On Wed, 2012-05-02 at 13:09 -0700, Paul E. McKenney wrote: > On Wed, May 02, 2012 at 07:07:51PM +0200, Johannes Berg wrote: > > On Wed, 2012-05-02 at 11:00 +0100, Catalin Marinas wrote: > > > > > > Your patch does not help. I still get the following dump in the log: > > > > The patch is also wrong, we hold the mutex there and can't hold RCU read > > lock. > > > > > > #0: (scan_mutex){+.+...}, at: [<ffffffff8113b0d6>] kmemleak_scan_thread+0x56/0xd0 > > > > #1: (&tid_tx->session_timer){+.-...}, at: [<ffffffff8104853a>] > > > > run_timer_softirq+0xfa/0x6e0 > > > > #2: (rcu_read_lock){.+.+..}, at: [<ffffffffa0449ff0>] > > > > sta_tx_agg_session_timer_expired+0x0/0x2a0 [mac80211] > > > > > > > > stack backtrace: > > > > Pid: 622, comm: kmemleak Not tainted 3.4.0-rc5-wl+ #287 > > > > Call Trace: > > > > <IRQ> [<ffffffff8109309d>] lockdep_rcu_suspicious+0xfd/0x130 > > > > [<ffffffffa044a1cf>] sta_tx_agg_session_timer_expired+0x1df/0x2a0 [mac80211] > > > > [<ffffffffa0449ff0>] ? ieee80211_start_tx_ba_session+0x450/0x450 [mac80211] > > > > [<ffffffff810485c5>] run_timer_softirq+0x185/0x6e0 > > > > > > > > As kmemleak seems to be involved, I have added Catalin Marinas to the Cc list. > > > > > Looking at the code and the logs, ieee80211_start_tx_ba_session() calls > > > > I'm almost certain that ieee80211_start_tx_ba_session() is a bogus > > calltrace entry, since we're in a timer and that's not called from a > > timer. > > > > > rcu_dereference_protected_tid_tx() which calls > > > rcu_dereference_protected() with the (lockdep_is_held(&sta->lock) || > > > lockdep_is_held(&sta->ampdu_mlme.mtx)) condition which is false. As the > > > kernel log says, none of these locks are held, hence the warning. > > > > So does that just mean we need to add rcu_read_lock_held() to the > > conditions? I thought that wasn't necessary? +Paul. > > If you are using rcu_dereference_protected(), you really would need > to add rcu_read_lock_held(). Except that it is not legal to use > rcu_dereference_protected() within an RCU read-side critical section > because rcu_dereference_protected() does nothing to protect against > misordering mischief from the compiler and the CPU. Actually, that > sounds like a useful coccinelle check, now that you mention it. > > So you should instead use rcu_dereference_check(). This may be used > in an RCU read-side critical section, but may also be passed things like > (lockdep_is_held(&sta->lock) || lockdep_is_held(&sta->ampdu_mlme.mtx)). Oops, of course, I should have seen that, thanks for pointing it out! Now that I look at it, the problem actually seems to be something else entirely though: the rcu_dereference (whichever type) in sta_tx_agg_session_timer_expired() itself isn't protected at all, something like the patch below is needed. Larry, can you try that? johannes diff --git a/net/mac80211/agg-tx.c b/net/mac80211/agg-tx.c index 5b7053c..40d3ff4 100644 --- a/net/mac80211/agg-tx.c +++ b/net/mac80211/agg-tx.c @@ -421,16 +421,22 @@ static void sta_tx_agg_session_timer_expired(unsigned long data) struct tid_ampdu_tx *tid_tx; unsigned long timeout; - tid_tx = rcu_dereference_protected_tid_tx(sta, *ptid); - if (!tid_tx) + rcu_read_lock(); + tid_tx = rcu_dereference(sta->ampdu_mlme.tid_tx[*ptid]); + if (!tid_tx) { + rcu_read_unlock(); return; + } timeout = tid_tx->last_tx + TU_TO_JIFFIES(tid_tx->timeout); if (time_is_after_jiffies(timeout)) { mod_timer(&tid_tx->session_timer, timeout); + rcu_read_unlock(); return; } + rcu_read_unlock(); + #ifdef CONFIG_MAC80211_HT_DEBUG printk(KERN_DEBUG "tx session timer expired on tid %d\n", (u16)*ptid); #endif -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html