Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp540515ybc; Fri, 22 Nov 2019 09:07:54 -0800 (PST) X-Google-Smtp-Source: APXvYqwThhyTiYpqIhF5W0TP3ugjGvZLUmFNIRHZcced41AS2Vvxz+uLI3zcNOnVIwVYgqqmg7qR X-Received: by 2002:a50:ec97:: with SMTP id e23mr2335695edr.111.1574442474593; Fri, 22 Nov 2019 09:07:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574442474; cv=none; d=google.com; s=arc-20160816; b=RKou7hQtdb+CNaQN1+lLXv0TrgqAlS7ZfASuPz0T9dcUVMSsT6RGOGRb7oNxCqOWuE hwPMOpSMRF+Bso6nteThV5uI1bpUDQCE0uF8bZHOsA1dBLeX13kLX5yool/oiks8yti3 ElxcZil1XhmFlCCtmt/8UyxSZfGMPo1RuUDjKrgPImA6uN5npGesVtTMK/0Ei3zkWQU+ HgvqTVUFXzGHMUcXn2wZlb+NL4lyA7aIAuzKGbq7Q4gw5cuSzypgf9MzrsfNf0dyF9BY elfeJJhJfNsMIh+ZhMSzUdCVYIUBAy/QH8yMUjlo51RdDJrBJqRuagblHoE3SS6akLo0 zqXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=KLTSCBo9GrmIxlML9NXjcKsTYOt38qaSPc5RYyNYTYc=; b=hANWNocD3xrSZ+A8ZGgRItRjCmo6m2gZwJmH2Ew7VhIMOC3jp0Twy5UIHHJDz44B7C BdU+0MCIOBb5uCtoXolD9HEZnYGE1Tsj5p9P8qdTmobuFFW4na2hbRRc8YOSSsFy4YK+ 35PbEDZVukqNVYDYuF4nqdz5S16sp58ClpK5khQn2J3boVtT1onXF33OQ1qv3hh9kNqf NYagmZQcO3Z3jmapATuChAtLz8z6U7lTk+F7vLqPxml9C48dJcBZIxDpqpc4XTRbGw4E Te5GtS+fqV56tZuH0WyVbmv2sOLvsFtfatoRgYCq3Dp16snzW4YIleVt7vdHOoYZ5Yx9 Il2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=PWztAYWa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a7si5183699edt.181.2019.11.22.09.07.29; Fri, 22 Nov 2019 09:07:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=PWztAYWa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727141AbfKVRFg (ORCPT + 99 others); Fri, 22 Nov 2019 12:05:36 -0500 Received: from bombadil.infradead.org ([198.137.202.133]:51592 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726620AbfKVRFg (ORCPT ); Fri, 22 Nov 2019 12:05:36 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=In-Reply-To:Content-Type:MIME-Version :References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=KLTSCBo9GrmIxlML9NXjcKsTYOt38qaSPc5RYyNYTYc=; b=PWztAYWaNbzXORsPKRgBq4QlE 4TgQmDJM1ReeJUdFtb3/bZVCVfM3Y7u1EPllMHxvYPlj15uNy4CsrWGTauI5AGatcgsKKZNpXfG8N iAadYJ86yptwYD+K1utQD3x1qgmZBxWesKOON4nYpS+5VJ35TJl4PDtBR0ATF8UwtDxB7xV3re4Iz 9gfdK1WuwwQF0umMcYrksozzGN9W8JqOl9Wo8EDF305QWZ8/bPd3JNjoxrL+GKyA6DxjVVBLYO1Bj IlrN5zgxjbHE0kgFfmA02phF0XdI0gzsz4PCxztld7lenv+k7pEwLmeHJoU6NBzNLfZKoFBH1pmXK PNRgunFMg==; Received: from willy by bombadil.infradead.org with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1iYCNC-0005Gu-U8; Fri, 22 Nov 2019 17:05:34 +0000 Date: Fri, 22 Nov 2019 09:05:34 -0800 From: Matthew Wilcox To: Greg Kroah-Hartman Cc: Guenter Roeck , linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah@kernel.org, patches@kernelci.org, ben.hutchings@codethink.co.uk, lkft-triage@lists.linaro.org, stable@vger.kernel.org Subject: Re: [PATCH 4.19 000/220] 4.19.86-stable review Message-ID: <20191122170534.GV20752@bombadil.infradead.org> References: <20191122100912.732983531@linuxfoundation.org> <20191122151631.GA2083451@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191122151631.GA2083451@kroah.com> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 22, 2019 at 04:16:31PM +0100, Greg Kroah-Hartman wrote: > On Fri, Nov 22, 2019 at 06:47:05AM -0800, Guenter Roeck wrote: > > On 11/22/19 2:26 AM, Greg Kroah-Hartman wrote: > > > This is the start of the stable review cycle for the 4.19.86 release. > > > There are 220 patches in this series, all will be posted as a response > > > to this one. If anyone has any issues with these being applied, please > > > let me know. > > > > > > Responses should be made by Sun, 24 Nov 2019 09:59:19 +0000. > > > Anything received after that time might be too late. > > > > > > > I see the following warning (at least for arm64, ppc64, and x86_64). > > This seems to be caused by "idr: Fix idr_get_next race with idr_remove". > > v4.14.y is also affected. Mainline and v5.3.y are not affected. That makes sense; the code in question is different after 4.19. Thanks for the report; it's very clear. > Willy, this looks like something from your patch, is it to be expected? It's harmless; the problem is that we can't check whether the dereference is safe. The caller isn't holding the RCU lock, and the IDR code doesn't know what lock is being held to make this dereference safe. Do you want a changelog for this oneliner which disables the checking? diff --git a/lib/idr.c b/lib/idr.c index 49e7918603c7..6ff3b1c36e0a 100644 --- a/lib/idr.c +++ b/lib/idr.c @@ -237,7 +237,7 @@ void *idr_get_next(struct idr *idr, int *nextid) id = (id < base) ? 0 : id - base; radix_tree_for_each_slot(slot, &idr->idr_rt, &iter, id) { - entry = radix_tree_deref_slot(slot); + entry = rcu_dereference_raw(*slot); if (!entry) continue; if (!radix_tree_deref_retry(entry))