Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp3925780pxy; Mon, 26 Apr 2021 13:12:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8JA+fzNr6kPTEVG0ex/h5g53ST+EWLssfeaxYBuDq7vYlYbdef2093M21C2mdi8cGTDS5 X-Received: by 2002:a63:5f54:: with SMTP id t81mr18260276pgb.286.1619467966954; Mon, 26 Apr 2021 13:12:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619467966; cv=none; d=google.com; s=arc-20160816; b=l6jGQSz6HjHjo1rvVFRKORe8dmTGRxQY7PbD9eCpn6I4jXR9ErdRwRtBVeGJdXfIgr QtHbMZS1gIx3rnMmtI4nvPfFZ8dW/Mybonl/LEh7RZOhDlqQT/22C/YircxARHDNUByv q2lbXh82oJnAQ5/ZoSlYe7/lMe6VStIc57mxJDV/M8X4/aabDw1sEl9mTZE7wnuKrjQ7 ut+7KXZTO5kPPtIymmjPLx6qk8x/eJmF4JR1COQOTQ6RTQZlm1TdvloOLxPVVfZUzbOw P4G83NlEMxLEsgzcT945QrXGnEIZcF52Ai7tVIEfexlNI8nOIPupa5jykOKmslDqO1w4 M/wg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=TQ5tHL6OxrE0juhmDgDc6FuMaSwLGOqIBnWwbGV8P3I=; b=esRpPd4/S2ZlLIcjtO1EU7gVl6+9+cHKolX8QjewhNF+TbR5SpQz3OIWEBM6z1Y/8i gdIrbfzjjpF/GWq4wxIGJdSk8miwFW4oTWJJenFcQo0yNYNYvEaO5tQZSs97jtvCCajY TIfBvfV6CWFkcseQByuCHIxhE7jE9smIh7aTyzm0BthI/5muUXO/bbGHtHD1+evbcxpV Zh8j4vuTBXnYeoELklxzHxExt+rQIlKrrm/62dX87Ty3kE5Z8PeF618fPPmosYOpCj44 fFXnKj9LzhB+uBd8EInEi0IUymcNjnrcJKY4+57+KaV3jYRPGHNSUq9UAuuxFKNCvy/J T9rg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y2si19787297plt.47.2021.04.26.13.12.33; Mon, 26 Apr 2021 13:12:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241743AbhDZUMb (ORCPT + 99 others); Mon, 26 Apr 2021 16:12:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39082 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239591AbhDZUMa (ORCPT ); Mon, 26 Apr 2021 16:12:30 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AAC3EC061574 for ; Mon, 26 Apr 2021 13:11:48 -0700 (PDT) Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.94) (envelope-from ) id 1lb7a6-000NRt-8D; Mon, 26 Apr 2021 22:11:46 +0200 Message-ID: Subject: Re: [BISECTED] 5.12 hangs at reboot From: Johannes Berg To: Linus Torvalds Cc: Harald Arnesen , Linux Kernel Mailing List Date: Mon, 26 Apr 2021 22:11:45 +0200 In-Reply-To: (sfid-20210426_215145_178898_2C6EEF9D) References: <09464e67-f3de-ac09-28a3-e27b7914ee7d@skogtun.org> <34d778fa-343f-912f-2fd7-a8ba49bd1b95@skogtun.org> <54debab9a79df628cff86a637dde13c281001578.camel@sipsolutions.net> <2cafd6d0c6378b36644d04fe263a53a866354574.camel@sipsolutions.net> (sfid-20210426_215145_178898_2C6EEF9D) Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.38.4 (3.38.4-1.fc33) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-malware-bazaar: not-scanned Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2021-04-26 at 12:51 -0700, Linus Torvalds wrote: > On Mon, Apr 26, 2021 at 12:46 PM Johannes Berg > wrote: > > > > Right. Maybe if it's modules, could try to remove them rather than > > reboot? > > Yes, doing an 'rmmod ath9k' (or whatever that module is called) > sounds like a good idea, it might trigger the same lockup. > > In fact, that might be the reason Harald sees this - maybe Void Linux > tries to unload modules before rebooting, and other distros don't? Seems odd if they would, but maybe? I guess we're well into speculation here now - Harald, even taking a picture of a stack dump will help, I'll likely only need an indication where it's actually locking up, unless it's actually in cfg80211_destroy_iface_wk() itself, but I can't see how that'd be possible. Looks like with mac80211 this really should just go down into ieee80211_if_remove() and that looks OK. And it's coming from a work struct, so I thought maybe some flushing happened in a bad context, but that's only in wiphy_unregister(), without the lock(s) held around it, as it should be. I figured then maybe wiphy_unregister() could be called in a bad context, but then that would've deadlocked itself earlier, unrelated to the destroy_iface_wk(). Oh, I have another idea - maybe void linux is using iwd instead of wpa_supplicant, and that insists on doing the netlink owner stuff so everything is deleted in case it crashes. But I've been looking at the code pretty much assuming that we get actual calls down, so ... Dunno. I don't see anything obvious right now, any additional information (stack dump, or lockdep report) would be great. johannes