Skip to content

Conversation

@blktests-ci
Copy link

@blktests-ci blktests-ci bot commented Jul 11, 2025

Pull request for series with
subject: Block fixes for 6.16-rc6
version: 1
url: https://patchwork.kernel.org/project/linux-block/list/?series=981543

axboe and others added 14 commits July 7, 2025 19:42
* io_uring-6.16:
  io_uring/zcrx: fix pp destruction warnings
* block-6.16:
  block: reject bs > ps block devices when THP is disabled
  nbd: fix uaf in nbd_genl_connect() error path
  md/md-bitmap: fix GPF in bitmap_get_stats()
  md/raid1,raid10: strip REQ_NOWAIT from member bios
  raid10: cleanup memleak at raid10_make_request
  md/raid1: Fix stack memory use after return in raid1_reshape
* for-6.17/io_uring:
  io_uring/rw: cast rw->flags assignment to rwf_t
  io_uring: don't use int for ABI
  io_uring/rsrc: skip atomic refcount for uncloned buffers
  io_uring/mock: add trivial poll handler
  io_uring/mock: support for async read/write
  io_uring/mock: allow to choose FMODE_NOWAIT
  io_uring/mock: add sync read/write
  io_uring/mock: add cmd using vectored regbufs
  io_uring/mock: add basic infra for test mock files
  io_uring: remove errant ';' from IORING_CQE_F_TSTAMP_HW definition
  io_uring/netcmd: add tx timestamping cmd support
  io_uring: add mshot helper for posting CQE32
  io_uring/cmd: allow multishot polled commands
  io_uring/poll: introduce io_arm_apoll()
  io_uring/nop: add IORING_NOP_TW completion flag
  io_uring/uring_cmd: implement ->sqe_copy() to avoid unnecessary copies
  io_uring/uring_cmd: get rid of io_uring_cmd_prep_setup()
  io_uring: add struct io_cold_def->sqe_copy() method
  io_uring: add IO_URING_F_INLINE issue flag
  net: timestamp: add helper returning skb's tx tstamp
* for-6.17/block: (38 commits)
  block: remove pktcdvd driver
  ublk: introduce and use ublk_set_canceling helper
  ublk: speed up ublk server exit handling
  zram: pass buffer offset to zcomp_available_show()
  block: zram: replace scnprintf() with sysfs_emit() in *_show() functions
  bcache: switch from pages to folios in read_super()
  virtio: blk/scsi: use block layer helpers to calculate num of queues
  scsi: use block layer helpers to calculate num of queues
  nvme-pci: use block layer helpers to calculate num of queues
  blk-mq: add number of queue calc helper
  lib/group_cpus: Let group_cpu_evenly() return the number of initialized masks
  ublk: cache-align struct ublk_io
  ublk: remove ubq checks from ublk_{get,put}_req_ref()
  ublk: optimize UBLK_IO_UNREGISTER_IO_BUF on daemon task
  ublk: optimize UBLK_IO_REGISTER_IO_BUF on daemon task
  ublk: return early if blk_should_fake_timeout()
  ublk: allow UBLK_IO_(UN)REGISTER_IO_BUF on any task
  ublk: don't take ublk_queue in ublk_unregister_io_buf()
  ublk: consolidate UBLK_IO_FLAG_{ACTIVE,OWNED_BY_SRV} checks
  ublk: remove task variable from __ublk_ch_uring_cmd()
  ...
* for-6.17/block:
  nvme-pci: fix dma unmapping when using PRPs and not using the IOVA mapping
* for-6.17/block:
  Documentation: remove reference to pktcdvd in cdrom documentation
* io_uring-6.16:
  Revert "io_uring: gate REQ_F_ISREG on !S_ANON_INODE as well"
  io_uring/msg_ring: ensure io_kiocb freeing is deferred for RCU
* for-6.17/block:
  block: mtip32xx: Fix usage of dma_map_sg()
* for-6.17/block:
  drbd: add missing kref_get in handle_write_conflicts
* for-6.17/io_uring:
  io_uring/zcrx: prepare fallback for larger pages
  io_uring/zcrx: assert area type in io_zcrx_iov_page
  io_uring/zcrx: allocate sgtable for umem areas
  io_uring/zcrx: introduce io_populate_area_dma
  io_uring/zcrx: return error from io_zcrx_map_area_*
  io_uring/zcrx: always pass page to io_zcrx_copy_chunk
* for-6.17/block:
  nbd: fix lockdep deadlock warning
* for-6.17/io_uring:
  io_uring/net: allow multishot receive per-invocation cap
  io_uring/net: move io_sr_msg->retry_flags to io_sr_msg->flags
  io_uring/net: use passed in 'len' in io_recv_buf_select()
* for-6.17/block:
  nvme-pci: don't allocate dma_vec for IOVA mappings
@blktests-ci
Copy link
Author

blktests-ci bot commented Jul 11, 2025

Upstream branch: d7d3914
series: https://patchwork.kernel.org/project/linux-block/list/?series=981543
version: 1

Pull request is NOT updated. Failed to apply https://patchwork.kernel.org/project/linux-block/list/?series=981543
error message:

Cmd('git') failed due to: exit code(128)
  cmdline: git am --3way
  stdout: 'Patch is empty.'
  stderr: 'hint: When you have resolved this problem, run "git am --continue".
hint: If you prefer to skip this patch, run "git am --skip" instead.
hint: To record the empty patch as an empty commit, run "git am --allow-empty".
hint: To restore the original branch and stop patching, run "git am --abort".
hint: Disable this message with "git config set advice.mergeConflict false"'

conflict:


@blktests-ci blktests-ci bot force-pushed the for-next_base branch 2 times, most recently from c69d3d4 to 9a7a50e Compare July 14, 2025 02:27
@blktests-ci blktests-ci bot force-pushed the for-next_base branch 7 times, most recently from 0fb21b4 to 26415c4 Compare August 1, 2025 12:39
@blktests-ci blktests-ci bot force-pushed the for-next_base branch 3 times, most recently from 62f402e to ca24d57 Compare August 8, 2025 12:50
@blktests-ci
Copy link
Author

blktests-ci bot commented Aug 10, 2025

At least one diff in series https://patchwork.kernel.org/project/linux-block/list/?series=981543 irrelevant now for [{'archived': False, 'project': 241}] search patterns

@blktests-ci blktests-ci bot closed this Aug 10, 2025
@blktests-ci blktests-ci bot deleted the series/981543=>for-next branch August 20, 2025 12:05
blktests-ci bot pushed a commit that referenced this pull request Jan 4, 2026
… to macb_open()

In the non-RT kernel, local_bh_disable() merely disables preemption,
whereas it maps to an actual spin lock in the RT kernel. Consequently,
when attempting to refill RX buffers via netdev_alloc_skb() in
macb_mac_link_up(), a deadlock scenario arises as follows:

   WARNING: possible circular locking dependency detected
   6.18.0-08691-g2061f18ad76e #39 Not tainted
   ------------------------------------------------------
   kworker/0:0/8 is trying to acquire lock:
   ffff00080369bbe0 (&bp->lock){+.+.}-{3:3}, at: macb_start_xmit+0x808/0xb7c

   but task is already holding lock:
   ffff000803698e58 (&queue->tx_ptr_lock){+...}-{3:3}, at: macb_start_xmit
   +0x148/0xb7c

   which lock already depends on the new lock.

   the existing dependency chain (in reverse order) is:

   -> #3 (&queue->tx_ptr_lock){+...}-{3:3}:
          rt_spin_lock+0x50/0x1f0
          macb_start_xmit+0x148/0xb7c
          dev_hard_start_xmit+0x94/0x284
          sch_direct_xmit+0x8c/0x37c
          __dev_queue_xmit+0x708/0x1120
          neigh_resolve_output+0x148/0x28c
          ip6_finish_output2+0x2c0/0xb2c
          __ip6_finish_output+0x114/0x308
          ip6_output+0xc4/0x4a4
          mld_sendpack+0x220/0x68c
          mld_ifc_work+0x2a8/0x4f4
          process_one_work+0x20c/0x5f8
          worker_thread+0x1b0/0x35c
          kthread+0x144/0x200
          ret_from_fork+0x10/0x20

   -> #2 (_xmit_ETHER#2){+...}-{3:3}:
          rt_spin_lock+0x50/0x1f0
          sch_direct_xmit+0x11c/0x37c
          __dev_queue_xmit+0x708/0x1120
          neigh_resolve_output+0x148/0x28c
          ip6_finish_output2+0x2c0/0xb2c
          __ip6_finish_output+0x114/0x308
          ip6_output+0xc4/0x4a4
          mld_sendpack+0x220/0x68c
          mld_ifc_work+0x2a8/0x4f4
          process_one_work+0x20c/0x5f8
          worker_thread+0x1b0/0x35c
          kthread+0x144/0x200
          ret_from_fork+0x10/0x20

   -> #1 ((softirq_ctrl.lock)){+.+.}-{3:3}:
          lock_release+0x250/0x348
          __local_bh_enable_ip+0x7c/0x240
          __netdev_alloc_skb+0x1b4/0x1d8
          gem_rx_refill+0xdc/0x240
          gem_init_rings+0xb4/0x108
          macb_mac_link_up+0x9c/0x2b4
          phylink_resolve+0x170/0x614
          process_one_work+0x20c/0x5f8
          worker_thread+0x1b0/0x35c
          kthread+0x144/0x200
          ret_from_fork+0x10/0x20

   -> #0 (&bp->lock){+.+.}-{3:3}:
          __lock_acquire+0x15a8/0x2084
          lock_acquire+0x1cc/0x350
          rt_spin_lock+0x50/0x1f0
          macb_start_xmit+0x808/0xb7c
          dev_hard_start_xmit+0x94/0x284
          sch_direct_xmit+0x8c/0x37c
          __dev_queue_xmit+0x708/0x1120
          neigh_resolve_output+0x148/0x28c
          ip6_finish_output2+0x2c0/0xb2c
          __ip6_finish_output+0x114/0x308
          ip6_output+0xc4/0x4a4
          mld_sendpack+0x220/0x68c
          mld_ifc_work+0x2a8/0x4f4
          process_one_work+0x20c/0x5f8
          worker_thread+0x1b0/0x35c
          kthread+0x144/0x200
          ret_from_fork+0x10/0x20

   other info that might help us debug this:

   Chain exists of:
     &bp->lock --> _xmit_ETHER#2 --> &queue->tx_ptr_lock

    Possible unsafe locking scenario:

          CPU0                    CPU1
          ----                    ----
     lock(&queue->tx_ptr_lock);
                                  lock(_xmit_ETHER#2);
                                  lock(&queue->tx_ptr_lock);
     lock(&bp->lock);

    *** DEADLOCK ***

   Call trace:
    show_stack+0x18/0x24 (C)
    dump_stack_lvl+0xa0/0xf0
    dump_stack+0x18/0x24
    print_circular_bug+0x28c/0x370
    check_noncircular+0x198/0x1ac
    __lock_acquire+0x15a8/0x2084
    lock_acquire+0x1cc/0x350
    rt_spin_lock+0x50/0x1f0
    macb_start_xmit+0x808/0xb7c
    dev_hard_start_xmit+0x94/0x284
    sch_direct_xmit+0x8c/0x37c
    __dev_queue_xmit+0x708/0x1120
    neigh_resolve_output+0x148/0x28c
    ip6_finish_output2+0x2c0/0xb2c
    __ip6_finish_output+0x114/0x308
    ip6_output+0xc4/0x4a4
    mld_sendpack+0x220/0x68c
    mld_ifc_work+0x2a8/0x4f4
    process_one_work+0x20c/0x5f8
    worker_thread+0x1b0/0x35c
    kthread+0x144/0x200
    ret_from_fork+0x10/0x20

Notably, invoking the mog_init_rings() callback upon link establishment
is unnecessary. Instead, we can exclusively call mog_init_rings() within
the ndo_open() callback. This adjustment resolves the deadlock issue.
Furthermore, since MACB_CAPS_MACB_IS_EMAC cases do not use mog_init_rings()
when opening the network interface via at91ether_open(), moving
mog_init_rings() to macb_open() also eliminates the MACB_CAPS_MACB_IS_EMAC
check.

Fixes: 633e98a ("net: macb: use resolved link config in mac_link_up()")
Cc: stable@vger.kernel.org
Suggested-by: Kevin Hao <kexin.hao@windriver.com>
Signed-off-by: Xiaolei Wang <xiaolei.wang@windriver.com>
Link: https://patch.msgid.link/20251222015624.1994551-1-xiaolei.wang@windriver.com
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants