From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-qv1-f50.google.com (mail-qv1-f50.google.com [209.85.219.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A1303309F02 for ; Fri, 6 Mar 2026 20:03:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.50 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772827402; cv=none; b=b8uHbS7jJFRjxhgFinNkuIBW4FavSRfuwijbDowCYQ6gtdUy/UIgp461kwhh+6TnVr/Gt9ushecU/J21jpEJ5fFrcvwAOo6EGTAJOxJJUw5f2IqSQdpCm5eVqbpbQTZO2Dy/nWsupph2sU0rGjy+dmhjph87CzcGhNxeaK04QeI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772827402; c=relaxed/simple; bh=Y8ppU4G8/OQzMZ6eTsJIxOyR5s1YD7sfl68n5ceeh68=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=Ip3OvH1xnsrvBixelLOxrcTyJsM+VqQZRs8VHXkXW7OHwPcbMAYAM0tkCp6W+K3546JN7GipsIFuYY46oWVc/CSzVP0BRd5QrlKwHaw1x500q8PwgdCqFUPSdpsklS1ilnoamJ8ZhUnVMTt6nT3L09wZSE19SKn6Fb39f1WAkbY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=JCw/r+8F; arc=none smtp.client-ip=209.85.219.50 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="JCw/r+8F" Received: by mail-qv1-f50.google.com with SMTP id 6a1803df08f44-89a133cdd4aso50782306d6.0 for ; Fri, 06 Mar 2026 12:03:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1772827400; x=1773432200; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=HPRNLOamDcFlQvC9N/qMCQZ3FcaEUEmoKUrW4q9GB28=; b=JCw/r+8FecHGj/m0KRCdXM/pPyOKQUVT701df1RIVOSstf4fNe3kMFjRQ4l+PHDuJW 5+Fz+lMRX7RwV22YIwtZA17W+/mlSrsvkoadQ2f6LrXCWUcQoDOWUlwUbLcj86t4gyoO w4j34ZaRsYGZzM7PKIspVI07flUySxlMj/a4L4KlRZj8ak9Mh+lwO/EcaKOflgF9DZvv 3aJJ+c1Nb1KR2DkkV6t+EjrKmPEuv2j9J5Cz9WapFWz/vy1YKmAevHfHU1BjaWmTZZyR qVWmb8MJsay8L6GON8RVTFjPsDZmD/Ank47KhnJJue4nrX/K0Nzrb42ni+G31QsYUuOn Ra3Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1772827400; x=1773432200; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=HPRNLOamDcFlQvC9N/qMCQZ3FcaEUEmoKUrW4q9GB28=; b=Xmml68P5CZdvMjO7KNnW59JXTLXEBwfRY/tuNiWgW2ONa9FKWncl+Fll59W8k9u/nz 3l7zcpgIVVEFCiqP3VDH0u8wz9+WpQnVU2M2NZXisxXv0pEsnnqaIzqmscoeu+kQX0zF /62/BiFwOpDZjgycc+645ZC22LCVQkQfk88mW8a7w/wZCgfv8zHPF4AX9xGDkhB+AJjw wKUZEbvGOJbJNi2fjYiXqegV23wBFk2zuVqa4fbqikdoph/HWMDjgQl+dPvcgdZ8Y13H /5LMDU/zEeoQ/9fDhMcYtjw+JeMjOfhfu3m2kL0DQB2W7u0pGx7NSC8O8APGCT98mTYZ uOgg== X-Gm-Message-State: AOJu0YyhrXKbfT8EcS/rzxKVXOmT3HdEwQuh+ymqAIdQTzaCOPJveiaA QEwvs4IqwZyZc3/u6ZsOG5ZBYU11XpDJrI5IEPqiB5mq0iPSL1QmHqmE X-Gm-Gg: ATEYQzzyZvKZn2aht+IBQXWjOsz+O2iyDMABsfL3Rq0cXnc5zUxQ2DVG9Q/jjHSj64w kvFUX+eypT5Ifmv2nVnFwz7BPzdGVm6aorW/dYcyh3iJNfYTFd1F6AXsQBsSZXlQ6BPn4zvKg94 uCgFPtHGMR3mjn+aGDJgK6RUp4Q+pmTDZRad3hG8dXeR7ny5CJYavx6ezKEP5SZSTTuk2rVdNIY VHaxR1hN2td+BHcdarRZGxf8zQqPDI+WHz6hUPTDSinTOkQhMXIHNzW/t3HXi32CUP/7UBSiQ9Q Wq2hIdNMAA4XGWoCZUyHqqJDBmD11Ku3EKnKO7r5JRZ7+eF/ZoewWVGJkYLSQWq4kIgyT8Ff0At qeIkSIYW3HA5T4AG9/s38LyQvp0MmoQQLCxAf6PhXyc2rZUXMrG7iTkCioPhdeuxohFboLTw3nh Gx/ezbgjXgw1ZUQl0shKFIxFe3RkYmTU7Oeg9HEOHp3JgpkPnCtHAUM+hlEs+XlCksc7pLQ/AWH x9w X-Received: by 2002:a05:6214:e42:b0:899:f820:6414 with SMTP id 6a1803df08f44-89a30af509fmr43309316d6.48.1772827400370; Fri, 06 Mar 2026 12:03:20 -0800 (PST) Received: from instance-20260207-1316.vcn12250046.oraclevcn.com ([150.136.248.187]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-89a3140da14sm23301266d6.9.2026.03.06.12.03.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 06 Mar 2026 12:03:19 -0800 (PST) From: Josh Law X-Google-Original-From: Josh Law To: willy@infradead.org, akpm@linux-foundation.org Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, Josh Law Subject: [PATCH] lib/idr: fix ida_find_first_range() missing IDs across chunk boundaries Date: Fri, 6 Mar 2026 20:03:19 +0000 Message-ID: <20260306200319.2819286-1-objecting@objecting.org> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Josh Law ida_find_first_range() only examines the first XArray entry returned by xa_find(). If that entry does not contain a set bit at or above the requested offset, the function returns -ENOENT without searching subsequent entries, even though later chunks may contain allocated IDs within the requested range. For example, a DRM driver using IDA to manage connector IDs may allocate IDs across multiple 1024-bit IDA chunks. If early IDs are freed and the driver calls ida_find_first_range() with a min that falls into a sparsely populated first chunk, valid IDs in higher chunks are silently missed. This can cause the driver to incorrectly conclude no connectors exist in the queried range, leading to stale connector state or failed hotplug detection. Fix this by looping over xa_find()/xa_find_after() to continue searching subsequent entries when the current one has no matching bit. Signed-off-by: Josh Law --- lib/idr.c | 55 ++++++++++++++++++++++++------------------------------- 1 file changed, 24 insertions(+), 31 deletions(-) diff --git a/lib/idr.c b/lib/idr.c index 69bee5369670..1649f41016e7 100644 --- a/lib/idr.c +++ b/lib/idr.c @@ -495,10 +495,9 @@ int ida_find_first_range(struct ida *ida, unsigned int min, unsigned int max) unsigned long index = min / IDA_BITMAP_BITS; unsigned int offset = min % IDA_BITMAP_BITS; unsigned long *addr, size, bit; - unsigned long tmp = 0; + unsigned long tmp; unsigned long flags; void *entry; - int ret; if ((int)min < 0) return -EINVAL; @@ -508,40 +507,34 @@ int ida_find_first_range(struct ida *ida, unsigned int min, unsigned int max) xa_lock_irqsave(&ida->xa, flags); entry = xa_find(&ida->xa, &index, max / IDA_BITMAP_BITS, XA_PRESENT); - if (!entry) { - ret = -ENOENT; - goto err_unlock; - } - - if (index > min / IDA_BITMAP_BITS) - offset = 0; - if (index * IDA_BITMAP_BITS + offset > max) { - ret = -ENOENT; - goto err_unlock; - } - - if (xa_is_value(entry)) { - tmp = xa_to_value(entry); - addr = &tmp; - size = BITS_PER_XA_VALUE; - } else { - addr = ((struct ida_bitmap *)entry)->bitmap; - size = IDA_BITMAP_BITS; - } - - bit = find_next_bit(addr, size, offset); + while (entry) { + if (index > min / IDA_BITMAP_BITS) + offset = 0; + if (index * IDA_BITMAP_BITS + offset > max) + break; - xa_unlock_irqrestore(&ida->xa, flags); + if (xa_is_value(entry)) { + tmp = xa_to_value(entry); + addr = &tmp; + size = BITS_PER_XA_VALUE; + } else { + addr = ((struct ida_bitmap *)entry)->bitmap; + size = IDA_BITMAP_BITS; + } - if (bit == size || - index * IDA_BITMAP_BITS + bit > max) - return -ENOENT; + bit = find_next_bit(addr, size, offset); + if (bit < size && + index * IDA_BITMAP_BITS + bit <= max) { + xa_unlock_irqrestore(&ida->xa, flags); + return index * IDA_BITMAP_BITS + bit; + } - return index * IDA_BITMAP_BITS + bit; + entry = xa_find_after(&ida->xa, &index, + max / IDA_BITMAP_BITS, XA_PRESENT); + } -err_unlock: xa_unlock_irqrestore(&ida->xa, flags); - return ret; + return -ENOENT; } EXPORT_SYMBOL(ida_find_first_range); -- 2.43.0