Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10043313ybi; Wed, 10 Jul 2019 22:25:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqwb7EBxaVlDTrKK7RCSbIJfJWeapgVSP05aCcnCMcr52l/fJsJRTFtwQBVmnOPvz4jOFTsr X-Received: by 2002:a65:4087:: with SMTP id t7mr2379018pgp.10.1562822746809; Wed, 10 Jul 2019 22:25:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562822746; cv=none; d=google.com; s=arc-20160816; b=qljYtIilyfAc+ReaUcjX7Svd+cM56cM5K7p1Njzxh6OciIMDaDzqp6yoLZufVIdQI8 S5+XwuLe72lshaFLp3KSil6wJffsxouZXcX/qECpc++MqcHTo8jcNmp1ddcgdIbLUeOb UregvybQQ/C0Xcz7S/8fyqMZdbfGu5B78QQY9mipBHLhjPH7WAibZJSBwuFOiElq2JrP vF/NS2JUhX0wH+BJDl9HPp3gV5IwOa8I7GTRdTnzLTq0hj2C8vlvJ4SlHFL6JiyP3g1e b3VmrkCUrfLgJTXr1iGzhAGkAF17rsQJ8+piR7bYLfW2drmaUbfPrlw+F3Vh9vj5AIHU f4gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=iAzKw0BoNuWYvRIzrLeTPP6dDrFST9kyO0Xv/W2qtaU=; b=ZV3EGE9yfdgTHHl+DfKwC4lhYbr1fS9ZnPm1+HaLt4hLvwPHUE8aiaQYeH2qzA/jA9 3/OA61u+la8y3dNjSaEIvlgBDdUjX7EKIOdSQmZd3vntr9cU4krCyWqwRkIBFwSCb7G2 FK1OO2w6fKaGywyZ6HfPmE4Ejf3sKw/aAC+5kNIjRTLGksfFU2Zkpjiix1Rs33oIpP+p k8sGC71UgpGiW6sDAnOvL4xr3I9Voqlkbz4EAgLPi2/dqiX6obpCxud1om3K8xKoi4NA RNFgcD9Iz51vM3FwbIGcaeXduJhxntKqrL8Czbn+KophPMDx7GyNxjJrvqu2sec/7kvB AjsA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@endlessm-com.20150623.gappssmtp.com header.s=20150623 header.b="E/e3PBgQ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u21si4289168pgn.290.2019.07.10.22.25.31; Wed, 10 Jul 2019 22:25:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@endlessm-com.20150623.gappssmtp.com header.s=20150623 header.b="E/e3PBgQ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727470AbfGKFZH (ORCPT + 99 others); Thu, 11 Jul 2019 01:25:07 -0400 Received: from mail-pl1-f195.google.com ([209.85.214.195]:42354 "EHLO mail-pl1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726088AbfGKFZH (ORCPT ); Thu, 11 Jul 2019 01:25:07 -0400 Received: by mail-pl1-f195.google.com with SMTP id ay6so2387045plb.9 for ; Wed, 10 Jul 2019 22:25:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=endlessm-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=iAzKw0BoNuWYvRIzrLeTPP6dDrFST9kyO0Xv/W2qtaU=; b=E/e3PBgQ9/O1mYNDctMgvQ9JP5Ck/4I3S80VZF4toBAPiVDAgrviyTwC2sZQvNSJ+8 rqBc9CSd+ScNVhuNdBxOzkoP/GY7op2PfRpfumWFKvyNfYd+2WJZFsK7sB3z1cURxgl0 uEmaJE4HpYFWhom5pmmYwT/Fd/cHzso1rmGL9J7mv2hpFfeSGo+ncCGrCLjqDp8psUAf cuowLO5rLG0RFtKJHWOX4VAHvMNRblY7QbYQ7YtbKAHNhPg1o5zod0LM8I8oy3PixRg8 2YGfEGPhDll9EPsFbfAp2CIDgqoluJP0sp/xyDLe93LooAdg+y7uAqGK0s6oQgU+Mvjk r8nw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=iAzKw0BoNuWYvRIzrLeTPP6dDrFST9kyO0Xv/W2qtaU=; b=NYvi5PrAIFAg5LIxOozgM568t1wQp1ZZ7ap022buzJAEGA1H7nibrIQ8HKQ1jFJ8Sc zb6wAaHdES4aAOWVpUAarYCaeJxClTLP2vk3tpGhCjU1RDLHcMDedbXWl+8Wb/pcvXo9 0UmNm7idKtLXh4dHbaAD2mNFjPmG21hxrTe5AvjyOHmTqz0BmR3NfAeV50zbBcVemlJI 2dAZC9PmOnIFTN2LqXBTSkt8m/B+/NEy8AXbXcSHIU0JZxZeJNlUxrt3FTbn/o1k6GGN Hg9tqExClI5c0JsYAVUfU1HEJMBAY5a7H0EXCZ6uZ0Tx2s37D6LYVRE+C/cocx03Lbwi +LxQ== X-Gm-Message-State: APjAAAVLi/BVElYa6bYe0TKyKf2COb1cC9qRjxB2ZlRmUQw2E93mVjR+ cLWPPfhkFtGbzTg56bD2Dv3Vnw== X-Received: by 2002:a17:902:b68f:: with SMTP id c15mr2535175pls.104.1562822705862; Wed, 10 Jul 2019 22:25:05 -0700 (PDT) Received: from localhost.localdomain (123-204-46-122.static.seed.net.tw. [123.204.46.122]) by smtp.gmail.com with ESMTPSA id 201sm5471345pfz.24.2019.07.10.22.25.02 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Wed, 10 Jul 2019 22:25:05 -0700 (PDT) From: Jian-Hong Pan To: Yan-Hsuan Chuang , Kalle Valo , "David S . Miller" , Larry Finger , David Laight , Christoph Hellwig Cc: linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux@endlessm.com, Daniel Drake , Jian-Hong Pan , stable@vger.kernel.org Subject: [PATCH v4 1/2] rtw88: pci: Rearrange the memory usage for skb in RX ISR Date: Thu, 11 Jul 2019 13:24:26 +0800 Message-Id: <20190711052427.5582-1-jian-hong@endlessm.com> X-Mailer: git-send-email 2.22.0 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Testing with RTL8822BE hardware, when available memory is low, we frequently see a kernel panic and system freeze. First, rtw_pci_rx_isr encounters a memory allocation failure (trimmed): rx routine starvation WARNING: CPU: 7 PID: 9871 at drivers/net/wireless/realtek/rtw88/pci.c:822 rtw_pci_rx_isr.constprop.25+0x35a/0x370 [rtwpci] [ 2356.580313] RIP: 0010:rtw_pci_rx_isr.constprop.25+0x35a/0x370 [rtwpci] Then we see a variety of different error conditions and kernel panics, such as this one (trimmed): rtw_pci 0000:02:00.0: pci bus timeout, check dma status skbuff: skb_over_panic: text:00000000091b6e66 len:415 put:415 head:00000000d2880c6f data:000000007a02b1ea tail:0x1df end:0xc0 dev: ------------[ cut here ]------------ kernel BUG at net/core/skbuff.c:105! invalid opcode: 0000 [#1] SMP NOPTI RIP: 0010:skb_panic+0x43/0x45 When skb allocation fails and the "rx routine starvation" is hit, the function returns immediately without updating the RX ring. At this point, the RX ring may continue referencing an old skb which was already handed off to ieee80211_rx_irqsafe(). When it comes to be used again, bad things happen. This patch allocates a new, data-sized skb first in RX ISR. After copying the data in, we pass it to the upper layers. However, if skb allocation fails, we effectively drop the frame. In both cases, the original, full size ring skb is reused. In addition, to fixing the kernel crash, the RX routine should now generally behave better under low memory conditions. Buglink: https://bugzilla.kernel.org/show_bug.cgi?id=204053 Signed-off-by: Jian-Hong Pan Cc: --- drivers/net/wireless/realtek/rtw88/pci.c | 49 +++++++++++------------- 1 file changed, 22 insertions(+), 27 deletions(-) diff --git a/drivers/net/wireless/realtek/rtw88/pci.c b/drivers/net/wireless/realtek/rtw88/pci.c index cfe05ba7280d..c415f5e94fed 100644 --- a/drivers/net/wireless/realtek/rtw88/pci.c +++ b/drivers/net/wireless/realtek/rtw88/pci.c @@ -763,6 +763,7 @@ static void rtw_pci_rx_isr(struct rtw_dev *rtwdev, struct rtw_pci *rtwpci, u32 pkt_offset; u32 pkt_desc_sz = chip->rx_pkt_desc_sz; u32 buf_desc_sz = chip->rx_buf_desc_sz; + u32 new_len; u8 *rx_desc; dma_addr_t dma; @@ -790,40 +791,34 @@ static void rtw_pci_rx_isr(struct rtw_dev *rtwdev, struct rtw_pci *rtwpci, pkt_offset = pkt_desc_sz + pkt_stat.drv_info_sz + pkt_stat.shift; - if (pkt_stat.is_c2h) { - /* keep rx_desc, halmac needs it */ - skb_put(skb, pkt_stat.pkt_len + pkt_offset); + /* allocate a new skb for this frame, + * discard the frame if none available + */ + new_len = pkt_stat.pkt_len + pkt_offset; + new = dev_alloc_skb(new_len); + if (WARN_ONCE(!new, "rx routine starvation\n")) + goto next_rp; + + /* put the DMA data including rx_desc from phy to new skb */ + skb_put_data(new, skb->data, new_len); - /* pass offset for further operation */ - *((u32 *)skb->cb) = pkt_offset; - skb_queue_tail(&rtwdev->c2h_queue, skb); + if (pkt_stat.is_c2h) { + /* pass rx_desc & offset for further operation */ + *((u32 *)new->cb) = pkt_offset; + skb_queue_tail(&rtwdev->c2h_queue, new); ieee80211_queue_work(rtwdev->hw, &rtwdev->c2h_work); } else { - /* remove rx_desc, maybe use skb_pull? */ - skb_put(skb, pkt_stat.pkt_len); - skb_reserve(skb, pkt_offset); - - /* alloc a smaller skb to mac80211 */ - new = dev_alloc_skb(pkt_stat.pkt_len); - if (!new) { - new = skb; - } else { - skb_put_data(new, skb->data, skb->len); - dev_kfree_skb_any(skb); - } - /* TODO: merge into rx.c */ - rtw_rx_stats(rtwdev, pkt_stat.vif, skb); + /* remove rx_desc */ + skb_pull(new, pkt_offset); + + rtw_rx_stats(rtwdev, pkt_stat.vif, new); memcpy(new->cb, &rx_status, sizeof(rx_status)); ieee80211_rx_irqsafe(rtwdev->hw, new); } - /* skb delivered to mac80211, alloc a new one in rx ring */ - new = dev_alloc_skb(RTK_PCI_RX_BUF_SIZE); - if (WARN(!new, "rx routine starvation\n")) - return; - - ring->buf[cur_rp] = new; - rtw_pci_reset_rx_desc(rtwdev, new, ring, cur_rp, buf_desc_sz); +next_rp: + /* new skb delivered to mac80211, re-enable original skb DMA */ + rtw_pci_reset_rx_desc(rtwdev, skb, ring, cur_rp, buf_desc_sz); /* host read next element in ring */ if (++cur_rp >= ring->r.len) -- 2.22.0