Oops, forgot to test this one. On Tuesday 10 June 2014 12:51:06 Stanislaw Gruszka wrote: > On USB we can not get atomically TKIP key. We have to disable support > for TKIP acceleration on USB hardware to avoid bug as showed bellow. *below > [ 860.827243] BUG: scheduling while atomic: hostapd/3397/0x00000002 > <snip> > [ 860.827280] Call Trace: > [ 860.827282] [<ffffffff81682ea6>] dump_stack+0x4d/0x66 > [ 860.827284] [<ffffffff8167eb9b>] __schedule_bug+0x47/0x55 > [ 860.827285] [<ffffffff81685bb3>] __schedule+0x733/0x7b0 > [ 860.827287] [<ffffffff81685c59>] schedule+0x29/0x70 > [ 860.827289] [<ffffffff81684f8a>] schedule_timeout+0x15a/0x2b0 > [ 860.827291] [<ffffffff8105ac50>] ? ftrace_raw_event_tick_stop+0xc0/0xc0 > [ 860.827294] [<ffffffff810c13c2>] ? __module_text_address+0x12/0x70 > [ 860.827296] [<ffffffff81686823>] wait_for_completion_timeout+0xb3/0x140 > [ 860.827298] [<ffffffff81080fc0>] ? wake_up_state+0x20/0x20 > [ 860.827301] [<ffffffff814d5b3d>] usb_start_wait_urb+0x7d/0x150 > [ 860.827303] [<ffffffff814d5cd5>] usb_control_msg+0xc5/0x110 > [ 860.827305] [<ffffffffa02fb0c6>] rt2x00usb_vendor_request+0xc6/0x160 [rt2x00usb] > [ 860.827307] [<ffffffffa02fb215>] rt2x00usb_vendor_req_buff_lock+0x75/0x150 [rt2x00usb] > [ 860.827309] [<ffffffffa02fb393>] rt2x00usb_vendor_request_buff+0xa3/0xe0 [rt2x00usb] > [ 860.827311] [<ffffffffa023d1a3>] rt2x00usb_register_multiread+0x33/0x40 [rt2800usb] > [ 860.827314] [<ffffffffa05805f9>] rt2800_get_tkip_seq+0x39/0x50 [rt2800lib] > [ 860.827321] [<ffffffffa0480f88>] ieee80211_get_key+0x218/0x2a0 [mac80211] > [ 860.827322] [<ffffffff815cc68c>] ? __nlmsg_put+0x6c/0x80 > [ 860.827329] [<ffffffffa051b02e>] nl80211_get_key+0x22e/0x360 [cfg80211] FWIW, this is my backtrace: BUG: sleeping function called from invalid context at kernel/locking/mutex.c:586 in_atomic(): 0, irqs_disabled(): 0, pid: 398, name: wpa_supplicant 4 locks held by wpa_supplicant/398: #0: (cb_lock){++++++}, at: [<ffffffff815345f9>] genl_rcv+0x19/0x40 #1: (genl_mutex){+.+.+.}, at: [<ffffffff81535dea>] genl_rcv_msg+0xba/0xc0 #2: (rtnl_mutex){+.+.+.}, at: [<ffffffff81513c17>] rtnl_lock+0x17/0x20 #3: (rcu_read_lock){......}, at: [<ffffffffa04602c5>] ieee80211_get_key+0x5/0x310 [mac80211] Preemption disabled at:[<ffffffff810a9a65>] console_unlock+0x275/0x420 CPU: 3 PID: 398 Comm: wpa_supplicant Tainted: G O 3.15.0-rc8-custom-00058-gd2cfd31 #1 Hardware name: CLEVO CO. B7130 /B7130 , BIOS 6.00 08/27/2010 0000000000000008 ffff8800abcbb850 ffffffff815f14da 0000000000000000 ffff8800abcbb868 ffffffff8107ca83 0000000000000000 ffff8800abcbb8e0 ffffffff815f57c2 ffff8800abcbb960 0000000000000296 0000000000000019 Call Trace: [<ffffffff815f14da>] dump_stack+0x4e/0x7a [<ffffffff8107ca83>] __might_sleep+0x123/0x1a0 [<ffffffff815f57c2>] mutex_lock_nested+0x32/0x400 [<ffffffffa060042c>] rt2x00usb_vendor_request_buff+0x3c/0xe0 [rt2x00usb] [<ffffffffa06521a1>] rt2x00usb_register_multiread+0x31/0x40 [rt2800usb] [<ffffffffa063ce49>] rt2800_get_tkip_seq+0x39/0x50 [rt2800lib] [<ffffffffa046052e>] ieee80211_get_key+0x26e/0x310 [mac80211] [<ffffffffa04602c5>] ? ieee80211_get_key+0x5/0x310 [mac80211] [<ffffffffa02a584b>] nl80211_get_key+0x22b/0x390 [cfg80211] [<ffffffffa0298d10>] ? __cfg80211_alloc_vendor_skb+0x140/0x140 [cfg80211] [<ffffffffa02955f6>] ? __cfg80211_wdev_from_attrs+0x36/0x1a0 [cfg80211] [<ffffffff81535b5b>] genl_family_rcv_msg+0x18b/0x360 [<ffffffff81535db4>] genl_rcv_msg+0x84/0xc0 [<ffffffff81535d30>] ? genl_family_rcv_msg+0x360/0x360 [<ffffffff81534079>] netlink_rcv_skb+0xa9/0xd0 [<ffffffff81534608>] genl_rcv+0x28/0x40 [<ffffffff815339e6>] netlink_unicast+0x166/0x210 [<ffffffff81533da6>] netlink_sendmsg+0x316/0x430 [<ffffffff814ea7cd>] sock_sendmsg+0x8d/0xc0 [<ffffffff811542fe>] ? might_fault+0x5e/0xc0 [<ffffffff81154359>] ? might_fault+0xb9/0xc0 [<ffffffff811542fe>] ? might_fault+0x5e/0xc0 [<ffffffff814f933e>] ? verify_iovec+0x5e/0xe0 [<ffffffff814eac30>] ___sys_sendmsg+0x3d0/0x3e0 [<ffffffff815fd265>] ? preempt_count_add+0x55/0xb0 [<ffffffff811b5897>] ? mntput_no_expire+0x17/0x260 [<ffffffff811b58ed>] ? mntput_no_expire+0x6d/0x260 [<ffffffff811b5897>] ? mntput_no_expire+0x17/0x260 [<ffffffff811b5b04>] ? mntput+0x24/0x40 [<ffffffff81194698>] ? __fput+0x188/0x200 [<ffffffff814ebe02>] __sys_sendmsg+0x42/0x80 [<ffffffff814ebe52>] SyS_sendmsg+0x12/0x20 [<ffffffff816015d2>] system_call_fastpath+0x16/0x1b > Cc: stable@xxxxxxxxxxxxxxx At least 3.13 up to 3.15 is affected. > Reported-by: Peter Wu <lekensteyn@xxxxxxxxx> Confirmed that the patched version does not trigger the bug while the unpatched one is still buggy. Reported-and-tested-by: Peter Wu <peter@xxxxxxxxxxxxx> > Reported-and-tested-by: Pontus Fuchs <pontus.fuchs@xxxxxxxxx> > Signed-off-by: Stanislaw Gruszka <sgruszka@xxxxxxxxxx> > --- > drivers/net/wireless/rt2x00/rt2x00mac.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/drivers/net/wireless/rt2x00/rt2x00mac.c b/drivers/net/wireless/rt2x00/rt2x00mac.c > index 212ac48..004dff9 100644 > --- a/drivers/net/wireless/rt2x00/rt2x00mac.c > +++ b/drivers/net/wireless/rt2x00/rt2x00mac.c > @@ -487,6 +487,8 @@ int rt2x00mac_set_key(struct ieee80211_hw *hw, enum set_key_cmd cmd, > crypto.cipher = rt2x00crypto_key_to_cipher(key); > if (crypto.cipher == CIPHER_NONE) > return -EOPNOTSUPP; > + if (crypto.cipher == CIPHER_TKIP && rt2x00_is_usb(rt2x00dev)) > + return -EOPNOTSUPP; > > crypto.cmd = cmd; > > -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html