lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 1 Jun 2024 08:51:47 +0200
From: Jaroslav Pulchart <jaroslav.pulchart@...ddata.com>
To: Jakub Kicinski <kuba@...nel.org>
Cc: netdev@...r.kernel.org, Igor Raits <igor@...ddata.com>, 
	Daniel Secik <daniel.secik@...ddata.com>, Zdenek Pesek <zdenek.pesek@...ddata.com>
Subject: Re: [regresion] Dell's OMSA Systems Management Data Engine stuck
 after update from 6.8.y to 6.9.y (with bisecting)

>
> On Fri, 31 May 2024 08:48:31 +0200 Jaroslav Pulchart wrote:
> > > Could you try this?
> > >
> > > diff --git a/net/ipv4/devinet.c b/net/ipv4/devinet.c
> > > index 96accde527da..5fd06473ddd9 100644
> > > --- a/net/ipv4/devinet.c
> > > +++ b/net/ipv4/devinet.c
> > > @@ -1912,6 +1912,8 @@ static int inet_dump_ifaddr(struct sk_buff *skb, struct netlink_callback *cb)
> > >                         goto done;
> > >         }
> > >  done:
> > > +       if (err == -EMSGSIZE && likely(skb->len))
> > > +               err = skb->len;
> > >         if (fillargs.netnsid >= 0)
> > >                 put_net(tgt_net);
> > >         rcu_read_unlock();
> >
> > I tried it and it did not help, the issue is still there.
>
> Hm. Could you strace it ? I wonder if I misread something it doing
> multiple dumps and now its hanging on a different one..

sure, here it is:
...
[pid 24486] socket(AF_NETLINK, SOCK_DGRAM, NETLINK_ROUTE) = 12
[pid 24486] sendto(12, [{nlmsg_len=24, nlmsg_type=0x16 /* NLMSG_???
*/, nlmsg_flags=NLM_F_REQUEST|0x300, nlmsg_seq=1, nlmsg_pid=0},
"\x02\x00\x00\x00\x02\x00\x00\x00"], 24, 0, {sa_family=AF_NETLINK,
nl_pid=0, nl_groups=00000000}, 12) = 24
[pid 24486] recvmsg(12, {msg_name={sa_family=AF_NETLINK, nl_pid=0,
nl_groups=00000000}, msg_namelen=12,
msg_iov=[{iov_base=[[{nlmsg_len=76, nlmsg_type=RTM_NEWADDR,
nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1, nlmsg_pid=24486},
{ifa_family=AF_INET, ifa_prefixlen=8, ifa_flags=IFA_F_PERMANENT,
ifa_scope=RT_SCOPE_HOST, ifa_index=if_nametoindex("lo")},
[[{nla_len=8, nla_type=IFA_ADDRESS}, inet_addr("127.0.0.1")],
[{nla_len=8, nla_type=IFA_LOCAL}, inet_addr("127.0.0.1")],
[{nla_len=7, nla_type=IFA_LABEL}, "lo"], [{nla_len=8,
nla_type=IFA_FLAGS}, IFA_F_PERMANENT], [{nla_len=20,
nla_type=IFA_CACHEINFO}, {ifa_prefered=4294967295,
ifa_valid=4294967295, cstamp=766, tstamp=766}]]], [{nlmsg_len=88,
nlmsg_type=RTM_NEWADDR, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1,
nlmsg_pid=24486}, {ifa_family=AF_INET, ifa_prefixlen=24, ifa_flags=0,
ifa_scope=RT_SCOPE_LINK, ifa_index=if_nametoindex("idrac")},
[[{nla_len=8, nla_type=IFA_ADDRESS}, inet_addr("169.254.1.2")],
[{nla_len=8, nla_type=IFA_LOCAL}, inet_addr("169.254.1.2")],
[{nla_len=8, nla_type=IFA_BROADCAST}, inet_addr("169.254.1.255")],
[{nla_len=10, nla_type=IFA_LABEL}, "idrac"], [{nla_len=8,
nla_type=IFA_FLAGS}, IFA_F_NOPREFIXROUTE], [{nla_len=20,
nla_type=IFA_CACHEINFO}, {ifa_prefered=862834, ifa_valid=862834,
cstamp=1717, tstamp=1717}]]], [{nlmsg_len=92, nlmsg_type=RTM_NEWADDR,
nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1, nlmsg_pid=24486},
{ifa_family=AF_INET, ifa_prefixlen=20, ifa_flags=IFA_F_PERMANENT,
ifa_scope=RT_SCOPE_UNIVERSE, ifa_index=if_nametoindex("br_private")},
[[{nla_len=8, nla_type=IFA_ADDRESS}, inet_addr("10.12.48.105")],
[{nla_len=8, nla_type=IFA_LOCAL}, inet_addr("10.12.48.105")],
[{nla_len=8, nla_type=IFA_BROADCAST}, inet_addr("10.12.63.255")],
[{nla_len=15, nla_type=IFA_LABEL}, "br_private"], [{nla_len=8,
nla_type=IFA_FLAGS}, IFA_F_PERMANENT|IFA_F_NOPREFIXROUTE],
[{nla_len=20, nla_type=IFA_CACHEINFO}, {ifa_prefered=4294967295,
ifa_valid=4294967295, cstamp=1706, tstamp=1706}]]], [{nlmsg_len=92,
nlmsg_type=RTM_NEWADDR, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1,
nlmsg_pid=24486}, {ifa_family=AF_INET, ifa_prefixlen=20,
ifa_flags=IFA_F_PERMANENT, ifa_scope=RT_SCOPE_UNIVERSE,
ifa_index=if_nametoindex("br_public")}, [[{nla_len=8,
nla_type=IFA_ADDRESS}, inet_addr("10.12.16.105")], [{nla_len=8,
nla_type=IFA_LOCAL}, inet_addr("10.12.16.105")], [{nla_len=8,
nla_type=IFA_BROADCAST}, inet_addr("10.12.31.255")], [{nla_len=14,
nla_type=IFA_LABEL}, "br_public"], [{nla_len=8, nla_type=IFA_FLAGS},
IFA_F_PERMANENT|IFA_F_NOPREFIXROUTE], [{nla_len=20,
nla_type=IFA_CACHEINFO}, {ifa_prefered=4294967295,
ifa_valid=4294967295, cstamp=1708, tstamp=1708}]]], [{nlmsg_len=20,
nlmsg_type=NLMSG_DONE, nlmsg_flags=NLM_F_MULTI, nlmsg_seq=1,
nlmsg_pid=24486}, 0]], iov_len=13312}], msg_iovlen=1,
msg_controllen=0, msg_flags=0}, 0) = 368

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ