New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 787504 link

Starred by 1 user

Issue metadata

Status: Untriaged
Owner: ----
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: 2
Type: Bug



Sign in to add a comment

Suspicious RCU usage in rcu_dereference_protected_tid_tx

Project Member Reported by groeck@chromium.org, Nov 21 2017

Issue description

Observed during shutdown on eve running chromeos-4.4.

[86531.857845] 
[86531.859540] ===============================
[86531.864397] [ INFO: suspicious RCU usage. ]
[86531.869087] 4.4.96 #69 Tainted: G        W      
[86531.875488] -------------------------------
[86531.880421] /mnt/host/source/src/third_party/kernel/v4.4/drivers/net/wireless/iwl7000/mac80211/sta_info.h:633 suspicious rcu_dereference_protected() usage!
[86531.896007] 
[86531.896007] other info that might help us debug this:
[86531.896007] 
[86531.905709] 
[86531.905709] rcu_scheduler_active = 1, debug_locks = 0
[86531.913059] 5 locks held by wpa_supplicant/673:
[86531.924245]  #0:  (cb_lock){++++++}, at: [<ffffffff8bcb1b13>] genl_rcv+0x19/0x37
[86531.933527]  #1:  (genl_mutex){+.+.+.}, at: [<ffffffff8bcb1537>] genl_lock+0x17/0x19
[86531.942321]  #2:  (rtnl_mutex){+.+.+.}, at: [<ffffffff8bc830cc>] rtnl_lock+0x17/0x19
[86531.951093]  #3:  (&wdev->mtx){+.+.+.}, at: [<ffffffffc00807ac>] wdev_lock+0xf/0x11 [cfg80211]
[86531.960880]  #4:  (&local->sta_mtx){+.+.+.}, at: [<ffffffffc01b158f>] __sta_info_flush+0xce/0x243 [iwl7000_mac80211]
[86531.972875] 
[86531.972875] stack backtrace:
[86531.977788] CPU: 0 PID: 673 Comm: wpa_supplicant Tainted: G        W       4.4.96 #69
[86531.986551] Hardware name: Google Eve/Eve, BIOS Google_Eve.9584.95.0 09/27/2017
[86531.994732]  0000000000000000 e69cd24b50440ee7 ffff8803db22f730 ffffffff8b690a5e
[86532.003033]  ffff8803db1f8000 0000000000000001 ffff8803db22f760 ffffffff8b2e1914
[86532.011349]  0000000000000000 ffff8803db20c290 0000000000000003 0000000000000001
[86532.019664] Call Trace:
[86532.022408]  [<ffffffff8b690a5e>] dump_stack+0x67/0x90
[86532.028167]  [<ffffffff8b2e1914>] lockdep_rcu_suspicious+0x11f/0x128
[86532.035374]  [<ffffffffc01bd2e4>] rcu_dereference_protected_tid_tx+0x60/0x7b [iwl7000_mac80211]
[86532.045161]  [<ffffffffc01bdcdd>] ieee80211_sta_tear_down_BA_sessions+0x65/0x9f [iwl7000_mac80211]
[86532.055249]  [<ffffffffc01aba4a>] __sta_info_destroy_part1+0xa7/0x86c [iwl7000_mac80211]
[86532.064305]  [<ffffffff8b39cc4f>] ? ___might_sleep+0x101/0x25e
[86532.070900]  [<ffffffffc01b15eb>] __sta_info_flush+0x12a/0x243 [iwl7000_mac80211]
[86532.079348]  [<ffffffffc0221e6c>] ieee80211_set_disassoc+0x1f2/0x50a [iwl7000_mac80211]
[86532.088376]  [<ffffffffc0229ba0>] ieee80211_mgd_deauth+0x31e/0x366 [iwl7000_mac80211]
[86532.097211]  [<ffffffffc01d60b7>] ieee80211_deauth+0x18/0x1a [iwl7000_mac80211]
[86532.105437]  [<ffffffffc00a3430>] cfg80211_mlme_deauth+0x287/0x2d0 [cfg80211]
[86532.113465]  [<ffffffffc00837db>] nl80211_deauthenticate+0x192/0x1c1 [cfg80211]
[86532.121681]  [<ffffffffc0096794>] ? nl80211_vendor_cmd_dump+0x5d2/0x5d2 [cfg80211]
[86532.130146]  [<ffffffff8bcb1fb4>] genl_family_rcv_msg+0x483/0x51c
[86532.136965]  [<ffffffff8b2dfe80>] ? match_held_lock+0x1d/0x109
[86532.143496]  [<ffffffff8b2dfe80>] ? match_held_lock+0x1d/0x109
[86532.150033]  [<ffffffff8bcb20ab>] genl_rcv_msg+0x5e/0x82
[86532.155980]  [<ffffffff8bcb204d>] ? genl_family_rcv_msg+0x51c/0x51c
[86532.162980]  [<ffffffff8bcb0862>] netlink_rcv_skb+0x94/0xfc
[86532.169208]  [<ffffffff8b2e4e61>] ? lock_acquire+0x220/0x23f
[86532.175523]  [<ffffffff8bcb1b22>] genl_rcv+0x28/0x37
[86532.181071]  [<ffffffff8bcb1194>] netlink_sendmsg+0x803/0x8ae
[86532.187488]  [<ffffffff8bcb0991>] ? nlmsg_notify+0xc7/0xc7
[86532.193623]  [<ffffffff8bdfc6b8>] sock_sendmsg+0x6b/0x7d
[86532.199564]  [<ffffffff8bdfd47a>] ___sys_sendmsg+0x56f/0x650
[86532.205896]  [<ffffffff8b2dfe80>] ? match_held_lock+0x1d/0x109
[86532.212415]  [<ffffffff8b2e4e47>] ? lock_acquire+0x206/0x23f
[86532.218740]  [<ffffffff8b2e4e47>] ? lock_acquire+0x206/0x23f
[86532.225065]  [<ffffffff8b4428aa>] ? __might_fault+0x87/0x103
[86532.231391]  [<ffffffff8b44291b>] ? __might_fault+0xf8/0x103
[86532.237709]  [<ffffffff8be24ed8>] ? unix_ioctl+0x158/0x16b
[86532.243840]  [<ffffffff8bdfde87>] __sys_sendmsg+0xa7/0xfa
[86532.249864]  [<ffffffff8bdfde87>] ? __sys_sendmsg+0xa7/0xfa
[86532.256094]  [<ffffffff8bc50e5e>] SyS_sendmsg+0x19/0x1b
[86532.261935]  [<ffffffff8be3924b>] entry_SYSCALL_64_fastpath+0x1c/0x94

 

Comment 1 by groeck@chromium.org, Nov 21 2017

Description: Show this description

Comment 2 by groeck@chromium.org, Nov 21 2017

Cc: johannes...@intel.com
Labels: Kernel-4.4

Comment 3 by groeck@chromium.org, Nov 21 2017

Cc: rajatja@chromium.org matt.c...@intel.com

Sign in to add a comment