Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1976863pxb; Fri, 5 Mar 2021 04:36:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJwT+I12h6/fPmf8xzQbBJL1HJvV6a/drIcK3+il5xpPY77Ox3YJ//hHoFfNeInmK6BjtxpU X-Received: by 2002:a50:9ecf:: with SMTP id a73mr8689390edf.181.1614947772047; Fri, 05 Mar 2021 04:36:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614947772; cv=none; d=google.com; s=arc-20160816; b=BalqSdBoMuqGIWCCOcUTCjq8MZWFvQBFPhZ4BGG0bMIVFjyIOvCpXBmECh3dOwGhXH eIcgLgJszNbccrAMzn+ifJXDunxw2QH//2lGQz0+OV4DmTTKBzDsb+XBWpbMN4Tk2Ngd +A0dROYCbRKiIxX7QpU2IjkZmPCnRWL/ch01t2vCdTGGOSLT6FW1p7+hyFsQofUg09fZ rxoPKnpVEQqt8bfr96BRbQhrVtz1T9X73L5Ic5tg2CmiP3GWZIrzUldeo+z9ghbBgQ6F Ob3UZ4HazLLymOdr+nby/P5s72aELMvdj9YPGS6YnyOmRbVFffDc99LE9KW1wPvMDwW/ CTJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=u7pq3efKv7M+Crrsd4NhnAdn6uzIC/39ubwp3R52zzs=; b=uO1E0EqOLWP5g8od1Kt+tLMGpmqFPP+4mSilp4VDurrItyJmKfs3lY74/JkieMTw2N ssvDyOJ/U8cS1Xrdmx4TwpKYSWaPlOOZ3LG2HQTbel3V5W1B3hV0LIADiqi7SoAjmaWo 07+uvgIC+eX7gkBf4H9XiIUBpKlWaO3U7Ay0W3EFm5pQxAhTXTy6VdNjxBL3yHxnye1p CLvkvW4OAnOvgVmdVrRv9uOzWyHD5s9d1slbQgp/XIWwAxkGWMxR+FurswXBHfd6KTH8 xFBaGcSxW+1hrc/7Hi01swJXWPkkVNt9CCWXem5OJqZ5R0rjEa4xzNp9mijYO2vXpJ8z m4KQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Q32kg0gc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m20si1233950ejc.530.2021.03.05.04.35.48; Fri, 05 Mar 2021 04:36:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Q32kg0gc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232156AbhCEMe4 (ORCPT + 99 others); Fri, 5 Mar 2021 07:34:56 -0500 Received: from mail.kernel.org ([198.145.29.99]:45630 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232435AbhCEMeJ (ORCPT ); Fri, 5 Mar 2021 07:34:09 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5306065012; Fri, 5 Mar 2021 12:34:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1614947647; bh=gdxJEs1DFnntSkeDL5EApLLuoDK+5pL1v9evU5obI+o=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Q32kg0gcE1Yn05m1VUkTY+GoNhjig9MTFs6Wb8nDB+eR6gikxodbl8H4mXvFiIF/y i1sfg682f1XRT7v8Z0RfmqePXohneNhGbwLcL8eRZP7hvib56bHzRuVqDZeo2FZeXA IiIVLjN+bP5UnA43zZOHw5csZocjWxwoRv04iNAk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Miaoqing Pan , Brian Norris , Kalle Valo , Sasha Levin Subject: [PATCH 5.4 34/72] ath10k: fix wmi mgmt tx queue full due to race condition Date: Fri, 5 Mar 2021 13:21:36 +0100 Message-Id: <20210305120859.004623059@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210305120857.341630346@linuxfoundation.org> References: <20210305120857.341630346@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Miaoqing Pan [ Upstream commit b55379e343a3472c35f4a1245906db5158cab453 ] Failed to transmit wmi management frames: [84977.840894] ath10k_snoc a000000.wifi: wmi mgmt tx queue is full [84977.840913] ath10k_snoc a000000.wifi: failed to transmit packet, dropping: -28 [84977.840924] ath10k_snoc a000000.wifi: failed to submit frame: -28 [84977.840932] ath10k_snoc a000000.wifi: failed to transmit frame: -28 This issue is caused by race condition between skb_dequeue and __skb_queue_tail. The queue of ‘wmi_mgmt_tx_queue’ is protected by a different lock: ar->data_lock vs list->lock, the result is no protection. So when ath10k_mgmt_over_wmi_tx_work() and ath10k_mac_tx_wmi_mgmt() running concurrently on different CPUs, there appear to be a rare corner cases when the queue length is 1, CPUx (skb_deuque) CPUy (__skb_queue_tail) next=list prev=list struct sk_buff *skb = skb_peek(list); WRITE_ONCE(newsk->next, next); WRITE_ONCE(list->qlen, list->qlen - 1);WRITE_ONCE(newsk->prev, prev); next = skb->next; WRITE_ONCE(next->prev, newsk); prev = skb->prev; WRITE_ONCE(prev->next, newsk); skb->next = skb->prev = NULL; list->qlen++; WRITE_ONCE(next->prev, prev); WRITE_ONCE(prev->next, next); If the instruction ‘next = skb->next’ is executed before ‘WRITE_ONCE(prev->next, newsk)’, newsk will be lost, as CPUx get the old ‘next’ pointer, but the length is still added by one. The final result is the length of the queue will reach the maximum value but the queue is empty. So remove ar->data_lock, and use 'skb_queue_tail' instead of '__skb_queue_tail' to prevent the potential race condition. Also switch to use skb_queue_len_lockless, in case we queue a few SKBs simultaneously. Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.3.1.c2-00033-QCAHLSWMTPLZ-1 Signed-off-by: Miaoqing Pan Reviewed-by: Brian Norris Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/1608618887-8857-1-git-send-email-miaoqing@codeaurora.org Signed-off-by: Sasha Levin --- drivers/net/wireless/ath/ath10k/mac.c | 15 ++++----------- 1 file changed, 4 insertions(+), 11 deletions(-) diff --git a/drivers/net/wireless/ath/ath10k/mac.c b/drivers/net/wireless/ath/ath10k/mac.c index 915ba2a7f744..47b733fdf4fc 100644 --- a/drivers/net/wireless/ath/ath10k/mac.c +++ b/drivers/net/wireless/ath/ath10k/mac.c @@ -3624,23 +3624,16 @@ bool ath10k_mac_tx_frm_has_freq(struct ath10k *ar) static int ath10k_mac_tx_wmi_mgmt(struct ath10k *ar, struct sk_buff *skb) { struct sk_buff_head *q = &ar->wmi_mgmt_tx_queue; - int ret = 0; - - spin_lock_bh(&ar->data_lock); - if (skb_queue_len(q) == ATH10K_MAX_NUM_MGMT_PENDING) { + if (skb_queue_len_lockless(q) >= ATH10K_MAX_NUM_MGMT_PENDING) { ath10k_warn(ar, "wmi mgmt tx queue is full\n"); - ret = -ENOSPC; - goto unlock; + return -ENOSPC; } - __skb_queue_tail(q, skb); + skb_queue_tail(q, skb); ieee80211_queue_work(ar->hw, &ar->wmi_mgmt_tx_work); -unlock: - spin_unlock_bh(&ar->data_lock); - - return ret; + return 0; } static enum ath10k_mac_tx_path -- 2.30.1