Re: kernel panic happens when disconnecting Bluetooth headset

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Sep 14, 2009 at 2:10 AM, Lan Zhu <zhu.lan.cn@xxxxxxxxx> wrote:
> Hi Marcel,
>
> 2009/9/12 Marcel Holtmann <marcel@xxxxxxxxxxxx>:
>> Hi Zhu,
>>
>>> >> We met a issue that kernel panic happens when disconnecting some kinds
>>> >> of Bluetooth headset, then we did some analysis and made some changes
>>> >> on kernel code which have avoided the panic happening. Would you
>>> >> please help to check if our analysis and fix is correct?
>>> >>
>>> >> =============
>>> >> Issue description
>>> >> =============
>>> >> On Android platform(kernel 2.6.29), disconnecting Bluetooth headset
>>> >> may cause kernel panic on certain conditions.
>>> >>
>>> >> (Pre-condition is android paired with headset.)
>>> >> Initiate the connection from android, disconnect it from android, result is OK.
>>> >> Initiate the connection from android, disconnect it from headset, result is OK.
>>> >> Initiate the connection from headset, disconnect it from headset, result is OK.
>>> >> Initiate the connection from headset, disconnect it from android, for
>>> >> Motorola H12 headset, result is OK.
>>> >> Initiate the connection from headset, disconnect it from android, for
>>> >> Motorola H620/560 headset, result is kernel panic.
>>> >>
>>> >> =============
>>> >> Kernel panic point
>>> >> =============
>>> >> kernel panic at __list_del() in the function rfcomm_session_del() ,
>>> >> panic reason is "Unable to handle kernel paging request at virtual
>>> >> address 00200200"
>>> >>
>>> >> =============
>>> >> Kernel log analysis
>>> >> =============
>>> >> rfcomm_session_del() is still called after the session entry is
>>> >> removed from the list. Then __list_del() will cause kernel panic
>>> >> because of the incorrect pointer. This situation occurs when calling
>>> >> rfcomm_recv_ua() when the socket state is BT_CLOSED . So we need to
>>> >> find out why the socket state become BT_CLOSED before we calling
>>> >> rfcomm_recv_ua().
>>> >>
>>> >> # [  171.677429] rfcomm_sock_sendmsg: sock ce9a0960, sk cc5c4c00
>>> >> [  171.683532] rfcomm_dlc_send: dlc cd3fe920 mtu 255 len 14
>>> >> [  171.689422] rfcomm_process_rx: session cc751be0 state 1 qlen 0
>>> >> [  171.695709] rfcomm_process_rx: @@@ @@@ sk_state = 1
>>> >> [  171.701110] rfcomm_process_dlcs: session cc751be0 state 1
>>> >> [  171.706939] rfcomm_process_tx: dlc cd3fe920 state 1 cfc 40
>>> >> rx_credits 33 tx_credits 31
>>> >> [  171.715515] rfcomm_send_frame: session cc751be0 len 18
>>> >> [  171.721130] rfcomm_session_put: in rfcomm_session_put, s->refcnt = 3
>>> >> [  174.127807] rfcomm_sock_sendmsg: sock ce9a0960, sk cc5c4c00
>>> >> [  174.134490] rfcomm_dlc_send: dlc cd3fe920 mtu 255 len 6
>>> >> [  174.141540] rfcomm_process_rx: session cc751be0 state 1 qlen 0
>>> >> [  174.148498] rfcomm_process_rx: @@@ @@@ sk_state = 1
>>> >> [  174.154968] rfcomm_process_dlcs: session cc751be0 state 1
>>> >> [  174.161437] rfcomm_process_tx: dlc cd3fe920 state 1 cfc 40
>>> >> rx_credits 33 tx_credits 30
>>> >> [  174.171173] rfcomm_send_frame: session cc751be0 len 10
>>> >> [  174.177642] rfcomm_session_put: in rfcomm_session_put, s->refcnt = 3
>>> >> [  174.205932] rfcomm_sock_release: sock ce9a0960, sk cc5c4c00
>>> >> [  174.212707] rfcomm_sock_shutdown: sock ce9a0960, sk cc5c4c00
>>> >> [  174.220031] __rfcomm_sock_close: sk cc5c4c00 state 1 socket ce9a0960
>>> >> [  174.227508] __rfcomm_dlc_close: dlc cd3fe920 state 1 dlci 20 err 0
>>> >> session cc751be0
>>> >> [  174.236877] rfcomm_send_disc: cc751be0 dlci 20
>>> >> [  174.242706] rfcomm_send_frame: session cc751be0 len 4
>>> >> [  174.248962] rfcomm_dlc_set_timer: dlc cd3fe920 state 8 timeout 2560
>>> >> [  174.256835] rfcomm_sock_kill: sk cc5c4c00 state 1 refcnt 2
>>> >> [  174.263336] rfcomm_sock_destruct: sk cc5c4c00 dlc cd3fe920
>>> >> [  174.399444] rfcomm_l2data_ready: ccf70400 bytes 4
>>> >> [  174.404724] rfcomm_process_rx: session cc751be0 state 1 qlen 1
>>> >> [  174.411010] rfcomm_process_rx: @@@ @@@ sk_state = 1
>>> >> [  174.416412] rfcomm_recv_ua: session cc751be0 state 1 dlci 20
>>> >> [  174.422515] __rfcomm_dlc_close: dlc cd3fe920 state 9 dlci 20 err 0
>>> >> session cc751be0
>>> >> [  174.430816] rfcomm_dlc_clear_timer: dlc cd3fe920 state 9
>>> >> [  174.436553] rfcomm_dlc_unlink: dlc cd3fe920 refcnt 1 session cc751be0
>>> >> [  174.443572] rfcomm_dlc_free: cd3fe920
>>> >> [  174.447570] rfcomm_session_put: in rfcomm_session_put, s->refcnt = 3
>>> >> [  174.454528] rfcomm_send_disc: cc751be0 dlci 0
>>> >> [  174.459259] rfcomm_send_frame: session cc751be0 len 4
>>> >> [  174.464904] rfcomm_process_dlcs: session cc751be0 state 8
>>> >> [  174.470703] rfcomm_session_put: in rfcomm_session_put, s->refcnt = 2
>>> >> [  174.898284] rfcomm_l2data_ready: ccf70400 bytes 4
>>> >> [  174.903442] rfcomm_l2state_change: ccf70400 state 9
>>> >> [  174.908874] rfcomm_process_rx: session cc751be0 state 8 qlen 1
>>> >> [  174.915130] rfcomm_process_rx: @@@ @@@ sk_state = 9
>>> >> [  174.920562] rfcomm_recv_ua: session cc751be0 state 8 dlci 0
>>> >> [  174.926574] rfcomm_session_put: in rfcomm_session_put, s->refcnt = 2
>>> >> [  174.933532] rfcomm_process_rx: @@@ @@@ sk_state == BT_CLOSED , s->initiator=0
>>> >> [  174.941253] rfcomm_session_put: in rfcomm_session_put, s->refcnt = 1
>>> >> [  174.948211] rfcomm_session_del: session cc751be0 state 8
>>> >> [  174.953918] @@@@ in rfcomm_session_del()
>>> >> [  174.958312] @@@@ s->list = cc751be0
>>> >> [  174.962097] @@@@ s->list.next = ccbfe9a0
>>> >> [  174.966369] @@@@ s->list.prev = c047d524
>>> >> [  174.970733] @@@@ list is valid, call list_del()
>>> >> [  174.975646] @@@@ after list_del()
>>> >> [  174.979278] @@@@ s->list = cc751be0
>>> >> [  174.983184] @@@@ s->list.next = 00100100
>>> >> [  174.987457] @@@@ s->list.prev = 00200200
>>> >> [  174.991729] rfcomm_session_close: session cc751be0 state 8 err 104
>>> >> [  174.998504] rfcomm_session_put: in rfcomm_session_put, s->refcnt = 1
>>> >> [  175.005310] rfcomm_session_del: session cc751be0 state 9
>>> >> [  175.011169] @@@@ in rfcomm_session_del()
>>> >> [  175.015441] @@@@ s->list = cc751be0
>>> >> [  175.019409] @@@@ s->list.next = 00100100
>>> >> [  175.023651] @@@@ s->list.prev = 00200200
>>> >> [  175.027923] @@@@ list is valid, call list_del()
>>> >> [  175.032958] Unable to handle kernel paging request at virtual
>>> >> address 00200200
>>> >> [  175.040679] pgd = c0004000
>>> >> [  175.043792] [00200200] *pgd=00000000
>>> >> [  175.047821] Internal error: Oops: 817 [#1]
>>> >> [  175.052246] Modules linked in:
>>> >> [  175.055725] CPU: 0    Not tainted  (2.6.29-omap1-dirty #34)
>>> >> [  175.061859] PC is at rfcomm_session_del+0x6c/0x108
>>> >> [  175.067047] LR is at release_console_sem+0x190/0x1a0
>>> >> [  175.072509] pc : [<c033ded8>]    lr : [<c0066308>]    psr: 60000013
>>> >> [  175.072509] sp : cc1abf38  ip : cc1abe68  fp : cc1abf4c
>>> >> [  175.084960] r10: cc751c04  r9 : c036d2fc  r8 : cc751be0
>>> >> [  175.090545] r7 : 00000068  r6 : cc751c04  r5 : 00000009  r4 : cc751be0
>>> >> [  175.097656] r3 : 00100100  r2 : 00100100  r1 : 00200200  r0 : c0422876
>>> >>
>>> >> =============
>>> >> HCI log analysis
>>> >> =============
>>> >> Compare the hcidump log of the correct case with the one of the panic
>>> >> case, we found there is only one difference in the message sequence.
>>> >> In the panic case, headset send L2CAP Disconn_Req immediately after
>>> >> sending rfcomm UA frame to android. We think this is the reason that
>>> >> cause the socket state become BT_CLOSED.
>>> >>
>>> >> Please compare these two log, pay attention to the message direction
>>> >> of the last Disconn_Req.
>>> >>
>>> >>
>>> >> Log of correct case:
>>> >> ----------------------------
>>> >>
>>> >>
>>> >> 009-09-10 15:27:28.963519 < ACL data: handle 1 flags 0x02 dlen 22
>>> >>    L2CAP(d): cid 0x0047 len 18 [psm 3]
>>> >>      RFCOMM(d): UIH: cr 0 dlci 20 pf 0 ilen 14 fcs 0xeb
>>> >>      0000: 0d 0a 2b 43 49 45 56 3a  20 37 2c 33 0d 0a        ..+CIEV: 7,3..
>>> >> 009-09-10 15:27:28.967272 > HCI Event: Number of Completed Packets (0x13) plen
>>> >>
>>> >>    handle 1 packets 1
>>> >> 009-09-10 15:27:29.243945 < ACL data: handle 1 flags 0x02 dlen 8
>>> >>    L2CAP(d): cid 0x0047 len 4 [psm 3]
>>> >>      RFCOMM(s): DISC: cr 0 dlci 20 pf 1 ilen 0 fcs 0x7d
>>> >> 009-09-10 15:27:29.247363 > HCI Event: Number of Completed Packets (0x13) plen
>>> >>
>>> >>    handle 1 packets 1
>>> >> 009-09-10 15:27:29.274890 > ACL data: handle 1 flags 0x02 dlen 8
>>> >>    L2CAP(d): cid 0x0040 len 4 [psm 3]
>>> >>      RFCOMM(s): UA: cr 0 dlci 20 pf 1 ilen 0 fcs 0x57
>>> >> 009-09-10 15:27:29.296343 < ACL data: handle 1 flags 0x02 dlen 8
>>> >>    L2CAP(d): cid 0x0047 len 4 [psm 3]
>>> >>      RFCOMM(s): DISC: cr 0 dlci 0 pf 1 ilen 0 fcs 0x9c
>>> >> 009-09-10 15:27:29.298480 > HCI Event: Number of Completed Packets (0x13) plen
>>> >>
>>> >>    handle 1 packets 1
>>> >> 009-09-10 15:27:29.319873 > ACL data: handle 1 flags 0x02 dlen 8
>>> >>    L2CAP(d): cid 0x0040 len 4 [psm 3]
>>> >>      RFCOMM(s): UA: cr 0 dlci 0 pf 1 ilen 0 fcs 0xb6
>>> >> 009-09-10 15:27:29.320727 < ACL data: handle 1 flags 0x02 dlen 12
>>> >>    L2CAP(s): Disconn req: dcid 0x0047 scid 0x0040
>>> >> 009-09-10 15:27:29.323474 > HCI Event: Number of Completed Packets (0x13) plen
>>> >>
>>> >>    handle 1 packets 1
>>> >> 009-09-10 15:27:29.337237 > ACL data: handle 1 flags 0x02 dlen 12
>>> >>    L2CAP(s): Disconn rsp: dcid 0x0047 scid 0x0040
>>> >>
>>> >>
>>> >>
>>> >>
>>> >> log of panic case:
>>> >> ------------------------
>>> >>
>>> >>
>>> >>
>>> >> 2009-09-10 13:34:24.020208 < ACL data: handle 1 flags 0x02 dlen 22
>>> >>     L2CAP(d): cid 0x0041 len 18 [psm 3]
>>> >>       RFCOMM(d): UIH: cr 0 dlci 20 pf 0 ilen 14 fcs 0xeb
>>> >>       0000: 0d 0a 2b 43 49 45 56 3a  20 37 2c 33 0d 0a        ..+CIEV: 7,3..
>>> >> 2009-09-10 13:34:24.281256 > HCI Event: Number of Completed Packets (0x13) plen
>>> >> 5
>>> >>     handle 1 packets 1
>>> >> 2009-09-10 13:34:24.083580 < ACL data: handle 1 flags 0x02 dlen 8
>>> >>     L2CAP(d): cid 0x0041 len 4 [psm 3]
>>> >>       RFCOMM(s): DISC: cr 0 dlci 20 pf 1 ilen 0 fcs 0x7d
>>> >> 2009-09-10 13:34:24.529442 > HCI Event: Number of Completed Packets (0x13) plen
>>> >> 5
>>> >>     handle 1 packets 1
>>> >> 2009-09-10 13:34:24.531914 > ACL data: handle 1 flags 0x02 dlen 8
>>> >>     L2CAP(d): cid 0x0040 len 4 [psm 3]
>>> >>       RFCOMM(s): UA: cr 0 dlci 20 pf 1 ilen 0 fcs 0x57
>>> >> 2009-09-10 13:34:24.533135 < ACL data: handle 1 flags 0x02 dlen 8
>>> >>     L2CAP(d): cid 0x0041 len 4 [psm 3]
>>> >>       RFCOMM(s): DISC: cr 0 dlci 0 pf 1 ilen 0 fcs 0x9c
>>> >> 2009-09-10 13:34:25.028649 > HCI Event: Number of Completed Packets (0x13) plen
>>> >> 5
>>> >>     handle 1 packets 1
>>> >> 2009-09-10 13:34:25.032128 > ACL data: handle 1 flags 0x02 dlen 8
>>> >>     L2CAP(d): cid 0x0040 len 4 [psm 3]
>>> >>       RFCOMM(s): UA: cr 0 dlci 0 pf 1 ilen 0 fcs 0xb6
>>> >> 2009-09-10 13:34:25.032341 > ACL data: handle 1 flags 0x02 dlen 12
>>> >>     L2CAP(s): Disconn req: dcid 0x0040 scid 0x0041
>>> >> 2009-09-10 13:34:25.032646 < ACL data: handle 1 flags 0x02 dlen 12
>>> >>     L2CAP(s): Disconn rsp: dcid 0x0040 scid 0x0041
>>> >>
>>> >> =============
>>> >> Analysis Result
>>> >> =============
>>> >> For some kinds of Bluetooth headset such as Motorola H560/H620 which
>>> >> are based on BCM2044S, they will send L2CAP Disconn_Req command right
>>> >> after sending rfcomm UA frame. This L2CAP Disconn_Req will cause the
>>> >> rfcomm socket state become BT_CLOSED before completely handling UA
>>> >> frame, thus it will cause kernel panic. I think we can ignore the
>>> >> received rfcomm frames if socket state is BT_CLOSED, because it
>>> >> doesn't make sense in the BT_CLOSED state.
>>> >>
>>> >>
>>> >> =============
>>> >> Changed Code
>>> >> =============
>>> >> We changed the code in the function rfcomm_process_rx() in
>>> >> net/bluetooth/rfcomm/core.c, check the socket state first before
>>> >> handling the received framew. If the socket state is BT_CLOSED, we
>>> >> don't handle any rfcomm frames but just close the session.
>>> >>
>>> >> The change is like below
>>> >>
>>> >> +       if (sk->sk_state != BT_CLOSED) {
>>> >>         /* Get data directly from socket receive queue without copying it. */
>>> >>         while ((skb = skb_dequeue(&sk->sk_receive_queue))) {
>>> >>                 skb_orphan(skb);
>>> >>                 rfcomm_recv_frame(s, skb);
>>> >>         }
>>> >> -
>>> >> -       if (sk->sk_state == BT_CLOSED) {
>>> >> +       } else {
>>> >>                 if (!s->initiator)
>>> >>                         rfcomm_session_put(s);
>>> >>
>>> >>                 rfcomm_session_close(s, sk->sk_err);
>>> >>          }
>>> >
>>> > so I do see the issue here, but I don't agree with the fix since it
>>> > changes behavior that might cause other issues. So in case the frame
>>> > processing leads to sk->sk_state == BT_CLOSED we are not closing the
>>> > connection anymore if we make it depend on a state before the frame
>>> > processing. And nothing guarantees that rfcomm_process_rx gets scheduled
>>> > again.
>>> >
>>> > diff --git a/net/bluetooth/rfcomm/core.c b/net/bluetooth/rfcomm/core.c
>>> > index 94b3388..606143b 100644
>>> > --- a/net/bluetooth/rfcomm/core.c
>>> > +++ b/net/bluetooth/rfcomm/core.c
>>> > @@ -1798,12 +1798,16 @@ static inline void rfcomm_process_rx(struct rfcomm_session *s)
>>> >
>>> >        BT_DBG("session %p state %ld qlen %d", s, s->state, skb_queue_len(&sk->sk_receive_queue));
>>> >
>>> > +       rfcomm_session_hold(s);
>>> > +
>>> >        /* Get data directly from socket receive queue without copying it. */
>>> >        while ((skb = skb_dequeue(&sk->sk_receive_queue))) {
>>> >                skb_orphan(skb);
>>> >                rfcomm_recv_frame(s, skb);
>>> >        }
>>> >
>>> > +       rfcomm_session_put(s);
>>> > +
>>> >        if (sk->sk_state == BT_CLOSED) {
>>> >                if (!s->initiator)
>>> >                        rfcomm_session_put(s);
>>> >
>>> > What does the above patch do for you? Since if I read it correctly, then
>>> > the rfcomm_recv_ua causes the rfcomm_session_put to trigger the closing
>>> > of the session. And then in this case it is delayed until after all
>>> > frames are processed.
>>> >
>>> >
>>>
>>> I've tried your patch but unfortunately kernel panic still happened.
>>>
>>> From the log I noticed that if rfcomm_l2state_change is called before
>>> rfcomm_process_rx, kernel panic will happen definitely.
>>>
>>> Below lines are in the correct log,
>>>
>>> [  139.323852] rfcomm_l2data_ready: ccf70000 bytes 4
>>> [  139.346252] rfcomm_process_rx: session ccb94ce0 state 8 qlen 1
>>> ...
>>> [  139.457519] rfcomm_l2state_change: ccf70000 state 9
>>> (disconnect ok)
>>>
>>> In the above case, when process_rx, the code in the condition "if
>>> (sk->sk_state == BT_CLOSED)" will never run.
>>>
>>> Below lines are in the panic log,
>>>
>>> [  174.898284] rfcomm_l2data_ready: ccf70400 bytes 4
>>> [  174.903442] rfcomm_l2state_change: ccf70400 state 9
>>> [  174.908874] rfcomm_process_rx: session cc751be0 state 8 qlen 1
>>> ...
>>> ( then panic)
>>>
>>> In the above case, sk_state is changed to 9 (BT_CLOSED) firstly,  then
>>> process_rx, so the code in the condition "if (sk->sk_state ==
>>> BT_CLOSED) " will be run, it will call session_put twice. I think this
>>> is the root cause of panic.
>>
>> I know why it happens, that is not the problem. My point is not to break
>> current scheduling assumptions.
>>
>> So if you move the rfcomm_session_put() now at the end of the function,
>> then it should be fine, right?
>>
>> Regards
>>
>> Marcel
>>
>>
>>
>
> You are right. I moved the rfcomm_session_put() at the end of
> rfcomm_process_tx() then kernel panic doesn't happen any longer.
>
> The changed code is like below,
>
> @@ -1796,6 +1796,8 @@ static inline void rfcomm_process_rx(struct rfcomm_session
>
>        BT_DBG("session %p state %ld qlen %d", s, s->state, skb_queue_len(&sk->s
>
> +       rfcomm_session_hold(s);
> +
>        /* Get data directly from socket receive queue without copying it. */
>        while ((skb = skb_dequeue(&sk->sk_receive_queue))) {
>                skb_orphan(skb);
> @@ -1808,6 +1810,8 @@ static inline void rfcomm_process_rx(struct rfcomm_session
>
>                rfcomm_session_close(s, sk->sk_err);
>        }
> +
> +       rfcomm_session_put(s);
>  }
>
>  static inline void rfcomm_accept_connection(struct rfcomm_session *s)
>
> Please submit this change to bluez release.


Unfortunately, with this change I get a panic disconnecting from
Motorola H270 in the case that the headset initiated RFCOMM and we
disconnect RFCOMM.

Here is the hcidump:

2009-09-21 17:22:37.384811 < ACL data: handle 1 flags 0x02 dlen 22
    L2CAP(d): cid 0x0041 len 18 [psm 3]
      RFCOMM(d): UIH: cr 0 dlci 20 pf 0 ilen 14 fcs 0xeb
      0000: 0d 0a 2b 43 49 45 56 3a  20 37 2c 33 0d 0a        ..+CIEV: 7,3..
2009-09-21 17:22:37.502273 > HCI Event: Number of Completed Packets
(0x13) plen 5
    handle 1 packets 1
2009-09-21 17:22:37.788895 < ACL data: handle 1 flags 0x02 dlen 8
    L2CAP(d): cid 0x0041 len 4 [psm 3]
      RFCOMM(s): DISC: cr 0 dlci 20 pf 1 ilen 0 fcs 0x7d
2009-09-21 17:22:37.906204 > HCI Event: Number of Completed Packets
(0x13) plen 5
    handle 1 packets 1
2009-09-21 17:22:37.933090 > ACL data: handle 1 flags 0x02 dlen 8
    L2CAP(d): cid 0x0040 len 4 [psm 3]
      RFCOMM(s): UA: cr 0 dlci 20 pf 1 ilen 0 fcs 0x57
2009-09-21 17:22:38.636764 < ACL data: handle 1 flags 0x02 dlen 8
    L2CAP(d): cid 0x0041 len 4 [psm 3]
      RFCOMM(s): DISC: cr 0 dlci 0 pf 1 ilen 0 fcs 0x9c
2009-09-21 17:22:38.744125 > HCI Event: Number of Completed Packets
(0x13) plen 5
    handle 1 packets 1
2009-09-21 17:22:38.763687 > ACL data: handle 1 flags 0x02 dlen 8
    L2CAP(d): cid 0x0040 len 4 [psm 3]
      RFCOMM(s): UA: cr 0 dlci 0 pf 1 ilen 0 fcs 0xb6
2009-09-21 17:22:38.783554 > ACL data: handle 1 flags 0x02 dlen 12
    L2CAP(s): Disconn req: dcid 0x0040 scid 0x0041
2009-09-21 17:22:39.029526 < ACL data: handle 1 flags 0x02 dlen 12
    L2CAP(s): Disconn rsp: dcid 0x0040 scid 0x0041
2009-09-21 17:22:39.136581 > HCI Event: Number of Completed Packets
(0x13) plen 5
    handle 1 packets 1
2009-09-21 17:22:41.337203 > HCI Event: Disconn Complete (0x05) plen 4
    status 0x00 handle 1 reason 0x13
    Reason: Remote User Terminated Connection

And the panic:

<7>[ 3161.665557] rfcomm:rfcomm_session_del: session c9c06ad0 state 9
<7>[ 3161.671905] l2cap:l2cap_sock_release: sock cea04360, sk c97f02f8
<7>[ 3161.678497] l2cap:l2cap_sock_shutdown: sock cea04360, sk c97f02f8
<7>[ 3161.685028] l2cap:l2cap_sock_kill: sk c97f02f8 state 9
<7>[ 3161.695587] l2cap:l2cap_sock_destruct: sk c97f02f8
<4>[ 3161.700805] npelly 1911 rfcomm_process_sessions session c9c06ad0
refcnt 1802201963
<7>[ 3161.709014] rfcomm:rfcomm_process_dlcs: session c9c06ad0 state 1802201963
<7>[ 3161.716308] rfcomm:rfcomm_process_dlcs: session c9c06ad0 dlc 6b6b6b6b
<1>[ 3161.726776] Unable to handle kernel paging request at virtual
address 6b6b6b6b
<1>[ 3161.734619] pgd = c0004000
<1>[ 3161.737609] [6b6b6b6b] *pgd=00000000
<4>[ 3161.741638] Internal error: Oops: 5 [#1] PREEMPT
<4>[ 3161.746734] Modules linked in:
<4>[ 3161.750213] CPU: 0    Not tainted
(2.6.29-omap1-07358-g9a3fd55-dirty #206)
<4>[ 3161.757629] PC is at rfcomm_process_dlcs+0x108/0x590
<4>[ 3161.762969] LR is at preempt_schedule+0x44/0x54
<4>[ 3161.767852] pc : [<c03911f4>]    lr : [<c03a27c4>]    psr: 60000113
<4>[ 3161.767883] sp : ccdf9e80  ip : ccdf9dd8  fp : ccdf9edc
<4>[ 3161.780273] r10: 00000000  r9 : c9c06af4  r8 : c9c06ad0
<4>[ 3161.786010] r7 : 00000000  r6 : c9c06ad0  r5 : c4c68680  r4 : 6b6b6b6b
<4>[ 3161.792968] r3 : c9c06ae0  r2 : ccdf8000  r1 : c61a8940  r0 : 0000004c
<4>[ 3161.800079] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM
Segment kernel
<4>[ 3161.807983] Control: 10c5387d  Table: 86db8019  DAC: 00000017
<4>[ 3161.814147]
<4>[ 3161.814147] PC: 0xc0391174:
[...]
<4>[ 3162.973175] Backtrace:
<4>[ 3162.976013] [<c03910ec>] (rfcomm_process_dlcs+0x0/0x590) from
[<c03930b0>] (rfcomm_process_sessions+0x1a34/0x1a9c)
<4>[ 3162.987579] [<c039167c>] (rfcomm_process_sessions+0x0/0x1a9c)
from [<c03932ec>] (rfcomm_run+0x1d4/0x2ac)
<4>[ 3162.998199] [<c0393118>] (rfcomm_run+0x0/0x2ac) from
[<c008e7d8>] (kthread+0x5c/0x94)
<4>[ 3163.013763] [<c008e77c>] (kthread+0x0/0x94) from [<c007c998>]
(do_exit+0x0/0x714)


Seems like this fix avoids the panic due to calling
rfcomm_session_close() on a deleted session, but does not always
address the unbalanced rfcomm_session_put() which may be the root
cause.

Lan Zhu suspected this in the original post, and his original fix does
in fact fix this panic as well as the originally reported panic,
because it avoids the unbalanced rfcomm_session_put().

Marcel I know you are concerned about the original fix changing
scheduling assumptions, are you able to comment on this further?

Are there any other suggestions for patches for this issue? I have
spent the best part of the day trying to figure this one out, but the
recounting in the rfcomm core is quite subtle and I think it really
needs someone familiar with the code to have a quick look and come up
with the safest patch. I can run tests.

In the mean time, I am doing some testing of Lan Zhu's original fix
and if there are no better suggestions we will run with that one for
Android.

Nick


Some more analysis:

With the RFCOMM connection in idle there are 2 references on s->refcnt

However three references are removed during disconnect with the H270
- rfcomm_process_sessions() -> __rfcomm_dlc_close() -> rfcomm_dlc_unlink()
- rfcomm_process_sessions() -> rfcomm_process_rx() -> rfcomm_recv_ua()
with dlci = 0 and s->state = BT_DISCONN
- rfcomm_process_sessions() -> rfcomm_process_rx() with sk_state =
BT_CLOSED and s->initiator = 0

in that order.

On another headset, for example the Moto H350, we only see the first
two references removed during disconnect.

- rfcomm_process_sessions() -> __rfcomm_dlc_close() -> rfcomm_dlc_unlink()
- rfcomm_process_sessions() -> rfcomm_process_rx() -> rfcomm_recv_ua()
with dlci = 0 and s->state = BT_DISCONN
--
To unsubscribe from this list: send the line "unsubscribe linux-bluetooth" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Bluez Devel]     [Linux Wireless Networking]     [Linux Wireless Personal Area Networking]     [Linux ATH6KL]     [Linux USB Devel]     [Linux Media Drivers]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Big List of Linux Books]

  Powered by Linux