Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp177590imm; Tue, 16 Oct 2018 20:51:22 -0700 (PDT) X-Google-Smtp-Source: ACcGV63ymeVkZiXIEt8VyI8j038jBTGTLfRIcnThZPEuH+VXF+hdLN/Kmm8vweifhlvhzXnztFL6 X-Received: by 2002:a63:7156:: with SMTP id b22-v6mr22662097pgn.342.1539748282538; Tue, 16 Oct 2018 20:51:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539748282; cv=none; d=google.com; s=arc-20160816; b=qVseYdXOvk1PkIw2YsBUpfYt1g5zZJWmjTobLOklMr/IQvC2hEUBvnWzylFHwR+FV8 0uOYLPPjatm43yz1vNayV9hELS9bZXx+AEz8PSmZtGmcB3pi/Ckvoc7OXn+V1URux7+s 1iMX4SiigAgBJ30r2A66MKo5SEFi7syAcAstxCUEITFANQTkisADd+hrq+QmZPuHN2cP Usy2skhQdYra2W4ksVcl5E2ZLq4a8hkSTdDrIyx6fsKyYAtuGj/y5v9PbG1mUWvnhW+9 QKDzf8bMgoQuvlz9vkQSJNOMcT/8ADjdpjUb052qLRQG5MRmgUwXKhp0/2AtCfBXuji+ CxJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:to:from:date; bh=cHQ4lDJGbZT9drl74IdvB4phXToUJpXwSyR581h+4S0=; b=W2Nzkbm9oRVgOE9JhBN1KFyLe7AroTlBIdAnSyuVtHfBBclReJ1sUBDO0OxyRO+VuA ebSf+4nB431TFnM5gagEYojKXuqxW+nSRFzub6OxFZTNGr1BIiJatB8zWbIgzf5cPcai Jew453zHr3QZdvaT8109tlAvuLmoId1aX1hf5/iT+AdBXwPhSKt7/wo/79ynIfuRdHpJ mTqWCI1IJEM7TpmlYdzKU/DUuVeGEktfCuxFnoGcQEN+HNIkQZB9n0teDu+9zRVx9vGC 2Xw79ghGSyvDo4Rp0aQjLTEKnzJPWsg96qhg2knwmscrcT0O388DFZH855h0GaGZgjL2 rC6g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 97-v6si16230327pla.34.2018.10.16.20.51.04; Tue, 16 Oct 2018 20:51:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727453AbeJQLoR (ORCPT + 99 others); Wed, 17 Oct 2018 07:44:17 -0400 Received: from scorn.kernelslacker.org ([45.56.101.199]:41390 "EHLO scorn.kernelslacker.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727162AbeJQLoQ (ORCPT ); Wed, 17 Oct 2018 07:44:16 -0400 Received: from [2601:196:4600:5b90:ae9e:17ff:feb7:72ca] (helo=wopr.kernelslacker.org) by scorn.kernelslacker.org with esmtp (Exim 4.89) (envelope-from ) id 1gCcr0-000756-OV; Tue, 16 Oct 2018 23:50:38 -0400 Received: by wopr.kernelslacker.org (Postfix, from userid 1026) id 9DFCD56010A; Tue, 16 Oct 2018 23:50:38 -0400 (EDT) Date: Tue, 16 Oct 2018 23:50:38 -0400 From: Dave Jones To: Cong Wang , Meelis Roos , LKML , Linux Kernel Network Developers Subject: Re: netconsole warning in 4.19.0-rc7 Message-ID: <20181017035038.czaqown24rnjn2pw@codemonkey.org.uk> Mail-Followup-To: Dave Jones , Cong Wang , Meelis Roos , LKML , Linux Kernel Network Developers References: <20181017034047.nrhstc3b4wzevnri@codemonkey.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181017034047.nrhstc3b4wzevnri@codemonkey.org.uk> User-Agent: NeoMutt/20170113 (1.7.2) X-Spam-Note: SpamAssassin invocation failed Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 16, 2018 at 11:40:47PM -0400, Dave Jones wrote: > > This is exactly what I mentioned in my review here: > > https://marc.info/?l=linux-netdev&m=153816136624679&w=2 > > > > "But irq is disabled here, so not sure if rcu_read_lock_bh() > > could cause trouble... " > > Not sure why this didn't show up for me when I was developing that > patch, but I can now reproduce this. The patch below fixes it for > me, but I'm not sure if there are still any side-effects. > There's also a missed unlock in the error path. I took another look at that error path. Turns out this is all we need I think.. diff --git a/net/core/netpoll.c b/net/core/netpoll.c index de1d1ba92f2d..f9322d5db899 100644 --- a/net/core/netpoll.c +++ b/net/core/netpoll.c @@ -318,6 +318,7 @@ void netpoll_send_skb_on_dev(struct netpoll *np, struct sk_buff *skb, npinfo = rcu_dereference_bh(np->dev->npinfo); if (!npinfo || !netif_running(dev) || !netif_device_present(dev)) { dev_kfree_skb_irq(skb); + rcu_read_unlock_bh(); return; }