lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 13 Apr 2023 21:19:41 +0300
From:   Ido Schimmel <idosch@...sch.org>
To:     Mirsad Goran Todorovac <mirsad.todorovac@....unizg.hr>
Cc:     netdev@...r.kernel.org, "David S. Miller" <davem@...emloft.net>,
        Eric Dumazet <edumazet@...gle.com>,
        Jakub Kicinski <kuba@...nel.org>,
        Paolo Abeni <pabeni@...hat.com>,
        Alexei Starovoitov <ast@...nel.org>,
        Daniel Borkmann <daniel@...earbox.net>,
        Jesper Dangaard Brouer <hawk@...nel.org>,
        John Fastabend <john.fastabend@...il.com>,
        Nikolay Aleksandrov <razor@...ckwall.org>,
        Florent Fourcot <florent.fourcot@...irst.fr>,
        Hangbin Liu <liuhangbin@...il.com>,
        Petr Machata <petrm@...dia.com>, Jiri Pirko <jiri@...nulli.us>,
        Xin Long <lucien.xin@...il.com>, linux-kernel@...r.kernel.org,
        bpf@...r.kernel.org, Jay Vosburgh <j.vosburgh@...il.com>,
        Andy Gospodarek <andy@...yhouse.net>
Subject: Re: [BUG] [FIXED: TESTED] kmemleak in rtnetlink_rcv() triggered by
 selftests/drivers/net/team in build cdc9718d5e59

On Mon, Apr 10, 2023 at 07:34:09PM +0200, Mirsad Goran Todorovac wrote:
> I've ran "make kselftest" with vanilla torvalds tree 6.3-rc5 + your patch.
> 
> It failed two lines after "enslaved device client - ns-A IP" which passed OK.
> 
> Is this hang for 5 hours in selftests: net: fcnal-test.sh test, at the line
> (please see to the end):

It's not clear to me if the test failed for you or just got stuck. The
output below is all "[ OK ]".

I ran the test with my patch and got:

Tests passed: 875
Tests failed:   5

I don't believe the failures are related to my patch given the test
doesn't use bonding.

See more below.

> 
> # ###########################################################################
> # IPv4 address binds
> # ###########################################################################
> # 
> # 
> # #################################################################
> # No VRF
> # 
> # SYSCTL: net.ipv4.ping_group_range=0 2147483647
> # 
> # TEST: Raw socket bind to local address - ns-A IP                              [ OK ]
> # TEST: Raw socket bind to local address after device bind - ns-A IP            [ OK ]
> # TEST: Raw socket bind to local address - ns-A loopback IP                     [ OK ]
> # TEST: Raw socket bind to local address after device bind - ns-A loopback IP   [ OK ]
> # TEST: Raw socket bind to nonlocal address - nonlocal IP                       [ OK ]
> # TEST: TCP socket bind to nonlocal address - nonlocal IP                       [ OK ]
> # TEST: ICMP socket bind to nonlocal address - nonlocal IP                      [ OK ]
> # TEST: ICMP socket bind to broadcast address - broadcast                       [ OK ]
> # TEST: ICMP socket bind to multicast address - multicast                       [ OK ]
> # TEST: TCP socket bind to local address - ns-A IP                              [ OK ]
> # TEST: TCP socket bind to local address after device bind - ns-A IP            [ OK ]
> # 
> # #################################################################
> # With VRF
> # 
> # SYSCTL: net.ipv4.ping_group_range=0 2147483647
> # 
> # TEST: Raw socket bind to local address - ns-A IP                              [ OK ]
> # TEST: Raw socket bind to local address after device bind - ns-A IP            [ OK ]
> # TEST: Raw socket bind to local address after VRF bind - ns-A IP               [ OK ]
> # TEST: Raw socket bind to local address - VRF IP                               [ OK ]
> # TEST: Raw socket bind to local address after device bind - VRF IP             [ OK ]
> # TEST: Raw socket bind to local address after VRF bind - VRF IP                [ OK ]
> # TEST: Raw socket bind to out of scope address after VRF bind - ns-A loopback IP  [ OK ]
> # TEST: Raw socket bind to nonlocal address after VRF bind - nonlocal IP        [ OK ]
> # TEST: TCP socket bind to nonlocal address after VRF bind - nonlocal IP        [ OK ]
> # TEST: ICMP socket bind to nonlocal address after VRF bind - nonlocal IP       [ OK ]
> # TEST: ICMP socket bind to broadcast address after VRF bind - broadcast        [ OK ]
> # TEST: ICMP socket bind to multicast address after VRF bind - multicast        [ OK ]
> # TEST: TCP socket bind to local address - ns-A IP                              [ OK ]
> # TEST: TCP socket bind to local address after device bind - ns-A IP            [ OK ]
> # TEST: TCP socket bind to local address - VRF IP                               [ OK ]
> # TEST: TCP socket bind to local address after device bind - VRF IP             [ OK ]
> # TEST: TCP socket bind to invalid local address for VRF - ns-A loopback IP     [ OK ]
> # TEST: TCP socket bind to invalid local address for device bind - ns-A loopback IP  [ OK ]
> # 
> # ###########################################################################
> # Run time tests - ipv4
> # ###########################################################################
> # 
> # TEST: Device delete with active traffic - ping in - ns-A IP                   [ OK ]
> # TEST: Device delete with active traffic - ping in - VRF IP                    [ OK ]
> # TEST: Device delete with active traffic - ping out - ns-B IP                  [ OK ]
> # TEST: TCP active socket, global server - ns-A IP                              [ OK ]
> # TEST: TCP active socket, global server - VRF IP                               [ OK ]
> # TEST: TCP active socket, VRF server - ns-A IP                                 [ OK ]
> # TEST: TCP active socket, VRF server - VRF IP                                  [ OK ]
> # TEST: TCP active socket, enslaved device server - ns-A IP                     [ OK ]
> # TEST: TCP active socket, VRF client - ns-A IP                                 [ OK ]
> # TEST: TCP active socket, enslaved device client - ns-A IP                     [ OK ]
> # TEST: TCP active socket, global server, VRF client, local - ns-A IP           [ OK ]
> # TEST: TCP active socket, global server, VRF client, local - VRF IP            [ OK ]
> # TEST: TCP active socket, VRF server and client, local - ns-A IP               [ OK ]
> # TEST: TCP active socket, VRF server and client, local - VRF IP                [ OK ]
> # TEST: TCP active socket, global server, enslaved device client, local - ns-A IP  [ OK ]
> # TEST: TCP active socket, VRF server, enslaved device client, local - ns-A IP  [ OK ]
> # TEST: TCP active socket, enslaved device server and client, local - ns-A IP   [ OK ]
> # TEST: TCP passive socket, global server - ns-A IP                             [ OK ]
> # TEST: TCP passive socket, global server - VRF IP                              [ OK ]
> # TEST: TCP passive socket, VRF server - ns-A IP                                [ OK ]
> # TEST: TCP passive socket, VRF server - VRF IP                                 [ OK ]
> # TEST: TCP passive socket, enslaved device server - ns-A IP                    [ OK ]
> # TEST: TCP passive socket, VRF client - ns-A IP                                [ OK ]
> # TEST: TCP passive socket, enslaved device client - ns-A IP                    [ OK ]
> # TEST: TCP passive socket, global server, VRF client, local - ns-A IP          [ OK ]
> 
> Hope this helps.
> 
> I also have a iwlwifi DEADLOCK and I don't know if these should be reported independently.
> (I don't think it is related to the patch.)

If the test got stuck, then it might be related to the deadlock in
iwlwifi. Try running the test without iwlwifi and see if it helps. If
not, I suggest starting a different thread about this issue.

Will submit the bonding patch over the weekend.

Thanks for testing

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ