Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp1701816ybi; Wed, 17 Jul 2019 20:24:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqymyanhMj81/poEM7dOUQUNAoTNSe6/Niq6YS6WEvtkNI7rksSrggKjE+755c4jVb4s89Au X-Received: by 2002:a63:ff20:: with SMTP id k32mr45283745pgi.445.1563420241688; Wed, 17 Jul 2019 20:24:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563420241; cv=none; d=google.com; s=arc-20160816; b=mdAo+61pD61Pej6KEv3DOMDu5Ec1y7iL3r0eujEVe2thrxvONLMlIp7DRx89Iq0rB/ pyc4UNhA7WmyObxuRwr+tmDCEjmzJ0H8+QEJTkFmdtAw2gO/KjksjjPj4d36AqFVa1qq wOGl98x74NQZzpFnftNobYQ7enu4FbWzqzshDOUWS4LrkfNpjdAEqEKRRWLyDzKifYOI c9rqylOeF1KVkQAWRdqlijOIlFw21ttxpU1h7p52nmqVLOgOUt/FXzlhs8yvxZNy+h2F rU022Ii+vboox6vdTFd3nCUUIstgc7h7g0KJwk3PRT3Mw5ocnpQ9hyQO9+HkB6MD0k6r tM4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=prpn90YYh9ALApIlaOyRRpYVvmgWdI+0MeBBulssDuI=; b=AiVWwgWCxkYGAgI6tEwyDIHw6J941rYLlshMI9OWPkspSccI93n51RNtgCk+QPvQBR TR0czuu/7Uhf4/HzyJcoWVykRrCe/CrxZed8ozMRjT5ELcjVCAS0lnt+xYwL2jLWB/Rg nC4FtNRhJ/PfczVgy8AryJdf++GBIVI6Akbmiyy8sOu3QOBsl/q+wWBVvChbYYze+D6e gGxsySFdsy9dCie9JRdlZG1QX+UVGcHTOj1NWoy4kqN6f4sYhQxBc8nyuGkdU8BvqXA0 7xgtfgwWyFpVJpj+A9SbjAQOFkbHzeArhq4hdR+X9MrJfZk2wcautW2ffnCU5UcyaJAY k/hQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Kjkmsiwc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bf7si935038plb.216.2019.07.17.20.23.45; Wed, 17 Jul 2019 20:24:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Kjkmsiwc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389362AbfGRDWp (ORCPT + 99 others); Wed, 17 Jul 2019 23:22:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:40634 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390786AbfGRDIf (ORCPT ); Wed, 17 Jul 2019 23:08:35 -0400 Received: from localhost (115.42.148.210.bf.2iij.net [210.148.42.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EB20020818; Thu, 18 Jul 2019 03:08:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563419314; bh=6gd90O/y2lDsWKKRond7nl5/KG/B8OEOYSQUr9f0rWI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Kjkmsiwc6UIg7oClhH98sV5MwOfVmsxjIq1dgeyFM6b0CygcQuAHRpgiGp8M6kTA6 23TCwEmxPp1vLiPl4Sznhz337jrjMHurisZGCwTv0C82573NiYL58SX8tPAwmF10Cd oUVOjNd5Hyvp0EVaPs/lpAQjdvPLnpHh68osgeAY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Pedersen , Johannes Berg , Sasha Levin Subject: [PATCH 4.14 11/80] mac80211: mesh: fix RCU warning Date: Thu, 18 Jul 2019 12:01:02 +0900 Message-Id: <20190718030059.729049916@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190718030058.615992480@linuxfoundation.org> References: <20190718030058.615992480@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 551842446ed695641a00782cd118cbb064a416a1 ] ifmsh->csa is an RCU-protected pointer. The writer context in ieee80211_mesh_finish_csa() is already mutually exclusive with wdev->sdata.mtx, but the RCU checker did not know this. Use rcu_dereference_protected() to avoid a warning. fixes the following warning: [ 12.519089] ============================= [ 12.520042] WARNING: suspicious RCU usage [ 12.520652] 5.1.0-rc7-wt+ #16 Tainted: G W [ 12.521409] ----------------------------- [ 12.521972] net/mac80211/mesh.c:1223 suspicious rcu_dereference_check() usage! [ 12.522928] other info that might help us debug this: [ 12.523984] rcu_scheduler_active = 2, debug_locks = 1 [ 12.524855] 5 locks held by kworker/u8:2/152: [ 12.525438] #0: 00000000057be08c ((wq_completion)phy0){+.+.}, at: process_one_work+0x1a2/0x620 [ 12.526607] #1: 0000000059c6b07a ((work_completion)(&sdata->csa_finalize_work)){+.+.}, at: process_one_work+0x1a2/0x620 [ 12.528001] #2: 00000000f184ba7d (&wdev->mtx){+.+.}, at: ieee80211_csa_finalize_work+0x2f/0x90 [ 12.529116] #3: 00000000831a1f54 (&local->mtx){+.+.}, at: ieee80211_csa_finalize_work+0x47/0x90 [ 12.530233] #4: 00000000fd06f988 (&local->chanctx_mtx){+.+.}, at: ieee80211_csa_finalize_work+0x51/0x90 Signed-off-by: Thomas Pedersen Signed-off-by: Johannes Berg Signed-off-by: Sasha Levin --- net/mac80211/mesh.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/net/mac80211/mesh.c b/net/mac80211/mesh.c index 96e57d7c2872..aca054539f4a 100644 --- a/net/mac80211/mesh.c +++ b/net/mac80211/mesh.c @@ -1209,7 +1209,8 @@ int ieee80211_mesh_finish_csa(struct ieee80211_sub_if_data *sdata) ifmsh->chsw_ttl = 0; /* Remove the CSA and MCSP elements from the beacon */ - tmp_csa_settings = rcu_dereference(ifmsh->csa); + tmp_csa_settings = rcu_dereference_protected(ifmsh->csa, + lockdep_is_held(&sdata->wdev.mtx)); RCU_INIT_POINTER(ifmsh->csa, NULL); if (tmp_csa_settings) kfree_rcu(tmp_csa_settings, rcu_head); @@ -1231,6 +1232,8 @@ int ieee80211_mesh_csa_beacon(struct ieee80211_sub_if_data *sdata, struct mesh_csa_settings *tmp_csa_settings; int ret = 0; + lockdep_assert_held(&sdata->wdev.mtx); + tmp_csa_settings = kmalloc(sizeof(*tmp_csa_settings), GFP_ATOMIC); if (!tmp_csa_settings) -- 2.20.1