Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp346500rdg; Tue, 10 Oct 2023 12:00:04 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFut2Uj1m+hsXZqxQmKzZxQAQbDE51WAlxMmW0PbzlJrFQRaGjWHd7nFNBRg1YePnXTLmh7 X-Received: by 2002:a17:90b:3ec6:b0:269:55a2:952c with SMTP id rm6-20020a17090b3ec600b0026955a2952cmr14596935pjb.40.1696964404195; Tue, 10 Oct 2023 12:00:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696964404; cv=none; d=google.com; s=arc-20160816; b=e+lP1EBTUMTIf6PY7TFU1hzHIT+8y9mQG1BWaITzWQU27hZVVFYNJm587c1FJRlYDq msSYXiSVz0Bluk0UOtEin0w2ZgX1LUDbyx678CZ/wrMSKsuH5Re9pF/Pt4XhF8v5Gavo k5CT/wqivkhvBVYGchPnZC/Ijd1D9ZSc9cjEnW0LWaLlUTKwrIrEvxLO3yNKo1C41ZKN amREMfweaxK1ah3nDpc4+JOHm4dTl/fFfF1D4ScgY6Erhn+uuAfWblmI19i6dK05O/hI hsUpn5dn2qpXxwfEOciVuOzPlCDjFHNgm2jJIp5LzA+hjonMU52Cf1xZybn6dQACgNn2 KXDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=9/E+3F0UDWJjc8uoHr7hpLVy3VbrQOPGIofO/+r8QOA=; fh=NkyePKJGP3kVySmokwN1tacBq9vwOVKL7XKEQrOS0bU=; b=qLd4YgqA2qHpxufFik2VF2CboWzeitRVBzoiUslbXCfJ8Tcz+2zbE9LLSHAM1AethU kMfQPgJd+1Ip5IchtqcHh5OA8Pc8wC6Y+m64xtYWEDtHMm4KXphHVS7OyiAjwvne+E1J KHLXaRoF5KPXujrnPHw4zuveFQ6XqlLXEF6X1fBq2hMgKnWbKg/DTqssHM/OrX1lbqpB CfeTze/ojSBvykHIxszAru9mwgeI8BrtpsdeVC4hCc2fqxSX7/pNETkRY66FyzeVmPQo VNxyF7agaSiiTOvDEDWuqlYBPVVfMMdiTczqWtx9k9I0CD2xXo5KZVCxm11MFO4EYvuv jdFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ecU4MnY9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id h5-20020a17090a3d0500b002772ff87ee4si681250pjc.82.2023.10.10.12.00.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 12:00:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ecU4MnY9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id DD9E6802A312; Tue, 10 Oct 2023 12:00:00 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343525AbjJJS7w (ORCPT + 99 others); Tue, 10 Oct 2023 14:59:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37216 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233674AbjJJS7u (ORCPT ); Tue, 10 Oct 2023 14:59:50 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F2FD393; Tue, 10 Oct 2023 11:59:48 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0DC1FC433C7; Tue, 10 Oct 2023 18:59:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1696964388; bh=QjP+9QKzrymfN2C8lY1Hip1CW9eHoE7JMBdIbHB9Czk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ecU4MnY9/zXzPaOCdkPNhnTUuXhWI95KlqSPWzzLZmRpvFprf7Ugvz4/J9Arb1C3O Wh9q2HmUyWdFPy/Qm7NX1EVtWTNTSHV2ExW0G94RU7cBoXEwsFHa2gvWw8rjWN5MAr 3X5DJHZo3tTaultpVLa2Gmy4WVDYcpQg4ZK0vQQM= Date: Tue, 10 Oct 2023 20:59:45 +0200 From: Greg Kroah-Hartman To: Eric Dumazet Cc: Matthieu Baerts , Naresh Kamboju , stable@vger.kernel.org, patches@lists.linux.dev, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, akpm@linux-foundation.org, linux@roeck-us.net, shuah@kernel.org, patches@kernelci.org, lkft-triage@lists.linaro.org, pavel@denx.de, jonathanh@nvidia.com, f.fainelli@gmail.com, sudipm.mukherjee@gmail.com, srw@sladewatkins.net, rwarsow@gmx.de, conor@kernel.org, "David S. Miller" , David Ahern , Jakub Kicinski , Paolo Abeni , Netdev , bpf , MPTCP Upstream Subject: Re: [PATCH 6.1 000/162] 6.1.57-rc1 review Message-ID: <2023101036-relock-slogan-3b3c@gregkh> References: <20231009130122.946357448@linuxfoundation.org> <6447b32f-abb9-4459-aca5-3d510a66b685@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=2.7 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Tue, 10 Oct 2023 12:00:01 -0700 (PDT) X-Spam-Level: ** On Tue, Oct 10, 2023 at 07:24:08PM +0200, Eric Dumazet wrote: > On Tue, Oct 10, 2023 at 6:51 PM Matthieu Baerts wrote: > > > > Hi Naresh, > > > > On 09/10/2023 22:43, Naresh Kamboju wrote: > > > On Mon, 9 Oct 2023 at 18:46, Greg Kroah-Hartman > > > wrote: > > >> > > >> This is the start of the stable review cycle for the 6.1.57 release. > > >> There are 162 patches in this series, all will be posted as a response > > >> to this one. If anyone has any issues with these being applied, please > > >> let me know. > > >> > > >> Responses should be made by Wed, 11 Oct 2023 13:00:55 +0000. > > >> Anything received after that time might be too late. > > >> > > >> The whole patch series can be found in one patch at: > > >> https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.1.57-rc1.gz > > >> or in the git tree and branch at: > > >> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.1.y > > >> and the diffstat can be found below. > > >> > > >> thanks, > > >> > > >> greg k-h > > > > > > > > > The following kernel warnings were noticed several times on arm x15 devices > > > running stable-rc 6.1.57-rc1 while running selftests: net: mptcp_connect.sh > > > and netfilter: nft_fib.sh. > > > > > > The possible unsafe locking scenario detected. > > > > > > FYI, > > > Stable-rc/ linux.6.1.y kernel running stable/ linux.6.5.y selftest in this case. > > > > > > Reported-by: Linux Kernel Functional Testing > > > > > > kselftest: Running tests in net/mptcp > > > > Thank you for having reported the issue and having added MPTCP ML in Cc! > > > > Just to avoid confusions: the "WARNING" you shared when running > > 'mptcp_connect.sh' selftest appeared before creating the first MPTCP > > connection. It looks like there is no reference to MPTCP in the > > calltraces. Also, because you have the same issue with nft_fib.sh, I > > would say that this issue is not linked to MPTCP but rather to a recent > > modification in the IPv6 stack. > > > > By chance, did you start a "git bisect" to identify the commit causing > > this issue? > > > > > > I think stable teams missed to backport > > commit c486640aa710ddd06c13a7f7162126e1552e8842 > Author: Eric Dumazet > Date: Mon Mar 13 20:17:32 2023 +0000 > > ipv6: remove one read_lock()/read_unlock() pair in rt6_check_neigh() > > rt6_check_neigh() uses read_lock() to protect n->nud_state reading. > > This seems overkill and causes false sharing. > > Signed-off-by: Eric Dumazet > Reviewed-by: David Ahern > Reviewed-by: Martin KaFai Lau > Signed-off-by: Jakub Kicinski Ah, didn't know we needed that, now queued up, thanks! greg k-h