Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp4867442rwn; Sun, 11 Sep 2022 23:50:56 -0700 (PDT) X-Google-Smtp-Source: AA6agR5a8rV3SeretARZzwplm8bTzX38U0XxHBpgE8BWG7iHI/hoHgNcfIY8FGt4j1ZpbIMSJxh2 X-Received: by 2002:a17:90b:2802:b0:1fb:4efd:a1ca with SMTP id qb2-20020a17090b280200b001fb4efda1camr22220083pjb.198.1662965456470; Sun, 11 Sep 2022 23:50:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662965456; cv=none; d=google.com; s=arc-20160816; b=m6Rs/WTR0yPkJc9B2OQROVdRTDol0NUVqZ4x8FDAzMpjl2OuANLqEw6gTCTrGqFWWG +/2aohGfaJjOdigJjUCdHWhW3sCJNeVyE5sm8FYZYdvDbaY4NoIHXWCSSSYU8LQCNbb5 w1jAjN7mZu0F5s1JaClqFXVCZnChY20NuGEozNpmvtXn1QHXQpjkJ2a6cOIidHOaMcHH A+FkrxPaGHz8LUIBP4yYpM6NxHS2LCjCaEUP9QI7u3Z+Yp0E/4XDoOWNe/3TreNTLx/z 2UaJlVGKziALMNWO6YcRxl0FtXsG3xCeOoze0p0LsbIrzEecwRpM9sEWSkdLT7uqpoe7 AnvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from:cc :references:to:content-language:subject:user-agent:mime-version:date :message-id; bh=WYQ7dpsVRu/EkzOZ4j5SUC4SxKoixbNl9nNgtSda4bc=; b=Jl8Htw2uHF7lH+f9Wii0rfEm0AvlbkHOLtiuhfiqxMLbZ8b8Pgn9srtKFM/ar/IFIG YpqsEaXuSsVgwKNLWc3H6MY3khVVAfaJ3yMrAbVSeKgkaxOCn2bQ/fb5T/wfm6Z46+c/ ItCOGVm1SwpJ34kjcj4cgsBmdLbmoz3+CMPgrTmFR4dYoI01p7d1YUzBRi3ijM5Ybv6J FVexGZz2/8mmMf1NQsEy6si377rw/lIY5MWWMHH8fSBq57E/35+Lq1I4nIhCtuiVOw2x yQASulMuMDUppcDxNmBEtHxa/sYBNBIywPsQldkbSZOBaMjVYyLPp7eLr1L2hnagPWju DLzQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nu4-20020a17090b1b0400b00202acc2169csi7542262pjb.118.2022.09.11.23.50.32; Sun, 11 Sep 2022 23:50:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-bluetooth-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229785AbiILGih (ORCPT + 99 others); Mon, 12 Sep 2022 02:38:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60114 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229738AbiILGih (ORCPT ); Mon, 12 Sep 2022 02:38:37 -0400 Received: from mx1.molgen.mpg.de (mx3.molgen.mpg.de [141.14.17.11]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2DDB11C914 for ; Sun, 11 Sep 2022 23:38:35 -0700 (PDT) Received: from [192.168.0.2] (ip5f5ae91f.dynamic.kabel-deutschland.de [95.90.233.31]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) (Authenticated sender: pmenzel) by mx.molgen.mpg.de (Postfix) with ESMTPSA id 0062E61EA1932; Mon, 12 Sep 2022 08:23:28 +0200 (CEST) Message-ID: Date: Mon, 12 Sep 2022 08:23:28 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2 Subject: Re: [Bug] [Deadlock] Kernel thread deadlock in rfcomm socket release when connect interrupted Content-Language: en-US To: Peter Sutton References: <24e95c8b-dc05-0d00-50bb-58b71c5baf94@molgen.mpg.de> Cc: Desmond Cheong Zhi Xi , Luiz Augusto von Dentz , linux-bluetooth@vger.kernel.org, regressions@lists.linux.dev From: Paul Menzel In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-8.3 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org [Cc: +regressions] #regzbot ^introduced: b7ce436a5d798bc59e71797952566608a4b4626b #regzbot title: [Bug] [Deadlock] Kernel thread deadlock in rfcomm socket release when connect interrupted Dear Pete, Am 11.09.22 um 17:42 schrieb Peter Sutton: > Just following this up. Is there anything I can do to help fix this? > Running a custom kernel is a real pain. I've been running with the > commit revert and upgrading with Arch Linux kernel releases with no > issue. (Please do not top post.) Have you tested bluetooth-next already? Regardless, the offending commit present in Linux since 5.15-rc1 should be reverted. Kind regards, Paul > On Mon, 30 May 2022 at 12:44, Peter Sutton wrote: >> >> Commit b7ce436a5d798bc59e71797952566608a4b4626b is the probable cause. >> I compiled a custom Arch Linux kernel package [1] and the bug was >> present. Reverting the commit fixed the bug. Below is the reply I was >> writing before Matt found the suspect commit and I tested with the >> custom kernel. >> >>> What hardware is that? >> >> $ dmesg | grep iwlwifi >> Me: Intel(R) Dual Band Wireless AC 8260, REV=0x204 >> Matt: Intel(R) Dual Band Wireless AC 8265, REV=0x230 >> >> We both get: >> >> $ lsusb | grep Bluetooth >> Me & Matt: Bus 001 Device 006: ID 8087:0a2b Intel Corp. Bluetooth wireless interface >> >>> As a lot of patches are also applied to the stable series, do you know, >>> if this is a regression? Does it work with Linux 5.15(.0) or 5.10? >> >> Bug is present on current Arch Linux LTS kernel: >> >> $ uname -a >> Linux taffer 5.15.43-1-lts #1 SMP Wed, 25 May 2022 14:08:34 +0000 x86_64 GNU/Linux >> >> Matt tested on 5.10.115 and the bug is not present. So I guess it's a >> regression. Anecdotally, we encountered this behaviour 1 yr ago >> (difficult to say exactly), then it went away but came back about 1 or >> 2 months ago. All of this is on Arch Linux, I update about once a >> week. >> >> [1] https://wiki.archlinux.org/title/Kernel/Arch_Build_System