass the logic of each packet's own neighbour creation when using > pointopint or loopback device. > > Recently, in our tests, met a

Re: net: memory leak in mkiss_open

2016-02-23 Thread Cong Wang
On Mon, Feb 22, 2016 at 2:05 AM, Dmitry Vyukov wrote: > unreferenced object 0x8800628991d8 (size 4096): > comm "a.out", pid 7081, jiffies 4294920662 (age 35.917s) > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 61 78 30 00 00 00 00 00 ax0. > 00 00 00 00 00 00 00

Re: [PATCH net-next] tun: return NET_XMIT_DROP for dropped packets

2014-11-19 Thread Cong Wang
On Wed, Nov 19, 2014 at 11:46 AM, David Miller wrote: > > Often the issue with TX return values is lack of clear documentation > and use cases. > NET_XMIT_* are marked as qdisc ->enqueue() return codes in include/linux/netdevice.h, and are indeed used mostly by qdisc: $ git grep NET_XMIT_ -- net

Re: [PATCH net-next] tun: return NET_XMIT_DROP for dropped packets

2014-11-18 Thread Cong Wang
On Mon, Nov 17, 2014 at 9:20 PM, Jason Wang wrote: > After commit 5d097109257c03a71845729f8db6b5770c4bbedc > ("tun: only queue packets on device"), NETDEV_TX_OK was returned for > dropped packets. This will confuse pktgen since dropped packets were > counted as sent ones. > > Fixing this by return

Re: [PATCH net-next 1/4] net: allow large number of rx queues

2014-11-18 Thread Cong Wang
On Tue, Nov 18, 2014 at 8:22 AM, Pankaj Gupta wrote: > > As vmalloc() adds overhead on a critical network path, > __GFP_REPEAT flag is used with kzalloc() to do this fallback > only when really needed. > Are you sure we need __GFP_REPEAT? We have vmalloc() as fallback of kmalloc() in many places

Re: + freezer-check-oom-kill-while-being-frozen.patch added to -mm tree

2014-10-16 Thread Cong Wang
On Thu, Oct 16, 2014 at 1:39 PM, Oleg Nesterov wrote: >> Fix the issue by checking for TIF_MEMDIE thread flag and get away from the >> fridge if it is set. oom_scan_process_thread doesn't have to check for >> the frozen task anymore because do_send_sig_info will wake up the thread >> and TIF_MEMD

Re: + freezer-check-oom-kill-while-being-frozen.patch added to -mm tree

2014-10-16 Thread Cong Wang
On Thu, Oct 16, 2014 at 2:11 PM, Oleg Nesterov wrote: > > But also I can't understand why this patch helps. The changelog says: > > do_send_sig_info will wake up the thread > > why? > This is a question for Michal who rewrites my changelog: http://marc.info/?l=linux-kernel&m=140986986423

Re: + freezer-check-oom-kill-while-being-frozen.patch added to -mm tree

2014-10-16 Thread Cong Wang
On Thu, Oct 16, 2014 at 2:35 PM, Oleg Nesterov wrote: > > If a task B is already frozen, it sleeps in D state. > > If OOM selects B as a victim after that, it won't be woken by > SIGKILL, thus it obviously can't call should_thaw_current() and > notice TIF_MEMDIE. I see your point now, it would be

Re: + freezer-check-oom-kill-while-being-frozen.patch added to -mm tree

2014-10-16 Thread Cong Wang
On Thu, Oct 16, 2014 at 3:22 PM, Oleg Nesterov wrote: > On 10/16, Cong Wang wrote: >> >> On Thu, Oct 16, 2014 at 2:35 PM, Oleg Nesterov wrote: >> > >> > If a task B is already frozen, it sleeps in D state. >> > >> > If OOM selects B as a victim

Re: [PATCH 0/3] OOM vs. freezer interaction fixes

2014-10-08 Thread Cong Wang
se > the 1st patch basically opens a race window fixed by the later patch. > Original patch from Cong Wang has covered this by cgroup_freezing(current) > check in should_thaw_current(). But this approach still suffers from OOM > vs. PM freezer interaction (OOM killer would still live loc

Re: Please backport commit 3812c8c8f39 to stable

2014-10-08 Thread Cong Wang
On Tue, Oct 7, 2014 at 5:33 AM, Michal Hocko wrote: > On Fri 03-10-14 11:16:31, Cong Wang wrote: >> I am sorry to confuse you that it is my the above test case which caused >> this bug. No, we saw this bug in *production* in our data center, it happened >> on 30+ machines!

Re: [PATCH] net sched: text ematch: zero out ts_state before using it

2014-10-09 Thread Cong Wang
On Thu, Oct 9, 2014 at 9:05 AM, Omar Sandoval wrote: > textsearch_find zeroes out the offset, but the control buffer (which may or > may > not matter in this case) needs to be zeroed out as well. Why? skb_prepare_seq_read() initializes the cb. Also, the comment says: * @state: uninitialized t

Re: We've released a generic netlink python library -- gnlpy

2015-05-20 Thread Cong Wang
On Wed, May 20, 2015 at 2:10 PM, Alex Gartrell wrote: > Hey everyone, > > tl;dr; pure python generic netlink library with simple clients for ipvs and > taskstats here: https://github.com/facebook/gnlpy libnl should have python support for generic netlink too: $ ls python/netlink/genl/ capi.i __

Re: [PATCH net-next] bridge: allow setting hash_max + multicast_router if interface is down

2015-05-21 Thread Cong Wang
On Thu, May 21, 2015 at 5:56 PM, Linus Lüssing wrote: > diff --git a/net/bridge/br_multicast.c b/net/bridge/br_multicast.c > index 2d69d5c..066199e 100644 > --- a/net/bridge/br_multicast.c > +++ b/net/bridge/br_multicast.c > @@ -1775,8 +1775,6 @@ int br_multicast_set_router(struct net_bridge *br,

Re: [PATCH net-next] bridge: allow setting hash_max + multicast_router if interface is down

2015-05-21 Thread Cong Wang
On Thu, May 21, 2015 at 8:17 PM, Herbert Xu wrote: > On Thu, May 21, 2015 at 08:11:32PM -0700, Cong Wang wrote: >> >> For me it looks like we do use p->rlist in BH context, but I could easily >> miss something here. > > Because the caller disables BH for us. > R

Re: [PATCHv2 net-next] bridge: allow setting hash_max + multicast_router if interface is down

2015-05-22 Thread Cong Wang
On Fri, May 22, 2015 at 6:32 AM, Linus Lüssing wrote: > Changelog v2: > * remove another now unnecessary -ENOENT initialization > * consistently initialize to -EINVAL, allowing to shorten two switch-cases > Looks perfect now. :) Thanks for update. -- To unsubscribe from this list: send the line

Re: [PATCH] bridge: fix parsing of MLDv2 reports

2015-05-22 Thread Cong Wang
On Fri, May 22, 2015 at 8:18 AM, Thadeu Lima de Souza Cascardo wrote: > When more than a multicast address is present in a MLDv2 report, all but > the first address is ignored, because the code breaks out of the loop if > there has not been an error adding that address. > > This has caused failure

Re: kernel >= 4.0: crashes when using traceroute6 with isatap

2015-05-06 Thread Cong Wang
(Cc'ing netdev.) On Sat, May 2, 2015 at 5:29 AM, Wolfgang Walter wrote: > Am Samstag, 2. Mai 2015, 02:16:36 schrieb Wolfgang Walter: >> Hello, >> >> kernel 4.0 (and 4.0.1) crashes immediately when I use traceroute6 with an >> isatap-tunnel. > > I did some further tests. To trigger the crash you n

Re: Probably bug in netfilter hashlimit extension

2015-05-11 Thread Cong Wang
(Cc'ing netdev and netfilter-devel) On Mon, May 11, 2015 at 2:29 AM, Klaus Ethgen wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Recently I tried to mitigate some slow attacks via netfilter rule > utilizing hashlimit target. I used the following specification: > >-A DETECT_INV

Re: [PATCH] vxlan: Wrong type passed to %pIS

2015-02-06 Thread Cong Wang
On Fri, Feb 6, 2015 at 6:17 PM, Rasmus Villemoes wrote: > src_ip is a pointer to a union vxlan_addr, one member of which is a > struct sockaddr. Passing a pointer to src_ip is wrong; one should pass > the value of src_ip itself. Since %pIS formally expects something of > type struct sockaddr*, let

Re: [PATCH] vxlan: Wrong type passed to %pIS

2015-02-07 Thread Cong Wang
On Sat, Feb 7, 2015 at 4:34 AM, Rasmus Villemoes wrote: > On Sat, Feb 07 2015, Cong Wang wrote: > >> On Fri, Feb 6, 2015 at 6:17 PM, Rasmus Villemoes >> wrote: >>> src_ip is a pointer to a union vxlan_addr, one member of which is a >>> struct sockaddr. Passi

Re: [WARNING] CPU: 27 PID: 6295 at kernel/sched/core.c:7300 __might_sleep+0xbd/0xd0()

2015-02-04 Thread Cong Wang
On Wed, Feb 4, 2015 at 1:57 AM, Jinpu Wang wrote: > Hi, > > I hit WARNING below after update to 3.19-rc6, when I running fio with libaio. > Any one see this warning before, or maybe know how to fix it? > > From the call trace: > (gdb) list *read_events+0x1e8 > 0x81225ad8 is in read_events

Re: xt_recent broken in kernel 3.19.0 + PATCH

2015-02-11 Thread Cong Wang
(Cc'ing netdev and netfilter-devel lists) On Wed, Feb 11, 2015 at 10:31 AM, Chris Vine wrote: > On Wed, 11 Feb 2015 09:28:34 + > Chris Vine wrote: >> With kernel 3.19.0, the following iptables rule, where SSH_TRIES is >> set to 4: >> >> iptables -D SSH_CHAIN -m conntrack --ctstate NEW \ >>

Re: Possible Bug in gnet_start_copy_compat for the file,gen_stats.c

2015-02-12 Thread Cong Wang
On Thu, Feb 12, 2015 at 6:33 PM, nick wrote: > Greets to Everyone, > I am wondering after running sparse on the latest mainline tree why we are > not unlocking the spinlock_bh,lock when calling the function, > gnet_stats_start_copy_compat at the end of this function's body. Unless > someone can

Re: [PATCH net-next v2 1/3] ipv6: replace global gc_args with local variable

2016-03-08 Thread Cong Wang
riable which will be needed once multiple > instances (per netns) of garbage collector are allowed. > > Signed-off-by: Michal Kubecek Reviewed-by: Cong Wang Thanks.

Re: [PATCH net-next v2 2/3] ipv6: per netns fib6 walkers

2016-03-08 Thread Cong Wang
ers in other namespaces. > > Replace the global list with per-netns lists (and give each its own > lock). > > Signed-off-by: Michal Kubecek > --- > v2: get rid of ifdef in ipv6_route_seq_setup_walk(), pass net from > callers instead Reviewed-by: Cong Wang

Re: [PATCH net-next v2 3/3] ipv6: per netns FIB garbage collection

2016-03-08 Thread Cong Wang
gt; Signed-off-by: Michal Kubecek Reviewed-by: Cong Wang

Re: [PATCH net] net: sched: do not requeue a NULL skb

2016-04-06 Thread Cong Wang
On Wed, Apr 6, 2016 at 6:10 AM, Lars Persson wrote: > A failure in validate_xmit_skb_list() triggered an unconditional call > to dev_requeue_skb with skb=NULL. This slowly grows the queue > discipline's qlen count until all traffic through the queue stops. > Sounds reasonable. > Fixes: 55a93b3ea

Re: net: memory leak due to CLONE_NEWNET

2016-04-02 Thread Cong Wang
On Sat, Apr 2, 2016 at 6:55 AM, Dmitry Vyukov wrote: > Hello, > > The following program leads to memory leaks in: > > unreferenced object 0x88005c10d208 (size 96): > comm "a.out", pid 10753, jiffies 4296778619 (age 43.118s) > hex dump (first 32 bytes): > e8 31 85 2d 00 88 ff ff 0f 00 0

Re: [PATCH net v2] net: sched: do not requeue a NULL skb

2016-04-11 Thread Cong Wang
he case of skb=NULL. So should it be there in this patch, another patch >>> or not at all ? >> >> >> Then maybe change return code ? >> >> It seems strange that a validate_xmit_skb_list() failure stops the >> __qdisc_run() loop but schedules another ro

Re: [PATCH net v2] net: sched: do not requeue a NULL skb

2016-04-11 Thread Cong Wang
xmit_skb_list() failure stops the >> > __qdisc_run() loop but schedules another round. >> > >> > >> >> It was suggested by Cong Wang to return 0 in order to stop the loop. Do >> you guys agree that the loop should be stopped for such failures ?

Re: [PATCH net v2] net: sched: do not requeue a NULL skb

2016-04-11 Thread Cong Wang
On Mon, Apr 11, 2016 at 11:30 AM, Eric Dumazet wrote: > On Mon, 2016-04-11 at 11:26 -0700, Eric Dumazet wrote: >> On Mon, 2016-04-11 at 11:02 -0700, Cong Wang wrote: >> >> > I am fine with either way as long as the loop stops on failure. > > > Note that skb that

Re: GPF in do_raw_spin_lock on Linux 4.1

2015-09-30 Thread Cong Wang
(Cc'ing Jamal) On Wed, Sep 30, 2015 at 5:49 PM, Vinson Lee wrote: > Hi. > > We've hit this GPF on several different machines on Linux 4.1. > > general protection fault: [#1] SMP > Modules linked in: sch_htb cls_basic act_mirred cls_u32 veth > sch_ingress netconsole configfs cpufreq_ondemand

Re: net: lockdep warning in ip_mc_msfget (net/ipv4/igmp.c:2400)

2015-11-02 Thread Cong Wang
On Mon, Nov 2, 2015 at 7:22 AM, Sasha Levin wrote: > Hi all, > > While fuzzing with syzkaller inside a KVM tools guest running the latest > -next, I saw > the following warning: > > [ 2391.993558] == > [ 2391.995441] [ INFO: possible circular lo

Re: net: lockdep warning in ip_mc_msfget (net/ipv4/igmp.c:2400)

2015-11-02 Thread Cong Wang
On Mon, Nov 2, 2015 at 1:31 PM, Cong Wang wrote: > > Good catch! > > This is probably introduced by: > > commit baf606d9c9b12517e47e0d1370e8aa9f7323f210 > Author: Marcelo Ricardo Leitner > Date: Wed Mar 18 14:50:42 2015 -0300 > > ipv4,ipv6: grab rtnl befo

Re: kernel panic in 4.2.3, rb_erase in sch_fq

2015-11-03 Thread Cong Wang
On Mon, Nov 2, 2015 at 6:11 AM, Denys Fedoryshchenko wrote: > Hi! > > Actually seems i was getting this panic for a while (once per week) on > loaded pppoe server, but just now was able to get full panic message. > After checking commit logs on sch_fq.c i didnt seen any fixes, so probably > upgrad

Re: general protection fault in cbs_destroy

2019-09-09 Thread Cong Wang
On Sun, Sep 8, 2019 at 12:29 AM Hillf Danton wrote: > > > > syzbot found the following crash on Sat, 07 Sep 2019 23:08:08 -0700 > > > > HEAD commit:3b47fd5c Merge tag 'nfs-for-5.3-4' of git://git.linux-nfs... > > git tree: upstream > > console output: https://syzkaller.appspot.com/x/log.

Re: WARNING in cbs_dequeue_soft

2019-09-09 Thread Cong Wang
#syz fix: net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate

Re: general protection fault in qdisc_put

2019-09-09 Thread Cong Wang
On Sun, Sep 8, 2019 at 10:19 AM Linus Torvalds wrote: > I see two solutions: > > (a) move the > > q->qdisc = &noop_qdisc; > > up earlier in sfb_init(), so that qdisc is always initialized > after sfb_init(), even on failure. > > (b) just make qdisc_put(NULL) just silently work as a

Re: [v2] net_sched: act_police: add 2 new attributes to support police 64bit rate and peakrate

2019-08-30 Thread Cong Wang
On Fri, Aug 30, 2019 at 12:06 PM David Dai wrote: > - if (p->peak_present) > + if ((police->params->rate.rate_bytes_ps >= (1ULL << 32)) && > + nla_put_u64_64bit(skb, TCA_POLICE_RATE64, > + police->params->rate.rate_bytes_ps,

Re: [v2] net_sched: act_police: add 2 new attributes to support police 64bit rate and peakrate

2019-08-30 Thread Cong Wang
On Fri, Aug 30, 2019 at 1:03 PM David Z. Dai wrote: > > On Fri, 2019-08-30 at 12:11 -0700, Cong Wang wrote: > > On Fri, Aug 30, 2019 at 12:06 PM David Dai wrote: > > > - if (p->peak_present) > > > + if ((police->param

[PATCH v3] tracing: Introduce trace event injection

2019-09-04 Thread Cong Wang
s_write => ksys_write => do_syscall_64 => entry_SYSCALL_64_after_hwframe The only thing that can't be injected is string pointers as they require constant string pointers, this can't be done at run time. Cc: Steven Rostedt Cc: Ingo Molnar Signed-off-by: Cong Wang --- v3:

Re: [v3] net_sched: act_police: add 2 new attributes to support police 64bit rate and peakrate

2019-09-05 Thread Cong Wang
by: David Dai > Signed-off-by: David Dai Acked-by: Cong Wang Thanks.

Re: INFO: rcu detected stall in addrconf_dad_work

2019-09-10 Thread Cong Wang
#syz fix: sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero

Re: INFO: rcu detected stall in br_handle_frame

2019-09-10 Thread Cong Wang
#syz fix: sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero

Re: BUG: unable to handle kernel NULL pointer dereference in rds_bind

2019-09-16 Thread Cong Wang
ot.com/x/repro.syz?x=10753bc160 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=111dfc1160 > > The bug was bisected to: > > commit b9a1e627405d68d475a3c1f35e685ccfb5bbe668 > Author: Cong Wang > Date: Thu Jul 4 00:21:13 2019 + > > hsr: implement dellin

Re: BUG: sleeping function called from invalid context in tcf_chain0_head_change_cb_del

2019-09-16 Thread Cong Wang
On Mon, Sep 16, 2019 at 4:39 PM syzbot wrote: > > Hello, > > syzbot found the following crash on: > > HEAD commit:1609d760 Merge tag 'for-linus' of git://git.kernel.org/pub.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=10236abe60 > kernel config:

Re: BUG: sleeping function called from invalid context in tcf_chain0_head_change_cb_del

2019-09-17 Thread Cong Wang
On Tue, Sep 17, 2019 at 1:27 AM Vlad Buslov wrote: > Hi Cong, > > Don't see why we would need qdisc tree lock while releasing the > reference to (or destroying) previous Qdisc. I've skimmed through other > scheds and it looks like sch_multiq, sch_htb and sch_tbf are also > affected. Do you want me

Re: [PATCH v3] tracing: Introduce trace event injection

2019-09-23 Thread Cong Wang
Hi, Steven Any reviews for V3? I've addressed your concern about Kconfig. Thanks.

Re: INFO: task hung in unregister_netdevice_notifier (3)

2019-07-15 Thread Cong Wang
On Mon, Jul 15, 2019 at 10:23 AM Oliver Hartkopp wrote: > > Hello all, > > On 14.07.19 06:07, syzbot wrote: > > syzbot has found a reproducer for the following crash on: > > the internal users of the CAN networking subsystem like CAN_BCM and > CAN_RAW hold a number of CAN identifier subscriptions

Re: [Patch] perf stat: always separate stalled cycles per insn

2019-07-16 Thread Cong Wang
Hi, Arnaldo On Tue, May 28, 2019 at 12:11 PM Arnaldo Carvalho de Melo wrote: > > Em Tue, May 28, 2019 at 11:21:38AM -0700, Cong Wang escreveu: > > Thanks for reviewing it. Is there anyone takes this patch? > > Enough time, acked already, picking it. Where is this patch landed?

Re: [PATCH net] net: sched: act_mirred: drop skb's dst_entry in ingress redirection

2019-10-14 Thread Cong Wang
On Sat, Oct 12, 2019 at 12:16 AM Zhiyuan Hou wrote: > diff --git a/net/sched/act_mirred.c b/net/sched/act_mirred.c > index 9ce073a05414..6108a64c0cd5 100644 > --- a/net/sched/act_mirred.c > +++ b/net/sched/act_mirred.c > @@ -18,6 +18,7 @@ > #include > #include > #include > +#include > #inc

Re: INFO: task hung in addrconf_verify_work (2)

2019-10-14 Thread Cong Wang
On Sun, Oct 13, 2019 at 10:37 PM Eric Dumazet wrote: > Infinite loop because tcf_add_notify() returns -EAGAIN as the message can not > be delivered to the socket, > since its SO_RCVBUF has been set to 0. Interesting corner case... > > Perhaps we need this patch ? This patch looks reasonable to

Re: [PATCH v3] tracing: Introduce trace event injection

2019-10-21 Thread Cong Wang
On Mon, Sep 23, 2019 at 2:13 PM Cong Wang wrote: > > Hi, Steven > > Any reviews for V3? I've addressed your concern about Kconfig. > Ping..

Re: [PATCH net] net: sched: act_mirred: drop skb's dst_entry in ingress redirection

2019-10-21 Thread Cong Wang
On Fri, Oct 18, 2019 at 2:25 PM Eyal Birger wrote: > > Hi, > > On Fri, 18 Oct 2019 00:33:53 +0800 > Zhiyuan Hou wrote: > > > On 2019/10/16 8:13 下午, Eyal Birger wrote: > > > Hi, > > > > > > On Wed, 16 Oct 2019 01:22:01 +0800 > > > Zhiyu

Re: [PATCH v3] tracing: Introduce trace event injection

2019-10-21 Thread Cong Wang
On Mon, Oct 21, 2019 at 4:21 PM Steven Rostedt wrote: > > On Mon, 21 Oct 2019 13:41:51 -0700 > Cong Wang wrote: > > > On Mon, Sep 23, 2019 at 2:13 PM Cong Wang wrote: > > > > > > Hi, Steven > > > > > > Any reviews for V3? I've addressed

[Patch v2] tracing: Introduce trace event injection

2019-07-29 Thread Cong Wang
s_write => ksys_write => do_syscall_64 => entry_SYSCALL_64_after_hwframe The only thing that can't be injected is string pointers as they require constant string pointers, this can't be done at run time. Cc: Steven Rostedt Cc: Ingo Molnar Signed-off-by: Cong Wang --- k

Re: [PATCH v3] net: sched: Fix a possible null-pointer dereference in dequeue_func()

2019-07-29 Thread Cong Wang
On Mon, Jul 29, 2019 at 1:24 AM Jia-Ju Bai wrote: > > In dequeue_func(), there is an if statement on line 74 to check whether > skb is NULL: > if (skb) > > When skb is NULL, it is used on line 77: > prefetch(&skb->end); > > Thus, a possible null-pointer dereference may occur. > > To fix th

Re: KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt

2019-02-01 Thread Cong Wang
On Thu, Jan 31, 2019 at 10:56 PM Dmitry Vyukov wrote: > Hi Paul, > > Searching for af_netrom across other syzbot bugs: > https://groups.google.com/forum/#!searchin/syzkaller-bugs/af_netrom%7Csort:date > > I see at least: > https://syzkaller.appspot.com/bug?extid=b0b1952f5864b4009b09 > https://syzk

[Patch] perf stat: always separate stalled cycles per insn

2019-05-17 Thread Cong Wang
,,instructions,24026790339,100.00,0.22,insn per cycle ,0.00,stalled cycles per insn 30939953,,cycles,24025512526,100.00,, Cc: Andi Kleen Cc: Jiri Olsa Cc: Ingo Molnar Cc: Arnaldo Carvalho de Melo Signed-off-by: Cong Wang --- tools/perf/util/stat-shadow.c | 3 ++- 1 file changed, 2 insertions

[PATCH 2/4] trace: let filter_assign_type() detect FILTER_PTR_STRING

2019-05-25 Thread Cong Wang
-off-by: Cong Wang --- kernel/trace/trace_events_filter.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/kernel/trace/trace_events_filter.c b/kernel/trace/trace_events_filter.c index d3e59312ef40..550e8a0d048a 100644 --- a/kernel/trace/trace_events_filter.c +++ b/kernel/trace

[PATCH 3/4] trace: make trace_get_fields() global

2019-05-25 Thread Cong Wang
Molnar Signed-off-by: Cong Wang --- include/linux/trace_events.h | 8 kernel/trace/trace_events.c | 8 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/include/linux/trace_events.h b/include/linux/trace_events.h index 5c6f2a6c8cd2..5150436783e8 100644 --- a/include

[PATCH 4/4] trace: introduce trace event injection

2019-05-25 Thread Cong Wang
s_write => ksys_write => do_syscall_64 => entry_SYSCALL_64_after_hwframe The only thing that can't be injected is string pointers as they require constant string pointers, this can't be done at run time. Cc: Steven Rostedt Cc: Ingo Molnar Signed-off-by: Cong Wang --- k

[PATCH 1/4] trace: fold type initialization into tracing_generic_entry_update()

2019-05-25 Thread Cong Wang
All callers of tracing_generic_entry_update() have to initialize entry->type, so let's just simply move it inside. Cc: Steven Rostedt Cc: Ingo Molnar Signed-off-by: Cong Wang --- include/linux/trace_events.h| 1 + kernel/trace/trace.c| 8 kern

[PATCH 0/4] trace: introduce trace event injection

2019-05-25 Thread Cong Wang
: Steven Rostedt Cc: Ingo Molnar Signed-off-by: Cong Wang --- Cong Wang (4): trace: fold type initialization into tracing_generic_entry_update() trace: let filter_assign_type() detect FILTER_PTR_STRING trace: make trace_get_fields() global trace: introduce trace event injection include

Re: [PATCH 0/4] trace: introduce trace event injection

2019-05-26 Thread Cong Wang
On Sat, May 25, 2019 at 3:37 PM Steven Rostedt wrote: > > On Sat, 25 May 2019 09:57:58 -0700 > Cong Wang wrote: > > > This patchset introduces trace event injection, the first 3 patches > > are some trivial prerequisites, the last one implements the trace > > even

Re: Linux 5.1.5 (a regression: kernel BUG at lib/list_debug.c:29!)

2019-05-26 Thread Cong Wang
On Sat, May 25, 2019 at 6:15 PM Randy Dunlap wrote: > > On 5/25/19 1:37 PM, rwar...@gmx.de wrote: > > hallo > > > > I today I got a regression > > > > see the attached dmesg > > > > -- > > > > Ronald > > > [adding netdev + TIPC maintainers] This should have been fixed by the revert of commit 532

[RFC Patch] perf_event: fix a cgroup switch warning

2019-05-13 Thread Cong Wang
to force a reschedule on each target CPU before decreasing the counter perf_cgroup_events, but this is expensive. Suggestions? Thoughts? Cc: Ingo Molnar Cc: Peter Zijlstra Cc: Arnaldo Carvalho de Melo Cc: Alexander Shishkin Cc: Jiri Olsa Cc: Namhyung Kim Signed-off-by: Cong Wang --- include/li

Re: [RFC Patch] perf_event: fix a cgroup switch warning

2019-05-14 Thread Cong Wang
On Tue, May 14, 2019 at 5:32 AM Peter Zijlstra wrote: > > On Mon, May 13, 2019 at 05:27:47PM -0700, Cong Wang wrote: > > We have been consistently triggering the warning > > WARN_ON_ONCE(cpuctx->cgrp) in perf_cgroup_switch() for a rather > > long time, although we s

Re: [PATCH 1/2] ras: fix an off-by-one error in __find_elem()

2019-04-18 Thread Cong Wang
On Wed, Apr 17, 2019 at 2:15 PM Luck, Tony wrote: > > On Tue, Apr 16, 2019 at 07:37:41PM -0700, Cong Wang wrote: > > On Tue, Apr 16, 2019 at 7:31 PM Cong Wang wrote: > > > Yes it is, I have a stacktrace in production which clearly shows > > > del_elem.isra.1+0x34/0x

Re: [PATCH] RAS/CEC: Add debugfs switch to disable at run time

2019-04-18 Thread Cong Wang
s, which leaves mcelog "broken" silently. I know it is arguable, but until we can switch from mcelog to rasdaemon, mcelog should still work as before. I like this idea of disabling it at runtime, so: Acked-by: Cong Wang Thanks.

Re: [PATCH] RAS/CEC: Add debugfs switch to disable at run time

2019-04-18 Thread Cong Wang
On Thu, Apr 18, 2019 at 4:29 PM Borislav Petkov wrote: > > On Thu, Apr 18, 2019 at 03:51:07PM -0700, Cong Wang wrote: > > On Thu, Apr 18, 2019 at 3:02 PM Tony Luck wrote: > > > > > > Useful when running error injection tests that want to > > > see all of t

Re: [PATCH] RAS/CEC: Add debugfs switch to disable at run time

2019-04-19 Thread Cong Wang
On Thu, Apr 18, 2019 at 5:26 PM Borislav Petkov wrote: > > Now, if any of that above still doesn't make it clear, please state what > you're trying to achieve and I'll try to help. Sorry that I misled you to believe we don't even enable CONFIG_X86_MCELOG_LEGACY. Here is what we have and what we h

Re: [PATCH] RAS/CEC: Add debugfs switch to disable at run time

2019-04-19 Thread Cong Wang
On Thu, Apr 18, 2019 at 5:07 PM Luck, Tony wrote: > > On Fri, Apr 19, 2019 at 01:29:10AM +0200, Borislav Petkov wrote: > > Which reminds me, Tony, I think all those debugging files "pfn" > > and "array" and the one you add now, should all be under a > > CONFIG_RAS_CEC_DEBUG which is default off an

Re: [PATCH] RAS/CEC: Add debugfs switch to disable at run time

2019-04-20 Thread Cong Wang
On Sat, Apr 20, 2019 at 2:13 AM Borislav Petkov wrote: > > On Fri, Apr 19, 2019 at 10:43:03PM -0700, Cong Wang wrote: > > With this change, although not even compiled, mcelog should still > > receive correctable memory errors like before, even when we have > > CONFIG_RAS_

<    1   2   3   4   5   6   7   8   9   >